Date


People

Output Type

Download Available

Library Of Congress

Dewey Decimal

587 results

Graduating from the Classroom to the Boardroom: Supporting HE Students’ Employability.

Conference Proceeding
Brodie, J., Miles, W., & Hutchinson, J. (2018)
Graduating from the Classroom to the Boardroom: Supporting HE Students’ Employability. In Online Proceedings of CABS LTSE Conference
The Get on Board (GOB) extra-curriculum programme started at Edinburgh Napier University’s Business School in 2013. Its goal is to prepare students to take up board level oppo...

A Trust-based Intrusion Detection System for Mobile RPL Based Networks

Conference Proceeding
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (2018)
A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113
Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be ...

A new efficient objective function for routing in Internet of Things paradigm

Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., & Gharibi, W. (2016)
A new efficient objective function for routing in Internet of Things paradigm. In 2016 IEEE Conference on Standards for Communications and Networking (CSCN). https://doi.org/10.1109/cscn.2016.7785168
Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) ha...

Hybrid optical and wireless technology integrations for next generation broadband access networks

Conference Proceeding
Owusu, G., Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2011)
Hybrid optical and wireless technology integrations for next generation broadband access networks. In 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM 2011)https://doi.org/10.1109/inm.2011.5990515
Hybrid optical and wireless technology integrations have been considered as one of the most promising candidates for the next generation broadband access networks for quite so...

Dr Who and the Curriculum Planners: early observations from a longitudinal study of Associate Students’ transition to University

Conference Proceeding
Fotheringham, J., & Stupart, A. (2015)
Dr Who and the Curriculum Planners: early observations from a longitudinal study of Associate Students’ transition to University. In International Conference on Enhancement and Innovation in Higher Education : conference materials (351-360
This paper explores early observations from a longitudinal study of second year Associate Students studying HNs in colleges prior to making their way to university for third a...

Rapid one-shot acquisition of dynamic VR avatars

Conference Proceeding
Malleson, C., Kosek, M., Klaudiny, M., Huerta, I., Bazin, J., Sorkine-Hornung, A., …Mitchell, K. (2017)
Rapid one-shot acquisition of dynamic VR avatars. In IEEE 2017 Virtual Reality (VR). https://doi.org/10.1109/vr.2017.7892240
We present a system for rapid acquisition of bespoke, animatable, full-body avatars including face texture and shape. A blendshape rig with a skeleton is used as a template fo...

Towards the Posthuman: Materiality and process in the creation of stimulus-responsive jewellery objects

Conference Proceeding
Vones, K. (2014)
Towards the Posthuman: Materiality and process in the creation of stimulus-responsive jewellery objects. In All Makers Now?
The idea of creating a jewellery organism that comes alive on the body has fascinated and inspired my research ever since learning about the potential inherent in smart materi...

The Personalised Surface, New Approaches to Digital Printmaking

Conference Proceeding
Thompson, P. (2009)
The Personalised Surface, New Approaches to Digital Printmaking. In The Personalised Surface: New Approaches to Digital Printmaking
My work is formed through practice-based research and is placed within the context of the transferred image. I have developed my digital practice from traditional methods of p...

Employing Neural Networks for the Detection of SQL Injection Attack

Conference Proceeding
Sheykhkanloo, N. M. (2013)
Employing Neural Networks for the Detection of SQL Injection Attack. In SIN '14 Proceedings of the 7th International Conference on Security of Information and Networksdoi:10.1145/2659651.2659675
Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into the SQL database by simply using web browse...

Performance Evaluation of a Fragmented Secret Share System

Conference Proceeding
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017)
Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)https://doi.org/10.1109/cybersa.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...