Iraqi Journal for Computers and Informatics

IJCI

Iraqi Journal for Computers and Informatics is an open access ,double-blind peer reviewed, international academic journal published biannual (one issue/year before 2017).It is institutional journal issued by the University of Information Technology and Communications (UoITC) in Baghdad- Iraq; UoITC is one of governmental universities which established by the Ministry of Higher Education in Iraq. IJCI aims to contribute to the constant scientific research and to provide a sober scientific journal that enriches scholars around the world and it deals with all aspects of computer science.

filler image

Focus and Scope

Subject areas suitable for publication in IJCI include (but are not limited) to the following fields:

  1. Artificial Intelligence
  2. Computer science in modeling
  3. Computer Architecture& Embedded systems ...and more...
filler image

Submitting Instructions


Manuscripts that have been submitted to IJCI must be original, not plagiarized, and has not been published elsewhere. Consequently IJCI will ignore any work doesn't meet these policies.
So authors have to follow the following instructions.. Read More

filler image

Author Guidelines

IJCI welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. For this purpose IJCI isfor allauthors around the world who have excellent papers in computer Sciences and relevant fields.All the manuscripts submitted for publication are first peer reviewed to make sure they are original, relevant and readable.Manuscripts should be submitted via Online Submission only.

Issues of IJCI

No. Article Name(Volume 43 (2017)) Extensition Pages
1 Corners-based Image Information Hiding Method PDF 1-5
2 Blended Learning Using Virtual Reality Environments PDF 6-13
3 Enhance the Hiding Image by Using Compression and Securing Techniques PDF 14-16
4 The Concept of Building a Model of the National Blood Information System PDF 17-21
5 Design of Secure Chatting Application with End to End Encryption for Android Platform PDF 22-27
6 Compression image sharing using DCT- Wavelet transform and coding by Blackely method PDF 28-39
7 Quadcopter Based Object Detection and Localization PDF 40-44
8 Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain PDF 45-49
No. Article Name Volume 42 (2016) Extensition Pages
1 Distributed Agents for Web Content Filtering PDF 1-4
2 SECURE VIDEO CODED SYSTEM MODEL PDF 5-9
3 Combining the Attribute Oriented Induction and Graph Visualization to Enhancement Association Rules Interp PDF 10-22
4 Determine the close Friends for Twitter Users by Analyzing Users Public Data Name PDF 23-29
5 Audio Hiding based on Wavelet Transform and Linear Predictive Coding PDF 30-37
6 Combining the Attribute Oriented Induction and Graph Visualization to Enhancement Association Rules Interp PDF 38-47
7 Enhancing of DBSCAN based on Sampling and Density-based Separation PDF 48-54
8 Comparing Three Different Algorithms to Estimate Parameters of new Generated Marshal – Olkin Uniform Distribution PDF 55-58
9 Proposed Method to Prevent SQL Injection Attack PDF 59-63
10 A Binary Particle Swarm Algorithm with A Simple Mutation Operator for Solving Phylogenies Problems PDF 64-67
11 The usage of cloud computing in education PDF 68-73
No. Article Name (Volume 41 (2014)) Extensition Pages
1 Gate Control System for Iraqi License Plate_ICCI_Format PDF 1-3
2 TRAFFIC MANAGEMENT IN WIRELESS SENSOR NETWORK BASED ON MO PDF 4-8
3 Network Coded Modulation for Two Way Relay Networks PDF 9-14
4 Design and Implementation of Wireless Electric Power Mete PDF 15-19
5 A Framework Prototype for E-Authentication of Iraqi Civil PDF 20-25
6 Partial Encryption in Digital Image Based On Plasma Encod PDF 26-31
7 A Proposed Methodology for Identifying and Evaluating an- PDF 32-38
8 Character Recognition Using Neural Network Learned by Art PDF 39-46
9 SMS Encryption by Using Android Operating System new PDF 47-50
10 Using Data Marts Approach in Iraqi Educational Instituti PDF 51-54
11 USING GENETIC ALGORITHM TO BREAK KNAPSACK CIPHER WITH SE PDF 55-59
12 A Proposed Firewall for Viruses and Steganography Image PDF 60-65
13 RSA Cryptographic Key Generation Using Fingerprint Minut PDF 66-69


Issues since 1970

Iraqi Journal for Computers and Informatics

IJCI Map

The First Issue

Volume 1 (1977)
Volume 1 (1977)
Cross ref

Cross ref

DOI

doi 10.25195

doi 10.25195



Contact Details

Principal Contact

Dr. Jane Jaleel Stephan,
Assist. Prof Dr.,
University of Information Technology and Communications,
Baghdad - Iraq

Email: [email protected]
Phone: 07901785701

P.O.BOX: 3071
For more details, please do not hesitate to contact us via Email: [email protected]

For Complain, Please contact us via Email: [email protected]
Follow Us: