Sarkar Hasan Ahmed

Sarkar Hasan Ahmed
  • Doctor of Philosophy
  • Assistant Professor at Sulaimani Polytechnic University

About

26
Publications
18,299
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
535
Citations
Current institution
Sulaimani Polytechnic University
Current position
  • Assistant Professor
Additional affiliations
October 2014 - present
Sulaimani Polytechnic University
Position
  • Lecturer
Education
September 2012 - September 2013
Coventry University
Field of study
  • Software Development

Publications

Publications (26)
Article
Full-text available
The purpose of this study is to investigate the integration of ethical Artificial Intelligence (AI) with Internet of Things (IoT) and corporate systems, with a particular focus on the significant functions that responsible AI plays in the development of environmentally responsible business practices. The synthesis of research places an emphasis on...
Article
Full-text available
Over the last several years, there has been a significant rise in the number of people getting online and using the internet. Individual hypertext links are available, and any one of them may be used to get access to the resource. There is a variety of hypertext links available. It has been feasible to construct new websites as a result of the grow...
Article
Full-text available
The Internet of Things (IoT) is a rapidly growing network of interconnected devices that collect and exchange data. While IoT devices offer many benefits, they also pose unique security and energy management challenges. One promising approach to addressing these challenges is to develop new hashing algorithms that are both secure and energy-efficie...
Article
Full-text available
The Internet of Things (IoT) has developed as a disruptive technology with wide-ranging applications across several sectors, enabling the connecting of devices and the acquisition of substantial volumes of data. Nevertheless, the rapid expansion of networked gadgets has generated substantial apprehensions pertaining to security and energy administr...
Article
Full-text available
The Internet of Things (IoT) has emerged as a significant technological advancement in recent years. Its development has garnered global attention from many organisations, industries and researchers. The IoT is responsible for collecting and processing data from remote areas, significantly enhancing productivity for distributed systems and individu...
Article
Full-text available
The Internet of Things (IoT) has grown dramatically in recent years, it is due to its big impact on people's daily life in critical applications like healthcare, smart homes, smart cities, and smart everything. It also attracts industries and researchers to work on this technology. IoT devices are susceptible to be compromised because of their netw...
Article
Full-text available
Remote sensing (RS) presents laser scanning measurements, aerial photos, and high-resolution satellite images, which are utilized for extracting a range of traffic-related and road-related features. RS has a weakness, such as traffic fluctuations on small time scales that could distort the accuracy of predicted road and traffic features. This artic...
Article
Full-text available
The pandemic of COVID-19 obliges citizens to follow the "work from home "scheme. The Internet is also a powerful channel for social connections. The huge dependency of people on digital media opens doors to fraud. Phishing is a form of cybercrime that is used to rob users of passwords from online banking, e-commerce, online schools, digital markets...
Article
Full-text available
With the evolution of new technologies, the production of digital data is constantly growing. It is thus necessary to develop data management strategies in order to handle the large-scale datasets. The data gathered through different sources, such as sensor networks, social media, business transactions, etc. is inherently uncertain due to noise, mi...
Article
Full-text available
1. Abstract The innovative and disruptive technology of the Internet of Things (IoT)-based smart home applications are mainly restricted and dispersed. To offer insightful analyses of technological settings and assist researchers, we must first grasp the available choices and gaps in this field of study. Thus, this study aims to review to organize...
Article
Full-text available
The rapid advancement in the Internet of things applications generates a considerable amount of data and requires additional computing power. These are serious challenges that directly impact the performance, latency, and network breakdown of cloud computing. Fog Computing can be depended on as an excellent solution to overcome some related problem...
Conference Paper
Full-text available
There are relatively new approaches of Parallel Distributed Processing. Distributed cloud uses cloud computing technology from different geographic locations to interconnect data and applications served. Distributed, in the sense of information technology (IT), something is exchanged between various systems that may also be in different places. The...
Article
Full-text available
Recent advances in sensor networks and the Internet of Things (IoT) technologies have led to the gathering of an enormous scale of data. The exploration of such huge quantities of data needs more efficient methods with high analysis accuracy. Artificial Intelligence (AI) techniques such as machine learning and evolutionary algorithms able to provid...
Article
Full-text available
In this paper, we analyse the security of two mutual authentication protocols that have been recently proposed by Gao et al. (IEEE Access, 7:8376–8384, 2019), a hash-based protocol and a Rabin public key based protocol. Our security analysis clearly shows important security pitfalls in these schemes. More precisely, in each protocol, we introduce e...
Conference Paper
Full-text available
Internet of Things (IoT) is a huge number of objects which communicate over a network or the Internet. These objects are a combination of electronics, sensors, and a software to control the way of working other parts of the object. Each object generates and collects data from its environment using sensors and transfers them to other objects or a ce...
Article
Full-text available
These days, using smartphone is getting more common in the world and they are provided with powerful hardware resources and variety of communicating methods. A robust security model is applied to develop Android operating systems that works on smartphone and tablets. But, it does not satisfy some users, especially whom with confidential and delicat...
Article
Full-text available
These days, using Smartphone is getting more common in the world and they are provided with powerful hardware resources and variety of communicating methods. A robust security model is applied to develop android operating systems that works on Smartphone and tablets. But it does not satisfy some users, especially whom with confidential and delicate...
Article
Full-text available
These days, using Smartphone is getting more common in the world and they are provided with powerful hardware resources and variety of communicating methods. A robust security model is applied to develop android operating systems that works on Smartphone and tablets. But it does not satisfy some users, especially whom with confidential and delicate...
Article
Full-text available
These days, the governmental offices in Kurdistan regional government (KRG) are not electronic. Therefore, they are asking for much official paper documentation and visiting offices too many times from people who are visiting there regularly to check process progression. Also, applicants sometimes required to bring numerous amounts of official docu...
Article
communicating over any untrusted medium or network requires privacy and authentication; cryptography plays an important role in this area. Original Playfair cipher is one of the early cryptography algorithms that uses a 5x5 matrix. It supports English language merely and can be cracked easily. It has being improved in different aspects. This paper,...
Conference Paper
This paper, propose a Model Driven Architecture approach for auto-reprogramming robots who collaborate to achieve a common goal. The approach suggest that the analyst perform all the changes for each robot at the requirements model level and use a software tool to auto-generate the code that will change the behavior of the team of robots.

Network

Cited By