Research explorer tool

Date


School

People

Download Available

Dewey Decimal

275 results

Implementation of the Prometheus Taxonomic Model: a comparison of database models and query languages and an introduction to the Prometheus Object-Oriented Model.

Journal Article
Raguenaud, C., Pullan, M. R., Watson, M. F., Kennedy, J., Newman, M. F., & Barclay, P. J. (2002)
Implementation of the Prometheus Taxonomic Model: a comparison of database models and query languages and an introduction to the Prometheus Object-Oriented Model. Taxon, 51(1), 131-142. https://doi.org/10.2307/1554970
Types of databases commonly used for handling taxonomic data are compared. It is shown that none of the existing types of databases fully support the requirements of taxonomic...

In search of the cybermuse: supporting creative activity within product design.

Conference Proceeding
Mival, O. (2002)
In search of the cybermuse: supporting creative activity within product design. In J. Mottram, L. Candy, & T. Kavanagh (Eds.), Creativity & cognition : proceedings of the fourth Creativity & Cognition Conference : exhibition papers and posters : Loughborough University, Loughborough, 47-48
No abstract available.

General and craniofacial development are complex adaptive processes influenced by diversity

Journal Article
Hart, E., Brook, A. H., Brook-O'Donnell, M., Hone, A., Hughes, T., & Smith, R. (2014)
General and craniofacial development are complex adaptive processes influenced by diversity. Australian Dental Journal, 59(S1), 13-22. https://doi.org/10.1111/adj.12158
Complex systems are present in such diverse areas as social systems, economies, ecosystems and Biology and, therefore, are highly relevant to dental research, education and pr...

If Obama is talking about securing the net, it should be on everyone else’s lips too.

Other
Buchanan, W. J. (2015)
If Obama is talking about securing the net, it should be on everyone else’s lips too
We have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Bara...

Implementation and evaluation of a botnet analysis and detection method in a virtual environment

Thesis
Waheed, S. (2012)
Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5667
Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a...

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet.

Other
Buchanan, W. J. (2015)
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet
Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This m...

HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society

Thesis
van Deursen Hazelhoff Roelfze, N. (2014)
HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6921
This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations...

An evaluation of the power consumption and carbon footprint of a cloud infrastructure

Thesis
Yampolsky, V. (2010)
An evaluation of the power consumption and carbon footprint of a cloud infrastructure. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3973
The Information and Communication Technology (ICT) sector represent two to three percents of the world energy consumption and about the same percentage of GreenHouse Gas(GHG) ...

An aspect oriented model for software energy efficiency in decentralised servers.

Conference Proceeding
Chinenyeze, S., Liu, X., & Al-Dubai, A. (2014)
An aspect oriented model for software energy efficiency in decentralised servers. In ict4s-14https://doi.org/10.2991/ict4s-14.2014.14
Green software is currently gaining interests with the increasing impact of IT in energy consumption. Green-ness in software however, can be achieved at various stages of the ...

An embedded real-time pedestrian detection system using an infrared camera.

Conference Proceeding
Walczyk, R., Armitage, A., & Binnie, D. (2010)
An embedded real-time pedestrian detection system using an infrared camera. In IET Irish Signals and Systems Conference (ISSC 2009)https://doi.org/10.1049/cp.2009.1716
An FPGA-based implementation of a pedestrian detection system using thermal infrared imaging is presented. The main feature of the processing platform is its ability to detec...