Skip to main content

Research Repository

Advanced Search

Outputs (132)

Eidolon360 – A VR Experience (2018)
Presentation / Conference Contribution
Hood, B., & Flint, T. (2018, July). Eidolon360 – A VR Experience. Presented at 6th Conference on Computation, Communication, Aesthetics & X, Madrid, Spain

Eidolon360 is a virtual reality artwork and experience that is interacted with through VR headsets. The viewer, reclining on a bed within the exhibition space, experiences a 360 film, shot within a medical simulation centre, that mimics clinical hosp... Read More about Eidolon360 – A VR Experience.

A Cooperative Learning Approach for the Quadratic Knapsack Problem (2018)
Presentation / Conference Contribution
Lalla-Ruiz, E., Segredo, E., & Voß, S. (2018). A Cooperative Learning Approach for the Quadratic Knapsack Problem. In Learning and Intelligent Optimization Conference (LION12) (31-35). https://doi.org/10.1007/978-3-030-05348-2_3

The Quadratic Knapsack Problem (QKP) is a well-known optimization problem aimed to maximize a quadratic objective function subject to linear capacity constraints. It has several applications in different fields such as telecommunications, graph theor... Read More about A Cooperative Learning Approach for the Quadratic Knapsack Problem.

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2018, August). Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. Presented at The 4th International Conference on Technology Trends, Babahoyo, Ecuador

Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, such as programmable logic controllers (PLC), networking devices, and actua... Read More about Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System.

Feature-preserving detailed 3D face reconstruction from a single image (2018)
Presentation / Conference Contribution
Li, Y., Ma, L., Fan, H., & Mitchell, K. (2018, December). Feature-preserving detailed 3D face reconstruction from a single image. Presented at the 15th ACM SIGGRAPH European Conference, London, United Kingdom

Dense 3D face reconstruction plays a fundamental role in visual media production involving digital actors. We improve upon high fidelity reconstruction from a single 2D photo with a reconstruction framework that is robust to large variations in expre... Read More about Feature-preserving detailed 3D face reconstruction from a single image.

Reducing the Impact of Network Bottlenecks on Remote Contraband Detection (2018)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2018, June). Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. Presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018), Glasgow, UK

Cloud based storage is increasing in popularity, with large volumes of data being stored remotely. Digital forensics investigators examining such systems remotely are limited by bandwidth constraints when accessing this kind of data using traditi... Read More about Reducing the Impact of Network Bottlenecks on Remote Contraband Detection.

Sub-file Hashing Strategies for Fast Contraband Detection (2018)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2018, June). Sub-file Hashing Strategies for Fast Contraband Detection. Presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018), Glasgow, Scotland

Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for many law enforcement agencies. Data reduction techniques are required for fast... Read More about Sub-file Hashing Strategies for Fast Contraband Detection.

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018, June). A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. Presented at Cyber Security 2018: 2018 International Conference on Cyber Security and Protection of Digital Services, Glasgow, United Kingdom

Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development over time have improved their components including operating system platforms... Read More about A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.

Graduate apprenticeships are great opportunities for individuals, but are they inclusive? (2018)
Presentation / Conference Contribution
Taylor-Smith, E., Smith, S., & Varey, A. (2018, December). Graduate apprenticeships are great opportunities for individuals, but are they inclusive?. Paper presented at Society for Research into Higher Education (SRHE) Annual Conference, Newport, Wales

Higher education-level apprenticeships can provide routes to university degrees for people without the financial resources for traditional degrees. In Scotland, the first cohorts of graduate apprentices began their studies in 2017, including cohorts... Read More about Graduate apprenticeships are great opportunities for individuals, but are they inclusive?.