Associate Professor, Applied Social Sciences
Deakin, M., Mora, L., & Reid, A. (2018). The Research and Innovation of Smart Specialisation Strategies: The Transition from the Triple to Quadruple Helix. In M. Bozina Beros, N. Recker, & M. Kozina (Eds.), Proceedings of the 27th International Scientific Conference on Economic and Social Development, 94-103
This article suggests the Entrepreneurial Discovery Process (EPD) that underlies Research and Innovation Strategies for Smart Specialisation (RIS3) is not so much caught in th...
Mora, L., Deakin, M., & Reid, A. (2018). Stylized Facts on Smart Specialisation Research. In M. Bozina Beros, N. Recker, & M. Kozina (Eds.), Proceedings of the 27th International Scientific Conference on Economic and Social Development, 176-185
Smart Specialisation has generated a paradigmatic change in regional innovation policies and the European Union has shown a strong interest in supporting research that investi...
Liu, X., & Liu, Q. (in press). CAMA-UAN: A Context-Aware MAC Scheme to the Underwater Acoustic Sensor Networks for the Improved CACA-UAN. In Proceedings of the 3rd International Conference on Computer and Communication Systems
Acoustic Communication is one of the most common and popular techniques used for Underwater Sensor Networks. The design of its communication protocol becomes a challenge due t...
The Mental Health Tribunal for Scotland became operational in 2005. It plays an integral role in guaranteeing the rights of patients with mental disorder as originally identified in the Millan Princip...
The proposed research is a direct response to the European Commission's Active and Healthy Ageing initiative, with an
overarching goal to improve the quality of life of older people. By pursuing 15 di...
Improving breastfeeding outcomes is an international and national priority for infant and maternal health. However, breastfeeding rates in Scotland are amongst the lowest in Europe and the duration o...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
27 August 2017
13 October 2016
13 October 2016
Dr Anne Schwan co-organised International Prison Education Day at HMP Barlinnie on 13th October 2016 and acted as judge of a writing and arts competition with entries from pri...
Manager, The Cyber Academy
Senior Lecturer/Joint Director of Research
Romdhani, I., Mirza, N., King, P., Abdelshafy, M., & A. Alghamdi, A. (2017). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Wireless and Mobile Computing, Networking and Communications (WiMob)doi:10.1109/WiMOB.2017.8115854
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Grant, K., & Maxwell, G. (2017). Opening the black box: A JD-R evaluation of job stress, fatigue and boredom among commercial airline pilots. In TBC
The job demands-resources (JD-R) model is utilised to evaluate the interactions between the job demands and job resources of commercial airline pilots in the UK. The model hol...
Bishop, C., Esteves, A., & Mcgregor, I. (2017). Head-Mounted Displays as Opera Glasses: Using Mixed-Reality to Deliver an Equalitarian User Experience During Live Events. In ICMI 2017 Proceedings of the 19th ACM International Conference on Multimodal Interactiondoi:10.1145/3136755.3136781
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...
Liu, X., & Liu, Q. (2017). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), 450-459. doi:10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...
Liu, X., & Liu, Q. (2017). Power Consuming Activity Recognition in Home Environment. In X. Sun, H. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security. ICCCS 2017, 361-372. doi:10.1007/978-3-319-68505-2_31
This work proposed an activity recognition model which focus on the power con-suming activity in home environment, to help residents modify their behavior. We set the IoT syst...
Kydd, A. (2017). Flag Procession
No abstract available.
Report of the flag procession at the 44th Biennial Convention of the Honor Society of Nursing, Sigma Theta Tau International.
Onyianta, A. J., & Williams, R. (2017). The Use of Sedimentation for the Estimation of Aspect Ratios of Charged Cellulose Nanofibrils. In R. Fangueiro, & S. Rana (Eds.), Advances in Natural Fibre Composites: Raw Materials, Processing and Analysis, 195-203. doi:10.1007/978-3-319-64641-1_17
In this study, the aspect ratios of carboxymethylated and TEMPO-oxidised cellulose nanofibrils (CNF) were estimated by gel point analysis using a sedimentation approach. The f...
Alsnousi, E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)doi:10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Ukwandu, E., Buchanan, W., & Russell, G. (2017). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)doi:10.1109/CyberSA.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Moradpoor, N., Brown, M., & Russell, G. (2017). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In 10th International Conference on Security of Information and Networks (SIN 2017)doi:10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7. doi:10.1145/3136825.3136905
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Pitt, J., & Hart, E. (2017). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W),doi:10.1109/FAS-W.2017.119
This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional ...
Scottish Funding Council
Descent Master is a novel upper body training tool concept, initially created with the mountain bike market in mind, as this activity requires a stable and robust upper body musculature in order to pi...
Arts & Humanities Research Council
The feeling of being immersed within a live performance by an ensemble of world class musicians can be a deeply engaging and highly valued cultural experience for audiences as well as for the performe...
Centre for Sensor and Imaging Systems
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...
World Olympians Association
The World Olympians Association (WOA), as part of the International Olympic Committee, would like to find out more about the musculoskeletal issues faced by retired athletes. What the main issues are ...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
Nrf2, a transcriptional activator of cell protection genes, is an emerging target for neurodegenerative conditions including Alzheimer’s disease (AD). Nrf2 activity is reduced in dementia patients and...
The Scottish Informatics & Computer Science Alliance
This event aims to inspire women into cybersecurity roles by bringing together the cyber women from across the UK in the form of a poster competition. The event will be held in collaboration with Edin...
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
To re-establish Scotland’s status as Global Centre of Excellence for all aspects of mountain biking. Enable a sustainable industry led approach to mountain bike sector development using the knowledge...
This first international symposium on Post Graduate Cyber Security (PGCS) will bring together postgraduate research students working in cybersecurity areas. It is a forum for early researchers to pres...
Marine Alliance for Science & Technology for Scotland (Hosted by St Andrew's University)
Long-duration recorders are commercially available for week-scale terrestrial sound monitoring, but expensive and large, thus difficult to disguise in colonies. We have an active collaboration with th...
Do-It-Yourself networking refers to a conceptual approach to the use of low-cost hardware and wireless technology in deploying local communication networks that can operate independently from the Inte...
The development of an international financial centre has long been an inte...
The aim of this study is to understand the operational practices of copyright exploitation and prot...
The crisis in the numbers of donated organs has featu...
With the vision of ubiquitous computing becoming increasingly realized, a new technological layer in the form of sensors, urban screens, smartp...
The current thesis aimed to explore the novice driver problem from a psychological perspective. The ultimate aim was to e...
This thesis describes the development of the HI-risk method to assess socio-tec...
Rates of loss of biodiversity caused by human action are on the increase worldwide. However implicatio...
Creativity and innovation are very important capabilities within an org...
18 July 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences:
Alife 2016 (Cancun, Mexico) Simon Pow...
23 August 2017
12 August 2016
The 9th Evidence Based Library and Information Practice Conference is hosted by Drexel University (located in Philadelphia, Pennsylvania, USA), and takes place from 18th to 21...
20 May 2017
Professor Bill Buchanan, an international expert in Cyber Security, appeared on a wide range of media events related to the ransomware attack (WannaCry). This included a numbe...
22 August 2017
01 November 2017
17 February 2017
19 October 2017
Adaptive Behavior is an indexed, international peer reviewed journal that publishes original research and review articles on adaptive behavior in biological systems and autono...
05 December 2016
19 April 2017
07 July 2017
04 May 2016
The FOCAS project was rated as Excellent at its final review, after running for three years. The project coordinator was Emma Hart, with Jennifer Willies as Project Manager.