Date


People

Download Available

623 results

Comparative analysis of chaotic and non-chaotic image encryption schemes

Conference Proceeding
Younas, M. B., & Ahmad, J. (2014)
Comparative analysis of chaotic and non-chaotic image encryption schemes. In 2014 International Conference on Emerging Technologies (ICET)https://doi.org/10.1109/icet.2014.7021021
In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Secu...

Novel Biologically Inspired Approaches to Extracting Online Information from Temporal Data

Journal Article
Malik, Z. K., Hussain, A., & Wu, J. (2014)
Novel Biologically Inspired Approaches to Extracting Online Information from Temporal Data. Cognitive Computation, 6(3), 595-607. https://doi.org/10.1007/s12559-014-9257-0
In this paper, we aim to develop novel learning approaches for extracting invariant features from time series. Specifically, we implement an existing method of solving the gen...

DNA Sequence Based Medical Image Encryption Scheme

Conference Proceeding
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018)
DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2018.8674221
Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdropper...

Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing.

Thesis
Buchanan, W. J. Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4022
The 3D Finite-Difference Time-Domain (FDTD) method simulates structures in the time-domain using a direct form of Maxwell’s curl equations. This method has the advantage over ...

Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications

Journal Article
Yassin, A., Nasser, Y., Awad, M., Al-Dubai, A., Liu, R., Yuen, C., …Aboutanios, E. (2017)
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications. Communications Surveys and Tutorials, IEEE Communications Society, 19(2), 1327-1346. https://doi.org/10.1109/comst.2016.2632427
Nowadays, the availability of the location information becomes a key factor in today’s communications systems for allowing location based services. In outdoor scenarios, the M...

Secure speech communication algorithm via DCT and TD-ERCS chaotic map

Conference Proceeding
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017)
Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE)https://doi.org/10.1109/iceee2.2017.7935827
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have ...

Inclusive design: A balance between product demands and user capabilities

Conference Proceeding
Clarkson, P. J., & Keates, S. (2003)
Inclusive design: A balance between product demands and user capabilities. In ASME 2003 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference: 15th International Conference on Design Theory and Methodology, 575-584. https://doi.org/10.1115/DETC2003/DTM-48653
The world population is aging and the number of people who are experiencing a loss of functional capability is also on the increase. There is a need to design ?inclusive? prod...

Investigating the Cursor Movement Parameters for Haptic Assistance of Motion-impaired Users

Conference Proceeding
Langdon, P., Hwang, F., Keates, S., Clarkson, P. J., & Robinson, P. (2001)
Investigating the Cursor Movement Parameters for Haptic Assistance of Motion-impaired Users. In M. Mokhtari (Ed.), Integration of Assistive Technology in the Information Age: ICORR '2001, 7th International Conference on Rehabilitation Robotics, 237-242
Following a pilot study that suggested that force-feedback gravity wells could, under certain conditions, lead to 20- 50% improvements in time to target in a selection task, a...

Design for the Value of Inclusiveness

Book Chapter
Keates, S. (2014)
Design for the Value of Inclusiveness. In I. V. D. Poel, J. V. D. Hoven, & P. E. Vermaas (Eds.), Handbook of Ethics, Values and Technological Design, 1-17. Springer Verlag. doi:10.1007/978-94-007-6994-6_15-1
There is an increasing awareness that many everyday products and services present challenges and difficulties to potential users. These difficulties may arise because the prod...

Utilising Reduced File Representations to Facilitate Fast Contraband Detection

Thesis
McKeown, S. Utilising Reduced File Representations to Facilitate Fast Contraband Detection. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2386199
Digital forensics practitioners can be tasked with analysing digital data, in all its forms, for legal proceedings. In law enforcement, this largely involves searching for con...