المستودع الرقمي لـكلية تقنية المعلومات

احصائيات كلية تقنية المعلومات

  • Icon missing? Request it here.
  • 43

    مقال في مؤتمر علمي

  • 22

    مقال في مجلة علمية

  • 1

    كتاب

  • 3

    فصل من كتاب

  • 0

    رسالة دكتوراة

  • 0

    رسالة ماجستير

  • 0

    مشروع تخرج بكالوريوس

  • 0

    تقرير علمي

  • 0

    عمل غير منشور

  • 0

    وثيقة

Enhancement of Grain-128 Using Variable Feedback Polynomials of Linear Feedback Shift Register

DLFSR is promising for enhancing the security of stream ciphers. However, good inviolability and statistical properties of the DLFSR generator are only achievable when the parameters of the switching algorithm are properly selected. This paper describes a new experimental method for choosing suitable parameters for the algorithm of switching the polynomial in DLFSR. This method was used to enhance the Grain-128 stream cipher. The randomness of the modified Grain was evaluated using the NIST suite, and the results are encouraging. The modified Grain was also compared to the original, and the results indicated that the modified algorithm outperforms the original in several tests. arabic 12 English 82
Fayrouz Aljadi, Ibrahim Almerhag, Fardous Eljadi(3-2019)
موقع المنشور

Routing based on security

Even though it is an essential requirement of any computer system, there is not yet a standard method to measure data security, especially when sending information over a network. However, the most common technique used to achieve the three goals of security is encryption. Three security metrics are derived from important issues of network security in this chapter. Each metric demonstrates the level of achievement in preserving one of the security goals. Routing algorithms based on these metrics are implemented to test the proposed solution. Computational effort and blocking probability are used to assess the behavior and the performance of these routing algorithms. Results show that the algorithms are able to find feasible paths between communicating parties and make reasonable savings in the computational effort needed to find an acceptable path. Consequently, higher blocking probabilities are encountered, which is the price to be paid for such savings. arabic 3 English 22
Ibrahim Almerhag(3-2014)
موقع المنشور

Designing an Efficient MPLS-Based Switch for FAT Tree Network-on-Chip Systems

This paper describes a proposal for FAT tree based Network-on- Chip system based on MPLS forwarding mechanism. The FAT tree includes processing nodes and communication switches. IP node (processing nodes) has a message generator unit which randomly generates messages to different destinations with different packet lengths and buffering. The switch is based on MPLS technique and consists of the following units: crossbar switch, input/output link controllers and routing and arbitration units. A simulator has been developed in C++ to analyze the proposed architecture. A comparison with wormhole switch is provided to show the efficiency of the MPLS designed switch arabic 12 English 65
Azeddien M. Sllame, Nagwa Abobaker Salama(1-2016)
موقع المنشور

An MPLS-Based Fat Tree Network-on-Chip Systems

This paper describes a Fat tree based Network-on- Chip system using MPLS networking technique. A discrete-event simulator has been developed in C++ in in order to demonstrate the applicability of the MPLS to Network-on-Chip systems. The correctness and the efficiency of the MPLS based Fat networkon- chip system is measured against well-known wormhole with virtual channels technique. The results of the MPLS-based NoC in terms of throughput and latency are clearly proves the applicability of the MPLS to implement future NoC designs arabic 8 English 38
Azeddien M. Sllame, Nagwa Abobaker Salama(11-2016)
موقع المنشور

Integrating LAB Work With Classes in Computer Network Courses

The use of the communication and information technology tools can aid students in their lab work to add more flexibility to the accessibility and providing of up-to-date higher education allowing students accessing knowledge anytime, anywhere which will facilitate the lifelong learning and provide accessibility to the curriculum and other students’ resources from anywhere at any time. Laboratory work by students in the information technology and engineering fields of study is a must requirement in all accreditation agencies and targeted employment places. This chapter demonstrates a project based learning technique that has been integrated with ordinary classes in computer network courses. The tools used in this study concentrates on the modeling and simulation of different aspect of computer networking that highlight different skills needed to any computer network engineer. arabic 8 English 53
Azeddien M. Sllame(1-2017)
موقع المنشور

Nagwa Salama, Azeddien M. Sllame,: A Simulator For FAT-Tree Network-On-Chip Systems Based On MPLS Technique, In The Libyan International Conference on Electrical Engineering and Technologies (LICEET 2018), Tripoli, Libya, March 2018.

This paper is presenting a discrete-event simulator written in C++ for modeling and simulating Fat tree network-on-chip systems based on MPLS technique. The simulator contains main component that construct butterfly Fat tree structure and other components that generate suitable number of switches and IP nodes (cores). The designed switch consists of input ports, output ports, input/output link controller, multi-buffers, crossbar switch, routing and arbitration components and MPLS unit. The correctness and the efficiency of the MPLS based Fat network-on-chip system is measured against well-known wormhole+ virtual channels technique. The produced results are clearly demonstrated the efficiency of the MPLS technique for future NoC designs. arabic 45 English 189
Azeddien M. Sllame, Nagwa Abobaker Salama(2-2018)

biometrics:standing throughout emerging technologies

Biometrics technologies have been around for quite some time and many have been deployed for different applications all around the world, ranging from small companies' time and attendance systems to access control systems for nuclear facilities. Biometrics offer a reliable solution for the establishment of the distinctiveness of identity based on "who an individual is", rather than what he or she knows or carries. Biometric Systems automatically verify a person's identity based on his/her anatomical and behavioral characteristics. Biometric traits represent a strong and undeviating link between a person and his/her identity, these traits cannot be easily lost or forgotten or faked, since biometric systems require the user to be present at the time of authentication. Some biometric systems are more reliable than others, yet they are neither secure nor accurate, all biometrics have their strengths and weaknesses. Although some of these systems have shown reliability and solidarity, work still has to be done to improve the quality of service they provide. Presented is the available standing biometric systems showing their strengths and weaknesses and also emerging technologies which may have great benefits for security applications in the near future.
Abdulmonam Omar Ahmed Alaswad(0-2008)
موقع المنشور

Vulnerabilities of Biometric Authentication “Threats and Countermeasures”

Biometric systems have a powerful potential to provide security for a variety of applications, systems are nowadays being introduced in many applications and have already been deployed to protect personal computers, Banking machines, credit cards, electronic transactions, airports, high security institutions like nuclear facilities, Military Bases and other applications like borders control, access control, sensitive data protection and on-line tracking systems. While biometrics may improve security in different environments and serve many purposes, biometric systems, like any other security system, have vulnerabilities and are susceptible to threats. they are susceptible to external vulnerabilities of biometric systems so that their weaknesses can be found and useful countermeasures against foreseeable attacks can be developed The increasingly high profile use of biometrics for security purposes has provoked new interest in researching and exploring methods of attacking biometric systems.
Abdulmonam Omar Ahmed Alaswad, Ahlal H. Montaser, Fawzia Elhashmi Mohamad(0-2014)
موقع المنشور