Sholl, S. (in press). Balance or tension? Walking the tightrope between training and patient care. Medical Education, ISSN 0308-0110
No abstract available.
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017). Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),doi:10.1109/DASC.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...
Innes, M., & Winton, E. (2017). Lighting for Cities Inhabited by People, Not Cars: Community Co-Design and Creative Lighting. In Convention Proceedings - PLDC 6th Global Lighting Design Conference
Electric street lighting has developed wholly in the age of the motor car. Therefore, normal models of urban lighting are based firmly on designing for vehicle traffic. Standa...
Chartered Institute of Library and Information Professionals
The findings of this research will contribute to strategies to improve citizen engagement in the democratic process at community level.
Community Councillors are a vital link between local communities...
World Olympians Association
The World Olympians Association (WOA), as part of the International Olympic Committee, would like to find out more about the musculoskeletal issues faced by retired athletes. What the main issues are ...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
12 May 2015
12 May 2015
A total of 35 researchers, early career and established academics from the Business School, the University and other institutions, attended the event, which took place on 12th...
25 January 2017
The effects of Brexit on the supply chain of transport professionals to industry is of critical interest to government and the private sector at present. To maintain competi...
06 January 2016
Neil Urquhart and Alistair Lawson have been awarded £19,000 by The Data Lab to support their ongoing research collaboration with Larder Load, an Edinburgh based food services ...
Head of Applications
Lecturer in Finance
Onyianta, A. J., & Williams, R. (2017). The Use of Sedimentation for the Estimation of Aspect Ratios of Charged Cellulose Nanofibrils. In R. Fangueiro, & S. Rana (Eds.), Advances in Natural Fibre Composites: Raw Materials, Processing and Analysis, 195-203. doi:10.1007/978-3-319-64641-1_17
In this study, the aspect ratios of carboxymethylated and TEMPO-oxidised cellulose nanofibrils (CNF) were estimated by gel point analysis using a sedimentation approach. The f...
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y., & Oakley, I. (2017). SmoothMoves: smooth pursuits head movements for augmented reality. In UIST '17 Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, 167-178. doi:10.1145/3126594.3126616
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Alsnousi, E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)doi:10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Ukwandu, E., Buchanan, W., & Russell, G. (2017). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)doi:10.1109/CyberSA.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Pitt, J., & Hart, E. (2017). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W),doi:10.1109/FAS-W.2017.119
This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional ...
Boix, D. M., Goh, K. & Mcwhinnie, J. (in press). Modelling and Control of Helicopter Robotic Landing Gear for Uneven Ground Conditions. In Proceedings of 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS 2017ISBN n/a
This paper proposes a method to investigate into helicopter landing on uneven terrain by means of using a scaled articulated robotic landing gear. A mathematical model of an a...
Romdhani, I., Faiza, M., Tandjaoui, D., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference Proceedingsdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)doi:10.1109/compsac.2017.120
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the jo...
Moradpoor, N., Brown, M., & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In 10th International Conference on Security of Information and Networks (SIN 2017)doi:10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Liu, X., & Liu, Q. (2017). An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)doi:10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to...
Digital Health Institute
This project aims to extend the existing work with the e-Frail project, and integrate a range of NHS-sourced assessors with care giver and open source gathered assessors, in order to define a weighted...
Nrf2, a transcriptional activator of cell protection genes, is an emerging target for neurodegenerative conditions including Alzheimer’s disease (AD). Nrf2 activity is reduced in dementia patients and...
National Institute for Health Research
The impact of parental drug misuse on children and families is a major public health problem . Parental drug misuse is closely associated with poor parenting, poor child development and increased r...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
NHS Health Scotland
The aim of this study is to analyse free text data generated via an online survey with mothers. The survey elicited opinions on the provision of a free breast pump or breast pump hire service for brea...
Carnegie Trust for the Universities of Scotland
The proposed research project seeks to examine the ways colony-based photographers represented and celebrated the success of the colonial-based enterprises in Southeast Asian at the turn of the 20th c...
Edinburgh & Lothians Health Foundation
Surviving critical illness is associated with chronic psychological distress. Anxiety occurs in 43% of patients and depression in 30% of patients at 12 months after hospital discharge. Post-traumatic ...
The development of enhanced data analytics capabilities to enable the modelling, analysis and presentation of complex data to improve Group Internal Audit’s assessment and insight into business risks ...
The Melville Trust for Cure and Care of Cancer
It is recognised that teenagers and young people with cancer (and their families) require specialist expert care from allied health professionals (AHPs) (National Institute for Health and Clinical Exc...
ENU Development Trust
The project will work with a new PhD student who is collecting regular samples of juvenile fish from the Vanga mangrove forest in southern Kenya. The work will focus on two areas:
1) Describing the me...
The World Health Organisation (WHO) identified the workplace as an important setting to support the promotion of health and wellbeing in 1981 with the introduction of the Health for All strategy, and ...
Chief Scientists Office
Psychiatric emergencies, and episodes of self-harm, accounted for over 30,000 Scottish ambulance call-outs in 2011. The overwhelming majority of these people were taken directly to Emergency Departmen...
Hyper-heuristics (HH) have been described as methodologies that aim to offer “good enough -soon enough - cheap enough” solutions to real world...
Since 2010, XBRL (eXtensible Business Reporting Language) has been widely adopted throughout the world. In 2013, both the HMRC ...
Credit risk is one of the most general risks that exist in the financial market and a major risk faced by financial institutions. Credit risk m...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for law enforcement agencies, impeding...
Prompted by the increasing number, sophistication and quality of laboratory-grown gemstones; gem...
The level of ownership and use of motorcycling has increased rapidly in Edinburgh and the UK in the last ten years. In this study, motorcy...
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
21 April 2016
Announcement of resultsEmerald and the Indian Academy of Management (IAM) are delighted to offer a research grant for an Indian project in the field of management research.