Browsing Faculty of Information Technology by Title

Now showing items 8-27 of 181

  • Barriers Associated With the Implementation and Adoption of Electronic Health Records (Ehrs) At Alkiesh Polyclinic in Benghazi 

    Faraj El-harish, Salma (Libyan International Medical University, 2020)
    Background: In the course of the last 20 years, a visible advance in information technology have been recognized particularly in the area of health. Electronic health records is one of the many enlargements, it's considered ...
  • Basics of information system 

    ALferjani, Laith (The Libyan International Medical University - Faculty Of Information Technology, 2021-02-07)
    the study or use of technology for storing, retrieving, and sending information.
  • A Bird’s Eye View on Aspect Oriented Requirements Engineering 

    Alshareef, Sohil; Maatuk, Abdelsalam; Abdelaziz, Tawfig; Aljawarneh, Shadi (IEEE, 2022-07-04)
    Aspect-oriented software development builds on the concept of separation of concerns. It is concerned with addressing and handling the scattering and tangling issues related to the object-oriented paradigm. The traditional ...
  • Blood Pressure& Glucose Registry 

    Alanezi, Taha (Libyan International Medical university "Faculty of Information Technology", 2017-11-14)
  • Business Management Process - BMP 

    Staff, BMP (Libyan International Medical University, 2024-02-08)
    This workshop aims to introduce the University Operations Management project and its objectives, as well as familiarize participants with the fundamental concepts of business process management. It aims to create awareness ...
  • Buying New Computer 

    Ali, Sanad (Libyan International Medical university "Faculty of Information Technology", 2017-11-21)
  • Clinical system - Maryam 

    Almalik, Maryam (Faculty of Information Technology, 2019)
    It is a system that allows the user to enter some information about a patient, doctor, nurse and an intern.
  • Comparative Analysis between Three Open-source of Network Intrusion Detection System 

    H.Eljawhry, Duaa (The Libyan International Medical University - Faculty Of Information Technology, 2021-03-10)
    Many companies offer IT services to the public. Most of those services must be protected. The amount of computer threats are increasing rapidly and many attacks can be generated. Companies that can buy expensive security ...
  • A Comparative Study of Network Access Control and Software-Defined Perimeter 

    Omar, Rami; Abdelaziz, Tawfig (2021)
    This paper is intended to conduct a comparison between two access control solutions, to determine which is most suitable for the infrastructure of modern computer networks. These two solutions are the software-defined ...
  • Comparative study of “Linux server” and “Microsoft server” 

    M. Alfakhri, Ibrahem (The Libyan International Medical University - Faculty Of Information Technology, 2021-03-10)
    A server is a computer designed to process requests and deliver data to another computer over the internet or a local network. Although any computer running the necessary software can function as a server, the most typical ...
  • Comparison of Data Transmission Using Light and Wireless Fidelities (Li-Fi vs. Wi-Fi) 

    ELDEEB, MUNYA (Libyan International Medical University, Faculty of Information Technology, 2019-05-17)
    Wi-Fi has been great but it's already being outdone in 5G tests and now on a more local scale Li-Fi is 100 times faster, and more secure. The 4G or 5G Long Term Evolution (LTE) would finish off Wi-Fi once and for all, Li-Fi ...
  • Computer 

    Farkash, Kadeeja (Libyan International Medical university "Faculty of Information Technology", 2017-11-15)
  • COMPUTER NETWORK 

    H.NABBOUS, MUSTAFA (Libyan International Medical university "Faculty of Information Technology", 2018-04-07)
  • COMPUTER NETWORK 

    Darbi, Mariam (Libyan International Medical university "Faculty of Information Technology", 2018-04-07)
  • Computer crime 

    Al Fazzani, Ibrahim; Al Fazzani, Ibrahim (The Libyan International Medical University - Faculty Of Information Technology, 2020-12-11)
    1/LIST TYPES OF CRIME Unauthorized access malware, including spyware and viruses rogue programs such as time bombs, logic bombs, worms, and Trojan horses fraud and theft (password theft)
  • COMPUTER CRIME 

    AHMED, RABI (The Libyan International Medical University - Faculty Of Information Technology, 2020-12-20)
  • Computer crimes 

    ALferjani, Laith; jowjary, Mohamed (The Libyan International Medical University - Faculty Of Information Technology, 2021-02-07)
  • Computer crimes 

    baltu, Mohanned (Faculty of Information Technology, 2022-06-18)
    Identity Theft Malware Rogue Programs Fraud, Theft, and Piracy Cyber Gaming Crime Tricks for Obtaining Passwords Forgery Internet Scams Salami Shaving and Data Diddling
  • Computer network 

    ALTARHONY, AHMED (Faculty Of Information Technology At The Libyan International Medical University, 2020-11-15)
    A network is a group of two or more computer systems linked together to exchange data and share resources, such as high-performance laser printers. By use of network, people and businesses are able to communicate, collaborate ...
  • COMPUTER NETWORK 

    AL GHAZALI, ALI (The Libyan International Medical University - Faculty Of Information Technology, 2020-12-15)