Research explorer tool

Research Areas

162 results

Date


Research Areas

People

Download Available

Library Of Congress

Dewey Decimal

2917 results

CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications

Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2010)
CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications. In CICIS'10 Proceedings, (209-216). https://doi.org/10.1109/cisis.2010.21
In a pervasive environment, it is essential for computing applications to be context-aware. However, one of the major challenges is the establishment of a generic and dynamic ...

Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem.

Conference Proceeding
Akram, R. N., Markantonakis, K., & Mayes, K. (2012)
Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem. In S. Xie (Ed.), 8th International Conference on Computational Intelligence and Security (CIS 2012), 646-652. https://doi.org/10.1109/CIS.2012.149
In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of...

Building low CO2 solutions to the vehicle routing problem with time windows using an evolutionary algorithm.

Conference Proceeding
Urquhart, N. B., Hart, E., & Scott, C. (2010)
Building low CO2 solutions to the vehicle routing problem with time windows using an evolutionary algorithm. In IEEE Congress on Evolutionary Computationhttps://doi.org/10.1109/CEC.2010.5586088
An evolutionary Multi-Objective Algorithm (MOA) is used to investigate the trade-off between CO2 savings, distance and number of vehicles used in a typical vehicle routing pro...

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC.

Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017)
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications, (317-335). CHAM: Springer
The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the...

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach

Conference Proceeding
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...

Banking and gender: sex equality in the financial services in Britain and Turkey.

Book
Ozbilgin, M., & Woodward, D. (2004)
Banking and gender: sex equality in the financial services in Britain and Turkey. I.B. Tauris
Drawing comparisons from Turkey and Britain, countries which are at the margins of the European continent, 'Banking and Gender' argues that most of the gendered inequalities i...

Benson, P., Barkhuizen, G., Bodycott, P., & Brown, J. (2013). Second Language Identity in Narratives of Study Abroad.

Journal Article
Ratz, S. (2015)
Benson, P., Barkhuizen, G., Bodycott, P., & Brown, J. (2013). Second Language Identity in Narratives of Study Abroad. Teaching fellows journal, Autumn 2015, 18
Review of Benson, P., Barkhuizen, G., Bodycott, P., & Brown, J. (2013). Second Language Identity in Narratives of Study Abroad.

Automated responsive web services evolution through generative aspect-oriented component adaptation

Journal Article
Liu, X., Feng, Y., & Kerridge, J. (2008)
Automated responsive web services evolution through generative aspect-oriented component adaptation. International Journal of Computer Applications in Technology, 31(1/2), 83-93. https://doi.org/10.1504/IJCAT.2008.017721
When building service oriented systems, it is often the case that existing web services do not perfectly match user requirements in target systems. To achieve smooth integrati...

Best practice for implementing a data warehouse: a review for strategic alignment.

Conference Proceeding
Weir, R., Peng, T., & Kerridge, J. (2003)
Best practice for implementing a data warehouse: a review for strategic alignment. In Design and Management of Data Warehouses 2003: Proceedings of the 5th Intl. Workshop DMDW'2003, Berlin, Germany, September 8, 2003
A review of literature pertaining to data warehouse implementations over the last eight years has been undertaken. It was found that the views of data warehouse practitioners ...

Better locks to secure our data are the inevitable result of too many prying eyes

Other
Buchanan, W. J. (2014)
Better locks to secure our data are the inevitable result of too many prying eyes
Robert Hannigan, the new head of British signals intelligence agency GCHQ, has accused technology companies of aiding terrorists and criminals by providing them secure communi...

Date


People

420 results

Royal Botanic Gardens, Visitor Experience

2012 - 2014
The Royal Botanic Gardens Edinburgh would like to explore an opportunity to try to attract more visitors to the gardens during the dark winter months. They came up with an idea of setting up possible ...
Funder: Scottish Funding Council | Value: £5,000

Risk and opportunity in collaborative work

2008 - 2008
Social computing tools for collaboration in work environments. This study set out to establish the main risks and opportunities of the adoption of social computing tools within organizations for colla...
Funder: TFPL | Value: £4,400

Scapa Flow Technologies

2005 - 2006
To use evolutionary techniques to develop prototype software that will automatically optimise the performance of Enterprise Java software for large e-commerce systems.
Funder: Innovate UK | Value: £62,436

SCOPE: Server Configuration Optimisation through Parameter Evolution

2001 - 2006
SCOPE: Server Configuration Optimisation through Parameter Evolution
Funder: Innovate UK | Value: £100,000

sa.Fire

2012 - 2013
This project has resulted in a spin-out company which was incorporated on 17 January 2014. It has also generated a patent related to BDDs (Binary decision Diagrams).
Funder: Scottish Enterprise | Value: £320,000

Santander Staff Mobility Grant

2016 - 2017
"The Birth of a Nation: Exploring the Values-Based Leadership of Lee Kuan Yew in the Development of the Republic of Singapore" Yew was Singapore’s first Prime Minister from 1965 to 1990 and is regarde...
Funder: ENU Development Trust | Value: £400

RATTRAP (Guardian Toolkit)

2011 - 2013
The Office of Cyber Security & Information Assurance (OCSIA) estimates that the cost of cybercrime to businesses, in the UK alone, is over £21 billion per annum. This project focuses on the real-time ...
Funder: Scottish Enterprise | Value: £291,336

Research in Scotland on the Water Business: Strathpeffer Spa c.1850-2014

2014 - 2017
To analyse the rise, decline, and rise again of Strathpeffer Spa, c.1850-2014. This project will provide insight into the history and development of a distinctive, business-related highland community...
Funder: Carnegie Trust for the Universities of Scotland | Value: £1,000

Research in Librarianship - Impact Evaluation Study (RiLIES1)

2011 - 2011
Enhancing the impact of LIS Research Projects. RiLIES1 investigated the influence of funded research on practice in UK library and information science (LIS). It  identified factors that increase or ...
Funder: Library & information Science Research Coalition | Value: £27,945

Research in Librarianship - Impact Evaluation Study 2 (RiLIES2)

2012 - 2012
RiLIES2 was a follow-on project to RiLIES1 (completed in 2011). RiLIES2 was successful in: (1) clarifying the support and training needs of library and information science (LIS) researcher and r...
Funder: Library & information Science Research Coalition | Value: £21,923

Date


People

Qualification level

63 results

Sustainable festivals and events - an enquiry of leadership and futures

2015 - 2017
As a societal phenomenon, festivals and planned events are discussed in a wide policy context. They have entered a broader discus...
Dr Martin Robertson | Director of Studies: Prof Anna Leask | Second Supervisor: Prof Jane Ali-Knight

Leadership for the CIO: building capacity through applying leadership theory using frameworks

2012 - 2016
At present the Information Technology profession appears to be dogged by high profile project failure, high...
Prof Sally Smith | Director of Studies: Mr Grant MacKerron | Second Supervisor: Dr Vaughan Ellis

Investigating communicating sequential processes for Java to support ubiquitous computing

2005 - 2009
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
Dr Kevin Chalmers | Director of Studies: Prof Jon Kerridge | Second Supervisor: Dr Imed Romdhani

Autopoietic organisation of knowledge, creativity and innovation: a case study of the automotive manufacturer Daimler AG

2007 - 2012
Abstract Creativity and innovation are very important capabilities within an org...
Dr Jan Auernhammer | Director of Studies: George Stonehouse | Second Supervisor: Prof Hazel Hall

An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments

2008 - 2012
The concept of context-awareness is widely used in mobile and pervasive computing t...
Dr Zakwan Jaroucheh | Director of Studies: Prof Xiaodong Liu | Second Supervisor: Prof Sally Smith

An ethnographic interpretation of the work environment within a creative culture in the advertising sector

2009 - 2014
Purpose and rationale The purpose of the exploratory research is to provide a deeper understan...
Dr Christine Band | Director of Studies: Prof John Ensor | Second Supervisor: Prof Anna Leask

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - date
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Investigating the performance and underlying mechanisms of a novel screening measure for developmental dyslexia: implications for early identification

2013 - 2018
This PhD focuses on the sensorimotor theory of dev...
Dr Barbara Piotrowska | Director of Studies: Dr Jennifer Murray | Second Supervisor: Dr Rory MacLean

The limitations of legislation in the field of business law: a study of developments in company law, bankruptcy and diligence

2012 - 2015
This critical appraisal demonstrates three particular themes that are domin...
Nicholas Grier | Director of Studies: Prof Jill Stavert | Second Supervisor: Prof Anne Munro

The role of interactive technology in the co-creation of experience in Scottish visitor attractions

2014 - 2019
" As a sector that is reliant on the creation and management of memorable experiences, visitor attrac...
Dr Ellis Urquhart | Director of Studies: Prof Anna Leask | Second Supervisor: Dr Ivana Rihova

Date


People

134 results

Alistair Duff Interviewed: "Coronavirus, the Information Age & 1984!"

8 June 2020
The Asia Scotland Institute has released a vidcast with Professor Alistair Duff, Professor of Information Policy at Edinburgh Napier University, Edinburgh. Professor Duff addresses the extent to which...

University teams up with community researchers to help improve their neighbourhood

6 February 2020
A Team of community researchers will join forces with academics to help improve their neighbourhood. UK Research and Innovation today announced its backing for the Seven Kingdoms of Wester Hailes, on...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

Prof Al Duff Featured in Sunday Express

5 October 2019
A revolt is needed to protect our privacy, leading professor claims Professor Alistair Duff insists the rise of technology such as facial recognition (FRT), CCTV and smart devices is robbing us of ou...

Expert Testimony to Scottish Parliament

30 September 2019
Prof Al Duff appeared as an expert witness before the Scottish Parliament's Justice Committee. Testifying on behalf of privacy pressure group NO2ID Edinburgh, he answered MSP question about the bill f...

Prof. Emma Hart invited to join Scottish Government Steering Group to develop an Artificial Intelligence (AI) strategy for Scotland.

16 September 2019
Prof. Emma Hart has been invited by Minister Kate Forbes to join a Scottish Government Steering Group to develop an Artificial Intelligence (AI) strategy for Scotland.

Music team and technology helps bring twins virtually together for the BBC World Service 'Digital Planet' programme

5 September 2019
Edinburgh Napier and the Royal College of Music has helped bring musicians virtually together as part of a special 18th birthday edition of the BBC World Service’s Digital Planet programme. Led in E...

Dr Scott Lyall publishes an article in The Conversation on Nan Shepherd.

28 August 2019
‘The Living Mountain: in an age of ecological crisis, Nan Shepherd’s nature writing is more relevant than ever’. Article in The Conversation, published 29 August 2019

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Date