- Anomaly Detection Techniques and Applications
- Data Stream Mining Techniques
- Network Security and Intrusion Detection
- Peripheral Nerve Disorders
- Computational Drug Discovery Methods
- Phonocardiography and Auscultation Techniques
- Neuroscience and Neural Engineering
- Systemic Sclerosis and Related Diseases
- Psychosomatic Disorders and Their Treatments
- Trigeminal Neuralgia and Treatments
- Epigenetics and DNA Methylation
- Ion channel regulation and function
- Hereditary Neurological Disorders
- Genetic Neurodegenerative Diseases
- Nerve Injury and Rehabilitation
- Botulinum Toxin and Related Neurological Disorders
- Spine and Intervertebral Disc Pathology
- Cardiac electrophysiology and arrhythmias
- Amyotrophic Lateral Sclerosis Research
- Synthesis and Biological Evaluation
- Advanced MRI Techniques and Applications
- Pericarditis and Cardiac Tamponade
- Infectious Encephalopathies and Encephalitis
- Spinal Dysraphism and Malformations
- SARS-CoV-2 and COVID-19 Research
GlaxoSmithKline (United States)
2011-2024
South College
2011-2024
University of Staffordshire
2019-2024
RheinMain University of Applied Sciences
2023
Singer (United States)
2023
GlaxoSmithKline (Netherlands)
2023
South African National Biodiversity Institute
2021
University of Derby
2021
Graz University of Technology
2021
Dublin City University
2021
Machine learning based intrusion detection systems monitor network data streams for cyber attacks. Challenges in this space include detecting unknown attacks, adapting to changes the stream such as underlying behaviour, human cost of labeling retrain machine model and processing memory constraints a real-time stream. Failure manage aforementioned factors could result missed degraded performance, unnecessary expense or delayed times. This research proposes new semi-supervised anomaly method,...
Histone methyltransferases (HMT) catalyze the methylation of histone tail lysines, resulting in changes gene transcription. Misregulation these enzymes has been associated with various forms cancer, making this target class a potential new area for development novel chemotherapeutics. EZH2 is catalytic component polycomb group repressive complex (PRC2), which selectively methylates H3 lysine 27 (H3K27). overexpressed prostate, breast, bladder, brain, and other tumor types recognized as...
Chagas' disease, caused by the protozoan parasite Trypanosoma cruzi, is most common cause of cardiac-related deaths in endemic regions Latin America. There an urgent need for new safer treatments because current standard therapeutic options, benznidazole and nifurtimox, have significant side effects are only effective acute phase infection with limited efficacy chronic phase. Phenotypic high content screening against intracellular infected VERO cells was used to identify a novel hit series...
Summary The theory and practice of clinical nuclear magnetic resonance (NMR) imaging is reviewed. Problems which the anaesthetist will encounter are considered, recommendations proposed. Possible uses NMR in anaesthesia discussed.
E1A binding protein (p300) and CREB (CBP) are two highly homologous multidomain histone acetyltransferases. These proteins involved in many cellular processes by acting as coactivators of a large number transcription factors. Dysregulation p300/CBP has been found variety cancers other diseases, inhibition shown to decrease Myc expression. Herein, we report the identification series potent, proline-based small-molecule acetyltransferase (HAT) inhibitors using DNA-encoded library technology...
Internet of Things (IoT) devices participate in an open and distributed perception layer, with vulnerability to cyber attacks becoming a key concern for data privacy service availability. The layer provides unique challenge intrusion detection where resources are constrained networks distributed. An additional is that IoT continuous non-stationary stream that, due their variable nature, likely experience concept drift. This research aimed review the practical applications online machine...
Computer networks are vulnerable to cyber attacks that can affect the confidentiality, integrity and availability of mission critical data. Intrusion detection methods be employed detect these in real-time. Anomaly offers advantage detecting unknown a semi-supervised fashion. This paper aims answer question if autoencoders, type feedforward neural network, provide low cost anomaly detector method for computer network data streams. Autoencoder were evaluated online with KDD'99 UNSW-NB15 sets,...
Intrusion Detection Systems (IDS) monitor com-puter networks for attack. Network data streams are potentially infinite and require real-time processing in order to provide timely detection of changing attacks. To address the nature network stream it is important consider use online learning methods IDS. Online an extension Machine Learning (ML) where special consideration given finding anomalies via supervised unsupervised methods, adapting concept drift, events, management labelling cost by...
Abstract Background Dry mouth is a common perioperative patient complaint. There are number of treatments used for dry in other settings which effective. None have been tested previously the setting. Interventions to Manage (IM DRY) compared effect water and saliva substitute on dryness. The primary objective was demonstrate feasibility conducting large randomised controlled trial secondary scientific aims were assess treatment potential efficacy. Methods Single blind, pilot (RCT) 101...