Collection's Items (Sorted by Submit Date in Descending order): 201 to 220 of 464
Issue Date | Title | Author(s) |
2016-10-10 | Voice Recognition by using Machine Learning | Nssr, Safaa Omer Mohammed; Supervisor,- Howida Ali Abdel Gader |
2016-07-10 | Finding the Optimal Location for New ATM Using GIS Technologies | Hamed, Reem Suliman Idriss; Supervisor, Dieter Fritsch |
2016-06-10 | تقييم خدمات بطاقات الدفع الإلكتروني خارج المصارف في السودان | الشريف, أميرة محمد احمد; مشرف, أسامة أحمد إبراهيم |
2015-11-29 | تطوير نظام الكتروني لمجلس مهن الحاسوب | عثمان, إسراء عبد الحميد; مشرف, -عزالدين محمد عثمان |
2016-05-27 | Signal Coverage of Low-land Areas Using Geographic Information Systems | Mohammed, Mohammed Elfatih Taj elsirAbdelraouf; Supervisor, - Dieter Fritsch |
2015-05-10 | Towards a Development of Automated-Adaptable Business-Process using Context-Aware and Event-Processing Concepts | Ali, Aimen Abdel Aziz Hussein; Supervisor, Ammar Thabit Zahary |
2016-06-14 | تقويم إدارة علاقات العملاء بالمؤسسات | خليفة, فاطمة الشيخ سيدأحمد; مشرف, - أسامة أحمد إبراهيم |
2016-07-10 | Towards optimum security operation centre with fair bandwidth allocation | Osman, Hind Abdullah; Supervisor, Abuagla Babiker Mohamed |
2016-04-10 | A Comparative Study of Cache Replacement Algorithms for Video Streaming | Saeid, Areej Mohamed Osman Mohamed; Supervisor, Niemah Izzeldin Mohamed Osman |
2016-08-05 | Securing Data In Cloud Computing Using Paillier Algorithm | AHMED, SARA MOHAMMED ABDALRAHIM; Supervisor, - FAISAL MOHAMMED ABDALLA |
2016-03-10 | Performance Analysis of Classical Encryption Algorithms in encrypting Database Transactions | Rudwan, Mohammed Suleiman Mohammed; Supervisor, Salah El-Dinn Deng AlJack |
2016-05-10 | An Information Communication Technology - Based Framework for Poverty Reduction in Sudan | Basher, Nora Abdalla Hassan; Supervisor, Awad Mohamed Awadelkarim |
2016-05-10 | Enhancement of RC4 Algorithm for Images Encryption | Abdallah, Hajir Musa Ahmed; Supervisor, Faisal Mohammed Abdallah |
2016-06-10 | تصميم نموذج لعملية هندسة المتطلبات لتحقيق جودة المنتجات البرمجية | أحمد, طلال عمر محمد; مشرف, محمود على أحمد |
2016-05-10 | A proposed Application of Business Intelligence in Microfinance Sector in Sudan | Ahmed, Ayat Awad Hassan; Supervisor, Osama Ahmed Ibrahim |
2016-03-10 | Modified Playfair Algorithm for Images Encryption | Babiker, Khadiga Mohammed Adam; Supervisor, Faisal Mohammed Abdalla Ali |
2015-09-10 | A Review Study of Frameworks Used in Developing Web-based Applications Django, Ruby on Rails and Cake PhP | Elbasheir, Hassena Babiker Mohammed; Supervisor, Abdallah Akode Osman |
2015-12-10 | Image Authentication and Protection based on DWT Watermarking Technique | Azrag, Etidal Altom Kunna; Supervisor, Faisal Mohammed Abdalla |
2016-02-05 | Visual Cryptography BaseShuffling Method for Securing Medical Images | Suliman, Alaa Aldein Mohamed; Supervisor, - Faisal Mohammed Abdalla |
2015-11-01 | Term Translation disambiguation in Cross-Language Information Retrieval | Mohammed, Ebtihal Mustafa Elamin; Supervised, Ali Ahmed Al-faki; Supervior - Ali Ahmed Al-faki |
Collection's Items (Sorted by Submit Date in Descending order): 201 to 220 of 464