Using Interactive Whiteboard to Enhance Learning Process for Dyslexic Children
Journal Article

Dyslexia is a distinct learning disability that is distinguished by difficulties in decoding and reading fluency, spelling as well as other cognitive skills. This research is conducted to assist learning disability by improving the skills required for children with learning disability in reading and spelling using the assistive technology AVA interactive whiteboard. The approach is by strengthening the micro skills required to improve the fundamental skills such as reading, and spelling thus facilitating the learning process. Tactile and visual modalities are the main focus in the use of the interactive whiteboard. This study aims to develop an interactive whiteboard learning prototype for students with dyslexia. A total of six children from 3 demographics (Chinese, Malay, and Indian) participated in the study. Activities improving the four micro skills were introduced in normal whiteboard and the children were exposed to the prototype AVA interactive whiteboard. Responses using Interactive whiteboard were different when compared to their performance with the normal whiteboard. The analyzed results indicated showed improvements in three of the micro skills using IWB

Tarik Faraj Idbeaa, (09-2024), Bani Waleed: Bani Waleed University Journal of Humanities and Applied Sciences, 9 (3), 545-528

Cybercrime's Threat to Financial Institutions During COVID-19
Conference paper

This systematic review investigates the impact of the COVID-19 pandemic on cybersecurity by examining the rise of cyberattacks targeting financial institutions. By analyzing over 60 sources including academic research, government reports, and security company data, the review reveals a nearly two-fold increase in cybercrimes targeting financial institutions during the pandemic compared to pre-pandemic levels. Phishing attacks are identified as the most prevalent form of cybercrime within this context. The review delves further by analyzing the differences between phishing and other cyberattacks during COVID-19. Based on the results and observations presented in this paper, the analysis will contribute to enriching strategies to address the growing threat of cybercrime in the financial sector

Tarik Idbeaa, (06-2024), 888888weeeth Libyan International Conference on Medical, Applied, and Social Sciences: Alq J Med App Sci, 46-52

تحليل أداء شبكات الحاسوب
مقال في مجلة علمية

لقد امتزجت الأختراعات الحديثة فيما بينها مثل الأنترنت، الأقمار الصناعية، الهواتف الذكية، الحاسوب، والذكاء الإصطناعى لتشكل شبكات وطرق ووسائل تكنولوجية استطاعت كسر حواجز الزمان والمكان لنقل وتبادل المعلومات بإستخدام شبكات الكمبيوتر (Computer Networks) التي ستحدد نمط الحياة المستقبلية. يعتبر تحليل وقياس الأداء للشبكات الحاسوبية عامل رئيسى وحيوى في تحسينها وزيادة جودتها بما يتماشى مع التقدم التكنولجى الذي نعاصره مما يساعد على الإستفادة التشغيلية القصوى من الشبكات المتاحة، وتقليل التكلفة الكلية لإنشاء شبكات جديدة، زيادة السعة الإستيعابية للشبكة، وزيادة الإعتماد على التعاملات الإلكترونية والرقمية. ونظراً للثورة العلمية والتكنولوجية التي نعاصرها مما أدى إلى زيادة حجم المعلومات المتبادلة نتيجة ربط بين الأجهزة الحديثة المختلفة التي نستخدمها مع شبكة الأنترنت مما يتطلب قياس الأداء للشبكات الموجودة لمواكبة عصر المعلومات. مع الإعتماد الكلى على الإنترنت والأجهزة الحديثة أصبح كم المعلومات المتطلب نقلها هائل وقابل لزيادة كل بضعة أشهر مما جعل قياس وتحسين أداء الشبكات ضرورة حتمية تشغل فكر العلماء والباحثين لتسخيرها لخدمة البشرية. كان ظهور وتطور الشبكات الحاسوبية نتيجة طبيعية لظهور الحاسوب وزيادة الطلب على تبادل ونقل الملفات والبرامج والإيميلات، مشاركة موارد الشبكة لأكبر عدد من المستخدمين، ظهور البرامج التي يمكن استخدامها من خلال الشبكات الحاسوبية، سهولة اعمل والاتصال والتعاون بين طاقم العمل بالشركات والمؤسسات، والإدارة المركزية لبيئة العمل والتأمين الفعال للمعلومات والملفات المستخدمة. يعتمد تحليل أداء الشبكة على تحديد مواردها بدقة لتقسيمها على المستخدمين ومن لهم أولوية قصوى لأداء مهامهم، تجهيز وتطوير البنية التحتية للشبكة، تحديث البرامج والتكنولوجيا التي تعمل على الشبكة بما يتناسب مع حاجات المستخدمين. يؤدي تقسيم مكونات الشبكة وتحديد أولويات المهام في الشبكة إلى توفير مساحة لتحسين الأداء، كما يؤدي وجود عدة مستخدمين على الشبكة إلى زيادة حركة المرور مما يؤثر على أداء الشبكة، كما يمكن أن يؤدي تثقيف فريقك بشأن سلوك المستخدم إلى تحسين أداء الشبكة غير مدركين لتأثير الأنشطة على موارد الشبكة. كما تساعدك المراقبة المنتظمة للشبكة على تحديد الاختناقات ومعالجتها وتحسين أداء الشبكة. لن يؤدي ذلك إلى تحسين الأداء العام لنظامك فحسب، بل سيؤدي أيضًا إلى تحسين قدرة الإنتاجية لشبكتك. يمكن أيضًا تثقيف الموظفين بشأن العمليات والوقت المناسب لتنفيذها.


انتصار المهدي ميلود الجالي، (03-2024)، المعهد العالي للعلوم التقنية رقدالين: مجلة العلوم الشاملة، 30 (8)، 209-229

Exploring the Feasibility of Implementing Online Learning at the Faculty of Science: A Case Study
Conference paper

Background and aims

In recent years, the education sector in Libya have been affected by wars and political fluctuations, impacting the quality and availability of education. There have been challenges in providing the necessary educational resources, as well as in training and qualifying teachers. E-learning, it can be an effective tool in improving education under difficult circumstances. Online education can provide opportunities for students to access educational resources easily, and can contribute to enhancing communication between teachers and students. E-learning can also play a role in developing students’ technology skills, which is important in our modern era. In 2019, the Faculty of Science at the University of Gharyan partially implemented online learning as a response to COVID-19 pandemic, and this program continued for two academic terms. Therefore, the paper aims to highlights both the advantages and limitations of E-learning within the environment of university education in Libya

Amina Shtewi, (12-2023), طرابلس: AlQalam Journal of Medical and Applied Sciences, 829-835

The evaluation of the daily profits of the Group of cosmetics Sephora branches by Using distributed system the K-means Algorithm and WEKA visualization
Conference paper

This study delves into the evaluation of daily profits within the network of Sephora cosmetics branches, employing distributed systems, the K-means algorithm, and WEKA visualization techniques. The objective is to analyze the profitability patterns across Sephora branches and uncover underlying clusters to optimize strategic decision-making. The research methods encompassed the utilization of distributed systems to collect and integrate daily profit data from multiple Sephora branches. The K-means clustering algorithm was applied to segment the dataset, discerning distinct clusters based on profit margins and performance metrics. The WEKA visualization tool was instrumental in depicting these clusters in a comprehensive and interpretable manner, offering insights into profit distributions and potential areas for enhancement. This research revealed intricate profitability structures within the Sephora branch network. The application of the K-means algorithm, distinct clusters of branches with varying profitability profiles were identified. WEKA visualization facilitated the graphical representation of these clusters, elucidating the relationships between different branches based on daily profits. Such insights can aid decision-makers in strategizing resource allocation, marketing initiatives, and operational improvements tailored to each cluster's profitability dynamics. The amalgamation of distributed systems, K-means algorithm, and WEKA visualization offered a robust framework for assessing and optimizing the financial performance of  Sephora branches. This research contributes valuable insights into the evaluation of daily profits across  Sephora cosmetics branches, showcasing the potential of distributed systems and advanced analytical tools in understanding profitability patterns. The findings provide a foundation for strategic interventions aimed at enhancing profitability and operational efficiencies within the Sephora branch network.


Entesar Mahdi Milod Eljali, (12-2023), جامعة نالوت: المؤتمر العلمي الدولي الأول للدراسات الاقتصادية والسياسية – جامعة نالوت, 1-22

Streamlining data analysis with artificial intelligence :An automated framework
Journal Article

Abstract:

In this research study, we investigate the effectiveness of a proposed automated framework that leverages AI algorithms to improve the accuracy, scalability, and efficiency of data analysis. We compare the performance of the proposed framework to traditional data analysis methods in terms of accuracy, time and effort required for data analysis, and scalability. We conducted a questionnaire-based survey to collect data on the application of the proposed framework and traditional data analysis methods in real-world scenarios. We used statistical analyses, including t-tests and regression analyses, to analyze the data and draw conclusions. Our findings indicate that the proposed automated framework outperforms traditional data analysis methods in terms of accuracy, reduces the time and effort required for data analysis, and has better scalability for processing large datasets in real-time. Our results suggest that the proposed framework offers significant benefits for organizations seeking to improve their data analysis processes. However, we also note the importance of considering the costs and benefits of implementing the framework, as well as any ethical or legal implications. Further research is recommended to confirm the findings and to investigate the effectiveness of the proposed framework in different contexts and with different datasets.


Entesar Mahdi Milod Eljali, tarik MLIOD ALARBI AHMAD, (11-2023), جامعة غريان: مجلة جامعة غريان, 28 (13), 335-366

A Robust Blind Grayscale Image Watermarking Technique Based on Schur Decomposition and Entropy Analysis
Journal Article

A new robust blind image watermarking method based on lifting wavelet transform (LWT), and Schur decomposition in combination with discrete cosine transform (DCT), and entropy analysis for copyright protection of multimedia information is introduced in this paper. At first, the 2-level LWT is applied to the original image to improve the invisibility of the watermarking method and then the high-frequency sub-band of 2-level LWT is decomposed by DCT. Then, the DCT coefficients are divided into 4×4 non-overlapping blocks. After that, Schur decomposition applies to each selected block, while the first row, the first column element of the upper triangular matrix is used to embed the watermark. For evaluation, the invisibility and robustness of the proposed watermarking method, the peak signal to noise ratio (PSNR), and normalized cross-correlation (NC) are used to measure the quality and the ability of the proposed watermarking method to be robust against signal processing operations and geometric attacks. Experimental results have demonstrated that the proposed method is achieved a very good tradeoff between invisibility and robustness. The comparisons with other scheme have shown that the proposed digital watermarking scheme has a superior performance in terms of invisibility than other. 

Omar Moftah Ibrahim Abodena, (11-2023), University Journal: University of Gharyan, 28 (2), 485-508

Optimized Link State Routing Protocol for Flying Ad Hoc
Conference paper

The network connectivity is often lost during some situations such as in war zones, battle fields or in regard to natural disasters like floods or earthquakes. Therefore, the connection becomes difficult for rescuing teams to locate people. At the same time, mobile nodes are difficult to be tracked/located. Therefore, flying ad-hoc networks (FANETs) is the solution which provides a way to tackle this situation without the need for any central infrastructure with the use of flying objects (nodes). FANTEs are frequently formed of tiny unmanned aerial vehicles (UAVs) which are flexible, affordable, and rapid to deploy. UAV as a router and without complex hardware deployment, provides an effective real-time communication solution for multiple UAV systems. FANETs can also be used to provide connectivity in such areas in which flying nodes are utilized. In this paper, we discuss the importance of the FANETs and present a routing protocol comparison that depends on the link budget to identify the optimized packet route for the data to be transmitted. The simulation design results show that a throughput enhancement of 0.62Gbps is achieved in comparison to the distance-based routing protocol. The results also confirm the efficiency of the optimized link state routing (OSLR) protocol over the other. The performance of FANETs can be optimized further by using the OLSR protocol.

Tarik F. Idbeaa, (06-2022), Libyan Conference on Medical, Applied, and Social Sciences th: AlQalam Journal of Medical and Applied Sciences (AJMAS), 64-74

A robust blind watermarking scheme based on lifting wavelet transform and hessenberg decomposition
Journal Article

In this paper, a novel robust blind grayscale image digital watermarking scheme is introduced based on lifting wavelet transform (LWT) in combination with discrete cosine transform (DCT), Hessenberg decomposition, and entropy analysis for copyright protection of multimedia information. At first, the two levels of LWT are applied to the host grayscale image to improve the imperceptibility of the watermarking scheme and then the high-frequency sub-band of the 2-level of LWT is decomposed by DCT. Next, the DCT coefficients are divided into 4× 4 non-overlapping blocks. After that, Hessenberg decomposition performs on each selected block, whereas the first row, first column element of the upper Hessenberg matrix is utilized to hide the watermark. To evaluate the imperceptibility and robustness of the proposed digital watermarking scheme, the peak signal-to-noise ratio (PSNR), and normalized cross-correlation (NC) are utilized to measure the quality and the ability of the proposed watermarking scheme to robust against signal processing operations and geometric attacks. Experimental and analysis results have demonstrated that the proposed scheme is achieved a very good tradeoff between imperceptibility and robustness. The comparison with other scheme have shown that the proposed digital watermarking schemes have a superior performance in terms of imperceptibility and robustness than other

Omar Moftah Ibrahim Abodena, (06-2022), Journal of pure & applied sciences: Sebha University, 21 (2), 48-54

Study of Principal Component Analysis (PCA) as a face recognition method
Journal Article

Face recognition is a biometric technique that can be used for a variety of purposes, such as national security, access control, identity fraud, banking, and finding missing children. Faces are highly dynamic and facial features are not always easily extracted, which can lead to discarding textural information like the smoothness of faces, a hairstyle that, might contain strong identity information. In addition, brightness, scale, and facial expressions play a significant role in the face-recognizing process. Therefore, face recognition is considered as a difficult problem. To figure out this problem effective methods using databases techniques are needed. This paper describes face recognition methods and their structure. Based on Wen Yi Zhao and Rama Chellappa work the face recognition methods are divided into three groups: a holistic approach, feature-based approach, and hybrid approach, where Principal Component Analysis PCA, a holistic approach method, is presented as a mathematical technique that can assist the process of face recognition. Also, the paper shows how the PCA is used to extract facial features by removing the principal components of the available multidimensional data.

AR Shtewi, (04-2022), ليبيا /سرت: Scientific Journal for Faculty of Science-Sirte University, 2 (1), 28-32

© All rights reserved to University of Gharyan