Buwert, P. (in press). Examining the Professional Codes of Design Organisations. In Proceedings of the Design Research Society 2018: Catalyst
Many of the professional organisations within the various fields of design activity publish professional codes of ethics in one form or another. This paper opens up a discussi...
Alwis, L., Bremer, K., Zheng, Y., Weigand, F., Kuhne, M., Helbig, R., & Roth, B. (2017). Integrated fiber Bragg grating incorporated textile carbon reinforcement structures. In 2017 IEEE Sensorsdoi:10.1109/ICSENS.2017.8234106
An optical fibre Bragg grating (FBG) based strain sensor network incorporated in a functionalized textile-based carbon structure (FTCS) that can be used for structural health ...
Asif, R. (2017). Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedings
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...
Scottish Funding Council
Working with small wool shop to use textile industry salvage as the basis for developing new export products.
Descent Master is a novel upper body training tool concept, initially created with the mountain bike market in mind, as this activity requires a stable and robust upper body musculature in order to pi...
Forestry Commission Scotland
Timber grading standards support ensuring standards are good for the domestic timber industries, and supporting industry in using them
04 May 2016
04 May 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences & journals
Alife 2016 (Cancun,...
18 July 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences:
Alife 2016 (Cancun, Mexico) Simon Pow...
21 March 2018
21 March 2018
This talk will present our recent findings and visual (static and animated) maps characterising combinatorial and computer program search spaces. We seek to lay the foundation...
Senior Associate Research Fellow
Zero Hour Lecturer
Zero Hour Lecturer
Senior Research Fellow
Romdhani, I., Mirza, N., King, P., Abdelshafy, M., & A. Alghamdi, A. (2017). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Wireless and Mobile Computing, Networking and Communications (WiMob)doi:10.1109/WiMOB.2017.8115854
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Boix, D. M., Goh, K., & Mcwhinnie, J. (2017). Modelling and Control of Helicopter Robotic Landing Gear for Uneven Ground Conditions. In Proceedings of 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS 2017doi:10.1109/RED-UAS.2017.8101644
This paper proposes a method to investigate into helicopter landing on uneven terrain by means of using a scaled articulated robotic landing gear. A mathematical model of an a...
Bishop, C., Esteves, A., & Mcgregor, I. (2017). Head-Mounted Displays as Opera Glasses: Using Mixed-Reality to Deliver an Equalitarian User Experience During Live Events. In ICMI 2017 Proceedings of the 19th ACM International Conference on Multimodal Interactiondoi:10.1145/3136755.3136781
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...
Innes, M., & Winton, E. (2017). Lighting for Cities Inhabited by People, Not Cars: Community Co-Design and Creative Lighting. In PLDC 6th Global Lighting Design Conference
Electric street lighting has developed wholly in the age of the motor car. Therefore, normal models of urban lighting are based firmly on designing for vehicle traffic. Standa...
Liu, X., & Liu, Q. (2017). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), 450-459. doi:10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...
Onyianta, A. J., & Williams, R. (2017). The Use of Sedimentation for the Estimation of Aspect Ratios of Charged Cellulose Nanofibrils. In R. Fangueiro, & S. Rana (Eds.), Advances in Natural Fibre Composites: Raw Materials, Processing and Analysis, 195-203. doi:10.1007/978-3-319-64641-1_17
In this study, the aspect ratios of carboxymethylated and TEMPO-oxidised cellulose nanofibrils (CNF) were estimated by gel point analysis using a sedimentation approach. The f...
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y., & Oakley, I. (2017). SmoothMoves: smooth pursuits head movements for augmented reality. In UIST '17 Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, 167-178. doi:10.1145/3126594.3126616
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Alsnousi, E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)doi:10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Ukwandu, E., Buchanan, W., & Russell, G. (2017). Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)doi:10.1109/CyberSA.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
Moradpoor, N., Brown, M., & Russell, G. (2017). Insider Threat Detection Using Principal Component Analysis and Self-Organising Map. In 10th International Conference on Security of Information and Networks (SIN 2017)doi:10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7. doi:10.1145/3136825.3136905
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
Pitt, J., & Hart, E. (2017). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W),doi:10.1109/FAS-W.2017.119
This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional ...
Society for Reproduction and Fertility
Chlamydia trachomatis is the most common sexually-transmitted infection in the world, and is associated with miscarriage, pre-term birth and infertility. However, the understanding of the mechanisms t...
Walks and Waterfalls is a multi-channel interactive project intended to design and roadmap a blended experience between a fine art photography book, a mobile augmented reality app and physical locatio...
Arts & Humanities Research Council
The feeling of being immersed within a live performance by an ensemble of world class musicians can be a deeply engaging and highly valued cultural experience for audiences as well as for the performe...
Development of a reliable methodology for better risk management of engineered biomaterials in Advanced Therapy Medicinal Products and/or Medical Devices.
BIORIMA stands for Biomaterial Risk Manageme...
Biotechnology and Biological Sciences Research Council
The worldwide success of the Whisky Industry provides a considerable supply of biomass-derived waste streams for future use. Sustainable valorisation of these streams will drive additional economic gr...
Digital Health Institute
This project aims to extend the existing work with the e-Frail project, and integrate a range of NHS-sourced assessors with care giver and open source gathered assessors, in order to define a weighted...
Nrf2, a transcriptional activator of cell protection genes, is an emerging target for neurodegenerative conditions including Alzheimer’s disease (AD). Nrf2 activity is reduced in dementia patients and...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
National Institute for Health Research
The impact of parental drug misuse on children and families is a major public health problem . Parental drug misuse is closely associated with poor parenting, poor child development and increased r...
Edinburgh & Lothians Health Foundation
Surviving critical illness is associated with chronic psychological distress. Anxiety occurs in 43% of patients and depression in 30% of patients at 12 months after hospital discharge. Post-traumatic ...
Chartered Institute of Library and Information Professionals
The findings of this research will contribute to strategies to improve citizen engagement in the democratic process at community level.
Community Councillors are a vital link between local communities...
Chief Scientists Office
Psychiatric emergencies, and episodes of self-harm, accounted for over 30,000 Scottish ambulance call-outs in 2011. The overwhelming majority of these people were taken directly to Emergency Departmen...
Hyper-heuristics (HH) have been described as methodologies that aim to offer “good enough -soon enough - cheap enough” solutions to real world...
The work presented in this thesis concerns the problem of timetabling at universities – particularly course-timetabling, and examines the various ways i...
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...
"The development of science and technology are increasingly affecting and changing the nature of processes in...
09 June 2016
Simon Powers will write an article about "defection" (as the term is used in game theory), for the forthcoming Encyclopedia of Evolutionary Psychological Science, edited by To...
15 July 2017
17 February 2017
01 November 2017
06 January 2016
Neil Urquhart and Alistair Lawson have been awarded £19,000 by The Data Lab to support their ongoing research collaboration with Larder Load, an Edinburgh based food services ...
16 October 2017
08 October 2017
Details of research output in press. Results show that cyclists are being exposed to hand-arm vibration (HAV) and infrastructure must be improved to prevent long term health ...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
07 December 2016
The paper reports some of the findings of Frances Ryan's doctoral research. The full study – due to be completed in spring 2017 – takes into account prior research on the buil...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
On 30th November 2016 Edinburgh Napier University hosted the 2016 Annual Lecture of the Association for Information Science and Technology (ASIST). The speaker was Professor S...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...