Asif, R. (2017). Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedings
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017). Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),doi:10.1109/DASC.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...
Elaine, C., & Inglis, G. (in press). Just and Sustainable Places: Extending the Boundaries of Socio-environmental Health. In N/A
Background: Ecological public health encompasses the complex relationship between environment and health - protecting the physical environment and its inhabitants from contami...
NHS Health Scotland
The aim of this study is to analyse free text data generated via an online survey with mothers. The survey elicited opinions on the provision of a free breast pump or breast pump hire service for brea...
assist the development of a novel electrolysed water based application to reduce spoilage and microbial contamination of a variety of fresh produce types of importance to Indian commerce.
This funding is for collaborative workshops to develop data collection tools and intervention components to inform a definitive trial of a breast pump intervention. It is part of the BABI study funded...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
24 March 2017
24 March 2017
Robert Hrelja from VTI, the Swedish national transport research organisation, will be at TRI at Napier to meet Napier researchers and present his work on collaboration in publ...
09 June 2016
Simon Powers will write an article about "defection" (as the term is used in game theory), for the forthcoming Encyclopedia of Evolutionary Psychological Science, edited by To...
School Operations Officer
Lecturer in Cybersecurity and Networks
Senior Associate Research Fellow
Zero Hour Lecturer
Lecturer in Energy and Environmental Engineering
Assistant Principal, International
Finance and Commercial Director
Alsnousi, E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)doi:10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Pitt, J., & Hart, E. (2017). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W),doi:10.1109/FAS-W.2017.119
This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional ...
Romdhani, I., Faiza, M., Tandjaoui, D., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Moradpoor, N., Brown, M., & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In 10th International Conference on Security of Information and Networks (SIN 2017)doi:10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Liu, X., & Liu, Q. (2017). An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)doi:10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to...
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Salayma, M., Al-Dubai, A., Romdhani, I. & Nasser, Y. (2017). New Dynamic, Reliable and Energy Efficient Scheduling for Wireless Body Area Networks (WBAN). In 2017 IEEE International Conference on Communications (ICC)doi:10.1109/ICC.2017.7996898. ISBN 978-1-4673-8999-0
Wireless body area networks (WBANs) facilitate
efficient and cost-effective e-health care and well-being
applications. The WBAN has unique challenges and features
compared to ...
Ghaleb, B., Al-Dubai, A. & Romdhani, I. (2017). Drizzle: Adaptive and Fair Route Maintenance Algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), 1-6. doi:10.1109/ICC.2017.7996819. ISBN 978-1-4673-8999-0
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
Yassin, A., Nasser, Y., Awad, M. & Al-Dubai, A. (2017). Simultaneous Context Inference and Mapping using mm-Wave for Indoor Scenarios. In IEEE ICC 2017, 1-6. doi:10.1109/ICC.2017.7996976
We introduce in this paper two main approaches, Triangulateration (TL) and Angle-Difference-of-Arrival (ADoA) for indoor localization and mapping using single-anchor and milli...
Urquhart, N. (2017). Combining Parallel Coordinates with Multi-Objective Evolutionary Algorithms in a Real-World Optimisation Problem. In GECCO ’17 Companion, B, 1335-1340. doi:10.1145/3067695.3082485
Optimisation problems based upon real-world instances often contain many objectives. Many existing Multi-Objective Evolutionary Algorithm techniques return a set of solutions ...
Segura, C., Segredo, E., & Miranda, G. (2017). The Importance of the Individual Encoding in Memetic Algorithms with Diversity Control Applied to Large Sudoku Puzzles. In 2017 IEEE Congress on Evolutionary Computation (CEC)doi:10.1109/CEC.2017.7969565
In recent years, several memetic algorithms with explicit mechanisms to delay convergence have shown great promise when solving 9x9 Sudoku puzzles. This paper analyzes and ext...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
SUNRISE will develop, implement, assess and facilitate learning about new, collaborative ways to address common mobility challenges at the neighbourhood level. Towards this aim, 6 cities will foster c...
Gazi Bay in southern Kenya has the potential to become a world-leading centre of excellence in the integration of ecosystem science and community development. Work there, led by scientists from Kenya ...
Carnegie Trust for the Universities of Scotland
The proposed research project seeks to examine the ways colony-based photographers represented and celebrated the success of the colonial-based enterprises in Southeast Asian at the turn of the 20th c...
Glasgow Children's Hospital Charity
Project transfer in from Stirling University. To develop an acceptable and feasible breast pump incentive intervention for future testing in a trial. To describe NHS and voluntary sector breast pump p...
This project aims to develop an e-policy platform augmented with a toolbox of applications and online services, which will assist national and regional authorities in the EU in elaborating or revising...
The strategic development of technology and organisation to support the company’s growth in design, manufacture and
delivery of water treatment and energy conservation systems
Innovate KTP no. 010118
Do-It-Yourself networking refers to a conceptual approach to the use of low-cost hardware and wireless technology in deploying local communication networks that can operate independently from the Inte...
Higher Education Academy
The proposal aims to build a Virtualised Security Operation Center [vSoC] and integrates into a currently operating virtualized cyber security Cloud infrastructure (DFET), and use state-of-theart
Construction Scotland Innovation Centre
Given the knowledge, infrastructure and resource that resides within Scotland, there is a real opportunity here to be a key player in the global offsite construction market. The emphasis now is to sca...
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
Scottish Funding Council
We have identified the need for a more coherent and closer monitoring of system load and requirements in terms of power consumption within datacentres.
This project will develop a prototype applicat...
The work presented in this thesis concerns the problem of timetabling at universities – particularly course-timetabling, and examines the various ways i...
Hyper-heuristics (HH) have been described as methodologies that aim to offer “good enough -soon enough - cheap enough” solutions to real world...
Soil particle loss can occur through biodegradation, erosion and dissolution. Yet there is little understanding of the mechanical changes that accompany these p...
This thesis investigates the application of large scale concentrated solar (CSP) and photovoltaic power plants in Libya.
Direct Steam Gene...
After years of rapid e-book market share growth, sales have slowed with its share sti...
15 July 2017
17 February 2017
01 November 2017
05 February 2016
IntroductionOn the back of four nomination at the Scottish Knowledge Exchange awards [here], Gordon Stuart, director of operations at Informatics Ventures, has also predicted ...
05 January 2017
Staff within the Faculty of Informatics at the Vienna University of Technology in Austria plan to establish a Centre for Informatics and Society (CIS) as part of the Universit...
04 May 2016
04 May 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences & journals
Alife 2016 (Cancun,...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
18 November 2012
Two months into my new role as Director of the Edinburgh Institute and I wanted to thank those of you who have been in touch to wish me well and offer advice on how we can dev...
27 June 2016
Centre for Social Informatics PhD student John Mowbray is delivering a paper entitled ‘The role of networking and social media tools during job search: an information behaviou...
02 February 2017
A great partnership between Hutchinson Networks and The Cyber Academy at Edinburgh Napier University has been showcased within a collaboration project which has build advanced...
01 February 2017
17 May 2017
The Cyber Academy and MBM Commercial hosted a highly successful conference event with over 120 delegates which outlined some of the current issues of law and cyber security.