Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Automated Python workflow for generating Sentinel-1 PSI and SBAS interferometric stacks using SNAP on Geospatial Computing Platform
Environmental Modelling & Software (ENMS), Volume 178, Issue Chttps://doi.org/10.1016/j.envsoft.2024.106075AbstractDetecting and monitoring surface deformation using radar satellite data is vital in geohazard assessment. Sentinel-1 has provided unprecedented spatial and temporal resolution, but data processing is complicated and poses computational ...
Highlights- This study introduces a Python workflow on the Geospatial Computing Platform (GCP) for generating PSI and SBAS stacks.
- Parallelization on GCP enhances workflow performance and reduces computing time for PSI and SBAS interferograms.
- research-articleJanuary 2024
Landslide velocity mapping using ALOS-2 PALSAR-2 ScanSAR data
Procedia Computer Science (PROCS), Volume 239, Issue CPages 2278–2285https://doi.org/10.1016/j.procs.2024.06.419AbstractThis work discusses landslide velocity mapping in the Swiss Alps using ALOS-2 PALSAR-2 ScanSAR differential interferometry and interferometric time series analyses based on small data stacks of about 10 images over eight years. A wide area ...
- research-articleJanuary 2024
Comparative analysis of MT-InSAR algorithms supported by GNSS data and corner reflectors: Assessing performance and accuracy
Procedia Computer Science (PROCS), Volume 239, Issue CPages 1460–1466https://doi.org/10.1016/j.procs.2024.06.319AbstractThis paper presents a comparative analysis of Multi-Temporal Interferometric Synthetic Aperture Radar (MT-InSAR) algorithms in a corner reflector located in Lisbon, Portugal. The reflector was monitored using daily observations from the Global ...
- ArticleJanuary 2024
- research-articleDecember 2022
A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 11, Issue 1https://doi.org/10.1186/s13677-022-00375-6AbstractIn the era of big data, an ocean of data generated by Internet of Things (IoT) devices will be analyzed and processed by cloud computing. However, outsourcing of data can lead to leakage of user privacy to those unreliable service providers. In ...
-
- research-articleNovember 2022
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations
ACM Transactions on Privacy and Security (TOPS), Volume 26, Issue 1Article No.: 2, Pages 1–44https://doi.org/10.1145/3546191Contact discovery allows users of mobile messengers to conveniently connect with people in their address book. In this work, we demonstrate that severe privacy issues exist in currently deployed contact discovery methods and propose suitable mitigations.
...
- review-articleNovember 2022
Computerized analysis of speech and voice for Parkinson's disease: A systematic review
Computer Methods and Programs in Biomedicine (CBIO), Volume 226, Issue Chttps://doi.org/10.1016/j.cmpb.2022.107133Highlights- Speech and voice may be valuable markers for PD.
- Large differences between ...
Speech impairment is an early symptom of Parkinson's disease (PD). This study has summarized the literature related to speech and voice in detecting PD and assessing its severity.
... - research-articleSeptember 2022
Biomechanical validation of structural optimized patient-specific mandibular reconstruction plate orienting additive manufacturing
Computer Methods and Programs in Biomedicine (CBIO), Volume 224, Issue Chttps://doi.org/10.1016/j.cmpb.2022.107023Highlight- Two structural optimized patient-specific mandibular reconstruction plates were designed to enhance the mandibular reconstruction.
Owing to the unexpected in vivo fracture failure of the original design, structural optimized patient-specific mandibular reconstruction plates (PSMRPs) were created to boost the biomechanical ...
- research-articleSeptember 2022
Graph neural network modelling as a potentially effective method for predicting and analyzing procedures based on patients' diagnoses
Artificial Intelligence in Medicine (AIIM), Volume 131, Issue Chttps://doi.org/10.1016/j.artmed.2022.102359Abstract BackgroundCurrently, the healthcare sector strives to improve the quality of patient care management and to enhance/increase its economic performance/efficiency (e.g., cost-effectiveness) by healthcare providers. The data ...
Highlights
- Graph Neural Networks applied to the analysis of ICD ontologies in patient populations
- research-articleJanuary 2022
Efficient post-quantum private set-intersection protocol
International Journal of Information and Computer Security (IJICS), Volume 17, Issue 3-4Pages 405–423https://doi.org/10.1504/ijics.2022.122381Private set intersection (PSI) is a cryptographic protocol that enables two parties to securely determine the intersection of their private datasets without revealing anything except the intersection. Most of the existing PSI protocols are based on ...
- research-articleJanuary 2022
Ground Movement Classification Using Statistical Tests Over Persistent Scatterer Interferometry Time Series
- S. Mohammad Mirmazloumi,
- Yismaw Wassie,
- José Antonio Navarro,
- Riccardo Palamà,
- Michele Crosetto,
- Oriol Monserrat
Procedia Computer Science (PROCS), Volume 196, Issue CPages 21–26https://doi.org/10.1016/j.procs.2021.11.068AbstractThis study proposes modifications to an existing automatic classification method of Persistent Scatterers Interferometry (PSI) time series (TS) and a new procedure to classify ground movements into seven classes. We also represent a technique to ...
- research-articleJanuary 2019
Mastery Learning in Computer Science Education
ACE '19: Proceedings of the Twenty-First Australasian Computing Education ConferencePages 37–46https://doi.org/10.1145/3286960.3286965Mastery learning is a pedagogical approach in which students must demonstrate mastery of the currently assessed unit of material before being permitted to progress to the next unit. Recent work has suggested that mastery learning may provide a solution ...
- research-articleDecember 2018
In silico analysis of nsSNPs in ABCB1 gene affecting breast cancer associated protein P-glycoprotein (P-gp)
Computational Biology and Chemistry (COBC), Volume 77, Issue CPages 430–441https://doi.org/10.1016/j.compbiolchem.2018.08.004Graphical abstractDisplay Omitted
Highlights- ABCB1 is an environment susceptible gene that codes for P-glycoprotein (P-gp).
- ...
Breast cancer is one of the most common cancers among women and increased expression of some polymorphic genes, which is rare within families, enhances the risk of breast cancer incidence. The correct identification of the functional ...
- posterApril 2018
BE-GOOD: open data for a smarter society
ICEGOV '18: Proceedings of the 11th International Conference on Theory and Practice of Electronic GovernancePages 704–705https://doi.org/10.1145/3209415.3209499This paper relates an ongoing experience in the field of public service information (PSI) to create new public services, mainly in the field of transport and infrastructures, and to define new methods to design them in a transnational context.
- research-articleJanuary 2018
Patient-specific instruments’ routine use over conventional total knee arthroplasty remains inconclusive: Analysis of 961 cases
- Antonio Klasan,
- Philipp Dworschak,
- Thomas J. Heyse,
- Matthias Lahner,
- Dominik Malcherczyk,
- Turgay Efe,
- Bilal Farouk El-Zayat
Technology and Health Care (TAHC), Volume 26, Issue 3Pages 523–528https://doi.org/10.3233/THC-171167BACKGROUND:An increasing demand for total knee arthroplasty (TKA) has pushed innovations in the industry and created a promising new technique called patient specific instruments (PSI). Early reports had promising results such ...
- ArticleNovember 2016
How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity
AbstractThis paper presents the first PSI protocol that achieves constant (O(1)) communication complexity with linear computation overhead and is fast even for the case of large input sets. The scheme is proven to be provably secure in the standard model ...
- articleJuly 2016
Towards fair mutual private set intersection with linear complexity
Security and Communication Networks (SACN), Volume 9, Issue 11Pages 1589–1612https://doi.org/10.1002/sec.1450In this paper, we propose a two-way oblivious pseudorandom function mOPRF secure in standard model against malicious parties under the decisional composite residuosity and decisional Diffie-Hellman assumptions. Using this two-way OPRF, we construct an ...
- ArticleNovember 2015
Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries
ProvSec 2015: Proceedings of the 9th International Conference on Provable Security - Volume 9451Pages 326–339https://doi.org/10.1007/978-3-319-26059-4_18In this paper, we study Private Set Intersection Cardinality PSI-CA protocols and propose two new constructions of PSI-CA. While one of these constructions is secure in the standard model, the other one is secure in the random oracle model ROM. The ...
- ArticleSeptember 2013
Private Set Intersection via Public Key Encryption with Multiple Keywords Search
INCOS '13: Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative SystemsPages 323–328https://doi.org/10.1109/INCoS.2013.60We introduce the technique of searchable encryption into the problem of secure two-party computation, and obtain a novel approach to accomplish Private Set Intersection (PSI), which uses the Public Key Encryption with Multiple Keywords Search (MPEKS) as ...