Research explorer tool

Date


People

Download Available

Library Of Congress

Dewey Decimal

1579 results

Borrowed theory: applying exchange theories in information science research.

Journal Article
Hall, H. (2003)
Borrowed theory: applying exchange theories in information science research. Library and Information Science Research, 25(3), 287-306. https://doi.org/10.1016/S0740-8188%2803%2900031-8
This article discusses the applicability of “borrowing” theory originally developed in other disciplines to information science research, and, in particular, the analytical co...

CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications

Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2010)
CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications. In CICIS'10 Proceedings, (209-216). https://doi.org/10.1109/cisis.2010.21
In a pervasive environment, it is essential for computing applications to be context-aware. However, one of the major challenges is the establishment of a generic and dynamic ...

Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem.

Conference Proceeding
Akram, R. N., Markantonakis, K., & Mayes, K. (2012)
Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem. In S. Xie (Ed.), 8th International Conference on Computational Intelligence and Security (CIS 2012), 646-652. https://doi.org/10.1109/CIS.2012.149
In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of...

Building low CO2 solutions to the vehicle routing problem with time windows using an evolutionary algorithm.

Conference Proceeding
Urquhart, N. B., Hart, E., & Scott, C. (2010)
Building low CO2 solutions to the vehicle routing problem with time windows using an evolutionary algorithm. In IEEE Congress on Evolutionary Computationhttps://doi.org/10.1109/CEC.2010.5586088
An evolutionary Multi-Objective Algorithm (MOA) is used to investigate the trade-off between CO2 savings, distance and number of vehicles used in a typical vehicle routing pro...

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC.

Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017)
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications, (317-335). CHAM: Springer
The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the...

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach

Conference Proceeding
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...

Banking and gender: sex equality in the financial services in Britain and Turkey.

Book
Ozbilgin, M., & Woodward, D. (2004)
Banking and gender: sex equality in the financial services in Britain and Turkey. I.B. Tauris
Drawing comparisons from Turkey and Britain, countries which are at the margins of the European continent, 'Banking and Gender' argues that most of the gendered inequalities i...

Best practice for implementing a data warehouse: a review for strategic alignment.

Conference Proceeding
Weir, R., Peng, T., & Kerridge, J. (2003)
Best practice for implementing a data warehouse: a review for strategic alignment. In Design and Management of Data Warehouses 2003: Proceedings of the 5th Intl. Workshop DMDW'2003, Berlin, Germany, September 8, 2003
A review of literature pertaining to data warehouse implementations over the last eight years has been undertaken. It was found that the views of data warehouse practitioners ...

Better locks to secure our data are the inevitable result of too many prying eyes

Other
Buchanan, W. J. (2014)
Better locks to secure our data are the inevitable result of too many prying eyes
Robert Hannigan, the new head of British signals intelligence agency GCHQ, has accused technology companies of aiding terrorists and criminals by providing them secure communi...

Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report

Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2002)
Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report. In Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210), 155-162. https://doi.org/10.1109/IPCCC.2001.918648
Broadcast is an important collective communication operation required by many real-world parallel applications. This paper proposes the Coded Path Routing (or CPR for short) a...

Date


People

280 results

Risk and opportunity in collaborative work

2008 - 2008
Social computing tools for collaboration in work environments. This study set out to establish the main risks and opportunities of the adoption of social computing tools within organizations for colla...
Funder: TFPL | Value: £4,400

Scapa Flow Technologies

2005 - 2006
To use evolutionary techniques to develop prototype software that will automatically optimise the performance of Enterprise Java software for large e-commerce systems.
Funder: Innovate UK | Value: £62,436

SCOPE: Server Configuration Optimisation through Parameter Evolution

2001 - 2006
SCOPE: Server Configuration Optimisation through Parameter Evolution
Funder: Innovate UK | Value: £100,000

sa.Fire

2012 - 2013
This project has resulted in a spin-out company which was incorporated on 17 January 2014. It has also generated a patent related to BDDs (Binary decision Diagrams).
Funder: Scottish Enterprise | Value: £320,000

RATTRAP (Guardian Toolkit)

2011 - 2013
The Office of Cyber Security & Information Assurance (OCSIA) estimates that the cost of cybercrime to businesses, in the UK alone, is over £21 billion per annum. This project focuses on the real-time ...
Funder: Scottish Enterprise | Value: £291,336

Research in Librarianship - Impact Evaluation Study (RiLIES1)

2011 - 2011
Enhancing the impact of LIS Research Projects. RiLIES1 investigated the influence of funded research on practice in UK library and information science (LIS). It  identified factors that increase or ...
Funder: Library & information Science Research Coalition | Value: £27,945

Research in Librarianship - Impact Evaluation Study 2 (RiLIES2)

2012 - 2012
RiLIES2 was a follow-on project to RiLIES1 (completed in 2011). RiLIES2 was successful in: (1) clarifying the support and training needs of library and information science (LIS) researcher and r...
Funder: Library & information Science Research Coalition | Value: £21,923

Social Media Analysis Reporting Tool (SMART)

2012 - 2013
To develop a commercially viable tool to enable organisations to monitor and understand their organisation’s life on social media beyond those accounts they have created. This project is focused on ...
Funder: Scottish Funding Council | Value: £4,937

Smuggler's Trail

2014 - 2014
The aim of the project is to investigate the digital tourism strategy for Glenlivet and to outline a design for the smugglers trail
Funder: Scottish Funding Council | Value: £5,000

Smartgov

2002 - 2004
SmartGov (IST-2001-35399) was a project funded by the European Commission under its Information Society Technologies Programme (IST). The aim of the project was to develop a governmental knowledge-ba...
Funder: EU Framework Programme 7 and FP6 and earlier programmes | Value: £240,000

Date


School

Qualification level

37 results

Participation Space Studies: a socio-technical exploration of activist and community groups? use of online and offline spaces to support their work

2011 - 2016
Participation Space Studies explore eParticipation ...
Dr Ella Taylor-Smith | Director of Studies: Dr Colin Smith | Second Supervisor: Dr Michael Smyth

Reputation management in a digital world: The role of online information in the building, management, and evaluation of personal reputations

2013 - 2019
This PhD is concerned with the role of online information in...
Dr Frances Ryan | Director of Studies: Prof Hazel Hall | Second Supervisor: Alistair Lawson

Adaptive energy management mechanisms for clustering based routing wireless sensor networks

2013 - 2017
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Mr Mohamed Eshaftri | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

A closer look at adaptation mechanisms in simulated environment-driven evolutionary swarm robotics

2013 - 2018
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...
Dr Andreas Steyven | Director of Studies: Prof Emma Hart | Second Supervisor: Prof Ben Paechter

Mango: A model-driven approach to Engineering Green Mobile Cloud Applications

2012 - 2017
With the growing need of the industry and due to high business demands, there have consequently been high demands of IT pro...
Mr Samuel Chinenyeze | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Prof Ahmed Al-Dubai

Intermediated reality

2016 - date
Augmented Reality (AR) aims to extend the physical world through virtual content. To perform such addition in an unnoticeable way, a variety of technical constraints need to be su...
Llogari Casas Cambra | Director of Studies: Prof Kenny Mitchell | Second Supervisor: Dr Kevin Chalmers

A multidimensional sketching interface for visual interaction with corpus-based concatenative sound synthesis

2009 - 2016
The present research sought to investigate the correspondence between auditory and visual f...
Dr Augoustinos Tsiros | Director of Studies: Dr Gregory Leplatre | Second Supervisor: Dr Michael Smyth

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

Leadership for the CIO: building capacity through applying leadership theory using frameworks

2012 - 2016
At present the Information Technology profession appears to be dogged by high profile project failure, high...
Prof Sally Smith | Director of Studies: Mr Grant MacKerron | Second Supervisor: Dr Vaughan Ellis

Investigating communicating sequential processes for Java to support ubiquitous computing

2005 - 2009
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
Dr Kevin Chalmers | Director of Studies: Prof Jon Kerridge | Second Supervisor: Dr Imed Romdhani

Date


93 results

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

Prof. Emma Hart invited to join Scottish Government Steering Group to develop an Artificial Intelligence (AI) strategy for Scotland.

16 September 2019
Prof. Emma Hart has been invited by Minister Kate Forbes to join a Scottish Government Steering Group to develop an Artificial Intelligence (AI) strategy for Scotland.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Researchers from Nature-Inspired Intelligent Systems group win Best Paper Award@GECCO 2019

16 July 2019
PhD student Mohamad Alissa with supervisors Dr Kevin Sim and Prof. Emma Hart won the Best Paper award in the ECOM track at GECCO 2019 in Prague for their paper: Algorithm Selection Using Deep Learnin...

Hazel Hall to receive the 2019 Clarivate Analytics Outstanding Information Science Teacher Award

11 July 2019
The Association for Information Science and Technology announced Professor Hazel Hall as the winner of the 2019 Clarivate Analytics Outstanding Information Science Teacher Award.

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Prof . Emma Hart gives interview "An Insider's Guide to Evolutionary Computation"

17 December 2018
Laura van Beers from ContactEngine, a London based company delivering software that enables its customers to proactively engage customers in AI-driven conversations to fulfil their business objective...

Prof. Emma Hart invited to talk at Scotland IS Software Engineering Leader's Forum to discuss SICSA's work on AI

20 November 2018
Prof. Emma Hart gave an invited talk at the monthly meet-up of the Scotland IS Software Engineering forum on behalf of the SICSA AI theme to describe the work taking place across Scottish Universities...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Date


School