Department of Computer

More ...

About Department of Computer

Facts about Department of Computer

We are proud of what we offer to the world and the community

4

Publications

12

Academic Staff

198

Students

0

Graduates

Programs

Major

...

Details

Who works at the Department of Computer

Department of Computer has more than 12 academic staff members

staff photo

Mr. AMANI .M .A SULAIMAN

أماني سليمان هي أحد أعضاء هيئة التدريس بقسم الحاسوب بكلية التربية طرابلس بجامعة طرابلس منذ 28-10-2010 ولها العديد من المنشورات العلمية في مجال تخصصها

Publications

Some of publications in Department of Computer

Most Common and Reliable Traits for Fusion of Biometrics

Biometrics technologies have been around for quite some time and many have been deployed for different applications all around the world, ranging from small companies' time and attendance systems to access control systems for nuclear facilities. Biometrics offer a reliable solution for the establishment of the distinctiveness of identity based on "who an individual is", rather than what he or she knows or carries. Biometric Systems automatically verify a person's identity based on his anatomical and behavioral characteristics. Biometric traits represent a strong and undeviating link between a person and his identity, these traits cannot be easily lost or forgotten or faked. Since biometric systems require the user to be present at the time of authentication. Some biometric systems are more reliable than others, yet biometric systems are neither secure nor accurate, all biometrics have their strengths and weaknesses. Although some of these systems have shown reliability and solidarity, work still has to be done to improve the quality of service they provide. In this paper we present the most common and reliable known biometric systems suitable for Multimodal Biometrics Fusion, providing highly efficient and secure systems, showing their strengths and weaknesses and also presenting technologies in which may have great benefits for security applications in the near future.
Abdulmonam Omar Ahmed Alaswad, Ihab Meftah Elfituri, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website

Multi-frequency Electrical Impedance Tomography: Image Reconstruction Using Complex Sensitivity Matrix with Finite Element Methods

: Electrical Impedance Tomography (EIT) is a non invasive imaging technique with widespread applications in medicine and industry. It aims to image the conductivity distribution within an object by making electrical measurements on the surface of the volume. Single frequency electrical impedance tomography offers many positive attributes which are now being exploited clinically, but there are also problems which have been identified. Multi-frequency electrical impedance tomography has been proposed to solve this problem by making impedance measurements over a range of frequencies. The reason for this is that the impedance of biological tissues varies with frequency, and the variations are different from tissue to tissue. It is therefore possible, in principle to make static image (i.e. images of the distribution of frequency dependence of the impedance within the body) by measuring tissue impedance over a range of frequencies. In this paper new method concerning multi-frequency electrical impedance tomography have been developed. In the this new developed method; current density and finite element method have been used for the derivation of the complex sensitivity matrix. The new developed method was applied in some models and acceptable results were found. By using these method it possible to produce improvement and fast image reconstructions.
Amani SOLIMAN(3-2012)
Publisher's website

Vulnerabilities of Biometric Authentication “Threats and Countermeasures”

Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines, credit cards, electronic transactions, airports, high security institutions like nuclear facilities, Military Bases and other applications like borders control, access control, sensitive data protection and on-line tracking systems. While biometrics may improve security in different environments and serve many purposes, biometric systems, like any other security system, have vulnerabilities and are susceptible to threats. they are susceptible to external vulnerabilities of biometric systems so that their weaknesses can be found and useful countermeasures against foreseeable attacks can be developed The increasingly high profile use of biometrics for security purposes has provoked new interest in researching and exploring methods of attacking biometric systems.
Abdulmonam Omar Ahmed Alaswad, Ahlal H. Montaser, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website

Documents you Need