Skip to main content

Research Repository

Advanced Search

Outputs (408)

Enhancing network management using mobile agents. (2000)
Presentation / Conference Contribution
Buchanan, W. J., Naylor, M., & Scott, A. (2000, April). Enhancing network management using mobile agents

Agent mobility addresses some limitations faced by classic client/server architecture, namely, in minimising bandwidth consumption, in supporting adaptive network load balancing and in solving problems caused by intermittent or unreliable network con... Read More about Enhancing network management using mobile agents..

Software agents and computer network security. (2000)
Presentation / Conference Contribution
Pikoulas, J., Mannion, M., & Buchanan, W. J. (2000, April). Software agents and computer network security

Preventing unauthorised access to corporate information systems is essential for many organisations. To address this problem we built a security enhancement software system using software agents, in which a core software agent resides on a server and... Read More about Software agents and computer network security..

Truly distributed control systems using fieldbus technology. (2000)
Presentation / Conference Contribution
Scott, A., & Buchanan, W. J. (2000, April). Truly distributed control systems using fieldbus technology

This paper outlines the three main field bus type standards: FOUNDATION Fieldbus; WorldFIP; and the CAN bus, each of which have great advantages over traditional instrumentation networking technology. The paper shows, using their specification, how t... Read More about Truly distributed control systems using fieldbus technology..

Multiple traffic signal control using a genetic algorithm (1999)
Presentation / Conference Contribution
Kalganova, T., Russell, G., & Cumming, A. (1999, December). Multiple traffic signal control using a genetic algorithm. Presented at 4th International Conference on Artificial Neural Networks and Genetic Algorithms, ICANNGA '99

Optimising traffic signal timings for a multiple-junction road network is a difficult but important problem. The essential difficulty of this problem is that the traffic signals need to coordinate their behaviours to achieve the common goal of optimi... Read More about Multiple traffic signal control using a genetic algorithm.

Machine independent algorithm for concurrent finite-element problems (1996)
Presentation / Conference Contribution
Buchanan, W. J., & Gupta, N. K. (1996). Machine independent algorithm for concurrent finite-element problems. In 3rd International IEEE Conference on Computation in Electromagnetics, 1996 (17-20). https://doi.org/10.1049/cp%3A19960150

The finite-element method, initially developed for mechanical and civil engineering applications, is now applied to electromagnetics. This paper describes how parallel processing applies to finite-element simulations. The methods discussed are the pa... Read More about Machine independent algorithm for concurrent finite-element problems.

Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation. (1994)
Presentation / Conference Contribution
Buchanan, W. J., Gupta, N. K., & Arnold, J. M. (1994, September). Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation

The authors have applied the 3D FDTD technique to simulate the propagation of electrical signals within printed circuit boards (PCBs). This relates to the work currently being carried out into the propagation of very high speed digital pulses in PCBs... Read More about Application of 3D finite-difference time-domain (FDTD) method to predict radiation from a PCB with high speed pulse propagation..

Lightweight threads for portable software (1993)
Presentation / Conference Contribution
Russell, G. (1993). Lightweight threads for portable software. In Proceedings of the UKUUG/SUKUG

No abstract available.

Simulation of radiation from a microstrip antenna using three-dimensional finite-difference time-domain (FDTD) method. (1993)
Presentation / Conference Contribution
Buchanan, W. J., Gupta, N. K., & Arnold, J. M. (1993). Simulation of radiation from a microstrip antenna using three-dimensional finite-difference time-domain (FDTD) method.

The authors have used the FDTD method to model and predict the radiation patterns from a microstrip antenna. One problem in modelling microstrip antennas is that these structures are highly resonant. The authors have described techniques to reduce th... Read More about Simulation of radiation from a microstrip antenna using three-dimensional finite-difference time-domain (FDTD) method..

Simulation of three-dimensional finite-difference time-domain method on limited memory systems. (1991)
Presentation / Conference Contribution
Buchanan, W. J., & Gupta, N. K. (1991). Simulation of three-dimensional finite-difference time-domain method on limited memory systems.

The authors discuss techniques in the modelling of electromagnetic fields using finite difference time domain (FDTD) methods applied to 80×86-based PCs or limited memory computers. Electrical modelling of structures is currently carried out mainly in... Read More about Simulation of three-dimensional finite-difference time-domain method on limited memory systems..

Student perception of on-line lectures with a blended learning environment. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Ludwiniak, R. (2010). Student perception of on-line lectures with a blended learning environment.

Educational institutions are increasingly moving towards enhancing learning through the use of integrated information technology. Blended, or augmented, learning, aims to support the traditional learning environment – where the instructor blends onli... Read More about Student perception of on-line lectures with a blended learning environment..

Embedding programming skills to support the student journey in networking, security and digital forensics. (2014)
Presentation / Conference Contribution
Lawson, A., & Macfarlane, R. (2014, April). Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey

The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in academia for staffing research and knowledge exchange projects. Placements offer... Read More about Embedding programming skills to support the student journey in networking, security and digital forensics..

HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society (2014)
Thesis
van Deursen Hazelhoff Roelfze, N. (2014). HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/6921

This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations experience similar risks and could benefit from sharing knowledge in order... Read More about HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society.

Building a new nation: risk, goverance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, January). Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013

This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.

The challenges of Big Data: future risks, governance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, March). The challenges of Big Data: future risks, governance and trust. Paper presented at The Future of Cyber Security 2013

The emphasis in computer security is moving from end point security towards data controls, and this is becoming an increasing threat as we move into an era build around Big Data. This presentation thus outlines the change in emphasis of security cont... Read More about The challenges of Big Data: future risks, governance and trust..

Who would you trust to identify you in accessing your health record?
Presentation / Conference Contribution
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. Who would you trust to identify you in accessing your health record?

Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper outlines a joint project between Edinburgh Napier University and miiCard [10]... Read More about Who would you trust to identify you in accessing your health record?.

A scaleable and trusted e-Health eco-system: safi.re (2013)
Presentation / Conference Contribution
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April). A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013

At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main components: a trust framework; governance rules; and strong access controls. The sys... Read More about A scaleable and trusted e-Health eco-system: safi.re.

Interagency data exchange, privacy protection and governance architecture for Information sharing across domains (2013)
Preprint / Working Paper
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains

This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the legal and conceptual framework that governs multi-agency cooperation in pa... Read More about Interagency data exchange, privacy protection and governance architecture for Information sharing across domains.

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013, June). Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. Presented at Cyberforensics 2013, Cardiff, UK

There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other electronic devices increases, and as the storage capacity of these devices i... Read More about Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter..

Cyber risk and opportunities in the Cloud. (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, September). Cyber risk and opportunities in the Cloud. Paper presented at Cloud Security Congress 2013

This presentation outlines some of the key risks and opportunities in the Cloud.