http://ijci.uoitc.edu.iq/index.php/ijci/issue/feed Iraqi Journal for Computers and Informatics 2020-12-03T21:53:50+00:00 Prof. Dr. Safaa O. Al-mamory editor_ijci@uoitc.edu.iq Open Journal Systems <p>Iraqi Journal for Computers and Informatics is an open access ,double-blind peer reviewed, international academic journal published biannual (since 2017). It is institutional journal issued by the University of Information Technology and Communications (UoITC) in Baghdad- Iraq; UoITC is one of governmental universities which established by the Ministry of Higher Education in Iraq. IJCI aims to contribute to the constant scientific research and to provide a sober scientific journal that enriches scholars around the world and it deals with all aspects of computer science.</p> http://ijci.uoitc.edu.iq/index.php/ijci/article/view/258 ANEW TECHNIQUE BY USING INVERTED TABLES AND 3D BOX FOR EFFICIENT QUERYING OVER AN ENCRYPTED DATABASE 2020-12-03T21:04:30+00:00 Atheer Metaab Al Abbassi etheer_78@yahoo.com Abdul Monem S. Rahman 110003@uotechnology.edu.iq Nidaa F. Hassan 110020@uotechnology.edu.iq <p>The increase in the amount of data in encrypted databases has caused problems in data processing and retrieval time. In traditional query processing methods, there are many difficulties in execute query over an encrypted database because it is time- consuming. In this paper, proposes technique for querying encrypted databases records, allows authorized users to execute queries without decrypting all the records of the encrypted database. In this technique, inverted tables include the numbers of 3D box cover locations that were created to enhance and speed up the retrieval time of query and improve an approach of data embedding according to the random 3D box. The proposed method has been examined on the Iraqi voter encrypted Database. The retrieval time in (second, millisecond) has been computed for the traditional method of query processing and proposed technique that using inverted tables. The retrieval time of query executing of proposed techniques without retrieval of all the records of the encrypted database is 10.870 (seconds, millisecond) where the retrieval time of query executing of conventional method that’s retrieval of all the records of the encrypted database is 40.682 (seconds, millisecond).</p> 2020-12-01T00:00:00+00:00 Copyright (c) 2020 http://ijci.uoitc.edu.iq/index.php/ijci/article/view/259 ENCRYPTION THREE-DIMENSION IMAGE USING TINY ALGORITHM 2020-12-03T21:27:38+00:00 Noor Hayder Abdul Ameer 110048@uotechnology.edu.iq Zahraa Faiz Hussain Msc_zahraa@yahoo.com May Sabri Mohammed 110051@uotechnology.edu.iq <p>The development of systems allows providing the capability of using three-dimension (3D) pictures over the internet especially in social media. In previous years, animation pictures and videos are not used in the internet due to the sizes of these two data and need the huge amount of data to work over internet and need supporting program to deal with presenting the data to the users of the internet in either websites or social media. Most of the security over internet used on ciphering text or ciphering images but not cipher video or 3D picture because video and 3D pictures are not used until recently. The huge use of these two types 3D pictures and videos in recent years. It is become an urgent necessary to encrypt these sorts of data. The research will focus on encrypting these types of data by using special algorithm called as Tiny Encryption Algorithm (TEA). This algorithm will be used to encrypt and decrypt 3D pictures and protecting the privacy of this sort of data. The research shows the how-to encode and decode of 3D picture and how to deal with them. The results show the TEA is rapid algorithm in the coding picture and decoding 3D pictures. it is only needing a few portions of time to cipher and decipher 3D pictures. The program that used to test the ciphering and deciphering algorithm was based on MATLAB.</p> 2020-12-01T00:00:00+00:00 Copyright (c) 2020