There has been a huge growth in the use of virtualised technologies for computing. This includes fully virtualised servers in the cloud, as well as more lightweight solutions such as containers or docker. Read more
The emergence of Internet of Things (IoT) has formed a bridge that connects most of the real-world entities with the related computing entities. Read more
Hyper-heuristics (HH) have been successfully used to solve combinatorial problems from different problem domains, such as vehicle routing, bin packing and constraint satisfaction problems. Read more
Building blocks for the so-called "Internet of Value" are provided by blockchain and distributed ledger technology (DLT), which allow for the recording… Read more
Building blocks for the so-called "Internet of Value" are provided by blockchain and distributed ledger technology (DLT), which allow for the recording… Read more
Edinburgh Napier University is ranked the top modern University in Scotland in the 2022 Times World University Rankings. The School of Computing, Engineering, and the Built Environment is highly regarded. Read more
The proliferation of Big Data analytics is developing ever more sophisticated models for intelligent data-driven insight and decision making in business and in other areas such as health and social care. Read more
The increasing availability of sensors and smart things has caused a rise in Internet of Things (IoT) applications. Such technologies has permeated into every aspects of human activities, including technological advancement. Read more
The UK and the EU have both recently updated their legislation to put net zero emissions targets in place for 2050. This requires moving away from using fossil fuels for energy generation, and moving towards renewable sources such as photovoltaic cells and wind turbines. Read more
Blockchain and Distributed Ledger Technology (DLT) provide building blocks of the so-called “Internet of Value”, since they enable recording of interactions and transfer “value” referring to any record of ownership of asset - for example, money, securities, land titles – and ownership of specific information like identity, health information as well as other personal data. Read more
Cyberattacks on Critical National Infrastructure (CNI) appear to be growing in occurrence and strength and Operational Technology (OT) networks have gradually become targets of attack for cyber criminals and state-sponsored hackers. Read more
Storage devices tend to store information in blocks, and the arrangement of blocks in a certain order is the thing which represents a data object. Read more
Multi-party computation (MPC) protocols enable multiple parties — each holding their own private data — to evaluate a computation without ever revealing any of the secret data held by each party. Read more
In the context of wider goals towards Sustainable Development Goals SDGs through Net Zero Energy Building nZEB. A combination of sustainable design and renewable energy harvesting strategies is a promising path to sustainable development in the construction sector. Read more
The project looks into the existing security vulnerabilities related to Shoulder Surfing attacks while using personal devices or smartphones. Read more
*Offer only available for the duration of your active subscription, and subject to change. You MUST claim your prize within 72 hours, if not we will redraw.
Create your myFindAPhD account to add this PhD to your shortlist to register for this event to receive updates on upcoming events
Due to your Facebook privacy settings, we were unable to create your account at this time. Please select another method to sign up.
We were unable to log you in with your Google account at this time. If you have third-party cookies blocked, please enable them, refresh, and try again.
We were unable to log you in with your Google account at this time. If you have third-party cookies blocked, please enable them, refresh, and try again.
Continue with Facebook
Looking to list your PhD opportunities? Log in here.