Skip to main content

Research Repository

Advanced Search

Outputs (4095)

Grid Routing: An Energy-Efficient Routing Protocol for WSNs with Single Mobile Sink (2017)
Journal Article
Liu, Q., Zhang, K., Liu, X., & Linge, N. (2017). Grid Routing: An Energy-Efficient Routing Protocol for WSNs with Single Mobile Sink. International Journal of Sensor Networks, 25(2), 1. https://doi.org/10.1504/ijsnet.2017.10007397

In a traditional wireless sensor network with static sinks, sensor nodes close to the sink run out of their batteries quicker than other nodes due to the increased data traffic towards the sink. These nodes with huge data traffic are easy to become... Read More about Grid Routing: An Energy-Efficient Routing Protocol for WSNs with Single Mobile Sink.

A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks (2017)
Journal Article
Sheykhkanloo, N. M. (2017). A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks. International Journal of Cyber Warfare and Terrorism, 7(2), 16-41. https://doi.org/10.4018/ijcwt.2017040102

Structured Query Language injection (SQLi) attack is a code injection technique where hackers inject SQL commands into a database via a vulnerable web application. Injected SQL commands can modify the back-end SQL database and thus compromise the sec... Read More about A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks.

Ethical ePunditry? The role of expertise in online opinion-making (2017)
Journal Article
Forrest, E., & Duff, A. S. (2017). Ethical ePunditry? The role of expertise in online opinion-making. Journal of Information Ethics, 26(1),

The use of blogs to communicate ideas, opinions and knowledge has grown over the past two decades. Social media platforms have facilitated the rise of hybridised forms of written, verbal and visual communication and opinion-making, output which we de... Read More about Ethical ePunditry? The role of expertise in online opinion-making.

Adaptive energy management mechanisms for cluster based routing wireless sensor networks. (2017)
Thesis
Eshaftri, M. Adaptive energy management mechanisms for cluster based routing wireless sensor networks. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/1032654

Wireless Sensor Network (WSN) technology has been one of the major avenues of Internet of Things (IoT) due to their potential role in digitising smart physical environments. WSNs are typically composed of a vast number of low-power, low–cost and mult... Read More about Adaptive energy management mechanisms for cluster based routing wireless sensor networks..

The students' acceptance of learning management systems in Saudi Arabia: A case study of King Abdulaziz University (2017)
Presentation / Conference Contribution
Binyamin, S., Rutter, M., & Smith, S. (2017, March). The students' acceptance of learning management systems in Saudi Arabia: A case study of King Abdulaziz University. Presented at International Technology, Education and Development Conference, Valencia, Spain

The Technology Acceptance Model (TAM) has become one of the most widely-used models in understanding user acceptance of technologies and has been employed in many empirical studies. However, TAM has barely been used within the context of Saudi Arabia... Read More about The students' acceptance of learning management systems in Saudi Arabia: A case study of King Abdulaziz University.

VANET aided D2D Discovery: Delay Analysis and Performance (2017)
Journal Article
Chour, H., Nasser, Y., Artail, H., Kachouh, A., & Al-Dubai, A. (2017). VANET aided D2D Discovery: Delay Analysis and Performance. IEEE Transactions on Vehicular Technology, 66(9), 8059-8071. https://doi.org/10.1109/TVT.2017.2690238

The proposed solutions in the literature for integrating Device-to-Device (D2D) communication in cellular networks require added functionalities and consume valuable network resources, mainly in the discovery process. Unlike existing solutions, this... Read More about VANET aided D2D Discovery: Delay Analysis and Performance.

Tasks and visual techniques for the exploration of temporal graph data (2017)
Thesis
Kerracher, N. Tasks and visual techniques for the exploration of temporal graph data. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/977758

This thesis considers the tasks involved in exploratory analysis of temporal graph data, and the visual techniques which are able to support these tasks.

There has been an enormous increase in the amount and availability of graph (network) data,... Read More about Tasks and visual techniques for the exploration of temporal graph data.

An exploration of strategic planning and stakeholder engagement for the development of heritage sites in Plovdiv, Bulgaria (2017)
Thesis
Bruehlmann, C. A. An exploration of strategic planning and stakeholder engagement for the development of heritage sites in Plovdiv, Bulgaria. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/976366

This study determined how stakeholders of heritage attractions apply strategic management for their business planning and development. A conceptual framework for strategic heritage planning was created and applied within the case of Plovdiv, Bulgaria... Read More about An exploration of strategic planning and stakeholder engagement for the development of heritage sites in Plovdiv, Bulgaria.

The next cyberattack could come from sound waves (2017)
Newspaper / Magazine
Buchanan, B. (2017). The next cyberattack could come from sound waves. https://theconversation.com/the-next-cyberattack-could-come-from-sound-waves-74716

You might think your smartphone or laptop is relatively safe from cyber attacks thanks to anti-virus and encryption software. But your devices are increasingly at risk from “side-channel” attacks, where an intruder can bypass traditional network entr... Read More about The next cyberattack could come from sound waves.