
Assistant Professor
FHamode@su.edu.om Phone: +968 26850100 Extn: 256 Location: Rustaq Building - Block F2-08- Ph.D .Computing in Artificial Intelligence/ Neural Network and Spiking Neural Network, University Technology Malaysia (UTM), 2013.
- M.Sc. Computer Science/ Artificial Intelligence/ Neural Network and BackPropagation, University Technology Malaysia (UTM), 2009.
- B.Sc. Computer Science, University Of Mosul -Iraq, 2004.
More than 8 years teaching experience in both Post graduate and undergraduate levels.
- Artificial Intelligence & Expert Systems.
- Digital Forensics.
- Logic Design.
- Advanced Computer Architecture.
- Research Methodology.
- Data Structures with C#, C++.
- Database Management System.
- Introduction to Information Technology.
- Introduction to Computer Science & programming.
- E-Commerce.
- Advanced Software Engineering.
- Advanced Research Methodology.
- Advanced Database System.
- Advanced Artificial Intelligence.
- Improve neural network algorithms and classification data.
- Spiking neural network for classification dataset and machine learning.
- Big data analytics.
- GPU-based computing courses.
- Masli, A. A., Ahmed, F. Y., & Mansoor, A. M. (2022). QoS-Aware Scheduling Algorithm Enabling Video Services in LTE Networks. Computers, 11(5), 77.
- Nugraha, D., Ahmed, F. Y. H., Abdullah, M. I., & Johar, M. G. M. (2021, March). Survey of smart parking application deployment. In IOP Conference Series: Materials Science and Engineering (Vol. 1108, No. 1, p. 012019). IOP Publishing.
- Falah Y H Ahmed, Aboghsesa, S. M. A. (2021). Roger 3450 Vs RF4 Martials-Based Frequency And Pattern Reconfigurable Rectangular Patch Slot Antennas For RFID Applications. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(6), 1145-1151.
- Anazida Zainal Mustafa S.T, Mohd Shafry Mohd Rahim , Falah Y H Ahmed , Mohammed Mahdi Hashim(2020). Hiding Financial Data In Bank Card Image Using Contrast Level Value And Text Encryption For Worthiness A Robust Steganography Method. International Journal of Advanced Science and Technology Vol. 29, No.7s, (2020), pp. 2783-2806, Scopus.
- SAMI, A. S., RAHIM, M. S. M., AHMED, F. Y., & SULONG, G. B. (2019). A review study of methods utilized for identifying and segmenting the brain tumor from mr imageries. Journal of Theoretical and Applied Information Technology, 97(11).
- Anazida Zainal Mustafa S.T, Mohd Shafry Mohd Rahim , Falah Y H Ahmed , Mohammed MahdiHashim(2020). Hiding Financial Data In Bank Card Image Using Contrast Level Value And Text Encryption For Worthiness A Robust Steganography Method. International Journal of Advanced Science and Technology Vol. 29, No.7s, (2020), pp. 2783-2806, Scopus.
- Mohammed Suliman Haji, Mohd Shafry Mohd Rahim, Falah Y.H. Ahmed and Ghazali Bin Sulong (2020). A Survey on Digital Image Steganography and Steganalysis. International Journal of Advanced Science and Technology Vol. 29, No.7s, (2020), pp. 2783-2806, Scopus.
- Falah Y.H. Ahmed, Khairul Farisb and Muhammad Irsyad Abdullah (2019).The University, Social Networks Media Sites, and Integration of Students' Most Popular. International journal of innovation, creativity and change (IJICC), Volume 6, Issue 4. ISSN 2201-1323, Scopus.