Skip to main content

Research Repository

Advanced Search

Implementation and evaluation of a botnet analysis and detection method in a virtual environment (2012)
Thesis
Waheed, S. Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/5667

Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a form of malware controlled by a Botmaster using Command and Control (C&C).... Read More about Implementation and evaluation of a botnet analysis and detection method in a virtual environment.

E-Health: chances and challenges of distributed, service oriented architectures (2012)
Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012). E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,

Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remain affordable for governments and individuals. Mobile technology and cloud c... Read More about E-Health: chances and challenges of distributed, service oriented architectures.

A forensic image description language for generating test images. (2012)
Presentation / Conference Contribution
Russell, G., Macfarlane, R., & Ludwiniak, R. (2012, September). A forensic image description language for generating test images

Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study. At Edinburgh Napier University this topic has been taught with flexible an... Read More about A forensic image description language for generating test images..

Security issues of a publicly accessible cloud computing infrastructure. (2012)
Presentation / Conference Contribution
Russell, G., & Macfarlane, R. (2012, June). Security issues of a publicly accessible cloud computing infrastructure

Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accidental or deliberate acts by users can be dangerous to other systems. This pape... Read More about Security issues of a publicly accessible cloud computing infrastructure..

A comparison of techniques for name matching (2012)
Journal Article
Peng, T., Li, L., & Kennedy, J. (2012). A comparison of techniques for name matching. GSTF journal on computing, 2,

Information explosion is a problem for everyone nowadays. It is a great challenge to all kinds of businesses to maintain high quality of data in their information applications, such as data integration, text and web mining, information retrieval, sea... Read More about A comparison of techniques for name matching.

VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees (2012)
Journal Article
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2012). VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees. BMC Bioinformatics, 13(Suppl 8), S5. https://doi.org/10.1186/1471-2105-13-S8-S5

Pedigree genotype datasets are used for analysing genetic inheritance and to map genetic markers and traits. Such datasets consist of hundreds of related animals genotyped for thousands of genetic markers and invariably contain multiple errors in bot... Read More about VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees.

Technical evaluation of an e-health platform. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012, July). Technical evaluation of an e-health platform. Presented at IADIS International Conference e-Health 2012

Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation of e-Health platforms under three main categories: usability evaluation, l... Read More about Technical evaluation of an e-health platform..

Aspects of lifelikeness: a framework for optional interactions with public installations (2012)
Presentation / Conference Contribution
Helgason, I., Smyth, M., & Speed, C. (2012, September). Aspects of lifelikeness: a framework for optional interactions with public installations. Presented at Designing Interactive Systems DIS 2012, Newcastle, UK

This poster presents a framework for the design and evaluation of “optional interactions” with publicly sited, non-utilitarian installations. These kinds of encounters, where an engaging experience of interaction itself is the design goal, can be reg... Read More about Aspects of lifelikeness: a framework for optional interactions with public installations.

Future risks – Including the rise of the hacktivism. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Future risks – Including the rise of the hacktivism. Presented at National Information Security Conference (NISC)

As organisations move towards infrastructures which are highly dependent on their Web infrastructure, they are now at great risk from external parties who can use a number of motivations, such as for a political agenda, to compromise their activities... Read More about Future risks – Including the rise of the hacktivism..

Location as interaction: designing blended spaces for digital tourism. (2012)
Presentation / Conference Contribution
Benyon, D., Mival, O., Ayan, S., O'Keefe, B., & Mokey, S. (2012, September). Location as interaction: designing blended spaces for digital tourism. Presented at Third International Workshop on Human-Computer Interaction, Tourism and Cultural Heritage (HCITOCH 2012):

Designing blended spaces. (2012)
Presentation / Conference Contribution
Benyon, D., Mival, O., & Ayan, S. (2012, September). Designing blended spaces

We present an approach to the design of mixed reality spaces that aims to create a more harmonized and unified user experience. We refer to these as blended spaces. Blended spaces draw upon a description of physical and digital spaces in terms of the... Read More about Designing blended spaces..

MaTSE: The microarray time-series explorer (2012)
Presentation / Conference Contribution
Craig, P., Cannon, A., Kukla, R., & Kennedy, J. (2012, October). MaTSE: The microarray time-series explorer. Presented at 2012 IEEE Symposium on Biological Data Visualization (BioVis)

This paper describes the design, development and evaluation of the Microarray Time-Series Explorer (MaTSE), a novel information visualization application for the exploratory analysis of large scale microarray timeseries data. The software combines a... Read More about MaTSE: The microarray time-series explorer.

Evolution for the sustainability of Internetware. (2012)
Presentation / Conference Contribution
Fang, D., Liu, X., Liu, L., & Yang, H. (2012, October). Evolution for the sustainability of Internetware. Presented at Fourth Asia-Pacific Symposium on Internetware

Along with the green attentions and efforts on energy efficiency of computer hardware and embedded systems, software relevant sustainability issues are becoming increasingly focused, as a part of Green Information Technology (GIT). Undoubtedly, softw... Read More about Evolution for the sustainability of Internetware..

Data quality and data cleaning in database applications (2012)
Thesis
Li, L. Data quality and data cleaning in database applications. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/5788

Today, data plays an important role in people’s daily activities. With the help of some database applications such as decision support systems and customer relationship management systems (CRM), useful information or knowledge could be derived from l... Read More about Data quality and data cleaning in database applications.

A holistic semantic based approach to component specification and retrieval (2012)
Thesis
Li, C. A holistic semantic based approach to component specification and retrieval. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/5677

Component-Based Development (CBD) has been broadly used in software development as it enhances the productivity and reduces the costs and risks involved in systems development. It has become a well-understood and widely used technology for developing... Read More about A holistic semantic based approach to component specification and retrieval.

The use of electronic voting systems to enhance deep learning. (2012)
Presentation / Conference Contribution
Barreto, D. (2012, July). The use of electronic voting systems to enhance deep learning

The present paper introduces a technology-enhanced teaching method that promotes deep learning.
Four stages that correspond to four different student cohorts were used for its development and to analyse
its effectiveness. The effectiveness of the m... Read More about The use of electronic voting systems to enhance deep learning..

Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. Paper presented at Enhancing, extending and empowering student learning within online environments

There is a major challenge faced in running distance and blended learning modules, especially in giving students an equivalent learning environment than to face-to-face students. To overcome this problem, a number of modules have been run within 2011... Read More about Introducing Cloud-based virtualised environments and their use in supporting learning and teaching..

Innovation in cloud environments. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Innovation in cloud environments. Paper presented at Future of Technology

This presentation outlines the future of technology.

An Investigation into Visual Graph Comparison (2012)
Thesis
Melville, A. G. An Investigation into Visual Graph Comparison. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/7560

Information Visualisation is extensively used in single graph analysis. However, relatively little work has been done in the field of graph comparison. This work examines and compares the use of two standard graph representations in this area, the No... Read More about An Investigation into Visual Graph Comparison.

A simulation based decision making approach in bunkering. (2012)
Presentation / Conference Contribution
Moeller, D., Friedrichs, S., Cullinane, K., Schroer, B., & Anderson, M. (2012, May). A simulation based decision making approach in bunkering. Paper presented at AlaSim International