Jonathan Kok-Keong Loo

Jonathan Kok-Keong Loo
University of West London | UWL · School of Computing and Technology

PhD CEng

About

309
Publications
89,865
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,007
Citations
Additional affiliations
September 2011 - June 2017
Multimedia University
Position
  • Professor (Associate)
June 2010 - June 2017
Middlesex University, UK
Position
  • Professor (Associate)
August 2003 - June 2010
Brunel University London
Position
  • Lecturer

Publications

Publications (309)
Article
Maintenance planning program of offshore assets is a complex activity due to its impact on the operational and safety risks and consequences, dependence on personnel resource availabilities, site constraints due to operational requirements and environmental factors, and uncertainties related to various vulnerabilities on asset. This paper elaborate...
Article
With the rapid new advancements in technology, there is an enormous increase in devices and their versatile need for services. Fifth-generation (5G) cellular networks (5G-CNs) with network slicing (NS) have emerged as a necessity for future mobile communication. The available network is partitioned logically into multiple virtual networks to provid...
Conference Paper
Full-text available
This paper shows a compacted design of 4 × 4 Massive Multiple Input Multiple Output (mMIMO) antennas that will be used for future 39 GHz millimeter-wave (mm-Wave) effective communications required for 5th Generation (5G) networks. The 5G networks not only support a high data rate but also accommodate excessive internet traffic. The proposed single...
Article
Full-text available
Fifth Generation (5G) cellular networks aim to overcome the pressing demands posed by dynamic Quality of Service (QoS) constraints, which have primarily remained unaddressed using conventional network infrastructure. Cellular networks of the future necessitate the formulation of efficient resource allocation schemes that readily meet throughput req...
Article
The explosive computation demands in the Internet of Things (IoT) have triggered the research interests on unmanned aerial vehicle (UAV) assisted mobile-edge computing (MEC) systems even though there are still many challenges, such as computing delay requirement, time slot partition, and trajectory design. This letter focuses on the computing delay...
Article
Object detection is an important field in computer vision. Nevertheless, a research area that has so far not received much attention is the study into the effectiveness of anchor matching strategy and imbalance in anchor-based object detection, in particular small object detection. It is clear that the objects with larger sizes tend to match more a...
Chapter
Due to the increasing data traffic in mobile network, fifth generation (5G) will use Device to Device (D2D) communications as the underlay technology to offload traffic from the 5G core network (5GC) and push content to the edge closer to the users by taking advantage of proximity and storage features of User Equipment (UE). This will be supported...
Article
Full-text available
Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After bein...
Article
Full-text available
Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User Equipments (UEs), and thus they will require seamless and secure...
Chapter
Echocardiography image quality assessment is not a trivial issue in transthoracic examination. As the in vivo examination of heart structures gained prominence in cardiac diagnosis, it has been affirmed that accurate diagnosis of the left ventricle functions is hugely dependent on the quality of echo images. Up till now, visual assessment of echo i...
Article
Full-text available
Abstract Electric power grid infrastructure has revolutionized our world and changed the way of living. So has blockchain technology. The hierarchical electric power grid has been shifting from a centralized structure to a decentralized structure to achieve higher flexibility and stability, and blockchain technology has been widely adopted in the e...
Article
Full-text available
A nested octagon passive chipless radio frequency identification (RFID) tag with an encoding capacity of 12 bits has polarization diversity and 1:1 slot-to-bit correspondence. Its compact 23 × 23 mm footprint yields a bit density of 2.26 bits/cm2. The tag is fabricated on a flexible Rogers RT/duroid® 5880 laminate.
Article
The Fifth-Generation mobile network (5G) will enable interconnectivity between the Home Network (HN) and Data Network (DN) whereby mobile users with their User Equipment (UE) will be able to access services provided by external Service Providers (SP) seamlessly. The mobile user and SP will rely on security assurances provided by authentication prot...
Article
Existing aspect-level sentiment-classification models completely rely on the learning from given datasets. However, these are easily misled by biased samples, resulting in learning some ill-suited rules that limit their potential. The information of some specific part-of-speech (POS) categories often indicates the word sentiment polarity, which can...
Conference Paper
Full-text available
5G is the future of telecommunications, with the ever-increasing internet traffic, and demand for high data rate, the advent of 5G is the need of the day. Moreover, the frequency bands used for 2G, 3G, and 4G communications became overcrowded, so to accommodate huge internet traffic, new frequency bands were needed to be allocated, which are later...
Conference Paper
Full-text available
The heterogeneous nature of fifth generation mobile network (5G) makes the access and provision of network services very difficult and raises security concerns. With multi-users and multi-operators, Service-Oriented Authentication (SOA) and authorization mechanisms are required to provide quick access and interaction between network services. The u...
Conference Paper
Full-text available
Fifth generation mobile network (5G) is intended to solve future constraints for accessing network services. The user and network operator depend on security assurances provided by the Authentication and Key Agreement protocols (AKA) used. For 5G network, the AKA has been standardized and 5G-AKA protocol is one of the primary authentication methods...
Conference Paper
Full-text available
Fifth generation mobile network (5G) will make network services available anywhere from multiple Service Providers (SP) and its provisioning raises security concerns. The users will require seamless connectivity and secure access to these services. Mobile Network Operator (MNO) will want to provide services to users and be able to share infrastruct...
Article
Full-text available
In this work, four distinct antenna configurations for future-centric 5G applications are proposed. Initially, a single rectangular patch is designed to operate at the frequency of 28 GHz while maintaining a wide operational band. Performance of the antenna is improved by incorporating an array of identical rectangular elements resulting in a highe...
Article
Full-text available
Edge computing is a promising infrastructure evolution to reduce traffic loads and support low-latency communications. Furthermore, content-centric networks provide a natural solution to cache contents at edge nodes. However, it is a challenge for edge nodes to handle massive and highly dynamic content requests by users, and if without an efficient...
Article
A proliferation of user-generated content on the web is fueling research into sentiment analysis for improved extraction of human emotional information. Aspect-based sentiment analysis (ABSA) is currently at the focus, which seeks to predict the sentiment of certain aspects in text. The primary challenge is to recognize the relevant contexts for di...
Chapter
In order to meet a tremendous amount of data storage requirement in next-generation wireless networks, an increasing number of cloud data centers has been deployed around the world. The underlying core networks are expected to provide the ability to store data in a dynamic and scalable computing environment. The traditional Internet Protocol (IP) h...
Article
Full-text available
A novel Radio Frequency Identification (RFID) based sensor supporting touch detection and localization features is proposed in this work. The formulated sensor leverages chipless variant of RFID technology for the design of a passive fully-printable frequency domain-based sensor-incorporated tag. The sensor is composed of square resonators arranged...
Article
Language model (LM) plays an important role in natural language processing (NLP) systems, such as machine translation, speech recognition, learning token embeddings, natural language generation, and text classification. Recently, the multilayer long short-term memory (LSTM) models have been demonstrated to achieve promising performance on word-leve...
Article
This study proposes a novel methodology to detect malicious URLs using simulated expert (SE) and knowledge base system (KBS). The proposed study not only efficiently detects known malicious URLs, but also adapt countermeasure against the newly generated malicious URLs. Moreover, this study also explored which lexical features are more contributing...
Article
Full-text available
A miniaturized, polarization insensitive, and fully passive chipless radio frequency identification tag is proposed in this research article. The realized tag is based on slotted elliptical structures in a nested loop fashion with identical lengths and widths of slot resonators. Alteration of data sequence is accomplished by addition and eliminatio...
Article
Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system is a prominent concept, where a UAV equipped with a MEC server is deployed to serve a number of terminal devices (TDs) of Internet of Things (IoT) in a finite period. In this paper, each TD has a certain latency-critical computation task in each time slot to complete. Three c...
Preprint
Full-text available
Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system is a prominent concept, where a UAV equipped with a MEC server is deployed to serve a number of terminal devices (TDs) of Internet of Things (IoT) in a finite period. In this paper, each TD has a certain latency-critical computation task in each time slot to complete. Three c...
Article
Full-text available
With the rapid growth of network traffic and the enhancement of the quality of experiences of users, Information-Centric Networking (ICN), which is a content-centric network architecture with named data caching and routing, is proposed to improve the multimedia content distribution efficiency. In arbitrary topology, cache nodes and users are random...
Article
Full-text available
This article presents a 12‐bit frequency coded chipless RFID system in the frequency range of 3 to 6 GHz. The system consists of a fully printable chipless tag and a pair of high‐gain reader antennas. The tag also incorporates its own antennas to improve the read range. Information is encoded into frequency spectrum using a multi‐resonant circuit....
Article
Full-text available
In this paper, a compact and fully passive bit encoding circuit, capable of operating as a chipless radio frequency identification (RFID) tag is presented. The structure consists of novel concentric trefoil-shaped slot resonators realized using Rogers RT/duroid® 5880 laminate, occupying a physical footprint of 13.55 × 13.55 mm2. Each resonating ele...
Article
Full-text available
In this work, an integrated antenna system with Defected Ground Structure (DGS) is presented for Fourth Generation (4G) and millimeter (mm)-wave Fifth Generation (5G) wireless applications and handheld devices. The proposed design with overall dimensions of 110 mm × 75 mm is modeled on 0.508 mm thick Rogers RT/Duroid 5880 substrate. Radiating struc...
Conference Paper
Full-text available
The increased demand of data rate by mobile users has led to the evolution of mobile network technologies from the fourth generation to fifth generation (5G). 5G mobile network will support various technologies that will be able to provide low latency, offload traffic and connect vertical industries. Device-to-device (D2D) communications will be us...
Article
Full-text available
A Robustness-Driven Hybrid Descriptor (RDHD) for Noise-deterrent Texture classification is presented in this paper. This work offers the ability to categorize a variety of textures under challenging image acquisition conditions. An image is initially resolved into its low-frequency components by applying wavelet decomposition. The resulting low-fre...
Article
RFID tag antennas with stable performance on the diverse electromagnetic mounting platforms are an integral part of the ubiquitous RFID systems. This research article presents a novel tag antenna design that facilitates the said objective. The proposed antenna consists of a modified H-shaped slot structure that ensures considerable robustness from...
Conference Paper
Full-text available
In this work a quad-band, planar, low-profile and compact antenna envisioned for incorporation into portable wireless devices is presented. The antenna is modeled on flexible Rogers RT/Duroid 5880 substrate of 0.127mm thickness. The proposed antenna structure consists of symmetrically placed F-shaped slits and a curved rectangular shaped ground pla...
Article
Existing unsupervised word embedding methods have been proved to be effective to capture latent semantic information on various tasks of Natural Language Processing (NLP). However, existing word representation methods are incapable of tackling both the polysemous-unaware and task-unaware problems that are common phenomena in NLP tasks. In this work...
Article
Full-text available
This work ideates a novel texture descriptor that retains its classification accuracy under varying conditions of image orientation, scale, and illumination. The proposed Overlapped Multi-oriented Tri-scale Local Binary Pattern (OMTLBP) texture descriptor also remains insensitive to additive white Gaussian noise. The wavelet decomposition stage of...
Article
Full-text available
A compact, flexible antenna for wireless applications, i.e., WLAN/WiMAX/Wi-Fi, UMTS2100, C-Band, and DSRC is presented. The quad-band antenna is designed and analyzed in terms of efficiency, gain, radiation pattern, return loss, and VSWR. The optimized design consists of a CPW fed rectangular ring patch with the semi-circular ground. The cross-line...
Article
Full-text available
Information-Centric Networking (ICN) is being realized as a promising approach to accomplish the shortcomings of current IP-address based networking. ICN models are based on naming the content to get rid of address-space scarcity, accessing the content via name-based-routing, caching the content at intermediate nodes to provide reliable, efficient...
Article
Full-text available
In this work, we analyze the impact of buffer-aided full-duplex (FD) successive relay selection schemes with energy harvesting capability of relay nodes in amplify and forward (AF) and decode and forward (DF) relaying environments for Internet of things (IoT) networks. We propose to select a relay pair based on the energy harvested and signal stren...
Article
The Cooperative Multiple-input-multiple-output (CMIMO) scheme has been suggested to extend the lifetime of cluster heads (CHs) in cluster-based capillary networks in Internet of Things (IoT) systems. However, the CMIMO scheme introduces extra energy overhead to cooperative devices and further reduces the lifetime of these devices. In this paper, we...
Article
Full-text available
This work ideates a novel approach for designing a QR-incorporated data encoding structure that functions as a fully-passive, chipless radio frequency identification (RFID) tag. Several concentric square-shaped resonant slots embedded strategically within a QR-patterned region constitute the tag. A functional prototype is realized over an ungrounde...
Article
Text classification is a foundational task in many natural language processing applications. All traditional text classifiers take words as the basic units and conduct the pre-training process (like word2vec) to directly generate word vectors at the first step. However, none of them have considered the information contained in word structure which...
Conference Paper
Full-text available
This work proposes a compact, penta-band, slotted antenna with Defected Ground Structure (DGS). The proposed multiband resonator is intended for integration into microwave circuits and portable RF portable devices. The prototype with spurlines and DGS is designed on thin Rogers RT Duroid 5880 substrate having thickness 0.508 mm. The presented radia...
Chapter
Aspect-level sentiment classification, as a fine-grained task in sentiment classification, aiming to extract sentiment polarity from opinions towards a specific aspect word, has been made significant improvements in recent years. In this paper, we propose a series of attention strategies and design CAM-LSTM (Combining Attention Mechanism with LSTM)...
Article
Full-text available
The traditional grid operation is unfortunately lacking the resilience and responsiveness in reacting to contingency events due to the poor utilization of available resources in mitigating the shortfalls. Such an unaddressed issue may affect the grid stability and the ultimate grid blackout. Therefore, this paper models a grid optimization module c...
Article
Aspect-level sentiment classification, as a fine-grained task in sentiment classification, aiming to extract sentiment polarity from opinions towards a specific aspect word, has been made tremendous improvements in recent years. There are three key factors for aspect-level sentiment classification: contextual semantic information towards aspect wor...
Article
This paper addresses the user association problem for quality of service (QoS) provisioning and backhaul load balancing (LB) in heterogeneous networks (HetNets). This problem is exacerbated by base stations with different backhaul capacities and users with diverse QoS requirements. A user association scheme is proposed to achieve QoS provisioning a...
Article
Full-text available
Content-centric mobile ad hoc networks (CCMAN) have been demonstrated as a potential complementary to multimedia content dissemination in future wireless networks. In-network caching is one of the key techniques in CCMAN, which can significantly reduce the network traffic load and improve the content retrieval performance. However, the challenges f...
Article
Sentiment analysis, also known as opinion mining is a key natural language processing (NLP) task that receives much attention these years, where deep learning based neural network models have achieved great success. However, the existing deep learning models cannot effectively make use of the sentiment information in the sentence for sentiment anal...
Article
Full-text available
Disasters are the uncertain calamities which within no time can change the situation quite drastically. They not only affect the system’s infrastructure but can also put an adverse effect on human life. A large chunk of the IP-based Internet of Things (IoT) schemes tackle disasters such as fire, earthquake, and flood. Moreover, recently proposed Na...
Article
Community detection is a critical task for complex network analysis. It helps us to understand the properties of the system that a complex network represents and has significance to a wide range of applications. Though a large number of algorithms have been developed, the detection of overlapping communities from large scale and (or) dynamic networ...