Research explorer tool

12 results

Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust

Report
Buchanan, B., Imran, M., Pagliari, C., Pell, J., & Rimpiläinen, S. (2020)
Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust. Glasgow: Digital Health and Care Institute, University of Strathclyde
On December 31st, 2019, the World Health Organisation received a report from the Chinese government detailing a cluster of cases of ‘pneumonia of unknown origin’, later identi...

Cooja Simulator Manual

Report
Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., & Wadhaj, I. (2016)
Cooja Simulator Manual. Edinburgh: Edinburgh Napier University
While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation....

Review of Coding for Success implementation

Report
Thuemmler, C. & Buchanan, B. (2010)
Review of Coding for Success implementation. London: UK Department of Health
Coding for Success was published in 2007 and described how bar coding and similar technologies can be used to improve patient safety, reduce costs and improve efficiency. This...

5G-PPP White Paper on eHealth Vertical Sector

Report
Thuemmler, C., Jumelle, A. K. L., Paulin, A., Sadique, A., Schneider, A., Fedell, C., …Covaci, S. (2015)
5G-PPP White Paper on eHealth Vertical Sector. Brussels: EU Commission
Gaston Crommenlaan 1 PO box: 101 9050 Gent Belgium www.5g-ppp.eu 5G and e-Health 1 Socioeconomic drivers of e-Health in Horizon 2020 Although socioeconomically the sector addr...

3DES Encryption and Decryption in Microsoft .NET.

Report
Buchanan, W. J. (2009)
3DES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of 3DES in Microsoft .NET. It provides a basic overview of the 3-DES method, along with a review of other popular encryption methods and some sam...

AES Encryption and Decryption in Microsoft .NET.

Report
Buchanan, W. J. (2009)
AES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample...

Review of "Coding for Success" implementation.

Report
Thuemmler, C. & Buchanan, W. J. (2010)
Review of "Coding for Success" implementation
Coding for Success was published in 2007 and described how bar coding and similar technologies can be used to improve patient safety, reduce costs and improve efficiency. This...

Lattice-based modelling of thesauri.

Report
Priss, U. & Old, L. J. (2007)
Lattice-based modelling of thesauri
This paper revisits ideas about the use of lattices as underlying conceptual structures in information retrieval and machine translation as suggested by researchers in the 195...

5G innovations for new business opportunities

Report
Sébastien Bedo, J., Eddine El Ayoubi, S., Filippou, M., Gavras, A., Giustiniano, D., Iovanna, P., …Tjelta, T. (2017)
5G innovations for new business opportunities. Brussels: European Commission / 5G PPP
5G is the next generation mobile network that enables innovation and supports progressive change across all vertical industries and across our society1. Through its Radio Acce...

Health and Sport Committee: Technology and Innovation in Health and Social Care

Report
Thuemmler, C. (2017)
Health and Sport Committee: Technology and Innovation in Health and Social Care. Edinburgh: Scottish Government
No abstract available