Adewale’s Instruction Manual for Performing Unattended Installation of Windows 10

For this project, I created an instruction manual for for performing unattended installation of windows 10”

Adewale Adeyemi’s Expanded Definition of Immunology

Adewale Adeyemi’s Expanded Definition of Immunology

TO: Prof. Jason Ellis

FROM: Adewale R. Adeyemi

DATE: 10/08/2020

SUBJECT: Expanded Definition of immunology


The purpose of this document is to write expanded definition on the term immunology which is a branch of biomedicine that deals with the structure and function of the immune system. The term immunology will be scarcely mention in this writing rather immune system will be made mention of a lot as immunology shines a brighter light on what compromises the immune system, its structure, how it works and cells that are essential to the immune system.

The topics covered in this paper will include the definition and structure of the immune system, types of immunity which is innate and adaptive, and immunopathology’s like autoimmunity.


“The immune system refers to a collection of cells and proteins that function to protect the skin, respiratory passages, intestinal tract and other areas from foreign antigens, such as microbes (organisms such as bacteria, fungi, and parasites), viruses, cancer cells, and toxins.”( Warrington et al, 2011, p.1).  This means the immune system is a complex network of organs tissue and substances they make which helps the body fight infections and diseases.

“The immune system is a distinct organ in vertebrates, specialized to defend against invading infections or poisons in order to preserve the integrity of the organism.” (Stefan Offermanns, 2008, p.482). Here the immune system is a collection of organs in the vertebrates which is designed to fight against infections and diseases. Both definitions are both related in the sense that, tit could be a collection of cells or a distinct organ in the body but they both fight against infections and diseases.

The innate immune response has no immunologic memory and, therefore, it is unable to recognize or “memorize” the same pathogen should the body be exposed to it in the future (Marshall et al, 2018, p.1). This means innate immune response lacks the ability to quicky and specifically recognize a virus the body as encountered before and immediately initiate a corresponding response.

Adaptive immunity, on the other hand, is antigen-dependent and antigen-specific and, therefore, involves a lag time between exposure to the antigen and maximal response. (Marshall et al, 2018, p.1). In the case of adaptive immunity, it depends on a toxin or other foreign substance which induces an immune response in the body, it then uses immunological memory to learn about the threat and enhance the immune response accordingly. Both types of immunity are related in the sense that they both act together to defend the body against infections and diseases while they both differ with the presence of immunological memory in adaptive and inmate possess no immunological memory. The immunological memory simply quickly and specifically recognizes an antigen that the body has previously encountered and initiate a corresponding immune response.


“First up, supercharging your immune system with specific foods, like garlic and honey, is an old debunked idea. “Simply put, you cannot ‘boost’ your immune system through diet, and no specific food or supplement will prevent you catching COVID-19/Coronavirus,” said the British Dietetic Association in a statement.” (Wong J, 2020, p.23). Put differently consuming food like garlic or honey or going on a diet will not boost the immune system nor prevent the body from contracting a deadly virus.

“What we do know is that some nutrients are essential to a healthy immune system, such as vitamin C, zinc and selenium. Certain dietary patterns, such as eating plenty of fruit, vegetables and wholegrains, may help reduce the inflammation that can contribute to complications in covid-19.” (Wong J, 2020, p.23). This implies consuming nutrients that are essential to the body like Vitamin C, Vitamin D or Zinc can help the body when its in the process of fighting these deadly viruses and can help reduce complications. 

Working Definition

I believe a breakthrough research in decoding how the human immune system prevents and controls disease is essential. Artificial Intelligence (AI) and machine learning are something in my field that I feel will be critical to this breakthrough. As we know, the immune system is a complex network of cells and proteins that function to protect the skin, respiratory passages, intestinal tract, and other areas from foreign antigens and decoding it would be paramount to understanding how it fights illness and diseases. Utilizing Artificial Intelligence (AI) and machine learning can help better process and analyze the immune system and help find better ways to fight disease everywhere as data can be processed a billion times faster.


Marshall, J. S., Warrington, R., Watson, W., & Kim, H. L. (2018). An introduction to immunology and immunopathology. Allergy, Asthma & Clinical Immunology, 14(1), N.PAG.

Warrington, R., Watson, W., Kim, H. L., & Antonetti, F. R. (2011). An introduction to immunology and immunopathology. Allergy, Asthma & Clinical Immunology, 7(S1), 1–8.

Wong, J. (2020). Beware the corona diet. New Scientist, 246(3286), 23.

Offermans, S., Rosenthal, W. (2008). Encyclopedia of Molecular Pharmacology (2 volume set) (2nd ed. 2008 ed.) Springer.

Summary of Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., & Wang, G. “Security and Privacy in the Medical Internet of Things: A Review. Security & Communication Networks”

TO: Professor Ellis

FROM: Adewale R. Adeyemi

DATE: 09/14/2020

SUBJECT: 500-word summary draft

“This is a memo for my 500-word summary of the article “Security and Privacy in the Medical Internet of Things”

Medical internet of things (MIoT) is a group of devices that can connect to the internet and monitor patient vital signs through wearable and implantable devices. It has been an efficient new technology for the healthcare system. It’s made up of the perception layer which collects vital data through wearables, the network layer which transmits the data collected the perception layer and the application layer which provides the interface needed by the users and also integrates the information from the other two layers.

As MIoT is been made use of extensively by more patients, security and privacy of these patient’s data cannot be taken for granted. This is also paramount to its success. Due to the amount of real-time data MIoT transmits, it is important to provide enough resources to protect patient’s security and privacy. Below is the 4 security and privacy recommendation. Data integrity, usability, auditing, and patient information are all recommendations that deal with how patient sensitive data is access and stored. Most MIoT devices have very low memory and the data that has been collected needs to be stored. cloud storage is currently been used and it as some existing solution to security and privacy requirements. Encryption: through cryptography is implemented at three levels of communication, link, node, and end-to-end encryption. Node is the most secure of the three because it does not all data transmission on plain text in the network node. Securing patient data is important but less complex algorithm needs to be utilized to reduce resources usage and have a fast transmission rate. A key transfer managed has been proposed to help tackle this problem. Authors claim, “To secure e-health communications, key management protocols play a vital role in the security process.” (Sun, Cai, Li, Liu, Wang, Fang, 2018, P 3). A lightweight key management that is strong and uses less resources is being used while a lightweight algorithms and encryption based on the problems the healthcare system is facing is being improved upon. Access control is another solution that authenticates users based on set policies to authenticate the user trying access sensitive data and it is important because patient data are shared electronically. Third party auditing is another solution. Since patient’s data are stored in the cloud, the service provider needs to be audited to know if their practices are ethical. Data anonymization is another solution which consists of sensitive patient data and identifier. K-anonymity is current being used it has it flaws which is being improved on. As technology advances, future security, and privacy challenges in MIoT will arise. Among them is insecure network (WIFI) which can be vulnerable to man in the middle attack, lightweight protocols for devices and data sharing. MIoT is still improving and more successful proposition will still be made.


            Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., & Wang, G. (2018). Security and Privacy in the Medical Internet of Things: A Review. Security & Communication Networks, 1–9. /10.1155/2018/5978636