Search
Search Results
-
-
Physical Anti-copying Semi-robust Random Watermarking for QR Code
Recently, QR code has been applied in anti-counterfeiting scenarios, where a unique QR code is attached for a specific item. However, such a QR... -
High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC
HEVC video is one of the most popular carriers for steganography. The existing transform coefficient-based HEVC steganography algorithms usually... -
Adaptive Robust Watermarking Method Based on Deep Neural Networks
Aiming at the problem of digital multimedia piracy and infringement, an adaptive robust watermarking algorithm based on Deep Neural Networks (DNNs)... -
Manipulated Face Detection and Localization Based on Semantic Segmentation
In this paper, we propose a novel manipulated face detection and localization approach, which simultaneously detect manipulated face images and... -
Space-Efficient STR-IC-LCS Computation
One of the most fundamental methods for comparing two given strings A and B is the longest common subsequence (LCS), where the task is to find (the... -
Balanced Substructures in Bicolored Graphs
An edge-colored graph is said to be balanced if it has an equal number of edges of each color. Given a graph G whose edges are colored using two... -
Delivery to Safety with Two Cooperating Robots
Two cooperating, autonomous mobile robots with arbitrary nonzero max speeds are placed at arbitrary initial positions in the plane. A remotely... -
On the Preservation of Properties When Changing Communication Models
In a system of processes that communicate asynchronously by means of FIFO channels, there are many options in which these channels can be laid out.... -
Multi-Parameter Analysis of Finding Minors and Subgraphs in Edge-Periodic Temporal Graphs
We study the computational complexity of determining structural properties of edge-periodic temporal graphs (EPGs). EPGs are time-varying graphs... -
The k-Centre Problem for Classes of Cyclic Words
The problem of finding k uniformly spaced points (centres) within a metric space is well known as the k-centre selection problem. In this paper, we... -
Teaching Fuzzy Logic Utilising Innovative Approaches
Teaching within Higher Education often involves interacting with a variety of different types of students; different types of learners; all with... -
The Enterprise Showcase Experience
The School of Computing and Engineering at the University of Huddersfield have, for several years, been experimenting with an Enterprise Showcase... -
Exploring the Landscape of HE Industrial Placements Within Engineering and Technology Subjects. Observations of Recruitment, Graduate Attributes and Student Experience
The School of Computing and Engineering (at The University of Huddersfield) typically places up to 200 undergraduate students annually across... -
Active Learning in Large Lectures
An increasingly diverse student body combined with pressures to demonstrate excellence in teaching and improve results presents challenges for... -
Distance Learning: Lessons Learned from a UK Masters Programme
The MSc Intelligent Systems (IS) and the MSc Intelligent Systems and Robotics (ISR) at De Montfort University are Masters courses that are delivered... -
Applying Cognitive Theory to the Teaching of Programming: Metaphors, Robots and Problem-Based Learning
The age old problemLearningproblem-based of how to teachRobot programming has gone around in circles for decades. What programming... -
-
Multi-objective Bayesian Optimization for Neural Architecture Search
A novel multi-objective algorithm denoted as MO-BayONet is proposed for the Neural Architecture Search (NAS) in this paper. The method based on... -
Short Texts Representations for Legal Domain Classification
This work presents the results of comparison text representations used for short text classification with SVM and neural network when challenged with...