
Ahmed Chalak ShakirKirkuk University · College of Computer Sciene and Information Technology
Ahmed Chalak Shakir
Doctor of Philosophy
About
14
Publications
2,093
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
23
Citations
Citations since 2017
Publications
Publications (14)
Voting is an important procedure in democratic societies in different countries, including Iraq. Electronic voting (E-voting) is becoming more prevalent due to reducing administrative costs and burdens. E-voting systems have many restrictions that affect the electoral process. For example, fraud, tampering with ballot boxes, taking many hours to an...
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mech...
p>The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the proces...
LoRaWAN is a low-bandwidth network technology (LPWAN) that enables low-cost and low-power communications for Internet-connected devices even in dense urban areas. This paper aimed to add an additional encryption layer plus with an electronic signature to transferred data through the Elliptic Curve Cryptography (ECC). Although this technology has im...
In fuzzy control systems, fuzzification and defuzzification are two important procedures. Defuzzification plays an important part in the implementation of a fuzzy system, since the fuzzy data is not suitable for real time applications; it needs to be converted into crisp data. This paper proposes a novel VLSI architecture of a weighted average meth...
In fuzzy control systems, fuzzification and defuzzification are two important procedures. Defuzzification plays an important part in the implementation of a fuzzy system, since the fuzzy data is not suitable for real time applications; it needs to be converted into crisp data. This paper proposes a novel VLSI architecture of a weighted average meth...
Recently, many researches showing that the Elliptic Curve Cryptography (ECC) has many advantages especially in wireless communication due to the small size of the keys comparing to other public key cryptography algorithms and the mathematic difficulty to brake the key. The proposed method developed the previous method which is used to secure the ou...
The security of the wireless environment, especially for those which have limited resources like in the wireless sensor network, needs lightweight algorithms. Elliptic curve cryptography (ECC) is the unique algorithm which satisfies such property. It provides the high level of security with relatively small keys; therefore, it has been the core of...
Questions
Question (1)