Date


People

Download Available

Library Of Congress

Dewey Decimal

4062 results

Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges

Journal Article
Liu, Q., Yang, Z., Ji, R., Zhang, Y., Bilal, M., Liu, X., …Xu, X. (2023)
Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges. IEEE Systems, Man, and Cybernetics Magazine, 9(4), 4-12. https://doi.org/10.1109/msmc.2022.3216943
Radars are widely used to obtain echo information for effective prediction, such as precipitation nowcasting. In this article, recent relevant scientific investigation and pra...

Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle

Conference Proceeding
Cunningham, S., & Mcgregor, I. (2022)
Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle. In AM '22: Audio Mostly 2022
Foley artistry is an essential part of the audio post-production process for film, television, games, and animation. By extension, it is as crucial in emergent media such as v...

Selected poems: Lorna Lloyd

Book
Ryan, B., & Hall, H. (Eds.)
(2022). Selected poems: Lorna Lloyd. Edinburgh: Edinburgh Napier University
This volume comprises 37 poems by Lorna Lloyd (1914-1942) arranged by date of composition: 1928-1930 (11); early 1930s (11); mid to late 1930s (10); early 1940s (5). It was pr...

Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World

Book
Urquhart, N. (2022)
Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World. Cham: Springer. https://doi.org/10.1007/978-3-030-98108-2
This book explains classic routing and transportation problems and solutions, before offering insights based on successful real-world solutions. The chapters in Part I introdu...

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device

Conference Proceeding
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022)
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP (551-561). https://doi.org/10.5220/0010903000003120
Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on ...

Developing a Digital ForensicsTerminology Using Natural Language Processing

Conference Proceeding
Le Gall, M., Cole, C., Haynes, D., & Nic Daeid, N. (2022)
Developing a Digital ForensicsTerminology Using Natural Language Processing. In M. Lykke, T. Svarre, D. Haynes, M. Skov, M. Thellesfsen, & D. Martinez-Avila (Eds.), Knowledge Organization across Disciplines, Domains, Services and Technologies: Proceedings of the Seventeenth International ISKO Conference (173-186

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for sing...

Signalling new opportunities? An analysis of UK job adverts for degree apprenticeships

Journal Article
Fabian, K., Taylor-Smith, E., Smith, S., & Bratton, A. (in press)
Signalling new opportunities? An analysis of UK job adverts for degree apprenticeships. Higher Education, Skills and Work-based Learning, https://doi.org/10.1108/HESWBL-02-2022-0037
Purpose The purpose of this study is to gain insight into the degree apprenticeship labour market and employers’ strategies for apprenticeship recruitment using job advertisem...

Editorial: 6G Wireless Communication Systems- Applications, Opportunities and Challenges

Journal Article
Anoh, K., See, C. H., Dama, Y., Abd-Alhameed, R. A., & Keates, S. (2022)
Editorial: 6G Wireless Communication Systems- Applications, Opportunities and Challenges. Future Internet, 14(12), Article 379. https://doi.org/10.3390/fi14120379
As the technical specifications of the 5th Generation (5G) wireless communication standard are being wrapped up, there are growing efforts amongst researchers, industrialists ...

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract)

Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022)
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8
Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detect...

Date


People

385 results

Cross-lingual Audio-visual Speech Enhancement based on Deep Multimodal Learning

2023 - 2025
Speech enhancement and separation techniques are often used to improve the quality and intelligibility of speech degraded by background distractions, including speech and non-speech noises. We aim to ...
Funder: Royal Society of Edinburgh | Value: £12,000

Development of fuel cell three-wheeler for urban green transportation in India

2023 - 2025
The proposed consortium aims at developing a technological framework for renewable energy networks and smart wireless Charging infrastructure to cater the demand from sustainable...
Funder: Royal Academy of Engineering

Towards multilingual audio-visual speech enhancement in real noisy environments

2023 - 2025
Speech enhancement aims to improve the overall quality and intelligibility of speech degraded by noise sources in real-world noisy environments. In recent years, researchers have proposed audio-visual...
Funder: Royal Society | Value: £12,000

On the executability and malicious retention of adversarial malware samples generated using adversarial learning.

2023 - 2023
A SICSA Sponsored Research Theme Event Machine Learning (ML) models have been shown to be vulnerable to adversarial examples designed to fool ML models to classify them as benign rather than malicious...
Funder: The Scottish Informatics & Computer Science Alliance

Placements for tech start-ups and scalars

2023 - 2023
The aim of this proposal is to prepare the groundwork for a sustainable pipeline for placement students wanting to work in tech Scale-ups and Start-ups in Scotland. Employers and students will be prov...
Funder: Skills Development Scotland

LastingAsset: Scottish Enterprise Opportunity Creation HGSP

2022 - 2023
Web3 is described as the evolution of the world wide web from the internet of information to the internet of value. The underlying goal of Web3 is a decentralised system where users control their own ...
Funder: Scottish Enterprise | Value: £74,936

Software-Hardware Ecosystems for AI Edge Devices (SHE)

2022 - 2023
AI hardware solutions are only useful if they’re compatible with all other layers of the technology stack, including the solutions and use cases in the services layer. Researchers in AI hardware can t...
Funder: Royal Academy of Engineering | Value: £32,700

Fixing the Future: The Right to Repair and Equal-IoT

2022 - 2024
Our 2-year interdisciplinary project will investigate how the lack of repairability in the consumer Internet of Things (IoT) will adversely impact equity, inclusion, and sustainability in the digital ...
Funder: Engineering and Physical Sciences Research Council | Value: £94,392

EPSRC DTP Studentships

2022 - 2028
EPSRC Doctoral Training Partnership allocation 2022-24
Funder: Engineering and Physical Sciences Research Council | Value: £989,845

Gendered information landscapes and their impact on routes into and through apprenticeships

2022 - 2025
The aim is to understand the myriad sources of gender stereotyping that impact on young people’s choices around apprenticeships and work-based learning (WBL). First, by a policy and literature review ...
Funder: Skills Development Scotland | Value: £57,117

Date


School

People

Qualification level

42 results

From algorithm selection to generation using deep learning

2018 - 2022
Mhd Rateb Mhd Ziad Alissa | Director of Studies: Dr Kevin Sim | Second Supervisor: Prof Emma Hart

Advancements in privacy enhancing technologies for machine learning

2018 - date
Adam Hall | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Nick Pitropakis

Identity and identification in an information society: Augmenting formal systems of identification with technological artefacts

2018 - date
Mr Will Abramson | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Owen Lo

Industrial control systems cybersecurity analysis and countermeasures

2017 - 2021
Andres Santiago Robles Durazno | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: James McWhinnie

Enabling female student interaction in synchronous virtual classrooms in Saudi Higher Education

2017 - 2022
Najla Alamri | Director of Studies: Prof Sally Smith | Second Supervisor: Dr Colin Smith

The evolutionary iron law of oligarchy

2016 - 2020
Explaining the origin and the evolution of cooperation has been a major challenge in many scientific fields. One of the outstanding species are humans, who are ca...
Cedric Perret | Director of Studies: Dr Simon Powers | Second Supervisor: Prof Emma Hart

Investigations into decrypting live secure traffic in virtual environments

2016 - 2019
Dr Peter McLaren | Director of Studies: Dr Gordon Russell | Second Supervisor: Prof Bill Buchanan

The impact of usability, social and organisational factors on students' use of learning management systems in Saudi tertiary education

2016 - 2021
Ahmed Alshehri | Director of Studies: Dr M J Rutter | Second Supervisor: Prof Sally Smith

Youth digital culture co-creation: Measuring social impact in Scotland

2016 - 2019
Alicja Pawluczuk | Director of Studies: Dr Gemma Webster | Second Supervisor: Dr Colin Smith

Investigating and understanding the theoretical constructs and technical impactors on immersive dome user experience

2016 - 2019
Michael McKellar | Director of Studies: Dr Oli Mival | Second Supervisor: Prof David Benyon

Date


Date