Department of Computer

More ...

About Department of Computer

Facts about Department of Computer

We are proud of what we offer to the world and the community

4

Publications

12

Academic Staff

198

Students

0

Graduates

Programs

Major

...

Details

Who works at the Department of Computer

Department of Computer has more than 12 academic staff members

staff photo

Mr. AMANI .M .A SULAIMAN

أماني سليمان هي أحد أعضاء هيئة التدريس بقسم الحاسوب بكلية التربية طرابلس بجامعة طرابلس منذ 28-10-2010 ولها العديد من المنشورات العلمية في مجال تخصصها

Publications

Some of publications in Department of Computer

Reconstruction of Medical Image Registration and Applications in EIT

Medical image registration is process for determining the correspondence of features between two medical collected at different times and different position or using different imaging modalities, where the aim is to follow changes in two imaging. The aim in Electrical Impedance Tomography (EIT) is to exploit the difference in the passive electrical properties of tissues in order to generate a tomographic image. The advantage of such a technique over other imaging modalities is that it provides a non-invasive and sensitive method of probing the body using non ionizing radiation. This paper will Shows the reconstruction of image registration and application in multi frequency electrical impedance tomography. Using by the determination of the appropriate coordinate transfer function (CTF), the image reconstruction has been improved, and the all information in the image can be obtained.
Amani Soliman, (3-2018)
Publisher's website

Multi-frequency Electrical Impedance Tomography: Image Reconstruction Using Complex Sensitivity Matrix with Finite Element Methods

: Electrical Impedance Tomography (EIT) is a non invasive imaging technique with widespread applications in medicine and industry. It aims to image the conductivity distribution within an object by making electrical measurements on the surface of the volume. Single frequency electrical impedance tomography offers many positive attributes which are now being exploited clinically, but there are also problems which have been identified. Multi-frequency electrical impedance tomography has been proposed to solve this problem by making impedance measurements over a range of frequencies. The reason for this is that the impedance of biological tissues varies with frequency, and the variations are different from tissue to tissue. It is therefore possible, in principle to make static image (i.e. images of the distribution of frequency dependence of the impedance within the body) by measuring tissue impedance over a range of frequencies. In this paper new method concerning multi-frequency electrical impedance tomography have been developed. In the this new developed method; current density and finite element method have been used for the derivation of the complex sensitivity matrix. The new developed method was applied in some models and acceptable results were found. By using these method it possible to produce improvement and fast image reconstructions.
Amani SOLIMAN(3-2012)
Publisher's website

Vulnerabilities of Biometric Authentication “Threats and Countermeasures”

Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines, credit cards, electronic transactions, airports, high security institutions like nuclear facilities, Military Bases and other applications like borders control, access control, sensitive data protection and on-line tracking systems. While biometrics may improve security in different environments and serve many purposes, biometric systems, like any other security system, have vulnerabilities and are susceptible to threats. they are susceptible to external vulnerabilities of biometric systems so that their weaknesses can be found and useful countermeasures against foreseeable attacks can be developed The increasingly high profile use of biometrics for security purposes has provoked new interest in researching and exploring methods of attacking biometric systems.
Abdulmonam Omar Ahmed Alaswad, Ahlal H. Montaser, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website

Documents you Need