Professor in Maternal Health
Sholl, S. (in press). Balance or tension? Walking the tightrope between training and patient care. Medical Education, ISSN 0308-0110
No abstract available.
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017). Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),doi:10.1109/DASC.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...
Liu, X., & Liu, Q. (2017). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), 450-459. doi:10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...
Chief Scientists Office
Chlamydia trachomatis is the most common sexually transmitted infection in Scotland, and has significant long‐term consequences to reproductive health. Recent studies suggest that in addition to the g...
British Association of Sport and Exercise Sciences
The project will measure circulating white blood cells and progenitor cells in response to an extreme exercise running bout/event/ We will also be quantifying upper respiratory tract symptoms.
Nrf2, a transcriptional activator of cell protection genes, is an emerging target for neurodegenerative conditions including Alzheimer’s disease (AD). Nrf2 activity is reduced in dementia patients and...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
13 February 2017
31 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament ...
Assistant Principal, International
Head of Applications
Programme Leader BDes(Hons) Product Design
Liu, X., & Liu, Q. (2017). Power Consuming Activity Recognition in Home Environment. In X. Sun, H. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security. ICCCS 2017, 361-372. doi:10.1007/978-3-319-68505-2_31
This work proposed an activity recognition model which focus on the power con-suming activity in home environment, to help residents modify their behavior. We set the IoT syst...
Deakin, M., Mora, L., & Reid, A. (2017). Smart specialisation strategies in the post-linear era of research and innovation. In P. Ketikidis, & A. Solomon (Eds.), Proceedings of the 10th International Conference for Entrepreneurship, Innovation and Regional Development, 529-539
Smart specialisation can be considered an entrepreneurial discovery process which makes it possible to identify where regions can benefit from specialising in specific areas o...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference Proceedingsdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)doi:10.1109/compsac.2017.120
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the jo...
Moradpoor, N., Brown, M., & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In 10th International Conference on Security of Information and Networks (SIN 2017)doi:10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Liu, X., & Liu, Q. (2017). An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)doi:10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to...
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Bishop, C., Esteves, A. & Mcgregor, I. (in press). Head-Mounted Displays as Opera Glasses: Using Mixed-Reality to Deliver an Equalitarian User Experience During Live Events. In Proceedings of 19th ICMI ConferenceISBN n/a
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...
Soufian, M., Borairi, M., & Yu, D. (2017). Fault detection observer of a pilot plant papermaking machine. In 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE)doi:10.1109/ISIE.2017.8001525
This paper presents the development of a bilinear system model and the application of a bilinear fault detection observer to a papermaking machine to detect various ...
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017). Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM),doi:10.23919/INM.2017.7987433
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...
Urquhart, N. (2017). Combining Parallel Coordinates with Multi-Objective Evolutionary Algorithms in a Real-World Optimisation Problem. In GECCO ’17 Companion, B, 1335-1340. doi:10.1145/3067695.3082485
Optimisation problems based upon real-world instances often contain many objectives. Many existing Multi-Objective Evolutionary Algorithm techniques return a set of solutions ...
Children's Hospice Association Scotland
The aim of the scoping exercise is to inform the development of an education strategy for CHAS relating to the delivery of palliative care for babies, children and young people (BCYP) and their famili...
The proposed research is a direct response to the European Commission's Active and Healthy Ageing initiative, with an
overarching goal to improve the quality of life of older people. By pursuing 15 di...
The Mental Health Tribunal for Scotland became operational in 2005. It plays an integral role in guaranteeing the rights of patients with mental disorder as originally identified in the Millan Princip...
This is a Data Labs project which will investigate Blockchain technology - with Spiritus, the project will be ground-breaking in the implementation of a private blockchain within a large-scale healthc...
Scottish Funding Council
This project takes a new approach to teaching Mindful-breathing techniques to children aged 4-9.
Diagnosis of anxiety, stress, depression and ADHD in children has seen a significant increase over the...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
Medical Research Council
Risks of developing many adult illnesses are set down as we develop in the womb, hence the environment we experience during fetal life needs to be ‘just right’. Understanding how the fetal environmen...
SUNRISE will develop, implement, assess and facilitate learning about new, collaborative ways to address common mobility challenges at the neighbourhood level. Towards this aim, 6 cities will foster c...
Gazi Bay in southern Kenya has the potential to become a world-leading centre of excellence in the integration of ecosystem science and community development. Work there, led by scientists from Kenya ...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
University of Stratchlyde (Industrial Biotechnology Innovation Centre)
This project aims to investigate the first phase to manufacture chemicals from starch waste, namely acetone, butanol, ethanol, succinic acid and/or D-amino acid oxidase. Edinburgh Napier University (E...
Society for Research into Higher Education
Teaching-focused academics in UK Life Science departments may experience anxiety about their continued ability to teach undergraduates at Honours level, and postgraduates at Masters and doctoral level...