Skip to main content

Research Repository

Advanced Search

Outputs (3498)

Building an Embodied Musicking Dataset for co-creative music-making (2024)
Presentation / Conference Contribution
Vear, C., Poltronieri, F., Di Donato, B., Zhang, Y., Benerradi, J., Hutchinson, S., Turowski, P., Shell, J., & Malekmohamadi, H. (2024, April). Building an Embodied Musicking Dataset for co-creative music-making. Presented at Evostar 2024: The Leading European Event on Bio‑Inspired Computation, Aberystwyth, Wales, United Kingdom

In this paper, we present our findings of the design, development and deployment of a proof-of-concept dataset that captures some of the physiological, musicological, and psychological aspects of embodied musicking. After outlining the conceptual ele... Read More about Building an Embodied Musicking Dataset for co-creative music-making.

Enterprise Education and Employability Skills: adapting the DOTS Model to enhance career development – evidence from a Scottish International MBA Programme (2024)
Book Chapter
Harte, P., Fonseca, A. P., Hill, E., & Hosanoo, Z. A. (2024). Enterprise Education and Employability Skills: adapting the DOTS Model to enhance career development – evidence from a Scottish International MBA Programme. In R. J. Crammond, & D. Hyams-Ssekasi (Eds.), Entrepreneurship Education and Internationalisation: Cases, Collaborations, and Contexts (65-85). Routledge. https://doi.org/10.4324/9781003378570-7

This chapter uses theory and application to discuss the importance of enterprise education and employability skills in the MBA curriculum. Edinburgh Napier Business School academics and career development consultants collaborate to develop a theory/p... Read More about Enterprise Education and Employability Skills: adapting the DOTS Model to enhance career development – evidence from a Scottish International MBA Programme.

Perceived barriers to implementing building information modeling in Iranian Small and Medium-Sized Enterprises (SMEs): a Delphi survey of construction experts (2024)
Journal Article
Sarvari, H., Asaadsamani, P., Olawumi, T. O., Chan, D. W., Rashidi, A., & Beer, M. (2024). Perceived barriers to implementing building information modeling in Iranian Small and Medium-Sized Enterprises (SMEs): a Delphi survey of construction experts. Architectural Engineering and Design Management, 20(3), 673-693. https://doi.org/10.1080/17452007.2024.2329687

Building information modeling (BIM) is a disruptive information technology tool in the construction sector. Although this technology had a significant impact on the manufacturing industries, it, like any other technology, encountered several challeng... Read More about Perceived barriers to implementing building information modeling in Iranian Small and Medium-Sized Enterprises (SMEs): a Delphi survey of construction experts.

Wireless Power Transfer Technologies, Applications, and Future Trends: A Review (2024)
Journal Article
Alabsi, A., Hawbani, A., Wang, X., Al-Dubai, A., Hu, J., Aziz, S. A., Kumar, S., Zhao, L., Shvetsov, A. V., & Alsamhi, S. H. (2025). Wireless Power Transfer Technologies, Applications, and Future Trends: A Review. IEEE Transactions on Sustainable Computing, 10(1), 1-17. https://doi.org/10.1109/TSUSC.2024.3380607

Wireless Power Transfer (WPT) is a disruptive technology that allows wireless energy provisioning for energy- limited IoT devices, thus decreasing the over-reliance on batteries and wires. WPT could replace conventional energy provisioning (e.g., ene... Read More about Wireless Power Transfer Technologies, Applications, and Future Trends: A Review.

A Hierarchical Approach to Evolving Behaviour-Trees for Swarm Control (2024)
Presentation / Conference Contribution
Montague, K., Hart, E., & Paechter, B. (2024, April). A Hierarchical Approach to Evolving Behaviour-Trees for Swarm Control. Presented at EvoStar 2024, Aberystwyth

Behaviour trees (BTs) are commonly used as controllers in robotic swarms due their modular composition and to the fact that they can be easily interpreted by humans. From an algorithmic perspective, an additional advantage is that extra modules can e... Read More about A Hierarchical Approach to Evolving Behaviour-Trees for Swarm Control.

On the Utility of Probing Trajectories for Algorithm-Selection (2024)
Presentation / Conference Contribution
Renau, Q., & Hart, E. (2024, April). On the Utility of Probing Trajectories for Algorithm-Selection. Presented at EvoStar 2024, Aberystwyth, UK

Machine-learning approaches to algorithm-selection typically take data describing an instance as input. Input data can take the form of features derived from the instance description or fitness landscape , or can be a direct representation of the ins... Read More about On the Utility of Probing Trajectories for Algorithm-Selection.

Generalized Early Stopping in Evolutionary Direct Policy Search (2024)
Journal Article
Arza, E., Le Goff, L. K., & Hart, E. (2024). Generalized Early Stopping in Evolutionary Direct Policy Search. ACM Transactions on Evolutionary Learning and Optimization, 4(3), Article 14. https://doi.org/10.1145/3653024

Lengthy evaluation times are common in many optimization problems such as direct policy search tasks, especially when they involve conducting evaluations in the physical world, e.g. in robotics applications. Often when evaluating solution over a fixe... Read More about Generalized Early Stopping in Evolutionary Direct Policy Search.

Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks (2024)
Journal Article
Bhatti, D. S., Saleem, S., Ali, Z., Park, T.-J., Suh, B., Kamran, A., Buchanan, W. J., & Kim, K.-I. (2024). Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks. IEEE Access, 12, 41499-41516. https://doi.org/10.1109/access.2024.3377144

Wireless Sensor Networks (WSN) are deployed on a large scale and require protection from malicious energy drainage attacks, particularly those directed at the routing layer. The complexity increases during critical operations like cluster head select... Read More about Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks.

Cluster-based oversampling with area extraction from representative points for class imbalance learning (2024)
Journal Article
Farou, Z., Wang, Y., & Horváth, T. (2024). Cluster-based oversampling with area extraction from representative points for class imbalance learning. Intelligent Systems with Applications, 22, Article 200357. https://doi.org/10.1016/j.iswa.2024.200357

Class imbalance learning is challenging in various domains where training datasets exhibit disproportionate samples in a specific class. Resampling methods have been used to adjust the class distribution, but they often have limitations for small dis... Read More about Cluster-based oversampling with area extraction from representative points for class imbalance learning.

PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework (2024)
Presentation / Conference Contribution
Mckeown, S., Aaby, P., & Steyven, A. PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework. Presented at DFRWS EU 2024, Zaragoza, Spain

The automated comparison of visual content is a contemporary solution to scale the detection of illegal media and extremist material, both for detection on individual devices and in the cloud. However, the problem is difficult, and perceptual similar... Read More about PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework.

A Probability Mapping-Based Privacy Preservation Method for Social Networks (2024)
Presentation / Conference Contribution
Li, Q., Wang, Y., Wang, F., Tan, Z., & Wang, C. (2023, November). A Probability Mapping-Based Privacy Preservation Method for Social Networks. Presented at The 3rd International Conference on Ubiquitous Security 2023 (UbiSec-2023), Exeter

The mining and analysis of social networks can bring significant economic and social benefits. However, it also poses a risk of privacy leakages. Differential privacy is a de facto standard to prevent such leaks, but it suffers from the high sensitiv... Read More about A Probability Mapping-Based Privacy Preservation Method for Social Networks.

A spatio-temporal graph convolutional approach to real-time load forecasting in an edge-enabled distributed Internet of Smart Grids energy system (2024)
Journal Article
Liu, Q., Pan, L., Cao, X., Gan, J., Huang, X., & Liu, X. (2024). A spatio-temporal graph convolutional approach to real-time load forecasting in an edge-enabled distributed Internet of Smart Grids energy system. Concurrency and Computation: Practice and Experience, 36(13), Article e8060. https://doi.org/10.1002/cpe.8060

As the edge nodes of the Internet of Smart Grids (IoSG), smart sockets enable all kinds of power load data to be analyzed at the edge, which create conditions for edge calculation and real-time (RT) load forecasting. In this article, an edge-cloud co... Read More about A spatio-temporal graph convolutional approach to real-time load forecasting in an edge-enabled distributed Internet of Smart Grids energy system.

Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection (2024)
Presentation / Conference Contribution
Kalutharage, C. S., Liu, X., Chrysoulas, C., & Bamgboye, O. (2023, September). Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection. Presented at The 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection (CPS4CIP 2023) - in conjunction with ESORICS 2023, The Hague, Netherlands

Expressive Talking Avatars (2024)
Journal Article
Pan, Y., Tan, S., Cheng, S., Lin, Q., Zeng, Z., & Mitchell, K. (2024). Expressive Talking Avatars. IEEE Transactions on Visualization and Computer Graphics, 30(5), 2538-2548. https://doi.org/10.1109/TVCG.2024.3372047

Stylized avatars are common virtual representations used in VR to support interaction and communication between remote collaborators. However, explicit expressions are notoriously difficult to create, mainly because most current methods rely on geome... Read More about Expressive Talking Avatars.

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT (2024)
Journal Article
Alshehri, M. S., Ahmad, J., Almakdi, S., Qathrady, M. A., Ghadi, Y. Y., & Buchanan, W. J. (2024). SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT. IEEE Access, 12, https://doi.org/10.1109/access.2024.3371992

The rise of Internet of Things (IoT) has led to increased security risks, particularly from botnet attacks that exploit IoT device vulnerabilities. This situation necessitates effective Intrusion Detection Systems (IDS), that are accurate, lightweigh... Read More about SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT.

Digital Deviance/Digital Compliance: Criminology, Social Interaction and the Videogame (2024)
Report
Henry, A., & Horgan, S. (2024). Digital Deviance/Digital Compliance: Criminology, Social Interaction and the Videogame. Scottish Centre for Crime and Justice Research

This project sought to begin a process of scoping out and developing criminological perspectives on videogames and the social worlds of videogames and gamers through two interactive workshops. Its starting orientation was social interactionism and th... Read More about Digital Deviance/Digital Compliance: Criminology, Social Interaction and the Videogame.

Hearing Abilities Assessment (2024)
Patent
McGregor, I. (2024). Hearing Abilities Assessment. W O 2024/041821 A1. World Intellectual Property Organization International Bureau

A method for assessing hearing abilities of a human person having two ears, the method comprising: - providing two audio signals to two respective ear speakers at a person's corresponding ears; - measuring at least one value of at least one parameter... Read More about Hearing Abilities Assessment.

STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation (2024)
Journal Article
Fang, M., Yu, L., Xie, H., Tan, Q., Tan, Z., Hussain, A., Wang, Z., Li, J., & Tian, Z. (2024). STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation. IEEE Transactions on Computational Social Systems, 11(4), 5354 - 5366. https://doi.org/10.1109/tcss.2024.3356549

The impressive development of facial manipulation techniques has raised severe public concerns. Identity-aware methods, especially suitable for protecting celebrities, are seen as one of promising face forgery detection approaches with additional ref... Read More about STIDNet: Identity-Aware Face Forgery Detection with Spatiotemporal Knowledge Distillation.