College of Computer Science and Information Technology: Recent submissions

  • Eisa, Nada Ahmed Mohammednour; Supervisor, Ajith AbrahamJune (Sudan University of Science and Technology, 2016-08-10)
    Cloud computing has recently emerged as a new paradigm for hosting and delivering services to the customers over the Internet. A cloud computing system is a set of resources designed to be allocated ad hoc to run applications, ...
  • عثمان, إسراء عبد الحميد; مشرف, -عزالدين محمد عثمان (جامعة السودان للعلوم والتكنولوجيا, 2015-11-29)
    مجلس مهن نظم الحاسوب السوداني مجلس مهني أقر قانونه في عام 2011 ليقوم بتنظيم مهنه نظم الحاسوب وتقانة المعلومات. وسيقوم المجلس بتسجيل كل المنتمين للمهنه والسعى معهم للارتقاء بالمهنه وتنظيمها. وفي هذا البحث ينشئ الباحث موقعاً ...
  • Mohammed, Mohammed Elfatih Taj elsirAbdelraouf; Supervisor, - Dieter Fritsch (Sudan University of Science and Technology, 2016-05-27)
    Telecommunications today is one of the most important means of sharing information and data, to get out of the small space to the great world, so that the world has become a small village through the signals provided by ...
  • Bagabir, Musab Mohammed Ali Omer; Supervisor, - Mohamed Elhafiz Mustafa Musa; Co - Supervisor, - Siti Mariyam Shamsuddin (Sudan University of Science and Technology, 2016-09-03)
    Vehicle license plate recognition is a computer vision method that aims to automatically recognize the vehicle’s identification number from the vehicle image. Therefore, it is an important component for automating many ...
  • Ali, Aimen Abdel Aziz Hussein; Supervisor, Ammar Thabit Zahary (Sudan University of Science and Technology, 2015-05-10)
    In the capital markets, things happen fast. The markets move fast, positions change fast. Reacting quickly is the key to increase profit and/or managing risk. Enterprises need to adapt their processes to any observed changes ...
  • خليفة, فاطمة الشيخ سيدأحمد; مشرف, - أسامة أحمد إبراهيم (جامعة السودان للعلوم والتكنولوجيا, 2016-06-14)
    نظام إدارة علاقات العملاء هو نهج لإدارة تفاعل الشركة مع العملاء الحاليين والمستقبليين. يعمل هذا النهج على تحليل بيانات تاريخ العملاء مع الشركة من أجل تحسين أفضل علاقات تجارية مع العملاء، مع التركيز بشكل خاص على الاحتفاظ ...
  • ALI, AWADALLAH MOHAMMED AHMED; Supervisor, Aisha Hassan Abdallah Hashim (Sudan University of Science and Technology, 2016-01-10)
    Recently, Wireless Mesh Network (WMN) has gained important roles in current communication technologies. It has been used in several applications and most of them are critical applications such as surveillance, transportation ...
  • Osman, Hind Abdullah; Supervisor, Abuagla Babiker Mohamed (Sudan University of Science and Technology, 2016-07-10)
    Confidential and reliable information delivery is considered as one of the essential requirements that must be available in every area of life. The effective design as well as the implementation of efficient tools for ...
  • ELHEBIR, MOHAMMED HAMED AHMED; Supervisor, Ajith Abraham (Sudan University of Science and Technology, 2016-05-10)
    Web Usage Mining (WUM) can be defined as an application of data mining to extract the knowledge hidden in the Web log files, such as user access patterns from Web data. However, the structure of these log files does not ...
  • Saeid, Areej Mohamed Osman Mohamed; Supervisor, Niemah Izzeldin Mohamed Osman (Sudan University of Science and Technology, 2016-04-10)
    The increasing demand for video services has made video caching a necessity to decrease download times and reduce Internet traffic. In addition, it is very important to store the right content at the right time in caches ...
  • AHMED, SARA MOHAMMED ABDALRAHIM; Supervisor, - FAISAL MOHAMMED ABDALLA (Sudan University of Science and Technology, 2016-08-05)
    Now a days, cloud computing is one of the dominant methods used forproviding computing infrastructure for Internet services, Cloud computing offerscomputing and software services on demand by connecting to computing resources ...
  • Rudwan, Mohammed Suleiman Mohammed; Supervisor, Salah El-Dinn Deng AlJack (Sudan University of Science and Technology, 2016-03-10)
    Database Transactions are pieces of information which holds operations that are performed on the database. They became a very critical issue that should be carefully stored and secured while they are under process, and ...
  • Basher, Nora Abdalla Hassan; Supervisor, Awad Mohamed Awadelkarim (Sudan University of Science and Technology, 2016-05-10)
  • Abdallah, Hajir Musa Ahmed; Supervisor, Faisal Mohammed Abdallah (Sudan University of Science and Technology, 2016-05-10)
    The increase use of the electronic communication demands more security on the exchange of the critical information. cryptography now a day’s get more and more important to address this issue. encryption algorithms available ...
  • أحمد, طلال عمر محمد; مشرف, محمود على أحمد (جامعة السودان للعلوم والتكنولوجيا, 2016-06-10)
    يتناول البحث واحدة من أهم مراحل هندسة البرمجيات وهى هندسة المتطلبات التى يتوقف عليها نجاح المشروع البرمجى. يهدف البحث إلى الوصول لكتابة المتطلبات البرمجية بصورة صحيحة لإنتاج المنتج البرمجى الجيد الذى يحقق رغبات المستخدمين، ...
  • Ahmed, Ayat Awad Hassan; Supervisor, Osama Ahmed Ibrahim (Sudan University of Science and Technology, 2016-05-10)
    As the banks grew in size and expanded geographically, the volume of transactions and customer information became quite large, the banking industry need Business Intelligence (BI) computer software ...
  • Ghorashi, Sara Abdelwahab Abdelghani; Supervisor, Ajith Abraham (Sudan University of Science and Technology, 2016-07-10)
    Assessing risk in a computational grid environment is an essential need for a user who runs applications from a remote machine on the grid, where resource sharing is the main concern. As grid computing is the ultimate ...
  • العقاد, محمد فوزي اسماعيل; مشرف, اسماعيل الأزهري (جامعة السودان للعلوم والتكنولوجيا, 2016-05-10)
    البحث الحالي اكتشف علاقة صم، مخطط انتقال الحالات وحركة ذهن ، المتعلم اثناء تلقيه احداث التعليم، ومن ثم استخدام منهجية رياضية لاشتقاق توليد الشاشات التعليمية التي تعتمد على مخطط انتقال الحالات.... فالىمة ...
  • Abdelrehman, Ahmed Adam Ahmed; Supervisor, Naomie Binti Salim (Sudan University of Science and Technology, 2016-04-10)
    This thesis aims to design a new recommendation system to be used by web application to recommend interesting items to users. Recently, many web applications are created and published in the internet to allow their users ...
  • Babiker, Khadiga Mohammed Adam; Supervisor, Faisal Mohammed Abdalla Ali (Sudan University of Science and Technology, 2016-03-10)
    In this research, a new extension of the Playfair cipher algorithm to encrypt images safer manner. The new method is created matrix of 16 × 16 based on the key being entered by the user to become more secretive, and then ...

Share

Search SUST


Browse

My Account