Digital Repository for Department of Computer

Statistics for Department of Computer

  • Icon missing? Request it here.
  • 1

    Conference paper

  • 4

    Journal Article

  • 0


  • 0


  • 0

    PhD Thesis

  • 0

    Master Thesis

  • 0

    Final Year Project

  • 0

    Technical Report

  • 0

    Unpublished work

  • 0


  • 0


Implementation of Digital Image Compression Using The Comparison Between The Adjacent Pixel On RGB Image With Variant Brightness And Contrast

Information technology has witnessed a great development in the terms of the huge amount of information exchanged, the ways of exchanging this information, and the speed of its exchange. One of the most essential media used to transfer data is the digital image. Image compression plays a very important role in the transfer and storing of image data due to storage limitations. The main goal of image compression is to represent the image with the fewest number of bits without losing the basic information content within the original image. Digital images contain a large amount of digital information that needs efficient technologies to be stored and to transmit a large volume of data. In this study, a method was used to compress digital images, in which the bits of each pixel are compared with the pixels adjacent to it, and the result of the comparison is a new code to represent the bits of the second pixel, and its size is different, either increasing or decreasing, and calculating the image size after performing the compression process. Each pixel was divided into two parts, the right part of it was compared with the right part of the adjacent pixel, while the left part was compared to the left part of the adjacent pixel, therefore, a new code was obtained. This method was applied on a group of images with different content to obtain good results.
Adem.A.Bensaid, Jalal M. Mehalhal, Mohamed Egbisha(5-2022)

Analysis and comparison of data compression Techniques and their application to text files

Due to the rapid development in information technology in terms of information exchange and transmission through different transmission media, and the provision of storage places. when the volume of data is smaller, this means that, it provides better transmission speed. and saves time, which led to the emergence of data compression techniques to reduce its size without compromising the quality of the data. Data compression is still an important topic of research and has many applications and required uses. This paper presents a study of some of the data compression methods: Huffmann and Huffmann shift code, binary shift code algorithm, and the LZW method, analyzing and comparing between them, using a fixed text for all methods. keywords: Data compression, compression techniques, Huffmann, Huffmann shift code, binary shift code , LZW.
Jalal M. Mehalhal, Adem.A.Bensaid, Mohamed Egbisha(8-2021)
View publisher's website

Design of New Secret Key to Increase the Security of LSB Algorithm

Nowadays, information security has become a big challenge for the world due to the rapid growth of Internet users day after day. Unauthorized access to confidential data can have serious implications such as financial loss, etc. One of the best techniques for secure communication is secret writing. Hiding data is very important nowadays as data travels over multiple insecure networks. To avoid this problem, encryption is used that hides data, but in some cases encryption cannot provide full security because the message is still available for encryption analysis. Encryption focuses on making the message unreadable to any unauthorized person who might intercept it. On the other hand, hiding information is a means of hiding the existence of a message to allow secure communication in a completely undetectable manner. Hide information and encryption are two different ways to hide data. In this paper the researcher suggests how to hide the message using the least significant bit algorithm inside an image and encrypt it in a new way, by modifying the DES algorithm, the researcher generated subkeys from the DES algorithm and used them to specify the masking mechanism in the digital image.
Jalal M Mehalhal , Adem.A.Bensaid, Mohammed F. Ighbeeshah(12-2020)
View publisher's website

التوظيــف الأمثــل لتقنيــة المعلـــومات في التعليــم العــالي في ليبيا تحــــديات وحـــــلول

الهدف من هذه الدراسة معرفة أهم التقنيات الحديثة المستخدمة في العملية التعليمية والتي لها الأثر الكبير في تطوير العملية التعليمية ومدى استخدامها, والاطلاع على أهم المقومات والدوافع التي تؤيد فكرة توظيف تقنيات المعلومات في التعليم والتعليم الالكتروني, وأيضاً التعرف على أكبر التحديات التي تعرقل التوظيف الأمثل لتقنيات المعلومات, ومعرفة الأسباب وراء ذلك والبحث عن الحلول لها. نظم إدارة التعلم كنظام البلاك بوردBlack Board على سبيل المثال من شأنه حل جُل مشاكل الجامعة الإدارية والتعليمية والعلمية، خصوصاً مع الزيادة الملحوظة في أعداد الطلبة الراغبين في الانخراط في التعليم الجامعي. حيث تم استخدام المنهج الوصفي التحليلي المتمثل في الاستبانة كأداة للدراسة، باعتبارها أداة لجمع البيانات، حيث تضمنت (60) فقرة، والتي طبقت على (70) من أعضاء هيئة تدريس وطلبة لكليتي التربية قصر بن غشير وتقنية المعلومات بجامعة طرابلس الليبية، كعينة للدراسة، والتي تم اختيارها عشوائياً. وتم تحليل البيانات باستخدام التكرارات والنسب المئوية ,وأظهرت النتائج النهائية للدراسة أن توظيف تقنية المعلومات في أغراض التدريس في التعليم العالي في ليبيا مازال في مراحله الاولى، ولازال يواجه جملة من التحديات تتمثل في ضعف البنية التحتية، وما ينتج عنها من ضعف خدمات الجامعة وخدمات الإنترنت، وعدم توفر معامل الحاسوب في بعض الكليات، بالإضافة لقلة الخبرات والكوادر المؤهلة تقنياً، وغياب دور مراكز الدعم الفني، بالإضافة الى قلة الثقافة وعدم الدراية بنظم إدارة التعليم الحديثة كنظام البلاك بورد ...الخ. إن عملية التوظيف الأمثل لتقنية المعلومات في العملية التعليمية بالجامعات يجب أن تسبقها خطوات جادة من أعضاء هيئة التدريس والجهات التنفيذية للجامعات، لاتخاذ قرارات تدعم هذا التوظيف بطريقة حديثة تواكب متطلبات العصر
انتصار منصور رمضان الاحول, ناهد فتحي محمد فرح, زهره عبدالله بركة الاشعل, نزيهة علي صالح صكح المصراتي(1-2019)
publisher's website

Design and Assessment of an Experimental SDN-Enabled Private Cloud using Openstack

Nowadays, educational and research institutions, especially universities, have considered their focus on cloud computing rather than using conventional prospects to take the most benefits of the services offered to support current trends in teaching and learning strategies. To build these networks in a cost effective way, open source cloud computing platforms are used. One of the powerful tools is Openstack, which allows users to create virtual networks and manage virtual machines within distributed learning environments. In this article, we describe our project on designing and evaluating a private cloud within a university environment using Openstack. To this end, we conduct a survey to measure the students' attitude towards the use of private clouds in which students and experts serve as samples. We design a virtual lab consisting of a number of virtual machines operated by a selected sample. We evaluate the proposed solution by adopting Technology Acceptance Model (TAM) methodology. The results obtained from this study show that the students' acceptance in using the private cloud in performing their tasks is encouraging albeit their anxiety on security issues and their lack of experience.
Belaid Mohammed Addokali, Adib Habbal, Suhaidi Hassan, Nabil Benamar(4-2017)
View publisher's website