Journal of Graduate Studies - VOL - 11
Permanent URI for this collectionhttps://repository.neelain.edu.sd/handle/123456789/2825
Browse
Item Challenges of Mobile Cloud Computing(2015-10-01) AbdalmutalabTagwaEsmailkhalifa, SamaniFew years later with the broad development in mobile applications and advancements in cloud computing, a new expansion is being expected in the form of mobile cloud computing (MCC). MCC provides a platform where mobile users make use of cloud services on mobile devices. The use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing environment. Despite the astonishing advancement achieved by MCC, the users of MCC are still below expectations because of the associated risks in terms of security and privacy. These risks are playing important role by preventing the organizations to adopt MCC environment. Significant amount of research is in progress in order to reduce the security concerns but still a lot work has to be done to produce a security prone MCC environment. This paper presents a comprehensive security issues and challenges in Mobile cloud computingItem DETECT SQL INJECTION VULNERABILITY AND BYPASS FILTRATION(2015-10-01) ABDALLA MOHAMED, ISLAMSQL injection attacks are a serious security threat to Web applications. They allow attackers to obtain the data stored in the database. To address this problem, i present anextensive review of the various types of SQL injection attacks known to date. For each type of attack, i provide descriptions of how attacks of that type could be performed and present a methodology to prevent SQL injection attacks. I also created a program to scan any website for SQL injection Vulnerability even if it the website use filtration to prevent SQL injection.Item ENHANCMENT OF AES ALGORITHM FOR IAX PROTOCOL(2015-10-01) Mahammad AL-Momany, AhmadVoice over IP (VoIP) is transforming the telecommunication industry. It offers multiple opportunities such as lower call fees, convergence of voice and data networks, simplification of deployment, and greater integration with multiple applications that offer enhanced multimedia functionality. However, notwithstanding all these technological and economic opportunities, VoIP also brings up new challenges. Among them, security is perhaps the most compelling. Security for Voice over IP (VoIP) can be achieved in different ways. In this project new encryption algorithm has been proposed and implemented on IAX protocol with focusing on the performance for the secure media session. But VoIP has a very special characteristic: it is “time critical”. Time has a tremendous impact on this technology’s ability to performance, and to transmit meaningful information as well. Consequently, security considerations for VoIP must take additional steps to fulfill specific quality demands.]1[Item Using keystroke Biometrics in Password for User Recognition(2015-10-01) صديق محمد احمد, شاذليWith the development of technology and the increase in dealing with electronic information, this led to the use of systems basis to contain Passwords more complex and secure. So as to enhance the security of those systems degree of breakthrough that can be exposed in the light of those electronic trading via the Internet is here inspired researcher the study problem. The researcher used the concept of behavioral biometrics keystroke dynamics to enhance the security of passwords. Researcher has used the analytical method and comparative in this paper to analysis and comparisons between algorithms. The researcher reached to the results as defined by 86.4% properly known as correct and 13.6 % properly known as wrong , by supporting vector machine algorithm SVM (support vector machine) When comparing these results with previous studies found that the method that was used in this paper has given better results than others.Item ابراهيم انيس 1906 - 1978 رائد الدرس اللغوي الحديث(2015-10-01) احمد فتح الرحمن, هناديItem اثر استخدام البطاقة الاداء المتوازن فى فى تقويم الاداء المالي للمصارف السودانية(2015-10-01)This research aimed to know the effect of using the balance scorecard on evaluating the financial performance of the Sudanese banks. To this effect, a questionnaire form has been distributed to some banks in the Khartoum State and the following findings have been reached: There is a strong direct correlation between the financial dimension and the financial performance evaluation in banks. There is a direct correlation between the clients dimension and the performance evaluation. There is also a direct correlation between the internal operations dimension and the performance evaluation.Item Item استخدام التعلم المدمج لتدريس طلاب المستوى الجامعي (دراسة حالة)(كلية الدراسات العليا جامعة النيلين, 2015-10-01) عوض السيد ادريس سليمان, عبد الرازقThe study aimed at designing electronic Blended learning according to the system of blackboard, based on the standards of University of Bisha. Standards were taught through it, the topic of the digital logic in the department of computer at the University. The study also aimed at identifying the stages of designing this syllabus together with attitudes of the student to towards the exploitation of the Blended course.Item الابدال فى الاعراب(2015-10-01) جاسم محمد راضى, ضياءItem المردود الاقتصادي و الاجتماعي لمشروع تعلية الرصروصيرص(2015-10-01) عبد اللطيف عبد المطلب, ابراهيمDams are considered as the most important projects that have economic value for any country all over the world. Ruseris dam elevating project is one of the most important projects that have economical values for Africa in general and for Sudan and the Blue Nile state in particular if a scientific method is followed.Item المواطنة(2015-10-01) عبد الرازق, علاء الدينItem تحليل مدي ادراك المصارف السودانية لاهمية المحاسبة عن القيمة العادلة(2015-10-01) عبد الله ابكر, محمد عليThis study aimed to identify the level of awareness of Sudanese banks accounting interesting about fair value, the study concluded that there is perfect aware of Sudanese banks for importance of measurement and accounting disclosure for financial data in according to fair value accounting model, the study recommended by increasing Sudanese banks interesting by accounting .about fair valueItem ظاهرة انتشار المخدرات بين الشباب الليبي الاسباب والحلول(2015-10-01) محمد جبارة, جبارةItem غلاف العدد الحادي عشر(2014)Item مواضيع العدد 11(1111)