Exploring the Feasibility of Implementing Online Learning at the Faculty of Science: A Case Study
Conference paper

Background and aims

In recent years, the education sector in Libya have been affected by wars and political fluctuations, impacting the quality and availability of education. There have been challenges in providing the necessary educational resources, as well as in training and qualifying teachers. E-learning, it can be an effective tool in improving education under difficult circumstances. Online education can provide opportunities for students to access educational resources easily, and can contribute to enhancing communication between teachers and students. E-learning can also play a role in developing students’ technology skills, which is important in our modern era. In 2019, the Faculty of Science at the University of Gharyan partially implemented online learning as a response to COVID-19 pandemic, and this program continued for two academic terms. Therefore, the paper aims to highlights both the advantages and limitations of E-learning within the environment of university education in Libya

Amina Shtewi, (12-2023), طرابلس: AlQalam Journal of Medical and Applied Sciences, 829-835

A Robust Blind Grayscale Image Watermarking Technique Based on Schur Decomposition and Entropy Analysis
Journal Article

A new robust blind image watermarking method based on lifting wavelet transform (LWT), and Schur decomposition in combination with discrete cosine transform (DCT), and entropy analysis for copyright protection of multimedia information is introduced in this paper. At first, the 2-level LWT is applied to the original image to improve the invisibility of the watermarking method and then the high-frequency sub-band of 2-level LWT is decomposed by DCT. Then, the DCT coefficients are divided into 4×4 non-overlapping blocks. After that, Schur decomposition applies to each selected block, while the first row, the first column element of the upper triangular matrix is used to embed the watermark. For evaluation, the invisibility and robustness of the proposed watermarking method, the peak signal to noise ratio (PSNR), and normalized cross-correlation (NC) are used to measure the quality and the ability of the proposed watermarking method to be robust against signal processing operations and geometric attacks. Experimental results have demonstrated that the proposed method is achieved a very good tradeoff between invisibility and robustness. The comparisons with other scheme have shown that the proposed digital watermarking scheme has a superior performance in terms of invisibility than other. 

Omar Moftah Ibrahim Abodena, (11-2023), University Journal: University of Gharyan, 28 (2), 485-508

A robust blind watermarking scheme based on lifting wavelet transform and hessenberg decomposition
Journal Article

In this paper, a novel robust blind grayscale image digital watermarking scheme is introduced based on lifting wavelet transform (LWT) in combination with discrete cosine transform (DCT), Hessenberg decomposition, and entropy analysis for copyright protection of multimedia information. At first, the two levels of LWT are applied to the host grayscale image to improve the imperceptibility of the watermarking scheme and then the high-frequency sub-band of the 2-level of LWT is decomposed by DCT. Next, the DCT coefficients are divided into 4× 4 non-overlapping blocks. After that, Hessenberg decomposition performs on each selected block, whereas the first row, first column element of the upper Hessenberg matrix is utilized to hide the watermark. To evaluate the imperceptibility and robustness of the proposed digital watermarking scheme, the peak signal-to-noise ratio (PSNR), and normalized cross-correlation (NC) are utilized to measure the quality and the ability of the proposed watermarking scheme to robust against signal processing operations and geometric attacks. Experimental and analysis results have demonstrated that the proposed scheme is achieved a very good tradeoff between imperceptibility and robustness. The comparison with other scheme have shown that the proposed digital watermarking schemes have a superior performance in terms of imperceptibility and robustness than other

Omar Moftah Ibrahim Abodena, (06-2022), Journal of pure & applied sciences: Sebha University, 21 (2), 48-54

Study of Principal Component Analysis (PCA) as a face recognition method
Journal Article

Face recognition is a biometric technique that can be used for a variety of purposes, such as national security, access control, identity fraud, banking, and finding missing children. Faces are highly dynamic and facial features are not always easily extracted, which can lead to discarding textural information like the smoothness of faces, a hairstyle that, might contain strong identity information. In addition, brightness, scale, and facial expressions play a significant role in the face-recognizing process. Therefore, face recognition is considered as a difficult problem. To figure out this problem effective methods using databases techniques are needed. This paper describes face recognition methods and their structure. Based on Wen Yi Zhao and Rama Chellappa work the face recognition methods are divided into three groups: a holistic approach, feature-based approach, and hybrid approach, where Principal Component Analysis PCA, a holistic approach method, is presented as a mathematical technique that can assist the process of face recognition. Also, the paper shows how the PCA is used to extract facial features by removing the principal components of the available multidimensional data.

AR Shtewi, (04-2022), ليبيا /سرت: Scientific Journal for Faculty of Science-Sirte University, 2 (1), 28-32

التحديات التي تواجه الانتقال السريع من التعليم التقليدي إلى التعليم عن بُعد (دراسة تقييمية لآداء منصة جامعة غريان الالكترونية)
مقال في مؤتمر علمي

يعتمد التعليم التقليدي على مجموعة عناصر أساسية، أهمها على الإطلاق المنهج التعليمي، المحاضر و الطالب، إلا أن هذه العناصر الأساسية أضيفت إليها عنصر جديد في التعليم عن بعد ألا وهو البيئة الإلكترونية. في ظل جانحة كورونا 19COVID والتي بدأت مع نهاية سنة 9102 والتحول السريع من التعليم التقليدي الي التعليم عن يعد الخطط التعليمية المعدة مسبقا فيه تطوير ً بعد و إشراك التعليم عن بعد في تنف . هذا التحول السريع والذي لم يتم َ أدي الي ظهور بعض المشاكل في مخرجات العملية التعليمية. فالتعليم عن عناصر التعليم ولم يتم الإعداد له مسبقا بعد وإن كانت عناصره الأساسية هي نفس عناصر التعليم التقليدي إلا أن الأسلوب في تنفيذه أختلف بإدخال عنصر جديد أساسي وهو البيئة الإلكترونية التي من خلالها يتم تنفيذ الخطط التعليمية. في هذه الورقة البحثية سوف يتم دراسة أهم العناصر الفاعلة والمؤثرة في العملية التعليمية للتعليم عن بعد والمشاكل الناجمة عن هذا التحول السريع ثم إيجاد الحلو ل المناسبة لمواكبة التطور في سير العملية التعليمية وذلك من خلال دراسة تقييمية لتجربة كلية العلوم بجامعة غريان وسوف تكون نتائج هذا البحث مفيدة لتنفيذ التغيرات في النظام التعليمي ولتلبية متطلبات المعايير التعليمية الحديثة للتعليم العالي.

أيمن أحمد محمد أحمد، ناصر علي أبوراوي الفيض، طارق الهادي محمد خليفة، عبدالحكيم مصطفى التريكي، كمال المبروك سليمان، حاتم أحمد محمد المبروك، (02-2022)، ليبيا: المؤتمر العلمي االول لتقنية المعلومات وعلوم الحاسوب كلية تقنية المعلومات – جامعة الزاوية، 45-56

Revisiting Virtual Execution Policies for Optimistic Concurrency Control: The Real-Time Benefits of Writing Before Validating.
Journal Article

In this paper we present an approach to optimistic concurrency control where the write phase occurs before the validation phase (RWV instead of RVW). Our work extends earlier research into real-time databases that utilized virtual execution to lower disk access overheads. Such work demonstrated that virtual execution allowed an increase in transactions completing before deadlines expired and improvements in overall throughput. However, we demonstrate that only with the reversal of the write and validation phases can virtual execution reach its full potential.

Naser Alfed, Kamal Solaiman, Khaled Farj, Abubkr Abdelsadiq, (12-2021), ليبيا: جامعة غريان, 22 (2),

HIGH HIDING CAPACITY AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM
Journal Article

This paper presents a new high-capacity algorithm for audio watermarking for the purpose of embedding a watermark audio signal into an original audio signal. This algorithm uses DCT (discrete cosine transform) in combination with SVD (singular value decomposition), DWT (discrete wavelet transform), and CZT (chirp ztransform). For the purpose of ensuring high levels of imperceptibility and robustness, a low-frequency sub band of 1-level DWT is selected to embed the watermark, followed by DCT, CZT, and SVD. As a result, the proposed algorithm achieves a high capacity of 352800 bits per second while a good quality audio signal is maintained (having an objective difference grade of more than-0.04). It also provides high imperceptibility (a signal to noise ratio of more than 58 dB) and it is extremely resistant to common audio attacks, including requantizing, resampling, additive white Gaussian noise or AWGN, MP3 compression, and low-pass filtering. The proposed algorithm presents much better compared to the audio watermarking algorithms already existent.

Omar Moftah Ibrahim Abodena, Ali Alashtir, (08-2021), International Journal of Advance Research and Innovative Ideas in Education: IJARIIE, 7 (4), 677-684

Robust and high-capacity audio watermarking basedon chirp z-transform
Conference paper

A novel non-blind audio watermarking algorithm, using chirp z-transform in combination with discrete wavelet transform and singular value decomposition, is presented in this paper. In the proposed method, a watermark audio signal (about 13 seconds in length) is hidden into an original audio signal (about 51 seconds in length) by applying discrete wavelet transform, chirp z-transform, and singular value decomposition. The effectiveness of the proposed algorithm has been tested using signal-to-noise ratio, objective difference grade (ODG), and normalised cross- correlation of watermarked audio signal under various common audio attacks. Experimental results demonstrate that the algorithm has a high capacity (352.8 kbps), without significant perceptual distortion (ODG > -0.29) and provides good robustness against common audio attacks, including: re-sampling, echo addition, MP3 compression, additive white Gaussian noise, re- quantisation, cutting, and low-pass filtering. This algorithm has a high capacity and excellent audio quality compared with other audio watermarking algorithms.

Omar Moftah Ibrahim Abodena, (05-2021), 2021 29th IEEE Signal processing and communications applications conference (SIU): IEEE, 1-4

ROBUST WATERMARKING TECHNIQUES FOR COPYRIGHT PROTECTION
PhD Thesis

Watermarking techniques have been considered as one of the best efficacious methods 

to solve the issues of protecting copyright due to the proliferation of digital multimedia 

information on the internet. The digital multimedia information is such as image, 

audio, and video which can today be easily copied, distributed, and modified without 

loss in fidelity. As a result, it is necessary to utilize some kind of copyright protection 

techniques to avoid illegal copying, distribution, and digital copyright modification. 

The digital watermarking techniques have engaged the researchers’ attention as a 

technique for protecting copyright in the digital multimedia information. This 

technique includes a subcategory of information-hiding technologies in which the 

ownership information is hidden into the original multimedia information without 

impacting the original multimedia information quality. Despite the advances in digital 

watermarking techniques, the main objective of many types of research in digital 

watermarking topic is to improve transparency and resistance to attacks and the present 

digital watermarking schemes are not sufficiently stable or strong against various 

attacks. This study aims to develop state-of-the-art digital watermarking techniques 

for different multimedia information through improving the imperceptibility and 

robustness to geometrical attacks and signal processing operations. Four novel robust 

blind digital watermarking schemes are introduced in this thesis for copyright 

protection of multimedia information that have not been previously introduced. The 

first robust blind digital watermarking scheme is applied for colour images utilizing 

discrete wavelet transform in combination with Walsh Hadamard transform and 

Hessenberg decomposition. The second robust blind digital watermarking scheme is 

applied for grayscale images utilizing discrete wavelet transform in combination with 

Walsh Hadamard transform and Hessenberg decomposition. The third robust blind 

digital watermarking scheme is applied for colour videos utilizing discrete wavelet 

transform in combination with Walsh Hadamard transform and Hessenberg 

decomposition. Forth robust blind digital watermarking scheme is applied for audio 

signals utilizing discrete wavelet transform in combination with Walsh Hadamard 

transform and Hessenberg decomposition. Several experiments are performed in order 

to present the effectiveness of the proposed digital watermarking schemes in terms of 

imperceptibility and robustness against attacks related to each scheme. The proposed 

digital watermarking schemes achieve good imperceptibility and robustness against 

geometrical attacks and signal processing operations. The proposed digital 

watermarking schemes have a superior performance in terms of imperceptibility and 

robustness than other reported schemes in the literature.

Keywords: Watermarking, Copyright Protection, Discrete Wavelet Transform, Walsh 

Hadamard Transform, Hessenberg Decomposition.

Omar Moftah Ibrahim Abodena, (08-2019), Cyprus International University: Cyprus International University,

Colour image blind watermarking scheme based on fast walsh hadamard transform and hessenberg decomposition
Journal Article

Colour image watermarking has become one of the most important algorithms for copyright protection. The following paper will present an innovative scheme for watermarking blind colour images using the discrete wavelet transform (DWT), fast Walsh Hadamard transform (FWHT) and the Hessenberg decomposition as its basis. First, two-level DWT followed by FWHT are used to decompose the host image’s red channel. Next, the FWHT coefficients are split into 4× 4 non-overlapping blocks. Then, each selected block is decomposed using Hessenberg decomposition, where the first row, first column element of the upper Hessenberg matrix H is quantified to embed the watermark information. Peak signalto-noise ratio, normalized cross-correlation and structural similarity index measure are used to evaluate the feasibility and the robustness. The experimental results have demonstrated that the proposed watermarking scheme is highly invisible with PSNR> 40 dB, for several watermarked colour images, with a capacity of 4096 bits and execution time of 0.7415 s. The proposed watermarking scheme is also highly resistant to both common image processing and geometrical attacks such as filtering, JPEG2000, noise adding, cropping, scaling, blurring and sharpening, and others

Omar Moftah Ibrahim Abodena, Mary Agoyi, (09-2018), Studies in Informatics and Control: Studies in Informatics and Control, 27 (3), 339-348

© جميع الحقوق محفوظة لجامعة غريان