Libyan Journal of Informatics http://uot.edu.ly/journals/index.php/LJI <p style="direction: ltr;"><strong>The Libyan Journal of Informatics</strong></p> <p style="direction: ltr;">Is a refereed, biannual, open-accessed scientific journal published by the faculty of information technology at university of Tripoli. The journal publishes original research and studies in the field of Information Science and Technology, and provides rich and diverse content that meets the needs of researchers, academics, and those interested in the field of informatics.</p> <p style="direction: ltr;">The Libyan Journal of Informatics aims to be a rich source of digital knowledge and aims to contribute to the development of the field of Information and Communication Technology by publishing distinguished scientific research and studies. Also, it provides free online access to its content.</p> Faculty of information technology at university of Tripoli, Libya en-US Libyan Journal of Informatics Autonomous Search and Rescue Drone http://uot.edu.ly/journals/index.php/LJI/article/view/992 <p>One innovative initiative that shows how technology and creativity can save lives in dire circumstances is the creation of a smart autonomous drone system for search and rescue operations in Libya. The autonomous search and rescue drone is a ray of hope that is intended to transform rescue operations by offering a quick and effective way to find persons who are in trouble or who may have been lost in Libya's desert or Mediterranean Sea. A Raspberry Pi, a Pixhawk flying controller, the Internet of Things, and a specially created mobile application are the main parts of the study. With the help of the YOLOv4-tiny module and object detection algorithms, the system enables users to operate the drone and quickly and accurately identify those who go missing in challenging environments. By fusing technological innovation with a humanitarian goal, this paper paves the way for future search and rescue operations in Libya and other nations to be safer and more responsive. The work shows how technology can save lives in dire circumstances and serves as an example of how it can benefit humanity at its most vulnerable times.</p> Zahra Elashaal Yousef Lamin Mohaned Elfandi Adel Eluheshi Copyright (c) 2024 Libyan Journal of Informatics 2024-06-30 2024-06-30 1 01 1 17 Comparative Analysis of DMVPN Phase 3 Performance Across Dynamic Routing Protocols http://uot.edu.ly/journals/index.php/LJI/article/view/1107 <p>Dynamic Multipoint Virtual Private Network (DMVPN) by Cisco, was developed to overcome the limitations of traditional VPNs by improving their scalability, which had been a drawback. DMVPN achieves this by utilizing technologies like Multipoint Generic Routing Encapsulation (mGRE), Next Hop Resolution Protocol (NHRP), and various routing protocols. Additionally, the inclusion of IPsec is mandatory to ensure robust security measures.<br />In our research challenge, we sought to implement DMVPN Phase Three within a network configuration comprising one hub, two spokes, and three LANs. To execute this, we employed the GNS3 emulator, facilitating the deployment of different routing protocols such as RIPv2, EIGRP, OSPF, and BGP. The objective of this implementation was to assess and make comparisons based on performance metrics including latency, jitter, TCP/UDP throughput, and round-trip time (RTT). This comprehensive evaluation helps in determining which routing protocol best suits the specific network's needs and goals, shedding light on their respective advantages and limitations within the DMVPN framework.</p> Buthaina Mohamed Rafe Alasem Mahmud Mansour Najia Ben Saud Copyright (c) 2024 Libyan Journal of Informatics 2024-06-30 2024-06-30 1 01 18 36 Modified Versions of Menezes-Vanstone Elliptic Curve Cryptography http://uot.edu.ly/journals/index.php/LJI/article/view/1106 <div class="page" title="Page 1"> <div class="layoutArea"> <div class="column"> <p>Encryption came about as a result of the need for information security. Encryption serves the purpose of secure data storage. It needs to be transmitted, encrypted, then decrypted. Encryption is the process of transforming plain text into cipher text; decryption is the process of obtaining the original message from the cipher text. The key used for both encryption and decryption plays a major role in determining the strength of a cryptosystem. It is the key's size that complicates brute-force attacks. But this also means that the algorithm becomes more sophisticated and demands more computing power. For encryption systems based on elliptic curves, we can employ smaller key sizes to ensure a comparable level of security and improved performance.</p> <p>This paper compares two modified versions of the Menezes-Vanstone elliptic curve cryptography with the original MVECC algorithm, applying them to different file sizes. Then the time complexity and execution time of the suggested algorithms against MVECC was calculated. The outcomes demonstrated that the suggested algorithms outperformed the original MVECC.</p> </div> </div> </div> Mahmoud Hasan Ibrahim Almerhag Copyright (c) 2024 Libyan Journal of Informatics 2024-06-30 2024-06-30 1 01 37 51