Segredo, E., Lalla-Ruiz, E., & Hart, E. (2018). A Novel Similarity-based Mutant Vector Generation Strategy for Differential Evolution. In H. Aguirre (Ed.), Proceedings of the Genetic and Evolutionary Computation Conference 2018
The mutant vector generation strategy is an essential component of Differential Evolution (DE), introduced to promote diversity, resulting in exploration of novel areas of the...
Smith, S., Sobolewska, E., Bhardwaj, J., & Fabian, K. (in press). Exploring women's motivations to study computer science. In Proceedings of the Frontiers in Education 2018 Conference
This paper presents a study exploring women's decisions, influencers and early experiences of computing to better understand how women's motivations and prior experience affec...
Urquhart, N., & Hart, E. (in press). Optimisation and Illumination of a Real-world Workforce Scheduling and Routing Application via Map-Elites. In Proceedings of PPSN 2018
Workforce Scheduling and Routing Problems (WSRP) are very common in many practical domains, and usually have a number of objectives. Illumination algorithms such as Map-Elites...
Arts & Humanities Research Council
The feeling of being immersed within a live performance by an ensemble of world class musicians can be a deeply engaging and highly valued cultural experience for audiences as well as for the performe...
Engineering and Physical Sciences Research Council
Robotics is changing the landscape of innovation. But traditional design approaches are not suited to novel or unknown habitats and contexts, for instance: robot colonies for ore mining, exploring or ...
Digital Health Institute
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
21 March 2018
21 March 2018
This talk will present our recent findings and visual (static and animated) maps characterising combinatorial and computer program search spaces. We seek to lay the foundation...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
Zero Hour Lecturer
Dean of Health & Social Care
Clavie, B., & Moradpoor, N. (in press). Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. In Proceedings of posters presented at 10th ACM Conference on Web Science
This article explores a perceived bias between two British reddit
communities dedicated to discussing British politics.We analyse the
popular sources favoured by each communit...
Liu, X., & Liu, Q. (in press). Appliance Recognition Based on Continuous Quadratic Programming. In Proceedings of 4th International Conference on Cloud Computing and Security (ICCCS 2018)
The detailed information of residents' electricity consumption is of great significance to the planning of the use of electrical appliances and the reduction of electrical ene...
Liu, X., Liu, Q., Zou, Y., & Wang, G. (in press). A Self-organizing LSTM-Based Approach to PM2.5 Forecast. In Proceedings of the 4th International Conference on Cloud Computing and Security (ICCCS 2018)
Nanjing has been listed as the one of the worst performers across China with respect to the high level of haze-fog, which impacts people's health greatly. For the severe condi...
Garden, C. L. P., & Rivera, E. S. (in press). Putting theory into practice: gamification for student engagement. In EDULEARN18 Proceedings
Gamification is the use of game design elements in a non-game contexts . It is an intervention that has been used in a business setting for a number of years and is now bec...
Hart, E., Steyven, A. S. W., & Paechter, B. (in press). Evolution of a Functionally Diverse Swarm via a Novel Decentralised Quality-Diversity Algorithm. In Proceedings of GECCO 2018
The presence of functionality diversity within a group has been demonstrated to lead to greater robustness, higher performance and increased problem-solving ability in a broad...
Todd, L. (in press). Tourist Art and Commodification. In Proceedings of Art, Materiality and Representation
Panel 106: Tourist Art and Commodification
The visual consumption and depiction of material and experiential phenomena have become increasingly pertinent in con...
Hood, B., & Flint, T. (in press). Eidolon360 – A VR Experience. In Proceedings of xCoAx 2018
Eidolon360 is a virtual reality artwork and experience that is interacted with through VR headsets. The viewer, reclining on a bed within the exhibition space, experiences a 3...
Urquhart, N. (2018). Evaluating the Performance of an Evolutionary Tool for Exploring Solution Fronts. In Applications of Evolutionary Computation, 523-537. doi:10.1007/978-3-319-77538-8_36
EvoFilter is an evolutionary algorithm based tool for searching through large non-dominated fronts in order to find a subset of solutions that are of interest to the user. Ev...
Givaki, K., Chen, D., Xu, L., & Xu, Y. (in press). An Alternative Current-Error Based Control for VSC Integration to Weak Grid. In IEEE PES General Meeting 2018
An enhanced current control strategy is proposed for
voltage source converters for the integration to weak grids. The
control derives from the current-error based vector contr...
Hall, H., Cruickshank, P., & Ryan, B. (2018). Exploring Information Literacy Through the Lens of Activity Theory. In Communications in Computer and Information Science; Information Literacy in the Workplace, 803-812. doi:10.1007/978-3-319-74334-9_81
Activity Theory (AT) is presented as a framework for explaining Information Literacy (IL) as a technologically mediated social practice. This is achieved in the context of a s...
McLaren, P., Russell, G., & Buchanan, B. (2018). Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017doi:10.1109/SAI.2017.8252185
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...
Moradpoor, N., Clavie, B., & Buchanan, B. (2018). Employing machine learning techniques for detection and classification of phishing emails. In Proceedings of the IEEE Technically Sponsored Computing Conference 2017doi:10.1109/SAI.2017.8252096
A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or d...
Medical Research Council
Osteoarthritis (OA) is the most important ageing-related musculoskeletal disease, affecting almost 9 million people in the UK. Despite this, there remain many unanswered questions in our understanding...
Skills Development Scotland
The course will combine relevant fundamental knowledge in cyber security and forensics with extensive and relevant practical experience skills gained through lab-based practice, with an emphasis on go...
Royal Academy of Engineering
Africa is the continent with the highest number of displaced people due to wars, humanitarian crises, resource scarcity, and extreme climate events. Emergency sheltering always sets out with the best ...
Carnegie Trust for the Universities of Scotland
The objective of this research study is to develop a prototype model for gathering and reusing ocean plastic in-situ. The proposal is to visit a number of beachside locations along the Scottish West C...
Society for Reproduction and Fertility
Chlamydia trachomatis is the most common sexually-transmitted infection in the world, and is associated with miscarriage, pre-term birth and infertility. However, the understanding of the mechanisms t...
TRANSFORM - Education reform project – Improving Research capability in the Sri Lankan Higher Education sector.
Scottish Funding Council
Walks and Waterfalls is a multi-channel interactive project intended to design and roadmap a blended experience between a fine art photography book, a mobile augmented reality app and physical locatio...
Technology has been heralded as a potential enabler of communication between individuals and those in their informal or
professional care network. Enabling people to effectively talk about their needs...
The project pursues three main aims and objectives:
1. Address desideratum: During the First World War, many communities in Britain and its Empire hosted internment camps for military Prisoners of Wa...
Royal Society of Edinburgh
The "Scotland 2030 Vision” project seeks to build on internal research funding from Edinburgh Napier University to engage citizens in gaining their social, economic and cultural aspirations for the f...
Centre for Sensor and Imaging Systems
The collaboration work has developed through an existing Data Lab funded project, and has shown how data science can be used to discover security vulnerabilities within IoT devices. Currently the team...