Ali Adnan Wahbi Alwafi
Research InterestsWireless Sensor Networks (WSN)
Internet of Things (IoT)
Artificial Intelligence (AI)
Soft Computing
Genetic Algorithms
Fuzzy Logic
Energy-Efficient Routing Protocols
| Gender | MALE |
|---|---|
| Place of Work | Technical Engineering College/ Kirkuk |
| Department | Electronics and Control Engineering Techniques |
| Position | Head of the Technological Incubators and Ecosystem Unit |
| Qualification | Master's Degree |
| Speciality | Electrical and Electronics engineering |
| ali.adnan@ntu.edu.iq | |
| Phone | 07706117960 |
| Address | Kirkuk al-ihtifalat, Al-ihtifalat, Kirkuk, Iraq |
Ali Adnan Wahbi serves as head of the Technology incubator and ecosystem unit in the Technical engineering college of Kirkuk, and an assistant Lecturer in the Electronics and control Department. His research interests include IoT and AI technologies, Routing Protocols, Genetic Algorithms, Fuzzy Logic, Wireless Sensor Networks (WSNs), and Image Processing.
Languages
Arabic (100%)
English (85%)
Turkish (95%)
Skills
MATLAB & Simulink (Modeling, simulations) (80%)
IoT & Embedded Systems (80%)
Academic Qualification
Master's Degree
Feb 15, 2015 - Dec 27, 2017M.Sc. in Electrical and Electronics Engineering
Bachelor's Degree
Sep 1, 2009 - Sep 1, 2013B.Sc. in Electrical Engineering
Working Experience
Electronics, Electronic Circuits, Digital Electronics, Electric Circuits [مدرس مساعد]
Sep 15, 2019 - Presentقمت بالتدريس والاشراف على مشاريع طلبة الدراسات الاولية
Publications
EVALUATING THE DIVERSE EFFECTS OF SIGNATURE ENCRYPTION ON MVS SYSTEM PERFORMANCE
Nov 1, 2025Journal KUFA JOURNAL OF ENGINEERING
DOI https://doi.org/10.30572/2018/KJE/160415
Issue 4
Volume 16
Recently, image content based information retrieval has been widely used in many applications. A Mobile Visual Search (MVS) system involves capturing an image for the object to be searched for, extracting useful features, constructing object signature and searching local and/or remote databases for a match. This paper investigates the diverse effects of signature encryption on the accuracy, search burden and response time of an MVS system. The aim of this research is to provide a comprehensive understandingof the implications of signature encryption to figure out the design trade-offs that facilitate better MVS performance under given operation hypotheses. An MVS system employing different signature encryption algorithms is simulated with different system parameters. The obtained results show that signature encryption generally adds to system processing time from 5.9 μs to about 22.7 μs in test cases 4 and 6. Moreover, it makes the MVS system more sensitive to imaging and communication link imperfections leading to less capability to correctly identify entries and increased search and transmission loads from 1984 to 8075 requests to access the main database for test cases 3 and 9. These effects depend on the features of the specific encryption algorithm. Therefore, a trade-off between system performance and required security level should be considered to achieve a target performance suitable for the intended application.
A New Approach in Energy Consumption Based on Genetic Algorithm and Fuzzy Logic for WSN
Jul 8, 0020Journal Lecture Notes in Electrical Engineering
publisher Springer Nature
DOI https://doi.org/10.1007/978-981-15-5281-6_72
Volume 666
Although the sensor node is tiny, it covers large areas by connecting these nodes together wirelessly, it called wireless sensor network (WSN). WSNs are one of the common things that still evolving very fast nowadays. Routing protocols challenge the energy consumption of wireless sensor networks. In this paper, we proposed a new Fuzzy Logic and Genetic Algorithm based protocol (FL-GA) for WSNs, as follows, we used the fuzzy logic Mamdani method for finding the best cluster heads. We used two inputs for fuzzy, energy and distance, we used the Genetic Algorithm for optimization. Taking into account variable parameters, the choice of cluster heads will be more efficient and the cluster forming will be more accurate, all the nodes will almost die at the same time. One of the classic routing protocols is the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. We compared our protocol to the LEACH protocol. Our network nods, still alive much more than the LEACH protocol nodes. The proposed method is more efficient in extending the network lifetime and maximizing the total number of data packets received in the sink.
