Date


People

Download Available

322 results

Utilising Reduced File Representations to Facilitate Fast Contraband Detection

Thesis
McKeown, S. Utilising Reduced File Representations to Facilitate Fast Contraband Detection. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2386199
Digital forensics practitioners can be tasked with analysing digital data, in all its forms, for legal proceedings. In law enforcement, this largely involves searching for con...

Finding Fair Negotiation Algorithms to Reduce Peak Electricity Consumption in Micro Grids

Conference Proceeding
Powers, S. T., Meanwell, O., & Cai, Z. (2019)
Finding Fair Negotiation Algorithms to Reduce Peak Electricity Consumption in Micro Grids. In PAAMS 2019: Advances in Practical Applications of Survivable Agents and Multi-Agent Systems: The PAAMS Collection, 269-272. https://doi.org/10.1007/978-3-030-24209-1_28
Reducing peak electricity consumption is important to maximise use of renewable energy sources, and reduce the total amount of capacity required on a grid. Most approaches use...

Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report

Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2002)
Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report. In Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210), 155-162. https://doi.org/10.1109/IPCCC.2001.918648
Broadcast is an important collective communication operation required by many real-world parallel applications. This paper proposes the Coded Path Routing (or CPR for short) a...

A Multi-attributes-based Trust Model of Internet of Vehicle

Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security. , (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...

Visualisation Support for Biological Bayesian Network Inference

Thesis
Vogogias, T. Visualisation Support for Biological Bayesian Network Inference. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2158180
Extracting valuable information from the visualisation of biological data and turning it into a network model is the main challenge addressed in this thesis. Biological networ...

Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks

Journal Article
Torres Vega, M., Koonen, A. M. J., Liotta, A., & Famaey, J. (2018)
Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks. IEEE Wireless Communications Letters, 7(2), 278-281. https://doi.org/10.1109/lwc.2017.2771771
In light of the extreme radio congestion, the time has come to consider the upper parts of the electromagnetic spectrum. Optical beam-steered wireless communications offer gre...

A novel hybrid intelligence approach for 2D packing through internet crowdsourcing

Conference Proceeding
Agrawal, A., Yadav, P., Upadhyay, C. K., Corney, J. R., Vasantha, G. A., Jagadeesan, A., & Lynn, A. (2015)
A novel hybrid intelligence approach for 2D packing through internet crowdsourcing. In Technological Innovation in ICT for Agriculture and Rural Development (TIAR), 2015 IEEE, 33-39. https://doi.org/10.1109/TIAR.2015.7358527
Packing problems on its current state are being utilized for wide area of industrial applications. The aim of present research is to create and implement an intelligent system...

Expectations and experiences of CSCW in an engineering environment.

Journal Article
Turner, S., & Turner, P. (1996)
Expectations and experiences of CSCW in an engineering environment. Computer Supported Cooperative Work, 1, 237-254
Existing organisational context and user expectations have a huge effect on the success of introducing CSCW technology, and should have a correspondingly strong influence on t...

Interaction strategies for an affective conversational agent

Journal Article
Smith, C., Crook, N., Dobnik, S., Charlton, D., Boye, J., Pulman, S., …Cavazza, M. (2011)
Interaction strategies for an affective conversational agent. Presence: Teleoperators and Virtual Environments, 20, 395-411. https://doi.org/10.1162/PRES_a_00063
The development of embodied conversational agents (ECA) as companions brings several challenges for both affective and conversational dialogue. These include challenges in gen...

Developing a core ontology for taxonomic data.

Conference Proceeding
Kennedy, J., Gales, R., Hyam, R., Kukla, R., Wieczorek, J., Hagedorn, G., …Vieglais, D. (2006)
Developing a core ontology for taxonomic data. In L. Belbin, A. Rissoné, & A. Weitzman (Eds.), Proceedings of TDWG (2006), St Louis, MI
Over recent years several sub-groups within the Taxonomic Databases Working Group (TDWG) have developed models and exchange standards to facilitate data sharing within the tax...