Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm.
Al-Jassani, B. A., Urquhart, N. B., & Almaini, A. E. A. (2009)
Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm. https://doi.org/10.1109/12.67320
A New and efficient Genetic Algorithm (GA) based approach is presented to minimise the number of terms of Mixed Polarity Reed Muller (MPRM) single and multi output incompletel...
Enhanced Methods of Coursework Provision in Computer Networks.
Buchanan, W. J., & Saliou, L. (2005)
Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education, 111-115. https://doi.org/10.1109/ITRE.2004.1393657
Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from ...
Improving accessibility in the workplace: manual data entry in video coding
Coy, J., Keates, S., & Clarkson, P. J. (2001)
Improving accessibility in the workplace: manual data entry in video coding. In (. O. M. E. IMechE (Ed.), Mail Technology: Evolution to e-Revolution, 201-210
No abstract available.
Cognitive impairments, HCI and daily living
Keates, S., Kozloski, J., & Varker, P. (2009)
Cognitive impairments, HCI and daily living. In C. Stephanidis (Ed.), Universal Access in Human-Computer Interaction. Addressing Diversity. 5th International Conference, UAHCI 2009, Proceedings, Part I, 366-374. https://doi.org/10.1007/978-3-642-02707-9_42
As computer systems become increasingly more pervasive in everyday life, it is simultaneously becoming ever more important that the concept of universal access is accepted as ...
DEEPC: Dynamic Energy Profiling of Components
Liu, X., Chinenyeze, S. J., & Al-Dubai, A. (2016)
DEEPC: Dynamic Energy Profiling of Components. In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)https://doi.org/10.1109/COMPSAC.2016.90
Many software projects are built using reusable components (i.e. reusable objects - as per component and connectors in software architectures). During component selection in C...
Mobile Multicast Route Optimisation
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Mobile Multicast Route Optimisation. In IEEE International Conference on Communications, 2006. ICC '06, 1977-1983. doi:10.1109/icc.2006.255060
The multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional ...
Comparative analysis of chaotic and non-chaotic image encryption schemes
Younas, M. B., & Ahmad, J. (2014)
Comparative analysis of chaotic and non-chaotic image encryption schemes. In 2014 International Conference on Emerging Technologies (ICET)https://doi.org/10.1109/icet.2014.7021021
In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Secu...
DNA Sequence Based Medical Image Encryption Scheme
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018)
DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2018.8674221
Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdropper...
Secure speech communication algorithm via DCT and TD-ERCS chaotic map
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017)
Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE)https://doi.org/10.1109/iceee2.2017.7935827
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have ...
Mouse movements of motion-impaired users: a submovement analysis
Hwang, F., Keates, S., Langdon, P., & Clarkson, J. (2004)
Mouse movements of motion-impaired users: a submovement analysis. In J. A. Jacko, & A. Sears (Eds.), ASSETS 04 : the Sixth International ACM SIGACCESS Conference on Computers and Accessibility, 102-109. https://doi.org/10.1145/1028630.1028649
Understanding human movement is key to improving input devices and interaction techniques. This paper presents a study of mouse movements of motion-impaired users, with an aim...