Ahmed Chalak Shakir

Ahmed Chalak Shakir
Kirkuk University · College of Computer Sciene and Information Technology

Doctor of Philosophy

About

10
Publications
1,741
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11
Citations

Publications

Publications (10)
Article
Full-text available
LoRaWAN is a low-bandwidth network technology (LPWAN) that enables low-cost and low-power communications for Internet-connected devices even in dense urban areas. This paper aimed to add an additional encryption layer plus with an electronic signature to transferred data through the Elliptic Curve Cryptography (ECC). Although this technology has im...
Conference Paper
Full-text available
In fuzzy control systems, fuzzification and defuzzification are two important procedures. Defuzzification plays an important part in the implementation of a fuzzy system, since the fuzzy data is not suitable for real time applications; it needs to be converted into crisp data. This paper proposes a novel VLSI architecture of a weighted average meth...
Article
Full-text available
In fuzzy control systems, fuzzification and defuzzification are two important procedures. Defuzzification plays an important part in the implementation of a fuzzy system, since the fuzzy data is not suitable for real time applications; it needs to be converted into crisp data. This paper proposes a novel VLSI architecture of a weighted average meth...
Article
Full-text available
Recently, many researches showing that the Elliptic Curve Cryptography (ECC) has many advantages especially in wireless communication due to the small size of the keys comparing to other public key cryptography algorithms and the mathematic difficulty to brake the key. The proposed method developed the previous method which is used to secure the ou...
Chapter
The security of the wireless environment, especially for those which have limited resources like in the wireless sensor network, needs lightweight algorithms. Elliptic curve cryptography (ECC) is the unique algorithm which satisfies such property. It provides the high level of security with relatively small keys; therefore, it has been the core of...

Questions

Network

Cited By

Projects

Projects (2)
Project
Analyze of the blockchain technology and how it can be used to convert the Internet of things towards the Internet of Values