Skip to main content

Research Repository

Advanced Search

Outputs (3525)

The intersection of datafication and data justice in higher education (2025)
Presentation / Conference Contribution
Fabian, K. (2025, October). The intersection of datafication and data justice in higher education. Presented at Connecting Space, Data and Society: Interdisciplinary Pathways, London

There has been an increasing uptake of technology in the classroom, either for teaching or for classroom management purposes. Along with this uptake is the increasing datafication of education. Datafication is the process of rendering social and natu... Read More about The intersection of datafication and data justice in higher education.

The Apple & Biscuit Show – Episode 17: “Why Hearing Means Feeling: Designing Sound for the Real World” (2025)
Digital Artefact
McGregor, I. (2025). The Apple & Biscuit Show – Episode 17: “Why Hearing Means Feeling: Designing Sound for the Real World”. [Podcast]

This podcast episode features Dr Iain McGregor in conversation with Dr Neil Hillman and Jason Nicholas, discussing the role of perceptual audio in shaping trust, safety, and meaning. Topics include the use of sound in protest, public broadcasting, an... Read More about The Apple & Biscuit Show – Episode 17: “Why Hearing Means Feeling: Designing Sound for the Real World”.

Enhancing Flow in Remote Work: The Influence of IT Consumerization (2025)
Journal Article
Doargajudhur, M., Huzooree, A., Dutot, V., Lichy, J., & Hosanoo, Z. (in press). Enhancing Flow in Remote Work: The Influence of IT Consumerization. Management Decision,

Purpose: The widespread adoption of Information and Communication Technologies (ICT) post pandemic has reshaped remote work, yet its implications for employee well-being and work outcomes remain inconclusive. This study proposes a research model to e... Read More about Enhancing Flow in Remote Work: The Influence of IT Consumerization.

Navigating ethical challenges in generative AI-enhanced research: The ETHICAL framework for responsible generative AI use (2025)
Journal Article
Eacersall, D., Pretorius, L., Smirnov, I., Spray, E., Illingworth, S., Chugh, R., Strydom, S., Stratton-Maher, D., Simmons, J., Jennings, I., Roux, R., Kamrowski, R., Downie, A., Ling Thong, C., & Howell, K. A. (2025). Navigating ethical challenges in generative AI-enhanced research: The ETHICAL framework for responsible generative AI use. Journal of Applied Learning & Teaching, 8(2), https://doi.org/10.37074/jalt.2025.8.2.9

The rapid adoption of generative artificial intelligence (GenAI) in research presents both opportunities and ethical challenges that should be carefully navigated. Although GenAI tools can enhance research efficiency by automating tasks such as liter... Read More about Navigating ethical challenges in generative AI-enhanced research: The ETHICAL framework for responsible generative AI use.

Shadow-Analyzer: An Efficient Neural Networks-based Ghost Objects Detection for Autonomous Vehicles (2025)
Journal Article
Almaini, A., Folz, . J., Koßmann, T., Böder, R., Al-Dubai, A., Sadik, M., Schramm, M., Heigl, M., Romdhani, I., & Kerrouche, A. (online). Shadow-Analyzer: An Efficient Neural Networks-based Ghost Objects Detection for Autonomous Vehicles. IEEE Transactions on Intelligent Transportation Systems, https://doi.org/10.1109/TITS.2025.3587720

Several studies have been conducted to investigate the security and reliability of object detection systems in Autonomous Vehicles (AVs), which rely on sensors such as cameras and Light Detection and Ranging (LiDAR). These studies demonstrate the low... Read More about Shadow-Analyzer: An Efficient Neural Networks-based Ghost Objects Detection for Autonomous Vehicles.

The Good Work Time Series 2025 (2025)
Report
Papagiannaki, E., Thomas, A., & Brewin, K. (2025). The Good Work Time Series 2025. Institute for the Future of Work

Good Work builds resilience against socioeconomic and health shocks, and builds resilience for technological transformation. More than any other single factor, access to good jobs will determine prospects for people and places across the country.... Read More about The Good Work Time Series 2025.

Is the dissertation dead? If so, what are the alternatives? (2025)
Digital Artefact
Khusainova, R., Sholl, S., & Harte, P. (2025). Is the dissertation dead? If so, what are the alternatives?. [Blog post]

Dissertation alternatives, such as capstone projects and applied group-based projects, could better prepare graduates for their future careers. Discover what these might look like

Nitrate Pollution Mapping for Reservoirs Using Flexible Sensors Integrated with Underwater Robot (2025)
Journal Article
Markapudi, P. R., Beg, M., Kadara, R. O., Paul, F., Kerrouche, A., See, C. H., & Manjakkal, L. (online). Nitrate Pollution Mapping for Reservoirs Using Flexible Sensors Integrated with Underwater Robot. IEEE Internet of Things Journal, https://doi.org/10.1109/JIOT.2025.3588067

Water pollution monitoring is crucial for environmental protection, playing a key role in safeguarding ecosystems, protecting public health and promoting sustainable development. However, traditional methods face challenges related to accessibility,... Read More about Nitrate Pollution Mapping for Reservoirs Using Flexible Sensors Integrated with Underwater Robot.

Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices (2025)
Journal Article
Patterson, J. C., Buchanan, W. J., & Turino, C. (2025). Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices. Journal of Cybersecurity and Privacy, 5(3), Article 42. https://doi.org/10.3390/jcp5030042

The emergence of quantum computing and Shor's algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques. The NIST has responded by standardising Post-Quantum Cryptography (PQC) algorith... Read More about Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices.

Anamorphic Cryptography using Baby-Step Giant-Step Recovery (2025)
Presentation / Conference Contribution
Buchanan, W. J., & Gilchrist, J. (2025, September). Anamorphic Cryptography using Baby-Step Giant-Step Recovery. Presented at 14th International Conference on Cryptography and Information Security, Copenhagen, Denmark

In 2022, Persianom, Phan and Yung outlined the creation of Anamor-phic Cryptography. With this, we can create a public key to encrypt data, and then have two secret keys. These secret keys are used to decrypt the cipher into different messages. So, o... Read More about Anamorphic Cryptography using Baby-Step Giant-Step Recovery.

PIM Backup Designated Router Procedure draft-ietf-pim-bdr-03 (2025)
Other
Mishra, M., Budhiraja, A., Neema, J., Romdhani, I., & Mishra, G. (2025). PIM Backup Designated Router Procedure draft-ietf-pim-bdr-03

On a multi-access network, one of the PIM routers is elected as a Designated Router (DR). On the last hop LAN, the PIM DR is responsible for tracking local multicast listeners and forwarding traffic to these listeners if the group is operating in PIM... Read More about PIM Backup Designated Router Procedure draft-ietf-pim-bdr-03.

A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols (2025)
Journal Article
Alahmadi, H., Bouabdallah, F., Al-Dubai, A., Ghaleb, B., Hussain, A., Chamola, V., Hawbani, A., Zhao, L., & Yu, R. (in press). A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols. Communications Surveys and Tutorials,

Long Range (LoRa) networks have emerged as a vital solution catering to applications requiring coverage over relatively long distances in the world of Internet of Things (IoT), where connectivity and efficient data transmission are paramount. LoRa’s... Read More about A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols.

TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing (2025)
Journal Article
Ali, H., Buchanan, W. J., Ahmad, J., Abubakar, M., Khan, M. S., & Wadhaj, I. (2025). TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing. Future Internet, 17(7), Article 289. https://doi.org/10.3390/fi17070289

We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries. Leveraging Hyperledger Fabric, the architecture suppo... Read More about TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing.

Perceptually Aware Communication in High-Risk Environments: A Conceptual Framework (2025)
Report
McGregor, I. (2025). Perceptually Aware Communication in High-Risk Environments: A Conceptual Framework. Edinburgh Napier University

This paper presents a conceptual framework for perceptually optimised audio communication in high-risk and acoustically challenging environments. Drawing on principles from sound design, auditory ergonomics, and professional communication systems, th... Read More about Perceptually Aware Communication in High-Risk Environments: A Conceptual Framework.

Adaptive Sound Ethics Framework: Consent, Tone, and Respect in Feedback Design (2025)
Report
McGregor, I. (2025). Adaptive Sound Ethics Framework: Consent, Tone, and Respect in Feedback Design. Geneva, Switzerland (Zenodo is hosted by CERN): Edinburgh Napier University

This technical report outlines an ethical framework for adaptive sound feedback systems grounded in behavioural consent, emotional tone sensitivity, and user autonomy. It introduces novel concepts including passive consent loops, quiet mode, tone mis... Read More about Adaptive Sound Ethics Framework: Consent, Tone, and Respect in Feedback Design.

Discipline-Sensitive Predictive Analytics for IPA-Driven Building Maintenance Management: Material Stock Quantity Modeling (2025)
Journal Article
Huang, Z., Liu, X., & Romdhani, I. (online). Discipline-Sensitive Predictive Analytics for IPA-Driven Building Maintenance Management: Material Stock Quantity Modeling. Journal of Data Science and Intelligent Systems, https://doi.org/10.47852/bonviewJDSIS52023947

The study introduces a machine learning model for BMM (Building Maintenance Management), which utilized IPA (Intelligent Process Automation) to predict the material stock required in a period, to manage the cost efficiency. Traditional BMM approaches... Read More about Discipline-Sensitive Predictive Analytics for IPA-Driven Building Maintenance Management: Material Stock Quantity Modeling.

Stethoscope 2.0: How Everyday Devices Could Help Doctors Listen Differently (2025)
Report
McGregor, I. (2025). Stethoscope 2.0: How Everyday Devices Could Help Doctors Listen Differently

Traditional diagnostic tools like the stethoscope have long helped clinicians detect signs of illness through direct contact and active listening. In an era of ubiquitous sensing, the diagnostic potential of devices already in common use, smartphones... Read More about Stethoscope 2.0: How Everyday Devices Could Help Doctors Listen Differently.