University of Khartoum

Browsing Undergraduate Dissertations by Title

Browsing Undergraduate Dissertations by Title

Sort by: Order: Results:

  • Salah, Ahmed (University of Khartoum, 2007)
    A Descriptive cross sectional study was conducted in 2007in Rufaa secondary school with the aim of providing data on students’ tobacco use status, knowledge, and attitudes and factors behind use. A total coverage was done ...
  • Mustafa, Hagar (University of Khartoum, 2008)
    This study has been conducted among Sudanese medical doctors in KTH, to assess possible factors that influence their job satisfaction. Across sectional survey done for 205 respondents, 119 house officers, 22 medical ...
  • MUHAMMED, ALNTHEER (2014-04-22)
    Cloud computing is considered one of the most reliable technologies that achieve both availability and high quality in cost effective way, it works on supplying the user with the desired resources and computer systems via ...
  • Alfateh, Zeinab (uofk, 2013-07)
    Feynman Diagram In Quantum Electrodynamics
  • KHOGALI, OMER (2014-04-27)
    Sharing files and digital books had always been a difficult task between a student and their teacher, when considering security and simplicity, they don’t have any specialized service in the university to get this task ...
  • Ahmed, Awab (2014-04-22)
    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service ...
  • Edaw, Ibrahim; mohammed, FatahElrahman; Hassan, Omer (University of Khartoum, 2014-02)
  • Mustafa, Reem (2014-04-27)
    Fingerprint has been used as a biometric feature for security reasons for centuries. A much broader application of fingerprints is for personal authentication, for instance to access a building, a computer, a network, a ...
  • Ahmed, MOHAMED (2014-04-23)
    Abstract: The development in control systems led through computerized automatic systems to a great development in security systems especially after biometric technology has arisen as a new. Biometric is computerized methods ...
  • Ahmed, AlWaleed (2014-04-22)
    Fireflies exhibit a fascinating phenomenon of spontaneous synchronization that occurs in nature. At dawn, they gather on trees and synchronize progressively without relying on a central entity. A recently presented algorithm ...
  • Mohammed, Musab (2014-04-24)
    WiMAX stand for Worldwide Interoperability for Microwave Access, which is a telecommunication technology that provides wireless data in a variety of ways, from point-to-point links to full mobile cellular type access. It ...
  • Omer, Boran (uofk, 2013-07)
    Flavonoid of Acacia Nilotica
  • Salem, Talal Mohammed Omar (University of Khartoum, 2009)
    A flight simulator : is a system that tries to copy ,or simulate ,the experience of flying an aircraft .It's meant to be as realistic as possible .The different types of flight simulator range from computer based games ...
  • Altayeb, Reham; Abdallah, Mona (uofk, 2012-09)
    Fly Ash Utilization
  • Abdalrhman, Sahar; Abdalraheem, Somaya; Osman, Layla (University of Khartoum, 2013-06-25)
  • Karrar, Abdelrahim; Eisa, M, (uofk, 2007)
    Foot and Mouth Disease in the Sudan
  • Ibrahim, Hawaa (uofk, 2013-07)
    In this short report we introduce the linear operator of fractional intergration and fractional differentiation in the framework of the Riemann liouville fractional calculus
  • Hashim, Rehab (uofk, 2012-09)
    Fries rearrangement
  • Ahmed, Lobna (uofk, 2012-07)
    FT IR Spectrophotometric Analysis of Methyldopa
  • Ibrahim, Abubakr Mustafa (UOFK, 2007-06)
    The problem of controlling mobile robots in uncertain environments is of central importance to many military, first responder, and space exploration applications. Mobile robots are utilized in these applications for the ...


Search DSpace


My Account