Skip to main content

Research Repository

Advanced Search

All Outputs (568)

A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks (2015)
Journal Article
Moradpoor Sheykhkanloo, N. (2015). A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(6), 1443-1453

Thousands of organisations store important and confidential information related to them, their customers, and their business partners in databases all across the world. The stored data ranges from less sensitive (e.g. first name, last name, date of b... Read More about A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks.

A critical analysis of e-government evaluation models at national and local municipal levels (2015)
Journal Article
Zahran, D. I., Al-Nuaim, H. A., Rutter, M. J., & Benyon, D. (2015). A critical analysis of e-government evaluation models at national and local municipal levels. Electronic Journal of e-Government, 13, 28-42

The importance of e-government models lies in their offering a basis to measure and guide e-government. There is still no agreement on how to assess a government online. Most of the e-government models are not based on research, nor are they validate... Read More about A critical analysis of e-government evaluation models at national and local municipal levels.

Managing cloud-generated logs using big data technologies (2015)
Presentation / Conference Contribution
Lemoudden, M., & El Ouahidi, B. (2015). Managing cloud-generated logs using big data technologies. In 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM). https://doi.org/10.1109/wincom.2015.7381334

Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and complex computing. As cloud technology adoption continues to progress, mass... Read More about Managing cloud-generated logs using big data technologies.

Wooden construction - Innovation and creativity (2015)
Presentation / Conference Contribution
Kermani, A. (2015, October). Wooden construction - Innovation and creativity. Presented at 8th International Conference DECO

Wooden construction - innovation and creativity.

Making co-op work: An exploration of student attitudes to co-op programs (2015)
Presentation / Conference Contribution
Smith, S., Berg, T., & Smith, C. (2015). Making co-op work: An exploration of student attitudes to co-op programs. In Frontiers in Education Conference (FIE), 2015. 32614 2015. IEEE (1-6). https://doi.org/10.1109/fie.2015.7344173

Engineering and computing at university both have a long tradition of co-operative education which plays a vital role in developing students' applied skills and giving confidence to both students and potential employers. Co-op education refers to rel... Read More about Making co-op work: An exploration of student attitudes to co-op programs.

Smart energy monitoring technology to reduce domestic electricity and gas consumption through behaviour change (2015)
Thesis
Stinson, J. W. Smart energy monitoring technology to reduce domestic electricity and gas consumption through behaviour change. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/9828

If the UK is to address its energy reduction targets, it is vital to understand energy use behaviours and to devise technology that positively encourages domestic occupants to use less energy. This study is cross-over research that spans energy resea... Read More about Smart energy monitoring technology to reduce domestic electricity and gas consumption through behaviour change.

Timber Grid-shell Structures: form-finding, analysis and optimisation (2015)
Thesis
D'Amico, B. Timber Grid-shell Structures: form-finding, analysis and optimisation. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/9833

This thesis aims to provide a set of tools for analysis and design of free-form timber grid-shells. It provides a brief introduction on the relationship between shape and structural behaviour of grid-shells, followed by an introduction to actively-be... Read More about Timber Grid-shell Structures: form-finding, analysis and optimisation.

Evaluation of TFTP DDoS amplification attack (2015)
Journal Article
Sieklik, B., Macfarlane, R., & Buchanan, W. J. (2016). Evaluation of TFTP DDoS amplification attack. Computers and Security, 57, 67-92. https://doi.org/10.1016/j.cose.2015.09.006

Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these s... Read More about Evaluation of TFTP DDoS amplification attack.

Maths and Mobile Technologies: Student Attitudes and Perceptions (2015)
Presentation / Conference Contribution
Fabian, K. (2015). Maths and Mobile Technologies: Student Attitudes and Perceptions. In Proceedings of the 14th European Conference on Elearning (696)

Approaches that advocate the contextualized teaching of mathematics have been around for years but the ubiquity of mobile devices together with the potential to bridge classroom learning to real-world has added a new angle to contextualizing mathemat... Read More about Maths and Mobile Technologies: Student Attitudes and Perceptions.

Vivaldi antenna with balun feed for SKA feeding system in UWB (2015)
Presentation / Conference Contribution
Ma, Y., Zhu, F., Abidin, Z., Pang, F., Li, S., Abd-Alhameed, R., …Peng, B. (2015). Vivaldi antenna with balun feed for SKA feeding system in UWB. . https://doi.org/10.1109/URSI-AT-RASC.2015.7303191

This paper represents a low cost printed Vivaldi antenna at 3-10 GHz bandwidth for Radio telescope Feed system. The idea of this design is to minimize the number of telescope receivers for Square Kilometre Array (SKA). A minimized tapered slot antenn... Read More about Vivaldi antenna with balun feed for SKA feeding system in UWB.

Surface wave cloaking using transformation optics (2015)
Presentation / Conference Contribution
La Spada, L., & Hao, Y. (2015). Surface wave cloaking using transformation optics. In 2015 1st URSI Atlantic Radio Science Conference (URSI AT-RASC). https://doi.org/10.1109/ursi-at-rasc.2015.7302892

Recently, there has been an increasing interest in the study of manipulating surface waves from microwave to optical frequencies [1, 2], especially for the design of conformal antennas and devices in communications and radar applications [3]. Some of... Read More about Surface wave cloaking using transformation optics.

Towards an augmented authenticator in the Cloud (2015)
Presentation / Conference Contribution
Pitropakis, N., Yfantopoulos, N., Geneiatakis, D., & Lambrinoudakis, C. (2014, December). Towards an augmented authenticator in the Cloud. Presented at 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Noida, India

Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy p... Read More about Towards an augmented authenticator in the Cloud.

Automatically Detecting Fallacies in System Safety Arguments (2015)
Presentation / Conference Contribution
Wells, S., Yuan, T., Manandhar, S., & Kelly, T. (2015, October). Automatically Detecting Fallacies in System Safety Arguments. Paper presented at 15th International Workshop on Computational Models of Natural Argument(CMNA15), Bertinoro, Italy

Safety cases play a significant role in the development of safety-critical systems. The key components in a safety case are safety arguments, that are designated to demonstrate that the system is acceptably safe. Inappropriate reasoning with safety a... Read More about Automatically Detecting Fallacies in System Safety Arguments.

Introducing ALIAS (2015)
Presentation / Conference Contribution
Wells, S., & LaGreca, R. (2015, October). Introducing ALIAS. Paper presented at 15th International Workshop on Computation Models of Natural Argument

ALIAS is a Python library for constructing, manipulating, storing, visualising, and converting argumentation structues. It is available with full source code under a copyleft license and aims to become a Swiss Army Knife for working with arguments in... Read More about Introducing ALIAS.

Inspired counter based broadcasting in dynamic source routing protocol. (2015)
Presentation / Conference Contribution
Yassein, M. B., & Al-Dubai, A. (2015, October). Inspired counter based broadcasting in dynamic source routing protocol. Paper presented at 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2015)

The broadcast storm problem is one of the most
challenging issues in Mobile ad Hoc Networks (MANETs).
However, it is still a challenging problem despite the great deal
of related works and existing solutions. Dynamic Source
Routing Protocol (DSR)... Read More about Inspired counter based broadcasting in dynamic source routing protocol..

The Influence of La Doping and Heterogeneity on the Thermoelectric Properties of Sr3Ti2O7 Ceramics (2015)
Journal Article
Lu, Z., Sinclair, D. C., & Reaney, I. M. (2016). The Influence of La Doping and Heterogeneity on the Thermoelectric Properties of Sr3Ti2O7 Ceramics. Journal of the American Ceramic Society, 99(2), 515-522. https://doi.org/10.1111/jace.13998

La-doping mechanisms and thermoelectric properties of Sr3Ti2O7 Ruddlesden–Popper (RP) ceramics sintered under air and flowing 5% H2 at 1773 K for 6 h have been investigated. Changes in lattice parameters and conductivity revealed a limited interstiti... Read More about The Influence of La Doping and Heterogeneity on the Thermoelectric Properties of Sr3Ti2O7 Ceramics.

An Investigation into GHG and non-GHG Impacts of Double Skin Façades in Office Refurbishments: Low-Carbon Refurbishment with Double Skin Façades (2015)
Journal Article
Piroozfar, P. A., Farr, E. R., & Pomponi, F. (2016). An Investigation into GHG and non-GHG Impacts of Double Skin Façades in Office Refurbishments: Low-Carbon Refurbishment with Double Skin Façades. Journal of Industrial Ecology, 20(2), 234-248. https://doi.org/10.1111/jiec.12368

The building sector is a major contributor to energy consumption, greenhouse gas (GHG) emissions, and depletion of natural resources. In developed countries, existing buildings represent the majority of the stock, their low-carbon refurbishment hence... Read More about An Investigation into GHG and non-GHG Impacts of Double Skin Façades in Office Refurbishments: Low-Carbon Refurbishment with Double Skin Façades.

A generalized resource allocation framework in support of multi-layer virtual network embedding based on SDN (2015)
Journal Article
Nguyen, H. T., Vu, A. V., Nguyen, D. L., Nguyen, V. H., Tran, M. N., Ngo, Q. T., Truong, T., Nguyen, T. H., & Magedanz, T. (2015). A generalized resource allocation framework in support of multi-layer virtual network embedding based on SDN. Computer Networks, 92(Part 2), 251-269. https://doi.org/10.1016/j.comnet.2015.09.042

Network Virtualization (NV) allows multiple heterogeneous architectures to simultaneously coexist in a shared infrastructure. Embedding multiple virtual networks (VNs) in a shared substrate deals with efficient mapping of virtual resources in the phy... Read More about A generalized resource allocation framework in support of multi-layer virtual network embedding based on SDN.

The limits of pretending (2015)
Journal Article
Turner, P., Hetherington, R., Turner, S., & Kosek, M. (2015). The limits of pretending. Digital Creativity, 26(3-4), 304-317. https://doi.org/10.1080/14626268.2015.1091778

We propose that pretending is a cognitive faculty which enables us to create and immerse ourselves in possible worlds. These worlds range from the veridical to the fantastic and are frequently realised as stories varying from the fictional to the sci... Read More about The limits of pretending.