Skip to main content

Research Repository

Advanced Search

All Outputs (11615)

The intersection of datafication and data justice in higher education (2025)
Presentation / Conference Contribution
Fabian, K. (2025, October). The intersection of datafication and data justice in higher education. Presented at Connecting Space, Data and Society: Interdisciplinary Pathways, London

There has been an increasing uptake of technology in the classroom, either for teaching or for classroom management purposes. Along with this uptake is the increasing datafication of education. Datafication is the process of rendering social and natu... Read More about The intersection of datafication and data justice in higher education.

Bridging the Skills Gap through Postgraduate Study: Identifying the Barriers with the Admissions Process for Postgraduate TEM Applicants at a Modern University in Scotland (2025)
Presentation / Conference Contribution
Tungli, T., Meharg, D., & Sobolewska, E. (2025, September). Bridging the Skills Gap through Postgraduate Study: Identifying the Barriers with the Admissions Process for Postgraduate TEM Applicants at a Modern University in Scotland. Paper presented at BERA Conference 2025, University of Sussex, UK

This work-in-progress research paper explores barriers encountered during the admissions to studying Technology, Engineering, and Maths (TEM) in Scottish higher education and expands the limited body of knowledge regarding postgraduate admissions by... Read More about Bridging the Skills Gap through Postgraduate Study: Identifying the Barriers with the Admissions Process for Postgraduate TEM Applicants at a Modern University in Scotland.

Millimeter-Wave MIMO Array with Low Interactions Between its Antenna Elements for Fifth Generation Wireless Communication Networks (2025)
Journal Article
Alibakhshikenari, M., Mousa Ali, E., ud din, I., Virdee, B. S., Ullah, S., Khan, S., Hwang See, C., Saber, T., & Limiti, E. (2025). Millimeter-Wave MIMO Array with Low Interactions Between its Antenna Elements for Fifth Generation Wireless Communication Networks. Journal of Infrared, Millimeter and Terahertz Waves, 46(7), Article 46. https://doi.org/10.1007/s10762-025-01062-8

This paper presents a novel, compact eight-port circular MIMO antenna system designed for millimeter-wave (mmWave) 5G communication, offering a wide impedance bandwidth and high isolation. The proposed antenna array operates over a broad measured fre... Read More about Millimeter-Wave MIMO Array with Low Interactions Between its Antenna Elements for Fifth Generation Wireless Communication Networks.

Shadow-Analyzer: An Efficient Neural Networks-based Ghost Objects Detection for Autonomous Vehicles (2025)
Journal Article
Almaini, A., Folz, . J., Koßmann, T., Böder, R., Al-Dubai, A., Sadik, M., Schramm, M., Heigl, M., Romdhani, I., & Kerrouche, A. (online). Shadow-Analyzer: An Efficient Neural Networks-based Ghost Objects Detection for Autonomous Vehicles. IEEE Transactions on Intelligent Transportation Systems, https://doi.org/10.1109/TITS.2025.3587720

Several studies have been conducted to investigate the security and reliability of object detection systems in Autonomous Vehicles (AVs), which rely on sensors such as cameras and Light Detection and Ranging (LiDAR). These studies demonstrate the low... Read More about Shadow-Analyzer: An Efficient Neural Networks-based Ghost Objects Detection for Autonomous Vehicles.

Virtual Error-Based Data-Driven P-Type Adaptive Predictive Control and Its Applications (2025)
Journal Article
Li, G., Zhou, P., Zhou, Y., & Chai, T. (online). Virtual Error-Based Data-Driven P-Type Adaptive Predictive Control and Its Applications. IEEE Transactions on Automation Science and Engineering, https://doi.org/10.1109/TASE.2025.3590028

In this paper, a P-type adaptive predictive control (PAPC) method is presented for a category of unknown multi-input multi-output (MIMO) discrete-time systems with nonaffine nonlinear dynamics. First, the unknown nonlinear model is altered to a linea... Read More about Virtual Error-Based Data-Driven P-Type Adaptive Predictive Control and Its Applications.

Evaluation of the Mechanical and Physical Behaviors of Flax Fiber‐Reinforced Polybutylene Succinate Biodegradable Composites in Packaging Applications (2025)
Journal Article
Özalp, S., Sismanoglu, S., Tayfun, Ü., Popescu, C., Kairliyeva, F. B., & Kanbur, Y. (2025). Evaluation of the Mechanical and Physical Behaviors of Flax Fiber‐Reinforced Polybutylene Succinate Biodegradable Composites in Packaging Applications. SPE Polymers, 6(3), Article e70017. https://doi.org/10.1002/pls2.70017

Applying surface modification routes to natural fibers is a practical option for solving the incompatibility problem in polymeric composites. This study aimed to improve the properties of biodegradable and environmentally friendly polybutylene succin... Read More about Evaluation of the Mechanical and Physical Behaviors of Flax Fiber‐Reinforced Polybutylene Succinate Biodegradable Composites in Packaging Applications.

Joint factor and latent class ordered probit analysis of intent to use unstaffed automated buses (2025)
Journal Article
Downey, L., Rahim, A., Fonzone, A., & Fountas, G. (2025). Joint factor and latent class ordered probit analysis of intent to use unstaffed automated buses. npj Sustainable Mobility and Transport, 2, Article 31. https://doi.org/10.1038/s44333-025-00047-3

By adopting a more environmentally friendly driving style and promoting sustainable transportation options, automated buses (ABs) could play a role in achieving long-term sustainability goals. This study explores the factors influencing the willingne... Read More about Joint factor and latent class ordered probit analysis of intent to use unstaffed automated buses.

Smart sensing and anomaly detection for microalgae culture based on LoRaWAN sensors and LSTM autoencoder (2025)
Journal Article
Soon, C. F., Jamia’an, M., Mohamed Sunar, N., Arifin, S. N. H., Tay, K. G., Heng, C., See, C. H., Mat Nayan, N. H., & Tee, K. S. (2025). Smart sensing and anomaly detection for microalgae culture based on LoRaWAN sensors and LSTM autoencoder. Aquaculture International, 33(6), Article 438. https://doi.org/10.1007/s10499-025-02104-7

The increasing demand for sustainable aquaculture solutions has accelerated interest in microalgae as an alternative fish feed source. This study presents a novel integration of Long-Range Wide Area Network (LoRaWAN) sensors and a Long Short-Term Mem... Read More about Smart sensing and anomaly detection for microalgae culture based on LoRaWAN sensors and LSTM autoencoder.

Systematic Review Historical Building Energy Retrofit Focusing on the Whole Life Cycle Assessment-A Systematic Literature Review (2025)
Journal Article
Obead, R., Khaddour, L., & D'Amico, B. (2025). Systematic Review Historical Building Energy Retrofit Focusing on the Whole Life Cycle Assessment-A Systematic Literature Review. Architecture, 5(3), Article 49. https://doi.org/10.3390/architecture5030049

Climate change is becoming one of humanity's major concerns. Remarkable steps are being implemented to reduce global emissions in all economic sectors, including the built environment. Historical buildings use a considerable amount of energy and prod... Read More about Systematic Review Historical Building Energy Retrofit Focusing on the Whole Life Cycle Assessment-A Systematic Literature Review.

Improving Novelty Search with a Surrogate Model and Accuracy Objectives to Build High-Performing Ensembles of Classifiers (2025)
Journal Article
Cardoso, R. P., Hart, E., & Pitt, J. V. (2025). Improving Novelty Search with a Surrogate Model and Accuracy Objectives to Build High-Performing Ensembles of Classifiers. SN Computer Science, 6(6), Article 631. https://doi.org/10.1007/s42979-025-04056-4

Neuroevolution combined with Novelty Search to promote behavioural diversity is capable of constructing high-performing ensembles for classification. However, using gradient descent to train evolved architectures during the search can be computationa... Read More about Improving Novelty Search with a Surrogate Model and Accuracy Objectives to Build High-Performing Ensembles of Classifiers.

Generative Adversarial Networks-enabled Anomaly Detection Systems: A Survey (2025)
Journal Article
Saeed, U., Jan, S. U., Ahmad, J., Shah, S. A., Alshehri, M. S., Ghadi, Y. Y., Pitropakis, N., & Buchanan, W. J. (online). Generative Adversarial Networks-enabled Anomaly Detection Systems: A Survey. Expert Systems with Applications, 296(B), Article 128978. https://doi.org/10.1016/j.eswa.2025.128978

Anomaly Detection (AD) is an important area of research because it helps identify outliers in data, enabling early detection of errors, fraud, and potential security breaches. Machine Learning (ML) can be utilized for distinct AD systems, and Generat... Read More about Generative Adversarial Networks-enabled Anomaly Detection Systems: A Survey.

Nitrate Pollution Mapping for Reservoirs Using Flexible Sensors Integrated with Underwater Robot (2025)
Journal Article
Markapudi, P. R., Beg, M., Kadara, R. O., Paul, F., Kerrouche, A., See, C. H., & Manjakkal, L. (online). Nitrate Pollution Mapping for Reservoirs Using Flexible Sensors Integrated with Underwater Robot. IEEE Internet of Things Journal, https://doi.org/10.1109/JIOT.2025.3588067

Water pollution monitoring is crucial for environmental protection, playing a key role in safeguarding ecosystems, protecting public health and promoting sustainable development. However, traditional methods face challenges related to accessibility,... Read More about Nitrate Pollution Mapping for Reservoirs Using Flexible Sensors Integrated with Underwater Robot.

Kerb heights - Phase 4 (2025)
Report
Langdon, P., & Olowosegun, A. (2025). Kerb heights - Phase 4. Transport Scotland

The Inclusive Kerbs Phase 4 research project gathered data using a representative example of standard kerbs within a controlled laboratory environment to understand how people with various impairments interacted with them. The study was conducted by... Read More about Kerb heights - Phase 4.

Inclusive Kerbs Study Phase 3 (2025)
Report
Langdon, P., & Olowosegun, A. (2025). Inclusive Kerbs Study Phase 3. Transport Scotland

The Inclusive Kerbs Phase 3 research project gathered data from a representative example of kerbs within The City of Edinburgh to understand what kerbs are present in the city and how people with various impairments use them. The study was conducted... Read More about Inclusive Kerbs Study Phase 3.

Privacy-aware White and Black List Searching for Fraud Analysis (2025)
Presentation / Conference Contribution
Buchanan, W. J., Gilchrist, J., Jaroucheh, Z., Timosenko, D., Ramchandani, N., & Ali, H. (2025, September). Privacy-aware White and Black List Searching for Fraud Analysis. Presented at 14th International Conference on Cryptography and Information Security, Copenhagen, Denmark

In many areas of cybersecurity, we require access to Personally Identifiable Information (PII), such as names, postal addresses and email addresses. Unfortunately, this can lead to data breaches, especially in relation to data compliance regulations... Read More about Privacy-aware White and Black List Searching for Fraud Analysis.

Understanding work and study demands of degree apprentices using Conservation of Resources Theory (2025)
Journal Article
Smith, S., Taylor-Smith, E., Bratton, A., & Dutton, M. (2025). Understanding work and study demands of degree apprentices using Conservation of Resources Theory. Empirical Research in Vocational Education and Training, 17(1), Article 14. https://doi.org/10.1186/s40461-025-00189-1

Degree apprenticeships are a recent innovation in the UK. The overarching goal of the apprenticeship is to achieve a degree, while working and advancing careers. This involves apprentices and employing organisations investing in resources including w... Read More about Understanding work and study demands of degree apprentices using Conservation of Resources Theory.

Anamorphic Cryptography using Baby-Step Giant-Step Recovery (2025)
Presentation / Conference Contribution
Buchanan, W. J., & Gilchrist, J. (2025, September). Anamorphic Cryptography using Baby-Step Giant-Step Recovery. Presented at 14th International Conference on Cryptography and Information Security, Copenhagen, Denmark

In 2022, Persianom, Phan and Yung outlined the creation of Anamor-phic Cryptography. With this, we can create a public key to encrypt data, and then have two secret keys. These secret keys are used to decrypt the cipher into different messages. So, o... Read More about Anamorphic Cryptography using Baby-Step Giant-Step Recovery.

Circulating structural timber and engineered wood products – challenges and potentials towards reliable evaluation of mechanical properties (2025)
Journal Article
Ranttila, H., Fink, G., Brandner, R., & Ridley-Ellis, D. (online). Circulating structural timber and engineered wood products – challenges and potentials towards reliable evaluation of mechanical properties. Wood Material Science and Engineering, https://doi.org/10.1080/17480272.2025.2517186

Circulating structural timber and engineered wood products require reliable assessment of key mechanical properties. However, existing standards for strength grading sawn timber are not designed for the reuse and recycling of timber and are unsuitabl... Read More about Circulating structural timber and engineered wood products – challenges and potentials towards reliable evaluation of mechanical properties.

PIM Backup Designated Router Procedure draft-ietf-pim-bdr-03 (2025)
Other
Mishra, M., Budhiraja, A., Neema, J., Romdhani, I., & Mishra, G. (2025). PIM Backup Designated Router Procedure draft-ietf-pim-bdr-03

On a multi-access network, one of the PIM routers is elected as a Designated Router (DR). On the last hop LAN, the PIM DR is responsible for tracking local multicast listeners and forwarding traffic to these listeners if the group is operating in PIM... Read More about PIM Backup Designated Router Procedure draft-ietf-pim-bdr-03.

Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices (2025)
Journal Article
Patterson, J. C., Buchanan, W. J., & Turino, C. (2025). Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices. Journal of Cybersecurity and Privacy, 5(3), Article 42. https://doi.org/10.3390/jcp5030042

The emergence of quantum computing and Shor's algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques. The NIST has responded by standardising Post-Quantum Cryptography (PQC) algorith... Read More about Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices.