Currently a first year Computer Science PhD student at Aberystwyth University. I completed my Software Engineering MEng at the University in 2011.
This site contains my own undergraduate work, as well as links to a number of useful websites and tools. Within the computer science department I have taught classes on programming with perl and PHP, provided support during laboratory sessions and guided students with their projects in a drop-in advisory service. I have industrial experience developing, testing and deploying back-end code for web-based control panels.
The fusion/registration of magnetic resonance and ultrasound information can make significant contributions to the initial diagnosis and localisation of prostate cancer, and as such to the staging process (surgery/radiotherapy). In addition, the available information can be used to improve localisation of biopsies and therapy (both the targeting of specific areas and the monitoring of treatment). Current approaches to the fusion of MRI and ultrasound prostate information tend to rely on manual intervention or tracking systems.
We propose to develop a data driven approach to this fusion/registration problem, which will use prostate boundary and internal anatomical region information. The automatic segmentation of these prostate features will be based on shape and texture analysis techniques. The resulting fusion of MRI and ultrasound data will form the basis for the clinical evaluation with respect to the diagnosis and localisation of prostate cancer.
I am currently focussed on prostate boundary segmentation in TRUS and MR images.
Presentation material for the PGM0120 research training module is here.
- More About PHP (handout) - slides for a presentation on advanced PHP (object-orientation, frameworks, security and debugging) given for the CS25010 web development module.
- Looking forward to going backwards - a survey of software reverse engineering
- Virus Attacks on Linux - I wrote a small userspace program that infected and self-replicated by aliasing SSH, with an option of executing documented exploits for gaining root. I was pretty proud of it until I created this hideous poster.
- Measuring contribution to a software group - framework utilising Halstead metrics for measuring programmer contribution to a group
- Incidence Response Script - a plan of action for forensic investigation of suspect computer systems
- A Unified Approach to Modeling and Programming - slides to accompany a presentation I gave reviewing a paper by Ole Lehrmann Madsen and Birger Moller-Pedersen
- An observation of cyber threats in the 21st century - slides for a presentation based on an article from IEEE Security & Privacy
- Future Prospects for High Speed Mobile Internet Access - a discussion on the future of high speed mobile Internet
- Bilateral Comparison of Breast Tissue Density by Using Grey-Level Statistics in 2D Mammograms to Identify Regions of Abnormality - my third year dissertation on bilateral mammogram comparison with grey-level intensity measurements (summary)
- Base 64 - slides to accompany a first-year presentation I gave on base 64 encoding
- Comparison of Sun and GNU Java classpaths - a report for an assignment to analyse the complexity of some Java using the reflection API