Richard Comley
Middlesex University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Richard Comley.
conference on industrial electronics and applications | 2008
Patrick Sebastian; Yap Vooi Voon; Richard Comley
This paper studies the effect of colour space on the performance of tracking algorithms. The colour spaces that were investigated were grayscale, RGB, YCbCr and HSV. The performance of a normalised cross correlation tracking algorithm was measured to determine robustness and accuracy in the different colour spaces. Track Detection Rate (TDR) and Object Tracking Standard Deviation (OTStd) were used to provide quantitative measures of tracking performance. The combined results indicate that the colour spaces of YCbCr and HSV give more accurate and more robust tracking results compared to grayscale and RGB images. The results also show that the information stored in the chrominance layers of CbCr in the YCbCr colour space and chromaticity layers HS in the HSV colour space, were sufficient for robust tracking. The TDR results range from 93.7% to 97.1% for grayscale and RGB, and 98% to 100% for the YCbCr and HSV colour spaces respectively. A similar trend in the OTStd was observed with a range of 17.0 pixels to 23.9 pixels for grayscale and RGB, and 7.56 pixels to 20.5 pixels for YCbCr and HSV.
Journal of Network and Computer Applications | 2011
Okechukwu E. Muogilim; Kok-Keong Loo; Richard Comley
The wireless mesh network (WMN) is an emerging multihop, heterogeneous, easily scalable and low cost network. The architecture of the WMN is a connectionless-oriented, mobile and dynamic traffic of routed packets. The mesh infrastructure environment easily forms multiple chains of wireless LANs (WLAN) coupled with the simultaneous multihop transmission of data packets from peripherals via mobile gateways to the wireless cloud. WMN operates as an access network to other communication technologies. This exposes the WMN to numerous security challenges not only in the mesh transmission operation security but also in the overall security against foreign attacks. We surveyed and identified the security vulnerabilities in Internet Protocol (IP) broadband networks, the security challenges in the routing layer of the WMN and explored new concepts to solving security challenges in WMN using traffic engineering (TE) security resolution mechanisms. We analyzed the advantages, comparative strengths and weakness in the use of traffic engineering based on simulation results and evaluations.
international conference on pairing based cryptography | 2007
Zhaohui Cheng; Liqun Chen; Li Ling; Richard Comley
In 2003, Al-Riyami and Paterson introduced a new public key encryption paradigm called Certificateless Public Key Encryption (CL-PKE), which like Identity-Based Encryption (IBE) is certificatefree, and meanwhile which unlike IBE but similar to certificate-based encryption is key-escrow-free. In this paper, based on a heuristic observation on some existing IBE schemes and PKE schemes, we propose a general approach to build a CL-PKE solution, which makes use of a simple combination of an IBE scheme, a Diffie-Hellman type key establishment algorithm and a secure hash-function. Following this approach we construct two efficient concrete CL-PKE schemes and formally analyse their security in the random oracle model.
IFIP TCS | 2004
Zhaohui Cheng; Richard Comley; Luminita Vasiu
Key escrow is an inherent property in the current proposed Identity-Based Encryption (IBE) systems. However the key escrow is not always a good property for all applications. In this paper, we present a scheme which removes the key escrow from the IBE system proposed by Bonch and Franklin, while at the same time maintaining some important properties of the IBE. We also present some cryptosystems based on our variant including a signature scheme and an authenticated key agreement. We finally show how to integrate our scheme into a hierarchial identity based public key encryption system.
Archive | 2008
Xiaohong W. Gao; Henning Müller; Martin J. Loomes; Richard Comley; Shuqian Luo
Medical imaging and informatics : , Medical imaging and informatics : , کتابخانه دیجیتال جندی شاپور اهواز
computer-based medical systems | 2008
Sergey Anishchenko; Vladislav Osinov; D. G. Shaposhnikov; Lubov Podlachikova; Richard Comley; Xiaohong W. Gao
A new approach for the detection of head motions during PET scanning is presented. The proposed system includes 4 modules, which are: input module, face segmentation, facial landmark detection, and head movement estimation. The developed system is tested on pictures monitoring a subjects head while simulating PET scanning (n=12) and face images of subjects with different skin colours (n=31). Experimental results show that the centres of chosen facial landmarks (eye corners and middle point of nose basement) can be detected with high precision (1plusmn0.64 pixels). Processing of 2D images with known moving parameters demonstrates that the parameter movement in terms of rotation and translation along X, Y, and Z directions can be obtained very accurately via the developed methods.
international conference on information and communication technologies | 2004
S. Bansal; Aboubaker Lasebae; Richard Comley
Summary form only given. We present a handover pre-selection strategy, service advertisement and service selection. The handover strategy is used to accomplish seamless cross-network handovers, which supports WLAN and HMIP cells. Users are allowed to select the services from different service providers by the use of service selection algorithm with a call setup procedure. Finally, soft registrations take place to allow terminals to acquire candidate network capability information, service advertisements along with service selection algorithm and handover strategy.
ieee international conference on biomedical robotics and biomechatronics | 2014
Peter W. Snow; Rui C. V. Loureiro; Richard Comley
The use of robotics in rehabilitation has shown to have a positive outcome when applied to stroke patients and other movement based therapies. Despite recent studies looking at these types of therapies in helping patients with Phantom Limb Pain very few have looked at employing the elements that make robotics successful with stroke patients towards amputees. Phantom Limb Pain affects the majority of amputees, resulting in the need for further study due to the vast range of potential treatments available. This paper examines the effects of Phantom Limb Pain, its treatment, paradigms based on robotic rehabilitation, and provides an outline of a possible therapy method based on an immersive system providing proprioceptive and kinaesthetic feedback to the user while performing a manipulation task.
international symposium on wireless communication systems | 2010
Carlene E.-A. Campbell; Kok-Keong Loo; Richard Comley
Wireless communication has become the fastest growing area in the communication industry. The demand for using this medium ranges from security, military, Internet and scientific purposes and are rapidly replacing wire-line systems in many developing countries. Wireless Sensor Networks (WSN) is currently a research area that is being studied by many researchers and industries within the wireless communication arena. It is not only being considered for use for target detection, environmental monitoring and tactical systems, but is also a promising technology for use in multimedia systems such as streaming video and surveillance. The use of multichannel assignment can substantially improve the performance of WSNs using the IEEE specifications of non-overlapping channels simultaneously. The 802.11 multichannel Medium Access Control (MAC) schemes do not efficiently utilize this technology owing to the overhead caused by channel assignments. In this paper a new approach is used by applying multichannel to reduce the waiting time of a node when attempting to access a busy medium. The back-off algorithm will switch channel when the contention window of the Distributed Coordination Function (DCF) has reach an assigned threshold. The sink node will perform interface switching to receive data from channels coming from source nodes.
IEEE Transactions on Image Processing | 2014
Payam S. Rahmdel; Daming Shi; Richard Comley
A novel application of the Hough transform (HT) neighborhood approach to collinear segment detection was proposed in [1]. It, however, suffered from one major weakness in that it could not provide an effective solution to the case of segment intersection. This paper analyzes a vital prerequisite step, disturbance elimination in the Hough space, and shows why, this method alone, is incapable of distinguishing the true segment endpoints. To address the problem, a unique HT butterfly separation method is proposed in this correspondence, as an essential complement to the above publication.