Ahmed Chalak Shakir

Ahmed Chalak Shakir
Kirkuk University · College of Computer Sciene and Information Technology

Doctor of Philosophy

About

14
Publications
2,093
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
23
Citations
Citations since 2017
9 Research Items
21 Citations
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468

Publications

Publications (14)
Article
Voting is an important procedure in democratic societies in different countries, including Iraq. Electronic voting (E-voting) is becoming more prevalent due to reducing administrative costs and burdens. E-voting systems have many restrictions that affect the electoral process. For example, fraud, tampering with ballot boxes, taking many hours to an...
Article
Full-text available
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mech...
Article
Full-text available
p>The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the proces...
Article
Full-text available
LoRaWAN is a low-bandwidth network technology (LPWAN) that enables low-cost and low-power communications for Internet-connected devices even in dense urban areas. This paper aimed to add an additional encryption layer plus with an electronic signature to transferred data through the Elliptic Curve Cryptography (ECC). Although this technology has im...
Conference Paper
Full-text available
In fuzzy control systems, fuzzification and defuzzification are two important procedures. Defuzzification plays an important part in the implementation of a fuzzy system, since the fuzzy data is not suitable for real time applications; it needs to be converted into crisp data. This paper proposes a novel VLSI architecture of a weighted average meth...
Article
Full-text available
In fuzzy control systems, fuzzification and defuzzification are two important procedures. Defuzzification plays an important part in the implementation of a fuzzy system, since the fuzzy data is not suitable for real time applications; it needs to be converted into crisp data. This paper proposes a novel VLSI architecture of a weighted average meth...
Article
Full-text available
Recently, many researches showing that the Elliptic Curve Cryptography (ECC) has many advantages especially in wireless communication due to the small size of the keys comparing to other public key cryptography algorithms and the mathematic difficulty to brake the key. The proposed method developed the previous method which is used to secure the ou...
Chapter
The security of the wireless environment, especially for those which have limited resources like in the wireless sensor network, needs lightweight algorithms. Elliptic curve cryptography (ECC) is the unique algorithm which satisfies such property. It provides the high level of security with relatively small keys; therefore, it has been the core of...

Questions

Network

Cited By