Skip to main content

Research Repository

Advanced Search

Representation and Decision Making in the Immune System (2010)
Thesis
McEwan, C. Representation and Decision Making in the Immune System. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4157

The immune system has long been attributed cognitive capacities such as "recognition" of pathogenic agents; "memory" of previous infections; "regulation" of a cavalry of detector and effector cells; and "adaptation" to a changing environment and evo... Read More about Representation and Decision Making in the Immune System.

Performance Evaluation of Virtualization with Cloud Computing (2010)
Thesis
Pelletingeas, C. Performance Evaluation of Virtualization with Cloud Computing. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4010

Cloud computing has been the subject of many researches. Researches shows that cloud computing permit to reduce hardware cost, reduce the energy consumption and allow a more efficient use of servers. Nowadays lot of servers are used inefficiently bec... Read More about Performance Evaluation of Virtualization with Cloud Computing.

Room occupancy measurement using low-resolution infrared cameras. (2010)
Presentation / Conference Contribution
Berger, M., & Armitage, A. (2010, June). Room occupancy measurement using low-resolution infrared cameras. Presented at IET Irish Systems & Signals Conference

Measuring room occupancy has always been a desirable endeavour. This could be for security reasons, to save energy or simply for statistical reasons. Recently the use of thermal imaging systems in this area has increased as these systems became cheap... Read More about Room occupancy measurement using low-resolution infrared cameras..

3DES Encryption and Decryption in Microsoft .NET. (2010)
Report
Buchanan, W. J. (2010). 3DES Encryption and Decryption in Microsoft .NET

This paper outlines the usage of 3DES in Microsoft .NET. It provides a basic overview of the 3-DES method, along with a review of other popular encryption methods and some sample code which can be used to implement 3DES.

AES Encryption and Decryption in Microsoft .NET. (2010)
Report
Buchanan, W. J. (2010). AES Encryption and Decryption in Microsoft .NET

This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample code which can be used to implement AES.

RC2 Encryption and Decryption in Microsoft .NET. (2010)
Preprint / Working Paper
Buchanan, W. J. RC2 Encryption and Decryption in Microsoft .NET

This paper outlines the usage of RC2 in Microsoft .NET. It provides a basic overview of the RC2 method, along with a review of other popular encryption methods and some sample code which can be used to implement RC2.

Re-creating Edinburgh: adopting the tourist gaze. (2010)
Presentation / Conference Contribution
Burrows, L., Turner, S., & Turner, P. (2010, August). Re-creating Edinburgh: adopting the tourist gaze. Presented at ECCE10, The 10th European conference on cognitive ergonomics

Motivation – The work described in this paper investigated the potential of a low fidelity desktop application using the metaphor of the ‘tourist gaze’ in conveying a sense of place.
Research approach – An exploratory study was used, in which an app... Read More about Re-creating Edinburgh: adopting the tourist gaze..

Analysis of malicious affiliate network activity as a test case for an investigatory framework. (2010)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., Old, L. J., Batey, A., & Rahman, A. (2010, July). Analysis of malicious affiliate network activity as a test case for an investigatory framework

Currently there is a great deal of literature surrounding methods that can be used to de-tect click-fraud, but there is very little published work on actual cases of click-through fraud. The aim of this paper is to present the details of a real-life... Read More about Analysis of malicious affiliate network activity as a test case for an investigatory framework..

A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments (2010)
Thesis
Pallis, G. A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4005

For more than a century the classic circuit-switched telephony in the form of PSTN (Public Service Telephone Network) has dominated the world of phone communications (Varshney et al., 2002). The alternative solution of VoIP (Voice over Internet Proto... Read More about A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments.

Navigating a Speckled World: Interacting with Wireless Sensor Networks (2010)
Book Chapter
Leach, M., & Benyon, D. (2010). Navigating a Speckled World: Interacting with Wireless Sensor Networks. In M. Wachowicz (Ed.), Movement-Aware Applications for Sustainable Mobility (229-242). IGI Global. https://doi.org/10.4018/978-1-61520-769-5.ch014

The Speckled Computing project is a large multisite research project based in Scotland, UK. The aim of the project is to investigate, prototype, and produce tiny (1mm3) computational devices, called Specks, that can be configured into wireless sensor... Read More about Navigating a Speckled World: Interacting with Wireless Sensor Networks.

Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs) (2010)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., Sivalingam, K., & Madras, I. (2010, December). Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs). Paper presented at OPNETWORK 2010

Ethernet Passive Optical Network (EPON) has been considered for access networks for quite some time to provide high-speed and high-capacity services. As a novel type of network, EPON presents many challenges so one main aim of this paper is to provid... Read More about Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs).

Modelling infection spread using location tracking. (2010)
Journal Article
Mason, A. M., Dingle, N. J., Knottenbelt, W. J., Bell, D., Buchanan, W. J., & Thuemmler, C. (2010). Modelling infection spread using location tracking. International Journal of Healthcare Technology and Management, 11, 442-461. https://doi.org/10.1504/IJHTM.2010.036925

The precision of location tracking technology has improved greatly over the last few decades. We aim to show that by tracking the locations of individuals in a closed environment, it is now possible to record the nature and frequency of interactions... Read More about Modelling infection spread using location tracking..

Artificial Immune Systems: 9th International Conference, ICARIS 2010, Edinburgh, UK, July 26-29, 2010, Proceedings (2010)
Presentation / Conference Contribution
(2010, July). Artificial Immune Systems: 9th International Conference, ICARIS 2010, Edinburgh, UK, July 26-29, 2010, Proceedings. Presented at 9th International Conference, ICARIS 2010, Edinburgh, UK

Artificial immune systems (AIS) is a diverse and maturing area of research that bridges the disciplines of immunology and computation. The original research impetus in AIS had a clear focus on applying immunological principles to computational proble... Read More about Artificial Immune Systems: 9th International Conference, ICARIS 2010, Edinburgh, UK, July 26-29, 2010, Proceedings.

Improving data quality in data warehousing applications (2010)
Presentation / Conference Contribution
Li, L., Peng, T., & Kennedy, J. (2010, June). Improving data quality in data warehousing applications. Presented at Proceedings of the 12th International Conference on Enterprise Information Systems

There is a growing awareness that high quality of data is a key to today’s business success and dirty data that exits within data sources is one of the reasons that cause poor data quality. To ensure high quality, enterprises need to have a process,... Read More about Improving data quality in data warehousing applications.