Masters Dissertations : Computer Science and Information Technology: Recent submissions

  • Naem, Esraa Awad Alhaj; Supervisor, - Faisal Mohammed Abdallah (Sudan University of Science and Technology, 2020-08-01)
    The authentication is one of the top topics in security field, therefore many methods were provided, and the most famous method is text password. It has been used for decades but stills sensible for many attacks and has ...
  • Abdallah, Kamal Mohammed Issa; Supervisor, - Dieter Fritsch (Sudan University of Science and Technology, 2018-10-01)
    The nations always pay a great attention to their cultural heritage, they are focusing on preserving it against gradual changes and damages caused accidently by humans or due to natural disasters. The National Museum of ...
  • Ismail, Abeer Mohammed Kheir Osman; Supervisor, - Mohamed Adany Hamdd Sayed (Sudan University of Science and Technology, 2019-07-01)
    Automatic speech recognition (ASR) plays an important role in taking technology to the people. There are numerous applications of speech recognition such as direct voice input in aircraft, data entry and speech-to-text ...
  • Hamid, Sufian Abu Elgasim Suliman; Supervisor, - Nisreen Beshir Osman (Sudan University of Science and Technology, 2019-04-01)
    Mobile learning (m-learning) as a kind of learning model allowing learners to obtain learning materials anywhere and anytime using mobile technologies and the Internet. The quality of mobile learning systems is one of the ...
  • Eldaleel, Maaza Eldaleel Mustafa; Supervisor, - Mohamed El-Ghazali Hamza Khalil (Sudan University of Science and Technology, 2019-11-01)
    Continuous improvement is a key factor for survival in today’s turbulent business environment. Correspondingly, in today’s business world, software is everywhere. In the whole process of software development, testing is a ...
  • Osman, Samia Abdelmonim; Supervisor, - Talaat Mohiuddin Wahbe (Sudan University of Science and Technology, 2018-09-01)
    During Enterprise Resource Planning system lifetime, the response time increasing while the amount of data is increasing because data is retrieving from the relational database, where the more data to be processed the ...
  • Elamin, Amel Elamin Elsheikh; Supervisor, - Faisal Mohammed Abdallah Ali (Sudan University of Science & Technology, 2019-12-01)
    Many methods are used to securely transfer data, but the greatest challenge is to be careful of being detected by the intended recipient. The most famous methods are encryption and steganography. Encryption method draws ...
  • Osman, Sara Ahmed Mohamed; Supervisor, -AbdelhamidMansor (Sudan University of Science and Technology, 2018-06-15)
    A software requirements specification (SRS) contains all the requirements for a system-to-be. These are typically separated into functional requirements (FR), which describe the features of the system under development, ...
  • AHMED, HANAN AHMED ALI; Supervisor, Nadir Kamal Salih (Sudan University of Science and Technology, 2019-07-10)
    In the field of computer applications when be there need for design application to present certain service for specific customer, this application must design in care of how satisfy customer needs, therefore any application ...
  • Ahmed, Mohammed Ashraf Ibrahim; Supervisor, - Nisreen Beshir Osman (Sudan University of Science and Technology, 2018-12-10)
    Sudan Customs uses “ASYCUDA” [2] software for customs clearance, it follows the architecture of n-tier, the application is split into three separate units in a make server and the user's PC share their messages through the ...
  • Ibrahim, Tayseer Izeldien Mohamed; Supervisor, - Dieter Fritsch (Sudan University of Science & Technology, 2019-08-01)
    Rapid communication during disaster occurred is very crucial for both rescue team and victims. In real world scenarios detecting such emergencies and reporting them is a real challenge. Anyone in emergency circumstance ...
  • عبدالله, عايده محمد الحسن; مشرف, - أسامة احمد ابراهيم (جامعة السودان للعلوم والتكنولوجيا, 2018-01)
    نسبة للتطوير السريع فى البرمجيات وإستخدامها فى جميع وسائل الحياة لابد من عملية إختبار للبرمجيات بناءاً على المواصفات والمقاييس العالمية للبرمجيات وتكمن مشكلة البحث فى انه عدم اختبار البرمجيات فى الشركات قبل البدء فى العمل ...
  • Ibrahim, Mozdalefa Abdalla; Supervisor, - Albaraa Abuobieda Mohammed (Sudan University of Science & Technology, 2019-01-01)
    In today’s world, gigantic amount of data is available in medical domain, science, industry, business and many other areas. The data can provide valuable information which can be used by management for making important ...
  • Mohammed, Azhar Raheem; Supervisor, - Wafaa Faisal Mukhtar (Sudan University of Science & Technology, 2019-03-01)
    The Corpus is one of the most important tools in learning and understanding new terms. There are many corpuses used for the English language which can help interpreting general terms. The scientific terms may have different ...
  • Sileman, Zahraa Altayeb Mohammed; Supervisor, - Faisal Mohammed Abdalla Ali (Sudan University of Science & Technology, 2019-07-01)
    Today data security over the network is a serious concern as the amount of multimedia data is increasing at an exponential rate due to evolution of internet. Video encryption has various fields including internet communication, ...
  • Ali, Ahmed Ali Badri; Supervisor, - Abuagla Babiker Mohammed Babiker (Sudan University of Science & Technology, 2019-01-01)
    As a result of the developments in this era (the information age), the use of information technology has been a qualitative development in the service of the educational process as it provides many of the effects that ...
  • Bashir, Shiren Yousif Ahmed; Supervisor, - Faisal Mohammed Abdullah Ali (Sudan University of Science & Technology, 2019-01-01)
    Internet and web services have become an inseparable part of our lives. Hence, ensuring continuous availability of service has become imperative to the success of any organization. But these services are often hampered by ...
  • Yassin, Samar Ahmed Ali; Supervisor, - Awad Mohamed Awadelkarim (Sudan University of Science & Technology, 2019-09-25)
    Vulnerability in web applications allows malicious users to obtain unrestricted access to private and confidential information. Structured Query Language (SQL) injection is ranked at the top in web application attack ...
  • Mohamed, Samar Shawgi Basher; Supervisor, - Faisal Mohamed Abdalla Ali (Sudan University of Science & Technology, 2018-12-01)
    The development of Internet applications and high speed computer network has increased the easiness of Information Communication, but this advancement has also increased the chances of getting the data snooped at the time ...
  • Abd Al Rahman, Fadwa Mohammed; Supervisor, - Nisreen Beshir Osman (Sudan University of Science & Technology, 2019-08-01)
    Knowledge management is one of the most important strategies that organizations provide in their work and access to competitive advantage. Sharing knowledge is a challenge for Sudanese organizations, despite the knowledge ...

Share

Search SUST


Browse

My Account