The most Preferred Method of Contraception by Libyan women
Journal Article

Several methods are used as tools for family planning and to avoid unintended pregnancies. It is important for healthcare providers to consider various factors when discussing contraceptive options with patients. This study explored the most commonly preferred methods pf contraception by Libyan women. Age of the women and number of children as well as women’ education were the most significant factors that influence selection of the contraception method. Results of the current study emphasized the need for more family education programs that provide more details about new methods of contraception as Libyan women seems to use more traditional methods of contraception.

Lutfi Mohamed Mohamed Bakar, (06-2024), Libyan Academy for Post graduate Studies: Libyan Academy, 3 (1), 168-170

Atr
Unpublished Work

I am writing to let you know that you have got a formal confirmation letter, which is accompanied by this message as a PDF file.

 

If you need any additional information, feel free to contact me by email anytime.

Sincerely,

Dr. Fathia A. Mosa


Editor in Scientific Journal of the Faculty of Science-Sirte University.


سالم عبدالغني عمر ابوقليلة, (04-2024), Sirte: الأكاديمية الليبية,

Arabic Speech Recognition using a Combined Deep Learning Model
Journal Article

Abstract— Speech recognition is a valuable tool in various industries; however, achieving high accuracy remains a major challenge, despite the rapid growth of the speech recognition market. Arabic in particular lags behind other languages in the field of speech recognition, requiring further attention and development. To address this issue, this research uses deep neural networks to develop an automatic Arabic speech recognition model based on isolated words technology. A hybrid model, which is originally developed by Radfar et al. [1] for English speech recognition, is adopted and adapted to be used for Arabic speech recognition. This model combines the strengths of recurrent neural networks (RNNs), which are critical in speech recognition tasks, with convolutional neural networks (CNNs) to form a hybrid model known as ConvRNN. A specific model for Arabic speech recognition which is referred to as “Arabic_ConvRNN” model has been developed based on “ConvRNN” model. The adopted model is trained using an Arabic speech publicly available dataset of isolated words, along with a custom-generated dataset specially prepared for this research. The performance of the built model has been evaluated using standard metrics, including word error rate (WER), accuracy, precision, recall, and F-measure (also referred to as f1 score). In addition, K-fold cross-validation method has been employed generalizability. to ensure robustness and The results demonstrated that Arabic_ConvRNN model achieved a high accuracy rate of 95.7% on unseen data, with a minimal WER of about 4.3%. These findings highlight the model's effectiveness in accurately recognizing Arabic speech with minimal errors. Comparisons with similar models from previous studies further Arabic_ConvRNN validated model. the superiority Overall, of the Arabic_ConvRNN model shows great promise for applications requiring accurate and efficient Arabic speech recognition. This research contributes to narrowing the gap in Arabic speech recognition technology, offering a robust solution for accurately converting Arabic speech into text. 

Abduelbaset Mustafa Alia Goweder, (01-2024), Libyan Academy, Tripoli: Academy journal for Basic and Applied Sciences (AJBAS), 6 (3), 10-17

Transfer Learning Model for Offline Handwritten Arabic Signature Recognition
Journal Article

Abstract— The verification of handwritten signatures is a significant area of research in computer vision and machine learning (ML). Handwritten signatures serve as unique biometric identifiers, making it essential to distinguish between genuine and forged signatures. This binary classification task is crucial in legal and financial contexts to prevent fraud and protect customers from potential losses. However, verifying offline handwritten signatures is challenging due to variations in handwriting influenced by factors such as mood, fatigue, writing surface, and writing instrument. This research paper focuses on recognizing offline handwritten Arabic signatures using deep learning (DL), specifically transfer learning (TL) technique which is called “Inception-V3 TL model”. Three distinct datasets are used to build a model for recognizing signatures. The first dataset is referred to as Dataset1. It is an English signature dataset called I. INTRODUCTION A signature is defined as a unique, individual, and personal sign. It is regarded as one of the biometric measurements that can be used for identification and verification. Handwritten signatures have been used in different practical areas of life for many centuries, for example, in contracts, financial operations, documents, identification documents such as passports, driver’s licenses, etc. Additionally, signatures are used in bank cheques and money transfers. However, with the great benefits of using a handwritten signature, came certain challenges for societies such as identity and fraud [1]. "CEDAR" which contains 1,320 genuine and 1,320 forged signatures. Dataset1 is publicly available at: https://www.kaggle.com/datasets/shreelakshmigp/cedard ataset .The second dataset is referred to as Dataset2. It is a new Arabic signature dataset created for this research which contains 1,320 genuine and 1,320 forged signatures. The third dataset is referred to as Dataset3. It is created by merging the English and Arabic signature datasets (Dataset1 and Dataset2). The Inception-V3 TL model is trained on these distinct datasets (Dataset1, Dataset2, and Dataset3). Both normal training and k-fold cross-validation (CV) methods are applied to evaluate the model’s performance, ensuring robustness and reliability. The Inception-V3 model achieved impressive accuracies of 97.48% on the Dataset1, 98.23% on Dataset2, and 97.85% on Dataset3, demonstrating its effectiveness in distinguishing between genuine and forged signatures. 

Abduelbaset Mustafa Alia Goweder, (01-2024), Libyan Academy, Tripoli: Academy journal for Basic and Applied Sciences (AJBAS), 6 (3), 30-37

Comparison of 5G Networks Non-Standalone Architecture (NSA) and Standalone Architecture (SA)
Journal Article

The non-standalone architecture (NSA) of 5G networks builds upon existing 4G long-term evolution (LTE) infrastructure, integrating 5G new radio (NR) technology while still relying on the 4G core network. In contrast the standalone architecture (SA) of 5G networks is designed as a fully independent system, with its own 5G core network. It does not rely on the existing 4G LTE infrastructure. The NSA integrates 5G NR technology into existing 4G LTE networks, utilizing the 4G core network for control and signaling. On the other hand, the SA establishes a fully independent 5G network with its own core components, providing more advanced features and greater autonomy. The transition from NSA to SA architecture is expected as network operators deploy more comprehensive 5G networks. This paper investigated in details the major different between both architectures NSA and SA of 5G networks.

Mohammed Alnaas, (01-2024), http://www.ijcsejournal.org: International Journal of Computer Science Engineering Techniques, 8 (11), 1-11

INVESTIGATION OF UNCONVENTIONAL RESERVOIRS OF THE UPPER CRETACEOUS SOURCE ROCKS IN THE HAMEIMAT TROUGH SOUTH EAST SIRTE BASIN, LIBYA
Journal Article

The study area situated in the center of the Hameimat trough which is located in the southeast

of the Sirte basin. The Hameimat trough contains two of the largest oil fields in Libya,

Gialo and Abu-Attifel fields. The Upper Cretaceous Rachmat, Tagrifet, and Sirte

Formations are considered as the main source rock in Sirte Basin.

Organic geochemical study of the Upper Cretaceous Rachmat, Tagrifet and Sirte

Formations show these Formations have total organic carbon content values of 0.53% to

3.35% fair to excellent as source rock. The Kerogen types are type II and III mixed

continental and marine organic matter. The thermal maturity of these formations indicates a

mature stage in oil window.

Oil saturation index (OSI: S1*100/TOC) shows that Sirte and Rachamt formations have

low oil saturation, while the Tagrifet formation has good potential, where OSI exceeds 140

mg HC/g TOC in the most samples of the formation. The Tagrifet formation considers a

good unconventional reservoir for shale oil, where the Sirte and Rachmat formations

  • consider possible for shale oil with high risk.

Salem Abdulghani Omar Aboglila, (01-2024), Journal of Basic Sciences (JBS): Libyan Academy, 37 (2), 145-168

Effective Cloud Security Policy: Best Practices and Case Study
Journal Article

The main purpose of cloud cryptography is to protect sensitive data without causing any delay in data transfer, various cryptographic protocols designed to balance data security and performance to secure data through encryption. One such approach is to encrypt the data before uploading it to the cloud.

This study proposes an effective framework for protecting small and medium companies (SMEs) from cybersecurity risks and threats. The framework evaluates the system of private encryption data in a server environment using the advanced encryption standard (AES) 128 algorithm and a virtual private network (VPN) tunnel. The goal is to secure data through encryption and ensure data transfer without causing delays. The framework includes a test case where data is transferred from a storage area network (SAN) storage to the cloud. To assess the system's performance and security, a penetration test using Kali Linux is conducted. The results of this study provide insights into securing SMEs' data and mitigating cybersecurity risks effectively.

Mohammed Alnaas, (11-2023), http://www.ijsred.com: International Journal of Scientific Research and Engineering Development, 6 (6), 1-7

Upgrading to 5G Networks: Existing Challenges and Potential Solutions
Journal Article

The introduction of the fifth generation (5G) networks indeed brings significant advancements in connectivity and has the potential to revolutionize various industries. The technologies that make 5G powerful include features such as faster speeds, reduced latency, increased capacity, and the ability to connect a wide range of devices and objects.

However, implementing 5G networks involves upgrading existing infrastructure and deploying new infrastructure, which can be both costly and time-consuming. This process requires significant investments from telecommunication companies to install new equipment and upgrade existing infrastructure to support 5G technology. Additionally, the deployment of 5G networks requires a substantial amount of radio spectrum, and regulatory frameworks need to be in place to allocate and manage the spectrum effectively. This paper provides an overview of 5G technologies, highlighting their key features and potential benefits. It also delves into the existing challenges that arise with the implementation of 5G networks and discusses some possible solutions to address these challenges.

Mohammed Alnaas, (11-2023), www.ijcseonline.org: International Journal of Computer Sciences and Engineering, 11 (11), 5-12

عزل وتشخيص البكتيريا المسببة للتلوث داخل صالة العمليات الجراحية بمستشفى صبراتة التعليمي
مقال في مجلة علمية

تلوث غرف العمليات الجراحية وعدوى المستشفيات بالأنواع الجرثومية يعتبر مــن الأسباب الرئيسية لوفاة المرضى. لذلك أجريت هذه الدراسة بمستشفى صبراتة التعليمي في الفترة من 12-6-2021 إلى 12-1-2022 بهدف عزل وتشخيص الأنواع البكتيرية التي تتواجد داخلها، كذلك لتحديد النوع البكتيري الأكثر انتشارا، حيث تم أخذ العينات من صالة العمليات الجراحية ( أحواض الغسيل، وصنبور المياه، وأيدي الكادر الطبي، وجدران الصالة، ومصابيح الإضاءة، ومقابض الأبواب، وعربة المعدات، وطاولات العمليات ) ، حيث تم تجميع 110 عينة و تحضينها، أظهرت النتائج أن أعلى معدل نمو للعينات كان 25.45 % للنوع البكتيري Staph.aureus ، وأقل معدل نمو كانت 8.20 % وهي التي نمت عليها بكتيريا Klebsiella, كذلك تبين أن البكتريا الأكثر نمو Staph.aureus كانت على طاولة العمليات الجراحية ومصابيح الإضاءة بنسبة 21.4% لكل منهما، أما بكتيريا E.Coli سجلت أعلى نمو على أيدي الكادر الطبي بنسبة 23.53%، وبكتيريا Pseudomonas كان لها اعلى معدل نمو للعينات التي جمعت من على طاولة العمليات بنسبة 25 %، وقد سجل أقل معدل نمو للعينات التي جمعت من مقابض الأبواب بنسبة 5% ، أما بكتيريا Klebsiella فكانت الأعلى معدل نمو للعينات التي جمعت من المياه وأيدي الكادر الطبي ومصباح الإضاءة بنسبة 22.22%، وبالنسبة للعينات التي جمعت من بكتيريا Strep.epidermids  فكان اعلى نمو للبكتيريا التي جمعت من عربة المعدات و طاولة العمليات بنسبة 21.43%%، وأقل معدل نمو كان على جدران العمليات ومصباح الإضاءة وحوض الغسيل ومقابض الأبواب بنسبة 7.14 %، نجد أن عينات عدم النمو والتي كان عددها 22 عينة فكانت النسبة الأعلى في المياه ) 27.27 %( والنسبة الأقل نمو للعينات التي جمعت من على عربة المعدات وطاولة العمليات وهي4.54 %. لذلك نوصي بالالتزام بالتعقيم الكامل لصالة العمليات الجراحية قبل دخول المرضى تفاديا لحدوث عدوى بكتيرية.

فتحي الهاشمي بشير علي، (10-2023)، المجلة الدولية للعلوم والتقنية: الجمعة الليبية للبجوث و الدراسات العلمية، 33 (1)، 1-14

Certificates of re recognition
Technical Report

Certificates of re recognition from world environment

Salem Abdulghani Omar Aboglila, (07-2023), Current world envoronment: Current world envoronment,