Faculty of Science and Technology
Title | Faculty of Science and Technology |
---|---|
Alternative | S&T |
University | Middlesex University London |
Campus | London |
Latest research outputs
Sort by Date Title
A conceptual object modelling of gene mutation data.
Rahman, S. and Khan, N. 2001. A conceptual object modelling of gene mutation data. in: Wingender, E. (ed.) Computer science and biology: proceedings of the German conference on bioinformatics. Braunschweig German Research Center for Biotechnology.. pp. 187-190Book chapter
Integrating molecular biology databases using image object keying.
Rahman, S., Khan, N. and Stockman, A. 2003. Integrating molecular biology databases using image object keying. in: Krol, M., Mitra, S. and Lee, D. (ed.) 16th IEEE symposium on computer-based medical systems. Los Alamitos, Calif. IEEE Computer Society.Book chapter
Object identification for visually impaired people using circular colour coded stickers.
Rahman, S. and Shah, A. 2007. Object identification for visually impaired people using circular colour coded stickers. IEEE SMC UK&RI 6th conference on cybernetic systems, 2007. University College, DublinConference paper
Chinese web browser design utilising cultural icons.
Prior, S., Shen, S., Chen, K. and You, M. 2007. Chinese web browser design utilising cultural icons. in: Aykin, N. (ed.) Usability and internationalization: global and local user interfaces. second international conference on usability and internationalization, UI-HCII 2007. Berlin Springer.Book chapter
The design of a culturalised web browser for Chinese users.
Prior, S., Shen, S., Chen, K., Woolley, M. and International Association of Societies of Design Research. 2007. The design of a culturalised web browser for Chinese users. in: IASDR07 proceedings emerging trends in design research. Hong Kong Hong Kong Polytechnic University.Book chapter
Towards culture-centred design: a metaphor in human computer interaction
Prior, S. and Shen, S. 2005. Towards culture-centred design: a metaphor in human computer interaction. in: Salvendy, G. (ed.) HCI international 2005: 11th international conference on human-computer interaction. Lawrence Earlbaum Associates.Book chapter
Placing culture at the centre of design.
Prior, S. and Shen, S. 2006. Placing culture at the centre of design. in: Rodgers, P., Brodhurst, L. and Hepburn, D. (ed.) Crossing design boundaries: proceedings of the 3rd engineering & product design education international conference. London Taylor and Francis. pp. 65-69Book chapter
Designing culture-centred interfaces: the implementation of CCD methodology.
Prior, S. and Shen, S. 2005. Designing culture-centred interfaces: the implementation of CCD methodology. in: 2005idc new design paradigms: abstracts of the international design congress. Yunlin, Taiwan National Yunlin University of Science and Technology.. pp. 1-8Book chapter
Development of mobile platforms using PDA bluetooth control.
Rodrigues, H., Gaspar, T., Odedra, S., Costa, M., Metrolho, J., Prior, S., Bardill, A., Silva, C., Tavares, A. and Couto, C. 2005. Development of mobile platforms using PDA bluetooth control. in: Peric, N., Petrovic, I. and Butkovic, Z. (ed.) ISIE 2005 : Proceedings of the IEEE international symposium on industrial electronics 2005. Institute of Electrical and Electronics Engineers (IEEE).Book chapter
The MoD grand challenge 2008.
Prior, S. 2008. The MoD grand challenge 2008. Defence management journal. 42, pp. 22-23.Article
The problems with design education in the UK.
Prior, S., Karamanoglu, M., Shen, S. and International Association of Societies of Design Research. 2007. The problems with design education in the UK. in: IASDR07 proceedings emerging trends in design research. Hong Kong Hong Kong Polytechnic University.Book chapter
Unmanned aerial vehicle comprising a triangular array of rotors.
Prior, S., Odedra, S., Karamanoglu, M., Erbil, M. and Foran, T. 2009. Unmanned aerial vehicle comprising a triangular array of rotors.Patent
Successful grouping strategies and psychometric profiling in product design education.
Prior, S., Shen, S. and International Association of Societies of Design Research. 2005. Successful grouping strategies and psychometric profiling in product design education. in: 2005idc new design paradigms: abstracts of the international design congress: international design congress-IASDR 2005. Yunlin, Taiwan. National Yunlin University of Science and Technology.. pp. 1-9Book chapter
Strategies to improve engineering student's knowledge of emerging technologies.
Prior, S., Metrolho, J. and Silva, C. 2005. Strategies to improve engineering student's knowledge of emerging technologies. in: Innovation, technology and research: IADAT-aci2005: proceedings of the IADAT international conference on automation, control and instrumentation. International Association for the Development of Advances in Technology. pp. 180-184Book chapter
Poster on domotic applications using PDA technologies as actors
Prior, S., Bardill, A., Odedra, S., Gaspar, T., Rodrigues, H., Costa, M. and Metrolho, J. 2004. Poster on domotic applications using PDA technologies as actors. Technical Workshop of the Forum CYTED-IBEROEKA: Inovação na Região Ibero-Americana. FIL Reunions Centre, Parque das Nações, Lisbon 17 - 19 Oct 2004Conference poster
Handheld devices as actors in domotic monitoring system.
Gaspar, T., Rodrigues, H., Odedra, S., Costa, M., Metrolho, J., Bardill, A. and Prior, S. 2004. Handheld devices as actors in domotic monitoring system. in: Schoop, R. (ed.) 2004 2nd IEEE International conference on industrial informatics: collaborative automation: one key for intelligent industrial environments. Institute of Electrical and Electronics Engineers. pp. 547-551Book chapter
Nanoscratch behaviour of multi-layered films using molecular dynamics.
Prior, S., Shen, S., Fang, T., Liu, C., Ji, L. and Wu, J. 2008. Nanoscratch behaviour of multi-layered films using molecular dynamics. Applied physics A.. 90 (4), pp. 753-758. https://doi.org/10.1007/s00339-007-4351-8.Article
Developing authenticity in team-based design projects.
Prior, S. and Dowlen, C. 2005. Developing authenticity in team-based design projects. in: Rodgers, P., Brodhurst, L. and Hepburn, D. (ed.) Crossing design boundaries: proceedings of the 3rd engineering & product design education international conference. London Taylor and Francis. pp. 225-230Book chapter
Using unified process to develop an online survey application.
Luo, Y. and Zhao, H. 2005. Using unified process to develop an online survey application. in: Proceedings of the IADIS international conference WWW/Internet 2005. IADIS.Book chapter
A multi-agent decision support system for stock trading
Luo, Y., Liu, K. and Davis, D. 2002. A multi-agent decision support system for stock trading. IEEE network. 16 (1), pp. 20-27.Article
Using KADS to design a multi-agent framework for stock trading.
Luo, Y., Liu, K. and Davis, D. 2001. Using KADS to design a multi-agent framework for stock trading. in: Arabnia, H. (ed.) Proceedings of International Conference on Artificial Intelligence(IC-AI'2001). CSREA Press. pp. 1149-1156Book chapter
Information and knowledge exchange in a multi-agent system for stock trading.
Luo, Y., Davis, D. and Liu, K. 2001. Information and knowledge exchange in a multi-agent system for stock trading. in: Jakobson, G. and Ray, P. (ed.) 2001 enterprise networking, applications and services conference proceedings: entnet@supercomm2001. IEEE. pp. 47-55Book chapter
A new distributed Java-based agents environment
Luo, Y. and Zhou, Z. 2000. A new distributed Java-based agents environment. Mini-micro systems. 21 (11), pp. 1227-1230.Article
A multi-agent framework for stock trading.
Luo, Y., Liu, K. and Davis, D. 2000. A multi-agent framework for stock trading. in: Shi, Z., Faltings, B. and Musen, M. (ed.) Proceedings of conference on intelligent information processing. Beijing Publishing House of Electronics Industry of China. pp. 470-477Book chapter
Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol. in: WSEAS Conferences: Elounda, Agios Nikolaos, Crete, Greece, August 18-20, 2006 Athens WSEAS.Book chapter
Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6. WSEAS transactions on communications. 5 (10), pp. 1109-2742.Article
Distributed authentication protocol for the security of binding updates in mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Distributed authentication protocol for the security of binding updates in mobile IPv6. in: Proceedings of the 9th WSEAS international CSCC multiconference: circuits 05, systems 05, computers 05, communications 05. WSEAS.Book chapter
Binding update security for mobile IPv6 using a distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Binding update security for mobile IPv6 using a distributed authentication protocol. WSEAS transactions on communications. 4 (9), pp. 1109-2742.Article
Trinity protocol for authentication of binding updates in mobile IPv6.
Luo, Y., Comley, R., Lasebae, A. and Georgiades, A. 2004. Trinity protocol for authentication of binding updates in mobile IPv6. WSEAS transactions on communications. 3 (3), pp. 872-877.Article
Combining KADS with Zeus to develop a multi-agent e-commerce application.
Luo, Y., Davis, D. and Liu, K. 2003. Combining KADS with Zeus to develop a multi-agent e-commerce application. Electronic commerce research. 3 (3-4), pp. 315-335. https://doi.org/10.1023/A:1023483208268Article
Computing migration through context awareness and context transmission.
Luo, Y., Cheng, Z. and Chin, K. 2003. Computing migration through context awareness and context transmission. in: Proceedings of the IADIS international conference WWW/Internet 2003. IADIS. pp. 386-394Book chapter
Level dependent band QBD processes: Steady state solution and applications.
Gemikonakli, O., Chakka, R., Papp, D. and Do, T. 2004. Level dependent band QBD processes: Steady state solution and applications. in: Exploring the effect of inter-flow interference on TCP performance in http://www.comp.brad.ac.uk/het-net/HET-NETs04/CameraPapers/WP8.pdf. Glasgow University of Glasgow, Department of Computing Science. pp. WP8/1-WP8/6Book chapter
A solution for the problem of trusted third party for IEEE 802.11b networks
Gemikonakli, O., Kirsal, Y. and Eneh, A. 2005. A solution for the problem of trusted third party for IEEE 802.11b networks. in: Merabti, M. (ed.) 6th Annual postgraduate symposium on the convergence of telecommunications, networking and broadcasting: PGNET 2005. Liverpool Liverpool John Moores University, School of Computing & Mathematical Sciences. pp. 333-338Book chapter
Improving Kerberos security through the combined use of the timed authentication protocol and frequent key renewal
Gemikonakli, O. and Kirsal, Y. 2008. Improving Kerberos security through the combined use of the timed authentication protocol and frequent key renewal. in: Cybernetics and intelligent systems: 2008 IEEE Conference Institute of Electrical and Electronics Engineers. pp. 153-158Book chapter
Further improvements to the Kerberos timed authentication protocol
Gemikonakli, O. and Kirsal, Y. 2008. Further improvements to the Kerberos timed authentication protocol. in: Sobh, T. (ed.) Advances in computer and information sciences and engineering. Dordrecht Springer.Book chapter
Frequent key renewal under pseudo-secure conditions for increased security in kerberos authentication and its impact on system performability
Gemikonakli, O. and Kirsal, Y. 2007. Frequent key renewal under pseudo-secure conditions for increased security in kerberos authentication and its impact on system performability. in: Jahankhani, H. (ed.) Global e-Security: proceedings of the 3rd Annual International Conference, 2007 ICGeS.Book chapter
An authentication protocol to address the problem of the trusted 3rd Party authentication protocols
Gemikonakli, O. and Kirsal, Y. 2007. An authentication protocol to address the problem of the trusted 3rd Party authentication protocols. in: Elleithy, K. (ed.) Advances and innovations in systems, computing sciences and software engineering. Springer.Book chapter
Modelling and performability analysis of network memory servers.
Gemikonakli, O., Mapp, G., Thakker, D., Ever, E. and Society for Modeling and Simulation International 2006. Modelling and performability analysis of network memory servers. in: 39th Annual Simulation Symposium: proceedings. California IEEE Computer Society. pp. 127-134Book chapter
Modelling network memory servers with parallel processors, break-downs and repairs.
Gemikonakli, O., Mapp, G., Ever, E. and Thakker, D. 2007. Modelling network memory servers with parallel processors, break-downs and repairs. California IEEE Computer Society. pp. 11-20 https://doi.org/10.1109/ANSS.2007.29Conference paper
Analysis of a phase-shift technique for inter-modulation cancellation proposed for 2-Carrier QPSK Systems.
Gemikonakli, O. 2006. Analysis of a phase-shift technique for inter-modulation cancellation proposed for 2-Carrier QPSK Systems. in: ICCTA '06: International conference on information and communication technologies; from theory to applications, 24-28 April 2006, Damascus, Syria. Institute of Electrical and Electronics Engineers.Book chapter
489997
total views135789
total downloads49670
views this month14702
downloads this month