PhD (University of Malta, India) Dissertations supervised/supervising:
1. Emeka Chukwu, An open-source framework and process guide for intelligent exchange and use of health information in low-resource environments. (Presently pursuing, principal supervisor).
2. Bhushan Dinkar Pawar, Novel Data Analytics Techniques For Analyzing Satellite Imagery Data, Traffic And Environment Pollution Data To Predict The Hospital Admission Rates. (Presently pursuing, principal supervisor).
3. Vijay Prakash, QoS-aware Resource Utilization and Allocation in Cloud Computing, (Presently pursuing, co-supervisor).
4. Alexander Micallef, Delayed discharges of in-patients: the impact on acute hospitals (Presently pursuing, Co-supervisor).
5. Gianpaolo Tomaselli, DIGITAL CSR COMMUNICATION IN HEALTH CARE SERVICES (Completed, Co-supervisor).
DBA:
1. Greg Patey, Medication Adherence in Diseases requiring Specialty Medicines: A Pharmacist’s Perspective on the Interventional Impact of Technology and Pharmaceutical Industry initiated financial assistance through the medium of electronic Payment Cards. (Principal supervisor).
2. Cynthia Wiggins, Content Marketing: An Action Research Approach To Developing A Customer Online Engagement Strategy (Principal supervisor).
Master of Engineering (University of Malta, India) Dissertations supervised:
Master of Engineering (Thapar Institute, India) Dissertations supervised:
Master of Science (University of Liverpool, UK) Dissertation Projects supervised
1. John Charles Wilkinson, “Reducing development time and Increasing Software re-use in a real-time temperature-control environment using incompatible temperature sensing and controlling devices” (Sponsored by Dr Marios N Soutsos, Department of Civil Engineering, University of Liverpool, UK).
2. Chun Ying Liu, “Solution of netlist changes problem in ASIC ECO process” (Sponsored by Mr. Wei Zhang, Shenzhen Titan Micro-Electronics Co. Ltd., China).
3. David Hilton, “RFID tracking within Medical Care Environments” (Sponsored by Mr. Kevin Davies, Mersey Regional Ambulance Service, Liverpool, UK).
4. Graham Butcher, “Developing a mark-up language to describe joins” (Sponsored by Mr. Alan Upstone, Ingenuus Ltd., Shefford, UK).
5. Paul R. Dean, “Adaptive Planning System for a Mass-Customization Manufacturing Process” (sponsored by Kim Ball, Gienow Building Products Ltd., Alberta, Canada).
6. Brian W. McIndoe, “jECHO: A new implementation of Holland’s Complex Adaptive Systems model with the aim of seeking answers to some fundamental open questions”.
7. Richard Robert, “A Framework for the Selection, Use, Deployment and Management of Strong Authentication Mechanisms within Computer Systems”.
8. Ali Al-Abbad, “Work Out A Framework To Resolve Data Security Attacks”.
9. Pascal Printemps, “A Privacy Framework for E-commerce Environments” (sponsored by Mr. Anthony Parcaro, District Manager, Agilysys Canada Inc., Canada).
10. Ian T. Hussain, “Designing and implementing the alarm strategy for a real-time rail station management system”, (Sponsored by Peter Shaw, Team leader METRONET Project, Thales Information Systems).
11. Ramakrishnan Venkataraman, “Demonstrating the various data transformational methods and evaluating the methods in particular situations”.
12. Andy Siu Ngam Ip “Methodology for Requirements Specification of Real-Time Embedded Systems”.
13. Adam Winnington “Designing a secure and open infrastructure to implement change control and management of remote networks”, (sponsored by Frank Rondinone, Access 2 Networks, Canada).
14. Imran Zafar, “An improvement of TABU search algorithm for multiple sequence alignment” (sponsored by Tariq Riaz, Lilly Systems Biology, Singapore).
15. Andrew John Chadwick, “Centralized User Access Management System for a Distributed Computing Environment” (Sponsored by Frank Hoffman, eurodoc Sonovision - ITEP GmbH, Hamburg, Germany).
16. Glen Dalgleish, “The investigation, the analyses, the re-engineering and the implementation of an electronic messaging system” (Sponsored by Ernie Bendinelli, EMI Music, New York).
17. Christopher Brind, “Genetic Music” (Sponsored by John Skelton, Morse, London, UK).
18. Anthony Haigh, “Investigation into the use of RFID for asset management purposes in a water utility” (Sponsored by Alex Smith, Mason Communications, Manchester, UK)
19. David Read, “A Testing Framework for Distributed Embedded Systems”.
20. Stephen Riley, “The feasibility of using digital signatures on employee references and CVs”.
21. Debasish Datta, "A Rule-Based Approach to Automated CSS Generation" (Sponsored by Transputec Computers Plc.).
22. Olive Mckenzie, "RFID in the electronic payment: To investigate the possibility of RFID and biometrics-based authentication mechanism for ensuring secure electronic payment".
23. David H F Copper, "To create an intuitive web-based expert system shell that can be programmed by end users and therefore dispense with the requirement of a knowledge engineer".
24. Gary Wiescher, "Develop a framework and design a template for small and medium multi-site companies in order to facilitate their future hardware and software telecommunications upgrades and implementations", (Sponsored by Mr. Finnbarr Nolan, Snap-on Tools).
25. Stephen Gibbs, "A .NET based Simulator to investigate Swarm Intelligence" (Sponsored by Dr Richard Nicholson, Parameus Limited).
26. Markus Müller, "To develop a framework for state-of-the-art prevention, detection and eradication of software which makes use of stealth processes" (Sponsored by Mr. Mario Lardieri, Richterswil, Switzerland.
27. Dan Beldiman, "Design and implementation of a secure credit card transaction system considering the PCI1 requirements for credit card data handling" (Sponsored by Frank Pieper, netextend GmbH, Emmering, Germany).
28. Hajir Al-Balushi, "Fiber-to-the-Home".
29. Olabode Adeniran, "Voice over Internet Protocol (VoIP): Dealing with security issues on SIP (Session Initiation Protocol) networks".
30. Osaze Ezekiel, "The Implementation of a single log solution and its impact on a multi-application enterprise environment" (Sponsored by Mr. Christopher Anoruo, Enterprise Security Management Division, Zain, Nigeria).
31. Tara Flynn, "Develop a framework for determining the best steganography method for a given application" (Sponsored by Andrew Van Beek, PhotoVanBeek, Ottawa, Canada).
32. Tarik Jackson, "Measuring The Effectiveness of Information Systems Audit" (Sponsored by Daryl Walker, Beckman Coulter Inc., Fullerton, CA, USA).
33. Christian Powell, "Telecommunications Reporting and Management System for Joy Mining Machinery Limited" (Sponsored by Mr. Alan Rogers, Joy Mining Machinery Limited, UK).
34. George Garza, "Approaches for Network Security Intrusion Detection"
35. Jen-Wei Chang, "Comparison and evaluation of the local disk, diskless and ATA-over-Ethernet architectures for the advanced HPC cluster storage architecture"
36. Sanjay Sharma, "Service Oriented Architecture - Impacts for Software Development Organizations" (Sponsored by Mr. Dejan Risimic, HSBC, Canada)
37. Robert Lo, "The use of adaptive fuzzy logic to estimate covert channel in a TCP/IP network" (Sponsored by Christopher R. Elmquist, LogTech Canada Ltd, Canada).
38. Daniel Shull III, "Applying total productivity maintenance (TPM) methods for employees through information technology".
39. Satish Sharma, "Accumulative Software Development" (Sponsored by Mr. Harold Jeffrey Stewart, AT&T Information Technology, USA).
40. Kailash R. Maharaj, "Optimal Search Strategies for Agents in a Constrained Environment", sponsored by Mr. Pierluigi Riva, ORS, Italy.
41. Ofi Idowu Shalom Samuel, "Fraud Management and Revenue Maximization in Telecommunication Industry - A case study of Celtel Telecoms Nigeria Ltd.".
42. Francesco Iorio, "Voice over IP audio processing on the Sony/Toshiba/IBM Cell Broadband Engine, a modern multi-core vector processor" (Sponsored by Maria Hyland, the Dublin High-Performance Computing group, IBM Systems and Technology Group, Dublin, Ireland).
43. Justin Farrugia, "Methodology – A new IT strategy involved in the rapid delivery of business value" (sponsored by Mr. Colm Carey, Pioneer Investments, ).
44. Jean Hupperets, "Developing a Hybrid Point-of-Sale system", (Sponsored by Jeroen Penninx, PPC, the Netherlands).
45. Ahmed Ahmed, "A rule-based system for course scheduling" (Sponsored by Dan Marr, Student Affairs Manager, Zayed University, United Arab Emirates).
46. Ash Galal, "Service Oriented Architecture (SOA), web services vs. REST implementations".
47. Rudolf J. Holzhausen, "Remote Clinical Audio-Alarm Identification, Monitoring and notification in an Isolation Patient Environment" (Sponsored by SAAD Specialist Hospital, Al-Khobar Saudi Arabia).
48. Avril Coipel, "Enhancing the reporting capabilities of a School Administration System using statistical and data mining techniques" (Sponsored by Isabella Prentice, Convent High School, Roseau, Dominica).
49. Lukman Omotoso, "Managing integrated Logistics activities in a farm business," (Sponsored by Abdul Lateef, Sincerity Global Services Ltd., Nigeria).
50. Maurice de Château, "Evaluation of the Effectiveness of Web Services as a Mechanism for Remote Procedure Calls" (Sponsored by Fabio Vignoli, Philips Research Labs Europe, Eindhoven, the Netherlands).
51. Luc Dechamp, "Engineering and Implementation of a Data Monitoring System in a Secured Environment" (Sponsored by Prof. Greet Janssens – Maenhout, Joint Research Centre, Ispra, Italy).
52. Steve L Schiavone, “Information Security in Enterprises as a Complex System - an Ontological Perspective” (Sponsored by Mr. Kelly Summers, VP-CIO Medicis Information Technology Division, Medicis Pharmaceutical Corporation, 7720 N. Dobson Road, Scottsdale 85256 AZ, USA).
53. Barrington Antonio Henry, “Domain Specific Language for Scalable Machine Learning Computer Forensics”, Sponsored by Leon Bernard.
54. Hein Remmen, “Big Data as a Service: Can B2B SaaS companies leverage their data for the benefit of their clients?”, (Sponsored by Bram Cool, General Manager, Ezwim, Netherland. Ronald Dähne, Product Manager (online bookkeeping SaaS product), the Exactonline, Netherland).
55. Ahmad Roumieh, “E-Marketing Strategies Exploiting Social Media for Islamic Banking”, (sponsored by Kuwait International Bank, Kuwait).
56. Eliazar Elisha Audu, Implementation of IP-Based real-time networked control systems using particle swarm (PSO) and artificial neural network (ANN) Optimisation Techniques.
57. Ben Dickinson, Solving Emerging Security Problems that arise from the Facilitation of Increased Availability of Healthcare Data in Electronic Healthcare Systems, (Sponsored by Dr David Stables, Director of Strategic Development. EMIS Ltd.)
58. Jerry Eric Ayitey, Implementation of Virtual Private Network (A Case Study of Ghana Health Service).
59. Sergey Sergey Peretyagin, Back-compatible remote gesture authentication gateway.
60. Adrian Bonett, Evaluating the Virtual Desktop Infrastructure in a Financial Institution: the pros and cons.
61. Muhamad Azhar Muhamad Arifin, Bottom-up approach in ERP implementation into a healthcare. The role and importance of third party in ERP integration. (Sponsored by Kate Williams, Clinical Trials Manager, Research & Innovation, North Bristol NHS Trust).
62. Olutayo Adesuyi, The effect of Intrusion Detection Systems on a Network: A Case Study of the National Emergency Management Agency (Nigeria). (Sponsored by Alhaji Mohammad Sani Sidi, Director General the National Emergency Management Agency (NEMA), Nigeria).
63. Michael Noble, Application of Machine Learning Methods in Modelling HIV Disease Progression.
64. NnaEmeka Chukwu, Mobile Health Insurance System: Sustainable Business Model for Primary Health Centres in Abuja-Nigeria (sponsored by Pathfinder International Nigeria and Nigeria Ministry of Health (National Health Insurance Scheme – NHIS)).
65. Ositadimma Ugwu, A model for secured distributed parallel databases with privacy, trust and security in multi-tenancy environment on public clouds.
66. Sherif Moustafa El Shorbagy, The Impact of Information Systems in Management Performance in Pharmaceutical Industry. (Sponsored by DEEF Pharmaceutical Industries Co. Saudi Arabia).
67. Stefan Scerri, Evaluating Human-Computer Interaction Patterns in the Mobile Nutrition Landscape. (Sponsored by Dr Christian Scerri, Professor at the University of Malta).
68. Thomas Cole, Investigation into cloud computing adoption within the Hedge Fund Industry, (sponsored by Malcolm Butler, COMAC Capital LLP, UK).
69. Efe Unukefe Favour Lucky, Integrated Management Information Systems For Organizational Projects: A Case Study Of Electricity Distribution Companies In Nigeria (sponsored by Abu Ismail Ejoor, Benin Electricity Distribution Company (BEDC), Benin-City, Nigeria).
70. Nicholas Houghton, Development of Object-Oriented Analysis and Design (OOAD) methodology for designing process control system architectures.
71. Peter Sarf, Protection of DNS infrastructure with emphasis on the last hop.
72. Saif AL BADWAWI, Policies, Guidelines and Best Practices for Data Communication / Network infrastructure design for manufacturing companies: A case study at Sohar Aluminium Company (sponsored by Pradeep SAH, Sohar Aluminium, Sultanate of Oman).
73. Shashidharan Shanmugam, Model Employee Appraisal System with Artificial Intelligence Capabilities (sponsored by Mr Sriram Raghunandhan, D.E.Shaw India).
74. Alexcia James, Investigating and evaluating the use of Telecommunications in Operations and Emergency Response in the Aviation Industry, specific reference to Sangster International Airport, Jamaica. (Sponsored by Mr. Alfred Mitchell (MBJ Airports Limited).
75. Amit Sookoo, Method(s) for increasing system performance in an IT Production Support environment and reducing IT system outages.
76. Camele Johnson, Providing Secure Steganography Communication Through TCP/IP Network Protocol.
77. Christopher Adams, Artificial intelligence approach to legal reasoning and its application to disciplinary issues in human resource management (sponsored by Peter McKenna, GT LAW - Employment law Solicitor, Liverpool, L2 4TA, UK).
78. Isak Bosman, The feasibility of behavioural science as a secure and continuous authentication solution on mobile platforms (Sponsored by Responsive Media, Cape Town, South Africa).
79. Luís Adelino Samuel Cláudio, Evaluating potential and sustainability of O2O as a promising e-commerce enabler: A case study in Angola.
80. Solomon Olalekan Oyenuga, Development of a Decision Support System for implementing Security Strategies for Data Protection and Regulatory Compliance in a Cloud-Based Health-Care Environment.
81. Ogundeji Titilola Oyinade, developing a framework for telecommunications profit sharing through automated data mining techniques, (Sponsored by Mr Anthony Opara, MTNN, Johannesburg, South Africa).
82. Francois Hendrik Combrink, Converging RFID, Wi-Fi and Cloud Computing Technologies.
83. Brian Mwine Rutebemberwa, applying data forensics upon an Enterprise Architecture framework for increased data privacy and security to improve health care services in Uganda (sponsored by Dr. Margaret Wandera, Hospital Director, Makerere University Hospital, Kampala, Uganda).
84. Russell Foubert, Looking Beyond Mortgage Rates: An Artificial Neural Network-based Software Application for Canadian Mortgage Brokers (sponsored by Tariq Ali Asghar, President and CEO, Emerging Star Investment Group, Waterloo, ON, Canada).
85. Miyanji Khalid Ahmed, BYOD solution for secure access from any device, at any time and from anywhere to Bank’s applications and data (sponsored by Bank ABC, Manama, Kingdom of Bahrain).
86. Longe Olayinka Hammed, Impact of Employees’ Appraisal and Motivational Techniques in Agile Software Development (sponsored by Mr Ola Olasiyan, Chief Information Officer, Chams Plc, Lagos, Nigeria).
87. Ashok Hariharan, Representing Indian Legislation in Semantic XML.
88. Jurie W. du Preez, The Impact of Cyber Threats on Small / Medium Enterprises (sponsored by Mr. Jan Mattheus Christiaan Steyn, Deputy Director: ICT Governance, University of South Africa, Unisa, South Africa).
89. Turay Filipe De Melo, Investigating commercial indicators as future predictors of the performance of financial institutions. A case study.
90. Ahmad AbdelHalim, A Framework for Successfully Managing Software Development in Offshore Environments.
91. Adil Albalushi, E-Tendering Challenges for Government Entities in Oman.
92. Emmanuel Ramaru, Converging & Centralizing (Bundling & Unbundling) Scattered I.T Support into Shared Services by Implementing a Hybrid Cloud Enterprise Strategic Management System.
93. Adnane Ajroudi, Ontology-driven information management for better decision making in the Oil and Gas Industry.
94. Benjamin Hodzic, creating a model for delivering centralized ICT services within the large International Organizations with its offices located worldwide, using the Internet technologies as the core of the network infrastructure (sponsored by Roy A. Joblin, Chief of ICT services, The United Nations Disengagement Observer Force (UNDOF), United Nations.
95. Sherif Mahmoud, Artificial Intelligence Techniques to Enhance Bank Profitability.
96. Erik Martirorsyan, Micro-bloggers interests similarity identification based on similarity of discussed topics.
97. Alex Williams, Cloud Computing on Computer Forensics: A New Paradigm With New Challenges for Digital Forensics- A Framework for Performing Digital Forensic Investigations on Cloud-Based Systems.
98. Raed Sharaf, ERP Consolidation case study, threats, risks, challenges and feasibility.
99. Jens Stratenwerth, A framework for the centralised storage, access, distribution, knowledge extraction and application of big data from diverse energy data collection systems.
100. Mohamed Emad, Design and Implementation of a High-Performance Computing Infrastructure for IT Department of Mobile Telecommunication in Iraq.
101. Fabrizio Krapf Costa, An API to perform actuarial valuations to Brazilian Pension Funds.
102. Liam Wood, Analysing and comparing clustering techniques for micro blogging sites.
103. Raimundo Matuassa, Impact of Big data analytics at the Bank of Mozambique (sponsored by the Bank of Mozambique, Maputo, Mozambique).
104. Jason Micallef, Mitigating and managing the negative impact of BYOD on the privacy & work-life balance of knowledge workers.
105. Taddeus Pierrot, A cost-efficient ICT design to improve communication, Information, data security and service delivery for health care providers of budget constrained national hospitals. A case study of Owen King EU Hospital, Saint Lucia (Sponsored by Owen King National Hospital, Millennium Highway Castries St. Lucia).
106. Michael Philip Orenda, Exploring feasibility of authenticating web application user using a Brain Computer Interface.
107. Kennedy Njenga, Factors hindering the adoption of cloud computing in higher learning institutions in Kenya and recommendations on the way forward.
108. Roderick Pettenburger-Perwald, A framework for network and information security as contextualized by social, legal, organizational and societal issues – A South African perspective.
109. Darell Antoine Edmond, Adoption of cloud computing in Central Banks.
110. Obinna Eleanya, A Big Data Solution for Personalization of Web Search Results.
111. Dipesh Nagar, Network-Segmentation: An Enabler For Evolving Data Centre Architecture To Address Growing Information Security Concerns, Creating A Network Architecture That Builds A Foundation For Improved Information Security Analysis, Detection, And Alerting.
112. Kummaran Singaram, A Data Recorder for post-incident management leveraging on pervasiveness of cell phones.
113. David Vassallo, BioRFID: A Patient Identification System using Biometrics and RFID (Identifying and Tracking Patients Using Vein Patterns and RFID) (sponsored by 6PM LTD, Malta, Europe)
114. Kennon Rodrigues, Clustering analysis to map customer behaviour in a financial institution using Big Data environment (sponsored by the IT Department, Banco do Brasil (Bank of Brazil), Brasilia – Brazil)
115. Tjiyapo Velempini, The automation of the revenue collection processing systems and the quest for a leaner and more efficient revenue collection agency – A Case Study of the Zimbabwe Revenue Authority (sponsored by Mr. Gesherm Takavada Pasi, Commissioner General, Zimbabwe Revenue Authority (ZIMRA), Harare, ZIMBABWE)
116. Eduardo Serodio Schefer, A DIGITAL WORK ENVIRONMENT AND AUTOMATION OF THE GAMBLING FOLLOW-UP SCALE (GFS) TO HELP CLINICIANS’ DELIVERY OF COMPULSIVE GAMBLING TREATMENT (Sponsored by Dr. Hermano Tavares, Associate Professor, the Department of Psychiatry, University of São Paulo, Brazil)
117. Reem Elsousy, Deep Learning: Predicting DNA promoter sequences using deep learning techniques
118. Andrew Woodward, Moving to the Cloud: A study of organizational culture and behaviour and their effects on strategic change in enterprise software development
119. Mahmoud Sabri, Big Data Lake
120. Shaqeeq Baluch, Cloud Computing In Upstream Oil and Gas Industry; Aspirations, Trends and Limitations (Sponsored by Premier Oil Pakistan Exploration Ltd, Pakistan)
121. Leonardo Pepe De Freitas, Using AI Planning and Decision Theory Paradigm to Automate Cloud Infrastructure Operations.
122. Oluwadamilola Oti, To Develop an improved Digital Forensic Framework for Investigating Identity Theft Crimes – The Era of New Emerging Technologies
123. Craig Hughes, Evaluating the use of Fuzzy logic within a neural network for real-time traffic simulation
124. JingSheng Zhong, Text Categorization on JSON Expressed Text Data
125. Eleftheria Kallikazarou, A tool/method/procedure to analyze risk factors that lead to hypertension
126. Timothy Manas, Using Machine learning algorithms for stock price forecasting based on previous historic stock data & aggregated news analytics data
127. Alfred Mukasa, Techniques for Crowd-sourcing structured data
128. Claude APIOU, Learn from every patient - The Medical Translational Research model
129. Robert Wolsey, An evaluation methodology of Automatic Programming techniques to determine the feasibility of Automatic Programming
130. MICHAEL VASSALLO, Using historical trip information to determine the waiting time required for taxi services (sponsored by Matthew Bezzina, eCabs Limited, Malta)
131. Christopher Sinclair, Secure Implementation of a wireless LTE/Cellular with multiple tenants for the Internet of Things on a public LTE network.
132. Florian Schneider, Running an own container cloud on a Raspberry Pi cluster as a valid alternative for small offices and startups
133. Hassan Machmouchi, Investigating the feasibility of implementing Big Data in Official Statistics
134. Marina Nicolaou, An intelligent system to solve the problem of ever-increasing public hospital waiting lists
135. Owen Mwenefumbo, A cost-effective way of implementing Big data in Health Research in developing countries – case of Malawi
136. Jamal Al Khusaibi, The cloud computing Technology in Oman
137. ThelgeDenzilAnu Peiris, Agile Data Driven Enterprise
138. Adetola Oduguwa, Evaluating the inherent economic benefit of implementing cloud-based solutions in Nigeria
139. Vineeta Persaud, Investigating the effect of a custom-developed Soft Ergonomics application on ergonomic compliance during computer usage to enhance or improve the health and wellbeing of its users.
140. AzaAli Mohamed, Improving security system by enhancing Human factor in Organization
141. Dennis Muraya, Application of IoT (Internet of Things) technologies in farming for better, predictable crop yields and higher return on investment in agribusiness in Kenya
142. Enrico Gebauer, Data Science platforms for machine learning applications by Citizen Data Scientists
143. Nicholas Smith, The Application of Autonomic Computing Principles to Socio-Technical Human Resource Management Processes in Barbados
144. Jason Hudson, The Impact of Caribbean Culture for Web Design and Features
145. Aki Heinesen Hojsted, Detecting Dyslexia in Faroese college students
146. Rana El-Bahrani, Time Management Aspect of Universities and Colleges Applicants Portal System
147. Muraleedaran Kanapathy, Ergonomic Challenges in Modern Workplace with the invent of BYOD & use of Mobile Devices
148. Jason Howland, The influence of IoT on organizational behaviour and the associated risks and benefits
149. Mahmoud Koura, Forensics of Single Board Computers
150. Robert f, Can the internet of things and data analytics help Bermudian Beekeepers identify Hives infected with Varroa Mite more effectively?
151. Fotios Schoinas, Design and implementation of a reactive, component-based application framework for the creation of modular, scalable, isomorphic and progressive Javascript web applications.
152. Sanae Takahashi, Practical COTS product selection
153. Marlene Marinho, Decision framework to migrate ERP to Cloud Computing: the relevance of the organizational size
154. Kristoffer Markwardt, Predicting election outcomes using Facebook data: Evidence from Denmark
155. Anwer Matter, Information sharing and data exchange of e-government applications in developing countries: challenges and solutions, e-Oman as a case study
156. Ebonku Abaku, Effect of Data Analytics in the electrical power industry for retaining customers in Developing countries.
157. Gustavo Mendez Casero, Development of a trading machine program (bot) to operate with cryptocurrencies
158. Lucas Kruger, A Comparison of Logistic Regression, Neural Networks, and Gradient Boosting for predicting defaults on loans.
159. Ridwaan shaik, Building and integrating a performance dashboard to increase the performance of call centre agents in an outbound sales call centre.
160. Basirat Ishola, Developing a Churn Prediction Model.
161. Nurudeen Popoola, Managing High Performance Distributed software team while developing a large-scale Enterprise Application.
162. Krishanu Mukherjee, Big Data for Context-Aware Monitoring - A Personalized Knowledge Discovery Framework for Assisted Health.
163. Dillon Simms, Improving interoperability between Health Information Technology (HIT) systems in Mental Health and Acute Hospitals.
164. Peter Szabo, Microsoft Azure Site Recovery Automated Test Framework.
165. Ivo Vasconcelos, Usage of Web Services to Simplify Devices Enrolment to Improve Network and Services Security
166. Jodie Carleton, Harnessing ABS - the search for an effective Acuity-Based Scheduling model for skilled nursing facilities
167. Robert Nkeramugaba Policies, Procedures and Guidelines for an Information Security Management Framework for an Internet Service Provider with a Compliance Checklist Sample Algorithm - Case Study: Ewanda Internet Service Providers
168. Olukayode Odedina, Security aspects of Machine Learning for anomalies in IoT
169. Zakaria Tahiri, Sport results prediction using rule-based classification techniques
170. Edgar Gonzalez, Classification of business opportunities using machine learning algorithms
171. Marina Nicolaou, An intelligent system to solve the problem of ever-increasing public hospital waiting lists
172. Odhiambo Ochieng, Build a predictive model for marketing and retail pricing
173. Tsang-sung Yang, The establishment of an efficient and cost-effective real-time operational intelligence system through the application of real-time monitoring and big data analysis.
174. Noel Cherfan, Building Information Modeling (BIM) implementation from Software engineering perspective.
175. WilfredCheukKi Leung, Forensic Approach: Cloud Computing & Security Issues
176. Nasrat Sahib, Bank Document Validation and Integration: The role of Artificial Intelligence
177. Jean-Louis Kaliningondo, Using big data analytics to improve a tax administration's performance in a developing country. The case of Rwanda
178. Shahnas AbdulRazol, Implementation of enterprise project management office for project management
179. Eugene Aryeetey, The impact of artificial intelligence on human resource and work output.
180. Simon Hunt, Improving business efficiency via the implementation of bespoke systems.
1. Emeka Chukwu, An open-source framework and process guide for intelligent exchange and use of health information in low-resource environments. (Presently pursuing, principal supervisor).
2. Bhushan Dinkar Pawar, Novel Data Analytics Techniques For Analyzing Satellite Imagery Data, Traffic And Environment Pollution Data To Predict The Hospital Admission Rates. (Presently pursuing, principal supervisor).
3. Vijay Prakash, QoS-aware Resource Utilization and Allocation in Cloud Computing, (Presently pursuing, co-supervisor).
4. Alexander Micallef, Delayed discharges of in-patients: the impact on acute hospitals (Presently pursuing, Co-supervisor).
5. Gianpaolo Tomaselli, DIGITAL CSR COMMUNICATION IN HEALTH CARE SERVICES (Completed, Co-supervisor).
DBA:
1. Greg Patey, Medication Adherence in Diseases requiring Specialty Medicines: A Pharmacist’s Perspective on the Interventional Impact of Technology and Pharmaceutical Industry initiated financial assistance through the medium of electronic Payment Cards. (Principal supervisor).
2. Cynthia Wiggins, Content Marketing: An Action Research Approach To Developing A Customer Online Engagement Strategy (Principal supervisor).
Master of Engineering (University of Malta, India) Dissertations supervised:
- Desanov Polidano, “Novel machine learning techniques for predicting and prognosticating treatment outcome based on patient characteristics”.
- Aidan Zerafa, “Novel machine learning techniques for predicting/prognosticating Covid-19 infections based on environmental factors”.
- Waylon Grech, “A Novel Recommender System to Determine the Optimal Software Development Lifecycle Model in Software Projects”.
- LalitMohan Dixit, “Epilepsy Detection by channel localised analysis using EEG”.
- Akhilesh Sharma, “Fusion of signal processing and ML for epileptic seizure prediction”.
- Sylvia Bugeja, "Applications of Machine Learning Techniques for the Modelling of EEG Data for Diagnosis of Epileptic Seizures".
- Chatzoglou Polychronis, “Novel techniques and applications for missing data analysis”.
- David Farrugia, " Large-Scale Actionable Interesting Pattern Mining".
- Josephine Cassar, “Developing an Integrated Care Pathway for Infrainguinal Bypass Surgery”
- Davide Dorato, “A New Approach to Financial Forecasting Using Gene Expression Programming”
- David Farrrugia, “Large-Scale Actionable Interesting Pattern Mining”
Master of Engineering (Thapar Institute, India) Dissertations supervised:
- Sona Rani, “Blue tooth approach for toll tax applications”.
- Puja Mudgil, “Circuit Partitioning using Quantum Computing”.
- Mandeep Kaur, “Problem Solving using Quantum Computing and Quantum Clique algorithm”.
- V. S. Shankar Sriram, “Methodology For Designing High Speed Reconfigurable Custom Computer”.
Master of Science (University of Liverpool, UK) Dissertation Projects supervised
1. John Charles Wilkinson, “Reducing development time and Increasing Software re-use in a real-time temperature-control environment using incompatible temperature sensing and controlling devices” (Sponsored by Dr Marios N Soutsos, Department of Civil Engineering, University of Liverpool, UK).
2. Chun Ying Liu, “Solution of netlist changes problem in ASIC ECO process” (Sponsored by Mr. Wei Zhang, Shenzhen Titan Micro-Electronics Co. Ltd., China).
3. David Hilton, “RFID tracking within Medical Care Environments” (Sponsored by Mr. Kevin Davies, Mersey Regional Ambulance Service, Liverpool, UK).
4. Graham Butcher, “Developing a mark-up language to describe joins” (Sponsored by Mr. Alan Upstone, Ingenuus Ltd., Shefford, UK).
5. Paul R. Dean, “Adaptive Planning System for a Mass-Customization Manufacturing Process” (sponsored by Kim Ball, Gienow Building Products Ltd., Alberta, Canada).
6. Brian W. McIndoe, “jECHO: A new implementation of Holland’s Complex Adaptive Systems model with the aim of seeking answers to some fundamental open questions”.
7. Richard Robert, “A Framework for the Selection, Use, Deployment and Management of Strong Authentication Mechanisms within Computer Systems”.
8. Ali Al-Abbad, “Work Out A Framework To Resolve Data Security Attacks”.
9. Pascal Printemps, “A Privacy Framework for E-commerce Environments” (sponsored by Mr. Anthony Parcaro, District Manager, Agilysys Canada Inc., Canada).
10. Ian T. Hussain, “Designing and implementing the alarm strategy for a real-time rail station management system”, (Sponsored by Peter Shaw, Team leader METRONET Project, Thales Information Systems).
11. Ramakrishnan Venkataraman, “Demonstrating the various data transformational methods and evaluating the methods in particular situations”.
12. Andy Siu Ngam Ip “Methodology for Requirements Specification of Real-Time Embedded Systems”.
13. Adam Winnington “Designing a secure and open infrastructure to implement change control and management of remote networks”, (sponsored by Frank Rondinone, Access 2 Networks, Canada).
14. Imran Zafar, “An improvement of TABU search algorithm for multiple sequence alignment” (sponsored by Tariq Riaz, Lilly Systems Biology, Singapore).
15. Andrew John Chadwick, “Centralized User Access Management System for a Distributed Computing Environment” (Sponsored by Frank Hoffman, eurodoc Sonovision - ITEP GmbH, Hamburg, Germany).
16. Glen Dalgleish, “The investigation, the analyses, the re-engineering and the implementation of an electronic messaging system” (Sponsored by Ernie Bendinelli, EMI Music, New York).
17. Christopher Brind, “Genetic Music” (Sponsored by John Skelton, Morse, London, UK).
18. Anthony Haigh, “Investigation into the use of RFID for asset management purposes in a water utility” (Sponsored by Alex Smith, Mason Communications, Manchester, UK)
19. David Read, “A Testing Framework for Distributed Embedded Systems”.
20. Stephen Riley, “The feasibility of using digital signatures on employee references and CVs”.
21. Debasish Datta, "A Rule-Based Approach to Automated CSS Generation" (Sponsored by Transputec Computers Plc.).
22. Olive Mckenzie, "RFID in the electronic payment: To investigate the possibility of RFID and biometrics-based authentication mechanism for ensuring secure electronic payment".
23. David H F Copper, "To create an intuitive web-based expert system shell that can be programmed by end users and therefore dispense with the requirement of a knowledge engineer".
24. Gary Wiescher, "Develop a framework and design a template for small and medium multi-site companies in order to facilitate their future hardware and software telecommunications upgrades and implementations", (Sponsored by Mr. Finnbarr Nolan, Snap-on Tools).
25. Stephen Gibbs, "A .NET based Simulator to investigate Swarm Intelligence" (Sponsored by Dr Richard Nicholson, Parameus Limited).
26. Markus Müller, "To develop a framework for state-of-the-art prevention, detection and eradication of software which makes use of stealth processes" (Sponsored by Mr. Mario Lardieri, Richterswil, Switzerland.
27. Dan Beldiman, "Design and implementation of a secure credit card transaction system considering the PCI1 requirements for credit card data handling" (Sponsored by Frank Pieper, netextend GmbH, Emmering, Germany).
28. Hajir Al-Balushi, "Fiber-to-the-Home".
29. Olabode Adeniran, "Voice over Internet Protocol (VoIP): Dealing with security issues on SIP (Session Initiation Protocol) networks".
30. Osaze Ezekiel, "The Implementation of a single log solution and its impact on a multi-application enterprise environment" (Sponsored by Mr. Christopher Anoruo, Enterprise Security Management Division, Zain, Nigeria).
31. Tara Flynn, "Develop a framework for determining the best steganography method for a given application" (Sponsored by Andrew Van Beek, PhotoVanBeek, Ottawa, Canada).
32. Tarik Jackson, "Measuring The Effectiveness of Information Systems Audit" (Sponsored by Daryl Walker, Beckman Coulter Inc., Fullerton, CA, USA).
33. Christian Powell, "Telecommunications Reporting and Management System for Joy Mining Machinery Limited" (Sponsored by Mr. Alan Rogers, Joy Mining Machinery Limited, UK).
34. George Garza, "Approaches for Network Security Intrusion Detection"
35. Jen-Wei Chang, "Comparison and evaluation of the local disk, diskless and ATA-over-Ethernet architectures for the advanced HPC cluster storage architecture"
36. Sanjay Sharma, "Service Oriented Architecture - Impacts for Software Development Organizations" (Sponsored by Mr. Dejan Risimic, HSBC, Canada)
37. Robert Lo, "The use of adaptive fuzzy logic to estimate covert channel in a TCP/IP network" (Sponsored by Christopher R. Elmquist, LogTech Canada Ltd, Canada).
38. Daniel Shull III, "Applying total productivity maintenance (TPM) methods for employees through information technology".
39. Satish Sharma, "Accumulative Software Development" (Sponsored by Mr. Harold Jeffrey Stewart, AT&T Information Technology, USA).
40. Kailash R. Maharaj, "Optimal Search Strategies for Agents in a Constrained Environment", sponsored by Mr. Pierluigi Riva, ORS, Italy.
41. Ofi Idowu Shalom Samuel, "Fraud Management and Revenue Maximization in Telecommunication Industry - A case study of Celtel Telecoms Nigeria Ltd.".
42. Francesco Iorio, "Voice over IP audio processing on the Sony/Toshiba/IBM Cell Broadband Engine, a modern multi-core vector processor" (Sponsored by Maria Hyland, the Dublin High-Performance Computing group, IBM Systems and Technology Group, Dublin, Ireland).
43. Justin Farrugia, "Methodology – A new IT strategy involved in the rapid delivery of business value" (sponsored by Mr. Colm Carey, Pioneer Investments, ).
44. Jean Hupperets, "Developing a Hybrid Point-of-Sale system", (Sponsored by Jeroen Penninx, PPC, the Netherlands).
45. Ahmed Ahmed, "A rule-based system for course scheduling" (Sponsored by Dan Marr, Student Affairs Manager, Zayed University, United Arab Emirates).
46. Ash Galal, "Service Oriented Architecture (SOA), web services vs. REST implementations".
47. Rudolf J. Holzhausen, "Remote Clinical Audio-Alarm Identification, Monitoring and notification in an Isolation Patient Environment" (Sponsored by SAAD Specialist Hospital, Al-Khobar Saudi Arabia).
48. Avril Coipel, "Enhancing the reporting capabilities of a School Administration System using statistical and data mining techniques" (Sponsored by Isabella Prentice, Convent High School, Roseau, Dominica).
49. Lukman Omotoso, "Managing integrated Logistics activities in a farm business," (Sponsored by Abdul Lateef, Sincerity Global Services Ltd., Nigeria).
50. Maurice de Château, "Evaluation of the Effectiveness of Web Services as a Mechanism for Remote Procedure Calls" (Sponsored by Fabio Vignoli, Philips Research Labs Europe, Eindhoven, the Netherlands).
51. Luc Dechamp, "Engineering and Implementation of a Data Monitoring System in a Secured Environment" (Sponsored by Prof. Greet Janssens – Maenhout, Joint Research Centre, Ispra, Italy).
52. Steve L Schiavone, “Information Security in Enterprises as a Complex System - an Ontological Perspective” (Sponsored by Mr. Kelly Summers, VP-CIO Medicis Information Technology Division, Medicis Pharmaceutical Corporation, 7720 N. Dobson Road, Scottsdale 85256 AZ, USA).
53. Barrington Antonio Henry, “Domain Specific Language for Scalable Machine Learning Computer Forensics”, Sponsored by Leon Bernard.
54. Hein Remmen, “Big Data as a Service: Can B2B SaaS companies leverage their data for the benefit of their clients?”, (Sponsored by Bram Cool, General Manager, Ezwim, Netherland. Ronald Dähne, Product Manager (online bookkeeping SaaS product), the Exactonline, Netherland).
55. Ahmad Roumieh, “E-Marketing Strategies Exploiting Social Media for Islamic Banking”, (sponsored by Kuwait International Bank, Kuwait).
56. Eliazar Elisha Audu, Implementation of IP-Based real-time networked control systems using particle swarm (PSO) and artificial neural network (ANN) Optimisation Techniques.
57. Ben Dickinson, Solving Emerging Security Problems that arise from the Facilitation of Increased Availability of Healthcare Data in Electronic Healthcare Systems, (Sponsored by Dr David Stables, Director of Strategic Development. EMIS Ltd.)
58. Jerry Eric Ayitey, Implementation of Virtual Private Network (A Case Study of Ghana Health Service).
59. Sergey Sergey Peretyagin, Back-compatible remote gesture authentication gateway.
60. Adrian Bonett, Evaluating the Virtual Desktop Infrastructure in a Financial Institution: the pros and cons.
61. Muhamad Azhar Muhamad Arifin, Bottom-up approach in ERP implementation into a healthcare. The role and importance of third party in ERP integration. (Sponsored by Kate Williams, Clinical Trials Manager, Research & Innovation, North Bristol NHS Trust).
62. Olutayo Adesuyi, The effect of Intrusion Detection Systems on a Network: A Case Study of the National Emergency Management Agency (Nigeria). (Sponsored by Alhaji Mohammad Sani Sidi, Director General the National Emergency Management Agency (NEMA), Nigeria).
63. Michael Noble, Application of Machine Learning Methods in Modelling HIV Disease Progression.
64. NnaEmeka Chukwu, Mobile Health Insurance System: Sustainable Business Model for Primary Health Centres in Abuja-Nigeria (sponsored by Pathfinder International Nigeria and Nigeria Ministry of Health (National Health Insurance Scheme – NHIS)).
65. Ositadimma Ugwu, A model for secured distributed parallel databases with privacy, trust and security in multi-tenancy environment on public clouds.
66. Sherif Moustafa El Shorbagy, The Impact of Information Systems in Management Performance in Pharmaceutical Industry. (Sponsored by DEEF Pharmaceutical Industries Co. Saudi Arabia).
67. Stefan Scerri, Evaluating Human-Computer Interaction Patterns in the Mobile Nutrition Landscape. (Sponsored by Dr Christian Scerri, Professor at the University of Malta).
68. Thomas Cole, Investigation into cloud computing adoption within the Hedge Fund Industry, (sponsored by Malcolm Butler, COMAC Capital LLP, UK).
69. Efe Unukefe Favour Lucky, Integrated Management Information Systems For Organizational Projects: A Case Study Of Electricity Distribution Companies In Nigeria (sponsored by Abu Ismail Ejoor, Benin Electricity Distribution Company (BEDC), Benin-City, Nigeria).
70. Nicholas Houghton, Development of Object-Oriented Analysis and Design (OOAD) methodology for designing process control system architectures.
71. Peter Sarf, Protection of DNS infrastructure with emphasis on the last hop.
72. Saif AL BADWAWI, Policies, Guidelines and Best Practices for Data Communication / Network infrastructure design for manufacturing companies: A case study at Sohar Aluminium Company (sponsored by Pradeep SAH, Sohar Aluminium, Sultanate of Oman).
73. Shashidharan Shanmugam, Model Employee Appraisal System with Artificial Intelligence Capabilities (sponsored by Mr Sriram Raghunandhan, D.E.Shaw India).
74. Alexcia James, Investigating and evaluating the use of Telecommunications in Operations and Emergency Response in the Aviation Industry, specific reference to Sangster International Airport, Jamaica. (Sponsored by Mr. Alfred Mitchell (MBJ Airports Limited).
75. Amit Sookoo, Method(s) for increasing system performance in an IT Production Support environment and reducing IT system outages.
76. Camele Johnson, Providing Secure Steganography Communication Through TCP/IP Network Protocol.
77. Christopher Adams, Artificial intelligence approach to legal reasoning and its application to disciplinary issues in human resource management (sponsored by Peter McKenna, GT LAW - Employment law Solicitor, Liverpool, L2 4TA, UK).
78. Isak Bosman, The feasibility of behavioural science as a secure and continuous authentication solution on mobile platforms (Sponsored by Responsive Media, Cape Town, South Africa).
79. Luís Adelino Samuel Cláudio, Evaluating potential and sustainability of O2O as a promising e-commerce enabler: A case study in Angola.
80. Solomon Olalekan Oyenuga, Development of a Decision Support System for implementing Security Strategies for Data Protection and Regulatory Compliance in a Cloud-Based Health-Care Environment.
81. Ogundeji Titilola Oyinade, developing a framework for telecommunications profit sharing through automated data mining techniques, (Sponsored by Mr Anthony Opara, MTNN, Johannesburg, South Africa).
82. Francois Hendrik Combrink, Converging RFID, Wi-Fi and Cloud Computing Technologies.
83. Brian Mwine Rutebemberwa, applying data forensics upon an Enterprise Architecture framework for increased data privacy and security to improve health care services in Uganda (sponsored by Dr. Margaret Wandera, Hospital Director, Makerere University Hospital, Kampala, Uganda).
84. Russell Foubert, Looking Beyond Mortgage Rates: An Artificial Neural Network-based Software Application for Canadian Mortgage Brokers (sponsored by Tariq Ali Asghar, President and CEO, Emerging Star Investment Group, Waterloo, ON, Canada).
85. Miyanji Khalid Ahmed, BYOD solution for secure access from any device, at any time and from anywhere to Bank’s applications and data (sponsored by Bank ABC, Manama, Kingdom of Bahrain).
86. Longe Olayinka Hammed, Impact of Employees’ Appraisal and Motivational Techniques in Agile Software Development (sponsored by Mr Ola Olasiyan, Chief Information Officer, Chams Plc, Lagos, Nigeria).
87. Ashok Hariharan, Representing Indian Legislation in Semantic XML.
88. Jurie W. du Preez, The Impact of Cyber Threats on Small / Medium Enterprises (sponsored by Mr. Jan Mattheus Christiaan Steyn, Deputy Director: ICT Governance, University of South Africa, Unisa, South Africa).
89. Turay Filipe De Melo, Investigating commercial indicators as future predictors of the performance of financial institutions. A case study.
90. Ahmad AbdelHalim, A Framework for Successfully Managing Software Development in Offshore Environments.
91. Adil Albalushi, E-Tendering Challenges for Government Entities in Oman.
92. Emmanuel Ramaru, Converging & Centralizing (Bundling & Unbundling) Scattered I.T Support into Shared Services by Implementing a Hybrid Cloud Enterprise Strategic Management System.
93. Adnane Ajroudi, Ontology-driven information management for better decision making in the Oil and Gas Industry.
94. Benjamin Hodzic, creating a model for delivering centralized ICT services within the large International Organizations with its offices located worldwide, using the Internet technologies as the core of the network infrastructure (sponsored by Roy A. Joblin, Chief of ICT services, The United Nations Disengagement Observer Force (UNDOF), United Nations.
95. Sherif Mahmoud, Artificial Intelligence Techniques to Enhance Bank Profitability.
96. Erik Martirorsyan, Micro-bloggers interests similarity identification based on similarity of discussed topics.
97. Alex Williams, Cloud Computing on Computer Forensics: A New Paradigm With New Challenges for Digital Forensics- A Framework for Performing Digital Forensic Investigations on Cloud-Based Systems.
98. Raed Sharaf, ERP Consolidation case study, threats, risks, challenges and feasibility.
99. Jens Stratenwerth, A framework for the centralised storage, access, distribution, knowledge extraction and application of big data from diverse energy data collection systems.
100. Mohamed Emad, Design and Implementation of a High-Performance Computing Infrastructure for IT Department of Mobile Telecommunication in Iraq.
101. Fabrizio Krapf Costa, An API to perform actuarial valuations to Brazilian Pension Funds.
102. Liam Wood, Analysing and comparing clustering techniques for micro blogging sites.
103. Raimundo Matuassa, Impact of Big data analytics at the Bank of Mozambique (sponsored by the Bank of Mozambique, Maputo, Mozambique).
104. Jason Micallef, Mitigating and managing the negative impact of BYOD on the privacy & work-life balance of knowledge workers.
105. Taddeus Pierrot, A cost-efficient ICT design to improve communication, Information, data security and service delivery for health care providers of budget constrained national hospitals. A case study of Owen King EU Hospital, Saint Lucia (Sponsored by Owen King National Hospital, Millennium Highway Castries St. Lucia).
106. Michael Philip Orenda, Exploring feasibility of authenticating web application user using a Brain Computer Interface.
107. Kennedy Njenga, Factors hindering the adoption of cloud computing in higher learning institutions in Kenya and recommendations on the way forward.
108. Roderick Pettenburger-Perwald, A framework for network and information security as contextualized by social, legal, organizational and societal issues – A South African perspective.
109. Darell Antoine Edmond, Adoption of cloud computing in Central Banks.
110. Obinna Eleanya, A Big Data Solution for Personalization of Web Search Results.
111. Dipesh Nagar, Network-Segmentation: An Enabler For Evolving Data Centre Architecture To Address Growing Information Security Concerns, Creating A Network Architecture That Builds A Foundation For Improved Information Security Analysis, Detection, And Alerting.
112. Kummaran Singaram, A Data Recorder for post-incident management leveraging on pervasiveness of cell phones.
113. David Vassallo, BioRFID: A Patient Identification System using Biometrics and RFID (Identifying and Tracking Patients Using Vein Patterns and RFID) (sponsored by 6PM LTD, Malta, Europe)
114. Kennon Rodrigues, Clustering analysis to map customer behaviour in a financial institution using Big Data environment (sponsored by the IT Department, Banco do Brasil (Bank of Brazil), Brasilia – Brazil)
115. Tjiyapo Velempini, The automation of the revenue collection processing systems and the quest for a leaner and more efficient revenue collection agency – A Case Study of the Zimbabwe Revenue Authority (sponsored by Mr. Gesherm Takavada Pasi, Commissioner General, Zimbabwe Revenue Authority (ZIMRA), Harare, ZIMBABWE)
116. Eduardo Serodio Schefer, A DIGITAL WORK ENVIRONMENT AND AUTOMATION OF THE GAMBLING FOLLOW-UP SCALE (GFS) TO HELP CLINICIANS’ DELIVERY OF COMPULSIVE GAMBLING TREATMENT (Sponsored by Dr. Hermano Tavares, Associate Professor, the Department of Psychiatry, University of São Paulo, Brazil)
117. Reem Elsousy, Deep Learning: Predicting DNA promoter sequences using deep learning techniques
118. Andrew Woodward, Moving to the Cloud: A study of organizational culture and behaviour and their effects on strategic change in enterprise software development
119. Mahmoud Sabri, Big Data Lake
120. Shaqeeq Baluch, Cloud Computing In Upstream Oil and Gas Industry; Aspirations, Trends and Limitations (Sponsored by Premier Oil Pakistan Exploration Ltd, Pakistan)
121. Leonardo Pepe De Freitas, Using AI Planning and Decision Theory Paradigm to Automate Cloud Infrastructure Operations.
122. Oluwadamilola Oti, To Develop an improved Digital Forensic Framework for Investigating Identity Theft Crimes – The Era of New Emerging Technologies
123. Craig Hughes, Evaluating the use of Fuzzy logic within a neural network for real-time traffic simulation
124. JingSheng Zhong, Text Categorization on JSON Expressed Text Data
125. Eleftheria Kallikazarou, A tool/method/procedure to analyze risk factors that lead to hypertension
126. Timothy Manas, Using Machine learning algorithms for stock price forecasting based on previous historic stock data & aggregated news analytics data
127. Alfred Mukasa, Techniques for Crowd-sourcing structured data
128. Claude APIOU, Learn from every patient - The Medical Translational Research model
129. Robert Wolsey, An evaluation methodology of Automatic Programming techniques to determine the feasibility of Automatic Programming
130. MICHAEL VASSALLO, Using historical trip information to determine the waiting time required for taxi services (sponsored by Matthew Bezzina, eCabs Limited, Malta)
131. Christopher Sinclair, Secure Implementation of a wireless LTE/Cellular with multiple tenants for the Internet of Things on a public LTE network.
132. Florian Schneider, Running an own container cloud on a Raspberry Pi cluster as a valid alternative for small offices and startups
133. Hassan Machmouchi, Investigating the feasibility of implementing Big Data in Official Statistics
134. Marina Nicolaou, An intelligent system to solve the problem of ever-increasing public hospital waiting lists
135. Owen Mwenefumbo, A cost-effective way of implementing Big data in Health Research in developing countries – case of Malawi
136. Jamal Al Khusaibi, The cloud computing Technology in Oman
137. ThelgeDenzilAnu Peiris, Agile Data Driven Enterprise
138. Adetola Oduguwa, Evaluating the inherent economic benefit of implementing cloud-based solutions in Nigeria
139. Vineeta Persaud, Investigating the effect of a custom-developed Soft Ergonomics application on ergonomic compliance during computer usage to enhance or improve the health and wellbeing of its users.
140. AzaAli Mohamed, Improving security system by enhancing Human factor in Organization
141. Dennis Muraya, Application of IoT (Internet of Things) technologies in farming for better, predictable crop yields and higher return on investment in agribusiness in Kenya
142. Enrico Gebauer, Data Science platforms for machine learning applications by Citizen Data Scientists
143. Nicholas Smith, The Application of Autonomic Computing Principles to Socio-Technical Human Resource Management Processes in Barbados
144. Jason Hudson, The Impact of Caribbean Culture for Web Design and Features
145. Aki Heinesen Hojsted, Detecting Dyslexia in Faroese college students
146. Rana El-Bahrani, Time Management Aspect of Universities and Colleges Applicants Portal System
147. Muraleedaran Kanapathy, Ergonomic Challenges in Modern Workplace with the invent of BYOD & use of Mobile Devices
148. Jason Howland, The influence of IoT on organizational behaviour and the associated risks and benefits
149. Mahmoud Koura, Forensics of Single Board Computers
150. Robert f, Can the internet of things and data analytics help Bermudian Beekeepers identify Hives infected with Varroa Mite more effectively?
151. Fotios Schoinas, Design and implementation of a reactive, component-based application framework for the creation of modular, scalable, isomorphic and progressive Javascript web applications.
152. Sanae Takahashi, Practical COTS product selection
153. Marlene Marinho, Decision framework to migrate ERP to Cloud Computing: the relevance of the organizational size
154. Kristoffer Markwardt, Predicting election outcomes using Facebook data: Evidence from Denmark
155. Anwer Matter, Information sharing and data exchange of e-government applications in developing countries: challenges and solutions, e-Oman as a case study
156. Ebonku Abaku, Effect of Data Analytics in the electrical power industry for retaining customers in Developing countries.
157. Gustavo Mendez Casero, Development of a trading machine program (bot) to operate with cryptocurrencies
158. Lucas Kruger, A Comparison of Logistic Regression, Neural Networks, and Gradient Boosting for predicting defaults on loans.
159. Ridwaan shaik, Building and integrating a performance dashboard to increase the performance of call centre agents in an outbound sales call centre.
160. Basirat Ishola, Developing a Churn Prediction Model.
161. Nurudeen Popoola, Managing High Performance Distributed software team while developing a large-scale Enterprise Application.
162. Krishanu Mukherjee, Big Data for Context-Aware Monitoring - A Personalized Knowledge Discovery Framework for Assisted Health.
163. Dillon Simms, Improving interoperability between Health Information Technology (HIT) systems in Mental Health and Acute Hospitals.
164. Peter Szabo, Microsoft Azure Site Recovery Automated Test Framework.
165. Ivo Vasconcelos, Usage of Web Services to Simplify Devices Enrolment to Improve Network and Services Security
166. Jodie Carleton, Harnessing ABS - the search for an effective Acuity-Based Scheduling model for skilled nursing facilities
167. Robert Nkeramugaba Policies, Procedures and Guidelines for an Information Security Management Framework for an Internet Service Provider with a Compliance Checklist Sample Algorithm - Case Study: Ewanda Internet Service Providers
168. Olukayode Odedina, Security aspects of Machine Learning for anomalies in IoT
169. Zakaria Tahiri, Sport results prediction using rule-based classification techniques
170. Edgar Gonzalez, Classification of business opportunities using machine learning algorithms
171. Marina Nicolaou, An intelligent system to solve the problem of ever-increasing public hospital waiting lists
172. Odhiambo Ochieng, Build a predictive model for marketing and retail pricing
173. Tsang-sung Yang, The establishment of an efficient and cost-effective real-time operational intelligence system through the application of real-time monitoring and big data analysis.
174. Noel Cherfan, Building Information Modeling (BIM) implementation from Software engineering perspective.
175. WilfredCheukKi Leung, Forensic Approach: Cloud Computing & Security Issues
176. Nasrat Sahib, Bank Document Validation and Integration: The role of Artificial Intelligence
177. Jean-Louis Kaliningondo, Using big data analytics to improve a tax administration's performance in a developing country. The case of Rwanda
178. Shahnas AbdulRazol, Implementation of enterprise project management office for project management
179. Eugene Aryeetey, The impact of artificial intelligence on human resource and work output.
180. Simon Hunt, Improving business efficiency via the implementation of bespoke systems.