Simeon Keates

Simeon Keates
University of Chichester

Doctor of Philosophy

About

181
Publications
26,555
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,572
Citations

Publications

Publications (181)
Chapter
This paper explores how Large-Language Model Artificial Intelligences (LLM-AIs) can be used to support people with Attention Deficit Hyperactivity Disorder (ADHD), Autism Spectrum Disorder (ASD), and other learning differences which effect cognition and self-regulation. It examines the cognitive load associated with complex writing tasks and how it...
Article
Full-text available
In medical and health sciences, the detection of cell injury plays an important role in diagnosis, personal treatment and disease prevention. Despite recent advancements in tools and methods for image classification, it is challenging to classify cell images with higher precision and accuracy. Cell classification based on computer vision offers sig...
Article
Full-text available
As the technical specifications of the 5th Generation (5G) wireless communication standard are being wrapped up, there are growing efforts amongst researchers, industrialists, and standardisation bodies on the enabling technologies of a 6G standard or the so-called Beyond 5G (B5G) one. Although the 5G standard has presented several benefits, there...
Conference Paper
Full-text available
Water is essential for life. Many of the countries across the globe that have poor management of potable water resources and lack critical infrastructure for managing wastewater. As the population of the Earth grows exponentially, the demand for water increases. More than 1 billion people across the world do not have access to potable water and the...
Chapter
Augmented Reality (AR) is a technology which enhances physical environments by superimposing digital data on top of a real-world view. AR has multiple applications and use cases, bringing digital data into the physical world enabling experiences such as training staff on complicated machinery without the risks that come with such activities. Numero...
Article
Full-text available
To make autonomous cars as safe as feasible for all road users, it is essential to interpret as many sources of trustworthy information as possible. There has been substantial research into interpreting objects such as traffic lights and pedestrian information, however, less attention has been paid to the Symbolic Road Markings (SRMs). SRMs are ess...
Article
Full-text available
Early detection and diagnosis of COVID-19, as well as the exact separation of non-COVID-19 cases in a non-invasive manner in the earliest stages of the disease, are critical concerns in the current COVID-19 pandemic. Convolutional Neural Network (CNN) based models offer a remarkable capacity for providing an accurate and efficient system for the de...
Chapter
There are competing priorities between creative freedom and the need for robust, stable software frameworks to facilitate the rapid implementation of creative ideas in game development. This may result in a disparity between system and user requirements. Qualitative data extracted from seminars at the Game Developers Conference informs the design o...
Chapter
This paper explores the theoretical aspect of providing context to contextually impaired individuals and offers some considerations on how a machine learning system can be adapted to learn contextual clues and then provide these to users. Context itself, is the clarifying component of a situation and helps people to understand what is happening and...
Article
Full-text available
The race for the 6th generation of wireless networks (6G) has begun. Researchers around the world have started to explore the best solutions for the challenges that the previous generations have experienced. To provide the readers with a clear map of the current developments, several review papers shared their vision and critically evaluated the st...
Cover Page
Full-text available
To meet the coming challenges, the sixth generation (6G) mobile network is expected to define the high technical standard of this new spectrum, including energy-efficient transmission techniques. The objective of this Special Issue is to define the framework of the 6th generation of communication networks, its services and breakthrough technologies...
Preprint
Full-text available
It has been 100+ years since the world's first commercial radio station started. This century witnessed several astonishing inventions (e.g. the computer, internet and mobiles) that have shaped the way we work and socialize. With the start of a new decade, it is evident that we are becoming more reliant on these new technologies as the majority of...
Chapter
Speaker Identification is the process of a machine identifying who is speaking automatically based solely on the voice of the person speaking. Recognising a person in a meeting room or on telephone, purely from their voice is an important and interesting research challenge. The voice is one of the human biometric properties. Recognition of a partic...
Chapter
Full-text available
Speaker Identification (SI) is a process of identifying a speaker automatically via a machine using the speaker’s voice. In SI, one speaker’s voice is compared with n- number of speakers’ templates within the reference database to find the best match among the potential speakers. Speakers are capable of changing their voice, though, such as their a...
Poster
Full-text available
Dear Colleagues, With the maturity and forthcoming commercialization of the fifth-generation (5G) communication networks, an exponential increase in mobile data demand can be supported, and the varying needs of vertical industries, such as creative, retail, transport, and health, as part of a much broader worldwide revolution in the digital econom...
Article
Full-text available
A two port 2.4 to 24 GHz cryogenic Quadruple-Ridged Flared Horn (QRFH) Feed with 10:1 impedance bandwidth is selected for presentation and investigation in this paper. The antenna geometry is formed by using simulation-based optimization which satisfies several stringent design requirements, including impedance bandwidth and radiation characteristi...
Article
Full-text available
While the theory of designing for Universal Access is increasingly understood, there remain persistent issues over realising products and systems that meet the goal of being accessible and usable by the broadest possible set of users. Clearly, products or services that are designed without even considering the needs of the wider user base are impli...
Article
Full-text available
Several traffic models for the Internet of Things (IoT) have been proposed in the literature. However, they can be considered as heuristic models since they only reflect the stochastic characteristic of the generated traffic. In this paper, we propose a model to represent the communication of IoT devices. The model was used to obtain the traffic ge...
Chapter
Full-text available
Real-time systems make their decisions based on information communicated from sensors. Consequently, delivering information in a timely manner is critical to such systems. In this paper, a policy for delivering fresh information (or minimising the Peak Age of the information) is proposed. The proposed policy, i.e., the Adaptive Status Arrivals Poli...
Chapter
It is approaching 20 years since the first issue of the International Journal on Universal Access was published and also that the first International Conference on Universal Access in Human-Computer Interaction was held. This paper reflects on how the field of Universal Access has evolved over the intervening period and proposes new areas of resear...
Article
Full-text available
The Zero-Wait (ZW) policy is widely held to achieve maximum information 'freshness', i.e., to achieve minimum Peak Age (PA) and maximum throughput, for real-time Internet-of-Things applications. In this paper, it was shown through a series of experiments that the ZW policy is not necessarily the optimum policy for freshness nor throughput in all re...
Conference Paper
Swarm robotics coordinates multiple interacting robots for which it takes inspiration from nature. It has been used in different engineering applications, such as: food searching, path planning, and communication between robots. Additionally, when robots are used to explore unknown areas this can safeguard humans from having to take unnecessary ris...
Chapter
While the theory of designing for Universal Access is increasingly understood, there remain persistent issues over realising products and systems that meet the goal of being accessible and usable by the broadest possible set of users. Clearly products or service that are designed without even considering the needs of the wider user base are implici...
Chapter
As powerful as finite element modelling (FEM) is, its future is expected to be both exciting and challenging. This chapter seeks to explore this future in order to identify strands of research that have to be carried out in order to sustain the impact of FEM within academic and industrial communities. This chapter starts by identifying the current...
Chapter
No FEM solution is possible without defining the behaviour/conditions of the nodes at the boundaries of the virtual domain, the so-called boundary conditions of the FEM model. Therefore, the solution of any FEM problem is highly dependent on the boundary conditions implemented. This chapter explores this extremely important feature of an FEM model....
Chapter
This chapter presents a methodology for designing a simple finite element solver. The implementation is carried out inside MATLAB™ and the simulation engine is driven by the Direct Stiffness Method (DSM) presented in Chap. 3. In order to illustrate this, the authors have presented an in-house finite element solver they created called: MATLAB Finite...
Chapter
An essential part of an engineer’s training is the development of necessary skills to analyse and predict the behaviour of engineering systems under different loading conditions . Only a small proportion of real engineering problems can be solved analytically; hence, there arises the need to use numerical methods capable of accurately simulating re...
Chapter
The finite element method seeks to offer solutions of displacements arising when loads are applied on a structure. It can also determine the forces that results when a displacement loading condition is imposed on the structure. Finite element meshes play an important role in the derivation of the displacements for a structure. Element formulation d...
Chapter
The quality of a mesh is crucially important if fem solutions are to be deemed acceptable. Too coarse a mesh will lead to inaccurate FEM solutions. The finer the mesh, the better the convergence of the numerical solution. However, finer meshes tend to be expensive in terms of computing resources. The experienced user of FEM would have, over time, d...
Chapter
The material response of a defined virtual domain within FEM is defined using carefully formulated constitutive models. This chapter describes some of the most common in-built material models in commercially available FEM solvers. It is important to gain this theoretical, as well as practical, understanding in order for the user to interpret FEM ou...
Chapter
A virtual domain is the geometric representation of the boundaries that enclose a given physical system under consideration. All FEM implementations must include a virtual domain, which is the basis upon which the finite element solution to the physical problem is determined. This chapter presents the considerations that an FE user/developer has to...
Chapter
At the core of the finite element modelling process are a diverse possible range of solution approaches for any particular problem. Each of these approaches are adapted for the type of problem that one is interested in, for example structural, fluid, thermal or acoustic problems. The commonest type of problems that FEM addresses are the structural...
Chapter
Amongst the many pillars upon which the FEM solutions stand is the pillar of material response. This defines the physical behaviour of the material type under investigation in the FEM problem. It is under this pillar that one distinguishes between rubbery, elastic, nonlinear, fracture and interface failure mechanisms. It is a key component of the F...
Chapter
MATLAB™ is a programming language. It is widely used for technical computation , programming and visualization of data . The scientists of this generation are taught the use of MATLAB™ in tackling diverse problems. MATLAB will be used to demonstrate the fem process in this book and therefore it is important to offer a brief introduction to MATLAB....
Book
The urgent need to keep pace with the accelerating globalization of manufacturing in the 21st century has produced rapid advances in manufacturing research, development and innovation. This book presents the proceedings of the 15th International Conference on Manufacturing Research (ICMR 2017), which also incorporated the 32nd National Conference...
Article
Full-text available
Many new assistive input systems developed to meet the needs of users with functional impairments fail to make it out of the research laboratory and into regular use by the intended end users. This paper examines some of the reasons for this failure and focuses particularly on whether the developers of such systems are using the correct metrics and...
Conference Paper
Much research is now focusing on how technology is moving away from the traditional computer to a range of smart devices in smart environments, the so-called Internet of Things. With this increase in computing power and decrease in form factor, we are approaching the possibility of a new generation of robotic assistants able to perform a range of t...
Article
In this paper, we proposed a generative model for feature selection under the unsupervised learning context. The model assumes that data are independently and identically sampled from a finite mixture of Student's t distributions, which can reduce the sensitiveness to outliers. Latent random variables that represent the features' salience are inclu...
Chapter
Since the introduction of undergraduate and postgraduate programmes in Mechatronics and related subjects in the mid-1980s, there has been a near continuous debate as to the nature and standing of Mechatronics both as an Engineering discipline and in relation to its role within Engineering Design. In the case of Mechatronics education, what has emer...
Conference Paper
Many new assistive input systems developed to meet the needs of users with functional impairments fail to make it out of the research laboratory and into regular use by the intended end users. This paper examines some of the reasons for this and focuses particularly on whether the developers of such systems are using the correct metrics for evaluat...
Article
There is an increasing awareness that many everyday products and services present challenges and difficulties to potential users. These difficulties may arise because the products and services have not been designed to allow for the full range of functional capabilities of the users who wish to use them. Medical conditions, accidents, ageing, or ge...
Article
Designing for Universal Access requires designers to have a good understanding of the full range of users and their capabilities, appropriate datasets, and the most suitable tools and techniques. Education clearly plays an important role in helping designers acquire the knowledge and skills necessary to find the relevant information about the users...
Article
Fitting a sparse surface to approximate vast dense data is of interest for many applications: reverse engineering, recognition and compression, etc. The present work provides an approach to fit a Loop subdivision surface to a dense triangular mesh of arbitrary topology, whilst preserving and aligning the original features. The natural ridge-joined...
Conference Paper
It is known that the adoption of user-centred design processes can lead to more universally accessible products and services. However, the most frequently cited approach to user-centred design, i.e. participatory design, can be both problematic and expensive to implement., particularly over the difficulty of finding and recruiting suitable particip...
Article
We developed a probabilistic model for canonical correlation analysis in the case when the associated datasets are incomplete. This case can arise where data entries either contain measurement errors or are censored (i.e., nonignorable missing) due to uncertainties in instrument calibration and physical limitations of devices and experimental condi...
Chapter
Having looked at the nature of brand risk and the levels of awareness and ability to manage risk of a range of brand owners, it is clear that a new approach to brand risk management is required. It is unlikely that a one-size-fits-all approach is likely to work given the scale and variety of the nature of brand risks. Consequently, this chapter foc...
Chapter
One of the difficulties in writing a book like this is knowing when to stop writing. Through the course of writing this one, we have been paying attention to the stream of stories in mainstream media arising from brandjacking, cybersquatting and an assorted collection of other dubious or suspect practices in cyberspace. The consequences of these ex...
Chapter
This chapter examines what a brand is and how much a brand is worth for a company. A definition of what makes a brand is provided, along with examples of how brand value can be increased. The value of brands has increased substantially with the rise of mass media and globalisation. While this has clearly been of benefit to brand owners, who have se...
Chapter
This chapter introduces a number of approaches to quantifying and communicating the nature of brand risks through, for example, the use of models and risk maps. Furthermore, it discusses a number of generic brand defence strategies that can be employed. This chapter then provides a description of typical brand risk management tools that are availab...
Chapter
In this introductory chapter, we explore the nature of brand risks and discuss the motivation behind the writing of this book. The rise of the internet and social media offer great opportunities for brand owners to increase business and brand recognition. However, they also offer opportunities for less scrupulous people to take advantage of those b...
Conference Paper
Technology is advancing at a fast pace while the shape and nature of computers continues to evolve, with tablets and smartphones illustrating the move away from the traditional notion of a laptop or desktop computer. Similarly, networking and sensing technologies are also developing rapidly and innovatively. All of these technologies have the poten...
Article
To respond to an ageing population, eHealth strategies offer significant opportunities in achieving a balanced and sustainable healthcare infrastructure. Advances in technology both at the sensor and device levels and in respect of information technology have opened up other possibilities and options. Of significance among these is what is increasi...
Article
Universal Access is commonly interpreted as focusing on designing for users with atypical requirements—specifically users with disabilities or older adults. However, Universal Access is also about providing access to users in all situations and circumstances, including those that place extraordinary or unusual demands on the users who might otherwi...
Chapter
In February 2011, the IBM Watson Q&A (Question and Answer) system took part in a special challenge, pitting its question and answer capability against former Jeopardy!TM grand champions in a televised match. Watson emerged victorious from the challenge, demonstrating that current question answering technology has advanced to the point where it can...
Article
This paper explores issues related to human–computer interaction with the new class of machine-learning systems that represent an exciting development on the frontiers of information technology. These systems represent a significant breakthrough in humanity's decades-long endeavor to build computers that are “more like us”—fundamentally designed to...
Conference Paper
This paper describes the development of the “Usability and Accessibility” course for M.Sc. students at the IT University of Copenhagen. The aim is to examine whether this course provides an effective and useful method for raising the issues around Universal Access with the designers of the future. This paper examines the results and conclusions fro...
Conference Paper
This paper examines how motion sensitive remote control devices can improve the usability of television sets for older adults. It investigates the use of a pointing remote control where the actions are read and selected on the TV screen by a group of users between 65-85 years old. It was seen that the test participants universally wanted a more usa...
Chapter
This paper describes a study about how people currently use computer-based calendar applications and examines which features do not meet their needs and expectations. Survey data was collected from 88 participants based in 6 organisations using 3 different calendar applications. Detailed follow-up interviews and focus groups were conducted with 13...
Conference Paper
Full-text available
As computer systems become increasingly more pervasive in everyday life, it is simultaneously becoming ever more important that the concept of universal access is accepted as a design mantra. While many physical impairments and their implications for human-computer interaction are well understood, cognitive impairments have received comparatively l...
Conference Paper
Universal access is commonly interpreted as focusing on designing for users with atypical requirements – specifically users with disabilities or older adults. However, universal access is also about providing access to users in all situations and circumstances, including those that place extraordinary burdens on the users. This paper examines the d...
Chapter
For people with functional impairments, access to, and independent control of, a computer can be an important part of everyday life. For example, people whose impairments prevent communication through writing or speaking can, with appropriate technology, perform these activities with computer assistance. Improved computer access has also been shown...
Article
The aim of this study was to evaluate a new click assistance technique, Steady Clicks, designed to help computer users with motor impairments to click more accurately using a mouse. Specifically, Steady Clicks suppresses two types of errors: slipping while clicking and accidentally clicking. Steady Clicks suppresses these errors by freezing the cur...
Conference Paper
In many respects, cognitive difficulties and learning impairments are the poor relation of Universal Access (UA) research. Research into emotional impairments is even less common. A simple review of almost any general UA or Assistive Technology conference proceedings will typically show a strong bias towards sensory (vision and hearing) impairment...
Conference Paper
Current experience shows that vocational context has a vital role to play in research on inclusive information society technology, for at least four reasons. First, the occurrence of disabilities has a major impact on employability and employment. However, the potentially significant contribution of accessible and usable information society technol...
Article
In October 2005, the IBM Human Ability and Accessibility Center and T.J. Watson Research Center hosted a symposium on “cognitive and learning difficulties and how they affect access to IT systems”. The central premise of the symposium was the recognition that cognitive and learning difficulties have a profound impact on a person’s ability to intera...
Conference Paper
Full-text available
Slipping while clicking and accidental clicks are a source of errors for mouse users with motor impairments. The Steady Clicks assistance feature suppresses these errors by freezing the cursor during mouse clicks, preventing overlapping button presses and suppressing clicks made while the mouse is moving at a high velocity. Evaluation with eleven t...
Article
Many HCI products exclude potential users unnecessarily. Such exclusion often arises because of a mismatch between designers’ perceptions of the wants and needs of the end-user and their actual wants and needs. Sometimes the mismatch originates from the designer being unaware of the need to design inclusively, or of methods for implementing inclusi...
Article
Member of SIGACCESS since: 1997Member of ACM since: 1994Also member of: SIGCHI
Article
Member of SIGACCESS since: 1985Member of ACM since: 1985Also member of: SIGCSE
Article
Member of SIGACCESS since: 2004Member of ACM since: 2004Also member of: SIGCSE (Computer Science Education)
Article
Member of SIGACCESS since: 1996Member of ACM since: 1996Also member of: SIGCHI
Article
Member of SIGACCESS since: 1999Member of ACM since: 1999
Article
Member of SIGACCESS since: 1981Member of ACM since: 1981Also member of: SIGCSE, SIGCHI
Article
Member of SIGACCESS since: 2001Member of ACM since: 2000Also member of: SIGCHI
Article
Member of SIGACCESS since: 2005Member of ACM since: 2005Also member of: SIGCHI
Article
Member of SIGACCESS since: 2004Member of ACM since: 2004Also member of: SIGCHI
Article
Member of SIGACCESS since: The beginningMember of ACM since: (Almost the beginning) 1960Also member of: None
Article
Member of SIGACCESS since: Not sureMember of ACM since: 1994Also member of: SIGART
Conference Paper
This paper examines the issues facing companies when designing products and services for equitable access, particularly in view of the legislated requirements that they have to meet. The concepts of acceptability and accessibility are discussed and a framework proposed for establishing whether a product or service is acceptably accessible. Relevant...
Article
This paper presents a study investigating how the performance of motion-impaired computer users in “point and click” tasks varies with target distance (A), target width (W), and force-feedback gravity well width (GWW). Six motion-impaired users performed “point and click” tasks across a range of values for A, W, and GWW. Times were observed to incr...
Article
This paper presents a study investigating how the performance of motion-impaired computer users in “point and click” tasks varies with target distance (A), target width (W), and force-feedback gravity well width (GWW). ...
Conference Paper
Point-and-click tasks are known to present difficulties to users with physical impairments, particularly motor- or vision-based, and to older adults. This paper presents the results of a study to quantify and understand the effects of age and impairment on the ability to perform such tasks. Results from four separate user groups are presented and c...
Article
IBM has a long history of addressing the issues of employees and customers with disabilities through hiring and workplace practices, and through research and productisation of accessibility technologies. In 1999 IBM established an Accessibility Center with a focus on making our offerings accessible, exploiting accessibility technologies developed i...
Article
Full-text available
Inclusive, or universal, design is about designing more accessible products and services for the widest possible range of users, regardless of age and capabilities. It requires better understanding and empathy with all potential users. Traditional user research methods are limited in accommodating a wide range of users and hence there is a need to...
Article
Understanding human movement is key to improving input devices and interaction techniques. This paper presents a study of mouse movements of motion-impaired users, with an aim to gaining a better understanding of impaired movement. The cursor trajectories of six motion-impaired users and three able-bodied users are studied according to their submov...
Article
The accessibility Works project provides software enhancements to the Mozilla™ Web browser and allows users to control their browsing environment. Although Web accessibility standards specify markup that must be incorporated for Web pages to be accessible, these standards do not ensure a good experience for all Web users. This paper discusses user...

Network

Cited By