7,389 research outputs found

    Undergraduate Catalog of Studies, 2023-2024

    Get PDF

    Radio frequency fingerprint identification for Internet of Things: A survey

    Get PDF
    Radio frequency fingerprint (RFF) identification is a promising technique for identifying Internet of Things (IoT) devices. This paper presents a comprehensive survey on RFF identification, which covers various aspects ranging from related definitions to details of each stage in the identification process, namely signal preprocessing, RFF feature extraction, further processing, and RFF identification. Specifically, three main steps of preprocessing are summarized, including carrier frequency offset estimation, noise elimination, and channel cancellation. Besides, three kinds of RFFs are categorized, comprising I/Q signal-based, parameter-based, and transformation-based features. Meanwhile, feature fusion and feature dimension reduction are elaborated as two main further processing methods. Furthermore, a novel framework is established from the perspective of closed set and open set problems, and the related state-of-the-art methodologies are investigated, including approaches based on traditional machine learning, deep learning, and generative models. Additionally, we highlight the challenges faced by RFF identification and point out future research trends in this field

    The PREVENT Study: Preventing hospital admissions attributable to gout

    Get PDF
    BackgroundGout is the most common form of inflammatory arthritis, affecting 1 in 40 people in the UK. Despite highly effective treatments, hospital admissions for gout flares have doubled in England over the last 20 years. Many of these admissions may have been prevented if optimal gout management had been delivered to patients.Objectives1. Describe the epidemiology of gout management in primary and secondary care in the UK.2. Develop an intervention package for implementation during hospitalisations for gout flares, with the aim of improving care and reducing hospitalisations.3. Implement and evaluate this intervention in people hospitalised for gout.MethodsI used population-level health datasets (CPRD, OpenSAFELY, NHS Digital Hospital Episode Statistics) to evaluate outcomes for people with incident gout diagnoses over a 20-year period. I used multivariable regression and survival modelling to analyse factors associated with outcomes, including: i) initiation of urate-lowering therapies (ULT); ii) attainment of serum urate targets; and iii) hospitalisations for gout flares.With extensive stakeholder input, I developed an evidence-based intervention package to optimise hospital gout care. This incorporated the findings of a systematic literature review and process mapping of the admitted patient journey in a cohort of hospitalised gout patients. My intervention consisted of a care pathway, based upon British (BSR), European (EULAR) and American (ACR) gout management guidelines, which encouraged ULT initiation prior to discharge, followed by a nurse-led, post-discharge review to facilitate handover to primary care. I implemented this intervention in patients hospitalised for gout flares at King’s College Hospital over a 12-month period, and evaluated outcomes including ULT initiation, urate target attainment and re-admission rates.ResultsIn the UK, between 2004 and 2020, I showed that only 29% of patients with gout were initiated on ULT within 12 months of diagnosis, while only 36% attained urate targets. No significant improvements in these outcomes were observed after publication of updated BSR and EULAR gout management guidelines. Comorbidities, including chronic kidney disease, heart failure and obesity, associated with increased odds of ULT initiation but decreased odds of attaining urate targets. For patients who were diagnosed with gout during the COVID-19 pandemic, I showed that ULT initiation improved modestly, relative to before the pandemic, while urate target attainment trends were similar. Underlying these trends was a 31% decrease in incident gout diagnoses in England during the first year of the pandemic.Using linked primary and secondary care data, I showed that the risk of hospitalisations for gout flares is greatest within the first 6 months after diagnosis. ULT initiation is associated with more hospitalisations for flares within the first 6 months of diagnosis, but a reduced risk of hospitalisations beyond 12 months; particularly when urate targets are attained.After process mapping the admitted patient journey and systematically appraising the evidence base, I developed and implemented a multi-faceted intervention at King’s College Hospital, with the aim of improving hospital gout care. Following implementation of this intervention, the proportion of hospitalised gout patients who initiated ULT increased from 49% to 92%; more patients achieved serum urate targets; and there were 38% fewer repeat hospitalisations for gout flares.ConclusionsAt a population level, ULT initiation and urate target attainment remain sub-optimal for people with gout in the UK, despite updated management guidelines. Initiation of ULT is associated with long-term reductions in hospitalisations for flares; however, only a minority of patients hospitalised for gout flares are initiated on ULT. After designing and implementing a strategy to optimise hospital gout care, over 90% of patients were initiated on ULT, urate target attainment improved, and repeat hospitalisations decreased. My findings suggest that improved primary-secondary care integration is essential if we are to reverse the epidemic of gout hospitalisations

    The MacWilliams Identity for Krawtchouk Association Schemes

    Get PDF
    The weight distribution of an error correcting code is a crucial statistic in determining its performance. One key tool for relating the weight of a code to that of its dual is the MacWilliams Identity, first developed for the Hamming association scheme. This identity has two forms: one is a functional transformation of the weight enumerators, while the other is a direct relation of the weight distributions via eigenvalues of the association scheme. The functional transformation form can, in particular, be used to derive important moment identities for the weight distribution of codes. In this thesis, we focus initially on extending the functional transformation to codes based on skew-symmetric and Hermitian matrices. A generalised b-algebra and new fundamental homogeneous polynomials are then identified and proven to generate the eigenvalues of a specific subclass of association schemes, Krawtchouk association schemes. Based on the new set of MacWilliams Identities as a functional transform, we derive several moments of the weight distribution for all of these codes

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Undergraduate Catalog of Studies, 2023-2024

    Get PDF

    Gabriel Harvey and the History of Reading: Essays by Lisa Jardine and others

    Get PDF
    Few articles in the humanities have had the impact of Lisa Jardine and Anthony Grafton’s seminal ‘Studied for Action’ (1990), a study of the reading practices of Elizabethan polymath and prolific annotator Gabriel Harvey. Their excavation of the setting, methods and ambitions of Harvey’s encounters with his books ignited the History of Reading, an interdisciplinary field which quickly became one of the most exciting corners of the scholarly cosmos. A generation inspired by the model of Harvey fanned out across the world’s libraries and archives, seeking to reveal the many creative, unexpected and curious ways that individuals throughout history responded to texts, and how these interpretations in turn illuminate past worlds. Three decades on, Harvey’s example and Jardine’s work remain central to cutting-edge scholarship in the History of Reading. By uniting ‘Studied for Action’ with published and unpublished studies on Harvey by Jardine, Grafton and the scholars they have influenced, this collection provides a unique lens on the place of marginalia in textual, intellectual and cultural history. The chapters capture subsequent work on Harvey and map the fields opened by Jardine and Grafton’s original article, collectively offering a posthumous tribute to Lisa Jardine and an authoritative overview of the History of Reading

    CoStricTor: Collaborative HTTP Strict Transport Security in Tor Browser

    Get PDF
    HTTP Strict Transport Security (HSTS) is a widely-deployed security feature in modern web browsing. It is also, however, a potential vector for user tracking and surveillance. Tor Browser, a web browser primarily concerned with online anonymity, disables HSTS as a result of this tracking potential. We present the CoStricTor protocol which crowdsources HSTS data among Tor Browser clients. It gives Tor Browser users increased resistance to man-in-the-middle attacks without exposing them to HSTS tracking. Our protocol adapts other privacy-preserving data aggregation algorithms to share data effectively among users with strong local differential privacy guarantees. The CoStricTor protocol resists denial of service attacks by design through our innovative use of Bloom filters to represent complementary data. Our simulations show our protocol can model up to 150,000 websites, providing 10,000 upgrades to HSTS for users

    Securing NextG networks with physical-layer key generation: A survey

    Get PDF
    As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding. However, with the increase of sensitive data that requires confidentiality to be transmitted and stored in the network, wireless network security risks are further amplified. Physical-layer key generation (PKG) has received extensive attention in security research due to its solid information-theoretic security proof, ease of implementation, and low cost. Nevertheless, the applications of PKG in the NextG networks are still in the preliminary exploration stage. Therefore, we survey existing research and discuss (1) the performance advantages of PKG compared to cryptography schemes, (2) the principles and processes of PKG, as well as research progresses in previous network environments, and (3) new application scenarios and development potential for PKG in NextG communication networks, particularly analyzing the effect and prospects of PKG in massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication. Moreover, we summarize open issues and provide new insights into the development trends of PKG in NextG networks
    • …
    corecore