Skip to main content

Research Repository

Advanced Search

All Outputs (242)

Youth digital culture co-creation: measuring social impact in Scotland (2019)
Thesis
Pawluczuk, A. Youth digital culture co-creation: measuring social impact in Scotland. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2404195

This thesis examines youth workers’ and young people’s perceptions of social impact and social impact evaluation of youth digital culture co-creation in Scotland. The analysis is made in relation to academic domains including (but not limited) to Hum... Read More about Youth digital culture co-creation: measuring social impact in Scotland.

Investigations into Decrypting Live Secure Traffic in Virtual Environments (2019)
Thesis
McLaren, P. W. L. Investigations into Decrypting Live Secure Traffic in Virtual Environments. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2386517

Malicious agents increasingly use encrypted tunnels to communicate with external servers. Communications may contain ransomware keys, stolen banking details, or other confidential information. Rapid discovery of communicated contents through decrypti... Read More about Investigations into Decrypting Live Secure Traffic in Virtual Environments.

Real-time 3D Graphic Augmentation of Therapeutic Music Sessions for People on the Autism Spectrum (2019)
Thesis
McGowan, J. J. Real-time 3D Graphic Augmentation of Therapeutic Music Sessions for People on the Autism Spectrum. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2386291

This thesis looks at the requirements analysis, design, development and evaluation of an application, CymaSense, as a means of improving the communicative behaviours of autistic participants through therapeutic music sessions, via the addition of a v... Read More about Real-time 3D Graphic Augmentation of Therapeutic Music Sessions for People on the Autism Spectrum.

Utilising Reduced File Representations to Facilitate Fast Contraband Detection (2019)
Thesis
McKeown, S. Utilising Reduced File Representations to Facilitate Fast Contraband Detection. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2386199

Digital forensics practitioners can be tasked with analysing digital data, in all its forms, for legal proceedings. In law enforcement, this largely involves searching for contraband media, such as illegal images and videos, on a wide array of electr... Read More about Utilising Reduced File Representations to Facilitate Fast Contraband Detection.

The evaluation of data filtering criteria in wind turbine power performance assessment (2019)
Thesis
Davison, B. The evaluation of data filtering criteria in wind turbine power performance assessment. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2376943

The post-installation verification of wind turbine performance is an essential part of a wind energy project. Data collected from meteorological instruments and from the turbine is analysed to produce an estimate of the annual energy production (AEP)... Read More about The evaluation of data filtering criteria in wind turbine power performance assessment.

Using the Technology Acceptance Model to Measure the Effects of Usability Attributes and Demographic Characteristics on Student Use of Learning Management Systems in Saudi Higher Education (2019)
Thesis
Binyamin, S. S. Using the Technology Acceptance Model to Measure the Effects of Usability Attributes and Demographic Characteristics on Student Use of Learning Management Systems in Saudi Higher Education. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2376896

Learning management systems (LMS), which allow education at the student’s choice of place and time, have been widely adopted in higher education worldwide. In the case of Saudi Arabia, LMS have been recently introduced in Saudi universities at the re... Read More about Using the Technology Acceptance Model to Measure the Effects of Usability Attributes and Demographic Characteristics on Student Use of Learning Management Systems in Saudi Higher Education.

The Meeting Journey: Supporting the Design of Interaction Within Co-located, Collaborative Device Ecologies (2019)
Thesis
Ammeloot, A. The Meeting Journey: Supporting the Design of Interaction Within Co-located, Collaborative Device Ecologies. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2376807

The combination of personal and Bring Your Own Device (BYOD) technologies with augmented "smart" spaces designed for collaborative work offers new design challenges for the HCI community. This thesis looks at how BYOD technologies can integrate with... Read More about The Meeting Journey: Supporting the Design of Interaction Within Co-located, Collaborative Device Ecologies.

Visualisation Support for Biological Bayesian Network Inference (2019)
Thesis
Vogogias, T. Visualisation Support for Biological Bayesian Network Inference. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2158180

Extracting valuable information from the visualisation of biological data and turning it into a network model is the main challenge addressed in this thesis. Biological networks are mathematical models that describe biological entities as nodes and t... Read More about Visualisation Support for Biological Bayesian Network Inference.

A Taxonomy and Survey of Attacks Against Machine Learning (2019)
Journal Article
Pitropakis, N., Panaousis, E., Giannetsos, T., Anastasiadis, E., & Loukas, G. (2019). A Taxonomy and Survey of Attacks Against Machine Learning. Computer Science Review, 34, https://doi.org/10.1016/j.cosrev.2019.100199

The majority of machine learning methodologies operate with the assumption that their environment is benign. However, this assumption does not always hold, as it is often advantageous to adversaries to maliciously modify the training (poisoning attac... Read More about A Taxonomy and Survey of Attacks Against Machine Learning.

JUNGLE: An Interactive Visual Platform for Collaborative Creation and Consumption of Nonlinear Transmedia Stories (2019)
Presentation / Conference Contribution
Kapadia, M., Muniz, C. M., Sohn, S. S., Pan, Y., Schriber, S., Mitchell, K., & Gross, M. (2019, November). JUNGLE: An Interactive Visual Platform for Collaborative Creation and Consumption of Nonlinear Transmedia Stories. Presented at International Conference on Interactive Digital Storytelling (ICIDS 2019), Salt Lake City, Utah, USA

JUNGLE is an interactive, visual platform for the collaborative manipulation and consumption of nonlinear transmedia stories. Intuitive visual interfaces encourage JUNGLE users to explore vast libraries of story worlds, expand existing stories, or co... Read More about JUNGLE: An Interactive Visual Platform for Collaborative Creation and Consumption of Nonlinear Transmedia Stories.

Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method (2019)
Presentation / Conference Contribution
Ou, W., Deng, M., Luo, E., Shi, W., Tan, Z., & Bhuiyan, M. (2019, July). Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method. Presented at The 2019 IEEE International Conference on Cyber Physical and Social Computing (CPSCom-2019), Atlanta, USA

Proof of Work (PoW) is used to provide a consensus mechanism for Bitcoin. In this mechanism, the process of generating a new block in the blockchain is referred to as mining. Such process is intentionally designed to be resource-intensive and time co... Read More about Multi-miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method.

Wattom: Ambient Eco-feedback with Mid-air Input (2019)
Presentation / Conference Contribution
Esteves, A., Quintal, F., Caires, F., Baptista, V., & Mendes, P. (2019). Wattom: Ambient Eco-feedback with Mid-air Input. In 2019 5th Experiment International Conference (exp.at'19). https://doi.org/10.1109/EXPAT.2019.8876565

This paper presents Wattom, a highly interactive ambient eco-feedback smart plug that aims to promote a more sustainable use of electricity in the home. This paper describes our latest implementation of the Wattom plug, and three system applications.... Read More about Wattom: Ambient Eco-feedback with Mid-air Input.

PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme (2019)
Journal Article
Khan, R., Zakarya, M., Tan, Z., Usman, M., Jan, M. A., & Khan, M. (2019). PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme. International Journal of Communication Systems, 32(18), Article e4144. https://doi.org/10.1002/dac.4144

Heterogeneous wireless sensor networks (WSNs) consist of resource-starving nodes that face a challenging task of handling various issues such as data redundancy, data fusion, congestion control, and energy efficiency. In these networks, data fusion a... Read More about PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme.

Unsupervised Rotation Factorization in Restricted Boltzmann Machines (2019)
Journal Article
Giuffrida, M. V., & Tsaftaris, S. A. (2020). Unsupervised Rotation Factorization in Restricted Boltzmann Machines. IEEE Transactions on Image Processing, 29(1), 2166-2175. https://doi.org/10.1109/TIP.2019.2946455

Finding suitable image representations for the task at hand is critical in computer vision. Different approaches extending the original Restricted Boltzmann Machine (RBM) model have recently been proposed to offer rotation-invariant feature learning.... Read More about Unsupervised Rotation Factorization in Restricted Boltzmann Machines.

Control-Flow Integrity: Attacks and Protections (2019)
Journal Article
Sayeed, S., Marco-Gisbert, H., Ripoll, I., & Birch, M. (2019). Control-Flow Integrity: Attacks and Protections. Applied Sciences, 9(20), Article 4229. https://doi.org/10.3390/app9204229

Despite the intense efforts to prevent programmers from writing code with memory errors, memory corruption vulnerabilities are still a major security threat. Consequently, control-flow integrity has received significant attention in the research comm... Read More about Control-Flow Integrity: Attacks and Protections.

Depth codec for real-time, high-quality light field reconstruction (2019)
Patent
Mitchell, K., Koniaris, C., Kosek, M., & Sinclair, D. Depth codec for real-time, high-quality light field reconstruction. US20190313080A1

Systems, methods, and articles of manufacture are disclosed that enable the compression of depth data and real-time reconstruction of high-quality light fields. In one aspect, spatial compression and decompression of depth images is divided into the... Read More about Depth codec for real-time, high-quality light field reconstruction.

A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks (2019)
Journal Article
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019). A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, Article 4321. https://doi.org/10.3390/s19194321

The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks play an important role in the designing of IoT-enabled platforms due to thei... Read More about A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks.

A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles (2019)
Journal Article
Yao, W., Yahya, A., Khan, F., Tan, Z., Rehman, A. U., Chuma, J. M., Jan, M. A., & Babar, M. (2019). A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles. IEEE Access, 7, 160889-160900. https://doi.org/10.1109/ACCESS.2019.2945610

The advancements in hardware technologies have driven the evolution of vehicular ad hoc networks into the Internet of Vehicles (IoV). The IoV is a decentralized network of IoT-enabled vehicles capable of smooth traffic flow to perform fleet managemen... Read More about A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles.

A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking (2019)
Presentation / Conference Contribution
Zhao, L., Liu, Y., Al-Dubai, A., Tan, Z., Min, G., & Xu, L. (2019). A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking. . https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00082

With the rapid development of mobile applications, networking technologies have been constantly evolved to offer a more convenient way of sharing information and online-communication anytime and anywhere. Vehicular networks have the potential to beco... Read More about A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking.

A 3D Smooth Random Walk Mobility Model for FANETs (2019)
Presentation / Conference Contribution
Lin, N., Gao, F., Zhao, L., Al-Dubai, A., & Tan, Z. (2019, August). A 3D Smooth Random Walk Mobility Model for FANETs. Presented at The 21 IEEE High Performance Computing and Communications (HPCC), Zhangjiajie, Hunan, China

The number of Unmanned Aerial Vehicles (UAVs) applications has increased over the past few years. Among all scenarios, UAV group consisting multi-UAVs is normally used to provide extensible communications. As a networking solution, Flying Ad Hoc Netw... Read More about A 3D Smooth Random Walk Mobility Model for FANETs.