scispace - formally typeset
Search or ask a question
Institution

Teesside University

EducationMiddlesbrough, Middlesbrough, United Kingdom
About: Teesside University is a education organization based out in Middlesbrough, Middlesbrough, United Kingdom. It is known for research contribution in the topics: Population & Context (language use). The organization has 2155 authors who have published 5540 publications receiving 118373 citations. The organization is also known as: University of Teesside.


Papers
More filters
Journal ArticleDOI
07 Apr 2015-PLOS ONE
TL;DR: It is demonstrated that only a small to moderate relationship exists between running economy and V̇O2max in highly trained distance runners, and reaffirm that running Economy and V⩽O2 max are primarily determined independently.
Abstract: A positive relationship between running economy and maximal oxygen uptake (VO2max) has been postulated in trained athletes, but previous evidence is equivocal and could have been confounded by statistical artefacts Whether this relationship is preserved in response to running training (changes in running economy and VO2max) has yet to be explored This study examined the relationships of (i) running economy and VO2max between runners, and (ii) the changes in running economy and VO2max that occur within runners in response to habitual training 168 trained distance runners (males, n = 98, VO2max 730 ± 63 mL∙kg-1∙min-1; females, n = 70, VO2max 652 ± 59 mL kg-1∙min-1) performed a discontinuous submaximal running test to determine running economy (kcal∙km-1) A continuous incremental treadmill running test to volitional exhaustion was used to determine VO2max 54 participants (males, n = 27; females, n = 27) also completed at least one follow up assessment Partial correlation analysis revealed small positive relationships between running economy and VO2max (males r = 026, females r = 025; P 85% of the variance in these parameters unexplained by this relationship, these findings reaffirm that running economy and VO2max are primarily determined independently

46 citations

Journal ArticleDOI
TL;DR: In this paper, two 3D models of the fourth and fifth vertebrae were developed to clarify the mechanical causes of low back pain, and the results showed large stress concentrations were found in the superior and inferior facet region and on the central surfaces of the vertebral body.

46 citations

Journal ArticleDOI
TL;DR: A training programme aimed at improving lateral weight transference did not appear to enhance the rehabilitation of acute stroke patients, and improvements observed in postural control in standing and sitting may be attributable to usual care or natural recovery.
Abstract: Objectives: To evaluate a training programme aimed at improving lateral weight transference in patients following acute stroke to determine main treatment effects, if any, to inform the design of future studies.Design: A single-blind randomized controlled trial.Setting: The Stroke Unit at The James Cook University Hospital, Middlesbrough, UK.Subjects: Thirty-five patients with an acute stroke.Interventions: All subjects received their usual care, including physiotherapy. The treatment group (n / 17) received 12 additional therapy sessions (over four weeks) comprising exercises aimed at improving lateral weight transference in sitting delivered by trained physiotherapy assistants.Main outcome measures: Measures of dynamic reaching, sitting and standing, and static standing balance were undertaken by a blind independent observer.Results: Specific measures of weight displacement in standing and reaching, and timed standing up and sitting down did not detect any differences over time regardless of group. Neit...

46 citations

Journal ArticleDOI
TL;DR: Empirical results on the Bot-IIoT dataset demonstrate that the developed distributed Deep-IFS can effectively handle Big IIoT traffic data compared with the present centralized DL-based forensics techniques.
Abstract: The extensive propagation of industrial Internet of Things (IIoT) technologies has encouraged intruders to initiate a variety of attacks that need to be identified to maintain the security of end-user data and the safety of services offered by service providers. Deep learning (DL), especially recurrent approaches, has been applied successfully to the analysis of IIoT forensics but their key challenge of recurrent DL models is that they struggle with long traffic sequences and cannot be parallelized. Multihead attention (MHA) tried to address this shortfall but failed to capture the local representation of IIoT traffic sequences. In this article, we propose a forensics-based DL model (called Deep-IFS) to identify intrusions in IIoT traffic. The model learns local representations using local gated recurrent unit (LocalGRU), and introduces an MHA layer to capture and learn global representation (i.e., long-range dependencies). A residual connection between layers is designed to prevent information loss. Another challenge facing the current IIoT forensics frameworks is their limited scalability, limiting performance in handling Big IIoT traffic data produced by IIoT devices. This challenge is addressed by deploying and training the proposed Deep-IFS in a fog computing environment. The intrusion identification becomes scalable by distributing the computation and the IIoT traffic data across worker fog nodes for training the model. The master fog node is responsible for sharing training parameters and aggregating worker node output. The aggregated classification output is subsequently passed to the cloud platform for mitigating attacks. Empirical results on the Bot-IIoT dataset demonstrate that the developed distributed Deep-IFS can effectively handle Big IIoT traffic data compared with the present centralized DL-based forensics techniques. Further, the results validate the robustness of the proposed Deep-IFS across various evaluation measures.

46 citations

Book ChapterDOI
18 Jul 2014
TL;DR: A new modular shape analysis that can synthesize heap memory specification on a per method basis based on a second-order biabduction mechanism that can give interpretations to unknown shape predicates is presented.
Abstract: We present a new modular shape analysis that can synthesize heap memory specification on a per method basis. We rely on a second-order biabduction mechanism that can give interpretations to unknown shape predicates. There are several novel features in our shape analysis. Firstly, it is grounded on second-order bi-abduction. Secondly, we distinguish unknown pre-predicates in pre-conditions, from unknown post-predicates in post-condition; since the former may be strengthened, while the latter may be weakened. Thirdly, we provide a new heap guard mechanism to support more precise preconditions for heap specification. Lastly, we formalise a set of derivation and normalization rules to give concise definitions for unknown predicates. Our approach has been proven sound and is implemented on top of an existing automated verification system.We show its versatility in synthesizing a wide range of intricate shape specifications.

46 citations


Authors

Showing all 2207 results

NameH-indexPapersCitations
Martin White1962038232387
John Dixon9654336929
Derek K. Jones7637533916
Andrew T. Campbell7534728175
Greg Atkinson7430021725
Alan Burns6342419870
Carolyn Summerbell6319918987
Falko F. Sniehotta6026016194
Roland Lang5914812907
Barry Drust5520910888
Pietro Liò5461320137
Chimay J. Anumba533829445
Mark Taylor5132015426
Victor Chang5039110184
Alan M. Batterham4818313841
Network Information
Related Institutions (5)
Loughborough University
45.1K papers, 1.2M citations

91% related

Deakin University
46.4K papers, 1.1M citations

91% related

RMIT University
82.9K papers, 1.7M citations

91% related

University of Technology, Sydney
46.4K papers, 1M citations

90% related

University of York
56.9K papers, 2.4M citations

89% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202333
202254
2021460
2020439
2019336
2018311