Date


People

Download Available

Dewey Decimal

313 results

The application of Social Cognitive Theory in Information Science research on workplace learning and innovative work behaviours

Presentation / Conference
Jenkins, L., Hall, H. & Raeside, R. (2017, June)
The application of Social Cognitive Theory in Information Science research on workplace learning and innovative work behaviours. Paper presented at i3: interactions and impact (i3), Aberdeen, Scotland
Introduction This paper introduces an ESRC-funded research project on the theme of workplace learning and innovative work behaviours. The work explores the determinants of suc...

Mobile user authentication system (MUAS) for e-commerce applications.

Thesis
Molla, R. Mobile user authentication system (MUAS) for e-commerce applications. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1035289
The rapid growth of e-commerce has many associated security concerns. Thus, several studies to develop secure online authentication systems have emerged. Most studies begin wi...

5G innovations for new business opportunities

Report
Sébastien Bedo, J., Eddine El Ayoubi, S., Filippou, M., Gavras, A., Giustiniano, D., Iovanna, P., …Tjelta, T. (2017)
5G innovations for new business opportunities. Brussels: European Commission / 5G PPP
5G is the next generation mobile network that enables innovation and supports progressive change across all vertical industries and across our society1. Through its Radio Acce...

An evolutionary machine learning algorithm to enhance language processing.

Presentation / Conference
Kinch, M., Melis, W. J., & Keates, S. (2017, February)
An evolutionary machine learning algorithm to enhance language processing. Poster presented at 1st HBP Student Conference
No abstract available.

Applying semantic technologies to multi-agent models in the context of business simulations.

Thesis
Farrenkopf, T. Applying semantic technologies to multi-agent models in the context of business simulations. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1033149
Agent-based simulations are an effective simulation technique that can flexibly be applied to real-world business problems. By integrating such simulations into business games...

On Constructing Ensembles for Combinatorial Optimisation

Journal Article
Hart, E., & Sim, K. (2018)
On Constructing Ensembles for Combinatorial Optimisation. Evolutionary Computation, 26(1), 67-87. https://doi.org/10.1162/evco_a_00203
Although the use of ensemble methods in machine-learning is ubiquitous due to their proven ability to outperform their constituent algorithms, ensembles of optimisation algori...

Fundamental Issues in Mobile Healthcare Information Systems

Journal Article
Shahzad, B., Orgun, M. A., & Thuemmler, C. (2016)
Fundamental Issues in Mobile Healthcare Information Systems. Mobile Information Systems, 2016, 1-2. https://doi.org/10.1155/2016/6504641
Fundamental Issues in Mobile Healthcare Information Systems

U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks

Conference Proceeding
Zeb, K., Saleem, K., Al Muhtadi, J., & Thuemmler, C. (2016)
U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). , (562-567). https://doi.org/10.1109/HealthCom.2016.7749518
Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records...

Determinants of Next Generation e-Health Network and Architecture Specifications

Conference Proceeding
Thuemmler, C., Paulin, A., & Lim, A. K. (2016)
Determinants of Next Generation e-Health Network and Architecture Specifications. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), (233-238). https://doi.org/10.1109/HealthCom.2016.7749460
This paper summarizes the determinants for future e-Health network and IT infrastructures in the health care environment. The paper bases on observations conducted as part of ...

Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet

Conference Proceeding
Paulin, A., & Thuemmler, C. (2016)
Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom),, (245-248). https://doi.org/10.1109/HealthCom.2016.7749462
This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in tw...