Screen design: composing with dynamic symmetry
This paper considers a technique for analysing the composition information of displays based on Hambidge's dynamic symmetry. While, by using this technique, our study of dynamic symmetry that underlies 150 real screens shows an unmistakable use of plan schemes of the system in 40% of them, few...
| Main Author: | Ngo, D |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2001
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2684/ http://shdl.mmu.edu.my/2684/1/1925.pdf |
Similar Items
Screen design: a dynamic symmetry grid based approach
by: Ch'ng, E
Published: (2003)
by: Ch'ng, E
Published: (2003)
Measuring the aesthetic elements of screen designs
by: Ngo, D
Published: (2001)
by: Ngo, D
Published: (2001)
Formalising guidelines for the design of screen layouts
by: D. C. L., Ngo, et al.
Published: (2000)
by: D. C. L., Ngo, et al.
Published: (2000)
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003)
by: Ngo,, DCL, et al.
Published: (2003)
Aesthetic measures for assessing graphic screens
by: Chek, David Ling Ngo, et al.
Published: (2000)
by: Chek, David Ling Ngo, et al.
Published: (2000)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Why and how should design patterns be formalized?
by: Taibi,, T, et al.
Published: (2001)
by: Taibi,, T, et al.
Published: (2001)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
On Abolishing Symmetry Requirements in the Formulation of a Five-Level Selective Harmonic Elimination Pulse-Width Modulation Technique
by: Dahidah, Mohamed. S. A., et al.
Published: (2006)
by: Dahidah, Mohamed. S. A., et al.
Published: (2006)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
A Menu Planning Model Using Hybrid Genetic Algorithm And Fuzzy Reasoning: A Study On Malaysian Geriatric Cancer Patients
by: Ngo , Hea Choon
Published: (2016)
by: Ngo , Hea Choon
Published: (2016)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Flexibly-configurable and computation-efficient digital cash with polynomial-thresholded coinage
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Dynamic tunneling based regularization in feedforward neural networks
by: Singh, Y.P., et al.
Published: (2001)
by: Singh, Y.P., et al.
Published: (2001)
Conceptual change modeling using Dynamic Bayesian network
by: Ting, Choo Yee, et al.
Published: (2006)
by: Ting, Choo Yee, et al.
Published: (2006)
Dependencies Management in Dynamically Updateable Component-Based System.
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
An Ontology And Constraint-based Approach For Dynamic Personalised Planning In Healthcare
by: Mahiddin , Normadiah
Published: (2009)
by: Mahiddin , Normadiah
Published: (2009)
A Framework For Dynamic Updating In Component-based
Software Systems
by: Mohammed Alhazbi , Saleh
Published: (2009)
by: Mohammed Alhazbi , Saleh
Published: (2009)
Hybridization of gradient descent algorithms with dynamic tunneling methods for global optimization
by: RoyChowdhury, Pinaki, et al.
Published: (2000)
by: RoyChowdhury, Pinaki, et al.
Published: (2000)
Using Economic Model To Improve The Performance Of BHR Dynamic Replication Algorithm.
by: Kanesin, Yogita, et al.
Published: (2007)
by: Kanesin, Yogita, et al.
Published: (2007)
Dynamic Technique for Optimizing Universal Mobile Telecommunication System Active Set.
by: Mutlag, Samer Abdulsada
Published: (2010)
by: Mutlag, Samer Abdulsada
Published: (2010)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
Performance-based variations in dynamic generation of e-learning web-based presentations
by: Khor, Ean-Teng, et al.
Published: (2006)
by: Khor, Ean-Teng, et al.
Published: (2006)
Modelling interface aesthetics
by: Ngo, David Chek Ling, et al.
Published: (2003)
by: Ngo, David Chek Ling, et al.
Published: (2003)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Preprocessing of fingerprint images captured with a digital camera
by: Hiew,, B. Y, et al.
Published: (2006)
by: Hiew,, B. Y, et al.
Published: (2006)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
Automated Dynamic Service Placement And Replication Framework Using Team Formation Approach To Enhance Service Availability
by: Ooi, Boon Yaik
Published: (2012)
by: Ooi, Boon Yaik
Published: (2012)
Similar Items
-
Screen design: a dynamic symmetry grid based approach
by: Ch'ng, E
Published: (2003) -
Measuring the aesthetic elements of screen designs
by: Ngo, D
Published: (2001) -
Formalising guidelines for the design of screen layouts
by: D. C. L., Ngo, et al.
Published: (2000) -
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003) -
Aesthetic measures for assessing graphic screens
by: Chek, David Ling Ngo, et al.
Published: (2000)