Faculty of Information Technology

More ...

About Faculty of Information Technology

Faculty of Information Technology

The Faculty of Information Technology is one of the most recent faculties at the University of Tripoli, as it was established in pursuant to the former General People's Committee for Higher Education Decision No. 535 of 2007 regarding the creation of Information Technology Faculties in the main universities in Libya.


Upon its establishment, the Faculty consisted of three departments: Computer Networks Department, Computer Science Department and Software Engineering Department. It now includes five departments: Mobile Computing Department, Computer Network Department, Internet Technologies Department, Information Systems Department and Software Engineering Department.


The Faculty’s study system follows the open semester system by two (Fall and Spring) terms per year. The Faculty began to actually accept students and teach with the beginning of the Fall semester 2008. It grants a specialized (university) degree in information technology in any of the aforementioned disciplines. Obtaining the degree requires the successful completion of at least 135 credit hours. Arabic is the language of study in the college, and English may be also used alongside it. It takes eight semesters to graduate from the Faculty if Information Technology.


The Faculty aspires to open postgraduate programs in the departments of computer networks and software engineering in the near future.

Faculty of Information Technology Announcements

More Annuncements


There's more than 200 program

بكالوريوس في تقنية المعلومات
Major هندسة البرمجيات


No Translation Found
Major No Translation Found

No Translation Found...




Who works at the Faculty of Information Technology

Faculty of Information Technology has more than 29 academic staff members

staff photo

Dr. Rudwan Ali Belgasim Husain

د. رضوان حسين أستاذاً مشاركاً عضواً بهيئة التدريس عند قسم هندسة البرمجيات في كلية تقنية المعلومات بجامعة طرابلس. د. رضوان له العديد من المنشورات العلمية في مجال تخصصه ومجالات أخرى. كان الدكتور رئيساً لقسم هندسة البرمجيات لمدة أربع أعوام جامعية من خريف 2013 إلى نهاية ربيع 2017, وكان أيضاً رئيس فريق تطوير منهج القسم ضمن لجنة تطوير مناهج كلية تقنية المعلومات. هو عضو مؤسس في الجمعية الليبية للاستشعار عن بعد ونظم المعلومات الجغرافية, وهو عضو بجمعية أمل الغد لأطفال التوحد, و عضو مؤسس في جمعية السلامة لأعمال مخلفات الحروب. يهتم د. رضوان بنمذجة الأنظمة المركبة (المعقدة) والذكاء الاصطناعي, معالجة الصور والوسائط المتعددة, وتطوير نظم المعلومات الجغرافية.


Some of publications in Faculty of Information Technology

Multiprotocol Label Switching

Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of the OSI model; for this reason, MPLS has been referred to as operating at Layer 2.5. MPLS can overlay existing technologies such as Asynchronous Transfer Mode (ATM) or Frame Relay, or it can operate in an entirely IP native environment; this can allow users to take advantage of existing Customer Premises Equipment (CPE) while making a move towards converging all network traffic, such as data, video and voice, at a pace that users can accommodate and afford. MPLS provides. its users a number of advantageous features such as traffic engineering, network convergence, failure protection, and the ability to guarantee Quality of Service (QoS) over IP. arabic 2 English 27
Mariam Abojela Msaad, Amer R. Zerek , Wesam M. Tohamei(1-2012)
Publisher's website

Studying and Investigation of Virtual Private Networking

Virtual Private Network (VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to establish a virtual private “tunnel” to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. A VPN is a communications environment in which access is controlled to permit peer connections only within a defined community of interest, and is constructed though some form of partitioning of a common underlying communications medium, where this underlying communications medium provides services to the network on a nonexclusive basis. arabic 6 English 50
Mariam Abojela Msaad, Amer R. Zerek, Hana H. saleh(1-2012)
Publisher's website

Most Common and Reliable Traits for Fusion of Biometrics

Biometrics technologies have been around for quite some time and many have been deployed for different applications all around the world, ranging from small companies' time and attendance systems to access control systems for nuclear facilities. Biometrics offer a reliable solution for the establishment of the distinctiveness of identity based on "who an individual is", rather than what he or she knows or carries. Biometric Systems automatically verify a person's identity based on his anatomical and behavioral characteristics. Biometric traits represent a strong and undeviating link between a person and his identity, these traits cannot be easily lost or forgotten or faked. Since biometric systems require the user to be present at the time of authentication. Some biometric systems are more reliable than others, yet biometric systems are neither secure nor accurate, all biometrics have their strengths and weaknesses. Although some of these systems have shown reliability and solidarity, work still has to be done to improve the quality of service they provide. In this paper we present the most common and reliable known biometric systems suitable for Multimodal Biometrics Fusion, providing highly efficient and secure systems, showing their strengths and weaknesses and also presenting technologies in which may have great benefits for security applications in the near future.
Abdulmonam Omar Ahmed Alaswad, Ihab Meftah Elfituri, Fawzia Elhashmi Mohamad(0-2014)
Publisher's website