Date


People

Download Available

Library Of Congress

Dewey Decimal

1720 results

Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges

Journal Article
Liu, Q., Yang, Z., Ji, R., Zhang, Y., Bilal, M., Liu, X., …Xu, X. (2023)
Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges. IEEE Systems, Man, and Cybernetics Magazine, 9(4), 4-12. https://doi.org/10.1109/msmc.2022.3216943
Radars are widely used to obtain echo information for effective prediction, such as precipitation nowcasting. In this article, recent relevant scientific investigation and pra...

Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World

Book
Urquhart, N. (2022)
Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World. Cham: Springer. https://doi.org/10.1007/978-3-030-98108-2
This book explains classic routing and transportation problems and solutions, before offering insights based on successful real-world solutions. The chapters in Part I introdu...

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract)

Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022)
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8
Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detect...

A framework for live host-based Bitcoin wallet forensics and triage

Journal Article
Holmes, A., & Buchanan, W. J. (2023)
A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486
Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislatio...

A forensic analysis of streaming platforms on Android OS

Journal Article
García Murias, J., Levick, D., & Mckeown, S. (2023)
A forensic analysis of streaming platforms on Android OS. Forensic Science International: Digital Investigation, 44, Article 301485. https://doi.org/10.1016/j.fsidi.2022.301485
This work builds on existing research in streamed video reconstruction on the Android OS, which previously demonstrated that caching occurs in most cases for the Chrome and Fi...

Four-Element/Eight-Port MIMO Antenna System with Diversity and Desirable Radiation for Sub 6 GHz Modern 5G Smartphones

Journal Article
Ojaroudi Parchin, N., S.I. Amar, A., Darwish, M., H. Moussa, K., See, C. H., Abd-Alhameed, R., … Mohamed, H. G. (in press)
Four-Element/Eight-Port MIMO Antenna System with Diversity and Desirable Radiation for Sub 6 GHz Modern 5G Smartphones. IEEE Access, https://doi.org/10.1109/ACCESS.2022.3227199
In this manuscript, a multiple-input multiple-output (MIMO) antenna array system with identical compact antenna elements providing wide radiation and diversity function is int...

Accelerating neural network architecture search using multi-GPU high-performance computing

Journal Article
Lupión, M., Cruz, N. C., Sanjuan, J. F., Paechter, B., & Ortigosa, P. M. (2023)
Accelerating neural network architecture search using multi-GPU high-performance computing. Journal of Supercomputing, 79, 7609-7625. https://doi.org/10.1007/s11227-022-04960-z
Neural networks stand out from artificial intelligence because they can complete challenging tasks, such as image classification. However, designing a neural network for a par...

Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches

Journal Article
Alissa, M., Sim, K., & Hart, E. (in press)
Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches. Journal of Heuristics, https://doi.org/10.1007/s10732-022-09505-4
We propose a novel technique for algorithm-selection, applicable to optimisation domains in which there is implicit sequential information encapsulated in the data, e.g., in o...

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Journal Article
Davies, S., Macfarlane, R., & Buchanan, W. (2022)
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), Article 1503. https://doi.org/10.3390/e24101503
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by ...

Detection of Signals in MC–CDMA Using a Novel Iterative Block Decision Feedback Equalizer

Journal Article
Bagadi, K., Ravikumar, C., Sathish, K., Alibakhshikenari, M., Virdee, B. S., Kouhalvandi, L., …Limiti, E. (2022)
Detection of Signals in MC–CDMA Using a Novel Iterative Block Decision Feedback Equalizer. IEEE Access, 10, 105674-105684. https://doi.org/10.1109/ACCESS.2022.3211392
This paper presents a technique to mitigate multiple access interference (MAI) in multicarrier code division multiple access (MC-CDMA) wireless communications systems. Althoug...

Date


People

324 results

Cross-lingual Audio-visual Speech Enhancement based on Deep Multimodal Learning

2023 - 2025
Speech enhancement and separation techniques are often used to improve the quality and intelligibility of speech degraded by background distractions, including speech and non-speech noises. We aim to ...
Funder: Royal Society of Edinburgh | Value: £12,000

Towards multilingual audio-visual speech enhancement in real noisy environments

2023 - 2025
Speech enhancement aims to improve the overall quality and intelligibility of speech degraded by noise sources in real-world noisy environments. In recent years, researchers have proposed audio-visual...
Funder: Royal Society | Value: £12,000

On the executability and malicious retention of adversarial malware samples generated using adversarial learning.

2023 - 2023
A SICSA Sponsored Research Theme Event Machine Learning (ML) models have been shown to be vulnerable to adversarial examples designed to fool ML models to classify them as benign rather than malicious...
Funder: The Scottish Informatics & Computer Science Alliance

Placements for tech start-ups and scalars

2023 - 2023
The aim of this proposal is to prepare the groundwork for a sustainable pipeline for placement students wanting to work in tech Scale-ups and Start-ups in Scotland. Employers and students will be prov...
Funder: Skills Development Scotland

Software-Hardware Ecosystems for AI Edge Devices (SHE)

2022 - 2023
AI hardware solutions are only useful if they’re compatible with all other layers of the technology stack, including the solutions and use cases in the services layer. Researchers in AI hardware can t...
Funder: Royal Academy of Engineering | Value: £32,700

Fixing the Future: The Right to Repair and Equal-IoT

2022 - 2024
Our 2-year interdisciplinary project will investigate how the lack of repairability in the consumer Internet of Things (IoT) will adversely impact equity, inclusion, and sustainability in the digital ...
Funder: Engineering and Physical Sciences Research Council | Value: £94,392

Gendered information landscapes and their impact on routes into and through apprenticeships

2022 - 2025
The aim is to understand the myriad sources of gender stereotyping that impact on young people’s choices around apprenticeships and work-based learning (WBL). First, by a policy and literature review ...
Funder: Skills Development Scotland | Value: £57,117

Smart Contract based Reward Scheme

2022 - 2023
Egg Lighting would like to explore the possibility of linking their company value to Smart Contracts via Blockchain. They would eventually like to give away 1/3 of their business (shares) to the gene...
Funder: Scottish Funding Council | Value: £5,000

Digital Transformation of the Building Standards System

2022 - 2023
This project will support the digital transformation of the building standards system in Scotland by supporting a strengthened compliance system and putting in place the tools to develop a digital go...
Funder: Built Environment - Smarter Transformation (formerly CSIC) | Value: £11,714

TRUST AND PRIVACY PRESERVING COMPUTING PLATFORM FOR CROSSBORDER FEDERATION OF PERSONAL DATA

2022 - 2025
As we live in a data-driven era, the emergence of interdisciplinary, geographically dispersed, data repositories, is inevitable. The fact that these repositories do not necessarily abide with existing...
Funder: UK Research and Innovation | Value: £310,843
13 results

Exploring the development of innovative work behaviour of employees in multiple workplace contexts

2015 - 2020
The Scottish Government and supporting bodies have recognised the importance of innovation for organis...
Mrs Lyndsey Middleton | Director of Studies: Prof Hazel Hall | Second Supervisor: Prof Robert Raeside

Sonification of exosolar planetary systems

2015 - 2021
Michael Quinton | Director of Studies: Dr Iain McGregor | Second Supervisor: Prof David Benyon

RESCUE: Evaluation of a fragmented secret share system in distributed cloud architecture

2014 - 2019
This work aims to address current problems of security within Cloud-based systems, as the risks in moving data i...
Dr Elo Ukwandu | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Gordon Russell

Adaptive energy management mechanisms for clustering based routing wireless sensor networks

2013 - 2017
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Mr Mohamed Eshaftri | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Forensic analysis of large capacity digital storage devices

2013 - 2017
Triage of large capacity digital devices
Philip Penrose | Director of Studies: Prof Bill Buchanan | Second Supervisor: Rich Macfarlane

Mango: A model-driven approach to Engineering Green Mobile Cloud Applications

2012 - 2017
With the growing need of the industry and due to high business demands, there have consequently been high demands of IT pro...
Mr Samuel Chinenyeze | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Prof Ahmed Al-Dubai

Tasks and visual techniques for exploration of temporal graph data

2010 - 2017
Dr Natalie Kerracher | Director of Studies: Dr Kevin Chalmers | Second Supervisor: Prof Jessie Kennedy

Understanding user experience in blended spaces

2010 - 2018
Serkan Ayan | Director of Studies: Prof David Benyon | Second Supervisor: Dr Michael Smyth

A multidimensional sketching interface for visual interaction with corpus-based concatenative sound synthesis

2009 - 2016
The present research sought to investigate the correspondence between auditory and visual f...
Dr Augoustinos Tsiros | Director of Studies: Dr Gregory Leplatre | Second Supervisor: Dr Michael Smyth

Mobile User Authentication System (MUAS) for e-commerce applications

2009 - 2017
Rania Molla | Director of Studies: Dr Imed Romdhani | Second Supervisor: Prof Bill Buchanan

Date


103 results

Promising cyber security project supported by new Scottish Enterprise funding

20 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

School of Computing Group Project Prize 2020

3 May 2020
The winners of the best group project 2020 are chosen in an online event by Computershare.

University teams up with community researchers to help improve their neighbourhood

6 February 2020
A Team of community researchers will join forces with academics to help improve their neighbourhood. UK Research and Innovation today announced its backing for the Seven Kingdoms of Wester Hailes, on...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

Prof. Emma Hart invited to join Scottish Government Steering Group to develop an Artificial Intelligence (AI) strategy for Scotland.

16 September 2019
Prof. Emma Hart has been invited by Minister Kate Forbes to join a Scottish Government Steering Group to develop an Artificial Intelligence (AI) strategy for Scotland.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Researchers from Nature-Inspired Intelligent Systems group win Best Paper Award@GECCO 2019

16 July 2019
PhD student Mohamad Alissa with supervisors Dr Kevin Sim and Prof. Emma Hart won the Best Paper award in the ECOM track at GECCO 2019 in Prague for their paper: Algorithm Selection Using Deep Learnin...

Hazel Hall to receive the 2019 Clarivate Analytics Outstanding Information Science Teacher Award

11 July 2019
The Association for Information Science and Technology announced Professor Hazel Hall as the winner of the 2019 Clarivate Analytics Outstanding Information Science Teacher Award.

Date