Recent Submissions

  • Modelling a multichannel security protocol to address Man in the Middle attacks 

    Alabdali, Aliaa Mahfooz Ali (Heriot-Watt University Mathematical and Computer Sciences, 2017-08)
    Unlike wired networks, wireless networks cannot be physically protected, mak ing them greatly at risk. This study looks into advanced ways of implementing security techniques in wireless networks. It proposes using model ...
  • Small population bias and sampling effects in stochastic mortality modelling 

    Chen, Liang (Heriot-Watt University Mathematical and Computer Sciences, 2017-06)
    Pension schemes are facing more difficulties on matching their underlying liabilities with assets, mainly due to faster mortality improvements for their underlying populations, better environments and medical treatments and ...
  • A self-mobile skeleton in the presence of external loads 

    Alsalkini, Turkey (Heriot-Watt University Mathematical and Computer Sciences, 2017-10)
    Multicore clusters provide cost-effective platforms for running CPU-intensive and data-intensive parallel applications. To effectively utilise these platforms, sharing their resources is needed amongst the applications rather ...
  • Categorical structures on bundle gerbes and higher geometric prequantisation 

    Bunk, Severin (Heriot-Watt University Mathematics and Computer Sciences, 2017-09)
    We present a construction of a 2-Hilbert space of sections of a bundle gerbe, a suitable candidate for a prequantum 2-Hilbert space in higher geometric quantisation. We start by briefly recalling the construction of the ...
  • Mathematical models for red squirrel conservation 

    Jones, Hannah Elizabeth Mary (Heriot-Watt University Mathematical and Computer Sciences, 2017-06)
    In this thesis we develop mathematical models to understand the process of ecological invasion when the invading species also carries a disease that is harmful to the native species. In particular we focus on a key case ...
  • Modelling a multichannel security protocol to address Man in the Middle attacks 

    Alabdali, Aliaa Mahfooz Ali (Heriot-Watt University Mathematical and Computer Sciences, 2017-08)
    Unlike wired networks, wireless networks cannot be physically protected, mak ing them greatly at risk. This study looks into advanced ways of implementing security techniques in wireless networks. It proposes using model ...
  • Small population bias and sampling effects in stochastic mortality modelling 

    Chen, Liang (Heriot-Watt University Mathematical and Computer Sciences, 2017-06)
    Pension schemes are facing more difficulties on matching their underlying liabilities with assets, mainly due to faster mortality improvements for their underlying populations, better environments and medical treatments and ...
  • A self-mobile skeleton in the presence of external loads 

    Alsalkini, Turkey (Heriot-Watt University Mathematical and Computer Sciences, 2017-10)
    Multicore clusters provide cost-effective platforms for running CPU-intensive and data-intensive parallel applications. To effectively utilise these platforms, sharing their resources is needed amongst the applications rather ...
  • Categorical structures on bundle gerbes and higher geometric prequantisation 

    Bunk, Severin (Heriot-Watt University Mathematics and Computer Sciences, 2017-09)
    We present a construction of a 2-Hilbert space of sections of a bundle gerbe, a suitable candidate for a prequantum 2-Hilbert space in higher geometric quantisation. We start by briefly recalling the construction of the ...
  • Mathematical models for red squirrel conservation 

    Jones, Hannah Elizabeth Mary (Heriot-Watt University Mathematical and Computer Sciences, 2017-06)
    In this thesis we develop mathematical models to understand the process of ecological invasion when the invading species also carries a disease that is harmful to the native species. In particular we focus on a key case ...
  • Homology, cohomology and extensions of ordered groupoids 

    Bainson, Bernard Oduoku (Heriot-Watt University Mathematical and Computer Sciences, 2016-12)
    This thesis contains contributions to the homology, cohomology and extensions of ordered groupoids. We study the simplicial homology of ordered groupoids. We also discuss the (co)homology of the set of identities of ...
  • Nonassociative geometry in representation categories of quasi-Hopf algebras 

    Barnes, Gwendolyn Elizabeth (Heriot-Watt University Mathematical and Computer Sciences, 2016-10)
    It has been understood that quantum spacetime may be non-geometric in the sense that its phase space algebra is noncommutative and nonassociative. It has therefore been of interest to develop a formalism to describe ...
  • Control and surveillance of partially observed stochastic epidemics in a Bayesian framework 

    Adrakey, Hola Kwame (Heriot-Watt University Mathematical and Computer Sciences, 2016-12)
    This thesis comprises a number of inter-related parts. For most of the thesis we are concerned with developing a new statistical technique that can enable the identi cation of the optimal control by comparing competing ...
  • Funding liquidity risk and fund transfer pricing in banking 

    Ritchie, Iain Fraser (Heriot-Watt University Mathematical and Computer Sciences, 2016-11)
    Funding liquidity risk was one of the main reasons for bank failure during the global financial crisis in 2007-2008. New legislation has been released in the form of Basel III, in particular the Liquidity Coverage Ratio ...
  • The optimised Schwarz method and the two-Lagrange multiplier method for heterogeneous problems 

    Greer, Neil (Heriot-Watt University Mathematical and Computer Sciences, 2017-04)
    In modern science and engineering there exist many heterogeneous problems, in which the material under consideration has non-uniform properties. For example when considering seepage under a dam, water will flow at vastly ...
  • Personal named entity linking based on simple partial tree matching and context free grammar 

    Buatongkue, Sirisuda (Heriot-Watt University Mathematical and Computer Sciences, 2017-04)
    Personal name disambiguation is the task of linking a personal name to a unique comparable entry in the real world, also known as named entity linking (NEL). Algorithms for NEL consist of three main components: extractor, ...
  • Enriched discrete spaces for time domain wave equations 

    Lijoka, Oluwaseun Francis (Heriot-Watt University Mathematical and Computer Sciences, 2017-01)
    The second order linear wave equation is simple in representation but its numerical approximation is challenging, especially when the system contains waves of high frequencies. While 10 grid points per wavelength is ...
  • Empirical studies in corporate credit modelling; liquidity premia, factor portfolios & model uncertainty 

    van Loon, Paul Rene Frank (Heriot-Watt University Mathematical and Computer Sciences, 2017-04)
    Insurers match the cash flows of typically illiquid insurance liabilities, such as in-force annuities, with government and corporate bonds. As they intend to buy corporate bonds and hold them to maturity, they can capture ...
  • Framework for knowledge management 

    Zia, Imran (Heriot-Watt University Mathematical and Computer Sciences, 2015-11)
    This thesis studies the underlying processes of Knowledge Management (KM) and proposes a generic framework for knowledge management that is appli- cable to real-life case studies. We define KM as gathering, refining, ...
  • Dialogue enhanced, machine assisted requirements elicitation 

    Li, Ke (Heriot-Watt University Mathematical and Computer Sciences, 2014-05)
    The Requirements Elicitation process often involves extracting valuable information from the wealth of extant domain specific, natural language (NL) data to form the requirements for building the future system. It also ...
  • Securing routing protocols in mobile ad hoc networks 

    Abdelshafy Abdallah, Mohamed Ahmed (Heriot-Watt University Mathematical and Computer Sciences, 2016-05)
    A Mobile Ad Hoc Network (MANET) is more prone to security threats than other wired and wireless networks because of the distributed nature of the network. Conventional MANET routing protocols assume that all nodes cooperate ...
  • Stochastic average-cost control, with energy-related applications 

    Chernysh, Ksenia (Heriot-Watt University Mathematical and Computer Sciences, 2016-09)
    In this thesis we present a new stochastic optimisation model arising from supplyside management of power networks. We provide the exact optimal solution under assumption that the environment is Markovian. For the ...
  • Cosets in inverse semigroups and inverse subsemigroups of finite index 

    AlAli, Amal (Heriot-Watt University Mathematical and Computer Sciences, 2016-07)
    The index of a subgroup of a group counts the number of cosets of that subgroup. A subgroup of finite index often shares structural properties with the group, and the existence of a subgroup of finite index with some ...
  • High gauge theory with string 2-groups and higher Poincare lemma 

    Demessie, Getachew Alemu (Heriot-Watt University Mathematical and Computer Sciences, 2016-09)
    This thesis is concerned with the mathematical formulations of higher gauge theory. Firstly, we develop a complete description of principal 2-bundles with string 2-group model of Schommer-Pries, which is obtained by ...
  • Mathematical modelling of movement and glioma invasion 

    Eljazi, Radhia (Heriot-Watt University Mathematical and Computer Sciences, 2016-10)
    Modelling movement is an important topic in fields ranging from ecology to medicine. In particular, glioma, an often fatal brain tumour is characterised by its diffuse invasion into the surrounding normal brain tissue, ...

View more