Skip to main content

Research Repository

Advanced Search

All Outputs (4205)

Green Building: An antidote to sick buliding syndrome menace in Africa (2023)
Presentation / Conference Contribution
Liphadzi, M., Osunsanmi, T., Aigbavboa, C. O., Thwala, W., Phuti, T., & Aliu, J. (2023). Green Building: An antidote to sick buliding syndrome menace in Africa. In Proceedings of the Creative Construction Conference 2023 (632-644). https://doi.org/10.331

Sick building syndrome (SBS) is the leading cause of the reduction in the building's occupancy level of satisfaction, poor indoor air quality, and other shenanigans responsible for the underperformance of building occupants and loss in property value... Read More about Green Building: An antidote to sick buliding syndrome menace in Africa.

Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges (2023)
Journal Article
Liu, Q., Yang, Z., Ji, R., Zhang, Y., Bilal, M., Liu, X., Vimal, S., & Xu, X. (2023). Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges. IEEE Systems, Man, and Cybernetics Magazine, 9(4), 4-12. https://doi.o

Radars are widely used to obtain echo information for effective prediction, such as precipitation nowcasting. In this article, recent relevant scientific investigation and practical efforts using deep learning (DL) models for weather radar data analy... Read More about Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges.

Practices and educational affordances of sound in the postcolonial Hong Kong protests (2023)
Journal Article
Cheng, L., & McGregor, I. (in press). Practices and educational affordances of sound in the postcolonial Hong Kong protests. Contemporary Music Review, https://doi.org/10.1080/07494467.2023.2241236

Sound has been theorised for its functional role as informative agent in political advocacy and participation in political studies, yet the investigation on the pedagogical potential has been largely absent. This paper examines the pedagogical impact... Read More about Practices and educational affordances of sound in the postcolonial Hong Kong protests.

An exploration of diversity in Embodied Music Interaction (2023)
Presentation / Conference Contribution
Di Donato, B. (2023, May). An exploration of diversity in Embodied Music Interaction. Presented at CHIME: Music Interaction and Physical Disability, University of Edinburgh, Edinburgh

This is an exploration of diversity in Embodied Music Interaction through three case studies entitled (i) Accessible interactive digital signage for the visually impaired, (ii) Human-Sound Interaction and (iii) BSL in Embodied Music Interaction (EMI)... Read More about An exploration of diversity in Embodied Music Interaction.

Machine Learning and the Optimal Choice of Asset Pricing Model (2023)
Book Chapter
Bielinski, A., & Broby, D. (2023). Machine Learning and the Optimal Choice of Asset Pricing Model. In S. Hasan Jafar, H. K, H. El-Chaarani, S. Moturi, & N. Gupta (Eds.), Artificial Intelligence for Capital Markets (91-127). Taylor & Francis. https://doi.o

This chapter evaluates the traditional methods for price prediction and examines what we believe are the most promising machine learning techniques for that task. Asset price forecasting is one of the fundamental problems in the financial field. Trad... Read More about Machine Learning and the Optimal Choice of Asset Pricing Model.

Blockchain for Cybersecurity in Cyber-Physical Systems (2023)
Book
Maleh, Y., Alazab, M., & Romdhani, I. (Eds.). (2023). Blockchain for Cybersecurity in Cyber-Physical Systems. Cham: Springer. https://doi.org/10.1007/978-3-031-25506-9

This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems. It presents crucial issues in this field and provides a sample of recent advances and insights into the research pr... Read More about Blockchain for Cybersecurity in Cyber-Physical Systems.

Social Media by Proxy: how older adults work within their ‘social networks’ to engage with social media (2023)
Journal Article
Webster, G., & Ryan, F. (2023). Social Media by Proxy: how older adults work within their ‘social networks’ to engage with social media. Information Research, 28(1), 50-77

Introduction. Social media use is at an all-time high, and the adoption of online tools by older adults is increasing. This paper reports an exploratory qualitative study investigating the ways in which older adults are supported by social media prox... Read More about Social Media by Proxy: how older adults work within their ‘social networks’ to engage with social media.

A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs (2023)
Presentation / Conference Contribution
McLaren, R. A., Babaagba, K., & Tan, Z. (2023). A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. In Machine Learning, Optimization, and Data Science: 8th International Conference, LOD 2022, Certosa di Po

As the field of malware detection continues to grow, a shift in focus is occurring from feature vectors and other common, but easily obfuscated elements to a semantics based approach. This is due to the emergence of more complex malware families that... Read More about A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs.

Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain (2023)
Presentation / Conference Contribution
Moradpoor, N., Barati, M., Robles-Durazno, A., Abah, E., & McWhinnie, J. (2023). Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain. In Proceedings of the International Conference on Cybersecurity, Situational Awaren

The protection of critical national infrastructures such as drinking water, gas, and electricity is extremely important as nations are dependent on their operation and steadiness. However, despite the value of such utilities their security issues hav... Read More about Neutralising Adversarial Machine Learning in Industrial Control Systems Using Blockchain.

Practical Cyber Threat Intelligence in the UK Energy Sector (2023)
Presentation / Conference Contribution
Paice, A., & McKeown, S. (2023). Practical Cyber Threat Intelligence in the UK Energy Sector. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media (3-23). https://doi.org/10.1007/978-981-19-6414-5_1

The UK energy sector is a prime target for cyber-attacks by foreign states, criminals, ‘hacktivist’ groups, and terrorists. As Critical National Infrastructure (CNI), the industry needs to understand the threats it faces to mitigate risks and make ef... Read More about Practical Cyber Threat Intelligence in the UK Energy Sector.

Participatory polyvocal performative and playful interpreting Resnik's 4 for creative placemaking with digital tools (2023)
Book Chapter
Grandison, T., Flint, T., & Jamieson, K. (2023). Participatory polyvocal performative and playful interpreting Resnik's 4 for creative placemaking with digital tools. In D. Giglitto, L. Ciolfi, E. Lockley, & E. Kaldeli (Eds.), Digital Approaches to Inclus

This chapter discusses inclusive playful encounters made possible through a Digi-Mapping project that ran in partnership with local arts organisation WHALE Arts and participants aged between 8 and 11 from three local primary schools. As part of a bot... Read More about Participatory polyvocal performative and playful interpreting Resnik's 4 for creative placemaking with digital tools.

Low-Loss and Dual-Band Filter Inspired by Glide Symmetry Principle Over Millimeter-Wave Spectrum for 5G Cellular Networks (2023)
Journal Article
Karamirad, M., Pouyanfar, N., Alibakhshikenari, M., Ghobadi, C., Nourinia, J., See, C. H., & Falcone, F. (2023). Low-Loss and Dual-Band Filter Inspired by Glide Symmetry Principle Over Millimeter-Wave Spectrum for 5G Cellular Networks. iScience, 26(1), Ar

This paper focuses on designing a dual-band, bandpass filter configuration inspired by glide-symmetric structures in a single plane. Geometry configuration of elliptical slots on both sides of single substrate generally affects electromagnetic fields... Read More about Low-Loss and Dual-Band Filter Inspired by Glide Symmetry Principle Over Millimeter-Wave Spectrum for 5G Cellular Networks.

Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches (2023)
Journal Article
Alissa, M., Sim, K., & Hart, E. (2023). Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches. Journal of Heuristics, 29(1), 1-38. https://doi.org/10.1007/s10732-022-09505-4

We propose a novel technique for algorithm-selection, applicable to optimisation domains in which there is implicit sequential information encapsulated in the data, e.g., in online bin-packing. Specifically we train two types of recurrent neural netw... Read More about Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches.

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (2022)
Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers

In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromise... Read More about Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence.

Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World (2022)
Book
Urquhart, N. (2022). Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World. Cham: Springer. https://doi.org/10.1007/978-3-030-98108-2

This book explains classic routing and transportation problems and solutions, before offering insights based on successful real-world solutions. The chapters in Part I introduce and explain the traveling salesperson problem (TSP), vehicle routing pro... Read More about Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World.

Selected poems: Lorna Lloyd (2022)
Book
Ryan, B., & Hall, H. (Eds.). (2022). Selected poems: Lorna Lloyd. Edinburgh: Edinburgh Napier University

This volume comprises 37 poems by Lorna Lloyd (1914-1942) arranged by date of composition: 1928-1930 (11); early 1930s (11); mid to late 1930s (10); early 1940s (5). It was produced as an output of the AHRC Creative Informatics 'Platform to platform'... Read More about Selected poems: Lorna Lloyd.

Developing a Digital ForensicsTerminology Using Natural Language Processing (2022)
Presentation / Conference Contribution
Le Gall, M., Cole, C., Haynes, D., & Nic Daeid, N. (2022). Developing a Digital ForensicsTerminology Using Natural Language Processing. In M. Lykke, T. Svarre, D. Haynes, M. Skov, M. Thellesfsen, & D. Martinez-Avila (Eds.), Knowledge Organization across D

Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets (2022)
Presentation / Conference Contribution
Alharigy, L. M., Al-Nuaim, H. A., & Moradpoor, N. (2022). Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets. In 2022 14th International Conference on Computational Intelligence and Communica

Cyberbullying is a widespread problem that has only increased in recent years due to the massive dependence on social media. Although, there are many approaches for detecting cyberbullying they still need to be improved upon for more accurate detecti... Read More about Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets.

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device (2022)
Presentation / Conference Contribution
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022). Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICI

Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discret... Read More about Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device.

High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network (2022)
Presentation / Conference Contribution
Zhang, Z., Li, Y., Liu, Q., & Liu, X. (2022). High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network. In 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, I

A basic stage of hydrological research is to automatically extract water body information from high-resolution remote sensing images. Various methods based on deep learning convolutional neural networks have been proposed in recent studies to achieve... Read More about High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network.