O'Connor, S. (2017). Big Data and Data Science in Healthcare: What Nurses and Midwives Need to Know. Journal of Clinical Nursing, doi:10.1111/jocn.14164. ISSN 0962-1067
The evolution of technology in contemporary society has been accelerating in recent decades, with smaller, more interconnected hardware devices and software applications becom...
Sholl, S. (in press). Balance or tension? Walking the tightrope between training and patient care. Medical Education, ISSN 0308-0110
No abstract available.
Liu, X., & Liu, Q. (2017). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), 450-459. doi:10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...
Scottish Funding Council
The university will undertake a comprehensive review of the core biometric security software for the desktop enterprise environment including Bio Logon, Bio ID Secure Communications and Bio ID Secure ...
NHS Health Scotland
The project will take the form of a systematic review of relevant literature to provide an update on the evidence base on the health needs of people with learning disabilities in Scotland since 2004, ...
Arts & Humanities Research Council
This collaborative project with University of Edinburgh, will focus on the design and development of an interface, which will be accessible online, via mobile phones and tablets, and via large touchsc...
01 February 2017
18 July 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences:
Alife 2016 (Cancun, Mexico) Simon Pow...
01 April 2016
Prime numbers are used extensively in public key encryption key, typically where we take two prime numbers and multiply them together to give a modulus (N). This modulus is ...
Dean of Computing
Senior Lecturer, Teaching Fellow, Head of Life Sciences
Romdhani, I., Faiza, M., Tandjaoui, D., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Ghaleb, B., Al-Dubai, A. & Romdhani, I. (2017). Drizzle: Adaptive and Fair Route Maintenance Algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), 1-6. doi:10.1109/ICC.2017.7996819. ISBN 978-1-4673-8999-0
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
Urquhart, N., & Fonzone, A. (2017). Evolving Solution Choice and Decision Support for a Real-World Optimisation Problem. In Proceedings of the Genetic and Evolutionary Computation Conference 2017, 1264-1271. doi:10.1145/3071178.3071207
Agencies who provide social care services typically have to optimise staff allocations and the travel whilst attempting to satisfy conflicting objectives. In such cases it i...
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Benyon, D. & Egan, C. (2017). Sustainable HCI: Blending permaculture and user-experience. In DIS '17 Companion Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive SystemsISBN 978-1-4503-4991-8
For approximately 10 years the SIGCHI Sustainable HCI (sHCI) and Sustainable Interaction Design (SID) communities have debated the contribution that HCI can make to sustainabi...
Farrenkopf, T., Guckert, M., & Urquhart, N. (2017). AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks. In Y. Demazeau, P. Davidsson, J. Bajo, & Z. Vale (Eds.), PAAMS 2017: Advances in Practical Applications of Cyber-Physical Multi-Agent Systems: The PAAMS Collection, 355-358. doi:10.1007/978-3-319-59930-4_37
AGADE-TRAFFIC is a tool for simulating traffic flow in networks. Traffic participants are modelled as NetLogo agents and are visualised in a graphical user interface. Geograph...
Egan, C., Benyon, D., & Thompson, R. (in press). Permaculture as a foundation for sustainable interaction design and UX. In Proceedings of British HCI 2017
The main objective of this work is to gain an understanding of the relationships between UX and permaculture. This will deliver insights as to how digital media development ca...
Sobolewska, E. (in press). Tailoring methodological bricolage to investigate non-discretionary use of digital technology. In n/a
Digital technology appears to be an integral part of everyday life: at homes, workplaces, during leisure time; mediating interactions, demanding attention and engagement. In t...
Benyon, D. & Resmini, A. (in press). User Experience in Cross-channel Ecosystems. In Proceedings of the British HCI Conference 2017ISBN tbc
Recent developments in information and communication technologies have left interaction design and human-computer interaction (HCI) with something of a conceptual gap. The dis...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Chomsiri, T., He, X., Nanda, P. & Tan, Z. (2017). An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. In 2016 IEEE Trustcom/BigDataSE/ISPA, 178-184. doi:10.1109/trustcom.2016.0061. ISBN 978-1-5090-3205-1
The firewalls were invented since 1990s  and have been developed to operate more secure and faster. From the first era of the firewalls until today, they still regulate pac...
Burdett Trust for Nursing
This nurse-led project will be an interdisciplinary collaboration between leading researchers working in Edinburgh Napier University, in the University of Sydney, and Flinders University, Adelaide Aus...
'EverythingPast' is a global project that will link together and make accessible public, private and personal archive through a unique map-led interface. The website will create an unprecedented multi...
Digital Health Institute
Scottish Frailty Framework with Mobile Device Capture and Big Data Integration. The proposed innovation will develop and extend the current work into Frailty, with the long term focus on encompassing ...
This is a follow-on innovation voucher project to further develop a software system which will fully document Statutory Examinations of lifting, pressure and LEV equipment. The solution will involve a...
Comcarde is developing a mobile payments system called Bridge that uses a patent pending algorithm which is extremely resilient to man-in-the-middle attacks. Combined with strong authentication, we b...
This project aims to produce a pilot mobile app for industry members making relevant content from ASHS's bi-annual print journal and related interactive tools available on gps enabled mobile...
The project undertaken by Onyu and ENU will concentrate around the mobile application that is under development by the team at Onyu.
Working with ENU our key objectives are:
1. Validation of our zero...
The project is to develop a bespoke, mobile software application which will record results of Statutory Examinations of lifting, pressure and LEV equipment and automatically generate the associated re...
The aim of the project led by Alistair Lawson of IIDI is to create a prototype for a single module of a Crofting Entry Level Course developed by the Scottish Crofting Federation.
This project de...
The project will require the customisation of a mobile vehicle to fulfil the physical and social requirements of data collection from the public, considering the practical, emotional and aesthetic req...
Design and prototyping of a digital concierge based on mobile technology for the enhancement of the experience of guests in a high-end hostel. The digital concierge will use a digital character and ga...
The customer had a prototype made by a FE College that proved inadequate and did not use the appropriate materials. The project will be to re-engineer a prototype using the desired specifications. We...
With the growing need of the industry and due to high business demands, there have consequently been high demands of IT pro...
Proteolytic degradation of the extracellular matrix (ECM...
Mobile ad-hoc networking (MANET) technology has been a major avenue for many wireless and mobile networke...
In the mid-1960s and early 1970s, experimental ...
The concept of context-awareness is widely used in mobile and pervasive computing t...
This study uses an ethnographic approach (participant observation in conjunction with indepth group and individual inte...
This research will seek to understa...
Children and older adults are overrepresented in pedestrian accidents (Department for Transport, 2010a, 2010b). Gaze behaviour is ci...
A town planner, faced with the task of designing attractive walking spaces, needs a tool that will allow different designs to b...
Real Time Travel Information (RTTI) systems deliver information to a wide range of travellers using different modes, with the aim of ma...
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
17 February 2016
17 February 2016
The 2010 Equality Act and associated Public Sector Equality Duties have introduced important legal obligations for public authorities, continuing for those under the previous ...
16 January 2017
16 June 2017
Meeting with SPT to update them on our research in transport policy
01 January 1970
01 January 1970
On Friday 17th November we will be holding a seminar to update you on the latest research on timber. The morning session is open to all and will include summaries on two rece...