Skip to main content

Research Repository

Advanced Search

Assessing the Relative Importance of an E-learning system Usability Design Characteristics Based on Students' Preferences (2019)
Journal Article
Rutter, M. J., Smith, S., & Alshehri, A. (2019). Assessing the Relative Importance of an E-learning system Usability Design Characteristics Based on Students' Preferences. European Journal of Educational Research, 8(3), 839-855. https://doi.org/10.12973/eu-jer.8.3.839

This study considers the interaction between an e-learning system, the Blackboard system, and the students who use it in Saudi Arabia. While previous work exists, there is limited consideration of the assessment of the preferences of e-learning syste... Read More about Assessing the Relative Importance of an E-learning system Usability Design Characteristics Based on Students' Preferences.

A Data-driven Statistical Approach to Customer Behaviour Analysis and Modelling in Online Freemium Games (2019)
Thesis
Singh Roy, A. A Data-driven Statistical Approach to Customer Behaviour Analysis and Modelling in Online Freemium Games. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2090355

The video games industry is one of the most attractive and lucrative segments in the entertainment and digital media, with big business of more than $150 billion worldwide. A popular approach in this industry is the online freemium model, wherein the... Read More about A Data-driven Statistical Approach to Customer Behaviour Analysis and Modelling in Online Freemium Games.

The Social Impact of Digital Youth Work: What Are We Looking For? (2019)
Journal Article
Pawluczuk, A., Webster, G., Smith, C., & Hall, H. (2019). The Social Impact of Digital Youth Work: What Are We Looking For?. Media and Communication, 7(2), 59-68. https://doi.org/10.17645/mac.v7i2.1907

Digital youth work is an emerging field of research and practice which seeks to investigate and support youth-centred digital literacy initiatives. Whilst digital youth work projects have become prominent in Europe in recent years, it has also become... Read More about The Social Impact of Digital Youth Work: What Are We Looking For?.

Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput? (2019)
Journal Article
Barakat, B., Keates, S., Wassell, I., & Arshad, K. (2019). Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?. IEEE Communications Letters, 23(6), 987-990. https://doi.org/10.1109/LCOMM.2019.2907935

The Zero-Wait (ZW) policy is widely held to achieve maximum information 'freshness', i.e., to achieve minimum Peak Age (PA) and maximum throughput, for real-time Internet-of-Things applications. In this paper, it was shown through a series of experim... Read More about Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?.

Deep Precomputed Radiance Transfer for Deformable Objects (2019)
Presentation / Conference Contribution
Li, Y., Wiedemann, P., & Mitchell, K. (2019, May). Deep Precomputed Radiance Transfer for Deformable Objects. Presented at ACM Symposium on Interactive 3D Graphics and Games, Montreal, Quebec, Canada

We propose, DeepPRT, a deep convolutional neural network to compactly encapsulate the radiance transfer of a freely deformable object for rasterization in real-time.
With pre-computation of radiance transfer (PRT) we can store complex light interac... Read More about Deep Precomputed Radiance Transfer for Deformable Objects.

Designing Motion Matching for Real-World Applications: Lessons from Realistic Deployments (2019)
Presentation / Conference Contribution
Verweij, D., Esteves, A., Bakker, S., & Khan, V.-J. (2019, March). Designing Motion Matching for Real-World Applications: Lessons from Realistic Deployments. Presented at 13th International Conference on Tangible, Embedded, and Embodied Interaction (ACM TEI), Tempe, Arizona

Amongst the variety of (multi-modal) interaction techniques that are being developed and explored, the Motion Matching paradigm provides a novel approach to selection and control. In motion matching, users interact by rhythmically moving their bodies... Read More about Designing Motion Matching for Real-World Applications: Lessons from Realistic Deployments.

Wattom: a Consumption and Grid Aware Smart Plug with Mid-air Controls (2019)
Presentation / Conference Contribution
Quintal, F., Esteves, A., Caires, F., Baptiste, V., & Mendes, P. (2019, March). Wattom: a Consumption and Grid Aware Smart Plug with Mid-air Controls. Presented at 13th International Conference on Tangible, Embedded, and Embodied Interaction (ACM TEI), Tempe, Arizona

This paper presents Wattom, a highly interactive ambient eco-feedback smart plug that aims to support a more sustainable use of electricity by being tightly coupled to users' energy-related activities. We describe three use cases of the system: using... Read More about Wattom: a Consumption and Grid Aware Smart Plug with Mid-air Controls.

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier (2019)
Presentation / Conference Contribution
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2018, December). Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. Presented at International Workshop on Big Data Analytics for Cyber Threat Hunting, Seattle, WA, USA

Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exists between the requirements of this community and the solutions that are cu... Read More about Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.

Eidolon360 – A VR Experience (2018)
Presentation / Conference Contribution
Hood, B., & Flint, T. (2018, July). Eidolon360 – A VR Experience. Presented at 6th Conference on Computation, Communication, Aesthetics & X, Madrid, Spain

Eidolon360 is a virtual reality artwork and experience that is interacted with through VR headsets. The viewer, reclining on a bed within the exhibition space, experiences a 360 film, shot within a medical simulation centre, that mimics clinical hosp... Read More about Eidolon360 – A VR Experience.

An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment (2018)
Journal Article
Jin, D.-D., Liu, Q., Liu, X., & Linge, N. (2019). An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment. Journal of Computers, 30(3), 130-142. https://doi.org/10.3966/199115992019063003010

Hadoop is a famous parallel computing framework that is applied to process large-scale data, but there exists such a task in hadoop framework, which is called “Straggling task” and has a serious impact on Hadoop. Speculative execution (SE) is an effe... Read More about An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment.

System and method for management of confidential data (2018)
Patent
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (2018). System and method for management of confidential data. GB2561176A

This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to carry out data management operations. These include the identification of data... Read More about System and method for management of confidential data.

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2018, August). Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. Presented at The 4th International Conference on Technology Trends, Babahoyo, Ecuador

Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, such as programmable logic controllers (PLC), networking devices, and actua... Read More about Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System.

Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning (2018)
Journal Article
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2019). Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, 128, 56-63. https://doi.org/10.1016/j.jnca.2018.12.002

Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce users to click and then redirect them to a phishing webpage. To protect IoT systems, email classification is an essential mechanism to classify spam and l... Read More about Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning.

Feature-preserving detailed 3D face reconstruction from a single image (2018)
Presentation / Conference Contribution
Li, Y., Ma, L., Fan, H., & Mitchell, K. (2018, December). Feature-preserving detailed 3D face reconstruction from a single image. Presented at the 15th ACM SIGGRAPH European Conference, London, United Kingdom

Dense 3D face reconstruction plays a fundamental role in visual media production involving digital actors. We improve upon high fidelity reconstruction from a single 2D photo with a reconstruction framework that is robust to large variations in expre... Read More about Feature-preserving detailed 3D face reconstruction from a single image.

Multi-reality games: an experience across the entire reality-virtuality continuum (2018)
Presentation / Conference Contribution
Casas, L., Ciccone, L., Çimen, G., Wiedemann, P., Fauconneau, M., Sumner, R. W., & Mitchell, K. (2018, December). Multi-reality games: an experience across the entire reality-virtuality continuum. Presented at the 16th ACM SIGGRAPH International Conference, Tokyo, Japan

Interactive play can take very different forms, from playing with physical board games to fully digital video games. In recent years, new video game paradigms were introduced to connect real-world objects to virtual game characters. However, even the... Read More about Multi-reality games: an experience across the entire reality-virtuality continuum.

Psychogeography With Technology (2018)
Presentation / Conference Contribution
Flint, T., Grandison, T., & Barrett, H. (2018, November). Psychogeography With Technology. Poster presented at Engage 2018, Edinburgh, Scotland

No abstract available.

Copy-move forgery detection using combined features and transitive matching (2018)
Journal Article
Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H., & Tan, Z. (2019). Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications, 78(21), 30081-30096. https://doi.org/10.1007/s11042-018-6922-4

Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be tampered easily. Therefore, the research of multimedia forensics is necessary... Read More about Copy-move forgery detection using combined features and transitive matching.

Mitigating Disaster using Secure Threshold-Cloud Architecture (2018)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., & Russell, G. (2018, November). Mitigating Disaster using Secure Threshold-Cloud Architecture

There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to apply secret sharing methods as used in cryptography to create shares of crypt... Read More about Mitigating Disaster using Secure Threshold-Cloud Architecture.

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services (2018)
Journal Article
Zhang, S., Li, X., Tan, Z., Peng, T., & Wang, G. (2019). A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Generation Computer Systems, 94, 40-50. https://doi.org/10.1016/j.future.2018.10.053

With the rapid pervasion of location-based services (LBSs), protection of location privacy has become a significant concern. In most continuous LBSs' privacy-preserving solutions, users need to transmit the location query data to an untrusted locatio... Read More about A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.

The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime (2018)
Journal Article
Dyson, S., Buchanan, W., & Bell, L. (2018). The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime. The Journal of the British Blockchain Association, 1(2), 1-6. https://doi.org/10.31585/jbba-1-2-%288%292018

We increasingly live in a world where there is a balance between the rights to privacy and the requirements for consent, and the rights of society to protect itself. Within this world, there is an ever-increasing requirement to protect the identities... Read More about The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime.