Senior Associate Research Fellow
Innes, M., & Winton, E. (2017). Lighting for Cities Inhabited by People, Not Cars: Community Co-Design and Creative Lighting. In Convention Proceedings - PLDC 6th Global Lighting Design Conference
Electric street lighting has developed wholly in the age of the motor car. Therefore, normal models of urban lighting are based firmly on designing for vehicle traffic. Standa...
Liu, X., & Liu, Q. (2017). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), 450-459. doi:10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...
Liu, X., & Liu, Q. (2017). Power Consuming Activity Recognition in Home Environment. In X. Sun, H. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security. ICCCS 2017, 361-372. doi:10.1007/978-3-319-68505-2_31
This work proposed an activity recognition model which focus on the power con-suming activity in home environment, to help residents modify their behavior. We set the IoT syst...
Engineering and Physical Sciences Research Council
Ontologies are a way of reasoning about data in an efficient manner. Ontologies are increasingly prevalent in a range of applications, including the Semantic Web, medicine and law. The development and...
Arts & Humanities Research Council
The project pursues three main aims and objectives:
1. Address desideratum: During the First World War, many communities in Britain and its Empire hosted internment camps for military Prisoners of Wa...
Edinburgh Napier Funded
Having relevant work experience, such as a placement or internship, is valued by employers in the technology sector and can improve employment outcomes for computing graduates. However, gaining good w...
04 May 2016
04 May 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences & journals
Alife 2016 (Cancun,...
07 December 2016
The paper reports some of the findings of Frances Ryan's doctoral research. The full study – due to be completed in spring 2017 – takes into account prior research on the buil...
18 July 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences:
Alife 2016 (Cancun, Mexico) Simon Pow...
Lecturer and Research Leader in Biomedical Sciences
Associate Professor of Immunology & Infection / Director of Research, School of Applied Sciences
Lecturer in Biomedical Science
Lecturer in Psychology
Academic Skills Adviser
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y., & Oakley, I. (2017). SmoothMoves: smooth pursuits head movements for augmented reality. In UIST '17 Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, 167-178. doi:10.1145/3126594.3126616
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Alsnousi, E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)doi:10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference Proceedingsdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Singh Jamnal, G., Liu, . X., & Fan, L. (2017). Home automation:HMM based fuzzy rule engine for Ambient intelligent smart space. In Proceedings of The 29th International Conference on Software Engineering and Knowledge Engineering
in this paper, we proposed a new type of decision making system to achieve the intelligent goal for automated smart environments. The artificial intelligence techniques, used ...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Liu, X., & Liu, Q. (2017). An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)doi:10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to...
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017). Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM),doi:10.23919/INM.2017.7987433
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...
Thuemmler, C., Alois, P., Jell, T. & Keow Lim, A. (2017). Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services. In Latifi, S. (Ed.). Information Technology-Next Generation, 811-817. doi:10.1007/978-3-319-54978-1_100. ISBN 978-3-319-54977-4
As more and more details of 5G technology specifications unveil and standards emerge it becomes clear that 5G will have an enabling effect on many different verticals includin...
Segura, C., Segredo, E., & Miranda, G. (2017). The Importance of the Individual Encoding in Memetic Algorithms with Diversity Control Applied to Large Sudoku Puzzles. In 2017 IEEE Congress on Evolutionary Computation (CEC)doi:10.1109/CEC.2017.7969565
In recent years, several memetic algorithms with explicit mechanisms to delay convergence have shown great promise when solving 9x9 Sudoku puzzles. This paper analyzes and ext...
Hart, E., Sim, K., Gardiner, B., & Kamimura, K. (2017). A Hybrid Method for Feature Construction and Selection to Improve Wind-Damage Prediction in the Forestry Sector. In GECCO '17 Proceedings of the Genetic and Evolutionary Computation Conference, 1121-1128. doi:10.1145/3071178.3071217
Catastrophic damage to forests resulting from major storms has resulted in serious timber and financial losses within the sector across Europe in the recent past. Developing r...
Thomson, C., Wadhaj, I., Romdhani, I. & Al-Dubai, A. (2017). Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)doi:10.1109/aiccsa.2016.7945687. ISBN 9781509043200
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...
Benyon, D. & Egan, C. (2017). Sustainable HCI: Blending permaculture and user-experience. In DIS '17 Companion Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive SystemsISBN 978-1-4503-4991-8
For approximately 10 years the SIGCHI Sustainable HCI (sHCI) and Sustainable Interaction Design (SID) communities have debated the contribution that HCI can make to sustainabi...
Consejo Superior de Investigaciones Científicas
The main goal of this project is to understand the mechanisms responsible for the virulence of food-related yeasts on humans, and to provide tools and recommendations to prevent the release of yeasts ...
Our website evaluated extremely positively among patients, family members and clinicians in NHS Lothian and our model is unquestionably of utility Scotland-wide.The underpinning research and iterative...
Nrf2, a transcriptional activator of cell protection genes, is an emerging target for neurodegenerative conditions including Alzheimer’s disease (AD). Nrf2 activity is reduced in dementia patients and...
assist the development of a novel electrolysed water based application to reduce spoilage and microbial contamination of a variety of fresh produce types of importance to Indian commerce.
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
Glasgow Children's Hospital Charity
Project transfer in from Stirling University. To develop an acceptable and feasible breast pump incentive intervention for future testing in a trial. To describe NHS and voluntary sector breast pump p...
Construction Scotland Innovation Centre
Novel offsite construction process for manufacture of housing
Chief Scientists Office
We have identified the human cathelicidn LL-37 as having potent direct antiviral activity against human rhinovirus (HRV), together with the capacity to alter death pathways in HRV-infected cells, as a...
Scottish Funding Council
The aim of this project led by Alistair Lawson of IIDI is to develop a design for the underlying architecture of a novel virtual learning platform
A digital dome is a large physical object that can fully immerse one or more users and present them digital material via rear projection onto the dome’s surface. Such a system presents unique and curr...
Evaluate the application of a novel heat exchanger design for the food and drink sector
This project aims to enhance ILI's existing TRUSTLii system by using novel and unique methods to extract useful insights from personal data, as well as improving the security of personal data stores t...
Hyper-heuristics (HH) have been described as methodologies that aim to offer “good enough -soon enough - cheap enough” solutions to real world...
In this thesis two existing computer science techniques are used to solve a...
The necessity for scientists and others to use consistent terminology has recently been regarded as fundamental to advancing ...
eGovernment is a relatively new, but rapidly expanding, domain;
mainly due to the perceived outcomes that it may bring to the
The concept of context-awareness is widely used in mobile and pervasive computing t...
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
Soil particle loss can occur through biodegradation, erosion and dissolution. Yet there is little understanding of the mechanical changes that accompany these p...
Component-Based Development (CBD) has been broadly used in software development as it enhances the productivity and reduces t...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for law enforcement agencies, impeding...
There is evidence to suggest that psychological therapies for severe mental health ...
Affiliate advertising is changing the way that people do business online. Retailers are now offering incentives to third-party publis...
Fossil fuels are a finite resource, which are subject to erratic price fluctuations and are c...
This PhD is concerned with the role of online information in the creati...
Despite a growing research base in support of higher order thinking process...
06 October 2017
Friday 6th October
Edinburgh Methodist Church, Nicholson Square
2-5pm Discussions and talks (free admission)
7:30pm Concert (cello and electronics)
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
22 November 2017
02 May 2017
02 May 2017
The “Academics Online” workshop on Tuesday 2 May, organised by Dr Ivana Rihova and Dr Nathalia Tjandra from the Business School, allowed the 40 participating academics, ECRs a...
15 August 2017
15 August 2017
Everyday branded products, from instant coffee to cars, have long been imbued by marketers with human traits as a means of appealing to consumers’ self-image. Indeed an interp...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...
The 2010 Equality Act and associated Public Sector Equality Duties have introduced important legal obligations for public authorities, continuing for those under the previous ...
24 July 2016
24 July 2016
Local co-ordinator for Soapbox Science, a novel public outreach platform for promoting women scientists and the science they do.
22 June 2017
22 June 2017
The University’s Centre for Literature and Writing (CLAW) runs a series of research seminars on Wednesday afternoons throughout the teaching trimesters. These seminars are des...