Department of Computer

More ...

About Department of Computer

Facts about Department of Computer

We are proud of what we offer to the world and the community

4

Publications

12

Academic Staff

198

Students

0

Graduates

Programs

Major

...

Details

Who works at the Department of Computer

Department of Computer has more than 12 academic staff members

staff photo

Mr. AMANI .M .A SULAIMAN

أماني سليمان هي أحد أعضاء هيئة التدريس بقسم الحاسوب بكلية التربية طرابلس بجامعة طرابلس منذ 28-10-2010 ولها العديد من المنشورات العلمية في مجال تخصصها

Publications

Some of publications in Department of Computer

Vulnerabilities of Biometric Authentication “Threats and Countermeasures”

Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines, credit cards, electronic transactions, airports, high security institutions like nuclear facilities, Military Bases and other applications like borders control, access control, sensitive data protection and on-line tracking systems. While biometrics may improve security in different environments and serve many purposes, biometric systems, like any other security system, have vulnerabilities and are susceptible to threats. they are susceptible to external vulnerabilities of biometric systems so that their weaknesses can be found and useful countermeasures against foreseeable attacks can be developed The increasingly high profile use of biometrics for security purposes has provoked new interest in researching and exploring methods of attacking biometric systems.
Abdulmonam Omar Ahmed Alaswad, Ahlal H. Montaser, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website

Reconstruction of Medical Image Registration and Applications in EIT

Medical image registration is process for determining the correspondence of features between two medical collected at different times and different position or using different imaging modalities, where the aim is to follow changes in two imaging. The aim in Electrical Impedance Tomography (EIT) is to exploit the difference in the passive electrical properties of tissues in order to generate a tomographic image. The advantage of such a technique over other imaging modalities is that it provides a non-invasive and sensitive method of probing the body using non ionizing radiation. This paper will Shows the reconstruction of image registration and application in multi frequency electrical impedance tomography. Using by the determination of the appropriate coordinate transfer function (CTF), the image reconstruction has been improved, and the all information in the image can be obtained.
Amani Soliman, (3-2018)
Publisher's website

Most Common and Reliable Traits for Fusion of Biometrics

Biometrics technologies have been around for quite some time and many have been deployed for different applications all around the world, ranging from small companies' time and attendance systems to access control systems for nuclear facilities. Biometrics offer a reliable solution for the establishment of the distinctiveness of identity based on "who an individual is", rather than what he or she knows or carries. Biometric Systems automatically verify a person's identity based on his anatomical and behavioral characteristics. Biometric traits represent a strong and undeviating link between a person and his identity, these traits cannot be easily lost or forgotten or faked. Since biometric systems require the user to be present at the time of authentication. Some biometric systems are more reliable than others, yet biometric systems are neither secure nor accurate, all biometrics have their strengths and weaknesses. Although some of these systems have shown reliability and solidarity, work still has to be done to improve the quality of service they provide. In this paper we present the most common and reliable known biometric systems suitable for Multimodal Biometrics Fusion, providing highly efficient and secure systems, showing their strengths and weaknesses and also presenting technologies in which may have great benefits for security applications in the near future.
Abdulmonam Omar Ahmed Alaswad, Ihab Meftah Elfituri, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website

Documents you Need