Lecturer in Cybersecurity and Networks
Liu, X., & Liu, Q. (2017). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), 450-459. doi:10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...
Liu, X., & Liu, Q. (2017). Power Consuming Activity Recognition in Home Environment. In X. Sun, H. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security. ICCCS 2017, 361-372. doi:10.1007/978-3-319-68505-2_31
This work proposed an activity recognition model which focus on the power con-suming activity in home environment, to help residents modify their behavior. We set the IoT syst...
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y., & Oakley, I. (2017). SmoothMoves: smooth pursuits head movements for augmented reality. In UIST '17 Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, 167-178. doi:10.1145/3126594.3126616
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Edinburgh Napier Funded
Having relevant work experience, such as a placement or internship, is valued by employers in the technology sector and can improve employment outcomes for computing graduates. However, gaining good w...
NHS Health Scotland
The project will take the form of a systematic review of relevant literature to provide an update on the evidence base on the health needs of people with learning disabilities in Scotland since 2004, ...
NHS Education Scotland
NES -GNC and Margaret Callum Roger Midwifery Award
To find out from people with learning disabilities and those who care and support them what skills and qualities non-learning disability trained sta...
01 February 2017
19 October 2017
Adaptive Behavior is an indexed, international peer reviewed journal that publishes original research and review articles on adaptive behavior in biological systems and autono...
23 June 2016
Dr Brian Detlor has been appointed Visiting Professor to the School of Computing at Edinburgh Napier University. This appointment formalises Brian’s long-standing relationship...
Lecturer in Cybersecurity and Digital Forensics
Vice Principal & Deputy Vice Chancellor
Assistant Principal, Student Experience
Dean of Computing
Pitt, J., & Hart, E. (2017). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W),doi:10.1109/FAS-W.2017.119
This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional ...
Romdhani, I., Faiza, M., Tandjaoui, D., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)doi:10.1109/compsac.2017.120
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the jo...
Moradpoor, N., Brown, M., & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In 10th International Conference on Security of Information and Networks (SIN 2017)doi:10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Liu, X., & Liu, Q. (2017). An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)doi:10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to...
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Bishop, C., Esteves, A. & Mcgregor, I. (in press). Head-Mounted Displays as Opera Glasses: Using Mixed-Reality to Deliver an Equalitarian User Experience During Live Events. In Proceedings of 19th ICMI ConferenceISBN n/a
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...
Ghaleb, B., Al-Dubai, A. & Romdhani, I. (2017). Drizzle: Adaptive and Fair Route Maintenance Algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), 1-6. doi:10.1109/ICC.2017.7996819. ISBN 978-1-4673-8999-0
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017). Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM),doi:10.23919/INM.2017.7987433
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...
O 'Dowd, A. (2017). SKiN Designing pseudo-physiology into personal technology devices to create enhanced interactions through visceral signifiers and behaviours
The majority of technology is now personal. Humans, in turn, are expected to and have personal relationships with their devices. The issue is that humans are biological beings...
Thuemmler, C., Alois, P., Jell, T. & Keow Lim, A. (2017). Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services. In Latifi, S. (Ed.). Information Technology-Next Generation, 811-817. doi:10.1007/978-3-319-54978-1_100. ISBN 978-3-319-54977-4
As more and more details of 5G technology specifications unveil and standards emerge it becomes clear that 5G will have an enabling effect on many different verticals includin...
SUNRISE will develop, implement, assess and facilitate learning about new, collaborative ways to address common mobility challenges at the neighbourhood level. Towards this aim, 6 cities will foster c...
Society for Research into Higher Education
Teaching-focused academics in UK Life Science departments may experience anxiety about their continued ability to teach undergraduates at Honours level, and postgraduates at Masters and doctoral level...
British Council "Mobility Grant for Leadership Development Project". Funds visit by 6 persons from Ukraine to Edinburgh to seek potential collaborations in education and work based learning.
Chartered Institute of Library and Information Professionals
The findings of this research will contribute to strategies to improve citizen engagement in the democratic process at community level.
Community Councillors are a vital link between local communities...
Digital Health Institute
As a precursor to the work described under the DHI application for development of “Diabetes: Understanding Daily Events –an interactive, digital diabetes education site for Young People”, there are se...
The Scottish Informatics & Computer Science Alliance
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Scottish Funding Council
The company is looking for an innovative means of creating a permanently installed communication system that visually enhances the building, can adaptively communicate and that is sensitive to the sit...
To deliver ABI training to the following Nursing cohorts: Mental Health; Midwifery: Adult: Learning Disabilities: Child (Students will be 2nd/3rd year students prior to practice placements).
Optimisation – finding cost-effective or high-performing solutions - is a key economic driver for business today. However, academic literature on search-based optimisation techniques reflects an escal...
Burdett Trust for Nursing
The project focuses on person centred care for people with learning disabilities at the point of transition from child to adult health services. The project will include multiple nursing perspectives ...
Fragment Finder (FF) enables a new, high-speed approach to digital forensics. It is unique in that it will build a more efficient technical architecture for the creation, storage and use of hash signa...
Kulio Ltd and Edinburgh Napier University are planning to collaborate to create a new innovative application consisting of Kulio education characters. Children throughout local authorities are already...
The PhD is to investigate the ecological implications of invasive bullhead in...
The concept of context-awareness is widely used in mobile and pervasive computing t...
05 December 2016
27 August 2017
22 August 2017
Zonefox, a spin-out of The Cyber Academy within the School of Computing at Edinburgh Napier University, officially launched their move into new offices in Edinburgh. They have...
15 July 2017
16 June 2016
Simon Powers will deliver a research seminar about his work on the evolution of institutions.
Abstract Economics, artificial life, and agent-based c...
11 April 2016
11 April 2016
Dr Petros Kostagiolas and Dr Christina Banou, both from the Ionian University of Corfu took part in an Erasmus exchange with the School of Computing in the week beginning 11th...
01 November 2017
25 April 2016
TRI working in collaboration with Dutch consultancy Inno-V have been appointed by the UK’s Urban Transport Group – which represents public bodies responsible for coordinating ...
18 May 2017
Professor Hazel Hall was admitted as a Fellow of the Royal Society of Edinburgh (RSE) by RSE President Dame Jocelyn Bell Burnell at a ceremony at the RSE headquarters at Georg...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
04 May 2016
The FOCAS project was rated as Excellent at its final review, after running for three years. The project coordinator was Emma Hart, with Jennifer Willies as Project Manager.