Digital Thesis & Project Room
![]() |
||||||
DTPR SCIS-2: Athabasca University Digital Thesis & Project Room |
||||||
Description
|
||||||
Abimbola, B. (2017). The Relationship between Unified Communications (UC) and Big Data Analytics ©
Availability: Campus
Abiodun, O. I. (2014). LEARNER ANALYTICS AND VISUALIZATION TECHNIQUES (Abstract only) ©
Availability: Release After 1 year
Abou taka, M. (2019). Mobile Educational Environments Using Recommender Systems: A Systematic Review ©
Availability: Open access
Adepoju, A. O. (2013). STUDY OF IMPACT OF COMPUTERS ENERGY USAGE ON ENVIRONMENT (Abstract only) ©
Availability: Release After 1 year
Adewole, I. BABATUNDE. (2016). BENCHMARKING CLOUD COMPUTING PLATFORMS ©
Availability: Campus
Ahmad, M. (2015). AN INTELLIGENT AGENT-BASED APPROACH TO NETWORK MANAGEMENT ©
Availability: Open access
Ahmad, O. (2011). ANALYSIS OF USING ASPECT-ORIENTED PROGRAMMING IN DEVELOPING SELF-ADAPTIVE E-LEARNING SYSTEMS THAT UTILIZE CODE EXAMPLES ©
Availability: Campus
Ahmed, S. (2011). FINDING THE RELATIONS BETWEEN THE TOPICS AND MOBILE LEARNING MODES ©
Availability: Open access
Ahnassay, A. (2012). A SYSTEMATIC REVIEW OF EMPIRICAL EVALUATIONS IN THE SOFTWARE PRODUCT LINES DOMAIN ©
Availability: Open access
Ainslie, P. (2019). USING VISUALIZATIONS TO ENSURE PRIVACY OF HEALTHCARE DATA ©
Availability: Campus
Ajram, K. TALAL. (2019). IoT Security and Privacy Preservation (Abstract only) ©
Availability: Release After 1 year
Ako-nai, F. A. (2014). 5R ADAPTIVE CONTENT CREATION PLATFORM (Abstract only) ©
Availability: Release After 1 year
Al subihi, M. H. (2010). Managing System Security Patches in an Enterprise Network ©
Availability: Open access
Ali, L. (2009). USE OF ONTOLOGIES AND WIKIS IN ELICITING SOFTWARE REQUIREMENTS ©
Availability: Campus
Alvi, H. S. (2016). INFORMATION SECURITY ASSESSMENTS IN THE PUBLIC SECTOR – METRICS, PROTOCOLS AND PRACTICES ©
Availability: Open access
Angulo cabrera, J. (2010). AGENT TECHNOLOGY IN ADAPTIVE LEARNING SYSTEMS ©
Availability: Open access
Anodua, A. C. (2015). ADVANCEMENTS IN INFORMATION STORAGE AND IMPACT ON INFORMATION MANAGEMENT ©
Availability: Open access
Anwar, F. (2011). GENDER HCI IN IT AND VOCATION ©
Availability: Open access
Arbash, R. (2023). Informal Learning Capturing and Credentialing in Online Context: Solutions and Challenges ©
Availability: Campus
Armstrong, A. J. (2012). Optimizing Course-Offerings with MAS ©
Availability: Campus
Awodein, O. (2018). SECURITY AND PRIVACY ISSUES IN HEALTHCARE CLOUD COMPUTING ©
Availability: Campus
Bahadursha, A. K. (2018). USING VIRTUAL REALITY TO SOLVE AUTHENTICITY PROBLEM IN ONLINE EXAMS ©
Availability: Open access
Ballay, U. H. (2023). Comprehensive Medicinal and Nutritional Interactions Database for Substances Involved in the Prevention and Treatment of SARS-COV-2/ COVID-19 ©
Availability: Campus
Bannan, M. W. (2018). Reinforcement Learning for Autonomous Driving and Re-Routing ©
Availability: Open access
Barker, G. E. (2009). Finding Patterns of Alert from Ubiquitous Sensor Data ©
Availability: Open access
Barlow, R. E. (2007). A STUDY OF SECURITY IN LEARNING MANAGEMENT SYSTEMS ©
Availability: Open access
Barsoum, S. (2007). SEMANTIC WEB SERVICES AND ITS APPLICATIONS IN BUSINESS PROCESS MODELS ©
Availability: Open access
Bashir, A. (2018). Cloud Computing – Big Data as a Service (BDAAS) and its Impact in the Business World ©
Availability: Open access
Baumstark, K. A. (2012). A FRAMEWORK FOR INTEGRATING MOTIVATIONAL TECHNIQUES INTO E-LEARNING SYSTEMS ©
Availability: Open access
Bento figueredo, S. (2016). ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS ©
Availability: Open access
Besney, M. D. (2012). Cognitive Modeling of Learners through Game Approach ©
Availability: Open access
Bilkhu, B. (2021). CYBERSECURITY IN HEALTH CARE INSTITUTIONS ©
Availability: Open access
Blair, J. S. (2011). An Approach for Integrating 3D Virtual Worlds and Multi Agent Systems ©
Availability: Open access
Boogaart, M. (2008). USING ROLE-BASED ACCESS CONTROL WITH ACTIVE DIRECTORY TO SECURE NETWORKED COMPUTERS DURING COMPUTER BASED EXAMS ©
Availability: Open access
Boundy, B. T. (2018). STUDY ON ENCRYPTION: CURRENT ISSUES AND FUTURE IMPACTS ©
Availability: Open access
Brennan, P. (2008). AN APPLICATION OF VISUAL STRESS THEORY TO HUMAN COMPUTER INTERACTION ©
Availability: Open access
Bretz, M. J. (2019). A REVIEW OF MODELING LAND-USE AND LAND-COVER USING MACHINE LEARNING TECHNIQUES ©
Availability: Campus
Brighton, P. (2015). Research, review and analysis of modern PHP frameworks (Abstract only) ©
Availability: Release After 5 years
Brown, D. W. (2012). A Survey of Mobile Augmented Reality Technologies for Combat Identification Applications ©
Availability: Open access
Brown, L. G. (2014). IMPROVING STUDENT PERSISTENCE WITH LEARNING ANALYTICS TOOLS AND DASHBOARDS ©
Availability: Open access
Brown, W. J.. (2015). Using Learning Analytics Data from a Traditional Classroom Environment to Influence Metacognition ©
Availability: Open access
Cachia, D. (2014). An Overview of ICT Devices and Systems in Aviation for Efficiency, Safety, and Reliability ©
Availability: Open access
Campbell, J. PAUL. (2017). Deep Semantic Linking for RDF Triples ©
Availability: Open access
Campbell, R. THOMAS ALEXANDER. (2022). ADVANCEMENTS IN SERVERLESS COMPUTING ©
Availability: Open access
Cato, D. C. (2009). MOBILE COLLABORATIVE INFORMATION SYSTEM USING DISTRIBUTED DATABASE ARCHITECTURE ©
Availability: Open access
Chandler, S. E.. (2013). TOWARDS THE USE OF THE CROWD IN MAINTAINING A CONFIGURATION MANAGEMENT DATABASE ©
Availability: Open access
Chang, N. (2013). REAL TIME DATAWAREHOUSING (PLUS THE ASSOCIATED IMPACT ON BUSINESS INTELLIGNENCE) ©
Availability: Campus
Channaa, W. (2019). An investigation of the Robots Appearances for Educational Purpose ©
Availability: Open access
Chen, A. J. (2007). TEAMWorks Mobile - Towards a Better IT Solution for Construction Management in the Oil and Gas Industry ©
Availability: Open access
Chen, C. Q. (2016). WeChat Security Issues ©
Availability: Campus
Chen, Y. (2010). IT Project Risks Identification, Using KeyGraph (Abstract only) ©
Availability: Release After 5 years
Chien, A. (2008). STUDY ON AVAILABILITY AND RELIABILITY ISSUES IN WEB PORTAL SYSTEMS ©
Availability: Open access
Chin, P. (2017). OPTIMIZING THE BANDWIDTH OF VIRTUAL INFRASTRUCTURE (Abstract only) ©
Availability: Release After 1 year
Chin, P. OI LAM. (2016). OPTIMIZING THE BANDWIDTH OF VIRTUAL INFRASTRUCTURE (Abstract only) ©
Availability: Release After 1 year
Chizelu, G. M. (2013). TECHNIQUES, TOOLS AND PROTOCOLS FOR IDENTIFYING AND REMOVING VULNERABILITIES ON ENTERPRISE COMPUTER NETWORKS. ©
Availability: Campus
Christiansen, J. S. (2007). From Estrangement To Engagement: Information And Communication Technologies For Strong Democracy (Abstract only) ©
Availability: Release After 5 years
Colic, A. (2014). Enhancing Search in Enterprise Content Management (ECM) Systems with Social Tagging and Semantic Analysis ©
Availability: Campus
Corbett, P. R. (2020). IMPROVING PROBLEM SOLVING, ASSOCIATIVE REASONING AND ORGANIZATION AND PLANNING META-COGNITIVE SKILLS THROUGH ONLINE GAMING ©
Availability: Open access
Cordner, K. DANIEL. (2021). ADAPTING SEMANTIC PROCESSING TECHNIQUES TOWARDS DISCOURSE ANALYSIS EVALUATION (Abstract only) ©
Availability: Release After 1 year
Cox, L. J. (2011). FEATURE-ORIENTED DOMAIN ANALYSIS FOR SEMANTIC WEB SERVICES ©
Availability: Open access
Coyne, D. M. (2010). Application Mashups in the Enterprise ©
Availability: Open access
Crossland, C. A. (2021). Big Data Analytics in Supporting and Implementing Business Intelligence ©
Availability: Open access
Curry, J. E.. (2009). A Survey of Fun Factors for Massively Multiplayer Online Role Playing Games ©
Availability: Open access
Cutrone, L. A. (2011). Assessing Students' Answers to Open Questions ©
Availability: Open access
Cuzzola, J. (2011). Multi-Stage Novelty Filtering - An unsupervised machine learning approach to software testing and quality assurance. ©
Availability: Open access
Dahir, F. (2014). CLOUD COMPUTING – WHY MANY COMPANIES ARE HESISTANT TO USE IT ©
Availability: Open access
Das, D. (2010). LEARNING ASSESSMENT FOR ONLINE COURSES ©
Availability: Open access
Davidson, B. R. (2018). VISUALIZING BENEFITS: EVALUATING THE BENEFITS OF INFORMATION TECHNOLOGY APPLICATIONS IN A HEALTH CARE ENVIRONMENT ©
Availability: Open access
De domenico, J. (2020). A SYSTEMATIC LITERATURE REVIEW ON KNOWLEDGE STRUCTURES DESIGNED AND USED IN ADVANCED LEARNING ©
Availability: Open access
Delaney, J. M. (2012). Convey Emotions with Social Media ©
Availability: Campus
Deo, N. N. (2018). OMNI-CHANNEL CRM WITH ROBOTIC AUTOMATION IN THE CANADIAN BANKING SECTOR ©
Availability: Campus
Dewolfe, S. K. (2011). SMALL SCREEN; BIG PROBLEMS: THE CONTRIBUTIONS AND PROMISE (PAST, PRESENT, & FUTURE) OF HCI IN PROVIDING USABLE MOBILE INTERFACES ©
Availability: Open access
Dhall, M. (2018). BUILDING A PROFITABLE HYBRID DESKTOP AS A SERVICE (DAAS) SOLUTION FOR SERVICE PROVIDERS USING MICROSOFT CLOUD SERVICES ©
Availability: Open access
Dias, S. D. (2009). SURVEY OF VOIP-BASED TECHNOLOGY AND SUGGESTIONS FOR IMPROVEMENTS ©
Availability: Campus
Difilippo, S. (2017). The Effect of Action-Selection in Reinforcement Learning (Abstract only) ©
Availability: Release After 1 year
Dreher, J. D. (2021). DIGITAL TRANSFORMATION VIA 4IR IN CANADA'S FINSERV INDUSTRY ©
Availability: Open access
Dunwoody, D. (2021). Systematic Literature Review on Classification and Information Retrieval for Potential Metadata File Management System ©
Availability: Open access
Dutchuk, D. M.. (2011). A SURVEY OF THE STATE OF THE ART: TECHNOLOGIES TO SUPPORT NONVERBAL COMMUNICATIONS IN A 3D VIRTUAL ENVIRONMENT ©
Availability: Open access
Esterhazy, J. (2014). THE HIERARCHICAL DIRICHLET PROCESS FOR ANNOTATED DATA ©
Availability: Open access
Fakinlede, I. E. (2018). Two Preposition-Centric Knowledge Representation Frames for Semantic Analysis ©
Availability: Open access
Farrell, A. L. (2008). Selecting a Software Development Methodology based on Organizational Characteristics ©
Availability: Open access
Ferrie, G. (2011). THE BENEFITS OF MANAGED DISKLESS CLIENT TECHNOLOGIES IN AN EDUCATIONAL ENVIRONMENT ©
Availability: Open access
Fietkiewicz, J. J. (2009). A SURVEY OF ISSUES SURROUNDING THE IMPLEMENTATION OF ACCESSIBLE WEB SITES ©
Availability: Open access
Fleming, B. D. (2009). THE PEDAGOGICAL VALUE OF AVATARS IN DISTANCE EDUCATION ©
Availability: Open access
Fleming, R. (2020). THE HUMANITARIAN CLOUD: A GLOBAL CLOUD-BASED COMMUNITY RESOURCE ©
Availability: Open access
Forestell, F. (2010). e-CONSULTATION FOR CANADIAN WORKERS COMPENSATION BOARDS ©
Availability: Campus
Forner, L. (2013). Assessing Design of Online Courses Using Bayesian Belief Networks ©
Availability: Campus
Francis, D. A. (2011). ADAPTIVITY AND PERSONALIZATION IN UBIQUITOUS SYSTEMS ©
Availability: Campus
Freeman, G. C. (2021). Strategies for Improving the Management of IT Projects within the Healthcare Sector: A Systematic Review ©
Availability: Open access
Fuson, T. (2022). The Future of Computation: Capabilities, Costs and Consumer Demand ©
Availability: Open access
Gama da cunha, E. (2016). CULTURAL IMPACT OF THE DIGITAL DIVIDE: PROBLEMS AND SOLUTIONS (Abstract only) ©
Availability: Release After 1 year
Gates, A. (2008). Distributed Artificial Intelligence for Computer Chess ©
Availability: Open access
Gawryluik, B. WILLIAM. (2012). THE FUTURE OF EXASCALE SYSTEMS MANAGEMENT: AN INVESTIGATION INTO THE CHALLENGES OF ADMINISTERING EXTREME-SCALE HPC SYSTEMS BEFORE THE YEAR 2020 ©
Availability: Campus
Gazo, S. (2016). Cloud Computing Security Threats and Solutions ©
Availability: Open access
Ghai, A. (2007). SECURITY ASSESSMENT OF ENTERPRISE COMPUTER NETWORKS (Abstract only) ©
Availability: Release After 3 years
Gibson, M. G. (2013). A UNIVERSAL WEB APPLICATION FOR REMOTELY CONTROLLING ROBOTS ©
Availability: Open access
Glenn, B. RICHARD. (2013). KNOWLEDGE BASE EVENT DRIVEN ARCHITECTURE A HEALTH CARE WORKFLOW MANAGEMENT PERSPECTIVE (Abstract only) ©
Availability: Release After 1 year
Gonzalez, N. J. (2017). Front-End Database Software comparison: Proprietary vs. Open Source ©
Availability: Campus
Gorbatenko, Y. (2011). CHARGEBACK FORECASTING AND FRAUD ANALYZING IN CREDIT CARD PROCESSING ORGANIZATION (Abstract only) ©
Availability: Release After 3 years
Graziosi, M. (2021). From Monolithic to Microservices Using Serverless Computing - A Holistic Approach ©
Availability: Open access
Grewal, M. S. (2014). Intrusion Detection Tools and Techniques for Computer Networks ©
Availability: Campus
Gross, M. (2011). USING GEOLOCATION IN AUTHENTICATION AND FRAUD DETECTION FOR WEB-BASED SYSTEMS ©
Availability: Open access
Gurdon, L. (2020). LIFE CYCLE COST ANALYSIS OF CONTAMINATED SITE REMEDIATION FOR DECISION MAKING USING INFORMATION TECHNOLOGY TOOLS ©
Availability: Open access
Hachey, G. (2011). SEMANTIC WEB USER INTERFACE: A SYSTEMATIC MAPPING STUDY ©
Availability: Campus
Haji, S. (2016). A hybrid Model for Information Security Risk Assessment ©
Availability: Open access
Harnack, B. E.. (2020). Digital Information and Communication Technology (DICT) For Pandemic Management ©
Availability: Open access
He, J. SERENE. (2012). FINDING THE RELATIONS BETWEEN THE TOPICS AND MOBILE LEARNING MODES ©
Availability: Campus
Hettiarachchi, H. (2011). AGENT-ORIENTED SOFTWARE ENGINEERING AND TRUST ©
Availability: Campus
Ho, P. CC. (2009). Agent Based Approach To Interoperability ©
Availability: Open access
Holubeshen, J. R. (2012). Reconstructing Damaged Text Using Multi-Level Fitness Testing and Genetic Algorithms ©
Availability: Open access
Hovey, G. A. (2018). EDUCATIONAL DATA MINING: PROFILING AT-RISK STUDENTS USING ADMISSIONS DATA ©
Availability: Campus
Hristov, J. (2016). Topic Recognition and Sentiment Analysis on Travel Reviews (Abstract only) ©
Availability: Release After 1 year
Hunter, B. (2012). An Analysis of the Alternatives to Traditional Static Alphanumeric Passwords ©
Availability: Open access
Hussein hamad, M. (2021). SOLVING TRADITIONAL BI ISSUES BY MOVING INTO THE CLOUD ©
Availability: Campus
Hwata, T. (2016). Intrusion Behavior Pattern Detection based on Time-Series and Sequential Data Mining ©
Availability: Campus
Ibiam, P. A. (2022). CLOUD COMPUTING ISSUES ©
Availability: Campus
Ibrahim, S. (2019). INFORMATION PRIVACY CONCERNS: SOCIAL NETWORKS AS AN EXAMPLE ©
Availability: Campus
Ivascu, N. (2016). INFERENCE ENGINE APPLICATION FOR HEALTH CONDITION DIAGNOSIS AND INFORMATION RECOMMENDATION ©
Availability: Campus
Jain, A. (2007). Business Intelligence (BI) Application Development from the Operational Data ©
Availability: Open access
Jeffrey, N. (2021). REMOTE LEARNING WITH NETWORKING LABS ©
Availability: Open access
Jilal, T. (2023). EduOps ©
Availability:Open access
Jomm, E. (2016). Privacy Protection on Social Media: Issues, Practice, Technology and Policies ©
Availability: Campus
Jones, D. A. (2012). EDUCATIONAL MASSIVELY MULTIPLAYER ONLINE ROLE PLAYING GAME FOR TEACHING YOUTH FINANCE ©
Availability: Campus
Jovicic, S. (2017). Machine Learning For Money Laundering Detection In A Blockchain Financial Transaction System ©
Availability: Open access
Kadaba, D. S. (2012). A CENTRALIZED REPOSITORY TO ENHANCE PROJECT COMMUNICATIONS ©
Availability: Open access
Kainola, M. J. (2022). IMPROVING THE EFFECTIVENESS AND TIMELINESS OF CRITICAL CONTROLS USING COMPUTER VISION, IOT, AND PREDICTIVE TECHNOLOGIES ©
Availability: Campus
Kalmar, S. (2013). STUDENT ATTRITION IN COMPUTER SCIENCE COURSES: A COMPUTATIONAL PERSPECTIVE ©
Availability: Open access
Kapila, R. (2015). CLOUD COMPUTING: RECENT SECURITY CONCERNS, POSSIBLE SOLUTIONS (Abstract only) ©
Availability: Release After 5 years
Karbalai, K. (2016). Addressing the Challenges of Big Data Management and Visualization ©
Availability: Campus
Karim, B. (2016). CLOUD APPLICATION DEVELOPMENT MODEL (Abstract only) ©
Availability: Release After 3 years
Karsch, J. (2012). Oracles for Web Application Testing ©
Availability: Open access
Kemp, R. JOHN. (2023). ALGORITHMIC STUDY OF ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ©
Availability: Open access
Kennedy, A. S. (2009). SMALL NETWORK MONITORING APPROACHES ©
Availability: Open access
Keomanivong, D. (2016). SECURITY ASSESSMENT OF INFORMATION SECURITY FOR SMALL BUSINESSES ©
Availability: Open access
Khan, I. (2014). Modern Methodology & Tools for Data Warehouse Development ©
Availability: Open access
Khan, S. (2016). A MULTIAGNET BASED SIMULATION MODEL FOR DETERMINING THE OPTIMAL SCHEDULE REVISION INTERVAL FOR WELL SCHEDULING ©
Availability: Campus
Khan, S. NAWAZ. (2019). Cloud Computing Privacy Concerns ©
Availability: Campus
Kharazmi, A. (2016). Privacy issues and challenges in designing and deploying mobile healthcare ©
Availability: Campus
Kiadi moghaddam, M. (2013). Introduction to Cloud Computing ©
Availability: Campus
Klimek, K. P. (2019). Limitations of Artificial Intelligence Technology in Autonomous Vehicles: Red Light Ahead? ©
Availability: Open access
Koncan, A. R. (2014). A LITERATURE SURVEY OF THE GLOBAL DIGITAL DIVIDE AND INDIGENOUS PEOPLES ©
Availability: Open access
Krupa, A. R. (2010). Analyze Aspect-Oriented Software Approach and Its Application ©
Availability: Open access
Krys, G. (2015). SEMI-SUPERVISED METHOD FOR DISCOVERY OF PROPERTY-VALUE PAIRS ©
Availability: Campus
Kukreja, V. (2008). BEST PRACTICES - IMPLEMENTING ENTERPRISE RESOURCE PLANNING APPLICATIONS ©
Availability: Open access
Kurcz, J. M. (2016). ACS – AN ADAPTIVE COLLABORATIVE LEARNING SYSTEM FOCUSING ON SUPPORTING PROJECT MANAGEMENT AND COMMUNICATION IN TEAMS ©
Availability: Open access
Lad, K. (2019). Building Trust Between Agents Using Smart Contracts ©
Availability: Campus
Lam, S. (2012). Supervised Training with Rule-Based Approach of Activities Recognition ©
Availability: Campus
Lam, W. (2014). A Survey of Predictive Analytics in Data Mining with Big Data ©
Availability: Open access
Lang, A. (2012). FLEXIBLE BUSINESS PROCESS MODELING – A SYSTEMATIC MAPPING STUDY ©
Availability: Open access
Lange, G. D. (2014). Design of a Multi Agent System to Support the Well Scheduling Process in the Oil and Gas Industry ©
Availability: Open access
Lee, B. C. (2021). A Comprehensive Study on Malware ©
Availability: Open access
Lei, L. K. (2016). Big Data Analytics for the Public School Board – A Practical Approach to Unstructured Data ©
Availability: Campus
Lemaire, L. AJ. (2020). CYBER SECURITY AWARENESS TRAINING: RECOMMENDATIONS FOR THE DEPARTMENT OF NATIONAL DEFENCE ©
Availability: Open access
Lenihan, A. L. (2013). INFORMATION SECURITY ASSESSMENT STANDARDS, TOOLS, TECHNIQUES AND METRICS ©
Availability: Open access
Lepage, B. W. (2010). Towards More Effective Course Design ©
Availability: Campus
Lessard, M. (2012). Identification of cognitive traits through game method ©
Availability: Open access
Li, S. (2023). Scientific Research Data Visualization Software and Library Exploration ©
Availability: Campus
Liaukonis, J. (2020). A COMPARATIVE STUDY OF DATACENTER ARCHITECTURES ©
Availability: Campus
Lien, C. (2022). Utilizing Open Source Toolkits to Fight Bias In AI Systems? ©
Availability: Campus
Lin, H. (2014). A Survey of Data Consistency in Cloud DBs ©
Availability: Open access
Liu, T. (2021). TOOLS AND PROTOCOLS FOR IDENTIFYING AND REMOVING VULNERABILITIES ON ENTERPRISE COMPUTER NETWORKS ©
Availability: Open access
Lo, S. (2012). Healthcare data mining from clinical and administrative systems ©
Availability: Campus
Loewen, J. G. (2009). THE STUDY AND APPLICATION OF IMS LEARNING DESIGN SPECIFICATIONS IN A MOBILE, FIRST NATIONS CONTEXT ©
Availability: Open access
Loken, G. (2020). EXAMINING THE ROLE OF EXPERIENCE IN SCRIPTED VERSUS UNSCRIPTED TESTING AND FURTHER RESEARCH ©
Availability: Open access
Lu, X. (2014). Applying Fuzzy Logic for Data Governance ©
Availability: Open access
Mac, A. B. (2014). KNOWLEDGE MANAGEMENT SYSTEMS ARCHITECTURE (Abstract only) ©
Availability: Release After 3 years
Macgregor, J. JOHN. (2009). PATHFINDING STRATEGY FOR MULTIPLE NON-PLAYING CHARACTERS AND AGENTS IN A 2.5D GAME WORLD ©
Availability: Open access
Mackey, P. G. (2012). Community of Practice in a Distributed Northern Environment ©
Availability: Open access
Mackowetzky, L. D. (2010). COMMON BODY OF KNOWLEDGE FOR NETWORK FORENSIC SCIENCE ©
Availability: Open access
Madan, M. (2017). SOLOMO PEDIATRIC HOME HEALTH CARE ©
Availability:Open access
Maguire, P. (2016). PRIVATE CARS, PUBLIC CLOUD: VEHICULAR CLOUD COMPUTING CHALLENGES AND FUTURE ©
Availability: Open access
Mah, P. R. (2009). LEAN SOFTWARE DEVELOPMENT AND INFORMATION TECHNOLOGY THE TOYOTA WAY ©
Availability: Open access
Mamatbekov, B. J. (2018). ENVIRONMENT-ADAPTIVE LEARNING FOR SMART HOME ENERGY MANAGEMENT ©
Availability: Campus
Marshall, G. K. (2014). Automatic Twitter Topic Summarization ©
Availability: Open access
Martelli, R. (2007). FORCE PROTECTION: RESPONSE COORDINATION USING THE CONTRACT NET ©
Availability: Open access
Masood, N. (2020). THE ROLE OF POLICIES IN MITIGATING THE THREAT OF CYBERATTACKS THROUGH SOCIAL MEDIA PLATFORMS IN GOVERNMENT ©
Availability: Open access
Mcclure, G. D. (2012). INTEGRATING A MULTI-AGENT SYSTEM WITH A VIRTUAL WORLD ©
Availability: Open access
Mcnorgan, M. (2021). EXPLORING USER AND ORGANIZATIONAL REQUIREMENTS OF DIGITAL BADGING SYSTEMS WITHIN HIGHER LEARNING ENVIRONMENTS BY UNCOVERING AND EXPLORING OBSTACLES AND DRIVERS TO THEIR ADOPTION ©
Availability: Open access
Meller, T. N. (2009). Constructing a Prototype of an Intelligent Web Application for Program Planning ©
Availability: Open access
Mezei, S. (2010). Mobile Learning Accessibility Issues ©
Availability: Open access
Mills, R. A. (2015). CONTEXTUAL SOLUTION TO DATA CENTRIC ENTERPRISE APPLICATION ACCESS AND SUPPORT ©
Availability: Open access
Ming chun, T. (2016). The Cloud Implementation: A review of existing IaaS platforms ©
Availability: Campus
Miu, M. C. (2016). AGGREGATION OF MAP (GEOSPATIAL) DATA ©
Availability: Open access
Mobley-kasner, R. LEE. (2019). OPEN DATA MANAGEMENT AND INTEGRATION ©
Availability: Open access
Momot, F. (2021). CHALLENGES IN THE IMPLEMENTATION OF SMART TRANSPORTATION INFRASTRUCTURE ©
Availability: Open access
Moreno pachon, W. (2021). Data Visualizations to Support Decision Making: An Approach to Look at Completion on Higher Education Institutions ©
Availability: Campus
Mottus, A. M. (2013). Teacher Decision Making in a Ubiquitous Learning Environment ©
Availability: Open access
Mu, P. (2009). A STUDY ON REPUTATION SYSTEMS IN INTERNET MARKET ©
Availability: Open access
Mughal, F. (2016). DATA SECURITY OPTIMIZATION IN CLOUD COMPUTING ©
Availability:Open access
Muhammadi, K. (2009). MARTS - Multi-Agent Based Regression Testing Suite ©
Availability: Open access
Mui, J. (2021). A SURVEY ON ADAPTIVE TASK ASSIGNMENTS WITH MULTI-ARMED BANDIT ALGORITHMS FOR CYBERLEARNING ©
Availability: Open access
Mulalic, S. (2018). The Advantages and Affordances of Mobile Augmented Reality Applications in Education: A Systematic Review ©
Availability: Campus
Mulligan, S. P. (2018). AN ESSAY EXPLORING SOCIAL MEDIA IN ELEMENTARY SCHOOLS: USING GROUNDED THEORY TO SEARCH FOR THEMES FROM INTERVIEWS WITH ELEMENTARY SCHOOL TEACHERS ON THEIR USE OF SOCIAL SOFTWARE IN ELEMENTARY SCHOOL CLASSROOMS ©
Availability: Open access
Mungo, C. A. (2016). New development of technology, tools and practice for intrusion detection on enterprise computer networks ©
Availability: Campus
Murugesupillai, E. (2011). A SYSTEMATIC MAPPING STUDY OF APPROACHES BRIDGING SOFTWARE PRODUCT LINE AND SERVICE-ORIENTED ARCHITECTURE ©
Availability: Open access
Narasimhan, S. (2009). ARCHITECTURE PATTERNS FOR MIGRATING WEB APPLICATIONS TO MULTI-AGENT SYSTEMS ©
Availability: Open access
Nazir, M. (2023). IMPACT OF 5G NETWORK ON IoT COMMUNICATION ©
Availability: Campus
Nguyen, M. T. (2018). OPTIMIZING WELL TASK RESCHEDULING INTERVALS THROUGH MULTI-ARMED BANDIT ALGORITHMS ©
Availability: Open access
Nincic, V. (2010). TOWARDS A NEW FRAMEWORK FOR DRM IN MULTIMEDIA CONTENT DELIVERY FOR M-LEARNING ©
Availability: Open access
Nobert, C. A. (2009). TECHNIQUES FOR INTEGRATING PHP AND JAVA APPLICATIONS ©
Availability: Open access
Nowak, P. M. (2014). INTEROPERABILITY CHALLENGES WITH CLOUD COMPUTING ©
Availability: Open access
O'connor, S. (2009). TEXT MINING FOR BUSINESS INTELLIGENCE ©
Availability: Campus
O'neil, J. M. (2013). Social Computing and Collaborative Intelligence For e-Learning ©
Availability: Campus
Olojede, O. (2022). HIGH AVAILABILITY OPTIONS FOR BUILDING FAILSAFE ENTERPRISE IT SYSTEM ©
Availability: Open access
Oloyede, T. DAVID. (2019). ENTERPRISE SECURITY TOOLS AND TECHNIQUES FOR PAYMENT CARD INDUSTRY (PCI) COMPLIANCE ©
Availability: Campus
Oyejola, O. ENITAN. (2020). DECISION-MAKING AND TESTING OF VOIP NETWORK SYSTEM DURING DEPLOYMENT PROJECT ©
Availability: Open access
Pabla, M. SINGH. (2012). Applying Time Series Data Mining Technique to Improve Radiological Workflow ©
Availability: Campus
Park, L. R. (2023). Security in Virtual Computing Environments ©
Availability: Open access
Park, L. REX. (2023). Security in Virtual Computing Environments ©
Availability: Open access
Patterson, R. B. (2011). Teaching Computer Programming using Educational Robots ©
Availability: Open access
Peddle, B. A.D.. (2020). Automated Exchange in Land Command and Control Information Systems: A Canadian Perspective ©
Availability: Open access
Pengelly, N. (2009). TECHNOLOGY CONVERGENCE IN THE HOME SETTING ©
Availability: Campus
Peonte, I. (2009). THE FUN FACTORS OF MMORPG ©
Availability: Open access
Petit, M. (2022). Big Data Governance in the Department of National Defence and the Canadian Armed Forces (Abstract only) ©
Availability: Release After 5 years
Pierson, S. MERLE. (2023). CONSIDERING DISTANCE LEARNING COURSE STRUCTURES AND FEATURES THAT IMPACT LEARNER SUCCESS, FAILURE, OR DROPOUT (Abstract only) ©
Availability: Release After 1 year
Piron-chen, C. (2010). AN INVESTIGATION INTO THE INTEGRATION AND CHARACTERIZATION OF BUSINESS VALUE IN SOFTWARE ENGINEERING ©
Availability: Open access
Pomeroy, A. (2010). Effective SQL Injection Attack Reconstruction Using Network Recording ©
Availability: Open access
Ponomarev, N. PETROVICH. (2018). SOCIAL NETWORK AS CONTEXTUAL INFORMATION FOR DISAMBIGUATION OF WORD SENSE AND NAMED ENTITIES IN MICROBLOGGING TEXT ©
Availability: Open access
Post, J. D. (2009). EQUITY PREDICTION USING A NEURAL NETWORK AND TECHNICAL ANALYSIS-BASED INPUTS ©
Availability: Campus
Prezel, V. (2010). REPRESENTATIONAL ANALYSIS OF SELECTED BUSINESS PROCESS AND BUSINESS RULE MODELING LANGUAGES ©
Availability: Campus
Primeau, D. (2020). Applications of the Internet of Things - Promises and Challenges ©
Availability: Campus
Quito, B. G.. (2022). COMPARE AND CONTRAST LiDAR AND NON-LiDAR TECHNOLOGY IN AN AUTONOMOUS VEHICLE: DEVELOPING A SAFETY FRAMEWORK ©
Availability: Open access
Rafiq, S. (2019). THE USE OF OPEN SOURCE SOFTWARE IN PUBLIC SECTOR (Abstract only) ©
Availability: Release After 3 years
Rajpal, M. A. (2011). CHALLENGES IN DISTRIBUTED AGILE SOFTWARE DEVELOPMENT ©
Availability: Campus
Randhawa, A. S. (2020). WHAT IS V2X (VEHICLE-TO-EVERYTHING) AND IT’S ROLE IN THE PROGRESSION OF AUTONOMOUS VEHICLES? ©
Availability: Open access
Ray-chaudhuri, R. (2021). ENABLING MULTI-INSTITUTIONAL COLLABORATION IN HEALTHCARE INFORMATION SHARING WITH PRIVACY-ENHANCING TECHNOLOGIES ©
Availability: Campus
Regner, T. N E. (2014). E-GOVERNMENT: CITIZEN CENTRIC SERVICE DELIVERY UTILIZING WEB BASED TECHNOLOGIES ©
Availability: Open access
Ridgewell, W. W. (2011). Determination and Exploitation of Potential Security Vulnerabilities in Networked Game Devices ©
Availability: Open access
Risling, D. (2016). Enhancing Organizational Knowledge Management Through Natural Language Processing ©
Availability: Open access
Rivoire, P. J. (2018). THE DESIGN OF A NEW YEAR-ROUND FREE COOLING SYSTEM USING DECISION TREE SUPPORT ©
Availability: Campus
Rizvi, B. S.H. (2013). A SYSTEMATIC REVIEW OF DISTRIBUTED AGILE SOFTWARE ENGINEERING ©
Availability: Open access
Rocha, L. (2011). RULE ENHANCED BUSINESS PROCESS MODELING OF SERVICE ORIENTED ARCHITECTURES ©
Availability: Open access
Romanowska, K. (2023). Cyberbullying Detection: Deep Transfer Learning and Generalization with Imbalanced and Cross-Platform Data ©
Availability: Campus
Rombough, J. CHARLES. (2020). Dynamic malware detection using LSTM based GANs and Linux system calls ©
Availability: Open access
Rondeau, R. L. (2014). CLOUD ADOPTION DECISION SUPPORT TOOLS ©
Availability: Open access
Ronholm, J. GE. (2015). INDIVIDUALIZING DIGITAL GAMING FOR E-LEARNING ©
Availability: Open access
Rusk, J. (2009). SEMANTIC WEB SERVICES-BASED REASONING IN THE DESIGN OF SOFTWARE PRODUCT LINES ©
Availability: Open access
Samad, M. A. (2008). WEB SERVICES – A SOLUTION OF INTEROPERABILITY AND PORTABILITY PROBLEMS OF ENTERPRISE SOFTWARE INTEGRATION ©
Availability: Open access
Samuel, I. S. (2021). DEVSECOPS - THE MINDSET, IMPLEMENTATION, AND TOOLS ©
Availability: Open access
San pedro, E. M. (2009). CAN TEST DRIVEN DEVELOPMENT IMPROVE POKER ROBOT PERFORMANCE? ©
Availability: Open access
Sauder, W. H. (2023). CREATING THE PALETTE OF HUMAN EXPRESSION: EXPRESSION ATTRIBUTE TRANSMISSION FOR FACIAL REENACTMENT DURING VIDEO CONFERENCING (Abstract only) ©
Availability: Release After 1 year
Savjord, A. B. (0000). SHARING MULTIMEDIA BUSINESS OBJECTS IN A SEMANTIC-RICH, SERVICE ORIENTED ENVIRONMENT ©
Availability: Campus
Schneider, C. W. (2008). GRIDS – ARE THEY READY FOR THE ENTERPRISE? ©
Availability:Open access
Schumacher, F. W. (2008). EMAIL VISUALIZATION STRATEGIES TO SUPPORT TASK MANAGEMENT ©
Availability: Open access
Shabani, S. (2012). A FRAMEWORK FOR USER MODELING IN A MULTI-USER GAME BUILT IN A MULTI-AGENT SYSTEMS ENVIRONMENT ©
Availability: Campus
Shankardass, A. (2009). THE DYNAMIC ADAPTATION OF AN ASPECT ORIENTED BUSINESS PROCESS IN A SERVICE ORIENTED ARCHITECTURE PLATFORM ©
Availability: Open access
Sharma, B. (2022). IMPACTS AND OPPORTUNITIES OF AR/VR IN ONLINE LEARNING ©
Availability: Open access
Sharma, S. (2011). Knowledge Uncertainty in Intelligent System ©
Availability: Open access
Sheikh, M. IBN IFTIKHAR. (2019). A STUDY OF SENTIMENT ANALYSIS USING CONVOLUTIONAL NEURAL NETWORK ON TWITTER DATA ©
Availability: Campus
Shenoda, B. SAM. (2009). SPATIAL ANALYSIS FOR CRANE LIFTING ON CONSTRUCTION SITES ©
Availability: Open access
Ship, H. (2009). CONCURRENT PROGRAMMING: A CASE STUDY ON DUAL CORE COMPUTERS ©
Availability: Open access
Shtern, V. (2014). Towards collaborative architecture for immersing hypervideo-based interaction within connectivist learning ©
Availability:Open access
Silva, R. (2021). Learning Management Systems to Promote Students’ Engagement ©
Availability: Campus
Simons, R. (2015). A LITERATURE REVIEW OF CONTEXT-AWARE ADAPTIVE MOBILE LEARNING SYSTEMS ©
Availability: Open access
Smith, C. (2008). ENTERPRISE ARCHITECTURE FRAMEWORK APPLICATIONS TOWARDS SERVICE ORIENTED ARCHITECTURE ©
Availability: Open access
Smith, K. A. (2020). EVALUATING DATASETS AND FRAMEWORKS FOR GOVERNMENT OPEN DATA ©
Availability: Open access
Smith, R. C. (2014). BUILDING A BETTER VIEW INTO DISTANCE-LEARNING ©
Availability: Open access
Sodhi, S. SINGH. (2022). AGILE COURSE DESIGN ©
Availability: Open access
Steele, A. (2011). TOWARDS DESKTOP VIRTUALIZATION WITHIN MID-SIZED POST-SECONDARY INSTITUTIONS: INVESTIGATION, ANALYSIS & RECOMMENDATIONS (Abstract only) ©
Availability: Release After 1 year
Stewart, C. L. (2022). A SYSTEMIC MAPPING STUDY OF BUSINESS INTELLIGENCE MATURITY MODELS FOR HIGHER EDUCATION INSTITUTIONS ©
Availability: Campus
Stubbings, J. (2017). JOINT INTELLIGENCE SURVEILLANCE AND RECONNAISSANCE (JISR) IN RESTRICTED BANDWIDTH ENVIRONMENTS: A STUDY OF THE RELATIONSHIP BETWEEN BANDWIDTH AND EXPLOITABILITY OF FULL MOTION VIDEO (FMV) ©
Availability: Campus
Sweeney, A. J. (2009). AGILE AND OPEN E-LEARNING SYSTEMS ARCHITECTURE ©
Availability: Open access
Tang, B. (2020). MACHINE LEARNING IN HEALTHCARE ANALYTICS OF COMMUNICABLE DISEASES ©
Availability: Open access
Thayaparan, A. (2012). Enterprise Integration with Messaging ©
Availability: Campus
Thesappiriyan, S. (2012). Digital Games, Academia and Our Digital Kids (Abstract only) ©
Availability: Release After 3 years
Thiruvasagam, S. (2017). EMPIRICAL EVIDENCE IN REQUIREMENTS ENGINEERING A SYSTEMATIC MAPPING STUDY (Abstract only) ©
Availability: Release After 1 year
Thorne, M. R G. (2009). THE IMPACT OF ONLINE COURSE DESIGN AND DELIVERY ON NON NATIVE SPEAKING STUDENTS ©
Availability: Campus
Timmers, T. (2019). The Smart Home and the Internet of Things ©
Availability: Campus
Timms, S. (2012). MESSAGE ORIENTED SOFTWARE DESIGN USING COMMAND QUERY RESPONSIBILITY SEGREGATION ©
Availability: Open access
Tong, C. (2019). INTEGRATED SMART CITY FRAMEWORK USING OPEN DATA SETS ©
Availability: Campus
Tortorella, R. A W. (2013). AN ADAPTIVE CONTEXT-AWARE MOBILE LEARNING ENVIRONMENT ©
Availability: Open access
Tran, H. C. (2015). HYPERVIDEO: THE FUTURE OF ELEARNING ©
Availability: Open access
Tran, V. LAM. (2010). Distributed Virtual ©
Availability: Open access
Tricarico, G. (2021). Does Wearing a Device Improve Athletic Performance? An Analytical Review ©
Availability: Open access
Turner, K. (2021). Software Defined Networking: Optimizing Deployed Military Networks ©
Availability: Campus
Ulrich, A. R. (2012). Modeling Uncertainty in datasets with FN-DBScan and Bayesian Networks ©
Availability: Open access
Valente, L. G. (2015). IMPROVING HYPERVISOR SECURITY ©
Availability: Open access
Vassiliev, A. (2016). Course-Offering Determination with Combinatorial Auctions ©
Availability: Open access
Vathalloor, J. (2014). Use of Learning Analytics in Massively Open Online Courses ©
Availability: Campus
Venne, D. (2021). HIGH-DEFINITION FACIAL REEACTMENT OVER A LOW-LATENCY CONNECTION ©
Availability: Campus
Virani, R. KHALIL. (2016). A big data architecture for learning analytics ©
Availability: Campus
Visanji, N. (2010). The Smart Home: How Pervasive Systems Will Affect Our Lives ©
Availability: Open access
Vladu, P. (2022). AN ACADEMIC APPROACH TO DEMOCRATIZE THE CLOUD ©
Availability: Open access
Von stackelberg, E. N. (2012). IDENTIFYING VALUE IN SOCIAL NETWORKING WHEN APPLIED TO COLLABORATIVE DEVELOPMENT OF INTELLECTUAL CAPITAL ©
Availability: Open access
Wagner, E. H. (2012). SECURITY ASSESSMENT OF HOME BASED COMPUTER NETWORKS ©
Availability: Open access
Werneck, E. (2010). DESIGNING A GAME-BASED LEARNING SYSTEM FOR AN INFORMAL LEARNING IN THE REAL WORLD ©
Availability: Open access
Wesolowsky, W. W. (2019). A Federated Approach to Identifying Advanced Persistent Security Threats on Enterprise Computer Networks ©
Availability: Open access
Widmeyer, G. W. (2021). ENGAGING THE NEXT GENERATION OF [END USER] DEVELOPERS: CONSIDERATIONS FOR USEROPS ©
Availability: Open access
Williams, T. R. (2009). A Framework for Representing Uncertainty in Natural Resources Research Databases ©
Availability: Campus
Wilson, J. (2019). Big Data Privacy and Security ©
Availability: Open access
Winterhalder, T. (2012). The Use of Time-Series and Sequential Data Mining Algorithms to Identify Behavioural Patterns in Activities of Daily Life (ADL) Sensory Datasets ©
Availability: Campus
Wong, H. (2009). SYSTEMATIC APPROACH TO PROCESS, ANALYZE, AND CLASSIFY DIGITAL EVIDENCE ©
Availability: Open access
Wright, B. M. (2021). Amalgamation of Business Analysis and Project Management in IT Health Care ©
Availability: Open access
Wu, J. (2015). JUST-IN-TIME AND ADAPTIVE ECOLOGICAL MOMENTARY INTERVENTION SYSTEM ©
Availability: Open access
Wu, M. (2019). VISUALIZATION OF STUDENTS’ DISCUSSION IN ONLINE COURSES: A REVIEW ©
Availability: Campus
Yang, G. (2009). ARGUMENTATION-BASED AGENT NEGOTIATION FOR COURSE SCHEDULING AND ACADEMIC ADVISING ©
Availability: Campus
Yayros, J. (2020). DATA MINING AND SOFTWARE DEFECT PREDICTION: A SYSTEMATIC REVIEW ©
Availability: Campus
Ye, J. (2009). ENTERPRISE INTEGRATION FROM BUSINESS PROCESS MANAGEMENT PERSPECTIVE ©
Availability: Campus
Yew, G. W. (2017). Smart Home and Garden System ©
Availability: Open access
Yip, S. F. (2021). A STUDY OF TECHNOLOGIES FOR PRIVILEGED ACCESS MANAGEMENT ©
Availability: Open access
Younis, M. MA. (2011). MI-IDEM: A FRAMEWORK TO EVALUATE THE INSTRUCTIONAL DESIGN OF ONLINE COURSES ©
Availability:Open access
Yu, Q. (2016). Mobile Sensing and Battery Life ©
Availability: Open access
Yusufidis, M. (2022). Progressive Cybernetics Decentralized Autonomous Organization (DAO) (Abstract only) ©
Availability: Release After 3 years
Zamjitski, S. VASSILIEVITCH. (2009). TOWARDS MODEL-DRIVEN SERVICE-ORIENTED ARCHITECTURES: A SURVEY AND FUTURE TRENDS ©
Availability: Campus