<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Community:</title>
  <link rel="alternate" href="https://repository.sustech.edu/handle/123456789/1183" />
  <subtitle />
  <id>https://repository.sustech.edu/handle/123456789/1183</id>
  <updated>2026-04-05T16:27:12Z</updated>
  <dc:date>2026-04-05T16:27:12Z</dc:date>
  <entry>
    <title>Automatic Recognition and Identification for Mixed Sudanese Arabic – English Languages Speech</title>
    <link rel="alternate" href="https://repository.sustech.edu/handle/123456789/28398" />
    <author>
      <name>Elfahal, Mohammed Osman Eltayeb</name>
    </author>
    <author>
      <name>Supervisor, Mohammed Elhafiz Mustafa</name>
    </author>
    <author>
      <name>Co-Supervisor, Rashid A. Saeed</name>
    </author>
    <id>https://repository.sustech.edu/handle/123456789/28398</id>
    <updated>2025-11-25T19:28:04Z</updated>
    <published>2019-08-25T00:00:00Z</published>
    <summary type="text">Title: Automatic Recognition and Identification for Mixed Sudanese Arabic – English Languages Speech
Authors: Elfahal, Mohammed Osman Eltayeb; Supervisor, Mohammed Elhafiz Mustafa; Co-Supervisor, Rashid A. Saeed
Abstract: Mixed speech is the phenomena of using more than one language in a single sentence, this occurs in communication between bilinguals to express their ideas and thoughts using vocabulary of both languages, even occurs among none bilingual people to describe product originally from second language.&#xD;
This thesis addresses the problem of mixed speech communication in multilingual communities. This is regional problem faces shortage resources and studies. Sudanese Arabic and English languages are the two languages selected for this research to build a generalized mixed speech and language identification model, the first is common and formal language among the Sudan and the latter is international, language of science and primary lesson in Sudan education systems.&#xD;
For experimental purposes, mixed speech corpus was built including most frequent daily life Sudanese Arabic and English mixed sentences, collected through social media applications campaign, 75% of this collection is read by 87 bilingual Arabic natives in office environment resulting in 2289 audio files associated with their transcription for training purpose, considering speakers and code-switch types, environment as factors affecting performance of the model at recording time.&#xD;
Based on the assumption that native language dominance others in mixed speech, proposed solution for generalizing recognition model is centered around Sudanese Arabic language. The solution keeps the original words for each language participates in switching in all components of the model such as mixed phonetic dictionary, mixed languages lexicon, etc., except for Acoustic Model (AM) Arabic language is used instead of its original language based on assumption that native speaker does not suddenly reconfigure his articulation organs to produce sounds as natives do. &#xD;
Open source CMU SHPINX is adapted for this mixed speech task, proposed model, which is consider effected by native language dominance, outperforms existing single pass and multi pass models achieving overall accuracy of 33.05% in term of Word Error Rate (WER).  Mixed speech produce hybrid language not belong to each participating language, interface for further linguistic computation is provided to deal with this new language. The interface contains recognized word, its order in the sentence, recognition confidence and its language identity. Language identification in the model is simply looked up identity from mixed languages lexicon to avoid effects of unclear language discrimination attributes in such speech. &#xD;
Achieved results, prove the possibility to generalize the model based on Arabic language, module for phonemes clustering and comparison needed to serve as front-end to detect new language phonemes that are not included in phonemes set in order to add new language to the model.</summary>
    <dc:date>2019-08-25T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>A Safety-Based Architectural Design Method for Software Product Lines</title>
    <link rel="alternate" href="https://repository.sustech.edu/handle/123456789/28311" />
    <author>
      <name>Suliman, Mozamil Ebnauf Elgodbe</name>
    </author>
    <author>
      <name>Supervisor, - Hany H. Ammar</name>
    </author>
    <author>
      <name>Co-Supervisor, - Aisha Hassan</name>
    </author>
    <id>https://repository.sustech.edu/handle/123456789/28311</id>
    <updated>2023-03-27T10:01:30Z</updated>
    <published>2022-12-12T00:00:00Z</published>
    <summary type="text">Title: A Safety-Based Architectural Design Method for Software Product Lines
Authors: Suliman, Mozamil Ebnauf Elgodbe; Supervisor, - Hany H. Ammar; Co-Supervisor, - Aisha Hassan
Abstract: The safety is considered one of the most critical issues in the design of the modern systems (e.g. cyber-physical systems). With the increasing attention of software safety, how to improve software safety has already become a more important concerned issue, especially for the safety-critical systems. The Software Product-Line (SPL) and reusable software components are suitable approaches for these systems, which are often re-engineered from existing systems. Currently, the influence of the architecture in assurance of software safety is being increasingly recognized. However, the safety-based architectural design methods are limited in SPLs because of the complexity and variabilities existing in SPL architectures. For that, this work seeks to find an efficient and effective method that can be used into the design process of the safety-critical SPLAs which enhances and manages the safety of SPLs. The work proposed a method for safety-driven software product line architecture design (SSPLA). For efficiency, a number of efforts have been made. In this context the proposed design method mentioned above is configured and adapted to be state-based architecture design method. Also as a pattern based development of the reference architecture can support the development and application process of the product lines a new safety design pattern of statechart is developed. The result is an object-oriented design pattern which handles the safety attribute. Additionally, as there is a tight interplay between safety and security, and in order to address the influence of the security issues in the safety design using patterns, a pattern development approach is proposed which is then used to enhance the proposed safety design pattern of statechart. In order to show the applicability of our work as well as evaluate it, a simplified safety assessment model is developed as well as using of two case studies. The evaluation results show that there is a considerable improvement in the safety design of the SPLA after applying our work. The results have proved that the state-based approach highly supports the development of the safety critical systems and it is effective to handle the safety and security together in the design of the safety pattern which provides more benefits as it is a high level reuse. Finally, this research will benefit both architects and safety engineers who can design SPLAs or develop software products.
Description: Thesis</summary>
    <dc:date>2022-12-12T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Design and Implementation of a System for Data Encryption and Hiding Using Video Tomography</title>
    <link rel="alternate" href="https://repository.sustech.edu/handle/123456789/28273" />
    <author>
      <name>Khalid, Saria Elsir Mohamed Ahmed</name>
    </author>
    <author>
      <name>Superviser, - Faisal Mohamed Abdallah Ali</name>
    </author>
    <id>https://repository.sustech.edu/handle/123456789/28273</id>
    <updated>2023-03-23T08:22:47Z</updated>
    <published>2023-01-12T00:00:00Z</published>
    <summary type="text">Title: Design and Implementation of a System for Data Encryption and Hiding Using Video Tomography
Authors: Khalid, Saria Elsir Mohamed Ahmed; Superviser, - Faisal Mohamed Abdallah Ali
Abstract: The internet provides a method of communication to distribute information to the masses with the growth of data communication over computer network, the security of information has become a major issue. &#xD;
Cryptography and Steganography are the two popular methods for secure data. Cryptography is the science of change the format of text from readable to unreadable text. Steganography is technique and art of hiding a secret message in carrier file.&#xD;
Steganography is the technique and art of hiding a secret message in a carrier file.&#xD;
A method proposed in this paper to improve the security system is to combine encryption and concealment.&#xD;
In this research the proposed to improve security system by combination between cryptography and steganography.&#xD;
Firstly, the International Data Encryption algorithm (IDEA) is used to encrypt the secret message.&#xD;
Secondly, the encrypted message has been embedded and distributed in even-frame in the video file using LSB steganographic and then applying DCT steganographic also to this stego-video. &#xD;
Thus, two levels of security have been provided using the proposed hybrid technique. &#xD;
In addition, the proposed technique provides high embedding capacity and confidentiality.
Description: Theses</summary>
    <dc:date>2023-01-12T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>A Framework for Evaluating the Usability of Mobile Applications in Sudan</title>
    <link rel="alternate" href="https://repository.sustech.edu/handle/123456789/28268" />
    <author>
      <name>Suliman, Wafaa Gareeb Allah Elamin</name>
    </author>
    <author>
      <name>Supervisor, -Almahdi Ibrahim Abushama</name>
    </author>
    <id>https://repository.sustech.edu/handle/123456789/28268</id>
    <updated>2023-03-21T09:22:01Z</updated>
    <published>2023-02-26T00:00:00Z</published>
    <summary type="text">Title: A Framework for Evaluating the Usability of Mobile Applications in Sudan
Authors: Suliman, Wafaa Gareeb Allah Elamin; Supervisor, -Almahdi Ibrahim Abushama
Abstract: The increasing usage of smartphones has resulted in mobile applications&#xD;
replacing or supplementing traditional web-based applications. Given the limitations&#xD;
of the form factor in smartphones, usability can be considered one of the important&#xD;
attributes that determine the success of a mobile application. Many of these&#xD;
applications suffer from usability issues. Usability concerns user experience,&#xD;
satisfaction, and perceptiveness.E-payment applications have barriers that make&#xD;
adoption of the application difficult for emergent users. If these barriers are crossed,&#xD;
many untapped users are waiting to use mobile payment applications.&#xD;
We conducted a small review of mobile usability models and found that&#xD;
usability is usually measured in terms of three attributes; effectiveness, efficiency, and&#xD;
satisfaction. Other attributes, such as memorability, tend to be overlooked in the&#xD;
usability models that are most prominent despite their likely impact on the success or&#xD;
failure of an application&#xD;
This research aims to review existing usability studies and subsequently&#xD;
propose a usability framework for the evaluation of the usability of Ocash apps, None&#xD;
of the attributes that it includes are new, but the existing prominent usability models&#xD;
ignore one or more of them&#xD;
The research uses the TAM model to evaluate the usability of the Ocash app.&#xD;
The framework serves as the basis for comprehensive usability evaluation consisting&#xD;
of guidelines, usability characteristics, and matrices.
Description: Thesis</summary>
    <dc:date>2023-02-26T00:00:00Z</dc:date>
  </entry>
</feed>

