Masters Dissertations : Computer Science and Information Technology: Recent submissions

  • Nssr, Safaa Omer Mohammed; Supervisor,- Howida Ali Abdel Gader (Sudan University of Science and Technology, 2016-10-10)
    Voice recognition is considered as one of the most important aspects of machine learning domain. But it still has limited and modest applications in Arabic language. The Holy Quran is the largest container of Arabic language ...
  • Hamed, Reem Suliman Idriss; Supervisor, Dieter Fritsch (Sudan University of Science and Technology, 2016-07-10)
    The study aims at finding the optimal locations for new Automated Teller Machines (ATMs) for the banks in Khartoum area through the use of Geographic Information System (GIS) technology. It is well-known, that GIS plays ...
  • الشريف, أميرة محمد احمد; مشرف, أسامة أحمد إبراهيم (جامعة السودان للعلوم والتكنولوجيا, 2016-06-10)
    كنتيجة للنمو المتسارع لتكنولوجيا الاتصال أصبح الاحتياج كبير لتطوير الخدمات المالية فجاءت خدمات بطاقات الدفع الالكتروني التي ساهمت وبشكل فعال في تقديم خدمات متنوعة، وبتكاليف منخفضة تقلل الوقت والجهد. الهدف من الدراسة هو ...
  • عثمان, إسراء عبد الحميد; مشرف, -عزالدين محمد عثمان (جامعة السودان للعلوم والتكنولوجيا, 2015-11-29)
    مجلس مهن نظم الحاسوب السوداني مجلس مهني أقر قانونه في عام 2011 ليقوم بتنظيم مهنه نظم الحاسوب وتقانة المعلومات. وسيقوم المجلس بتسجيل كل المنتمين للمهنه والسعى معهم للارتقاء بالمهنه وتنظيمها. وفي هذا البحث ينشئ الباحث موقعاً ...
  • Mohammed, Mohammed Elfatih Taj elsirAbdelraouf; Supervisor, - Dieter Fritsch (Sudan University of Science and Technology, 2016-05-27)
    Telecommunications today is one of the most important means of sharing information and data, to get out of the small space to the great world, so that the world has become a small village through the signals provided by ...
  • Ali, Aimen Abdel Aziz Hussein; Supervisor, Ammar Thabit Zahary (Sudan University of Science and Technology, 2015-05-10)
    In the capital markets, things happen fast. The markets move fast, positions change fast. Reacting quickly is the key to increase profit and/or managing risk. Enterprises need to adapt their processes to any observed changes ...
  • خليفة, فاطمة الشيخ سيدأحمد; مشرف, - أسامة أحمد إبراهيم (جامعة السودان للعلوم والتكنولوجيا, 2016-06-14)
    نظام إدارة علاقات العملاء هو نهج لإدارة تفاعل الشركة مع العملاء الحاليين والمستقبليين. يعمل هذا النهج على تحليل بيانات تاريخ العملاء مع الشركة من أجل تحسين أفضل علاقات تجارية مع العملاء، مع التركيز بشكل خاص على الاحتفاظ ...
  • Osman, Hind Abdullah; Supervisor, Abuagla Babiker Mohamed (Sudan University of Science and Technology, 2016-07-10)
    Confidential and reliable information delivery is considered as one of the essential requirements that must be available in every area of life. The effective design as well as the implementation of efficient tools for ...
  • Saeid, Areej Mohamed Osman Mohamed; Supervisor, Niemah Izzeldin Mohamed Osman (Sudan University of Science and Technology, 2016-04-10)
    The increasing demand for video services has made video caching a necessity to decrease download times and reduce Internet traffic. In addition, it is very important to store the right content at the right time in caches ...
  • AHMED, SARA MOHAMMED ABDALRAHIM; Supervisor, - FAISAL MOHAMMED ABDALLA (Sudan University of Science and Technology, 2016-08-05)
    Now a days, cloud computing is one of the dominant methods used forproviding computing infrastructure for Internet services, Cloud computing offerscomputing and software services on demand by connecting to computing resources ...
  • Rudwan, Mohammed Suleiman Mohammed; Supervisor, Salah El-Dinn Deng AlJack (Sudan University of Science and Technology, 2016-03-10)
    Database Transactions are pieces of information which holds operations that are performed on the database. They became a very critical issue that should be carefully stored and secured while they are under process, and ...
  • Basher, Nora Abdalla Hassan; Supervisor, Awad Mohamed Awadelkarim (Sudan University of Science and Technology, 2016-05-10)
  • Abdallah, Hajir Musa Ahmed; Supervisor, Faisal Mohammed Abdallah (Sudan University of Science and Technology, 2016-05-10)
    The increase use of the electronic communication demands more security on the exchange of the critical information. cryptography now a day’s get more and more important to address this issue. encryption algorithms available ...
  • أحمد, طلال عمر محمد; مشرف, محمود على أحمد (جامعة السودان للعلوم والتكنولوجيا, 2016-06-10)
    يتناول البحث واحدة من أهم مراحل هندسة البرمجيات وهى هندسة المتطلبات التى يتوقف عليها نجاح المشروع البرمجى. يهدف البحث إلى الوصول لكتابة المتطلبات البرمجية بصورة صحيحة لإنتاج المنتج البرمجى الجيد الذى يحقق رغبات المستخدمين، ...
  • Ahmed, Ayat Awad Hassan; Supervisor, Osama Ahmed Ibrahim (Sudan University of Science and Technology, 2016-05-10)
    As the banks grew in size and expanded geographically, the volume of transactions and customer information became quite large, the banking industry need Business Intelligence (BI) computer software ...
  • Babiker, Khadiga Mohammed Adam; Supervisor, Faisal Mohammed Abdalla Ali (Sudan University of Science and Technology, 2016-03-10)
    In this research, a new extension of the Playfair cipher algorithm to encrypt images safer manner. The new method is created matrix of 16 × 16 based on the key being entered by the user to become more secretive, and then ...
  • Elbasheir, Hassena Babiker Mohammed; Supervisor, Abdallah Akode Osman (Sudan University of Science and Technology, 2015-09-10)
    Due to the large on line services, there are a lot of different frameworks used to develop web applications. The process of selecting proper framework that fulfil the purpose for which applications to be the most suitable ...
  • Azrag, Etidal Altom Kunna; Supervisor, Faisal Mohammed Abdalla (Sudan University of Science and Technology, 2015-12-10)
    Due to the rapid development in communication and multimedia technology, different techniques are used for copyright protection and monitoring illegal copying of these media. One of the most important techniques is digital ...
  • Suliman, Alaa Aldein Mohamed; Supervisor, - Faisal Mohammed Abdalla (Sudan University of Sciences and Technology, 2016-02-05)
    Visual Cryptography is a special encryption technique to encrypted visual information, which divides secret visual information into multiple layers Called shares, Each share holds some information. The receiver aligns the ...
  • Mohammed, Ebtihal Mustafa Elamin; Supervised, Ali Ahmed Al-faki; Supervior - Ali Ahmed Al-faki (Sudan University of Science and Technology, 2015-11-01)
    Cross-language information retrieval (CLIR), where queries and documents are in different languages, become one of the major topics within the information retrieval community. The important step in CLIR is the translation. ...

Share

Search SUST


Browse

My Account