SUST Repository

College of Computer Science and Information Technology

College of Computer Science and Information Technology

Recent Submissions

  • Ahmed, Abdelbaset Abdelmotal Mohamed; Supervised, -Dieter Fritsch (Sudan University of Science and Technology, 2017-10-02)
    This research presents a transportation network analysis and design by using the capabilities of a Geographic Information System (GIS). Advancing the GIS basic technologies, we are using the network analyst in Arc GISto ...
  • Ahmed, Shiraz Sid Ahmed Mohamed; Supervisor, - Dieter Fritsch (Sudan University of Science and Technology, 2016-02-10)
    This study aims to solve the problem of communications and providing good customer service for the Sudanese Electricity Distribution Company ”SEDC”, through the use of Map Navigation and Geographic Information System (GIS) ...
  • Abdalraheem, Hala Mustafa; Supervisor, - Talaat Mohielddin Wahby (Sudan University of Science and Technology, 2017-07-10)
    Steganography is the hiding for important and different structure of information in other medium without discovered method by unauthorized. In this research, a system have been proposed to enhance data hiding scheme using ...
  • Hassan, Samah Mohamed Osman; Supervised, -Eric Atwell (Sudan University of Science and Technology, 2017-08-12)
    Information retrieval (IR) systems retrieve relevant information relating to a specific query by the user, and this requires the extraction of related unstructured information from data which may be texts, sound, images. ...
  • Tatai, Abdelmagid Gafer Abdelmagid; Supervised, -Faisal Mohammed Abdallah (Sudan University of Science and Technology, 2017-07-24)
    Authentication is the process of verifying a user’s identity when the user is requesting services from any secure IT system, the default for all user logons whether local or remote has always been reliant upon the humble ...
  • Hummaida, Nosayba Mustafa; Supervisor, -Ali Ahmed AlfakiAbdalla (Sudan University of Science and Technology, 2017-07-21)
    Breast cancer is the disease most common malignancy affects female population and the number of affected people is the second most common leading cause of cancer deaths among all cancer types in the developing countries. ...
  • Elkhalig, Badr Khalid Gasm; Supervisor, -Talaat Mohielddin Wahby (Sudan University of Science and Technology, 2017-07-24)
    In a world of digital technology, maintaining the security of the secret data has become a great challenge. One way to achieve this is to encrypt the message before it is sent. But encryption draws the attention of third ...
  • سليمان, الجيلي كباشي إبراهيم; مشرف, محمدالحافظ مصطفي موسي زين العابدين (جامعة السودان للعلوم والتكنلوجيا, 2017-08-21)
    الشركات في الوقت الحالي غنية بكميات هائلة من البيانات ولكنها ضعيفة في المعلومات المستخرجة من البيانات. وتعتبر هذه البيانات الضخمة مصدرا قيما، ورغم أن مفهوم تنقيب البيانات لا يزال جديدا، فإن العديد من الشركات الدولية أصبحت ...
  • Adany, Mohamed Adany Hamdelsayed; Supervisor, - Eric S Atwell (Sudan University of Science and Technology, 2017-08-10)
    This thesis investigates Question answering system in general and then applying it in a specific domain: Arabic language and Holy Quran. A corpus of questions and answers from Albagarah and Alfatihah chapters was built, ...
  • Elmedani, Mohammed Khalil Abdalla; Supervisor, - Rashid A. Saeed (Sudan University of Science and Technology, 2017-08-10)
    Software-defined network continues to be one of the most hyped technology evolutions in information and communication technology compare to all traditional and perfuse network technologies. These traditional networks ...
  • Altybe, Aljaily Mamoun Hassan; Supervisor, - Faiz Yousif Mohammed Yousif (Sudan University of Science & Technology, 2017-07-04)
    One of the most important characteristics of file compression is to preserve memory with all its temporary and permanent images, in addition to maintaining the speed of performance in the process of compression and ...
  • Ali, Tarig Mohammed Ibrahim; Supervisor, - Nisreen Beshir Osman (Sudan University of Science and Technology, 2017-02-10)
    As the technology continuous to advance, new technologies have emerged with the capability to revolutionize knowledge sharing practices. Web 2.0 exemplifies such new technologies, which provides dynamic way of interaction. ...
  • Saidahmed, Salma Osman Alhuseen; Supervisor, - Osama Ahmed Ibrahim (Sudan University of Science and Technology, 2017-03-10)
    Micropayment systems are used to purchase online products and services such as e-books, music, and Web-based content that are available for small sum of money (cents and fraction of cent). Micropayment systems worldwide ...
  • Ali, Sara Ahmed Abdelrahman; Supervisor, - Osama Ahmed Ibrahim (Sudan University of Science and Technology, 2017-03-10)
    Quality of the software is critical and essential, in some types of software, poor quality may lead to loss of human life, financial loss and more, one of software types is E-commerce systems. Research objective is proposing ...
  • Othman, Hanaa Sameeh A.Aziz; Supervisor, - Mohamed ElHafiz Mustafa (Sudan University of Science and Technology, 2017-03-10)
    The Imbalance Multi-class learning problem is one of the challenging problems in supervised machine learning. The imbalance nature of the data – which is owning skewed distribution of samples in different classes –as well ...
  • Ahmed, Ghazi Hashim Abd Elrahman Mohamed (Sudan University of Science and Technology, 2017-06-10)
    Computer Science Unplugged is a set of activities used to show the children the kind of thinking that is expected by computer scientists in a funny and engaging way to help introduce computer science basics as early ...
  • Ahmed, Rawia Ibrahim Omer (Sudan University of Science and Technology, 2017-05-10)
    The researches in Optical Character Recognition (OCR) area by using Hidden Markov Models (HMMs) are continuing until this moment. The work presented in this thesis is proposed for recognition of offline isolated Arabic ...
  • Mustafa, Neama Hassan Mahmoud (Sudan University of Science and Technology, 2017-03-10)
    Steganography is the hiding of important and different structure of information in other medium without discovered method by unauthorized. In this research, we proposed a data hiding scheme using multilevel image steganography ...
  • Mohammed, Ali Abd Alftah Fadl (Sudan University of Science and Technology, 2017-04-10)
    Tacit knowledge represents a major challenge in the retrieval and storage. Implementation of knowledge management system (KMS) in university sector in order to make this knowledge available in a shared knowledge base is ...
  • Ahmed, Nahla Murtada (Sudan University of Science and Technology, 2017-01-10)
    Cloud computing offers an innovative business model for all cloud enterprises to serve IT services with no need to have technical details. The extreme growth of cloud usage increases the probability of threats occurrence, ...

View more