Skip to main content

Research Repository

Advanced Search

eHealth and the internet of things (2013)
Presentation / Conference Contribution
Ball, L., Szymkowiak, A., Keates, S., Bradley, D., & Brownsell, S. (2013, February). eHealth and the internet of things. Presented at 3rd International Conference on Pervasive Embedded Computing and Communication Systems, Barcelona, Spain

To respond to an ageing population, eHealth strategies offer significant opportunities in achieving a balanced and sustainable healthcare infrastructure. Advances in technology both at the sensor and device levels and in respect of information techno... Read More about eHealth and the internet of things.

Computing the incomputable with human processing units (2013)
Presentation / Conference Contribution
Corney, J., Vasantha, G. A., Lynn, A., Jagadeesan, A., Acur, N., Smith, M., & Agarwal, A. (2013, March). Computing the incomputable with human processing units. Presented at International Conference on Intelligent Interactive Technologies and Multimedia IITM 2013, Allahabad, India

Initially commercial crowdsourcing services (such as Amazon’s Mechanical Turk) were focused largely on providing micro-labor services for tasks such as image labeling and text processing. However it is becoming increasingly apparent that these servic... Read More about Computing the incomputable with human processing units.

Creating a sense of place with a deliberately constrained virtual environment (2013)
Journal Article
Turner, P., Turner, S., & Burrows, L. (2013). Creating a sense of place with a deliberately constrained virtual environment. International Journal of Cognitive Performance Support, 1, 54-68. https://doi.org/10.1504/IJCPS.2013.053554

This study took as its starting point the premise that a high degree of realism is not a necessary condition for the creation of a ‘sense of place’ in mediated experiences such as those presented through virtual reality. A sense of place is the sense... Read More about Creating a sense of place with a deliberately constrained virtual environment.

Visual cleaning of genotype data. (2013)
Presentation / Conference Contribution
Kennedy, J., Graham, M., Paterson, T., & Law, A. (2013, October). Visual cleaning of genotype data. Presented at BioVis 2013

While some data cleaning tasks can be performed automatically, many more require expert human guidance to steer the cleaning process, especially if erroneous or unclean data is a product of relationships between entities. An example is pedigree genot... Read More about Visual cleaning of genotype data..

Pricing Intelligence as a Service for Cloud Computing (2013)
Presentation / Conference Contribution
Greenwell, R., Liu, X., & Chalmers, K. (2013, December). Pricing Intelligence as a Service for Cloud Computing. Presented at 2013 IEEE 5th International Conference on Cloud Computing Technology and Science

Pricing Intelligence as a service (PINaaS) can be seen as the brokerage of user requirements to pricing of available resources in a cloud computing environment. Users of both public and private clouds have to consider the price of services they consu... Read More about Pricing Intelligence as a Service for Cloud Computing.

Verifying the CPA Networking Stack using SPIN/Promela. (2013)
Presentation / Conference Contribution
Chalmers, K., & Kerridge, J. (2013, August). Verifying the CPA Networking Stack using SPIN/Promela. Presented at 35th WoTUG conference on concurrent and parallel programming

This paper presents a verification of the CPA Networking Stack, using the SPIN Model Checker. Our work shows that the system developed for general networking within CPA applications works under the conditions defined for it. The model itself focuses... Read More about Verifying the CPA Networking Stack using SPIN/Promela..

Blue sky thinking? (2013)
Journal Article
Hamoudi, J., & Cruickshank, P. (2013). Blue sky thinking?. The Journal of the Law Society of Scotland, 18-22

Review of the results of research into the factors that influence legal firms considering whether to adopt cloud-based IT solutions. The article can be read for free here: http://www.journalonline.co.uk/Magazine/58-11/1013300.aspx

A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks (2013)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013, September). A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks. Presented at 2013 5th Computer Science and Electronic Engineering Conference (CEEC), Colchester, UK

Optical and wireless integration scheme merges the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of the wireless counterparts for the Subscriber Stations (SSs). It is also financially viab... Read More about A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks.

Novel Two-Stage Audiovisual Speech Filtering in Noisy Environments (2013)
Journal Article
Abel, A., & Hussain, A. (2014). Novel Two-Stage Audiovisual Speech Filtering in Noisy Environments. Cognitive Computation, 6(2), 200-217. https://doi.org/10.1007/s12559-013-9231-2

In recent years, the established link between the various human communication production domains has become more widely utilised in the field of speech processing. In this work, we build on previous work by the authors and present a novel two-stage a... Read More about Novel Two-Stage Audiovisual Speech Filtering in Noisy Environments.

Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework (2013)
Journal Article
Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L., & Sotiriadis, S. (2015). Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience, 27(8), 1966-1984. https://doi.org/10.1002/cpe.3131

Summary
The evolution of communication protocols, sensory hardware, mobile and pervasive devices, alongside social and cyber‐physical networks, has made the Internet of things (IoT) an interesting concept with inherent complexities as it is realised... Read More about Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework.

Designing interactive systems : a comprehensive guide to HCI, UX and interaction design (2013)
Book
Benyon, D. (2013). Designing interactive systems : a comprehensive guide to HCI, UX and interaction design. (Third edition). Pearson Education

Designing Interactive Systems is the most authoritative textbook in the areas of human–computer interaction (HCI), usability, consumer experience and interaction design. David Benyon has updated the book based on extensive user feedback to provide a... Read More about Designing interactive systems : a comprehensive guide to HCI, UX and interaction design.

Cloud migration for SMEs in a Service Oriented Approach. (2013)
Presentation / Conference Contribution
Nussbaumer, N., & Liu, X. (2013, July). Cloud migration for SMEs in a Service Oriented Approach

Cloud computing has gained immense momentum during recent years and has ultimately become a viable solutions not only for larger firms, but also for small and medium-sized enterprises (SMEs). For smaller companies to stay competitive, many have there... Read More about Cloud migration for SMEs in a Service Oriented Approach..

Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games (2013)
Journal Article
Liu, L., Jones, A., Antonopoulos, N., Ding, Z., & Zhan, Y. (2015). Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games. Multimedia Tools and Applications, 74(8), 2763-2780. https://doi.org/10.1007/s11042-013-1662-y

Massively Multiplayer Online Games are networked games that allow a large number of people to play together. Classically MMOG worlds are hosted on many powerful servers and players that move around the world are passed from server to server as they p... Read More about Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games.

On and Offline Tangible Interaction: Studying the Secret Lives of Augmented Objects (2013)
Presentation / Conference Contribution
Oakley, I., & Esteves, A. (2013, July). On and Offline Tangible Interaction: Studying the Secret Lives of Augmented Objects. Presented at 2013 International Symposium on Ubiquitous Virtual Reality, Daejeon, South Korea

The smart, augmented objects that appear in systems that support tangible interaction have a dual life. While they can exhibit complex digital behaviors in the technological context they are designed for, they are also static, standard physical objec... Read More about On and Offline Tangible Interaction: Studying the Secret Lives of Augmented Objects.

Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic. (2013)
Presentation / Conference Contribution
Lawson, A., Mikuta, P., & Cruickshank, P. (2013, September). Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic. Poster presented at EUROCALL

This research and development is aimed at learners, tutors and course developers of Scottish Gaelic. The method of teaching Gaelic being used initially with the system is Ùlpan. This method has been used for over 50 years to great effect in Israel, w... Read More about Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic..

Enhancing Bio-inspired Intrusion Response in Ad-hoc Networks (2013)
Thesis
Kazemitabar Amirkolaei, M. Enhancing Bio-inspired Intrusion Response in Ad-hoc Networks. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/6533

Practical applications of Ad-hoc networks are developing everyday and safeguarding their security is becoming more important. Because of their specific qualities, ad-hoc networks require an anomaly detection system that adapts to its changing behavio... Read More about Enhancing Bio-inspired Intrusion Response in Ad-hoc Networks.

Interagency data exchange, privacy protection and governance architecture for Information sharing across domains (2013)
Preprint / Working Paper
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains

This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the legal and conceptual framework that governs multi-agency cooperation in pa... Read More about Interagency data exchange, privacy protection and governance architecture for Information sharing across domains.

How we cope with digital technology. (2013)
Journal Article
Turner, P. (2013). How we cope with digital technology. Synthesis lectures on human-centered informatics, 6(3), 1-109. https://doi.org/10.2200/S00519ED2V01Y201307HCI018

Digital technology has become a defining characteristic of modern life. Almost everyone uses it, we all rely on it, and many of us own a multitude of devices. What is more, we all expect to be able to use these technologies “straight out the box.” Th... Read More about How we cope with digital technology..

Dynamic probabilistic routing discovery and broadcast schemes for high mobility Ad-hoc networks (2013)
Thesis
Bani Khalaf, M. Dynamic probabilistic routing discovery and broadcast schemes for high mobility Ad-hoc networks. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/6151

Mobile Ad-hoc Networks (MANETs) have lately come to be widely used in everyday applications. Their usability and capability have attracted the interest of both commercial organizations and research communities. Recently, the Vehicular Ad-hoc Network... Read More about Dynamic probabilistic routing discovery and broadcast schemes for high mobility Ad-hoc networks.