In recent years, the Decision Support Systems (DSS) have gained an important role in
the research of information systems, where the DSS expiration are used for systems and
applications that aim at helping work teams ...
The traditional long-established networks and networking techniques are no longer suitable for future ever-expanding networking requirements, specifically, the automation and programmability of network communications. ...
The demand for more secure authentication has increased on several occasions. Exploiting biometrics in various forms such as face, voice, handwriting, and gait recognition is a reliable method for authentication. Recently, ...
Machine learning techniques have been using increasingly in medical image analysis field to perform features recognition and decision-making tasks that demonstrate major advances in medical care field. Automated analysis ...
Passwords are widely used for authentication in information systems, and it is still the dominant method of authentication despite its weaknesses due to its simplicity. However, users have difficulty remembering long ...
Biometric systems are widely used by governments, businesses and organizations to identify people based to their biological characters. The main purpose to use such systems is to improve the security of systems, but they ...
Much research has been carried out on the importance of design patterns as a tool that saves time in the design of a software program and establishes helpful results in different platforms. However, the methods for pattern ...
HOWAYDA, ABDALLAH ALI ELMARZAKI(جامعة بنغازي, 2018-01-01)
The efficiency of multi-agent system (MAS) design mainly relies on the quality of a
conceptual architecture. Thereby, the quality substantially influences the software
system architecture, and plays a key role in the ...
Ali, Aljilani Khamis Ben Abdabdullah(جامعة بنغازي, 2022-01-01)
Software maintenance is considered the costliest process in the software system development life cycle. The changes made in this process on a specific software entity may trigger co-changes in other software entities. ...
The process of developing high-quality software depends on the extent to which it meets what is required of it completely and correctly. As a result, the requirements validation process and the testing phase are considered ...
Offline text recognition is very important in a variety of applications, such as automatic sorting of mail, altering ancient documents, and historical document analysis. This research aims at the ensemble of different ...
Because of the emerging challenges accompanying the development and advancement of information technology in many fields and industries, this makes IT experts, designers, manufactures and researchers in need of creating ...
In this era of technology and precision, our lives depend largely on the technological devices which are being developed in various aspects of life, especially those of healthcare. The Types of these devices are increasing ...
MOHAMED F MAMI,; AHMED M ALTRIKI,; OMAR M SALLABI,(Benghazi University, 2023)
Information and Communication Technology have added many values to the educational process. Several approaches have been developed for this purpose, including e-learning, distance learning, and recently blended learning ...
Ahmed, M. Altriki; Osama, Alarafee(Benghazi University, 2022-09-01)
The research aims to study the extent of the impact of the use and application of
information systems on petroleum companies in Libya, as well as monitoring the current
situation of these devices by highlighting the most ...