College of Computer Science and Information Technology: Recent submissions

  • Salama, Ahmed Yousri; Supervisor - Nisreen Beshir Osman (Sudan University of Science and Technology, 2014-08)
    This research proposed a new framework for analyzing the Arabic opinions and measuring the sentiment analysis for Arabic contents using semantic approach and text analysis. This thesis focusing on the semantic model ...
  • Ibrahim Nor, Abdisatar Arabow; supervisor - nisreen basher oaman (Sudan University of Science and Technology, 2014-09-03)
    E-government has emerged as a radical concept in most of the developing and developed countries. It aims to improve the government operations, make them paperless, and provide better services to citizens and organizations. ...
  • Abd alkreem, Musab Abd algader; Supervisor - Mohamed Elhafiz Mustafa Musa (Sudan University of Science and Technology, 2014-09-22)
    Data mining is the automatic search of huge data to discover patterns and trends that go beyond simple analysis. Data mining is also known as Knowledge Discovery in Data (KDD). This study investigates the discovery of ...
  • Khalid Elgimari, Atifa Elssir; Supervisor - Eltayeb Salih Abuelyaman (Sudan University of Science and Technology, 2014-09)
    This study aims to use modern Data Mining techniques to analyze admission data of Sudanese universities. The current methodology contains two data warehouse structures; a star and a snowflake. A star data warehouse structure ...
  • ABD ELGAGER YOUSIF, SUHAIB ALI; SUPERVISOR - TALAAT MAHI ELDEEN WAHBI (Sudan University of Science and Technology, 2014-09)
    There are many techniques of Audio Steganography can be implemented into audio. This thesis focuses on the frequency masking in audio by using tone insertion method. Inserting tones at known frequencies and at low power ...
  • Babiker, Afag Salah Aldeen; Supervisor - Mohammed Mustafa Ali (Sudan University of Science and Technology, 2014-08)
    Building an effective stemmer for Arabic language has always been a hot research topic in the IR field. This is because Arabic, as one of the Semitic languages, has a very rich and complex morphology. From that perspective, ...
  • احمد إبراهيم, عمر محمد; مشرف - هويدا علي عبدالقادر (جامعه السودان للعلوم والتكنولوجيا, 2014-09-25)
    تهدف الدراسة الي تقييم البرامج التي تقوم بحماية الأطفال من سوء إستخدام الإنترنت. تم اختيار مجموعة من هذه البرامج وإتبع الباحث المنهج التحليلي والوصفي لتقييمها. أهم النتائج أظهرت أن معظم برامج الحماية كتبت باللغة الإنجليزية ...
  • SAYED, MUTWKIL FAISAL; SUPERVISOR - TALAT WAHBI (Sudan University of Science and Technology, 2014-09)
    To perform hidden communication through the network, network protocols and/or relationships between them have been utilized as a carrier to transmit secret data. For each network steganography method there is always a ...
  • ALHASSAN, ABDOLRAHEEM KHADER; SUPERVISOR - ALI AHMED ALFAKI ABDALLA (Sudan University of Science and Technology, 2014-09-21)
    Since the last decade, Content-based Image retrieval was a hot topic research. The computational complexity and the retrieval accuracy are the main problems that CBIR system have to avoid. In this ...
  • أحمد, محمد عوض; مشرف - محمد عوض الشيخ (جامعه السودان للعلوم والتكنولوجيا, 2014-10-19)
    مع المتغيرات التي طرأت علي الحياة بصورة عامة وحوجة الأفراد والمجتمعات لمواكبة التطور والتقدم التكنولوجي بات إستخدام الحاسبات الألية من الضروريات وأصبحت الحوجة الي مزيد من الأمن لبيئة عمل الحواسيب وأنظمة تشغيلها يمثل غاية ...
  • Mohammed, Mohja Yousif; Supervisor - Izzeldin Mohamed Osman (Sudan University of Science and Technology, 2014-09-10)
    Recently notable software development experience enlarged globally development worldwide to take advantage of the benefits of multi-such as reducing the cost of software development and for the benefit of quality systems ...
  • Bashier, Reem Almahdy; Supervisor - Izzeldn Mohamed Osman (Sudan University of Science and Technology, 2014-12-18)
    Combinatorial testing has attracted a lot of attention from both industry and academia. A number of reports suggest that combinatorial testing can be effective for practical applications. However, there are few systematic, ...
  • Supervisor - Amier Mohammed Talib (Sudan University of Science and Technology, 2014-09)
    Development ontology based on semantic web for (S-NPF) to describes the concepts in the domain and also the relationships that hold between those concepts, Ontology use explicit specifications that consisting of classes ...
  • Samir, Nariman; Supervisor - Mohamed Elhafiz Mustafa (Sudan University of Science and Technology, 2014-09-22)
    In garment production engineering, sizing system plays an important role for manufacturing of clothing. The standards for defining the size status are a critical issue. Locating the right garment size for a customer depends ...
  • Mohamed Osman, Enaam Yasir; SUPERVISOR - Izzeldin Osman (Sudan University of Science and Technology, 2014-09-30)
    Cloud computing is a general term for delivering hosted services over the internet to remotely store, process and share digital data. Cloud computing is a new area, and there is still a gap only on reporting regulatory ...
  • Adam Soliman, Suheb Adil; Supervisor - Amir Mohamed Talib (Sudan University of Science and Technology, 2014-09-13)
    Ontologies have become core components of many large applications. One of the more common goals in developing the ontologies is to Share common understanding of the structure of information among people or software agents. ...
  • El Hassan, Eiman Mohammed; Supervisor - Izzeldin mohamed osman (Sudan University of Science and Technology, 2014-07-10)
    The main aim of this thesis is to develop suitable and high performance Credit Scoring Models (CSMs) to assess credit risk of personal loans for the Sudanese commercial banks using data mining techniques. Two Sudanese ...
  • Abdelkreem, Khalda Ali; Supervisor - Izzeldin Mohammed Osman (Sudan University of Science and Technology, 2008-07)
    This research attempts to find a formula for estimating the hour price of the internet services offered to the public in Khartoum State. It is found that the pricing depends on the competition and the desire in the profit. A ...
  • عثمان أحمد, أحمد حمزة; مشرف - محمد الحافظ مصطفى (جامعه السودان للعلوم والتكنولوجيا, 2008-09)
    علم التنقيب فى البيانات هو العلم الذى يبحث فى عملية الكشف عن معلومات ذات فائدة فى قواعد البيانات الكبيرة او أى بيانات كثيرة محفوظة بإى شكل .و من أهم عمليات التنقيب طريقة تحليل العنقدة وهى طريقة تهدف الى تقسيم البيانات الى ...
  • Abd Elrahman Fadel Elmola, Shaza Merghani; Supervisor - Mohamed El Hafiz Mustafa (Sudan University of Science and Technology, 2008-10)
    Hidden markov models (HMMs) are stochastic models which are widely used in speech recognition. Later HMMs began to be applied in handwriting recognition. This thesis tested the performance of HMMs on Indian handwritten ...

Share

Search SUST


Browse

My Account