Welcome to the homepage of Dr. Lalit Garg
  • Home
  • Appointments
  • Qualifications
  • Research interest
  • Publications
  • Projects
  • Supervisions
  • Software
  • Other Activities
  • Interesting Links
  • Contact me
  • Call for Articles
  • ISMS2020 Program
  • ISMS2020 Detailed Program
PhD (University of Malta, India) Dissertations supervised/supervising:
  1. Eliazar Elisha Audu, Application of machine learning in energy efficient, real time, monitoring, prediction, detection and management of seizures. (Presently pursuing).
  2. Gianpaolo Tomaselli, DIGITAL CSR COMMUNICATION IN HEALTH CARE SERVICES (co-supervised with the principal supervisor Maria Colurcio).

Master of Engineering (University of Malta, India) Dissertations supervised:
  1. Sylvia Bugeja, "Applications of Machine Learning Techniques for the Modelling of EEG Data for Diagnosis of Epileptic Seizures". 
  2. Chatzoglou Polychronis, “Novel techniques and applications for missing data analysis”


Master of Engineering (Thapar Institute, India) Dissertations supervised:
  1. Sona Rani, “Blue tooth approach for toll tax applications”. 
  2. Puja Mudgil, “Circuit Partitioning using Quantum Computing”.
  3. Mandeep Kaur, “Problem Solving using Quantum Computing and Quantum Clique algorithm”.
  4. V. S. Shankar Sriram, “Methodology For Designing High Speed Reconfigurable Custom Computer”.


Master of Science (University of Liverpool, UK) Dissertation Projects supervised
  1. John Charles Wilkinson, “Reducing development time and Increasing Software re-use in a real-time temperature-control environment using incompatible temperature sensing and controlling devices” (Sponsored by Dr Marios N Soutsos, Department of Civil Engineering, University of Liverpool, UK).
  2. Chun Ying Liu, “Solution of netlist changes problem in ASIC ECO process” (Sponsored by Mr. Wei Zhang, Shenzhen Titan Micro Electronics Co. Ltd., China).
  3. David Hilton, “RFID tracking within Medical Care Environments” (Sponsored by Mr. Kevin Davies, Mersey Regional Ambulance Service, Liverpool, UK).
  4. Graham Butcher, “Developing a markup language to describe joins” (Sponsored by Mr. Alan Upstone, Ingenuus Ltd., Shefford, UK).
  5. Paul R. Dean, “Adaptive Planning System for a Mass-Customization Manufacturing Process” (sponsored by Kim Ball, Gienow Building Products Ltd., Alberta, Canada).
  6. Brian W. McIndoe, “jECHO: A new implementation of Holland’s Complex Adaptive Systems model with the aim of seeking answers to some fundamental open questions”. 
  7. Richard Robert, “A Framework for the Selection, Use, Deployment and Management of Strong Authentication Mechanisms within Computer Systems”.
  8. Ali Al-Abbad, “Work Out A Framework To Resolve Data Security Attacks”.
  9. Pascal Printemps, “A Privacy Framework for E-commerce Environments” (sponsored by Mr. Anthony Parcaro, District Manager, Agilysys Canada Inc., Canada).
  10. Ian T. Hussain, “Designing and implementing the alarm strategy for a real time rail station management system”, (Sponsored by Peter Shaw, Team leader METRONET Project, Thales Information Systems).
  11. Ramakrishnan Venkataraman, “Demonstrating the various data transformational methods and evaluating the methods in particular situations”.
  12. Andy Siu Ngam Ip “Methodology for Requirements Specification of Real-Time Embedded Systems”.
  13. Adam Winnington “Designing a secure and open infrastructure to implement change control and management of remote networks”,  (sponsored by Frank Rondinone, Access 2 Networks, Canada).
  14. Imran Zafar, “An improvement of TABU search algorithm for multiple sequence alignment” (sponsored by Tariq Riaz, Lilly Systems Biology, Singapore).
  15. Andrew John Chadwick, “Centralized User Access Management System for a Distributed Computing Environment” (Sponsored by Frank Hoffman, eurodoc Sonovision - ITEP GmbH, Hamburg, Germany).
  16. Glen Dalgleish, “The investigation, the analyses, the re-engineering and the implementation of an electronic messaging system” (Sponsored by Ernie Bendinelli, EMI Music, New York).
  17. Christopher Brind, “Genetic Music” (Sponsored by John Skelton, Morse, London, UK).
  18. Anthony Haigh, “Investigation into the use of RFID for asset management purposes in a water utility” (Sponsored by Alex Smith, Mason Communications, Manchester, UK)
  19. David Read, “A Testing Framework for Distributed Embedded Systems”.
  20. Stephen Riley, “The feasibility of using digital signatures on employee references and CVs”.
  21. Debasish Datta, "A Rule-Based Approach to Automated CSS Generation" (Sponsored by Transputec Computers Plc.).
  22. Olive Mckenzie, "RFID in the electronic payment: To investigate the possibility of RFID and biometrics based authentication mechanism for ensuring secure electronic payment".
  23. David H F Copper, "To create an intuitive web-based expert system shell that can be programmed by end users and therefore dispense with the requirement of a knowledge engineer".
  24. Gary Wiescher, "Develop a framework and design a template for small and medium multi-site companies in order to facilitate their future hardware and software telecommunications upgrades and implementations", (Sponsored by Mr. Finnbarr Nolan, Snap-on Tools).
  25. Stephen Gibbs, "A .NET based Simulator to investigate Swarm Intelligence" (Sponsored by Dr Richard Nicholson, Parameus Limited).
  26. Markus Müller, "To develop a framework for state of the art prevention, detection and eradication of software which makes use of stealth processes" (Sponsored by Mr. Mario Lardieri, Richterswil, Switzerland.
  27. Dan Beldiman, "Design and implementation of a secure credit card transaction system considering the PCI1 requirements for credit card data handling" (Sponsored by Frank Pieper,  netextend GmbH, Emmering, Germany).
  28. Hajir Al-Balushi, "Fiber-to-the-Home".
  29. Olabode Adeniran, "Voice over Internet Protocol (VoIP): Dealing with security issues on SIP (Session Initiation Protocol) networks".
  30. Osaze Ezekiel, "The Implementation of a single log solution and its impact on a multi application enterprise environment" (Sponsored by Mr. Christopher Anoruo, Enterprise Security Management Division, Zain, Nigeria).
  31. Tara Flynn, "Develop a framework for determining the best steganography method for a given application" (Sponsored by Andrew Van Beek, PhotoVanBeek, Ottawa, Canada).
  32. Tarik Jackson, "Measuring The Effectiveness of Information Systems Audit" (Sponsored by Daryl Walker, Beckman Coulter Inc., Fullerton, CA, USA).
  33. Christian Powell, "Telecommunications Reporting and Management System for Joy Mining Machinery Limited" (Sponsored by Mr. Alan Rogers, Joy Mining Machinery Limited, UK ).
  34. George Garza, "Approaches for Network Security Intrusion Detection"
  35. Jen-Wei Chang, "Comparison and evaluation of the local disk, diskless and ATA-over-Ethernet architectures for the advanced HPC cluster storage architecture"
  36. Sanjay Sharma, "Service Oriented Architecture - Impacts for Software Development Organizations" (Sponsored by Mr. Dejan Risimic, HSBC, Canada)
  37. Robert Lo, "The use of adaptive fuzzy logic to estimate covert channel in a TCP/IP network" (Sponsored by Christopher R. Elmquist, LogTech Canada Ltd, Canada).
  38. Daniel Shull III, "Applying total productivity maintenance (TPM) methods for employees through information technology".
  39. Satish Sharma, "Accumulative Software Development" (Sponsored by Mr. Harold Jeffrey Stewart, AT&T Information Technology, USA).
  40. Kailash R. Maharaj, "Optimal Search Strategies for Agents in a Constrained Environment", sponsored by Mr. Pierluigi Riva, ORS, Italy.
  41. Ofi Idowu Shalom Samuel, "Fraud Management and Revenue Maximization in Telecommunication Industry - A case study of Celtel Telecoms Nigeria Ltd.".
  42. Francesco Iorio, "Voice over IP audio processing on the Sony/Toshiba/IBM Cell Broadband Engine, a modern multi-core vector processor" (Sponsored by Maria Hyland, the Dublin High Performance Computing group, IBM Systems and Technology Group, Dublin, Ireland).
  43. Justin Farrugia, "Methodology – A new IT strategy involved in the rapid delivery of business value" (sponsored by Mr. Colm Carey, Pioneer Investments, ).
  44. Jean Hupperets, "Developing a Hybrid Point-of-Sale system", (Sponsored by Jeroen Penninx, PPC, the Netherlands).
  45. Ahmed Ahmed, "A rule-based system for course scheduling" (Sponsored by Dan Marr, Student Affairs Manager, Zayed University, United Arab Emirates).
  46. Ash Galal, "Service Oriented Architecture (SOA), web services vs. REST implementations".
  47. Rudolf J. Holzhausen, "Remote Clinical Audio-Alarm Identification, Monitoring and notification in an Isolation Patient Environment" (Sponsored by SAAD Specialist Hospital, Al-Khobar Saudi Arabia).
  48. Avril Coipel, "Enhancing the reporting capabilities of a School Administration System using statistical and data mining techniques" (Sponsored by Isabella Prentice, Convent High School, Roseau, Dominica).
  49. Lukman Omotoso, "Managing integrated Logistics activities in a farm business," (Sponsored by Abdul Lateef, Sincierity Global Services Ltd., Nigeria).
  50. Maurice de Château, "Evaluation of the Effectiveness of Web Services as a Mechanism for Remote Procedure Calls" (Sponsored by Fabio Vignoli, Philips Research Labs Europe, Eindhoven, the Netherlands).
  51. Luc Dechamp, "Engineering and Implementation of a Data Monitoring System in a Secured Environment" (Sponsored by Prof. Greet Janssens – Maenhout, Joint Research Centre, Ispra, Italy).
  52. Steve L Schiavone, “Information Security in Enterprises as a Complex System - an Ontological Perspective” (Sponsored by Mr. Kelly Summers, VP-CIO Medicis Information Technology Division, Medicis Pharmaceutical Corporation, 7720 N. Dobson Road, Scottsdale 85256 AZ, USA).
  53. Barrington Antonio Henry, “Domain Specific Language for Scalable Machine Learning Computer Forensics”, Sponsored by Leon Bernard.
  54. Hein Remmen, “Big Data as a Service: Can B2B SaaS companies leverage their data for the benefit of their clients?”, (Sponsored by Bram Cool, General Manager, Ezwim, Netherland. Ronald Dähne, Product Manager (online bookkeeping SaaS product), the Exactonline, Netherland).
  55. Ahmad Roumieh, “E-Marketing Strategies Exploiting Social Media for Islamic Banking”, (sponsored by Kuwait International Bank, Kuwait).
  56. Eliazar Elisha Audu, Implementation of IP-Based real-time networked control systems using particle swarm (PSO) and artificial neural network (ANN) Optimisation Techniques.
  57. Ben Dickinson, Solving Emerging Security Problems that arise from the Facilitation of Increased Availability of Healthcare Data in Electronic Healthcare Systems, (Sponsored by Dr David Stables, Director of Strategic Development. EMIS Ltd.)
  58. Jerry Eric Ayitey, Implementation of Virtual Private Network (A Case Study of Ghana Health Service).
  59. Sergey Sergey Peretyagin, Back-compatible remote gesture authentication gateway.
  60. Adrian Bonett, Evaluating the Virtual Desktop Infrastructure in a Financial Institution: the pros and cons.
  61. Muhamad Azhar Muhamad Arifin, Bottom-up approach in ERP implementation into a healthcare. The role and importance of third party in ERP integration. (Sponsored by Kate Williams, Clinical Trials Manager, Research & Innovation, North Bristol NHS Trust).
  62. Olutayo Adesuyi, The effect of Intrusion Detection Systems on a Network: A Case Study of the National Emergency Management Agency (Nigeria). (Sponsored by Alhaji Mohammad Sani Sidi, Director General the National Emergency Management Agency (NEMA), Nigeria).
  63. Michael Noble, Application of Machine Learning Methods in Modelling HIV Disease Progression.
  64. NnaEmeka Chukwu, Mobile Health Insurance System: Sustainable Business Model for Primary Health Centres in Abuja-Nigeria (sponsored by Pathfinder International Nigeria and Nigeria Ministry of Health (National Health Insurance Scheme – NHIS)).
  65. Ositadimma Ugwu, A model for secured distributed parallel databases with privacy, trust and security in multi-tenancy environment on public clouds.
  66. Sherif Moustafa El Shorbagy, The Impact of Information Systems in Management Performance in Pharmaceutical Industry. (Sponsored by DEEF Pharmaceutical Industries Co. Saudi Arabia).
  67. Stefan Scerri, Evaluating Human Computer Interaction Patterns in the Mobile Nutrition Landscape. (Sponsored by Dr Christian Scerri, Professor at the University of Malta).
  68. Thomas Cole, Investigation into cloud computing adoption within the Hedge Fund Industry, (sponsored by Malcolm Butler, COMAC Capital LLP, UK).
  69. Efe Unukefe Favour Lucky, Integrated Management Information Systems For Organizational   Projects: A Case Study Of Electricity Distribution Companies In Nigeria (sponsored by Abu Ismail Ejoor, Benin Electricity Distribution Company(BEDC), Benin-City, Nigeria).
  70. Nicholas Houghton, Development of Object-Oriented Analysis and Design (OOAD) methodology for designing process control system architectures.
  71. Peter Sarf, Protection of DNS infrastructure with emphasis on the last hop.
  72. Saif AL BADWAWI, Policies, Guidelines and Best Practices for Data Communication / Network infrastructure design for manufacturing companies: A case study at Sohar Aluminium Company (sponsored by Pradeep SAH, Sohar Aluminium, Sultanate of Oman).
  73. Shashidharan Shanmugam, Model Employee Appraisal System with Artificial Intelligence Capabilities (sponsored by Mr Sriram Raghunandhan, D.E.Shaw India).
  74. Alexcia James, Investigating and evaluating the use of Telecommunications in Operations and Emergency Response in the Aviation Industry, specific reference to Sangster International Airport, Jamaica. (Sponsored by Mr. Alfred Mitchell (MBJ Airports Limited).
  75. Amit Sookoo, Method(s) for increasing system performance in an IT Production Support environment and reducing IT system outages.
  76. Camele Johnson, Providing Secure Steganography Communication Through TCP/IP Network Protocol.
  77. Christopher Adams, Artificial intelligence approach to legal reasoning and its application to disciplinary issues in human resource management (sponsored by Peter McKenna, GT LAW - Employment law Solicitor, Liverpool, L2 4TA, UK).
  78. Isak Bosman, The feasibility of behavioural science as a secure and continuous authentication solution on mobile platforms (Sponsored by Responsive Media, Cape Town, South Africa).
  79. Luís Adelino Samuel Cláudio, Evaluating potential and sustainability of O2O as a promising e-commerce enabler: A case study in Angola.
  80. Solomon Olalekan Oyenuga, Development of a Decision Support System for implementing Security Strategies for Data Protection and Regulatory Compliance in a Cloud Based Health-Care Environment.
  81. Ogundeji Titilola Oyinade, Developing a framework for telecommunications profit sharing through automated data mining techniques, (Sponsored by Mr Anthony Opara, MTNN, Johannesburg, South Africa).
  82. Francois Hendrik Combrink, Converging RFID, Wi-Fi and Cloud Computing Technologies.
  83. Brian Mwine Rutebemberwa, Applying data forensics upon an Enterprise Architecture framework for increased data privacy and security to improve health care services in Uganda (sponsored by Dr. Margaret Wandera, Hospital Director, Makerere University Hospital, Kampala, Uganda).
  84. Russell Foubert, Looking Beyond Mortgage Rates: An Artificial Neural Network-based Software Application for Canadian Mortgage Brokers (sponsored by Tariq Ali Asghar, President and CEO, Emerging Star Investment Group, Waterloo, ON, Canada).
  85. Miyanji Khalid Ahmed, BYOD solution for secure access from any device, at any time and from anywhere to Bank’s applications and data (sponsored by Bank ABC, Manama, Kingdom of Bahrain).
  86. Longe Olayinka Hammed, Impact of Employees’ Appraisal and Motivational Techniques in Agile Software Development (sponsored by Mr Ola Olasiyan, Chief Information Officer, Chams Plc, Lagos, Nigeria).
  87.  Ashok Hariharan, Representing Indian Legislation in Semantic XML.
  88. Jurie W. du Preez, The Impact of Cyber Threats on Small / Medium Enterprises (sponsored by Mr. Jan Mattheus Christiaan Steyn, Deputy Director: ICT Governance, University of South Africa, Unisa, South Africa).
  89. Turay Filipe De Melo, Investigating commercial indicators as future predictors of the performance of financial institutions. A case study.
  90. Ahmad AbdelHalim, A Framework for Successfully Managing Software Development in Offshore Environments.
  91. Adil Albalushi, E-Tendering Challenges for Government Entities in Oman.
  92. Emmanuel Ramaru, Converging & Centralizing (Bundling & Unbundling) Scattered I.T Support into Shared Services by Implementing a Hybrid Cloud Enterprise Strategic Management System.
  93. Adnane Ajroudi, Ontology-driven information management for better decision making in the Oil and Gas Industry.
  94. Benjamin Hodzic, Creating a model for delivering centralized ICT services within the large International Organizations with its offices located worldwide, using the Internet technologies as the core of the network infrastructure (sponsored by Roy A. Joblin, Chief of ICT services, The United Nations Disengagement Observer Force (UNDOF), United Nations.
  95. Sherif Mahmoud, Artificial Intelligence Techniques to Enhance Bank Profitability.
  96. Erik Martirorsyan, Micro-bloggers interests similarity identification based on similarity of discussed topics.
  97. Alex Williams, Cloud Computing on Computer Forensics: A New Paradigm With New Challenges for Digital Forensics- A Framework for Performing Digital Forensic Investigations on Cloud-Based Systems.
  98. Raed Sharaf, ERP Consolidation case study, threats, risks, challenges and feasibility.
  99. Jens Stratenwerth, A framework for the centralised storage, access, distribution, knowledge extraction and application of big data from diverse energy data collection systems.
  100. Mohamed Emad, Design and Implementation of a High Performance Computing Infrastructure for IT Department of Mobile Telecommunication in Iraq.
  101. Fabrizio Krapf Costa, An API to perform actuarial valuations to Brazilian Pension Funds.
  102. Liam Wood, Analysing and comparing clustering techniques for micro blogging sites.
  103. Raimundo Matuassa, Impact of Big data analytics at the Bank of Mozambique (sponsored by the Bank of Mozambique, Maputo, Mozambique).
  104. Jason Micallef, Mitigating and managing the negative impact of BYOD on the privacy & work-life balance of knowledge workers.
  105. Taddeus Pierrot, A cost efficient ICT design to improve communication, Information, data security and service delivery for health care providers of budget constrained national hospitals. A case study of Owen King EU Hospital, Saint Lucia (Sponsored by Owen King National Hospital, Millennium Highway Castries St. Lucia).
  106. Michael Philip Orenda, Exploring feasibility of authenticating web application user using a Brain Computer Interface.
  107. Kennedy Njenga, Factors hindering the adoption of cloud computing in higher learning institutions in Kenya and recommendations on the way forward.
  108. Roderick Pettenburger-Perwald, A framework for network and information security as contextualized by social, legal, organizational and societal issues – A South African perspective.
  109. Darell Antoine Edmond, Adoption of cloud computing in Central Banks.
  110. Obinna Eleanya, A Big Data Solution for Personalization of Web Search Results.
  111. Dipesh Nagar, Network-Segmentation: An Enabler For Evolving Data Centre Architecture To Address Growing Information Security Concerns, Creating A Network Architecture That Builds A Foundation For Improved Information Security Analysis, Detection, And Alerting.
  112. Kummaran Singaram, A Data Recorder for post incident management leveraging on pervasiveness of cell phones.
Powered by Create your own unique website with customizable templates.