Date


People

Download Available

Library Of Congress

Dewey Decimal

4062 results

Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges

Journal Article
Liu, Q., Yang, Z., Ji, R., Zhang, Y., Bilal, M., Liu, X., …Xu, X. (2023)
Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges. IEEE Systems, Man, and Cybernetics Magazine, 9(4), 4-12. https://doi.org/10.1109/msmc.2022.3216943
Radars are widely used to obtain echo information for effective prediction, such as precipitation nowcasting. In this article, recent relevant scientific investigation and pra...

Developing a Digital ForensicsTerminology Using Natural Language Processing

Conference Proceeding
Le Gall, M., Cole, C., Haynes, D., & Nic Daeid, N. (2022)
Developing a Digital ForensicsTerminology Using Natural Language Processing. In M. Lykke, T. Svarre, D. Haynes, M. Skov, M. Thellesfsen, & D. Martinez-Avila (Eds.), Knowledge Organization across Disciplines, Domains, Services and Technologies: Proceedings of the Seventeenth International ISKO Conference (173-186

Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle

Conference Proceeding
Cunningham, S., & Mcgregor, I. (2022)
Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle. In AM '22: Audio Mostly 2022
Foley artistry is an essential part of the audio post-production process for film, television, games, and animation. By extension, it is as crucial in emergent media such as v...

Selected poems: Lorna Lloyd

Book
Ryan, B., & Hall, H. (Eds.)
(2022). Selected poems: Lorna Lloyd. Edinburgh: Edinburgh Napier University
This volume comprises 37 poems by Lorna Lloyd (1914-1942) arranged by date of composition: 1928-1930 (11); early 1930s (11); mid to late 1930s (10); early 1940s (5). It was pr...

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for sing...

Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World

Book
Urquhart, N. (2022)
Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World. Cham: Springer. https://doi.org/10.1007/978-3-030-98108-2
This book explains classic routing and transportation problems and solutions, before offering insights based on successful real-world solutions. The chapters in Part I introdu...

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device

Conference Proceeding
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022)
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP (551-561). https://doi.org/10.5220/0010903000003120
Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on ...

Signalling new opportunities? An analysis of UK job adverts for degree apprenticeships

Journal Article
Fabian, K., Taylor-Smith, E., Smith, S., & Bratton, A. (in press)
Signalling new opportunities? An analysis of UK job adverts for degree apprenticeships. Higher Education, Skills and Work-based Learning, https://doi.org/10.1108/HESWBL-02-2022-0037
Purpose The purpose of this study is to gain insight into the degree apprenticeship labour market and employers’ strategies for apprenticeship recruitment using job advertisem...

Editorial: 6G Wireless Communication Systems- Applications, Opportunities and Challenges

Journal Article
Anoh, K., See, C. H., Dama, Y., Abd-Alhameed, R. A., & Keates, S. (2022)
Editorial: 6G Wireless Communication Systems- Applications, Opportunities and Challenges. Future Internet, 14(12), Article 379. https://doi.org/10.3390/fi14120379
As the technical specifications of the 5th Generation (5G) wireless communication standard are being wrapped up, there are growing efforts amongst researchers, industrialists ...

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract)

Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022)
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8
Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detect...

Date


People

385 results

Cross-lingual Audio-visual Speech Enhancement based on Deep Multimodal Learning

2023 - 2025
Speech enhancement and separation techniques are often used to improve the quality and intelligibility of speech degraded by background distractions, including speech and non-speech noises. We aim to ...
Funder: Royal Society of Edinburgh | Value: £12,000

Development of fuel cell three-wheeler for urban green transportation in India

2023 - 2025
The proposed consortium aims at developing a technological framework for renewable energy networks and smart wireless Charging infrastructure to cater the demand from sustainable...
Funder: Royal Academy of Engineering

Towards multilingual audio-visual speech enhancement in real noisy environments

2023 - 2025
Speech enhancement aims to improve the overall quality and intelligibility of speech degraded by noise sources in real-world noisy environments. In recent years, researchers have proposed audio-visual...
Funder: Royal Society | Value: £12,000

On the executability and malicious retention of adversarial malware samples generated using adversarial learning.

2023 - 2023
A SICSA Sponsored Research Theme Event Machine Learning (ML) models have been shown to be vulnerable to adversarial examples designed to fool ML models to classify them as benign rather than malicious...
Funder: The Scottish Informatics & Computer Science Alliance

Placements for tech start-ups and scalars

2023 - 2023
The aim of this proposal is to prepare the groundwork for a sustainable pipeline for placement students wanting to work in tech Scale-ups and Start-ups in Scotland. Employers and students will be prov...
Funder: Skills Development Scotland

LastingAsset: Scottish Enterprise Opportunity Creation HGSP

2022 - 2023
Web3 is described as the evolution of the world wide web from the internet of information to the internet of value. The underlying goal of Web3 is a decentralised system where users control their own ...
Funder: Scottish Enterprise | Value: £74,936

Software-Hardware Ecosystems for AI Edge Devices (SHE)

2022 - 2023
AI hardware solutions are only useful if they’re compatible with all other layers of the technology stack, including the solutions and use cases in the services layer. Researchers in AI hardware can t...
Funder: Royal Academy of Engineering | Value: £32,700

Fixing the Future: The Right to Repair and Equal-IoT

2022 - 2024
Our 2-year interdisciplinary project will investigate how the lack of repairability in the consumer Internet of Things (IoT) will adversely impact equity, inclusion, and sustainability in the digital ...
Funder: Engineering and Physical Sciences Research Council | Value: £94,392

EPSRC DTP Studentships

2022 - 2028
EPSRC Doctoral Training Partnership allocation 2022-24
Funder: Engineering and Physical Sciences Research Council | Value: £989,845

Gendered information landscapes and their impact on routes into and through apprenticeships

2022 - 2025
The aim is to understand the myriad sources of gender stereotyping that impact on young people’s choices around apprenticeships and work-based learning (WBL). First, by a policy and literature review ...
Funder: Skills Development Scotland | Value: £57,117

Date


School

People

Qualification level

42 results

From algorithm selection to generation using deep learning

2018 - 2022
Mhd Rateb Mhd Ziad Alissa | Director of Studies: Dr Kevin Sim | Second Supervisor: Prof Emma Hart

Advancements in privacy enhancing technologies for machine learning

2018 - date
Adam Hall | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Nick Pitropakis

Identity and identification in an information society: Augmenting formal systems of identification with technological artefacts

2018 - date
Mr Will Abramson | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Owen Lo

Industrial control systems cybersecurity analysis and countermeasures

2017 - 2021
Andres Santiago Robles Durazno | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: James McWhinnie

Enabling female student interaction in synchronous virtual classrooms in Saudi Higher Education

2017 - 2022
Najla Alamri | Director of Studies: Prof Sally Smith | Second Supervisor: Dr Colin Smith

Investigating and understanding the theoretical constructs and technical impactors on immersive dome user experience

2016 - 2019
Michael McKellar | Director of Studies: Dr Oli Mival | Second Supervisor: Prof David Benyon

3D printing education as a means of building confidence and preparing children for skills considered necessary for the 21st century. A grounded theory study verified by empirical research

2016 - 2020
This research...
Denise Milne | Director of Studies: Dr Sam Vettese | Second Supervisor: Dr Ian Lambert

The evolutionary iron law of oligarchy

2016 - 2020
Explaining the origin and the evolution of cooperation has been a major challenge in many scientific fields. One of the outstanding species are humans, who are ca...
Cedric Perret | Director of Studies: Dr Simon Powers | Second Supervisor: Prof Emma Hart

Investigations into decrypting live secure traffic in virtual environments

2016 - 2019
Dr Peter McLaren | Director of Studies: Dr Gordon Russell | Second Supervisor: Prof Bill Buchanan

The impact of usability, social and organisational factors on students' use of learning management systems in Saudi tertiary education

2016 - 2021
Ahmed Alshehri | Director of Studies: Dr M J Rutter | Second Supervisor: Prof Sally Smith

Date


121 results

Promising cyber security project supported by new Scottish Enterprise funding

20 September 2022
TrueDeploy, an exciting project from the School of Computing, Engineering & the Built Environment (SCEBE) at Edinburgh Napier University (ENU), has secured £199,952 in additional support from Scottish...

New leader of Social Informatics research group

31 August 2022
Peter Cruickshank now leader of the Social Informatics research group

Double funding success for School of Computing

21 March 2022
Two projects from Edinburgh Napier’s acclaimed School of Computing have won funding from a programme which develops innovative cyber security ideas for the commercial market. TrueDeploy and Trustd ar...

Dr Tom Flint awarded prestigious R&D funding

16 November 2020
Dr Tom Flint from the School of Computing at Edinburgh Napier University has been named as a member of one of the groups in the funded R&D phase of Festival UK 2022.

Dr Webster becomes a full member of the EPSRC Peer Review College

30 October 2020
Dr Gemma Webster has been promoted from the EPSRC Associate College to Full College membership.

School of Computing Group Project Prize 2020

3 May 2020
The winners of the best group project 2020 are chosen in an online event by Computershare.

School of Computing Hosts Easter Egg hunt online in Jupiter Artland in Minecraft

11 April 2020
Children from across Scotland gathered together in virtual space for an Easter Egg hunt hosted in Jupiter Artland in Minecraft during the lockdown.

University teams up with community researchers to help improve their neighbourhood

6 February 2020
A Team of community researchers will join forces with academics to help improve their neighbourhood. UK Research and Innovation today announced its backing for the Seven Kingdoms of Wester Hailes, on...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

Date