Colabella, S., D'Amico, B., Hoxha, E. & Fivet, C. (in press). Structural Design with Reclaimed Materials: an Elastic Gridshell out of Skis. In n/aISBN n/a
This paper presents the design and construction of a 36m2 gridshell, the rigidity of which is achieved through the bending of an initially flat grid of 210 reclaimed skis. The...
Appleton, L., Duff, A. S., Hall, H. & Raeside, R. (in press). Using a longitudinal focus group methodology to measure the value and impact of public libraries. In Conference ProceedingsISBN tbc
There is a general acceptance that public libraries contribute to ‘community’, and at least have the potential to have a very positive impact on civil society. (V...
Ben Ali, B., Dugas, É., Naceur, A. & Romdhani, I. (in press). A New Zigbee-based Device for Measuring Visual Reaction Time in Sport Activities. In IEEE ICEMIS 2017
There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the majo...
The World Health Organisation (WHO) identified the workplace as an important setting to support the promotion of health and wellbeing in 1981 with the introduction of the Health for All strategy, and ...
Chief Scientists Office
To record beverage choice, place of purchase and price paid by ill drinkers attending the alcohol problems services in Edinburgh and Glasgow over a 3 year period in order to monitor any impact of the ...
Alcohol Research UK
To record beverage choice, place of purchase and price paid by ill drinkers seen at alcohol problems services in Edinburgh and Glasgow Hospital (general and psychiatric) over a three year period in or...
05 February 2016
IntroductionOn the back of four nomination at the Scottish Knowledge Exchange awards [here], Gordon Stuart, director of operations at Informatics Ventures, has also predicted ...
19 May 2016
Community in Modern Scottish Literature, published by Brill and edited by Scott Lyall, is out this month. This contains a chapter by Lyall and a 10,000-word introduction.
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
Lecturer in Sport, Exercise and Health. Programme Leader: BA Business and Enterprise in Sport
Dean of Health & Social Care
Lecturer in Sport and Exercise Biomechanics
Reader/ Principal Research Fellow
Medboe, H., Bares, W., Webster, E., Frost Fadnes, P., Inglis, C., Kahr, M., …Heyman, M. (2017). Continental Drift: 50 years of jazz from Europe. In Moir, Z. & Atton, C. (Eds.). Continental Drift: 50 years of jazz from Europe - Conference Proceedings, v, vi. ISBN 978-1-78808-706-3
Following popular exposure in France to the proto-jazz of James Reese Europe and his 369th “Harlem Hellfighters” Infantry Regiment during the latter years of WW1, the jazz bug...
Li, M., Zhang, H. & Wong, S. H. F. (2016). Using topology optimization technique to determine the optimized layout of steel reinforcing bars in concrete structures. In Herskovits, J. (Ed.). Proceedings of 5th International Conference on Engineering Optimization, 789-798. ISBN 978-85-7650-548-8
1. Abstract This study presents an optimization procedure based on the modified Bi-directional evolutionary structural optimization (BESO) approach to optimize both location a...
Heenan, R. & Moradpoor, N. (2016). Introduction to Security Onion
– Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many t...
James, K. & Fortheringham, J. (2016). Higher Education Sector Engagement with Higher Education Academy Fellowship. In Converging Concepts in Global Higher Education Research: Local, national and international Perspectives
Considering a historical perspective that looks briefly at higher education changes influenced by government ideological direction is useful for understanding higher education...
Liu, Q., Lu, M., Liu, X. & Linge, N. (2015). An Introduction of Non-intrusive Load Monitoring and Its Challenges in System Framework. In Cloud Computing and Security, 254-263. doi:10.1007/978-3-319-48674-1_23. ISBN 978-3-319-48673-4; 978-3-319-48674-1
With the increasing of energy demand and electricity price, researchers gain more and more interest among the residential load monitoring. In order to feed back the individual...
Zaffiro, G., Melissa, B., Brynskov, M. & Smyth, M. (2014). Designing digital urban interactions industry landscape and market analysis. In 13th International Conference on e-Society 2015, 249-254. ISBN 978-989-8533-32-6
Urban Interaction Design addresses the question of how we, as physical beings, will interact with the technologically augmented, data-rich urban environments that increasingly...
Penny, K. I. & Brodie, J. (2013). Student and staff perceptions of the use of multiple choice testing in higher education assessments. In E-Learning at work and the workplace: EDEN 2014 Annual Conference, 23. ISBN 978-963-89559-6-8
Multiple choice questions (MCQs) are commonly used in higher education assessments and their use has increased alongside the availability of information and compu...
Bolton, S., Harkness, M. & Thomson, S. (2011). ROTEM thromboelastometry identifies blood product requirements during major obstetric haemorrhage
Introduction: major obstetric haemorrhage (MOH) is a
significant cause of maternal morbidity and mortality. Despite a lack of published evidence, thromboelastometry has been r...
Buchanan, W. J. (2010). Advanced security and network forensics: cloud computing
6 CLOUD/GRID COMPUTING
6.3 Grid Computing
6.3.2 Grid middleware
6.3.1 Grid computing applications
6.4 Cloud Computing ...
Buchanan, W. J. (2010). Security and forensic computing: network security
6 NETWORK SECURITY ELEMENTS 186
6.1 Introduction 186
6.2 Router (packet filtering) firewalls 186
6.3 Network address translation 196
6.4 PIX/ASA firewall 203
6.5 Proxy servers...
Buchanan, W. J. (2010). Security and forensic computing: software security
5 ENHANCED SOFTWARE SECURITY 163
5.1 Introduction 163
5.2 Integrating security into applications 164
5.3 Good practice 165
5.4 The future of software 165
5.5 .NET environment ...
Buchanan, W. J. (2010). Security and forensic computing: encryption
3 ENCRYPTION 90
3.1 Introduction 90
3.2 Simple cipher methods 91
3.3 Encryption operators 94
3.4 Key-based cryptography 96
3.5 Brute-force analysis 103
3.6 Public-key, private...
Scottish Funding Council
This project involved developing audio guides for Jupiter Artland. A traditional audio guide was developed, including introductions of the work and discussions from the artists. Alongside this was a...
Allmediascotland.com has identified the introduction of multi-media content to their site as a mechanism to grow and expand their business. The project will enable the company to develop the skills to...
Arts & Humanities Research Council
This AHRC-funded project aimed to develop a formal UK-wide network of Library and Information Science (LIS) researchers. A key goal of the project was to build capacity and capability in the develop...
This project details the evaluation of an innovative approach to enhancing the delivery of specialist palliative care services, through the development and introduction of Advanced Nurse Practitioner ...
The eRepresentative package is a virtual desktop for elected representatives. It enables them to continue their legislative and policy work anytime and from anywhere with secure access to relevant and...
Discussions of road user charging in Scotland had been confined to the proposed introduction of road user charging in Edinburgh. This report summarised the findings of a research study into the effici...
The research is concerned with the evolution and trajectory of knowledge networking (t...
A longitudinal constructivist grounded theory study was undert...
The PhD is to investigate the ecological implications of invasive bullhead in...
The main aim of the project seeks to enhance the resistance of the soil foundation against seismic events with the ...
Increasingly the provision of care for older p...
The study will examine the introduction of the computerisation of crime and intelligence re...
27 January 2016
27 January 2016
TRI's Dr Jason Monios was invited to present his research at a seminar organised by the Kühne Logistics University in Hamburg. He presented findings from his work on regi...
25 May 2016
25 May 2016
Professor Alistair Duff gave a public lecture on privacy, Tuesday 24 May 2016, as part of Edinburgh Napier University's School of Arts and Creative Industries Degree Show Exhi...