Skip to main content

Research Repository

Advanced Search

Outputs (409)

Structural optimisation of timber off-site modern methods of construction. (2012)
Presentation / Conference Contribution
Sanna, F., Hairstans, R., Leitch, K., Crawford, D., Menendez, J., & Turnbull, D. (2012). Structural optimisation of timber off-site modern methods of construction.

Efficient and sustainable building systems are required in order to achieve the UK government’s target of building three million new homes by 2016. Given the current lack of activity in the housing construction market to achieve this target, incr... Read More about Structural optimisation of timber off-site modern methods of construction..

A forensic image description language for generating test images. (2012)
Presentation / Conference Contribution
Russell, G., Macfarlane, R., & Ludwiniak, R. (2012). A forensic image description language for generating test images. In Proceedings of the 6th International Conference on Cybercrime Forensics Education & Training

Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study. At Edinburgh Napier University this topic has been taught with flexible an... Read More about A forensic image description language for generating test images..

Security issues of a publicly accessible cloud computing infrastructure. (2012)
Presentation / Conference Contribution
Russell, G., & Macfarlane, R. (2012). Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012) (1210-1

Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accidental or deliberate acts by users can be dangerous to other systems. This pape... Read More about Security issues of a publicly accessible cloud computing infrastructure..

Many-to-Many embedded multicast addressing and access control method. (2012)
Patent
Romdhani, I. (2012). Many-to-Many embedded multicast addressing and access control method

A new addressing scheme for multicast IP with an extended scope field to include access rights. A new addressing scheme for multicast communications is disclosed. A new extended scope field is used which embeds a plurality of hierarchical scopes and... Read More about Many-to-Many embedded multicast addressing and access control method..

On the Rodrigues’ Formula Approach to Operator Factorization (2012)
Journal Article
Robin, W. (2012). On the Rodrigues’ Formula Approach to Operator Factorization. International Mathematical Forum, 7(45-48), 2333-2351

In this paper, we derive general formulae that reproduce well-known instances of recurrence relations for the classical orthogonal polynomials as special cases. These recurrence relations are derived, using only elementary mathematics, directly from... Read More about On the Rodrigues’ Formula Approach to Operator Factorization.

Guest Editorial (2012)
Journal Article
Ridley-Ellis, D. (2012). Guest Editorial. ICF news, Spring,

Robot companions for citizens: roadmapping the potential for future robots In empowering older people. (2012)
Presentation / Conference Contribution
Prescott, T. J., Epton, T., Evers, V., McKee, K., Hawley, M., Webb, T., …Dario, P. (2012). Robot companions for citizens: roadmapping the potential for future robots In empowering older people. In Bridging Research in Ageing and ICT Development

The Future Emerging Technologies (FET) Flagship Candi- date "Robot Companions for Citizens" (RCC) proposes a transformative initiative, addressing a cross-domain grand scientific and technological challenge, to develop a new class of machines and emb... Read More about Robot companions for citizens: roadmapping the potential for future robots In empowering older people..

Contact buckling effects in built-up cold-formed steel beams. (2012)
Presentation / Conference Contribution
Portioli, F., D Lorenzo, G., D'Amico, B., Landolfo, R., & Mazzolani, F. M. (2012). Contact buckling effects in built-up cold-formed steel beams.

The aim of this paper is to investigate the effects of contact interactions on local buckling of a built-up cold-formed steel member assembled by mechanical fasteners. To this end a finite element model was developed. The numerical model was valida... Read More about Contact buckling effects in built-up cold-formed steel beams..

A comparison of techniques for name matching (2012)
Journal Article
Peng, T., Li, L., & Kennedy, J. (2012). A comparison of techniques for name matching. GSTF journal on computing, 2,

Information explosion is a problem for everyone nowadays. It is a great challenge to all kinds of businesses to maintain high quality of data in their information applications, such as data integration, text and web mining, information retrieval, sea... Read More about A comparison of techniques for name matching.