Faculty of Information Technology

More ...

About Faculty of Information Technology

Faculty of Information Technology

The Faculty of Information Technology is one of the most recent faculties at the University of Tripoli, as it was established in pursuant to the former General People's Committee for Higher Education Decision No. 535 of 2007 regarding the creation of Information Technology Faculties in the main universities in Libya.

 

Upon its establishment, the Faculty consisted of three departments: Computer Networks Department, Computer Science Department and Software Engineering Department. It now includes five departments: Mobile Computing Department, Computer Network Department, Internet Technologies Department, Information Systems Department and Software Engineering Department.

 

The Faculty’s study system follows the open semester system by two (Fall and Spring) terms per year. The Faculty began to actually accept students and teach with the beginning of the Fall semester 2008. It grants a specialized (university) degree in information technology in any of the aforementioned disciplines. Obtaining the degree requires the successful completion of at least 135 credit hours. Arabic is the language of study in the college, and English may be also used alongside it. It takes eight semesters to graduate from the Faculty if Information Technology.

 

The Faculty aspires to open postgraduate programs in the departments of computer networks and software engineering in the near future.

Facts about Faculty of Information Technology

We are proud of what we offer to the world and the community

69

Publications

38

Academic Staff

1710

Students

159

Graduates

Faculty of Information Technology News

2021-05-04 555 0
More News

Programs

Major

...

Details
Major

...

Details
Major

...

Details

Who works at the Faculty of Information Technology

Faculty of Information Technology has more than 38 academic staff members

staff photo

Dr. Abdulmonam Omar Ahmed Alaswad

عبدالمنعم الاسود هو احد اعضاء هيئة التدريس بقسم هندسة البرمجيات بكلية تقنية المعلومات. يعمل السيد عبدالمنعم الاسود بجامعة طرابلس كـاستاذ مشارك منذ 2010-02-27 وله العديد من المنشورات العلمية في مجال تخصصه

Publications

Some of publications in Faculty of Information Technology

Assessing Growth and Instability of Open Source Software Systems

Abstract: software systems progressively evolve over time where source code needs to be modified, newly are added and others need to be deleted. Therefore, it is worth to monitor progress and software development, to measure growth and assess system stability. This paper assesses OSS software growth and instability to clarify impacts of its instability on its system growth. Three open source software applications, with different characteristics, have been selected. Size and instability metrics are extracted and statistically analyzed in order to assess the reflections of software growth under instability behaviors.
Ali Mresa, Abdussalam Baryun(6-2021)
Publisher's website

Extracting Geographic 3D Integral Images Data from Raster Maps

Holoscopic 3D imaging (H3D) technology also known as integral imaging is a true 3D imaging technology. It offers the simplest form that is capable of recording and replaying the true light field 3D scene in the form of a planar intensity distribution, by employing Microlens array. Despite it uses the same characteristics of holographic, it records the 3D information in 2D form and display in full 3D with optical component, without the need of coherent light source and confine dark fine. In addition, it facilitates postproduction processing such as refocusing. This makes it more practical approach for real-time 3D image capture and display. In this paper, a new method of extract 3D integral images data from raster maps. The R2V is an advanced raster to vector conversion software system is mainly used in order to generate geographical 3D integral images. Experimental results are extremely satisfactory and for the first time it is proved that, Geographic 3D Integral Images is generated. It means that, a new certain approach enables GIS applications of using 3D integral images is now established.
Dr. Mahmoud Geat Eljadid(12-2021)
Publisher's website

Vulnerabilities of Biometric Authentication “Threats and Countermeasures”

Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines, credit cards, electronic transactions, airports, high security institutions like nuclear facilities, Military Bases and other applications like borders control, access control, sensitive data protection and on-line tracking systems. While biometrics may improve security in different environments and serve many purposes, biometric systems, like any other security system, have vulnerabilities and are susceptible to threats. they are susceptible to external vulnerabilities of biometric systems so that their weaknesses can be found and useful countermeasures against foreseeable attacks can be developed The increasingly high profile use of biometrics for security purposes has provoked new interest in researching and exploring methods of attacking biometric systems.
Abdulmonam Omar Ahmed Alaswad, Ahlal H. Montaser, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website