Learning Materials Developer & Interactive Lecturer
Asif, R. (2017). Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedings
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017). Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),doi:10.1109/DASC.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...
Alsnousi, E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)doi:10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Forestry Commission Scotland
Forestry Commission Scotland have asked us to carry out a short review of solar kiln technology and, specifically, a kiln design proposed by a small Scottish sawmill.
The report is for the public ben...
Scottish Funding Council
Dunbar Arts Trust is working with the Dunbar SciFest (with 8,500 visitors in 2014, it is possibly the largest primary school science festival in Europe) to develop an annual visual and performance art...
Construction Scotland Innovation Centre
The provision of dedicated research support to the Offsite HUB (Scotland) via a ENU research assistant to:
- coordinate meetings between HUB members and steering committee as appropriate including the...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
18 May 2016
The June 2016 issue of Journal of Information Science (volume 42, issue 3) has just been published. This is a special issue of the journal that comprises twelve articles devel...
Innes, M. (2017). True Colours: explorations in art, design and research. In Color and Imaging Conference, 309-312
Do you see colour the same way that I see colour? As my initial training was as an artist, it is possible that I look at colour very differently from someone with a scientific...
Romdhani, I., Faiza, M., Tandjaoui, D., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference Proceedingsdoi:10.1109/Trustcom/BigDataSE/ICESS.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)doi:10.1109/compsac.2017.120
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the jo...
Liu, X., & Liu, Q. (2017). An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)doi:10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to...
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Salayma, M., Al-Dubai, A., Romdhani, I. & Nasser, Y. (2017). New Dynamic, Reliable and Energy Efficient Scheduling for Wireless Body Area Networks (WBAN). In 2017 IEEE International Conference on Communications (ICC)doi:10.1109/ICC.2017.7996898. ISBN 978-1-4673-8999-0
Wireless body area networks (WBANs) facilitate
efficient and cost-effective e-health care and well-being
applications. The WBAN has unique challenges and features
compared to ...
Innes, M. (2017). The edges of lighting design Research and practice on the fringes. In New Perspectives on the Future of Healthy Light and Lighting in Daily Life, 16-21. ISBN 978-3-940677-61-7
Research and practice on the fringes
If architectural lighting design is contained within a defined circle, then the edges are, at the very least, quite blurred. All kinds of ...
O 'Dowd, A. (2017). SKiN Designing pseudo-physiology into personal technology devices to create enhanced interactions through visceral signifiers and behaviours
The majority of technology is now personal. Humans, in turn, are expected to and have personal relationships with their devices. The issue is that humans are biological beings...
Segura, C., Segredo, E., & Miranda, G. (2017). The Importance of the Individual Encoding in Memetic Algorithms with Diversity Control Applied to Large Sudoku Puzzles. In 2017 IEEE Congress on Evolutionary Computation (CEC)doi:10.1109/CEC.2017.7969565
In recent years, several memetic algorithms with explicit mechanisms to delay convergence have shown great promise when solving 9x9 Sudoku puzzles. This paper analyzes and ext...
Urquhart, N. & Hart, E. (in press). Creating optimised employee travel plans. In TBCISBN TBC
The routing of employees who provide services such as home health or social care is a complex problem. When sending an employee between two addresses , there may exist more th...
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017). New Trust Metric for the RPL Routing Protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS),doi:10.1109/IACS.2017.7921993
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...
Our website evaluated extremely positively among patients, family members and clinicians in NHS Lothian and our model is unquestionably of utility Scotland-wide.The underpinning research and iterative...
Chief Scientists Office
PThe impact of psychological trauma on physical and mental health is well known, although current models of care are failing to meet clients’ needs. A new model of care, supported and financed by the ...
SUNRISE will develop, implement, assess and facilitate learning about new, collaborative ways to address common mobility challenges at the neighbourhood level. Towards this aim, 6 cities will foster c...
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
The company is looking for an innovative means of creating a permanently installed communication system that visually enhances the building, can adaptively communicate and that is sensitive to the sit...
Higher Education Academy
The proposal aims to build a Virtualised Security Operation Center [vSoC] and integrates into a currently operating virtualized cyber security Cloud infrastructure (DFET), and use state-of-theart
Edinburgh & Lothians Health Foundation
Many people need to instil eye drops to treat conditions such as Dry Eye Syndrome (DES) and Glaucoma (30% of the population have DES and 70 million people worldwide have glaucoma). DES is relieved wit...
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
The project undertaken by Onyu and ENU will concentrate around the mobile application that is under development by the team at Onyu.
Working with ENU our key objectives are:
1. Validation of our zero...
A digital dome is a large physical object that can fully immerse one or more users and present them digital material via rear projection onto the dome’s surface. Such a system presents unique and curr...
The DISTRO network brings together leading laboratories in Visual Computing and 3D Computer Graphics research across Europe with the aim of training a new generation of scientists, technologists, and ...
The Associate Student Project (ASP) builds partnerships between the School of Computing and local further education colleges (FEs) to support students who study for the first two years of their degree...
This thesis presents a socio-technical account of the adoption and development
of Managed Learning Environme...
"The research explores elements of community, identity, and cultural realities. It explores the way of...
This investigation examines various methods for evaluating interactivity and engagement with technology. By using a static model, namely the interactive gallery at The Public...
The topic Addresses the development of novel secrity echanisms for mobile ad hoc networks, inspired by mechanisms apparent in the biological...
"This PhD project intends to address the ecological impact of the waste that c...
Hip fracture is a common, serious and well-defined in...
I am currently working on a PhD programme in the Centre ...
This doctoral research project is concerned with th...
In the mid-1960s and early 1970s, experimental ...
Real Time Travel Information (RTTI) systems deliver information to a wide range of travellers using different modes, with the aim of ma...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
21 April 2016
21 April 2016
To mark the Queens 90TH birthday I developed a collaborative design project between our product design department and the 6th form art department at Bo’ness Academy. I was inv...
30 November 2017
30 November 2017
Following the success of her site-specific composition for Craigsbank Parish Church, presented on September 23rd 2017 as part of Edinburgh Doors open Day, Katrina has been inv...
24 November 2017
24 November 2017
November 24, 10:00 am - 4:00 pm
Free ticketed event at the Being Human Festival
'Edinburgh has a long literary history, and many famous authors have made th...
20 April 2017
21 April 2017
The Biological Visualisation Community's 3rd Annual Meeting takes place at Craiglockhart Campus in Edinburgh on 20th-21st April 2017.
This two day meeting compri...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...
16 January 2016
16 January 2016
22 April 2016
22 April 2016
Open for ApplicationsRecruitment is now underway for the 4th year of the Destination Leaders Programme; a transformational investment for you, your business and your destinati...