Blockchain-based E-Government system using WebSocket protocol
Blockchain-based E-Government system using WebSocket protocol

Zainab A. Kamal; Rana F. Ghani; Alaa K. Farhan

Volume 42, Issue 4 , April 2024, , Page 421-429

https://doi.org/10.30684/etj.2024.146559.1689

Abstract
  This paper explores the Integration of Blockchain technology and WebSocket protocol to implement E-government system. Blockchain is used to record the correspondence between users and ...  Read More ...
New S-Box Design for Image Encryption Based on Multi-Chaotic System
New S-Box Design for Image Encryption Based on Multi-Chaotic System

Azhaar A. Abdallah; Alaa K. Farhan

Volume 41, Issue 10 , October 2023, , Page 1211-1219

https://doi.org/10.30684/etj.2023.139076.1416

Abstract
  Image encryption is a crucial area for researchers in information security, which protects digital images from unauthorized access. This paper proposes a novel image encryption scheme ...  Read More ...
E-voting System Based on Ethereum Blockchain Technology Using Ganache and Remix Environments
E-voting System Based on Ethereum Blockchain Technology Using Ganache and Remix Environments

Hind S. Hassan; Rehab Hassan; Ekhlas K. Gbashi

Volume 41, Issue 4 , April 2023, , Page 562-577

https://doi.org/10.30684/etj.2023.135464.1273

Abstract
  Abstract—In the second decade of the twenty-first century, blockchain is considered one of the most popular computer technologies. Blockchain is a zero-trust network, making it ...  Read More ...
Design and Implement the Innovative Drugstore for Health Care Services Based on Health Mobile Applications and Advanced IoT
Design and Implement the Innovative Drugstore for Health Care Services Based on Health Mobile Applications and Advanced IoT

Yusur S. AL - Saffar; Sabah A. Gitaffa; Abbas H. Issa

Volume 41, Issue 2 , February 2023, , Page 407-417

https://doi.org/10.30684/etj.2022.136179.1302

Abstract
  The health care problems are errors in taking medication, improper storage of the medication, irregularly taking the medication on time, and not knowing the side effects of taking medication ...  Read More ...
Proposal Framework to Light Weight Cryptography Primitives
Proposal Framework to Light Weight Cryptography Primitives

Mustafa M. Abd Zaid; Soukaena Hassan

Volume 40, Issue 4 , April 2022, , Page 516-526

https://doi.org/10.30684/etj.v40i4.1679

Abstract
  Due to manufacturing cost and portability limitations, the computing power, storage capacity, and energy of the Internet of Things (IoT) hardware are still slowly developing. From above, ...  Read More ...
Textual Dataset Classification Using Supervised Machine Learning Techniques
Textual Dataset Classification Using Supervised Machine Learning Techniques

Hanan Q. Jaleel; Jane J. Stephan; Sinan A. Naji

Volume 40, Issue 4 , April 2022, , Page 527-538

https://doi.org/10.30684/etj.v40i4.1970

Abstract
  Text classification has been a significant domain of study and research because of the increased volume of text datasets and documents available in digital format. Text classification ...  Read More ...
Improving Machine Learning Performance by Eliminating the Influence of Unclean Data
Improving Machine Learning Performance by Eliminating the Influence of Unclean Data

Murtadha B. Ressan; Rehab F. Hassan

Volume 40, Issue 4 , April 2022, , Page 546-539

https://doi.org/10.30684/etj.v40i4.2010

Abstract
  Regardless of the data source and type (text, digital, photo group, etc.), they are usually unclean data. The term (unclean) means that data contains some bugs and paradoxes that can ...  Read More ...
Tuning the Hyperparameters of the 1D CNN Model to Improve the Performance of Human Activity Recognition
Tuning the Hyperparameters of the 1D CNN Model to Improve the Performance of Human Activity Recognition

Rana A. Lateef; Ayad R. Abbas

Volume 40, Issue 4 , April 2022, , Page 547-554

https://doi.org/10.30684/etj.v40i4.2054

Abstract
  The human activity recognition (HAR) field has recently become one of the trendiest research topics due to ready-made sensors such as accelerometers and gyroscopes equipped with smartphones ...  Read More ...
A Proposed WoT System for Diagnosing the Infection of Coronavirus (Covid-19)
A Proposed WoT System for Diagnosing the Infection of Coronavirus (Covid-19)

Dalal M. Thair; Akbas E. Ali

Volume 40, Issue 4 , April 2022, , Page 563-572

https://doi.org/10.30684/etj.v40i4.2087

Abstract
  Coronavirus is one of the viruses that have broadly affected humans and the health system in general. The problem is that there is no treatment for the virus yet, and the virus spreads ...  Read More ...
Building an Efficient System to Detect Computer Worms in Websites Based on Ensemble Ada Boosting and SVM Classifiers Algorithms
Building an Efficient System to Detect Computer Worms in Websites Based on Ensemble Ada Boosting and SVM Classifiers Algorithms

Ali K. Hilool; Soukaena H. Hashem; Shatha H. Jafer

Volume 40, Issue 4 , April 2022, , Page 595-604

https://doi.org/10.30684/etj.v40i4.2148

Abstract
  Computer worms perform harmful tasks in network systems due to their rapid spread, which leads to harmful consequences on system security. However, existing worm detection algorithms ...  Read More ...
Algebraic Decomposition Method for Zero Watermarking Technique in YCbCr Space
Algebraic Decomposition Method for Zero Watermarking Technique in YCbCr Space

Nada S. Mohammed; Areej M. Abduldaim

Volume 40, Issue 4 , April 2022, , Page 605-616

https://doi.org/10.30684/etj.v40i4.2028

Abstract
  The close connection between mathematics, especially linear algebra, and computer science has greatly impacted the development of several fields, and the most important is image processing. ...  Read More ...
Comparative Analysis of GMM, KNN, and ViBe Background Subtraction Algorithms Applied in Dynamic Background Scenes of Video Surveillance System
Comparative Analysis of GMM, KNN, and ViBe Background Subtraction Algorithms Applied in Dynamic Background Scenes of Video Surveillance System

Maryam A. Yasir; Yossra H. Ali

Volume 40, Issue 4 , April 2022, , Page 617-626

https://doi.org/10.30684/etj.v40i4.2154

Abstract
  Background subtraction is the most prominent technique applied in the domain of detecting moving objects. However, there is a wide range of different background subtraction models. ...  Read More ...