University of Twente Student Theses

Login

Programme: Business & IT BSc (56066)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Year | Item Type
Jump to: 2020 | 2019 | 2018 | 2016 | 2013 | 2008 | 2007
Number of items: 47.

2020

Lapshyna, V. (2020) Sparse artificial neural networks : Adaptive performance-based connectivity inspired by human-brain processes.

Kumashev, Yernar (2020) GPGPU Verification: Correctness of Odd-Even Transposition Sort Algorithm.

2019

Teunissen, T. (2019) Success factors for RPA application in small and medium sized enterprises.

Ridder, R.K. de (2019) Business Models for Smart Mobility IoT Data.

Hogema, T.A.M. (2019) Counting People in Simultaneous Speech using Support Vector Machines.

Man, T. (2019) Measuring and Analysing Resilience of Enterprise Architectures.

Giessen, David van de (2019) Blockchain and the GDPR's right to erasure.

Claßen, Philipp (2019) Identification of differences in sub-population healthcare processes.

Valk, A. (2019) Ethics in Datafication: expanding on a new datafication framework.

Schooten, R.W. van (2019) Characteristics of highly uncertain and complex projects.

Rietvelt, D.C.J.C. (2019) Influence of neutral word removal on sentiment analysis.

Weijers, D.S. (2019) Forecasting Airport Passenger Flow to Improve Cleanliness Perception in Restrooms.

Flapper, J. (2019) User access control on the blockchain for supply chain visibility.

Richter, N.G. (2019) Process mining in programming game logs to differentiate between skill levels.

Loof, R. (2019) Predicting the Internal Load of Amateur Athlete’s Based on Their External Load Using Accessible Sensors.

Spanier, Johanna (2019) The Illusion of an autonomous social robot in a therapy setting.

Matei, Denisa Alexandra (2019) Detection of Health Problems based on Historical Medical Records.

Janssen, Djordi (2019) The Effects of Active Learning on Computer-Aided Diagnosis in Multi-Disease Prediction of Chest X-rays.

Willems, W.J.M. (2019) Validation of a Datafication Canvas.

Go, M.L. (2019) Clustering with Outliers in a Biased Animal Movement Database.

Cooiman, G.M. (2019) Output vs. Outcome: Measuring Usability in a Business to Business Context.

Khasuntsev, N.A. (2019) Accurate and Efficient Classification of Cyber Security Documents.

Smits, J.J. (2019) What does a Domain Name Say.

2018

Bolhuis, W.T.C. (2018) The application of Scalable Agile in Dutch government.

Stege, S. ter (2018) Blockchain in logistics : Is blockchain in logistics hyped, or has it true potential to be a game changer?

Kerckhoffs, N.N.J.H. (2018) Is the “Netflix model” favorable for the audio streaming industry.

Nijzink, H.J. (2018) A homemade air quality sensor : is it viable?

Hulshof, Mike (2018) The downfall of traditional radio : will personalized radio surpass preprogrammed radio?

Dragomiretskiy, Sergey (2018) The influence of DDoS attacks on cryptocurrency exchanges.

Sessink, Danique (2018) Using Machine Learning to Detect ICT in Criminal Court Cases.

Menne, Alexander (2018) Blockchain in the Sharing Economy : Will Blockchain Disrupt Today’s Winning Business Models?

Pool, A.W. (2018) An information systems model for supporting fake news disclosure.

Heijer, Frank den (2018) Method for legacy software evaluation based on the Balanced Scorecard and AHP.

Kamerman, Wim (2018) Classification of Event-Related Google Alerts Using Machine Learning.

Hamelers, L.H. (2018) Investigating generic online animal activity recognition across different animal species.

Haemers, David Geert Maria (2018) Corporate and traditional startups in a platform society.

Looijenga, M.S. (2018) The Detection of Fake Messages using Machine Learning.

Casteleijn, T.K. (2018) Start-up knowledge brought to large organisations : Innovation management software based on blockchain technology.

Bloemen, Sander (2018) Designing an application for focussed surveys.

2016

Ding, H. (2016) Integrating value modeling into ArchiMate.

2013

Hulsebosch, Marc (2013) Targeting gamification applications to increase user participation.

Hoener, P.M. (2013) Cloud Computing Security Requirements and Solutions: a Systematic Literature Review.

2008

Deddens, M.K. (2008) Toepasbaar risicomanagement in software ontwikkelingsprojecten : ontwerp en toepassing van een risicomanagementmethode voor software ontwikkelingsprojecten binnen Centric IT Solutions.

Linders, Stefan (2008) Opportunities and limitations of using SOA concepts and technologies for building BI applications : a Delphi study.

Engelsman, W. (2008) Method for requirements management and modeling.

Brink, Tim van den (2008) Ketenarchitectuur : succes- en faalfactoren bij de invoering van het digitaal klantdossier.

2007

Zimmerman, Jurit (2007) Toepassen van “serious games” ter ondersteuning van de opleiding binnen het bedrijfsproces ICT service management.

This list was generated on Wed Feb 19 05:05:27 2020 CET.