Associate Professor in Law
Liu, X., & Liu, Q. (2017). Power Consuming Activity Recognition in Home Environment. In X. Sun, H. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security. ICCCS 2017, 361-372. doi:10.1007/978-3-319-68505-2_31
This work proposed an activity recognition model which focus on the power con-suming activity in home environment, to help residents modify their behavior. We set the IoT syst...
Kydd, A. (2017). Flag Procession
No abstract available.
Report of the flag procession at the 44th Biennial Convention of the Honor Society of Nursing, Sigma Theta Tau International.
Elaine, C., & Inglis, G. (in press). Just and Sustainable Places: Extending the Boundaries of Socio-environmental Health. In N/A
Background: Ecological public health encompasses the complex relationship between environment and health - protecting the physical environment and its inhabitants from contami...
Evidence-informed recruitment and retention strategies are required to ensure the nursing workforce has sufficient capacity and capability to deliver care to Scotland’s population. Current ...
To deliver ABI training to the following Nursing cohorts: Mental Health; Midwifery: Adult: Learning Disabilities: Child (Students will be 2nd/3rd year students prior to practice placements).
Burdett Trust for Nursing
The project focuses on person centred care for people with learning disabilities at the point of transition from child to adult health services. The project will include multiple nursing perspectives ...
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
31 May 2017
Prof Bill Buchanan, who leads The Cyber Academy at Edinburgh Napier University, has been invited as a witness at the Health and Sport Committee within the Scottish Parliament ...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
Senior Lecturer in Design & Programme Leader BDes(Hons) Graphic Design
Lecturer in Child Health Nursing
Alsnousi, E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)doi:10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Ukwandu, E., Buchanan, W., & Russell, G. (2017). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)doi:10.1109/CyberSA.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Deakin, M., Mora, L., & Reid, A. (2017). Smart specialisation strategies in the post-linear era of research and innovation. In P. Ketikidis, & A. Solomon (Eds.), Proceedings of the 10th International Conference for Entrepreneurship, Innovation and Regional Development, 529-539
Smart specialisation can be considered an entrepreneurial discovery process which makes it possible to identify where regions can benefit from specialising in specific areas o...
Romdhani, I., Faiza, M., Tandjaoui, D., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)doi:10.1109/compsac.2017.120
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the jo...
Ghaleb, B., Al-Dubai, A. & Romdhani, I. (2017). Drizzle: Adaptive and Fair Route Maintenance Algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), 1-6. doi:10.1109/ICC.2017.7996819. ISBN 978-1-4673-8999-0
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
Pomponi, F., Medina Campos, L., Moncaster, A. & Smith, S. (2017). Bringing pupils into building energy performance: school design, construction and operation. In PLEA Conference Proceedings Volume IIIISBN N/A
Colegio Rochester is school in Colombia with a strong vision for sustainability. This vision permeates the new school building which was the first school in Latin America to b...
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Brodie, J., & Weaver, M. (2017). 'Getting on Board’: Supporting HE students’ transition to employment. Glasgow
In 2013, -The Get on Board (GOB) -extra-curriculum -programme was launched at Edinburgh Napier University’s Business School with the aim of placing students on the boards of l...
McGuire, D., MacKenzie, A. & Kissack, H. (2017). The use of gendered language in speeches made by Trump and Clinton adhered to stereotypes of the roles of male and female leaders
Speeches delivered by Donald J. Trump and Hillary Rodham Clinton during the 2016 presidential campaign contained many uses of gendered language. David McGuire, Abbi MacKenzie ...
O’Connor, S. & Hardiker, N. (2017). Derek Hoy: A legacy for Nursing Informatics in Scotland. International Journal of Medical Informatics. 104, 126-127. doi:10.1016/j.ijmedinf.2017.05.010. ISSN 1386-5056
No abstract available.
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Children's Hospice Association Scotland
The aim of the scoping exercise is to inform the development of an education strategy for CHAS relating to the delivery of palliative care for babies, children and young people (BCYP) and their famili...
Carnegie Trust for the Universities of Scotland
Derek Hoy was a Scottish nurse based predominantly in Glasgow who died in 2012. He worked for many years in the National Health Service (NHS) in a variety of clinical roles, where he began to experime...
National Institute for Health Research
The impact of parental drug misuse on children and families is a major public health problem . Parental drug misuse is closely associated with poor parenting, poor child development and increased r...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
Chief Scientists Office
We have developed an intervention that aims to help pregnant women to stop smoking by sending text messages with embedded behaviour change techniques (BCTs), as part of an engaging story with pictures...
The Melville Trust for Cure and Care of Cancer
It is recognised that teenagers and young people with cancer (and their families) require specialist expert care from allied health professionals (AHPs) (National Institute for Health and Clinical Exc...
Society for Research into Higher Education
This research project will explore and explain the role that higher education research plays in the higher education policy process. It is argued that academic research needs to reinforce its institut...
Construction Scotland Innovation Centre
Given the knowledge, infrastructure and resource that resides within Scotland, there is a real opportunity here to be a key player in the global offsite construction market. The emphasis now is to sca...
Optimisation – finding cost-effective or high-performing solutions - is a key economic driver for business today. However, academic literature on search-based optimisation techniques reflects an escal...
Scottish Funding Council
The project undertaken by Onyu and ENU will concentrate around the mobile application that is under development by the team at Onyu.
Working with ENU our key objectives are:
1. Validation of our zero...
Fragment Finder (FF) enables a new, high-speed approach to digital forensics. It is unique in that it will build a more efficient technical architecture for the creation, storage and use of hash signa...
The overall vision of the Spellakit project is to significantly enhance learner experience and outcomes in English language spelling through an innovative ICT based approach focused on a kinesthetic m...
At present the Information Technology profession appears to be dogged by high profile project failure, high...
Since 2010, XBRL (eXtensible Business Reporting Language) has been widely adopted throughout the world. In 2013, both the HMRC ...
The academic research into the relationship between gender, ge...
Mobile ad-hoc networking (MANET) technology has been a major avenue for many wireless and mobile networke...
The PhD project will explore the relationship between area deprivation and self-reported health in UK Nurses. I aim to assess the presence and extent of ...
A complex and contested concept, dignity is recognised as a significant factor in a person’s experience of care. Variations in the provision of dignity in care are reported in the literature and in the media. Many theoretical, organisational, professional and personal perspectives on dignity in care have been described, but the perspectives of nursing students have received relatively little attention. The purpose of this PhD study is to explore perceptions of preserving dignity in care among nursing students enrolled in a three-year preregistration undergraduate adult nursing programme.
This thesis offers an original contribution to knowledge through providing a...
Despite a growing research base in support of higher order thinking process...
Today, data plays an important role in people’s daily activities. With the help of some database applications such as decision support systems an...
The non-registered assistant workforce in the National Health Service Scotland (NHSS) has ...
The specification of Internet protocol stack was developed to be as universal as possible, providing various optio...
18 August 2017
08 October 2017
Cyclists are risking permanent nerve damage due to poor road surfaces, research by Edinburgh Napier University reported in The Scotsman suggests.
The research sug...
04 May 2016
The FOCAS project was rated as Excellent at its final review, after running for three years. The project coordinator was Emma Hart, with Jennifer Willies as Project Manager.
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
04 November 2016
This paper explores the potential impact of BREXIT on the Scottish financial services sector. For the purpose of this discussion the assumption is that Scotland remains part o...
05 May 2016
Professor Hazel Hall took part in a webinar interview today hosted by Science in Australia Gender Equity (SAGE). The SAGE team asked Hall about her experience of leading Edinb...
Prime numbers are used extensively in public key encryption key, typically where we take two prime numbers and multiply them together to give a modulus (N). This modulus is ...
07 December 2016
The paper reports some of the findings of Frances Ryan's doctoral research. The full study – due to be completed in spring 2017 – takes into account prior research on the buil...
19 December 2016
On 30th November 2016 Edinburgh Napier University hosted the 2016 Annual Lecture of the Association for Information Science and Technology (ASIST). The speaker was Professor S...
05 April 2017
05 April 2017
Prof Daniel Muzio, Associate Editor at the Journal of Management Studies, has kindly offered to visit Edinburgh Napier on 5th April to hold a JMS workshop. This will be a grea...
27 January 2016
27 January 2016
Peter Cruickshank and Bruce Ryan today publish their report on workshops on digital engagement for Community Council and Registered Tenant Organisation members. Key find...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...