# |
Paper_No |
Authors |
Title |
1 |
32 |
Elham Yakhlef Abushwashi |
ARP Spoofing Attacks; Simulation and Countermeasures |
2 |
60 |
Ayad Keshlaf and Eman Bozkhar |
Internet Of Things Based Technology: IoTTD Approach for Early Alerting About Hazardous and Prohibited Substances |
3 |
62 |
Abdulmonam Alahrash and Ayad Keshlaf |
ICECR Framework to Identify and Control Cloud Based E-Government Risks |
4 |
82 |
Omar Mabrok Bouzid, Mohamad Abdulaziz Abodena and Ayad Ali Keshlaf |
Low Cost Water Level Monitoring System Based on IoT Technology |
5 |
93 |
Areej Abugrain and Ali Ganoun |
Libyan Vehicles License Plates Localization System using Neural Networks |
6 |
95 |
Marwa Abdulhakim Sherif and Safa Abdulhakim Sherif |
SMART BUILDING Using EEG Signal Controller & Web Application |
7 |
121 |
Hend M. Farkash Farkash and Mona A. El.Zuway |
Electrocardiogram Signal Diagnosis Using Supervised Artificial Neural Network |
8 |
131 |
Anis Elgarduh, Abdalhamed Alkawash and Abdelmhsan Elbandac |
Evaluation and Justification of Processor Cache Designs Through Simulation |
9 |
142 |
Heba A. Alshiref, Ghaida S. Alsaety and Mohammed T. Radwan |
WAN Technologies Principles & Revolution (Frame Relay & MPLS Implementation) |
10 |
153 |
Gharam Abbas and Ali Ganoun |
Performance Analysis of Face Recognition System |
11 |
164 |
Elhusain Saad |
Improving Matching of Feature Descriptors Using Statistics of Detected Features |
12 |
176 |
Nadia Aboalgasm, Amer. Daeri and Ibrahim A Almerhag |
Effect of Channel Multipath Fading and Node Trajectory on VoIP QoS in WiMAX Networks |
13 |
190 |
Nuha Omran Abokhdair, Mohamed Ab. Sultan and Enas Ayad |
An Experimental Study of the Effect of AES in Combination with 2D Lower Triangular Chaotic Map |
14 |
194 |
Aboobaker Elhouni, Ameera Otheman and Adel Smeda |
Comparison of VoIP Performance over WIMAX, WLAN and WIMAX – WLAN Integrated Networks |
15 |
197 |
Tarek S. Ghmati and Shubat S. Ahmeda |
Threshold Secret Sharing Authentication Protocol for Mobile Ad Hoc Network |
16 |
207 |
Nasser Abuhamoud and Emsaieb Geepalla |
Using Neo4j For Fraud Detection In Banks Sector |
17 |
217 |
Abdussalam Alhadi Addeeb and Mohammed Hussein Abuzgaia |
Cascaded Adaptive Filter For Image Restoration |
18 |
220 |
Adel Ali Eluheshi and Amira Shlebik |
Plotting Matlab Maps for Hazard Areas Via GPS Android Application and MySQL Database |
19 |
234 |
Khaled Shalghum |
Improving the Performance of Uplink Scheduling Algorithm using OFDM-TDMA Technique in PMP WiMAX networks |
20 |
248 |
Balsam Huta and Ali Ganoun |
Performance Analysis of Using Digital Filters for Denoising ECG signals |
21 |
250 |
Mohammed Elborawi and Ali Ganoun |
Real Time Vehicles Detection and License Plates Recognition System |
22 |
256 |
Salah Althloothi |
Human Action Recognition Using Spherical Harmonics Representation of Depth Maps |
23 |
258 |
Alhadi Alajeili and Abdelsalam Almarimi |
Vulnerability Analysis of Web Applications |
24 |
260 |
Musbah Mohammed Elahresh |
The Role of Data Structures in Multi- Programming Languages |
25 |
273 |
Ferdose Almarimi and Moammer Abdullaziz |
HUMAN IRIS RECOGNITION USING CORRELATION MATRIX |
26 |
275 |
Amal J. Mahfoud, Khadija F. O. Algheitta and Ali H. Maamar |
Design of a Self Checking Down Counter |
27 |
295 |
Adel Ali Eluheshi, Salih Saad Garash and Mohamed Ghretli |
“Audio Codecs Impact on Quality of VoIP over mobile WiMAX Networks in handover process” |
28 |
298 |
جمال بشير أوهيبة |
خوارزمية جينية بلغة R لحل نماذج البرمجة الخطية |
29 |
300 |
Muhmed F. Agbisha, Ahmed M. Isheiba and Jalal M. Mehalhal |
Encrypt The Text and Hide it in the RGB Image using three Pointers of color |
30 |
319 |
Iman Namroud, Khlood Belhasan and Moammer Abdullaziz |
Libyan License Plate Recognition |
31 |
342 |
Azeddien Sllame, Esraa Hema and Huda Al-Najem |
Performance Comparison of VoIP over MPLS-Based Networks with RSVP Protocol Using SIP, H.323 Signaling Protocols |
32 |
343 |
Najwa Salama and Azeddien Sllame |
A SIMULATOR FOR FAT-TREE NETWORK-ON-CHIP SYSTEMS BASED ON MPLS TECHNIQUE |
33 |
353 |
Khalid Abdelkader, Ramadan Arfa and Manal Mukhtar |
Developing social electronic services for children with special needs “Autistic children” |
34 |
355 |
Ahmed Mohamed Abugarain and Elhadi Saleh Eldulfag |
Semantic Image Annotation And Retrieval System |
35 |
357 |
Nisreen Benltayef |
Data Center Virtualization |
36 |
379 |
رمضان خريبيش عبدالحميد |
WEB Based Decision Support System for Employee Recruitment Using Fuzzy Analytic Hierarchy Process |
37 |
391 |
Ali F. A . Kaeib and Osama A. S. Abourodes |
Implementation of Data Encryption Standard algorithm on Field Programable Gate Arrays |
38 |
392 |
Albahlool Abood, El Bahlul Fgee and Adel Ali Eluheshi |
Quality Of Service (QoS) Performance Evaluation of VoIPv6 Codecs in fixed and Mobile WiMAX Networks |
39 |
403 |
عبدالعزيز محمود سويب and محمود محمد الصغير |
using Phan’s algorithm in Internet Protocol Security |
40 |
404 |
رمضان السيد الفرد |
Libyan Dialect Named Entity Recognition Based on Rule-Based Approach |
41 |
419 |
Abduladeam Abdullah and Mohamad Abdullah |
Encryption of optical image using fractional Fourier transform and chaos theory |
42 |
421 |
Omar A. Shgeim, Ahmed A. Arara, Elbahlul E. Elfgee and Abduassalam S. Shlibek |
Analysis and Evaluation QoS of VoIP over WiMAX and 3G/UMTS Networks |
43 |
430 |
Salaheddine H. Kanoun, Nabil M. Drawil and Musbah G. Saad |
Impact of Speech-Feature-Alignment on Dynamic Time Warping in Speech Recognition |
44 |
435 |
محمد ابوالقاسم الرتيمي and عائشه محفوظ حمدي |
تحديات تطبيق تقنيات أنظمة الدفع الالكتروني في ليبيا |
45 |
444 |
Musbah Mohammed Elahresh and Amal Omar Al-Nori |
Referential Data Coding for Disk Space Utilization |
46 |
464 |
Mohamed Ghretli, Ratiba Shalbout, Sabri Shmeekh and Mohamed Rgeai |
Automation and Management of Computer Networks using Python Language Scripts |
47 |
467 |
Mohamed Ghretli, Malak Alwarfli, Hala Daggez and Adel Eluheshi |
Comparative Study on Implementation Techniques for Site-to-Site VPNs in Libyan Organizations |
48 |
473 |
Nadia Hmad, Abdulrahman Alalshekmubarak and Tony Allen |
A comperative study between Deep Neural Networks and Echo State Networks models on the Levantine Arabic corpus |
49 |
483 |
Walid Abdalla Ramdhan Abdalla |
Semantic Web and Role of Ontology in its Development |
50 |
484 |
Faten Taha Almadhoun and Ahmed Yousef Ben Sasi |
A Hybrid DWT-DCT Algorithm for Digital Image Watermarking |
51 |
501 |
Dr. Mahmoud Eljadid and Prof. Amar Aggoun |
Computer Generation of 3D Integral Imaging Animations |
52 |
502 |
Dr. Mahmoud Eljadid, Prof. Amar Aggoun and Dr. Osama Youssef |
New 3D Holoscopic Images Content Format |
53 |
516 |
Abdulbaset Altuhami and Salah Zahed |
An energy efficient approach for topology management in large scale computer networks |
54 |
522 |
Zuher Mesken Imbarak Ebra and Amal Mustafa Musbahi |
Comparing between MSP and TOA in localization estimation |
55 |
524 |
Amal Mustafa Musbahi and Zuher Mesken Imbarak Ebra |
SMACOF algorithm for Localization in WSN |
56 |
528 |
Nada Ayad Ashok and Elfurjani Sasi Mresa |
Data Link Layer Attacks and Security Techniques: An Overview |
57 |
529 |
Najat Atbaiga and Francoise Siewe |
Formal Specification of a Context-aware Whiteboard System in CCA |
58 |
532 |
Rema Asheibani Saad, Adnan Abushagur and Mohammed Qaja |
Implementing High Availability by Redundancy Protocols on Juniper Devices and Comparing the Performance Between Them |
59 |
542 |
Mohamed A Hassan, Mokhled S Al-Tarawneh and Ali Ukasha |
Chaff Points Encapsulation for Cancelable Fingerprint Features |
60 |
546 |
Ahmed Salem Alardawi, Babak Khazaei and Abdulhakim Mouloud Danns |
The Role of Problem Decomposition In Program Comprehension of Example Program |
61 |
551 |
Sami F Alahmar and Omar O Aldawibi |
Optimum Routing Protocol for Static Wireless Ad-Hoc Network |