College of Computer Science and Information Technology: Recent submissions

  • Wahab Allah, Mohammed Awad Allah Ahmed; Supervisor, Ali Ahmed Alfaki (Sudan University of Science and Technology, 2018-11-18)
    The main goal of this thesis was to propose a website quality evaluation model for academic websites to cover important factors that affect for quality of the educational websites. For this purpose, an extensive study of ...
  • Mohammed, Lemia Alamin Algmri; Supervisor, - Abd El hamid Abd El hadi Mansor (Sudan University of Science & Technology, 2019-03-01)
    software product line is a set of software-intensive systems that share a common, managed set of features satisfying the specific needs of a particular market segment or mission and that are developed from a common set of ...
  • Sharaf Eldein, Amar Ibrahim Elhaj; Supervisor, - Hany Hussein Ammar (Sudan University of Science & Technology, 2019-03-01)
    Cloud computing has recently emerged as a new technology paradigm for hosting and delivering Information Technology (IT) services to users over the Internet. Cloud Computing provide optimal and efficient computing through ...
  • Ali, Alaa Ramadan Suliman; Supervisor, - Almahdi Ibrahim; Co-Supervisor, - Arafat Abdulgader (Sudan University of Science & Technology, 2018-11-01)
    Software reusability is one of the quality attributes that illustrate the importance of software to software developers and the return of investment for this software. Accordingly, it is very important taking into consideration ...
  • Mohammed, Somaia Mohammed Ali; Supervisor, - Abuagla Babiker Mohammed Babiker (Sudan University of Science and Technology, 2019-03-10)
    Traditional IP networks are complex and very hard to manage. Software-Defined Networking (SDN) is an emerging paradigm that promises to change this state of affairs, separating the network’s control logic from the underlying ...
  • Idrees, Hajer Ibrahim Hassan; Supervisor, - Wafaa Faisal Mukhtar (Sudan University of Science and Technology, 2019-01-10)
    Data might be one of the most valuable assets of any corporation but only if it knows how to reveal valuable knowledge hidden in raw data. Data mining allows extracting precious knowledge from historical data, and predicting ...
  • Abdalla, Nosiba Altoom Adam; Supervisor, - Faisal Mohammed Abdalla Ali (Sudan University of Science and Technology, 2018-02-10)
    Password-based encryption methods are used to protect private data that is vulnerable to brute force attacks by giving a message that the key has been decrypted or the key is guessed is incorrect, which causes the attacker ...
  • Basi, Mahmoud Norain Mahmoud; Supervisor, - Mohammed Elghazali Hamza Khalil (Sudan University of Science and Technology, 2018-11-10)
    Continuous development in the world of technology and diversity of data sets containing individual information is growing exponentially as the computer technology; network connectivity and disk storage space become ...
  • Ahmed, Mofti Rafie Abdel-Ghani; Supervisor, - Faisal Mohamed Abdalla Ali (Sudan University of Science and Technology, 2019-02-10)
    Computer networks are being attacked every day. Intrusion detection systems (IDS) are used to detect and reduce effects of these attacks and it use two types of techniques signature based or anomaly based detection for ...
  • Shaikhedris, Solafa Salahaldin Ali; Supervisor, - Faisal Mohammed Abdalla Ali (Sudan University of Science and Technology, 2018-02-10)
    Honey pots and honey nets are secure unconventional tools to study techniques, methods, tools, and goals of attackers. Therefore, data analysis is an important part of honey pots and honey nets. Honey pots are devices ...
  • Abras, Suhaila Abdalla Awad; Supervisor, - Hozeifa Adam Abd Alshafy (Sudan University of Science and Technology, 2019-04-10)
    In light of the information revolution and rapid technological jumps which caused to increase use the digital images to develop large applications in visual communication systems, the target image is typically degraded ...
  • Idris, Inshirah AbdElrahman Mohamed; Supervisor, - Mohamed Elhafiz (Sudan University of Science and Technology, 2019-02-10)
    Human-computer interaction (HCI) has become one of the most challenging areas of research in the field of artificial intelligent (AI) at the present time. Speech emotion recognition (SER) introduces a new means of ...
  • Alfaki, Malik Khalil Mohamed; Supervisor, - Mohammed Al-Ghazali Hamza Khalil (Sudan University of Science and Technology, 2018-08-10)
    Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then ...
  • NoorAldaim, Almonzer Salah; Supervisor, - Adil Ali Abdul-aziz (Sudan University of Science and Technology, 2019-02-10)
    Today with the development of technology and the trend of the Sudan government, Sudanese Universities convert the manual exam to e exam starting by four Universities(Alnealine University, Open Sudan University ,Alnhda ...
  • Ahmed, Hadia Abbas Mohammed Elsied; Supervisor, - Naomie Binti Salim (Sudan University of Science & Technology, 2019-03-01)
    Documents which are retrieved there on the internet through online search often come with a large amount of text. In the context of news documents, different news sources reporting on the same event usually contain common ...
  • EL-Zain, El-Toma EL-Hadi Addam; Supervisor, -Faisal Mohammed Abd Alla Ali (Sudan University of Science and Technology, 2019-01-28)
    Keeping confidential data and hiding it from unauthorized people has become a real challenge during this time, cryptography play a major role for secured data transfer. Quick Response Code (QR Code) are 2-dimensional ...
  • Khogali, Ishraga Mohamed Ahmed; Supervisor, - Hany Ammar (Sudan University of Science & Technology, 2018-12-01)
    Cloud computing has been one of the major emerging technologies in recent years. However, cloud computing presents an added level of risk because essential services are often outsourced to a third party, which makes it ...
  • Osman, Malak Abdelwheed; Supervisor, - Adnan K. Shaout (Sudan University of Science & Technology, 2018-07-01)
    This dissertation investigates the issues of guidance for pilgrims and how to make it more suitable for groups of pilgrims who navigate in unfamiliar areas. The dissertation will explore how to provide aid to pilgrims in ...
  • Jebreel, Tawfeeg Suliman Noor; Supervisor, - Is-Haka Mkwawa; Co – Supervisor, - Niemah Izzeldin osman (Sudan University of Science & Technology, 2018-09-01)
    Internet of Things applications such as environmental monitoring and healthcare may involve multimedia communications from IoT devices to humans for decision-making. Therefore, the delivered multimedia should be in good ...
  • Mahmoud, Mukhtar Mohamed Edris; Supervisor, - Joel J. P. C. Rodrigues (Sudan University of Science & Technology, 2018-08-01)
    The Internet-of-Things (IoT) represents the next groundbreaking change in information and communication technology (ICT) after the Internet. IoT is concerned with making everything connected and accessible through the ...

Share

Search SUST


Browse

My Account