Faculty of Information Technology

More ...

About Faculty of Information Technology

Faculty of Information Technology

The Faculty of Information Technology is one of the most recent faculties at the University of Tripoli, as it was established in pursuant to the former General People's Committee for Higher Education Decision No. 535 of 2007 regarding the creation of Information Technology Faculties in the main universities in Libya.

 

Upon its establishment, the Faculty consisted of three departments: Computer Networks Department, Computer Science Department and Software Engineering Department. It now includes five departments: Mobile Computing Department, Computer Network Department, Internet Technologies Department, Information Systems Department and Software Engineering Department.

 

The Faculty’s study system follows the open semester system by two (Fall and Spring) terms per year. The Faculty began to actually accept students and teach with the beginning of the Fall semester 2008. It grants a specialized (university) degree in information technology in any of the aforementioned disciplines. Obtaining the degree requires the successful completion of at least 135 credit hours. Arabic is the language of study in the college, and English may be also used alongside it. It takes eight semesters to graduate from the Faculty if Information Technology.

 

The Faculty aspires to open postgraduate programs in the departments of computer networks and software engineering in the near future.

Facts about Faculty of Information Technology

We are proud of what we offer to the world and the community

69

Publications

38

Academic Staff

1710

Students

159

Graduates

Faculty of Information Technology News

2021-05-04 470 0
More News

Programs

No Translation Found
Major No Translation Found

No Translation Found...

Details
Major

...

Details
Major

...

Details

Who works at the Faculty of Information Technology

Faculty of Information Technology has more than 38 academic staff members

staff photo

Prof.Dr. Ibrahim Ali Mohamed Almerhag

إبراهيم المرهاق هو احد اعضاء هيئة التدريس بقسم الشبكات - كلية تقنية المعلومات. يعمل السيد ابراهيم المرهاق بجامعة طرابلس كـأستاذ وله العديد من المنشورات العلمية في مجال تخصصه.

Publications

Some of publications in Faculty of Information Technology

Enhancement of Grain-128 Using Variable Feedback Polynomials of Linear Feedback Shift Register

DLFSR is promising for enhancing the security of stream ciphers. However, good inviolability and statistical properties of the DLFSR generator are only achievable when the parameters of the switching algorithm are properly selected. This paper describes a new experimental method for choosing suitable parameters for the algorithm of switching the polynomial in DLFSR. This method was used to enhance the Grain-128 stream cipher. The randomness of the modified Grain was evaluated using the NIST suite, and the results are encouraging. The modified Grain was also compared to the original, and the results indicated that the modified algorithm outperforms the original in several tests. arabic 12 English 82
Fayrouz Aljadi, Ibrahim Almerhag, Fardous Eljadi(3-2019)
Publisher's website

The impact of electronic communications and governance in the activation of E-learning,

الحوكمه الإلكترونية والتعليم الإلكتروني هما جوانب هامة من النقل الإلكتروني للمعلومات على مستويين مختلفين . إذا كانت برامج الحكومة الإلكترونية حيوية لتحسين الخدمات العامة، فإن "التعليم الإلكتروني" هو نعمة لضمان التعليم النوعي في كلمكان . لا يزال كثير من الناس يخلط إذا "الحكومة الإلكترونية" و "التعليم الإلكتروني" هما شيئيان مترادفان . هذه الورقة تحاولكشف النقاب عن هذا الخلط من خلال إبراز بعض الجوانب المتنوعة من كل مفهوم . وعلاوة على ذلك، هذه الورقة تستكشفالتأثير المحتمل للحوكمه الإلكترونية على المجتمع الحديث، وتركز على المزايا الكامنة في التعليم الإلكتروني في البيئةالأكاديمية، ونعالج الجوانب الأساسية للجانبين لنفس العملة . المؤلفون يفترضون أن "الحوكمه الإلكترونية" و "التعليمالإلكتروني" هما مفاهيم ناشئة عن تكنولوجيا المعلومات، الاتصالات الحديثة التي يتم تقديمها وتنفيذها على المستويات الحكوميةوالمؤسسية على التوالي لتعزيز التواصل الكفء والفعال للمعلومات الإلكترونية وذلك لسد الفجوة gap للفجوة الرقمية digital divide في جميع أنحاء العالم .
وائل صالح محمد أبوغريس, هلال هدية المنتصر محمد, (7-2012)
Publisher's website

Routing based on security

Even though it is an essential requirement of any computer system, there is not yet a standard method to measure data security, especially when sending information over a network. However, the most common technique used to achieve the three goals of security is encryption. Three security metrics are derived from important issues of network security in this chapter. Each metric demonstrates the level of achievement in preserving one of the security goals. Routing algorithms based on these metrics are implemented to test the proposed solution. Computational effort and blocking probability are used to assess the behavior and the performance of these routing algorithms. Results show that the algorithms are able to find feasible paths between communicating parties and make reasonable savings in the computational effort needed to find an acceptable path. Consequently, higher blocking probabilities are encountered, which is the price to be paid for such savings. arabic 3 English 22
Ibrahim Almerhag(3-2014)
Publisher's website