Modelling interface aesthetics
An important aspect of screen design is aesthetic evaluation of screen layouts. While it is conceivable to define a set of variables that characterize the key attributes of many alphanumeric display formats, such a task seems difficult for graphic displays because of their much greater complexity. T...
| Main Authors: | Ngo, David Chek Ling, Teo, Lian Seng, Byrne, John G. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2562/ http://shdl.mmu.edu.my/2562/1/1.pdf |
Similar Items
Aesthetic measures for assessing graphic screens
by: Chek, David Ling Ngo, et al.
Published: (2000)
by: Chek, David Ling Ngo, et al.
Published: (2000)
Measuring the aesthetic elements of screen designs
by: Ngo, D
Published: (2001)
by: Ngo, D
Published: (2001)
Formalising guidelines for the design of screen layouts
by: D. C. L., Ngo, et al.
Published: (2000)
by: D. C. L., Ngo, et al.
Published: (2000)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Fingerprint images segmentation using two stages coarse to fine discrimination technique
by: Ong, Teng Sian, et al.
Published: (2003)
by: Ong, Teng Sian, et al.
Published: (2003)
Automatic fingerprint center point determination by using modified directional field and morphology
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
Smart home microcontroller: Telephone interfacing
by: Leong, , CS, et al.
Published: (2006)
by: Leong, , CS, et al.
Published: (2006)
Real time actions and gestures as intuitive user interface for creative 3D modeling
by: Looi, N.K., et al.
Published: (2005)
by: Looi, N.K., et al.
Published: (2005)
'Push' and 'Pull' Modeling In RosettaNet's Business-To -Business e-Commerce Partner Interface Processes.
by: Ting, Tin Tin, et al.
Published: (2007)
by: Ting, Tin Tin, et al.
Published: (2007)
An integrated approach for head gesture based interface
by: Lee, Gin Chong, et al.
Published: (2012)
by: Lee, Gin Chong, et al.
Published: (2012)
A Menu Planning Model Using Hybrid Genetic Algorithm And Fuzzy Reasoning: A Study On Malaysian Geriatric Cancer Patients
by: Ngo , Hea Choon
Published: (2016)
by: Ngo , Hea Choon
Published: (2016)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
Preliminary Work on Speech Unit Selection Using Syntax Phonology Interface
by: Tiun, Sabrina, et al.
Published: (2008)
by: Tiun, Sabrina, et al.
Published: (2008)
Interfacing of biped KHR-1 with DSP board TMS320F2812
by: Lim, Chot Hun, et al.
Published: (2006)
by: Lim, Chot Hun, et al.
Published: (2006)
Compute Language Interface: A Transparent Wrapper Library For Multi Cpu-Gpu
by: Ooi, Keng Siang
Published: (2013)
by: Ooi, Keng Siang
Published: (2013)
Screen design: composing with dynamic symmetry
by: Ngo, D
Published: (2001)
by: Ngo, D
Published: (2001)
An E-Book Building Methodology Using An Extensible Personalization Structure For Operationalizing E-Book Interface Metaphors
by: Hameed, M. Noorul
Published: (2010)
by: Hameed, M. Noorul
Published: (2010)
Classification Of P300 Signals In Brain-Computer Interface Using Neural Networks With Adjustable Activation Functions
by: Aslarzanagh, Seyed Aliakbar Mousavi
Published: (2013)
by: Aslarzanagh, Seyed Aliakbar Mousavi
Published: (2013)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
Improving the performance of two-state mental task brain-computer interface design using linear discriminant classifier
by: Palaniappan, , R, et al.
Published: (2005)
by: Palaniappan, , R, et al.
Published: (2005)
Why and how should design patterns be formalized?
by: Taibi,, T, et al.
Published: (2001)
by: Taibi,, T, et al.
Published: (2001)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003)
by: Ngo,, DCL, et al.
Published: (2003)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Preprocessing of fingerprint images captured with a digital camera
by: Hiew,, B. Y, et al.
Published: (2006)
by: Hiew,, B. Y, et al.
Published: (2006)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Flexibly-configurable and computation-efficient digital cash with polynomial-thresholded coinage
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Non-Repudiation In Web Services.
by: Ling, Elvis,Ing Seng, et al.
Published: (2007)
by: Ling, Elvis,Ing Seng, et al.
Published: (2007)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Similar Items
-
Aesthetic measures for assessing graphic screens
by: Chek, David Ling Ngo, et al.
Published: (2000) -
Measuring the aesthetic elements of screen designs
by: Ngo, D
Published: (2001) -
Formalising guidelines for the design of screen layouts
by: D. C. L., Ngo, et al.
Published: (2000) -
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005) -
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)