Research explorer tool

Date


People

Download Available

Library Of Congress

Dewey Decimal

1589 results

Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns

Conference Proceeding
Mcneill, M., Lawson, A., Raeside, R., & Peisl, T. (2018)
Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns. In Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018)https://doi.org/10.14236/ewic/HCI2018.127
Creating a good crowdfunding campaign is difficult. By understanding why people contribute to crowdfunding campaigns we can make campaigns better and raise more money. Crowdfu...

A survey on rainfall forecasting using artificial neural network

Journal Article
Liu, Q., Zou, Y., Liu, X., & Linge, N. (2019)
A survey on rainfall forecasting using artificial neural network. International Journal of Embedded Systems, 11(2), 240-249. https://doi.org/10.1504/ijes.2018.10016095
Rainfall has a great impact on agriculture and people’s daily travel, so accurate prediction of precipitation is well worth studying for researchers. Traditional methods like ...

The Privacy and Security Implications of Open Data in Healthcare: A Contribution from the IMIA Open Source Working Group

Journal Article
Kobayashi, S., Kane, T., & Paton, C. (2018)
The Privacy and Security Implications of Open Data in Healthcare: A Contribution from the IMIA Open Source Working Group. IMIA Yearbook of Medical Informatics, https://doi.org/10.1055/s-0038-1641201
Objective: The International Medical Informatics Association (IMIA) Open Source Working Group (OSWG) initiated a group discussion to discuss current privacy and security issue...

Detection of Algorithmically Generated Malicious Domain

Conference Proceeding
Agyepong, E., Buchanan, W., & Jones, K. (2018)
Detection of Algorithmically Generated Malicious Domain. In CS & IT-CSCP 2018, (13-32). https://doi.org/10.5121/csit.2018.80802
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persist...

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

Journal Article
Barrowclough, J. P., & Asif, R. (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...

Virtualizing the real: a virtual reality contemporary sculpture park for children

Journal Article
Flint, T., Hall, L., Stewart, F., & Hagan, D. (2018)
Virtualizing the real: a virtual reality contemporary sculpture park for children. Digital Creativity, 29(2/3), 191-207. https://doi.org/10.1080/14626268.2018.1511601
This paper discusses a virtual reality experience for a contemporary sculpture park, Jupiter Artland, developed in Minecraft targeting 9-11-year-old children. Issues of fideli...

Privacy Parameter Variation using RAPPOR on a Malware Dataset

Conference Proceeding
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018)
Privacy Parameter Variation using RAPPOR on a Malware Dataset. In Proceedings of 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), 8. doi:10.1109/TrustCom/BigDataSE.2018.00133
Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of...

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device

Conference Proceeding
Lo, O., Buchanan, W. J., & Carson, D. (2017)
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security
Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consu...

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. In CITT 2018, (91-103). https://doi.org/10.1007/978-3-030-05532-5_7
Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, s...

The impact of work placement on graduate employment in computing: outcomes from a UK-based study

Journal Article
Smith, S., Taylor-Smith, E., Smith, C., & Webster, G. (2018)
The impact of work placement on graduate employment in computing: outcomes from a UK-based study. International Journal of Work-Integrated Learning, 19(4), 359-369
This study followed recent computing graduates into the workplace and explored their undergraduate experiences of work placements and subsequent impact on graduate employment....

Date


People

283 results

Spellakit Feasibility Study

2015 - 2015
The overall vision of the Spellakit project is to significantly enhance learner experience and outcomes in English language spelling through an innovative ICT based approach focused on a kinesthetic m...
Funder: Scottish Funding Council | Value: £5,000

Soluis Dome User Interface

2015 - 2015
A digital dome is a large physical object that can fully immerse one or more users and present them digital material via rear projection onto the dome’s surface. Such a system presents unique and curr...
Funder: Scottish Funding Council | Value: £5,000

Scottish Woodlands KTP

2013 - 2014
Scottish Woodlands Ltd is Scotland's leading independent full-service forest management company. It is also the second largest operator in the UK, with a network of 17 offices operating throughout Sco...
Funder: Innovate UK | Value: £110,222

Scotland's Music eCommerce Site

2007 - 2008
Taigh na Teud is the largest sheet music publishers of traditional Scottish music in Scotland, with books widely used for educational purposes in schools, colleges and workshops. The company operates ...
Funder: Scottish Government | Value: £33,755

Scottish Crofting Federation E-Learning

2014 - 2014
The aim of the project led by Alistair Lawson of IIDI is to create a prototype  for a single module of a Crofting Entry Level Course developed by the Scottish Crofting Federation.   This project de...
Funder: Scottish Funding Council | Value: £5,000

SIGNAL

2001 - 2004
This is an EU-funded research project to develop basic methodologies and principles of systemic intelligence for artefacts such as robots that will be capable of steadily growing their knowledge throu...
Funder: European Commission | Value: £299,196

Seven Layer Communications Ltd

2000 - 2002
To develop and implement real time software and programmable logic elements to provide a powerful and flexible high performance test tool platform for telecommunications software and system test.
Funder: Innovate UK | Value: £71,140

SEEK: Science Environment for Ecological Knowledge

2002 - 2008
The goals of the project are to make fundamental improvements in how researchers can 1) gain global access to ecological data and information, 2) rapidly locate and utilize distributed computation...
Funder: National Science Foundation | Value: £348,305

Metaheuristics

2000 - 2004
Metaheuristics are widely used to solve important practical combinatorial optimization problems. But the how and why they work effectively for specific problems and for others not, remains a mystery. ...
Funder: European Commission | Value: £170,000

Media-rich Customer Service System

2014 - 2014
Edinburgh Napier University is working with the JAC Vapour, the leading, Edinburgh-based, online electronic cigarette retailer on a customer support platform featuring media-rich and mobile features n...
Funder: Scottish Funding Council | Value: £5,000

Date


School

Qualification level

38 results

Adaptive energy management mechanisms for clustering based routing wireless sensor networks

2013 - 2017
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Mr Mohamed Eshaftri | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

Visualising Multiple Overlapping Classification Hierarchies

1998 - 2002
The revision or reorganisation of hierarchical data sets can result in many possible hierarchical classifications composed of the same or ove...
Dr Martin Graham | Director of Studies: Prof Jessie Kennedy | Second Supervisor: Prof David Benyon

A closer look at adaptation mechanisms in simulated environment-driven evolutionary swarm robotics

2013 - 2018
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...
Dr Andreas Steyven | Director of Studies: Prof Emma Hart | Second Supervisor: Prof Ben Paechter

Mango: A model-driven approach to Engineering Green Mobile Cloud Applications

2012 - 2017
With the growing need of the industry and due to high business demands, there have consequently been high demands of IT pro...
Mr Samuel Chinenyeze | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Prof Ahmed Al-Dubai

Intermediated reality

2016 - date
Augmented Reality (AR) aims to extend the physical world through virtual content. To perform such addition in an unnoticeable way, a variety of technical constraints need to be su...
Llogari Casas Cambra | Director of Studies: Prof Kenny Mitchell | Second Supervisor: Dr Kevin Chalmers

A multidimensional sketching interface for visual interaction with corpus-based concatenative sound synthesis

2009 - 2016
The present research sought to investigate the correspondence between auditory and visual f...
Dr Augoustinos Tsiros | Director of Studies: Dr Gregory Leplatre | Second Supervisor: Dr Michael Smyth

Utilising reduced file representations to facilitate fast contraband detection

2015 - 2019
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for la...
Dr Sean McKeown | Director of Studies: Dr Gordon Russell | Second Supervisor: Dr Petra Leimich

Leadership for the CIO: building capacity through applying leadership theory using frameworks

2012 - 2016
At present the Information Technology profession appears to be dogged by high profile project failure, high...
Prof Sally Smith | Director of Studies: Mr Grant MacKerron | Second Supervisor: Dr Vaughan Ellis

Investigating communicating sequential processes for Java to support ubiquitous computing

2005 - 2009
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
Dr Kevin Chalmers | Director of Studies: Prof Jon Kerridge | Second Supervisor: Dr Imed Romdhani

An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments

2008 - 2012
The concept of context-awareness is widely used in mobile and pervasive computing t...
Dr Zakwan Jaroucheh | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Prof Sally Smith

Date


93 results

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

Prof. Emma Hart invited to join Scottish Government Steering Group to develop an Artificial Intelligence (AI) strategy for Scotland.

16 September 2019
Prof. Emma Hart has been invited by Minister Kate Forbes to join a Scottish Government Steering Group to develop an Artificial Intelligence (AI) strategy for Scotland.

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Researchers from Nature-Inspired Intelligent Systems group win Best Paper Award@GECCO 2019

16 July 2019
PhD student Mohamad Alissa with supervisors Dr Kevin Sim and Prof. Emma Hart won the Best Paper award in the ECOM track at GECCO 2019 in Prague for their paper: Algorithm Selection Using Deep Learnin...

Hazel Hall to receive the 2019 Clarivate Analytics Outstanding Information Science Teacher Award

11 July 2019
The Association for Information Science and Technology announced Professor Hazel Hall as the winner of the 2019 Clarivate Analytics Outstanding Information Science Teacher Award.

Dr Zhiyuan (Thomas) Tan and Dr Tom Flint Awarded Honourable Mentions in SICSA Supervisor of the Year 2019

17 June 2019
Honourable mentions in the SICSA Supervisor of the Year 2019 were awarded to Dr Zhiyuan (Thomas) Tan and Dr Tom Flint from the School of Computer, Edinburgh Napier University at the SICSA PhD Conferen...

Prof . Emma Hart gives interview "An Insider's Guide to Evolutionary Computation"

17 December 2018
Laura van Beers from ContactEngine, a London based company delivering software that enables its customers to proactively engage customers in AI-driven conversations to fulfil their business objective...

Prof. Emma Hart invited to talk at Scotland IS Software Engineering Leader's Forum to discuss SICSA's work on AI

20 November 2018
Prof. Emma Hart gave an invited talk at the monthly meet-up of the Scotland IS Software Engineering forum on behalf of the SICSA AI theme to describe the work taking place across Scottish Universities...

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Date


School

86 results

Hybrid Parameter Control Approach Applied to a Diversity-based Multi-objective Memetic Algorithm for Frequency Assignment Problems - School of Computing Seminar Series

B32, Merchiston campus
28 June 2016

Connect the dots and spot the gaps - School of Computing PhD Workshop Series

16:00 in Core44, room C44, Merchiston campus
1 May 2018

Sub-file Hashing Strategies for Fast Contraband Detection and Reducing the Impact of Network Bottlenecks on Remote Contraband Detection - School of Computing Seminar Series

14:00 in CoRe44, room C44, Merchiston Campus
5 June 2018

eScience at UCPH & Ubiquitous Data Analysis for MUMMERING - School of Computing Seminar Series

14:00 in CoRe44, room C44, Merchiston Campus
15 May 2018

School of Computing Workshop on Storytelling and Scriptwriting

CoRe44, room C44, Merchiston Campus
16 May 2018

Do's and Don'ts for Writing a Thesis - School of Computing PhD Workshop Series

16:00 CoRe44, room C44 Merchiston
5 June 2018

Engineering Sustainable and Adaptive systems in Dynamic and Unpredictable Environments - School of Computing Seminar Series

14:00 in CoRe44, room C44, Merchiston Campus
13 June 2018

RIVAL (Research Impact Value and LIS) #lis_rival

Room 1/10, Craiglockhart Campus
10 July 2018

An Interactive Multimodal Guide to Improve Art Accessibility for the Blind - School of Computing Seminar Series

CoRe44, room C44, Merchiston Campus
25 September 2018

Process Oriented Guided Inquiry Learning (POGIL) - School of Computing Seminar Series

CoRe44, room C44, Merchiston
15 October 2018