University of Khartoum

Annual Conference -Basic Sciences and Engineering -February 2016

Annual Conference -Basic Sciences and Engineering -February 2016

 

Recent Submissions

  • Ahmed, Alsafa Hassan Suliman; Elhassan, Amna Abdulrahman Abdallah (University of Khartoum, 2016)
    Online payment is a process of exchanging money over the internet to purchase or sell goods and services; this process includes a payer, a payee, and a central authority (third party). The third party is located in the ...
  • Hamid, Hadia; Amin, Izzeldin; Khalil, Mohamed (University of Khartoum, 2016)
    When society becomes very dependent on technological assistants, it might be viewed as unsleeping witnesses. An important part on these assistants is its volatile data storage, because it may contain very useful data for ...
  • Khalid, Abdalkareem Omer Abdu; Kadoda, Gada Faroug (University of Khartoum, 2016)
    Scientific Research, research councils and research associations including universities and higher education institutions play a critical role in the process of knowledge creation and defining ways to guide knowledge ...
  • Mohamed, Mohamed Elhafiz; Hashim, Alaa Hidayt-Allah; Abouof, Abdalrahman Ibrahim (University of Khartoum, 2016)
    When dealing with security aspects for mobile banking in the context of mobile devices and applications, a few common themes emerge. If these themes are not addressed properly, through security controls and measures, the ...
  • Osman, Mayada; Zaroug, Anfal; Ibrahim, Lamis; Abushama, Hisham (University of Khartoum, 2016)
    With the rapidly growing software market, the quality of software products became the key to gaining competitive advantage. Accordingly, Software Process Improvement (SPI) initiatives gained significance in the software ...
  • Ibrahim, Eiman (University of Khartoum, 2016)
    This research is to discover how to identify social commerce, a new trend e-commerce. Since 2005 when yahoo introduced social commerce term the industry witness wide range of different website trying to be social. Some ...
  • Alfadul, Fatma; Ali, Rayan; Awad, Samah; Sharfi, Tasneem (University of Khartoum, 2016)
    Energy Balance Models (EBMs) are one of the oldest and most well-known types of atmospheric science models. This paper presents a simple mathematical model for EBMs. It begins with general idea about climate change reasons ...
  • almakki, Abdalrahman; Nasr, Mohammed; Bashir, Ragda; Eldewahi, Abeer (University of Khartoum, 2016)
    As the world begin moving to digital store for different purposes. Consequently, online file storage services become used daily as a way of saving and storing all data types. Because it provides us with a high degree of ...
  • Balla, Ayman; Ahmed, Marwa Seid; Taha, Mustafa; Elbadawi, Khalid (University of Khartoum, 2016)
    This paper presents RouteGen, a generator that inserts routing information at network nodes within an Autonomous System (AS). Network researchers often need to evaluate new proposed algorithms and protocols for network ...
  • Gorashi, Hanaa; Badur, Misaa; Elkheir, Omima (University of Khartoum, 2016)
    At first, rootkit is a serious type of malicious software that infects computer systems. The rootkit is seeking to take privileges higher than the privileges of administrators of the system, and also to get complete ...
  • Kadoda, Gada (University of Khartoum, 2016)
    The post-2015 development agenda is envisioned, with challenges faced by South Countries in mind, to account for the multiple dimensions of sustainable development “economic growth, social inclusiveness and equity, and ...
  • Guma, Atif Haroon Saleh; Elhussien, Hibatalla Yasir Abdalla; Abdelmotty, Mohammed Abdelfattah; Alamin, Mohammed Almojtaba (University of Khartoum, 2016)
    At the present time most of the Small companies with limited resources desires to computerize theirs accounting system, reduce the paper work and make security of information with backup and all benefits that could be ...
  • Elhafiz, Mohamed (University of Khartoum, 2016)
    Failure of information security in terms of Confidentiality, Integrity Availability and Accountability (CIAA) may result in many negative consequences such as loss of revenue, penalty, loss of productivity and reputation ...
  • Yousif, Mudathir; El Maaly, Iman Abu (University of Khartoum, 2016)
    Long Term Evolution (LTE) is a full IP-based wireless network based on the fact that critical and real time IP services is subject to the delay, Jitter, Packet Delay Variations (PDV) and packet loss. The control and ...
  • Mohamed, Hagir Abdel Elaziz; Eisawi, Ali Ahmed Mohamed (University of Khartoum, 2016)
    Lower Cretaceous non marine strata of the Blue Nile Rift Basin in the southeast Sudan have been palynologically investigated. A total of fifty nine cutting samples, selected from three wells namely HZ-1, HZ-2 and HZ-3, ...
  • Holi, Yahia (University of Khartoum, 2016)
    The paper looked into the relation between knowledge management and sustainable development included the introduction for both of them, types of knowledge management and explain the tools of it such as best practice ...
  • Osama, Tasabeeh; ELzubair, Maha; Altom, Omer; Eldewahi, Abeer (University of Khartoum, 2016)
    Keylogger (short for keystroke logging) is a specific type of spywares, that attempts to steal user information, by keep tracking user keyboard, and log every key pressed on the keyboard in a log file (usually encrypted ...
  • Warsma, Aisha M.; Abushama, Hisham M. (University of Khartoum, 2016)
    Agile methods such as extreme programming (XP) and Scrum have been a topic of much discussion with in the software community over the last few years. XP in particular is famous of software practices while scrum in software ...
  • Ahmed, Abd el Aziz Abd el Rahim M.; El tash, Lammyaa Ali (University of Khartoum, 2016)
    Bilharzia is one of the most important waterborne parasitic diseases of humans and other vertebrates in tropical and subtropical areas. The voracious infection is documented as one of 10 tropical diseases of most concern ...
  • Aljallabi, Bahiya (University of Khartoum, 2016)
    Non-functional requirements (NFRs) are quality attributes that define how software will do its functions. They are important and critical to the success of any software in the market as they consider the differentiator ...

View more