College of Computer Science and Information Technology: Recent submissions

  • Ismail, Abdelraheem Abdalla Ahmed; Supervisor, -Almhdi Ibrahim Khojali Mohi-Eldeen (Sudan University of Science and Technology, 2018-09-29)
    The Sudanese banking sector have already starting automating most of its business processes through modern core banking systems, however, the services provided by selected core banking systems don’t effectively satisfy ...
  • Ali, MaiOrnerAlsadeg; Supervisor, -FaisalMohammedAbdallahAli (Sudan University of Science and Technology, 2018-12-20)
    Visual cryptography is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations, the basic concept of visual cryptography is ...
  • Abakar, Mehad Ibrahim Alamin; Supervisor, -Mubarak Mohammed Ahmed (Sudan University of Science and Technology, 2020-02-12)
    Banks face lots of challenges associated with the bank loan, Nowadays there are many risks related to microfinance in bank sector. Every year, we face number of cases where people do not repay most of the microfinance ...
  • Mohammed, Salma Ali; Supervisor, -ShazaMerghani (Sudan University of Science and Technology, 2020-02-11)
    Data mining is the automatic search of huge data to discover patterns and trends that go beyond simple analysis. The high rate of student’s failure is one of the major problems and represents a worry for many universities ...
  • Hamid, Mohammed Hamouda Karboos; Supervisor, - Robert M Colomb; Co-Supervisor, - Abdelgafar Hamid Ahmed (Sudan University of Science and Technology, 2019-04-01)
    The Unified Modeling Language (UML) activity model is widely accepted for modeling business processes from purely technical views. Because it is rich high level design language and supported by standard body; Object ...
  • الأمين, ولاء مصطفى أحمد محمد; مشرف, - أسامه أحمد إبراهيم (جامعة السودان للعلوم والتكنولوجيا, 2019-04-01)
    جاءت تكنولوجيا الحوسبة السحابية كواحدة من أكثر التقنيات الافتراضية للمكتبات لتقديم الخدمات بطريقة فعالة ومزايا عظيمة لتوصيل خدماتها وامتيازاتها ليس فقط على الفور ولكن أيضًا في أشكال جديدة مع المرونة لتحسين الخدمات من خلال ...
  • Naem, Esraa Awad Alhaj; Supervisor, - Faisal Mohammed Abdallah (Sudan University of Science and Technology, 2020-08-01)
    The authentication is one of the top topics in security field, therefore many methods were provided, and the most famous method is text password. It has been used for decades but stills sensible for many attacks and has ...
  • Abdallah, Kamal Mohammed Issa; Supervisor, - Dieter Fritsch (Sudan University of Science and Technology, 2018-10-01)
    The nations always pay a great attention to their cultural heritage, they are focusing on preserving it against gradual changes and damages caused accidently by humans or due to natural disasters. The National Museum of ...
  • Ismail, Abeer Mohammed Kheir Osman; Supervisor, - Mohamed Adany Hamdd Sayed (Sudan University of Science and Technology, 2019-07-01)
    Automatic speech recognition (ASR) plays an important role in taking technology to the people. There are numerous applications of speech recognition such as direct voice input in aircraft, data entry and speech-to-text ...
  • Hamid, Sufian Abu Elgasim Suliman; Supervisor, - Nisreen Beshir Osman (Sudan University of Science and Technology, 2019-04-01)
    Mobile learning (m-learning) as a kind of learning model allowing learners to obtain learning materials anywhere and anytime using mobile technologies and the Internet. The quality of mobile learning systems is one of the ...
  • Eldaleel, Maaza Eldaleel Mustafa; Supervisor, - Mohamed El-Ghazali Hamza Khalil (Sudan University of Science and Technology, 2019-11-01)
    Continuous improvement is a key factor for survival in today’s turbulent business environment. Correspondingly, in today’s business world, software is everywhere. In the whole process of software development, testing is a ...
  • Osman, Samia Abdelmonim; Supervisor, - Talaat Mohiuddin Wahbe (Sudan University of Science and Technology, 2018-09-01)
    During Enterprise Resource Planning system lifetime, the response time increasing while the amount of data is increasing because data is retrieving from the relational database, where the more data to be processed the ...
  • Elamin, Amel Elamin Elsheikh; Supervisor, - Faisal Mohammed Abdallah Ali (Sudan University of Science & Technology, 2019-12-01)
    Many methods are used to securely transfer data, but the greatest challenge is to be careful of being detected by the intended recipient. The most famous methods are encryption and steganography. Encryption method draws ...
  • Osman, Sara Ahmed Mohamed; Supervisor, -AbdelhamidMansor (Sudan University of Science and Technology, 2018-06-15)
    A software requirements specification (SRS) contains all the requirements for a system-to-be. These are typically separated into functional requirements (FR), which describe the features of the system under development, ...
  • AHMED, HANAN AHMED ALI; Supervisor, Nadir Kamal Salih (Sudan University of Science and Technology, 2019-07-10)
    In the field of computer applications when be there need for design application to present certain service for specific customer, this application must design in care of how satisfy customer needs, therefore any application ...
  • Ahmed, Mohammed Ashraf Ibrahim; Supervisor, - Nisreen Beshir Osman (Sudan University of Science and Technology, 2018-12-10)
    Sudan Customs uses “ASYCUDA” [2] software for customs clearance, it follows the architecture of n-tier, the application is split into three separate units in a make server and the user's PC share their messages through the ...
  • Dawood, Omer Salih; Supervisor, - Abd-Alkader Sahroui (Sudan University of Science & Technology, 2019-01-01)
    Requirements engineering is an essential phase in software development, in this phase, the requirements gathered, analyzed, verified and documented is to be used in next phases. Management of requirements ensures high ...
  • Ibrahim, Tayseer Izeldien Mohamed; Supervisor, - Dieter Fritsch (Sudan University of Science & Technology, 2019-08-01)
    Rapid communication during disaster occurred is very crucial for both rescue team and victims. In real world scenarios detecting such emergencies and reporting them is a real challenge. Anyone in emergency circumstance ...
  • عبدالله, عايده محمد الحسن; مشرف, - أسامة احمد ابراهيم (جامعة السودان للعلوم والتكنولوجيا, 2018-01)
    نسبة للتطوير السريع فى البرمجيات وإستخدامها فى جميع وسائل الحياة لابد من عملية إختبار للبرمجيات بناءاً على المواصفات والمقاييس العالمية للبرمجيات وتكمن مشكلة البحث فى انه عدم اختبار البرمجيات فى الشركات قبل البدء فى العمل ...
  • Ibrahim, Mozdalefa Abdalla; Supervisor, - Albaraa Abuobieda Mohammed (Sudan University of Science & Technology, 2019-01-01)
    In today’s world, gigantic amount of data is available in medical domain, science, industry, business and many other areas. The data can provide valuable information which can be used by management for making important ...

Share

Search SUST


Browse

My Account