Dr. Mohammed Khodayer hassan Al-Dulaimi

@ruc.edu.iq

Computer Science Department
AL -Rafidain University College

I am Assist. Prof. Dr. Mohammed Khodayer Hassan, I've been working as a full-time instructor at AL Rafidain University College. According to my background knowledge. I‘ve been teaching different subjects in the computer science department and engineering departments. Mainly my interesting subjects are related to information security systems and data processing, management in telecommunication in addition to system integration in the electrical engineering field. I've supervised many graduate students in their diploma program and master's program. I still have two graduate students working on their master's degrees in the security and protection of information.
I have participated in the final committee sessions for the examination of graduate students. (diploma, Master, and . I've published many research papers at international conferences (around 14 papers). Finally, I've participated
in the assessment of graduate students' research papers to be qualified for promotion.

EDUCATION

- B.Sc. Eng. 1976, Electrical Engineering Department, University of Technology, Baghdad, Iraq.
- M.Sc. Computer Science,1984, MacMaster University, Ontario, Canada.
- Ph.D. Computer Science,2007, Informatics Institute for Postgraduate Study, Iraqi Commission for Computer and
Informatics, Ministry of Higher Education and Scientific Research, Baghdad, Iraq.

RESEARCH INTERESTS

1- Information security trends including :-
A- Watermarking technique
B- Steganography
C- Ciphering technique
2- Internet of things (I.O.T )- research
3- New trends in Tecommunication technique 4G -5G

FUTURE PROJECTS

- Information hiding by using steganography for protection.


Applications Invited

1- Design control card for protection services


Applications Invited

2- The study of different D.C motors in Real Application.


Applications Invited
17

Scopus Publications

56

Scholar Citations

4

Scholar h-index

2

Scholar i10-index

Scopus Publications


  • Strategy for Non-Orthogonal Multiple Access and Performance in 5G and 6G Networks
    Omer Mohammed Khodayer Al-Dulaimi, Aymen Mohammed Khodayer Al-Dulaimi, Maiduc Osiceanu Alexandra, and Mohammed Khodayer Hassan Al-Dulaimi

    MDPI AG
    The purpose of this paper is to provide a high-level overview of the most important non-orthogonal multiple access (NOMA) protocols in 5G and 6G networks that incorporate code division within the context of 3GPP standardization. The article’s objective is also to look into and compare the various strategies that have been proposed as a solution to the issue of resource distribution to achieve high performance. Many different NOMA plans for 5G and 6G systems have been suggested by a multitude of businesses. NOMA is currently developing in two primary directions: one of them is with power division, and the other is with code division. During the process of standardization carried out by the 3GPP, the attention of the developers was concentrated in the second direction for the application of NOMA schemes in 5G and 6G systems. Hardware communication, also known as D2D communication, performs a significant role in the process of communication between devices. This will increase the efficiency with which network resources are utilized. Devices are now able to interact directly with one another, avoiding the need for transmission nodes. It also serves as one of the approaches to the problem of limited network coverage, which can be improved by utilizing D2D, and as a result fees and energy can be reduced. Increasing the size of the network is one way to achieve this goal, the explained of NOMA technology as well as its primary benefits in wireless technology. The most common variants of code division NOMA and the characteristics of those variants are discussed, as well as the opportunities and challenges associated with implementing those variants. NOMA protocols allow continuous expansion of wireless communication networks, i.e., 5G and 6G, which leads to enhanced performance of the networks.

  • Deep Learning for Wireless Network Distribution (5G/LTE)
    Mohammed Khodayer Hassan Al-Dulaimi, Omer Mohammed Khodayer Al-Dulaimi, Aymen Mohammed Khodayer Al-Dulaimi, Maiduc Osiceanu Alexandra, and Nidal Jihad

    IEEE
    As a result of using machine learning and deep learning in the network, we were able to more efficiently manage the allocation of network resources and the availability of the network overall. Key performance indicators are used to analyze incoming traffic and make predictions to allocate network resources to unknown devices. High load balancing and efficient use of available resources on current network portions are made possible with intelligent resource allocation. The underlying model is smart enough to determine which piece of the network is most suited for the challenge at present. 5G mobile networks, mobile communications, and the latency of modern and future wireless networks are affected by strict regulations about how long it takes for data transmission to reach its destination, dependability, how much data can be transmitted without a problem, capacity, how much data can be transmitted securely, and speed of user connection. Mobile providers are always looking for new ways to make it possible for multiple, autonomous users to share a single network. Slicing is a method that uses network fragmentation to share the same physical infrastructure among multiple networks that have competing needs. Future communication networks will need to make decisions based on data in order to keep up with the exponential rise in traffic.

  • Fruit Fly Optimization with Hybrid Deep Learning Based Sentiment Analysis During COVID-19 Pandemic
    Mohammed Khodayer Hassan Al Dulaimi, Ali S. Abosinnee, Ahmed Alkhayyat, Ghazi Mohamad Ramadan, Zamen Latef Naser, and Zain Jaffer

    IEEE
    A new COVID-19 or coronavirus disease becomes a current pandemic with huge global attention. But, increasing false news on social media platforms such as Twitter has generated redundant anxiety nearby this disease. During the COVID-19 pandemic, decision-makers worldwide formed a count of crucial decisions concentrated on public view for combat coronavirus. This paper proposes a Fruit fly Optimization Algorithm with a Hybrid Deep Learning Based Sentiment Analysis (FFOA-HDLSA) during the COVID-19 Pandemic. The presented FFOA-HDLSA technique makes use of Twitter data for the identification and classification of sentiments. To accomplish this, the presented FFOA-HDLSA method follows different pre-process stages of transforming the actual input data into pre-processed data. This study exploits the HDL model (LSTM, GRU, BiLSTM, CNN, and BiGRU) for sentiment analysis and classification. To effectively modify the hyperparameters related to the HDL technique, the FFOA was employed in this paper. For exhibiting the improved performance of the FFOA-HDLSA model, a wide range set of simulations are carried out on the emotion dataset with 2000 samples. The comparison study reported the improved performance of the FFOA-HDLSA model over the existing techniques with a maximum average accuracy of 94.04% and minimum computation time of 4.36s.

  • Hybrid Deep Learning Enabled Load Prediction for Energy Storage Systems
    Ghazi Mohamad Ramadan, Ali S. Abosinnee, Mohammed Khodayer Hassan Al Dulaimi, Zain Jaffer, Ahmed Alkhayyat, and Zamen Latef Naser

    IEEE
    Recent economic growth and development have considerably raised energy consumption over the globe. Electric load prediction approaches become essential for effective planning, decision-making, and contract evaluation of the power systems. In order to achieve effective forecasting outcomes with minimum computation time, this study develops an improved whale optimization with deep learning enabled load prediction (IWO-DLELP) scheme for energy storage systems (ESS) in smart grid platform. The major intention of the IWO-DLELP technique is to effectually forecast the electric load in SG environment for designing proficient ESS. The proposed IWO-DLELP model initially undergoes preprocessing in two stages namely min-max normalization and feature selection. Besides, partition clustering approach is applied for the decomposition of data into distinct clusters with respect to distance and objective functions. Moreover, IWO with bidirectional gated recurrent unit (BiGRU) model is applied for the prediction of load and the hyperparameters are tuned by the use of IWO algorithm. The experiment analysis reported the enhanced results of the IWO-DLELP model over the recent methods interms of distinct evaluation measures.

  • Cognitive Radio Network Technology for IoT-Enabled Devices †
    O. Al-Dulaimi, M. Al-Dulaimi, A. Al-Dulaimi and Maiduc Osiceanu Alexandra



  • IMPLEMENTATION OF BAYESIAN APPROACHES IN 5G/6G FOR CELLULAR COMMUNICATION USING MULTIPLE TIME SERIES MODELS


  • Cognitive Radio Technologies and Applications in Dynamic Spectrum Access Method
    Omer Mohammed Khodayer Al-Dulaimi, Mohammed Khodayer Hassan Al-Dulaimi, and Aymen Mohammed Khodayer Al-Dulaimi

    IEEE
    increasingly internets of things applications have emerged in recent years, arranging additional strain on networks. In order to be remotely accessed the internet of things links and controls heterogeneous devices wirelessly. The majority of the devices use licensed wireless spectrum bands. Spectrum insufficiency will soon be a concern, as there will be also much interference between users, resulting in an insufficiency of bandwidth for all of them. It is imperative that the spectrum utilized correctly and efficiently in order to allow the widespread deployment of internet of things systems. Because of this, a new form of radio technology known as Cognitive Radio has emerged. Dynamic Spectrum Utilization techniques such as Cognitive Radio employ the transceiver's intelligence to determine which channels are now in use and which are not currently in service. This way making optimum usage of currently available spectrum while reducing interference between users to a minimum, Cognitive Radio architecture and functions, obstacles in each function of the Cognitive Radio environment, and concerns in Cognitive Radio discussed in detail in this research.

  • Security Measures of Protection for Banking Systems
    Mohammed Khodayer Hassan Al-Dulaimi, Aymen Mohammed Khodayer Al-Dulaimi, and Omer Mohammed Khodayer Al-Dulaimi

    IEEE
    its common Security breaches and other threats can harm a bank’s brand and bottom line. Therefore, banks and other financial institutions must implement sufficient security controls and Information security governance frameworks (ISGF) to guarantee that only authorized individuals can access sensitive data. This study analyzes the risks associated with the banking industry's reliance on information security systems. There is a proposal for a framework to control information security (ISGF). The International Organization for Standardization (ISO) 27002 is one example of a widely adopted framework for controlling data privacy and integrity. Many information security frameworks, including ISSA, FFIEC, PCI-DSS, COBIT, and others, have explained in detail. Each of the three tiers of the information security governance framework (ISG)—strategic, tactical, and technical—are subdivided into sublevels table In this, All detailed descriptions of each part of the proposed ISG is mentioned in the table. This structure is going to be use by the banking industry. In addition to the different types of ISG, all types of breaches that threats the security of the financial institutes are explained in brief form. This document details the roles and responsibilities of each ISG member and how they contribute to the overall effectiveness of the ISGF. All possible invasions have avoided with the help of the suggested measures. Gaining strong Information security governance framework was one of the recommendations provided in this study for improving the actual banking system's environment and handling the security problems.

  • Design and Development of Free-Space Optical Transmission Systems and Applications
    Aymen Mohammed Khodayer Al-Dulaimi, Omer Mohammed Khodayer Al-Dulaimi, Mohammed Khodayer Hassan Al-Dulaimi, and Maiduc Osiceanu Alexandra

    IEEE
    In recent years have seen several significant advances in technology, particularly in the field of wireless communication, and demand has been growing at an exponential rate. This has led to problems including interference, lack of suitable space, and bandwidth restrictions. Conventionally, radio waves have been utilized to interact with one another; as a result of this channel's inherent inefficiency. There is an increasing requirement to search for other technologies. As a result, contact through the use of light is an extremely compelling vision of wireless communication that will solve the majority of channel ambiguity. The most up-to-date method of contact is known as LiFi (Light Fidelity). The Visible Light Communication system solved the issues of illumination as well as communication issues concurrently. Within the scope of this article, a Visible Light Communication system idea was conceived and put into action.

  • Performing Strategic Spectrum Sensing Study for the Cognitive Radio Networks
    Omer Mohammed Khodayer Al-Dulaimi, Mohammed Khodayer Hassan Al-Dulaimi, Maiduc Osiceanu Alexandra, and Aymen Mohammed Khodayer Al-Dulaimi

    IEEE
    In order to address the spectrum scarcity issues that affect today's wireless services, the concept of cognitive radio has been proposed. A licensed spectrum is made available to smart and adaptable secondary users through this framework. Because of cognitive radio technology, these unlicensed secondary users can take advantage of any spectrum utilization opportunity by dynamically adjusting their broadcast characteristics. In this study, we explore the defining aspects and primary capabilities of cognitive radio focused technology. As well as Spectrum sensing has been considered a key enabling technology for cognitive radio based wireless networks of the future. In this paper, we evaluate and contrast a variety of technologies in terms of their sensing sensitivity, the complexity of implementation, and computational demands. Several problems with spectrum sensing have been studied, and several opinions have been presented.

  • RESOURCE BLOCKS FOR REAL -TIME AND DATA ELASTIC TRAFFIC IN IMS/LTE NETWORKS ARE DEVELOPED AND STUDIED


  • Implementing 3GPP Code Division for Non-Orthogonal Multiple Access in 5G
    Aymen Mohammed Khodayer Al-Dulaimi, Omer Mohammed Khodayer Al-Dulaimi, and Mohammed Khodayer Hassan Al-Dulaimi

    IEEE
    Device-to-device communications are currently very important in the field of communication. The reason for this is that it maximizes the efficiency with which network resources are used. Using his setup, devices can talk to one another without going via any intermediary nodes. D2D can also help alleviate the issue of insufficient network coverage, cutting down on expenses and power consumption. The expansion of the network is the key to achieving this goal. This article's goal is to compare and contrast the many solutions proposed for one of the three major challenges in D2D communication: the resource allocation problem D2D detection, connection mode selection and resource allocation). The eNodeB in the network's center facilitates a controlled mode of operation, although an autonomous mode is also available. Both methods are completely hands-free. Within the context of 3GPP standardization, the technology of Non-Orthogonal Multiple Access is investigated. The proliferation of IoT and the potential for massive subscriber device connection to new wireless networks, many times bigger than the scale of connection in existing networks, necessitate the introduction of new technologies for non-orthogonal multiple access (connection of billions of new devices). NOMA's future growth will mostly occur in two different ways: one is with power division and the other is with code division. Developer firms' focus during 3GPP standardization was on the second direction; nonetheless, some issues have been detected with the application of NOMA in 5G and 6G systems, necessitating further study. Data traffic in 6G networks is expected to be hundreds of times higher than in 5G networks, necessitating the introduction of innovative multiple access technologies to meet stringent demands for energy efficiency and communication availability. This article provides a high-level introduction to 3GPP-recommended non-orthogonal multiple access (NOMA) utilizing code division methods. Numerous NOMA schemes have been proposed by various companies for 5G and 6G networks. In this short example, the range and primary benefits of NOMA technology are highlighted. Popular types of NOMA code division are discussed, along with their characteristics, future potential and existing issues.

  • Analysis of Low Power Wireless Technologies used in the Internet of Things (IoT)
    Omer Mohammed Khodayer Al-Dulaimi, Mohammed Khodayer Hassan Al-Dulaimi, and Aymen Mohammed Khodayer Al-Dulaimi

    IEEE
    The Internet of Things (IoT) is a novel paradigm that enables the development of a slew of Services for the future of technology advancements. When it comes to IoT applications, the cyber and physical worlds can be seamlessly integrated, but they are essentially limitless. However, despite the great efforts of standardization bodies, coalitions, companies, researchers, and others, there are still a slew of issues to overcome in order to fully realize the IoT's promise. These concerns should be examined from a variety of perspectives, including enabling technology, applications, business models, and social and environmental consequences. The focus of this paper is on open concerns and challenges from a technological standpoint. We will study the differences in technical such Sigfox, NB-IoT, LoRa, and 6LowPAN, and discuss their advantages and disadvantage for each technology compared with other technologies. Demonstrate that each technology has a position in the internet of things market. Each technology has different advantages and disadvantages it depends on the quality of services, latency, and battery life as a mention. The first will be analysis IoT technologies. SigFox technology offers a long-range, low-power, low-throughput communications network that is remarkably resistant to environmental interference, enabling information to be used efficiently in a wide variety of applications. We analyze how NB-IoT technology will benefit higher-value-added services markets for IoT devices that are willing to pay for exceptionally low latency and high service quality. The LoRa technology will be used as a low-cost device, as it has a very long-range (high coverage).

  • Analysis for Modulation and Coding Scheme with Data Rate Traffic Over IEEE 802.11AC and 802.11N in Wireless Multimedia
    Aymen Mohammed Khodayer Al-Dulaimi and Mohammed Khodayer Hassan Al-Dulaimi

    Research Institute for Intelligent Computer Systems
    This paper discusses wireless traffic consisting of various types of data packets. Regardless of the type of data being sent and received, the transmission can suffer from latency problems. The wireless multimedia standard enables the service provider to prioritize voice, video, best-effort, and background data by adding differentiated services code point value to the internet protocol header. This effectively allows network users to benefit from optimal network performance while using various applications with different latency and throughput requirements. In this paper, we conducted a study of five use-cases over two common wireless standards, IEEE 802.11n and IEEE 802.11ac. The study was carried out by prioritizing, respectively, voice, video data packets, with lowest priority assigned to best-effort data packets. The best-effort traffic can have more bandwidth than the voice or video. Under each use case, we evaluated the impact of additional network load on video streaming.

  • Comparative Analysis of the Resource Blocks Allocation Balancing Model in the LTE Downlink Using RAT 1 with Existing Solutions
    Oleksandr Lemeshko, Oleksandra Yeremenko, Tetiana Kovalenko, Aymen M.K. Al-Dulaimi, and Mohammed K.H. Al-Dulaimi

    IEEE
    Comparative analysis of the balancing model of resource blocks allocation in the LTE downlink using RAT 1 with existing algorithms is done. The proposed model allow to considerably decrease the computational complexity of finding final solutions on resource block allocation among user equipments in the LTE network due to linear nature of the obtained optimization problem of mixed integer programming. Comparative analysis has shown the effectiveness of the balancing model, especially in a complex signal-to-noise conditions, the presence of heterogeneous requirements for the type and level of the service quality. It is shown that the proposed time-frequency resource management model has provided the highest efficiency under conditions of QoS requirements of user requests, comparable to or exceeding the bandwidth of the LTE downlink.

  • Realization of resource blocks allocation in LTE downlink in the form of nonlinear optimization
    Avmen Al-Dulaimi, Mohammed Al-Dulaimi, and Dmvtro Asevev

    IEEE
    In this paper proposed realization of resource blocks allocation in LTE downlink in the form of nonlinear optimization. In using improved model it is possible to avoid the control variables Boolean nature, which has a positive impact on the computational complexity of final technological solutions for resource allocation. Problem of RAT 1 was reduced to the problem solution of nonlinear optimization. In solving this problem minimized both the number of resource blocks used, and downlink bandwidth.

RECENT SCHOLAR PUBLICATIONS

  • Aspects of artificial intelligent applications in cyber security to decrease threats and restrict cyber attacks for smart grids
    M Al-Dulaimi, A Al-Dulaimi, O Al-Dulaimi, M Alexandra
    AIP Conference Proceedings 3063 (1) 2024

  • Deep Learning for Wireless Network Distribution (5G/LTE)
    MKH Al-Dulaimi, OMK Al-Dulaimi, AMK Al-Dulaimi, MO Alexandra, ...
    2023 4th International Conference on Communications, Information, Electronic 2023

  • Cognitive Radio Network Technology for IoT-Enabled Devices
    O Al-Dulaimi, M Al-Dulaimi, A Al-Dulaimi, MO Alexandra
    Engineering Proceedings 41 (1), 7 2023

  • Strategy for non-orthogonal multiple access and performance in 5G and 6G networks
    OMK Al-Dulaimi, AMK Al-Dulaimi, MO Alexandra, MKH Al-Dulaimi
    Sensors 23 (3), 1705 2023

  • THE FOREIGN POLICY OF THE GOVERNOR OF SIJISTAN, PRINCE KHALAF BIN AHMAD AL-SIJISTANI (350_399 AH/961_1003 AD)
    AMTS Al-Dulaimi, MNKH Abd Al
    Russian Law Journal 11 (12S), 267-277 2023

  • Design and Development of Free-Space Optical Transmission Systems and Applications
    AMK Al-Dulaimi, OMK Al-Dulaimi, MKH Al-Dulaimi, MO Alexandra
    2022 International Conference on Communications, Information, Electronic and 2022

  • Performing Strategic Spectrum Sensing Study for the Cognitive Radio Networks
    OMK Al-Dulaimi, MKH Al-Dulaimi, MO Alexandra, AMK Al-Dulaimi
    2022 International Conference on Communications, Information, Electronic and 2022

  • Implementing 3GPP Code Division for Non-Orthogonal Multiple Access in 5G
    AMK Al-Dulaimi, OMK Al-Dulaimi, MKH Al-Dulaimi
    2022 International Symposium on Multidisciplinary Studies and Innovative 2022

  • Cognitive Radio Technologies and Applications in Dynamic Spectrum Access Method
    OMK Al-Dulaimi, MKH Al-Dulaimi, AMK Al-Dulaimi
    2022 IEEE 9th International Conference on Problems of Infocommunications 2022

  • Security Measures of Protection for Banking Systems
    MKH Al-Dulaimi, AMK Al-Dulaimi, OMK Al-Dulaimi
    2022 IEEE 9th International Conference on Problems of Infocommunications 2022

  • Analysis of low power wireless technologies used in the Internet of Things (IoT)
    OMK Al-Dulaimi, MKH Al-Dulaimi, AMK Al-Dulaimi
    2022 2nd International Conference on Computing and Machine Intelligence 2022

  • Construction and Analysis of Dynamic Distribution for Resource Blocks of Real-Time and Data Elastic Traffic in IMS/LTE networks
    AMK Al-Dulaimi, MKH Al-Dulaimi, OMK Al-Dulaimi
    2021 International Congress of Advanced Technology and Engineering (ICOTEN), 1-7 2021

  • Analysis for modulation and coding scheme with data rate traffic over IEEE 802.11 AC and 802.11 N in wireless multimedia
    AMK Al-Dulaimi, MKH Al-Dulaimi
    International Journal of Computing 20 (1), 109-118 2021

  • Исследование метода распределения частотно-временного ресурса нисходящего канала LTE при использовании RAT 1
    AMK Al-Dulaimi, SV Harkusha, MKH Al-Dulaimi
    Проблеми телекомунікацій, 75-92 2018

  • Comparative analysis of the resource blocks allocation balancing model in the LTE downlink using RAT 1 with existing solutions
    O Lemeshko, O Yeremenko, T Kovalenko, AMK Al-Dulaimi, ...
    2018 International Scientific-Practical Conference Problems of 2018

  • Realization of resource blocks allocation in LTE downlink in the form of nonlinear optimization
    A Al-Dulaimi, M Al-Dulaimi, D Asevev
    2016 13th International conference on modern problems of radio engineering 2016

  • Bandwidth management model in LTE downlink with Resource Allocation Type 1
    MKH Al-Dulaimi, AMK Al-Dulaimi, OS Yeremenko, HD Al-Janabi
    Системи обробки інформації, 111-116 2015

  • Formalizing of web-services specifications using temporal logics
    MKH Al-Dulaimi, AMK Al-Dulaimi
    ScienceRise 3 (2 (8)), 25-31 2015

  • Colitec Virtual Observatory Platform for the Cloud Computing Analysis of Light Curves for the Variable Stars
    S Gnatyuk, T Okhrimenko, S Dorozhynskyi, R Brzhanov, OMK Al-Dulaimi, ...


  • Alhazmi, Shrooq 764 Ali Khan Khattak, Muazzam 575 Ali, Channa Babar 493, 498, 503, 511, 518, 527, 551 Ali, Nur Syafina 664 Alkali, Abdulkadir Hamidu 238
    S Al Abd, A Al-Ashmori, T Al-Bahr, A Al-Bdairi, AMK Al-Dulaimi, ...


MOST CITED SCHOLAR PUBLICATIONS

  • Realization of resource blocks allocation in LTE downlink in the form of nonlinear optimization
    A Al-Dulaimi, M Al-Dulaimi, D Asevev
    2016 13th International conference on modern problems of radio engineering 2016
    Citations: 17

  • Bandwidth management model in LTE downlink with Resource Allocation Type 1
    MKH Al-Dulaimi, AMK Al-Dulaimi, OS Yeremenko, HD Al-Janabi
    Системи обробки інформації, 111-116 2015
    Citations: 11

  • Strategy for non-orthogonal multiple access and performance in 5G and 6G networks
    OMK Al-Dulaimi, AMK Al-Dulaimi, MO Alexandra, MKH Al-Dulaimi
    Sensors 23 (3), 1705 2023
    Citations: 7

  • Comparative analysis of the resource blocks allocation balancing model in the LTE downlink using RAT 1 with existing solutions
    O Lemeshko, O Yeremenko, T Kovalenko, AMK Al-Dulaimi, ...
    2018 International Scientific-Practical Conference Problems of 2018
    Citations: 5

  • Construction and Analysis of Dynamic Distribution for Resource Blocks of Real-Time and Data Elastic Traffic in IMS/LTE networks
    AMK Al-Dulaimi, MKH Al-Dulaimi, OMK Al-Dulaimi
    2021 International Congress of Advanced Technology and Engineering (ICOTEN), 1-7 2021
    Citations: 4

  • Analysis for modulation and coding scheme with data rate traffic over IEEE 802.11 AC and 802.11 N in wireless multimedia
    AMK Al-Dulaimi, MKH Al-Dulaimi
    International Journal of Computing 20 (1), 109-118 2021
    Citations: 3

  • Performing Strategic Spectrum Sensing Study for the Cognitive Radio Networks
    OMK Al-Dulaimi, MKH Al-Dulaimi, MO Alexandra, AMK Al-Dulaimi
    2022 International Conference on Communications, Information, Electronic and 2022
    Citations: 2

  • Analysis of low power wireless technologies used in the Internet of Things (IoT)
    OMK Al-Dulaimi, MKH Al-Dulaimi, AMK Al-Dulaimi
    2022 2nd International Conference on Computing and Machine Intelligence 2022
    Citations: 2

  • Исследование метода распределения частотно-временного ресурса нисходящего канала LTE при использовании RAT 1
    AMK Al-Dulaimi, SV Harkusha, MKH Al-Dulaimi
    Проблеми телекомунікацій, 75-92 2018
    Citations: 2

  • Cognitive Radio Network Technology for IoT-Enabled Devices
    O Al-Dulaimi, M Al-Dulaimi, A Al-Dulaimi, MO Alexandra
    Engineering Proceedings 41 (1), 7 2023
    Citations: 1

  • Design and Development of Free-Space Optical Transmission Systems and Applications
    AMK Al-Dulaimi, OMK Al-Dulaimi, MKH Al-Dulaimi, MO Alexandra
    2022 International Conference on Communications, Information, Electronic and 2022
    Citations: 1

  • Formalizing of web-services specifications using temporal logics
    MKH Al-Dulaimi, AMK Al-Dulaimi
    ScienceRise 3 (2 (8)), 25-31 2015
    Citations: 1