Masters Dissertations : Computer Science and Information Technology: Recent submissions

  • Mohamed, Mohamed Isam Aldin Babiker; Supervisor, -Ahmed Elsawi July (Sudan University of Science and Technology, 2018-08-30)
    Business is the most important fields in the world. Factors that effects on business are technology, competitions between companies and customer needs. The problem of the research concluded in the limitation of Customer ...
  • Adam, Fatima Abdalla Elhag; Supervisor, -Faisal Mohammed Abdalla Ali (Sudan University of Science and Technology, 2018-12-21)
    In this research, a new modified version of Tree Dimension Playfair (3D-Playfair) cipher algorithm is introduce to encrypt image. The new method is create (16 X 4 X 4) matrix based on the key being entered by the user to ...
  • Hummeida, Nisreen Salih; Supervisor, -Hwaida Ali Abdalgadir (Sudan University of Science and Technology, 2018-12-20)
    For long time summarization is done by human, but sometimes take long time to be done. Nowadays many researchers are going for text summarization automatically, which can be done by using some techniques. Deep learning ...
  • AbdAlrazig, HanadiSiddigGobara; Supervisor, -AdilYousif (Sudan University of Science and Technology, 2018-07-10)
    It's difficult to make a decision, without enough information because the databases in the branches of Sales department of National Paints factoryare not integrated for management of Information and decisions making. So ...
  • Arees, Islam Ali Abdulrahiem; Supervisor, -Fisal Muhammad Abdullah Ali (Sudan University of Science and Technology, 2019-02-12)
    An online payment system is an Internet-based method of processing economic transactions. It allows a vendor to selling and obtains payments over Internet. The main components of online payment system are: customer who ...
  • Wahab Allah, Mohammed Awad Allah Ahmed; Supervisor, Ali Ahmed Alfaki (Sudan University of Science and Technology, 2018-11-18)
    The main goal of this thesis was to propose a website quality evaluation model for academic websites to cover important factors that affect for quality of the educational websites. For this purpose, an extensive study of ...
  • Mohammed, Lemia Alamin Algmri; Supervisor, - Abd El hamid Abd El hadi Mansor (Sudan University of Science & Technology, 2019-03-01)
    software product line is a set of software-intensive systems that share a common, managed set of features satisfying the specific needs of a particular market segment or mission and that are developed from a common set of ...
  • Ali, Alaa Ramadan Suliman; Supervisor, - Almahdi Ibrahim; Co-Supervisor, - Arafat Abdulgader (Sudan University of Science & Technology, 2018-11-01)
    Software reusability is one of the quality attributes that illustrate the importance of software to software developers and the return of investment for this software. Accordingly, it is very important taking into consideration ...
  • Mohammed, Somaia Mohammed Ali; Supervisor, - Abuagla Babiker Mohammed Babiker (Sudan University of Science and Technology, 2019-03-10)
    Traditional IP networks are complex and very hard to manage. Software-Defined Networking (SDN) is an emerging paradigm that promises to change this state of affairs, separating the network’s control logic from the underlying ...
  • Idrees, Hajer Ibrahim Hassan; Supervisor, - Wafaa Faisal Mukhtar (Sudan University of Science and Technology, 2019-01-10)
    Data might be one of the most valuable assets of any corporation but only if it knows how to reveal valuable knowledge hidden in raw data. Data mining allows extracting precious knowledge from historical data, and predicting ...
  • Abdalla, Nosiba Altoom Adam; Supervisor, - Faisal Mohammed Abdalla Ali (Sudan University of Science and Technology, 2018-02-10)
    Password-based encryption methods are used to protect private data that is vulnerable to brute force attacks by giving a message that the key has been decrypted or the key is guessed is incorrect, which causes the attacker ...
  • Basi, Mahmoud Norain Mahmoud; Supervisor, - Mohammed Elghazali Hamza Khalil (Sudan University of Science and Technology, 2018-11-10)
    Continuous development in the world of technology and diversity of data sets containing individual information is growing exponentially as the computer technology; network connectivity and disk storage space become ...
  • Ahmed, Mofti Rafie Abdel-Ghani; Supervisor, - Faisal Mohamed Abdalla Ali (Sudan University of Science and Technology, 2019-02-10)
    Computer networks are being attacked every day. Intrusion detection systems (IDS) are used to detect and reduce effects of these attacks and it use two types of techniques signature based or anomaly based detection for ...
  • Shaikhedris, Solafa Salahaldin Ali; Supervisor, - Faisal Mohammed Abdalla Ali (Sudan University of Science and Technology, 2018-02-10)
    Honey pots and honey nets are secure unconventional tools to study techniques, methods, tools, and goals of attackers. Therefore, data analysis is an important part of honey pots and honey nets. Honey pots are devices ...
  • Abras, Suhaila Abdalla Awad; Supervisor, - Hozeifa Adam Abd Alshafy (Sudan University of Science and Technology, 2019-04-10)
    In light of the information revolution and rapid technological jumps which caused to increase use the digital images to develop large applications in visual communication systems, the target image is typically degraded ...
  • Alfaki, Malik Khalil Mohamed; Supervisor, - Mohammed Al-Ghazali Hamza Khalil (Sudan University of Science and Technology, 2018-08-10)
    Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then ...
  • NoorAldaim, Almonzer Salah; Supervisor, - Adil Ali Abdul-aziz (Sudan University of Science and Technology, 2019-02-10)
    Today with the development of technology and the trend of the Sudan government, Sudanese Universities convert the manual exam to e exam starting by four Universities(Alnealine University, Open Sudan University ,Alnhda ...
  • EL-Zain, El-Toma EL-Hadi Addam; Supervisor, -Faisal Mohammed Abd Alla Ali (Sudan University of Science and Technology, 2019-01-28)
    Keeping confidential data and hiding it from unauthorized people has become a real challenge during this time, cryptography play a major role for secured data transfer. Quick Response Code (QR Code) are 2-dimensional ...
  • Babiker, Lina Amir SedAhmed; Supervisor, - Niemah Izzeldin Mohamed Osman (Sudan University of Science & Technology, 2018-10-01)
    National roaming is an important service that Facilitates can lead us to do the best utilization of available resources between different telecommunication providers in the same country. Vehicle tracking services are ...
  • Mohammed, Omer Abdelmajeed Idrees; Supervisor, - Tariq Omer Fadl Elsid (Sudan University of Science & Technology, 2018-07-01)
    In 2013 the ministry of finance and economic established the budget management system, following the Sudanese national plan toward the E-government, this system is now absolutely outdated and hard to adapt any new changes ...

Share

Search SUST


Browse

My Account