Skip to main content

Research Repository

Advanced Search

Making and Unfinishedness: Designing Toolkits for Negotiation (2017)
Journal Article
Smyth, M., & Helgason, I. (2017). Making and Unfinishedness: Designing Toolkits for Negotiation. Design Journal, 20(sup1), S3966-S3974. https://doi.org/10.1080/14606925.2017.1352899

The diffusion and democratisation of computing technologies and physical prototyping systems has supported the rise of Do-It-Yourself culture. In the context of design innovation, this shift has undoubtedly blurred the lines between the roles of amat... Read More about Making and Unfinishedness: Designing Toolkits for Negotiation.

Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention (2017)
Presentation / Conference Contribution
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017, May). Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention. Presented at 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal

The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smart devices. Structured Query Language (SQL) Injection Attack (SQLIA) remains... Read More about Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention.

Trust-Based Defence Model Against MAC Unfairness Attacks for IoT (2017)
Presentation / Conference Contribution
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017, July). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. Presented at The Thirteenth International Conference on Wireless and Mobile Communications

The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious nodes which attempts to get a dominating position and hold unfair advantage... Read More about Trust-Based Defence Model Against MAC Unfairness Attacks for IoT.

Complex Pleasures: Designing Optional interactions for Public Spaces (2017)
Thesis
Helgason, I. Complex Pleasures: Designing Optional interactions for Public Spaces. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/1022893

This research aims to contribute to knowledge about the design of interactive systems sited in public spaces. In particular, the study concerns "optional interactions" where systems invite interaction from passers-by. These systems are action-orienta... Read More about Complex Pleasures: Designing Optional interactions for Public Spaces.

Data-to-Text Generation Improves Decision-Making Under Uncertainty (2017)
Journal Article
Gkatzia, D., Lemon, O., & Rieser, V. (2017). Data-to-Text Generation Improves Decision-Making Under Uncertainty. IEEE Computational Intelligence Magazine, 12(3), 10-17. https://doi.org/10.1109/MCI.2017.2708998

Decision-making is often dependent on uncertain data, e.g. data associated with confidence scores or probabilities. This article presents a comparison of different information presentations for uncertain data and, for the first time, measures their e... Read More about Data-to-Text Generation Improves Decision-Making Under Uncertainty.

Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services (2017)
Presentation / Conference Contribution
Lim, A. K., Thuemmler, C., Paulin, A., Jell, T., & Keow Lim, A. K. (2017, April). Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services. Presented at Information Technology – Next Generation 14th International Conference on Information Technology

As more and more details of 5G technology specifications unveil and standards emerge it becomes clear that 5G will have an enabling effect on many different verticals including automotive, mobility and health. This paper gives an overview about techn... Read More about Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services.

Evaluation of a genetic representation for outline shapes (2017)
Presentation / Conference Contribution
Lapok, P., Lawson, A., & Paechter, B. (2017, July). Evaluation of a genetic representation for outline shapes. Presented at Proceedings of the Genetic and Evolutionary Computation Conference Companion on - GECCO '17

This work in progress focuses on the evaluation of a genetic representation for outline shapes for planar mechanical levers which addresses the first stage of the complex real-world problem of modelling and evolving planar mechanical lever systems. T... Read More about Evaluation of a genetic representation for outline shapes.

Combining parallel coordinates with multi-objective evolutionary algorithms in a real-world optimisation problem (2017)
Presentation / Conference Contribution
Urquhart, N. (2017, June). Combining parallel coordinates with multi-objective evolutionary algorithms in a real-world optimisation problem. Presented at Proceedings of the Genetic and Evolutionary Computation Conference Companion on - GECCO '17

Optimisation problems based upon real-world instances often contain many objectives. Many existing Multi-Objective Evolutionary Algorithm techniques return a set of solutions from which the user must make a final selection; typically such a set of so... Read More about Combining parallel coordinates with multi-objective evolutionary algorithms in a real-world optimisation problem.

Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment (2017)
Journal Article
Asif, R., & Buchanan, W. J. (2017). Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847

There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile copper wire connections. However, in near future it is envisaged that FTTH... Read More about Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment.

Sticky policies approach within cloud computing (2017)
Journal Article
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017). Sticky policies approach within cloud computing. Computers and Security, 70, 366-375. https://doi.org/10.1016/j.cose.2017.07.005

This paper discusses a secure document sharing approach, which addresses confidentiality, integrity and authenticity concerns related to cloud-based data sharing. This research is focused on a secure construct that would integrate with other cloud re... Read More about Sticky policies approach within cloud computing.

A Unifying Software Framework for Vehicle Routing and Logistics (2017)
Presentation / Conference Contribution
Enenkel, J., Geyer, J., Keiner, J.-N., Nguyen, J., Steuler, J. L., & Urquhart, N. (2017, July). A Unifying Software Framework for Vehicle Routing and Logistics. Paper presented at Annual Workshop of the EURO Working Group on Vehicle Routing and Logistics optimization (VeRoLog), Amsterdam

A wide range of open source tools and real world data are available to support those working on vehicle routing and logistics optimisation. Despite such tools being available there is still a requirement for a unifying software API to allow researche... Read More about A Unifying Software Framework for Vehicle Routing and Logistics.

The importance of the individual encoding in memetic algorithms with diversity control applied to large Sudoku puzzles (2017)
Presentation / Conference Contribution
Segura, C., Segredo, E., & Miranda, G. (2017, June). The importance of the individual encoding in memetic algorithms with diversity control applied to large Sudoku puzzles. Presented at 2017 IEEE Congress on Evolutionary Computation (CEC)

In recent years, several memetic algorithms with explicit mechanisms to delay convergence have shown great promise when solving 9x9 Sudoku puzzles. This paper analyzes and extends state-of-the-art schemes for dealing with Sudoku puzzles of larger dim... Read More about The importance of the individual encoding in memetic algorithms with diversity control applied to large Sudoku puzzles.

The Effectiveness of Two Audiovisual Mappings to Control a Concatenative Synthesiser (2017)
Presentation / Conference Contribution
Tsiros, A., & Leplâtre, G. (2017, July). The Effectiveness of Two Audiovisual Mappings to Control a Concatenative Synthesiser. Presented at Sound and Music Computing 2017

This paper presents the results of an investigation into audio visual (AV) correspondences conducted as part of the development of Morpheme, a painting interface to control a corpus-based concatenative sound synthesiser. Our goal was to measure the e... Read More about The Effectiveness of Two Audiovisual Mappings to Control a Concatenative Synthesiser.

The Digital Rubber Hand Illusion (2017)
Presentation / Conference Contribution
Aldhous, J., Hetherington, R., & Turner, P. (2017, July). The Digital Rubber Hand Illusion. Presented at British HCI 2017

The rubber hand illusion (RHI) is a body ownership illusion whereby congruently stroking a fake rubber hand and a subject's hidden hand while observing the rubber hand produces the illusion of them feeling the touch on the rubber hand and experiencin... Read More about The Digital Rubber Hand Illusion.

Permaculture as a foundation for sustainable interaction design and UX (2017)
Presentation / Conference Contribution
Egan, C., Benyon, D., & Thompson, R. (2017, July). Permaculture as a foundation for sustainable interaction design and UX. Presented at British HCI 2017

The main objective of this work is to gain an understanding of the relationships between UX and permaculture. This will deliver insights as to how digital media development can support the need for people to live and work in more ecologically conscio... Read More about Permaculture as a foundation for sustainable interaction design and UX.

A new enhanced RPL based routing for Internet of Things (2017)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Ekonomou, E., & Wadhaj, I. (2017, June). A new enhanced RPL based routing for Internet of Things. Presented at 2017 IEEE International Conference on Communications Workshops (ICC Workshops)

The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the RPL storing mode has been found restricted by storage limitations in the ro... Read More about A new enhanced RPL based routing for Internet of Things.

Make-Believing Animated Films Featuring Digital Humans: A Qualitative Inquiry Using Online Sources (2017)
Journal Article
Hetherington, R., & McRae, R. (2017). Make-Believing Animated Films Featuring Digital Humans: A Qualitative Inquiry Using Online Sources. Animation, 12(2), 156-173. https://doi.org/10.1177/1746847717710738

A qualitative inquiry of reviews of films featuring digital humanlike characters was performed by sampling user comments from three online reviewer aggregator sites: the Internet Movie Database, Rotten Tomatoes and Metacritic. The movies chosen for a... Read More about Make-Believing Animated Films Featuring Digital Humans: A Qualitative Inquiry Using Online Sources.

A hybrid method for feature construction and selection to improve wind-damage prediction in the forestry sector (2017)
Presentation / Conference Contribution
Hart, E., Sim, K., Gardiner, B., & Kamimura, K. (2017, July). A hybrid method for feature construction and selection to improve wind-damage prediction in the forestry sector. Presented at Proceedings of the Genetic and Evolutionary Computation Conference on - GECCO '17

Catastrophic damage to forests resulting from major storms has resulted in serious timber and financial losses within the sector across Europe in the recent past. Developing risk assessment methods is thus one of the keys to finding forest management... Read More about A hybrid method for feature construction and selection to improve wind-damage prediction in the forestry sector.

Evolving solution choice and decision support for a real-world optimisation problem (2017)
Presentation / Conference Contribution
Urquhart, N., & Fonzone, A. (2017, July). Evolving solution choice and decision support for a real-world optimisation problem. Presented at Proceedings of the Genetic and Evolutionary Computation Conference on - GECCO '17, Berlin, Germany

Agencies who provide social care services typically have to optimise staff allocations and the travel whilst attempting to satisfy conflicting objectives. In such cases it is desirable to have a range of solutions to choose from, allowing the agenc... Read More about Evolving solution choice and decision support for a real-world optimisation problem.

Hand Gesture Discrimination with Passive Infrared Sensor Arrays (2017)
Thesis
Wojtczuk, P. Hand Gesture Discrimination with Passive Infrared Sensor Arrays. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/979764

Gesture recognition is a natural way of non-verbal communication for humans. However it is technically challenging to capture the relatively undefined movement of body parts in free space and also extract the intended gestures. Many existing technolo... Read More about Hand Gesture Discrimination with Passive Infrared Sensor Arrays.