Date


People

Download Available

Library Of Congress

Dewey Decimal

4062 results

Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges

Journal Article
Liu, Q., Yang, Z., Ji, R., Zhang, Y., Bilal, M., Liu, X., …Xu, X. (2023)
Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges. IEEE Systems, Man, and Cybernetics Magazine, 9(4), 4-12. https://doi.org/10.1109/msmc.2022.3216943
Radars are widely used to obtain echo information for effective prediction, such as precipitation nowcasting. In this article, recent relevant scientific investigation and pra...

Developing a Digital ForensicsTerminology Using Natural Language Processing

Conference Proceeding
Le Gall, M., Cole, C., Haynes, D., & Nic Daeid, N. (2022)
Developing a Digital ForensicsTerminology Using Natural Language Processing. In M. Lykke, T. Svarre, D. Haynes, M. Skov, M. Thellesfsen, & D. Martinez-Avila (Eds.), Knowledge Organization across Disciplines, Domains, Services and Technologies: Proceedings of the Seventeenth International ISKO Conference (173-186

Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle

Conference Proceeding
Cunningham, S., & Mcgregor, I. (2022)
Manipulating Foley Footsteps and Character Realism to Influence Audience Perceptions of a 3D Animated Walk Cycle. In AM '22: Audio Mostly 2022
Foley artistry is an essential part of the audio post-production process for film, television, games, and animation. By extension, it is as crucial in emergent media such as v...

Selected poems: Lorna Lloyd

Book
Ryan, B., & Hall, H. (Eds.)
(2022). Selected poems: Lorna Lloyd. Edinburgh: Edinburgh Napier University
This volume comprises 37 poems by Lorna Lloyd (1914-1942) arranged by date of composition: 1928-1930 (11); early 1930s (11); mid to late 1930s (10); early 1940s (5). It was pr...

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for sing...

Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World

Book
Urquhart, N. (2022)
Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World. Cham: Springer. https://doi.org/10.1007/978-3-030-98108-2
This book explains classic routing and transportation problems and solutions, before offering insights based on successful real-world solutions. The chapters in Part I introdu...

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device

Conference Proceeding
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022)
Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP (551-561). https://doi.org/10.5220/0010903000003120
Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on ...

Signalling new opportunities? An analysis of UK job adverts for degree apprenticeships

Journal Article
Fabian, K., Taylor-Smith, E., Smith, S., & Bratton, A. (in press)
Signalling new opportunities? An analysis of UK job adverts for degree apprenticeships. Higher Education, Skills and Work-based Learning, https://doi.org/10.1108/HESWBL-02-2022-0037
Purpose The purpose of this study is to gain insight into the degree apprenticeship labour market and employers’ strategies for apprenticeship recruitment using job advertisem...

Editorial: 6G Wireless Communication Systems- Applications, Opportunities and Challenges

Journal Article
Anoh, K., See, C. H., Dama, Y., Abd-Alhameed, R. A., & Keates, S. (2022)
Editorial: 6G Wireless Communication Systems- Applications, Opportunities and Challenges. Future Internet, 14(12), Article 379. https://doi.org/10.3390/fi14120379
As the technical specifications of the 5th Generation (5G) wireless communication standard are being wrapped up, there are growing efforts amongst researchers, industrialists ...

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract)

Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022)
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8
Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detect...

Date


People

385 results

Cross-lingual Audio-visual Speech Enhancement based on Deep Multimodal Learning

2023 - 2025
Speech enhancement and separation techniques are often used to improve the quality and intelligibility of speech degraded by background distractions, including speech and non-speech noises. We aim to ...
Funder: Royal Society of Edinburgh | Value: £12,000

Development of fuel cell three-wheeler for urban green transportation in India

2023 - 2025
The proposed consortium aims at developing a technological framework for renewable energy networks and smart wireless Charging infrastructure to cater the demand from sustainable...
Funder: Royal Academy of Engineering

Towards multilingual audio-visual speech enhancement in real noisy environments

2023 - 2025
Speech enhancement aims to improve the overall quality and intelligibility of speech degraded by noise sources in real-world noisy environments. In recent years, researchers have proposed audio-visual...
Funder: Royal Society | Value: £12,000

On the executability and malicious retention of adversarial malware samples generated using adversarial learning.

2023 - 2023
A SICSA Sponsored Research Theme Event Machine Learning (ML) models have been shown to be vulnerable to adversarial examples designed to fool ML models to classify them as benign rather than malicious...
Funder: The Scottish Informatics & Computer Science Alliance

Placements for tech start-ups and scalars

2023 - 2023
The aim of this proposal is to prepare the groundwork for a sustainable pipeline for placement students wanting to work in tech Scale-ups and Start-ups in Scotland. Employers and students will be prov...
Funder: Skills Development Scotland

LastingAsset: Scottish Enterprise Opportunity Creation HGSP

2022 - 2023
Web3 is described as the evolution of the world wide web from the internet of information to the internet of value. The underlying goal of Web3 is a decentralised system where users control their own ...
Funder: Scottish Enterprise | Value: £74,936

Software-Hardware Ecosystems for AI Edge Devices (SHE)

2022 - 2023
AI hardware solutions are only useful if they’re compatible with all other layers of the technology stack, including the solutions and use cases in the services layer. Researchers in AI hardware can t...
Funder: Royal Academy of Engineering | Value: £32,700

Fixing the Future: The Right to Repair and Equal-IoT

2022 - 2024
Our 2-year interdisciplinary project will investigate how the lack of repairability in the consumer Internet of Things (IoT) will adversely impact equity, inclusion, and sustainability in the digital ...
Funder: Engineering and Physical Sciences Research Council | Value: £94,392

EPSRC DTP Studentships

2022 - 2028
EPSRC Doctoral Training Partnership allocation 2022-24
Funder: Engineering and Physical Sciences Research Council | Value: £989,845

Gendered information landscapes and their impact on routes into and through apprenticeships

2022 - 2025
The aim is to understand the myriad sources of gender stereotyping that impact on young people’s choices around apprenticeships and work-based learning (WBL). First, by a policy and literature review ...
Funder: Skills Development Scotland | Value: £57,117

Date


School

People

Qualification level

42 results

From algorithm selection to generation using deep learning

2018 - 2022
Mhd Rateb Mhd Ziad Alissa | Director of Studies: Dr Kevin Sim | Second Supervisor: Prof Emma Hart

Advancements in privacy enhancing technologies for machine learning

2018 - date
Adam Hall | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Nick Pitropakis

Identity and identification in an information society: Augmenting formal systems of identification with technological artefacts

2018 - date
Mr Will Abramson | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Owen Lo

Industrial control systems cybersecurity analysis and countermeasures

2017 - 2021
Andres Santiago Robles Durazno | Director of Studies: Dr Naghmeh Moradpoor Sheykhkanloo | Second Supervisor: James McWhinnie

Enabling female student interaction in synchronous virtual classrooms in Saudi Higher Education

2017 - 2022
Najla Alamri | Director of Studies: Prof Sally Smith | Second Supervisor: Dr Colin Smith

Investigating and understanding the theoretical constructs and technical impactors on immersive dome user experience

2016 - 2019
Michael McKellar | Director of Studies: Dr Oli Mival | Second Supervisor: Prof David Benyon

3D printing education as a means of building confidence and preparing children for skills considered necessary for the 21st century. A grounded theory study verified by empirical research

2016 - 2020
This research...
Denise Milne | Director of Studies: Dr Sam Vettese | Second Supervisor: Dr Ian Lambert

The evolutionary iron law of oligarchy

2016 - 2020
Explaining the origin and the evolution of cooperation has been a major challenge in many scientific fields. One of the outstanding species are humans, who are ca...
Cedric Perret | Director of Studies: Dr Simon Powers | Second Supervisor: Prof Emma Hart

Investigations into decrypting live secure traffic in virtual environments

2016 - 2019
Dr Peter McLaren | Director of Studies: Dr Gordon Russell | Second Supervisor: Prof Bill Buchanan

The impact of usability, social and organisational factors on students' use of learning management systems in Saudi tertiary education

2016 - 2021
Ahmed Alshehri | Director of Studies: Dr M J Rutter | Second Supervisor: Prof Sally Smith

Date


121 results

Prof . Emma Hart gives interview "An Insider's Guide to Evolutionary Computation"

17 December 2018
Laura van Beers from ContactEngine, a London based company delivering software that enables its customers to proactively engage customers in AI-driven conversations to fulfil their business objective...

Prof. Emma Hart invited to talk at Scotland IS Software Engineering Leader's Forum to discuss SICSA's work on AI

20 November 2018
Prof. Emma Hart gave an invited talk at the monthly meet-up of the Scotland IS Software Engineering forum on behalf of the SICSA AI theme to describe the work taking place across Scottish Universities...

MEmorial Project awarded prestigious residency

19 October 2018
The MEMorial Project, has been awarded a residency at the Museum of Loss and Renewal Collomachia Italy.

Edinburgh Napier University has the greatest representation at the prestigious Scottish Cyber Awards

10 October 2018
Edinburgh Napier University has once more a great presence in the Scottish Cyber Awards, with six (direct and indirect finalists) in five categories.

Scottish Cyber Awards: Basil Manoussos (Manager of The Cyber Academy) nominated for Cyber Evangelist of the Year

9 October 2018
Basil Manoussos, the Manager of The Cyber Academy at the School of Computing is a finalist for the prestigious Cyber Evangelist of the Year (2018)

Prof. Emma Hart interviewed in new video released by Sentient AI to provide unique insights to business leaders on the growing applicability of evolutionary computation

13 August 2018
Sentient Technologies, a world leader in artificial intelligence (AI) products based on evolutionary computation, today announced a new video collection that provides unique insights to the burgeonin...

Prof. Emma Hart and Dr Kevin Sim win Bronze Award in International Humies competition for work on predicting wind damage in Forestry

18 July 2018
The Annual Humies prize is awarded at the International Conference on Genetic and Evolutionary Computation for human-competitive results that have been produced by any form of genetic and evolutionar...

Evolutionary Robotics Research Nominated for Best Paper Award

14 July 2018
Prof. Emma Hart, Dr Andreas Steyven and Prof. Ben Paechter have been nominated for a prestigious best paper award at the GECCO 18, Kyoto, Japan for new work in evolving a diverse team of swarm robot...

Big Data in Cyber Security Conference

30 May 2018
Big Data in Cyber Security Conference held at Craiglockhart

OSINT - Open Source Intelligence course

21 May 2018
OSINT course delivered to Scottish Paralegal Associatio

Date