Optimized Link State Routing Protocol for Flying Ad Hoc
Conference paperThe network connectivity is often lost during some situations such as in war zones, battle fields or in regard to natural disasters like floods or earthquakes. Therefore, the connection becomes difficult for rescuing teams to locate people. At the same time, mobile nodes are difficult to be tracked/located. Therefore, flying ad-hoc networks (FANETs) is the solution which provides a way to tackle this situation without the need for any central infrastructure with the use of flying objects (nodes). FANTEs are frequently formed of tiny unmanned aerial vehicles (UAVs) which are flexible, affordable, and rapid to deploy. UAV as a router and without complex hardware deployment, provides an effective real-time communication solution for multiple UAV systems. FANETs can also be used to provide connectivity in such areas in which flying nodes are utilized. In this paper, we discuss the importance of the FANETs and present a routing protocol comparison that depends on the link budget to identify the optimized packet route for the data to be transmitted. The simulation design results show that a throughput enhancement of 0.62Gbps is achieved in comparison to the distance-based routing protocol. The results also confirm the efficiency of the optimized link state routing (OSLR) protocol over the other. The performance of FANETs can be optimized further by using the OLSR protocol.
Tarik F. Idbeaa, (06-2022), Libyan Conference on Medical, Applied, and Social Sciences th: AlQalam Journal of Medical and Applied Sciences (AJMAS), 64-74
The System for Estimating the Number of People in Digital Images Based on Skin Color Face Detection Algorithm
Journal ArticleCounting the number of people in many estimation systems, such as still images or video frames, is a buoyant research area that is challenging in the field of computer vision. It plays a considerable role in a variety of applications, such as security, management, education, and commerce. The purpose of this paper is to suggest a system to estimate the number of people in digital still images based on the Face Detection method. This system composed of two parts: face detection and counting of detected faces. In the detection step, the Skin Color Face Detection method was applied on the input of a digital still image. In the counting part, the obtained detected faces by the Skin Color Face Detection method have counted to estimate the number of people in an input color image with simple software and simple low-cost hardware. The skin color face detection algorithm was tested using 133 images from the People Image Groups dataset, which contains about 2573 color images of people, to test the proposed system. based on the obtained results, the best precision achieved of the proposed Skin Color face detection algorithm was 85%
samar Ittahir mohammed husain, Tarik Faraj Ali Idbeaa, Hisham Ogorban, (04-2022), طرابلس/ ليبيا: AlQalam Journal of Medical and Applied Sciences, 1 (5), 215-225
Study of Principal Component Analysis (PCA) as a face recognition method
Journal ArticleFace recognition is a biometric technique that can be used for a variety of purposes, such as national security, access control, identity fraud, banking, and finding missing children. Faces are highly dynamic and facial features are not always easily extracted, which can lead to discarding textural information like the smoothness of faces, a hairstyle that, might contain strong identity information. In addition, brightness, scale, and facial expressions play a significant role in the face-recognizing process. Therefore, face recognition is considered as a difficult problem. To figure out this problem effective methods using databases techniques are needed. This paper describes face recognition methods and their structure. Based on Wen Yi Zhao and Rama Chellappa work the face recognition methods are divided into three groups: a holistic approach, feature-based approach, and hybrid approach, where Principal Component Analysis PCA, a holistic approach method, is presented as a mathematical technique that can assist the process of face recognition. Also, the paper shows how the PCA is used to extract facial features by removing the principal components of the available multidimensional data.
AR Shtewi, (04-2022), ليبيا /سرت: Scientific Journal for Faculty of Science-Sirte University, 2 (1), 28-32
The System for Estimating the Number of People in Digital Images Based on Skin Color Face Detection Algorithm
Journal ArticleCounting the number of people in many estimation systems, such as still images or video frames, is a buoyant research area that is challenging in the field of computer vision. It plays a considerable role in a variety of applications, such as security, management, education, and commerce. The purpose of this paper is to suggest a system to estimate the number of people in digital still images based on the Face Detection method. This system composed of two parts: face detection and counting of detected faces. In the detection step, the Skin Color Face Detection method was applied on the input of a digital still image. In the counting part, the obtained detected faces by the Skin Color Face Detection method have counted to estimate the number of people in an input color image with simple software and simple low-cost hardware. The skin color face detection algorithm was tested using 133 images from the People Image Groups dataset, which contains about 2573 color images of people, to test the proposed system. based on the obtained results, the best precision achieved of the proposed Skin Color face detection algorithm was 85%
Tarik Idbeaa, (04-2022), Alq J Med App Sci: AlQalam Journal of Medical and Applied Sciences (AJMAS), 5 (1), 215-225
Study of Principal Component Analysis (PCA) as Face Recognition Method
Journal ArticleFace recognition is a biometric technique that can be used for a variety of purposes, such as national security, access control, identity fraud, banking, and finding missing children. Faces are highly dynamic and facial features are not always easily extracted, which can lead to discarding textural information like the smoothness of faces, a hairstyle that, might contain strong identity information. In addition, brightness, scale, and facial expressions play a significant role in the face-recognizing process. Therefore, face recognition is considered as a difficult problem. To figure out this problem effective methods using databases techniques are needed. This paper describes face recognition methods and their structure. Based on Wen Yi Zhao and Rama Chellappa work the face recognition methods are divided into three groups: a holistic approach, feature-based approach, and hybrid approach, where Principal Component Analysis PCA, a holistic approach method, is presented as a mathematical technique that can assist the process of face recognition. Also, the paper shows how the PCA is used to extract facial features by removing the principal components of the available multidimensional data.
Entisar Nassr Abdulati Abolkasim, (04-2022), Scientific Journal for the Faculty of Science- Sirte University: Scientific Journal for the Faculty of Science-Sirte University, 1 (2), 18-32
التحديات التي تواجه الانتقال السريع من التعليم التقليدي إلى التعليم عن بُعد (دراسة تقييمية لأداء منصة جامعة غريان الالكترونية)
مقال في مؤتمر علمييعتمد التعليم التقليدي على مجموعة عناصر أساسية، أهمها على الإطلاق المنهج التعليمي، المحاضر و الطالب، إلا أن هذه العناصر الأساسية أضيفت إليها عنصر جديد في التعليم عن بعد ألا وهو البيئة الإلكترونية. في ظل جانحة كورونا 19COVID والتي بدأت مع نهاية سنة 9102 والتحول السريع من التعليم التقليدي الي التعليم عن يعد الخطط التعليمية المعدة مسبقا فيه تطوير ً بعد و إشراك التعليم عن بعد في تنف . هذا التحول السريع والذي لم يتم َ أدي الي ظهور بعض المشاكل في مخرجات العملية التعليمية. فالتعليم عن عناصر التعليم ولم يتم الإعداد له مسبقا بعد وإن كانت عناصره الأساسية هي نفس عناصر التعليم التقليدي إلا أن الأسلوب في تنفيذه أختلف بإدخال عنصر جديد أساسي وهو البيئة الإلكترونية التي من خلالها يتم تنفيذ الخطط التعليمية. في هذه الورقة البحثية سوف يتم دراسة أهم العناصر الفاعلة والمؤثرة في العملية التعليمية للتعليم عن بعد والمشاكل الناجمة عن هذا التحول السريع ثم إيجاد الحلو ل المناسبة لمواكبة التطور في سير العملية التعليمية وذلك من خلال دراسة تقييمية لتجربة كلية العلوم بجامعة غريان وسوف تكون نتائج هذا البحث مفيدة لتنفيذ التغيرات في النظام التعليمي ولتلبية متطلبات المعايير التعليمية الحديثة للتعليم العالي.
أيمن أحمد محمد أحمد، ناصر علي أبوراوي الفيض، طارق الهادي محمد خليفة، عبدالحكيم مصطفى التريكي، كمال المبروك سليمان، حاتم أحمد محمد المبروك، (02-2022)، ليبيا: المؤتمر العلمي الأول لتقنية المعلومات وعلوم الحاسوب كلية تقنية المعلومات، 45-56
Revisiting Virtual Execution Policies for Optimistic Concurrency Control: The Real-Time Benefits of Writing Before Validating.
Journal ArticleIn this paper we present an approach to optimistic concurrency control where the write phase occurs before the validation phase (RWV instead of RVW). Our work extends earlier research into real-time databases that utilized virtual execution to lower disk access overheads. Such work demonstrated that virtual execution allowed an increase in transactions completing before deadlines expired and improvements in overall throughput. However, we demonstrate that only with the reversal of the write and validation phases can virtual execution reach its full potential.
Naser Alfed, Kamal Solaiman, Khaled Farj, Abubkr Abdelsadiq, (12-2021), ليبيا: جامعة غريان, 22 (2),
HIGH HIDING CAPACITY AUDIO WATERMARKING METHOD BASED ON DISCRETE COSINE TRANSFORM
Journal ArticleThis paper presents a new high-capacity algorithm for audio watermarking for the purpose of embedding a watermark audio signal into an original audio signal. This algorithm uses DCT (discrete cosine transform) in combination with SVD (singular value decomposition), DWT (discrete wavelet transform), and CZT (chirp ztransform). For the purpose of ensuring high levels of imperceptibility and robustness, a low-frequency sub band of 1-level DWT is selected to embed the watermark, followed by DCT, CZT, and SVD. As a result, the proposed algorithm achieves a high capacity of 352800 bits per second while a good quality audio signal is maintained (having an objective difference grade of more than-0.04). It also provides high imperceptibility (a signal to noise ratio of more than 58 dB) and it is extremely resistant to common audio attacks, including requantizing, resampling, additive white Gaussian noise or AWGN, MP3 compression, and low-pass filtering. The proposed algorithm presents much better compared to the audio watermarking algorithms already existent.
Omar Moftah Ibrahim Abodena, Ali Alashtir, (08-2021), International Journal of Advance Research and Innovative Ideas in Education: IJARIIE, 7 (4), 677-684
Robust and high-capacity audio watermarking basedon chirp z-transform
Conference paperA novel non-blind audio watermarking algorithm, using chirp z-transform in combination with discrete wavelet transform and singular value decomposition, is presented in this paper. In the proposed method, a watermark audio signal (about 13 seconds in length) is hidden into an original audio signal (about 51 seconds in length) by applying discrete wavelet transform, chirp z-transform, and singular value decomposition. The effectiveness of the proposed algorithm has been tested using signal-to-noise ratio, objective difference grade (ODG), and normalised cross- correlation of watermarked audio signal under various common audio attacks. Experimental results demonstrate that the algorithm has a high capacity (352.8 kbps), without significant perceptual distortion (ODG > -0.29) and provides good robustness against common audio attacks, including: re-sampling, echo addition, MP3 compression, additive white Gaussian noise, re- quantisation, cutting, and low-pass filtering. This algorithm has a high capacity and excellent audio quality compared with other audio watermarking algorithms.
Omar Moftah Ibrahim Abodena, (05-2021), 2021 29th IEEE Signal processing and communications applications conference (SIU): IEEE, 1-4
Accreditation Process and Outcomes: Experience of the University of Tripoli Alahlia, Libya
Journal ArticleQuality assurance and institutional accreditation in education is becoming of paramount importance. This study aims to assess the impacts of the accreditation process of the National Center for Quality Assurance and Accreditation (NCAAA) on the quality of education in one of private university in Libya. Methods: The research adopts a descriptive study design in University of Tripoli Alahlia (UTA) where an official accreditation process was completed by the NCQAA during 2017-2019. Data were collected using the self-study report that produced by the NCQAA accreditation committee during the accreditation process, and were retrieved in specific data collection sheet by one of the authors. Results: The NCQAA accreditation process that lasted about 4 years brought significant changes in the educational progressions and made the staff members more aware of quality issues in education. Our findings also reported significant improvements in the quality of education in the university. Conclusions: The process of NCQAA accreditation conducted in UTA has been positively improved the quality of education. Data from other institutions would also expressively increase the relevance and rationality of the study.
Tarik F. Idbeaa, (03-2020), Center for Open Access in Science (COAS): OPEN JOURNAL FOR SOCIOLOGICAL STUDIES (OJSS), 4 (1), 13-20