Skip to main content

Research Repository

Advanced Search

All Outputs (160)

Engaging and influencing policy and the curriculum – the Scottish Information Literacy Project experience. (2012)
Book Chapter
Irving, C. (2012). Engaging and influencing policy and the curriculum – the Scottish Information Literacy Project experience. In C. Rankin, & A. Brock (Eds.), Library services for children and young people: Challenges and opportunities in the digital age (49-63). Facet

Library and information science (LIS) professionals support learning and teaching in a variety of ways, and this chapter focuses on information literacy (IL) and the key messages that it holds for engaging and influencing policy. It uses the Scottish... Read More about Engaging and influencing policy and the curriculum – the Scottish Information Literacy Project experience..

Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem. (2012)
Presentation / Conference Contribution
Akram, R. N., Markantonakis, K., & Mayes, K. (2012, November). Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem

In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of her smart card based applications (e.g. banking, telecom, and transport et... Read More about Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem..

Efficient Rasterization for Edge-based 3D Object Tracking on Mobile Devices (2012)
Presentation / Conference Contribution
Kissling, E., Mitchell, K., Oskam, T., & Gross, M. (2012, November). Efficient Rasterization for Edge-based 3D Object Tracking on Mobile Devices. Presented at GRAPHInternational Conference on Computer Graphics and Interactive Techniques

Augmented reality applications on hand-held devices suffer from the limited available processing power. While methods to detect the location of artificially textured markers within the scene are commonly used, geometric properties of three-dimensiona... Read More about Efficient Rasterization for Edge-based 3D Object Tracking on Mobile Devices.

A nonlinear correlation measure for Intrusion Detection (2012)
Presentation / Conference Contribution
Ambusaidi, M., Lu, L. F., He, X., Tan, Z., Jamdagni, A., & Nanda, P. (2012, November). A nonlinear correlation measure for Intrusion Detection. Paper presented at The 7th International Conference on Frontier of Computer Science and Technology (FCST-12)

The popularity of using internet contains some risks of network attacks. It has attracted the attention of many researchers to overcome this problem. One of the effective ways that plays an important role to achieve higher security and protect networ... Read More about A nonlinear correlation measure for Intrusion Detection.

Towards OWL 2 Natively Supported Fuzzy Cloud Ontology (2012)
Presentation / Conference Contribution
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012, July). Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. Presented at 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops

Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applications as on-demand services. While presenting cloud services semantically usi... Read More about Towards OWL 2 Natively Supported Fuzzy Cloud Ontology.

A Bayesian interpretation of the particle swarm optimization and its kernel extension (2012)
Journal Article
Andras, P. (2012). A Bayesian interpretation of the particle swarm optimization and its kernel extension. PLOS ONE, 7(11), Article e48710. https://doi.org/10.1371/journal.pone.0048710

Particle swarm optimization is a popular method for solving difficult optimization problems. There have been attempts to formulate the method in formal probabilistic or stochastic terms (e.g. bare bones particle swarm) with the aim to achieve more ge... Read More about A Bayesian interpretation of the particle swarm optimization and its kernel extension.

Community Councils online: a survey (2012)
Report
Ryan, B., & Cruickshank, P. (2012). Community Councils online: a survey. Edinburgh, Scotland: Edinburgh Napier University

A survey of Scottish Community Councils found that only 22% have up-to-date online public presences. Only 4% of Community Councils have easily accessible online planning content. Most Community Councils websites communicate from Community Councils to... Read More about Community Councils online: a survey.

Evolution for the sustainability of Internetware. (2012)
Presentation / Conference Contribution
Fang, D., Liu, X., Liu, L., & Yang, H. (2012, October). Evolution for the sustainability of Internetware. Presented at Fourth Asia-Pacific Symposium on Internetware

Along with the green attentions and efforts on energy efficiency of computer hardware and embedded systems, software relevant sustainability issues are becoming increasingly focused, as a part of Green Information Technology (GIT). Undoubtedly, softw... Read More about Evolution for the sustainability of Internetware..

Transformation or continuity? The impact of social media on information: implications for theory and practice. (2012)
Presentation / Conference Contribution
Cox, A., Francke, H., Haider, J., Hall, H., & Huvila, I. (2012, October). Transformation or continuity? The impact of social media on information: implications for theory and practice. Paper presented at ASIS&T 2012 Annual Meeting

This panel debates whether the ways in which social media are changing the nature, creation, location, use and sharing of information constitute a transformation or are primarily marked by continuity. Ubiquitous and everyday access to social media (f... Read More about Transformation or continuity? The impact of social media on information: implications for theory and practice..

RePIDS: A multi tier Real-time Payload-based Intrusion Detection System (2012)
Journal Article
Jamdagni, A., Tan, Z., He, X., Nanda, P., & Liu, R. P. (2013). RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Computer Networks, 57(3), 811-824. https://doi.org/10.1016/j.comnet.2012.10.002

Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of existing systems lack the ability to process data for real-time anomaly detec... Read More about RePIDS: A multi tier Real-time Payload-based Intrusion Detection System.

Storisphere: Let’s Make a Video Story Together (2012)
Presentation / Conference Contribution
Mu, M., Simpson, S., Brown, J., Bojko, C., & Broadbent, M. (2012, October). Storisphere: Let’s Make a Video Story Together. Paper presented at Digital Futures 2012: The Digital Economy All Hands Conference (DE 2012), Aberdeen

Exploiting machine learning for intelligent room lighting applications (2012)
Presentation / Conference Contribution
Gopalakrishna, A., Özçelebi, T., Liotta, A., & Lukkien, J. (2012, September). Exploiting machine learning for intelligent room lighting applications. Presented at 2012 6th IEEE International Conference Intelligent Systems, Sofia, Bulgaria

Research has shown that environment lighting influences the behavior of the employees in an office setting highly, making lighting configuration in an office space crucial. A breakout area may be used by the employees for various activities that need... Read More about Exploiting machine learning for intelligent room lighting applications.

Treatment of missing data in intelligent lighting applications (2012)
Presentation / Conference Contribution
Kota Gopalakrishna, A., Özçelebi, T., Liotta, A., & Lukkien, J. (2012, September). Treatment of missing data in intelligent lighting applications. Presented at 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, Fukuoka, Japan

The concept of intelligent lighting facilitates the use of machine learning models to adapt the lighting application behavior based on changing context. Ideally, a complete dataset without missing values is used to train the learning algorithm. Never... Read More about Treatment of missing data in intelligent lighting applications.

Beat Haiku: interactive poetry application. (2012)
Presentation / Conference Contribution
Helgason, I. (2012, October). Beat Haiku: interactive poetry application. Presented at NordiCHI’12 Making sense through design

This application invites the user to create short Haiku poems by selecting and arranging words that are displayed onscreen. The web-based application is presented on a touchscreen, and displays a constantly refreshing pool of words taken from the lar... Read More about Beat Haiku: interactive poetry application..

Uses of Peer Assessment in Database Teaching and Learning (2012)
Presentation / Conference Contribution
Paterson, J., Wilson, J. N., & Leimich, P. (2010, June). Uses of Peer Assessment in Database Teaching and Learning. Presented at 27th British National Conference on Databases (BNCOD 27), Dundee

This discussion paper introduces three very different methods and contexts for the use of peer assessment in introductory database classes, each of which is supported by different learning software tools. In the first case study, at Glasgow Caledonia... Read More about Uses of Peer Assessment in Database Teaching and Learning.

Data quality and data cleaning in database applications (2012)
Thesis
Li, L. Data quality and data cleaning in database applications. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/5788

Today, data plays an important role in people’s daily activities. With the help of some database applications such as decision support systems and customer relationship management systems (CRM), useful information or knowledge could be derived from l... Read More about Data quality and data cleaning in database applications.

Researching the adoption of ICT in Ethiopia: a case study of small hotels in Addis Ababa (2012)
Journal Article
Demeke, W., & Olden, A. (2012). Researching the adoption of ICT in Ethiopia: a case study of small hotels in Addis Ababa. Aslib Proceedings, 64(5), 519-528. https://doi.org/10.1108/00012531211263139

Purpose – The purpose of this paper is to analyse the difficulties encountered when researching the
adoption of information and communications technology (ICT) by small hotels in Addis Ababa,
Ethiopia, and to indicate how some of these difficulties... Read More about Researching the adoption of ICT in Ethiopia: a case study of small hotels in Addis Ababa.

New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks. (2012)
Presentation / Conference Contribution
Bani Khalaf, M., Al-Dubai, A., & Abed, M. (2012, September). New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks

In this paper, we investigate efficient strategies for supporting velocity aware probabilistic route discovery in Mobile Ad hoc Networks (MANETs). MANETs usually use broadcast mechanisms to discover routes between nodes by flooding the network with R... Read More about New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks..

Service oriented architecture based web application model for collaborative biomedical signal analysis (2012)
Journal Article
Mahmud, M., Rahman, M. M., Travalin, D., Raif, P., & Hussain, A. (2012). Service oriented architecture based web application model for collaborative biomedical signal analysis. Biomedical Engineering / Biomedizinische Technik, 57(S1), 780-783. https://doi.org/10.1515/bmt-2012-4412

The rapid growth in availability of new biomedical systems and devices capable of acquiring biosignals for disease diagnosis and health monitoring require rigorous processing. Biomedical research by nature depends on integrated problem solving softwa... Read More about Service oriented architecture based web application model for collaborative biomedical signal analysis.

On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space (2012)
Presentation / Conference Contribution
Bagley, R., Ferguson, R. I., & Leimich, P. (2012, September). On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space. Paper presented at CFET (Cyberforensics in Education and Training )

A technique and supporting tool for the recovery of browsing activity (both currently stored and deleted) from the Firefox web-browser is presented. The approach is based upon applying file-carving techniques (matching regular expressions against raw... Read More about On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space.