Asif, R. (2017). Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedings
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...
Sholl, S. (in press). Balance or tension? Walking the tightrope between training and patient care. Medical Education, ISSN 0308-0110
No abstract available.
Innes, M., & Winton, E. (2017). Lighting for Cities Inhabited by People, Not Cars: Community Co-Design and Creative Lighting. In Convention Proceedings - PLDC 6th Global Lighting Design Conference
Electric street lighting has developed wholly in the age of the motor car. Therefore, normal models of urban lighting are based firmly on designing for vehicle traffic. Standa...
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
Forestry Commission Scotland
Timber grading standards support ensuring standards are good for the domestic timber industries, and supporting industry in using them
Digital Health Institute
This project aims to extend the existing work with the e-Frail project, and integrate a range of NHS-sourced assessors with care giver and open source gathered assessors, in order to define a weighted...
09 June 2016
Simon Powers will write an article about "defection" (as the term is used in game theory), for the forthcoming Encyclopedia of Evolutionary Psychological Science, edited by To...
15 July 2017
16 June 2016
Simon Powers will deliver a research seminar about his work on the evolution of institutions.
Abstract Economics, artificial life, and agent-based c...
Senior Associate Research Fellow
Zero Hour Lecturer
Liu, X., & Liu, Q. (2017). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), 450-459. doi:10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...
Onyianta, A. J., & Williams, R. (2017). The Use of Sedimentation for the Estimation of Aspect Ratios of Charged Cellulose Nanofibrils. In R. Fangueiro, & S. Rana (Eds.), Advances in Natural Fibre Composites: Raw Materials, Processing and Analysis, 195-203. doi:10.1007/978-3-319-64641-1_17
In this study, the aspect ratios of carboxymethylated and TEMPO-oxidised cellulose nanofibrils (CNF) were estimated by gel point analysis using a sedimentation approach. The f...
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y., & Oakley, I. (2017). SmoothMoves: smooth pursuits head movements for augmented reality. In UIST '17 Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, 167-178. doi:10.1145/3126594.3126616
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Alsnousi, E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)doi:10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Ukwandu, E., Buchanan, W., & Russell, G. (2017). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)doi:10.1109/CyberSA.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Pitt, J., & Hart, E. (2017). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W),doi:10.1109/FAS-W.2017.119
This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional ...
Boix, D. M., Goh, K. & Mcwhinnie, J. (in press). Modelling and Control of Helicopter Robotic Landing Gear for Uneven Ground Conditions. In Proceedings of 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS 2017ISBN n/a
This paper proposes a method to investigate into helicopter landing on uneven terrain by means of using a scaled articulated robotic landing gear. A mathematical model of an a...
Romdhani, I., Faiza, M., Tandjaoui, D., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference Proceedingsdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Moradpoor, N., Brown, M., & Russell, G. (in press). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In 10th International Conference on Security of Information and Networks (SIN 2017)doi:10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Arts & Humanities Research Council
The feeling of being immersed within a live performance by an ensemble of world class musicians can be a deeply engaging and highly valued cultural experience for audiences as well as for the performe...
Development of a reliable methodology for better risk management of engineered biomaterials in Advanced Therapy Medicinal Products and/or Medical Devices.
BIORIMA stands for Biomaterial Risk Manageme...
Biotechnology and Biological Sciences Research Council
The worldwide success of the Whisky Industry provides a considerable supply of biomass-derived waste streams for future use. Sustainable valorisation of these streams will drive additional economic gr...
Nrf2, a transcriptional activator of cell protection genes, is an emerging target for neurodegenerative conditions including Alzheimer’s disease (AD). Nrf2 activity is reduced in dementia patients and...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
National Institute for Health Research
The impact of parental drug misuse on children and families is a major public health problem . Parental drug misuse is closely associated with poor parenting, poor child development and increased r...
NHS Health Scotland
The aim of this study is to analyse free text data generated via an online survey with mothers. The survey elicited opinions on the provision of a free breast pump or breast pump hire service for brea...
Edinburgh & Lothians Health Foundation
Surviving critical illness is associated with chronic psychological distress. Anxiety occurs in 43% of patients and depression in 30% of patients at 12 months after hospital discharge. Post-traumatic ...
Chartered Institute of Library and Information Professionals
The findings of this research will contribute to strategies to improve citizen engagement in the democratic process at community level.
Community Councillors are a vital link between local communities...
Chief Scientists Office
Psychiatric emergencies, and episodes of self-harm, accounted for over 30,000 Scottish ambulance call-outs in 2011. The overwhelming majority of these people were taken directly to Emergency Departmen...
Due to increasing incidence, more intensive treatment and improved survival, a growing number of head and neck cancer (HNC) survivors experience long-term swallowing difficulties, profoundly affecting...
ENU Development Trust
The project will work with a new PhD student who is collecting regular samples of juvenile fish from the Vanga mangrove forest in southern Kenya. The work will focus on two areas:
1) Describing the me...
Hyper-heuristics (HH) have been described as methodologies that aim to offer “good enough -soon enough - cheap enough” solutions to real world...
The work presented in this thesis concerns the problem of timetabling at universities – particularly course-timetabling, and examines the various ways i...
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...
17 February 2017
04 May 2016
04 May 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences & journals
Alife 2016 (Cancun,...
01 November 2017
06 January 2016
Neil Urquhart and Alistair Lawson have been awarded £19,000 by The Data Lab to support their ongoing research collaboration with Larder Load, an Edinburgh based food services ...
16 October 2017
08 October 2017
Details of research output in press. Results show that cyclists are being exposed to hand-arm vibration (HAV) and infrastructure must be improved to prevent long term health ...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
07 December 2016
The paper reports some of the findings of Frances Ryan's doctoral research. The full study – due to be completed in spring 2017 – takes into account prior research on the buil...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
On 30th November 2016 Edinburgh Napier University hosted the 2016 Annual Lecture of the Association for Information Science and Technology (ASIST). The speaker was Professor S...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
18 July 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences:
Alife 2016 (Cancun, Mexico) Simon Pow...