Heuristic standards for universal design in the face of technological diversity.

Conference paper


Adams, R. and Comley, R. 2009. Heuristic standards for universal design in the face of technological diversity. 2009 IEEE Accessing the Future Conference. Boston: Northeastern University 20 - 21 Jul 2009
TypeConference paper
TitleHeuristic standards for universal design in the face of technological diversity.
AuthorsAdams, R. and Comley, R.
Abstract

CENTRAL PRINCIPLE
Important technologies require validated standards for the design heuristics that are used to design and evaluate them, but not necessarily identical heuristics for every technology.
BACKGROUND
Heuristic standards provide a valuable toolkit with which to evaluate the accessibility of modern information society technologies (IST). But can we apply the same heuristic, generic standards to all types of technological platforms, in the face of their growing diversity e.g. websites, social websites, blogs, virtual reality applications, ambient intelligence etc (Adams, 2007)? Or would it be wiser to expect that different technologies might require different, if overlapping, standards? Can we really expect to design the interface of a modern cell phone on the same basis as for a table computer? Most impartial observers would probably say “no”.
How can we introduce a systematic and thorough approach to the diverse technologies that are seen or predicted to be seen? Work in our laboratory has explored two useful questions. First, how to computer literate users perceive the different technologies? Second, how can different heuristic standards be developed where needed?

Conference2009 IEEE Accessing the Future Conference
Publication process dates
Deposited19 Apr 2010
Completed2009
Output statusPublished
LanguageEnglish
File
Permalink -

https://repository.mdx.ac.uk/item/8285z

Download files

  • 11
    total views
  • 5
    total downloads
  • 1
    views this month
  • 1
    downloads this month

Export as

Related outputs

An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images
Gao, X., Comley, R. and Khan, M. 2020. An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images. ICIP 2020: 27th IEEE International Conference on Image Processing. Abu Dhabi, Unites Arab Emirates (Virtual Conference) 25 - 28 Oct 2020 IEEE. pp. 2486-2490 https://doi.org/10.1109/ICIP40778.2020.9190815
Design of a robotic sensorimotor system for phantom limb pain rehabilitation
Snow, P., Loureiro, R. and Comley, R. 2014. Design of a robotic sensorimotor system for phantom limb pain rehabilitation. 5th IEEE RAS & EMBS International Conference on Biomedical Robotics and Biomechatronics (BioRob). São Paulo, Brazil 12 - 15 Aug 2014 IEEE. pp. 120-125 https://doi.org/10.1109/BIOROB.2014.6913763
Optical flow estimation via steered-L1 norm
Zayouna, A., Comley, R. and Shi, D. 2016. Optical flow estimation via steered-L1 norm. Pan, Z. and Skala, V. (ed.) 24th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision. Plzen, Czech Republic 30 May - 03 Jun 2016 Digital Library University of West Bohemia. pp. 81-90
Parametric tracking across multiple cameras
Sebastian, P., Voon, Y. and Comley, R. 2017. Parametric tracking across multiple cameras. Pertanika Journal of Science & Technology. 25 ((S)Jan), pp. 159-168.
A review of hough transform and line segment detection approaches
Rahmdel, P., Comley, R., Shi, D. and McElduff, S. 2015. A review of hough transform and line segment detection approaches. 10th International Conference on Computer Vision Theory and Applications (VISAPP 2015). Berlin, Germany 11 - 14 Mar 2015 SCITEPRESS - Science and Technology Publications. pp. 411-418 https://doi.org/10.5220/0005268904110418
Comment on "collinear segment detection using HT neighborhoods"
Rahmdel, P., Shi, D. and Comley, R. 2013. Comment on "collinear segment detection using HT neighborhoods". IEEE Transactions on Image Processing. 23 (2), pp. 952-955. https://doi.org/10.1109/TIP.2013.2291329
Colour space effect on tracking in video surveillance
Sebastian, P., Voon, Y. and Comley, R. 2010. Colour space effect on tracking in video surveillance. International Journal on Electrical Engineering and Informatics. 2 (4), pp. 298-312.
Content-based petrieval of 3D medical images
Qian, Y., Gao, X., Loomes, M., Comley, R., Barn, B., Hui, R. and Tian, Z. 2011. Content-based petrieval of 3D medical images. in: Gemert-Pijnen, L., Ossebaard, H. and Hämäläinen, P. (ed.) eTELEMED 2011, The Third International Conference on eHealth, Telemedicine, and Social Medicine IARIA. pp. 7-12
Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2009. Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents. Trilling, L., Perkins, D., Dionysios, D., Perlovsky, L., Davey, K., Landgrebe, D., Marino, M., Russell, D., Collicott, S., Ceccarelli, M. and Lund, J. (ed.) The 8th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications (EHAC '09). Cambridge, UK 21 - 23 Feb 2009 WSEAS Press. pp. 51-56
The effect of colour space on tracking robustness
Sebastian, P., Voon, Y. and Comley, R. 2008. The effect of colour space on tracking robustness. in: 2008 3rd IEEE Conference on Industrial Electronics and Applications Institute of Electrical and Electronics Engineers (IEEE). pp. 2512-2516
Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2008. Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6. International Journal of Communications. 2 (3), pp. 185-194.
Retrieval of 3D medical images via their texture features
Gao, X., Qian, Y., Loomes, M., Barn, B., Comley, R., Chapman, A., Rix, J., Hui, R. and Tian, Z. 2012. Retrieval of 3D medical images via their texture features. International Journal on Advances in Software. 4 (3&4), pp. 499-509.
Extended mobile WiMAX signal transmission over RoF via triple symmetrical dispersion system SMF, DCF and CFBG
Al Noor, M., Loo, J. and Comley, R. 2011. Extended mobile WiMAX signal transmission over RoF via triple symmetrical dispersion system SMF, DCF and CFBG. International Journal on Advances in Telecommunications. 4 (1&2), pp. 183-193.
Bridging the abridged – the diffusion of Telemedicine in Europe and China
Gao, X., Loomes, M. and Comley, R. 2012. Bridging the abridged – the diffusion of Telemedicine in Europe and China. in: Rodrigues, J., Díez, I. and Abajo, B. (ed.) Telemedicine and e-health services, policies, and applications: avancements and developments USA IGI Global. pp. 451-495
Local-global optical flow for image registration agents
Zayouna, A., Comley, R. and Shi, D. 2011. Local-global optical flow for image registration agents. iUBICOM ’11: The 6th International Workshop on Ubiquitous and Collaborative Computing. Northumbria University, Newcastle 04 Jul 2011
Wireless mesh network security: a traffic engineering management approach
Muogilim, O., Loo, J. and Comley, R. 2011. Wireless mesh network security: a traffic engineering management approach. Journal of Network and Computer Applications. 34 (2), pp. 478-491. https://doi.org/10.1016/j.jnca.2010.03.027
Towards healthcare based on ubiquitous computing
Shi, D. and Comley, R. 2010. Towards healthcare based on ubiquitous computing. IEEE Transactions on Systems, Man, and Cybernetics eNewsletter. 33.
The potential of the BCI for accessible and smart e-learning
Adams, R., Comley, R. and Ghoreyshi, M. 2009. The potential of the BCI for accessible and smart e-learning. Lecture Notes in Computer Science. 5615, pp. 467-476. https://doi.org/10.1007/978-3-642-02710-9_51
Texture-based 3d image retrieval for medical applications
Gao, X., Qian, Y., Hui, R., Loomes, M., Comley, R., Barn, B., Chapman, A. and Rix, J. 2010. Texture-based 3d image retrieval for medical applications. Macedo, M. (ed.) IADIS International Conference e-Health 2010. Freiburg, Germany 29 - 31 Jul 2010 IADIS. pp. 101-108
Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol. in: WSEAS Conferences: Elounda, Agios Nikolaos, Crete, Greece, August 18-20, 2006 Athens WSEAS.
Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6. WSEAS transactions on communications. 5 (10), pp. 1109-2742.
Distributed authentication protocol for the security of binding updates in mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Distributed authentication protocol for the security of binding updates in mobile IPv6. in: Proceedings of the 9th WSEAS international CSCC multiconference: circuits 05, systems 05, computers 05, communications 05. WSEAS.
Binding update security for mobile IPv6 using a distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Binding update security for mobile IPv6 using a distributed authentication protocol. WSEAS transactions on communications. 4 (9), pp. 1109-2742.
Trinity protocol for authentication of binding updates in mobile IPv6.
Luo, Y., Comley, R., Lasebae, A. and Georgiades, A. 2004. Trinity protocol for authentication of binding updates in mobile IPv6. WSEAS transactions on communications. 3 (3), pp. 872-877.
Attacks on an ISO/IEC 11770-2 key establishment protocol
Comley, R. and Cheng, Z. 2005. Attacks on an ISO/IEC 11770-2 key establishment protocol. International Journal of Network Security. 3 (3), pp. 290-295.
Remove key escrow from the identity-based encryption system.
Comley, R., Vasiu, L. and Cheng, Z. 2004. Remove key escrow from the identity-based encryption system. IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd International Conference on Theoretical Computer Science in the Era of Network and Mobile Computing, IFIP TCS2004, Toulouse, France. Proceedings.. 3 (3), pp. 37-50.
Toward a robust system to monitor the head motions during PET based on facial landmarks detection: a new approach
Anishenko, S., Osimov, V., Shaposhnikov, D., Podladchikova, L., Comley, R. and Gao, X. 2008. Toward a robust system to monitor the head motions during PET based on facial landmarks detection: a new approach. Puuronen, S., Pechenizkiy, M., Tsymbal, A. and Lee, D. (ed.) 21st IEEE International Symposium on Computer-Based Medical Systems. Jyvaskyla, Finland 17 - 19 Jun 2008 IEEE Computer Society. pp. 50-52 https://doi.org/10.1109/CBMS.2008.19
General and efficient Certificateless Public Key Encryption constructions
Comley, R., Cheng, Z., Chen, L. and Ling, L. 2007. General and efficient Certificateless Public Key Encryption constructions. Takagi, T., Okamoto, T., Okamoto. E. and Okamoto, T. (ed.) Pairing-Based Cryptography - Pairing 2007. First International Conference. Tokyo, Japan 02 - 04 Jul 2007 Berlin, Heidelberg Springer. https://doi.org/10.1007/978-3-540-73489-5_6
Identity-based key agreement with unilateral identity privacy using pairings
Comley, R., Chen, L., Tang, Q. and Cheng, Z. 2006. Identity-based key agreement with unilateral identity privacy using pairings. Chen, K., Deng, R., Lai, X. and Zhou, J. (ed.) Information Security Practice and Experience: Second International Conference, ISPEC 2006. Hangzhou, China 11 - 14 Apr 2006 Berlin, Heidelberg Springer. https://doi.org/10.1007/11689522_19