- Wireless Networks and Protocols
- Smart Grid Energy Management
- Advanced MIMO Systems Optimization
- Cloud Computing and Resource Management
- Smart Grid Security and Resilience
- Advanced Wireless Network Optimization
- IPv6, Mobility, Handover, Networks, Security
- Network Traffic and Congestion Control
- Cooperative Communication and Network Coding
- Software-Defined Networks and 5G
- IoT and Edge/Fog Computing
- SARS-CoV-2 and COVID-19 Research
- IoT-based Smart Home Systems
- Mobile Agent-Based Network Management
- Cloud Data Security Solutions
- Service-Oriented Architecture and Web Services
- COVID-19 Clinical Research Studies
- Full-Duplex Wireless Communications
- Context-Aware Activity Recognition Systems
- Distributed and Parallel Computing Systems
- Long-Term Effects of COVID-19
- Power Line Communications and Noise
- Advanced Wireless Communication Technologies
- Anomaly Detection Techniques and Applications
- Advanced Malware Detection Techniques
Liverpool John Moores University
2015-2024
University of Cambridge
2012-2022
Papworth Hospital
2021
University College London
2021
University of Warwick
2019
Newcastle University
2017
Freeman Hospital
2017
Newcastle upon Tyne Hospitals NHS Foundation Trust
2017
North Shore University Hospital
2017
Petra University
2013
Abstract Although two-dose mRNA vaccination provides excellent protection against SARS-CoV-2, there is little information about vaccine efficacy variants of concern (VOC) in individuals above eighty years age 1 . Here we analysed immune responses following with the BNT162b2 2 elderly participants and younger healthcare workers. Serum neutralization levels binding IgG or IgA after first dose were lower older individuals, a marked drop over old. Sera from showed potency B.1.1.7 (Alpha),...
Making the smart grid a reality will entail communication capabilities that do not exist in current power grids and their legacy control systems. New elements such as distributed energy generation PHEVs necessitate changes these existing networks. These be dictated by need for new operations allow efficient management of cannot supported infra structure. Moreover, let households man age usage more efficiently through AMI HEMSs. The realization systems require pushing networks far out from...
The General Data Protection Regulation (GDPR) gives control of personal data back to the owners by appointing higher requirements and obligations on service providers who manage process data. As verification GDPR-compliance, handled a supervisory authority, is irregularly conducted; it challenging be certified that provider has been continuously adhering GDPR. Furthermore, beyond owner's capability perceive whether complies with GDPR effectively protects her This motivates us envision design...
The severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) spike N-terminal domain (NTD) remains poorly characterized despite enrichment of mutations in this region across variants concern (VOCs). Here, we examine the contribution NTD to infection and cell-cell fusion by constructing chimeric spikes bearing B.1.617 lineage (Delta Kappa variants) NTDs generating pseudotyped lentivirus. We find that Delta on a or wild-type (WT) background increases S1/S2 cleavage efficiency virus entry,...
This paper addresses the problem of access point (AP) selection in large Wi-Fi networks. Unlike current solutions that rely on received signal strength to determine best AP could serve a wireless user's request, we propose novel framework considers quality service (QoS) requirements data flow. The proposed relies function reflecting suitability satisfy QoS takes advantage flexibility and centralised nature software defined networking (SDN). A performance comparison this algorithm developed...
During the last 10 years, experts in critical infrastructure security have been increasingly directing their focus and attention to of control structures such as Supervisory Control Data Acquisition (SCADA) systems light move toward Internet-connected architectures. However, this more open architecture has resulted an increasing level risk being faced by these systems, especially they became offered services utilised via Service Oriented Architectures (SOA). For example, SOA-based SCADA...
This paper concerns the detection of abnormal data usage and unauthorized access in large-scale critical networks, specifically healthcare infrastructures. Hospitals U.K. are now connecting their traditionally isolated equipment on a large scale to Internet-enabled networks enable remote access. step-change makes sensitive accessible broader spectrum users. The focus this is safeguarding electronic patient record (EPR) systems particular. With over 83% hospitals adopting EPRs, needs be...
The popularity of Wi-Fi-enabled devices alongside the growing demand for non-licensed spectrum, has made Wi-Fi networks exceedingly congested. This endangers efficiency and negatively affect users' experience. problem is especially pressing in dense areas (e.g. shopping centers) where channel assignment more likely to be uncoordinated working environment Access Points (APs) become increasingly time-variant. As a result, availability Software-Defined Networking (SDN) network virtualization...
Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), the causative agent of disease 2019 (COVID-19), has caused widespread morbidity and mortality since its onset in late 2019. Here, we demonstrate that prior infection with human cytomegalovirus (HCMV) substantially increases SARS-CoV-2 vitro. HCMV is a common herpesvirus carried by 40%-100% population, which can reactivate lung under inflammatory conditions, such as those resulting from infection. We show both endothelial...
Various models have been proposed to explain the interplay between bottom-up and top-down mechanisms in driving saccades rapidly one or a few isolated targets. We investigate this relationship using eye-tracking data from subjects viewing natural scenes test attentional allocation high-level objects within mathematical decision-making framework. show existence of two distinct types saliency visual scene, which disappear fixations, modification by influences. Our analysis reveals...
The mission of the GRIN-Global Project is to create a new, scalable version Germplasm Resource Information System (GRIN) provide world's crop genebanks with powerful, flexible, easy-to-use plant genetic resource (PGR) information management system. system will help safeguard PGR and vital global food security, encourage use. Developed jointly by USDA Agricultural Research Service, Bioversity International Global Crop Diversity Trust, be deployed in selected worldwide 2010. .NET Framework...
We present Wi-5, a spectrum programming architecture for radio resource management in unlicensed frequency bands. It introduces control plane that offers fine grained allocation of resources, flexible configuration and wireless networking parameters, continuous monitoring the network status. These features, along with centralized nature this architecture, can effectively address congestion which often occurs To demonstrate Wi-5's capabilities, we show results obtained from emulating various...
In May 2017, a global ransomware campaign adversely affected approximately 48 UK hospitals. Response to the WannaCry cyber-attack resulted in many hospital networks being taken offline, and non-emergency patients refused care. This is clear example that data behaviour within healthcare infrastructures needs be monitored for malicious, erratic or unusual activity. There perceived lack of threat organisations with regards cyber-security. Hospital present unique vector, dependence on legacy...
The theft of medical data, which is intrinsically valuable, can lead to loss patient privacy and trust. With increasing requirements for valuable accurate information, patients need be confident that their data being stored safely securely. However, devices are vulnerable attacks from the digital domain, with many transmitting unencrypted wirelessly electronic record systems. As such, it now becoming more necessary visualise patterns trends in order identify erratic anomalous behaviours. In...
This paper focuses on addressing the Access Point (AP) selection problem by relying a centralized controller that provides global view of network. approach follows Software-Defined Networking (SDN) concept, which has long been considered in literature as an innovative method to control management functionalities for wired networks and is also now becoming hot topic context Wi-Fi networks. The proposed AP based novel algorithm relies Fittingness Factor (FF) maximize function reflects...
In spite of the enormous popularity Wi-Fi-enabled devices, utilisation Wi-Fi radio resources (e.g. RF spectrum and transmission power levels) at Access Points (APs) is degraded in current decentralised Radio Resource Management (RRM) schemes. Most state art centralised control solutions apply configurations which network-wide impacts involved parameters their mutual relationships are ignored. this paper, we propose an algorithm for jointly adjusting levels optimising channel assignment APs...
The introduction of smart meters has allowed us to monitor consumers' energy usage with a high degree granularity. Detailed electricity patterns and trends can be identified help understand daily consumer habits routines. challenge is exploit these recognise when sudden changes in behaviour occur. This would allow detailed, around the clock, monitoring person's wellbeing particularly useful for tracking individuals suffering from self-limiting conditions such as Alzheimer's, Parkinson's...
OBJECTIVES: Coronavirus disease 2019 has been reported to be a prothrombotic condition; however, multicenter data comparing this with other viral pneumonias in those requiring extracorporeal membrane oxygenation are lacking. We conducted study using whole-body CT examine the prevalence, severity, and nature of vascular complications coronavirus comparison patients pneumonias. DESIGN: analyzed scans for presence thrombosis (defined as pulmonary artery thrombus, venous systemic arterial or...