Profile Image
Assistant Lecturer

Ali Adnan Wahbi Alwafi

Research Interests

Wireless Sensor Networks (WSN)

Internet of Things (IoT)

Artificial Intelligence (AI)

Soft Computing

Genetic Algorithms

Fuzzy Logic

Energy-Efficient Routing Protocols

Gender MALE
Place of Work Technical Engineering College/ Kirkuk
Department Electronics and Control Engineering Techniques
Position Head of the Technological Incubators and Ecosystem Unit
Qualification Master's Degree
Speciality Electrical and Electronics engineering
Email ali.adnan@ntu.edu.iq
Phone 07706117960
Address Kirkuk al-ihtifalat, Al-ihtifalat, Kirkuk, Iraq
Bio

Ali Adnan Wahbi serves as head of the Technology incubator and ecosystem unit in the Technical engineering college of Kirkuk, and an assistant Lecturer in the Electronics and control Department. His research interests include IoT and AI technologies, Routing Protocols, Genetic Algorithms, Fuzzy Logic, Wireless Sensor Networks (WSNs), and Image Processing.

Languages

Arabic (100%)
English (85%)
Turkish (95%)

Skills

MATLAB & Simulink (Modeling, simulations) (80%)
IoT & Embedded Systems (80%)
working experience

Academic Qualification

Master's Degree
Feb 15, 2015 - Dec 27, 2017

M.Sc. in Electrical and Electronics Engineering

Bachelor's Degree
Sep 1, 2009 - Sep 1, 2013

B.Sc. in Electrical Engineering

Working Experience

Electronics, Electronic Circuits, Digital Electronics, Electric Circuits [مدرس مساعد]
Sep 15, 2019 - Present

قمت بالتدريس والاشراف على مشاريع طلبة الدراسات الاولية

Publications

EVALUATING THE DIVERSE EFFECTS OF SIGNATURE ENCRYPTION ON MVS SYSTEM PERFORMANCE
Nov 1, 2025

Journal KUFA JOURNAL OF ENGINEERING

DOI https://doi.org/10.30572/2018/KJE/160415

Issue 4

Volume 16

Recently, image content based information retrieval has been widely used in many applications. A Mobile Visual Search (MVS) system involves capturing an image for the object to be searched for, extracting useful features, constructing object signature and searching local and/or remote databases for a match. This paper investigates the diverse effects of signature encryption on the accuracy, search burden and response time of an MVS system. The aim of this research is to provide a comprehensive understandingof the implications of signature encryption to figure out the design trade-offs that facilitate better MVS performance under given operation hypotheses. An MVS system employing different signature encryption algorithms is simulated with different system parameters. The obtained results show that signature encryption generally adds to system processing time from 5.9 μs to about 22.7 μs in test cases 4 and 6. Moreover, it makes the MVS system more sensitive to imaging and communication link imperfections leading to less capability to correctly identify entries and increased search and transmission loads from 1984 to 8075 requests to access the main database for test cases 3 and 9. These effects depend on the features of the specific encryption algorithm. Therefore, a trade-off between system performance and required security level should be considered to achieve a target performance suitable for the intended application.

Read Publication

A New Approach in Energy Consumption Based on Genetic Algorithm and Fuzzy Logic for WSN
Jul 8, 0020

Journal Lecture Notes in Electrical Engineering

publisher Springer Nature

DOI https://doi.org/10.1007/978-981-15-5281-6_72

Volume 666

Although the sensor node is tiny, it covers large areas by connecting these nodes together wirelessly, it called wireless sensor network (WSN). WSNs are one of the common things that still evolving very fast nowadays. Routing protocols challenge the energy consumption of wireless sensor networks. In this paper, we proposed a new Fuzzy Logic and Genetic Algorithm based protocol (FL-GA) for WSNs, as follows, we used the fuzzy logic Mamdani method for finding the best cluster heads. We used two inputs for fuzzy, energy and distance, we used the Genetic Algorithm for optimization. Taking into account variable parameters, the choice of cluster heads will be more efficient and the cluster forming will be more accurate, all the nodes will almost die at the same time. One of the classic routing protocols is the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. We compared our protocol to the LEACH protocol. Our network nods, still alive much more than the LEACH protocol nodes. The proposed method is more efficient in extending the network lifetime and maximizing the total number of data packets received in the sink.

Read Publication