Masters Dissertations : Computer Science and Information Technology: Recent submissions

  • Osama, Aiman Al-mutasem Bellh; Supervisor - Osama Ahamed Ibrahim (Sudan Uiversity of Cince and Technologe, 2015-04-01)
    There are many studies that have been conducted ability to apply and monitor software quality standards in small and medium enterprises in Sudan and concluded that whole the national institutions do not follow clear criteria ...
  • Farha, Farha Abd Algfar Ali; Supervisor - Hassab Elgawi Osman (Sudan Uiversity of Cince and Technologe, 2015-12-25)
    Since the topology of the mobile ad-hoc network (MANET) is constantly changing, the issue of routing packets between any pair of nodes becomes a challenging task. Most protocols are based on reactive routing instead of ...
  • آدم, مجتبى أحمد إبراهيم (جامعة السودان العلوم والتكنولوجيا, 2015-01-01)
    نموذج تكلفة البناء (COCOMO) هو نموذج تقدير تكلفة البرمجيات. ونحتاج للتحقق من مدى ملاءمته مع الأسواق الصغيرة. هذه الدراسة التي قدمت في هذه الأطروحة تتناول بعض القضايا المتعلقة باستخدام COCOMO 2 نموذج لتقدير التكلفة في سوق ...
  • Alhissain, Mohammed Hassan; Supervisor - Hassab Elgawi Osman (Sudan University of Science and Technology, 2015-04-01)
    Worldwide Interoperability for Microwave Access (WiMAX) is a broadband wireless technology based on IEEE 802.16-2004 and IEEE 802.16e-2005. This type of networks supports multiservice traffic (voice, video and Ftp) and ...
  • AHMED, AFAF YOUSIF; SUPERVISOR - TALAAT WAHBY (Sudan University of Science and Technology, 2015-02-01)
    Cryptography and Steganography are the two popular methods available to provide security. Recently a combination between them becomes the most successful ways to maintain confidentiality of data but with impact on quality. ...
  • Bashir, Alfadel Haron Amin; supervisor - Osama Ahmed Ibrahim (Sudan University of Science and Technology, 2015-04-01)
    Mobile money usage for transactions is steadily growing across Africa with the potential to revolutionize the cash-dominant economy of this continent to be cashless. With the increased use of mobile money services ...
  • Yusuf, AL Sharif Hago Almugadam; Supervisor - Yahiya Abdullah Mohamed (Sudan University of Science and Technology, 2015-10-16)
    The aim of this study is to investigate, measure and analyze the Accuracy of billing systems in Sudanese telecommunication companies (Op3, Op2, OP1 and Op4),by measuring the actual data (voice calls) from the GSM/Modem ...
  • Mohammed, Asem Abdullah; supervisor - AlbaraaAbuobieda (Sudan University of Science and Technology, 2015-04-01)
    Automatic text summarization is a process of rewriting text into a shorter compressed version from the original text. Extraction focuses on the selection of particular pieces of text from a document where the sentences and/or ...
  • Hassan, Ammar Noureldien Bakri; SUPERVISOR - Izzaldien Mohammed Osman (Sudan University of Science & Technology, 2015-03-01)
    Overtaking maneuver is the most dangerous road maneuver because of its serious consequences which causes vehicle damages, serious injuries and even life lost. The main motivation of this thesis is finding solution for the ...
  • Farah, Samia Farah Mohammed Ali; Supervisor - Albaraa AbuObieda Mohammed Ali (Sudan University of Science and Technology, 2014-12-01)
    Sentence compression is the task of compressing a long sentence into a short one. It retains the important contents and in the meantime it generates grammatical short sentences. This research proposed an improved ...
  • MAHJOUB, ABD ELRAHMAN YOUSIF; Supervisor - Albaraa Abuobieda Mohammed (Sudan University of Science and Technology, 2015-02-01)
    Automatic text summarization is the process of creating a small version from the original text. Extraction approach is one of way of extracting the most important sentences in document, this approach is used to select ...
  • IDRES, MOHAMMED YOUSIF ELKHIDER; Supervisor - Faisal Mohammed Abdalla Ali (Sudan University of Science and Technology, 2014-11-01)
    Cloud computing has emerged as a promising technique that greatly changes the modern Information Technology industry, it depends on sharing resources that were never shared before, demanding a new set of security challenges. ...
  • HASSAN, OMER FYSAL; Supervisor - Albaraa Abuobieda Mohammed (Sudan University of Science and Technology, 2015-02-01)
    Automatic text summarization plays increasingly an important role with the exponential growth of documents on the Web. Numerous approaches have been proposed to identify important contents for automatic text summarizat ...
  • Dafaallah, Samia Omer; Supervisor - Abd Rasoul Alzobaidi (Sudan University of Science and Technology, 2015-03-21)
    Search is an integrated system which is placed inside the car for the purpose of protecting the car or avoid accidents using sensors and if the incident occurred determine the site of the accident using GPS in real time, ...
  • Mohammed, Abdulrhman Mohammed Ahmed; Supervisor - Osama Ahmed Ibrahim (Sudan University of Science and Technology, 2015-05-31)
    No doubt that the spread of mobile phones has helped to provide a number of high-value services and modern technologies cover all spects of life and financial transactions, certainly the most common of which is the ...
  • Mohmmed, Elham Mosa Abd Aljalil; SUPERVISOR - MurtadaKhalafallahElbashir (Sudan University of Science and Technology, 2014-10-28)
    Protein secondary structure prediction from its sequence of amino acids remains an important issue. Determining the secondary structure of protein in the laboratory is very costly and consumes a lot of time. Development ...
  • Mohamed, Nasrin Ismail; Supervisor - Nisreen Beshir Osman (Sudan University of Science and Technology, 2014-11-11)
    During software evolution, programmers spend time and effort in the comprehension of program and that is due to the fact that the documentation is often incomplete, inconsistent and outdated. In order to avoid these problems, ...
  • أحمد, نسرين حسن مدني محمد; مشرف - محمد الحافظ مصطفى موسى (جامعة السودان للعلوم والتكنولوجيا, 2014-01-01)
    o هناك أنظمة عديدة ومختلفة لقياس الملابس في جميع أنحاء العالم. o نسبة لإختلاف أحجام الشعوب تحاول هذه الأنظمة وضع معايير تغطي الغالبية العظمى من الأحجام بطريقة متوازنة . o تنقيب البيانات هو العلم الذي يهتم بالبحث عن ...
  • Abdalla Elmahi, Mohamed Yousif; supervisor - talaat whaby (Sudan University of Science and Technology, 2014-08)
    A lot of techniques are used to protect the information such as information hiding. Steganography is one of the information hiding Techniques that hide a message inside another message without drawing any suspicion. In ...
  • Hassan, Amel SalahEldein; Supervisor - Awad Mohamed Awadelkarim (Sudan University of Science and Technology, 2014-08-14)
    Although the cloud computing model is considered to be a very promising computing platform in world, because of its advantages such as flexibility and cost-effectiveness, but it leads to loss of control over the cloud-hosted ...

Share

Search SUST


Browse

My Account