Ralph Deters

Ralph Deters
University of Saskatchewan | U of S · Department of Computer Science

Ph.D.

About

235
Publications
83,838
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,744
Citations

Publications

Publications (235)
Conference Paper
Health data sharing is very valuable for medical research, and it has the propensity to improve diagnostics, medication, policy, lifestyle changes, and many more. At the same time, sharing health data needs to be done without compromising the privacy of patients and stakeholders where necessary. However, recent advances in AI/ML and sophisticated a...
Conference Paper
In the era of Medical 4.0, technologies such as big data, wearables, and Machine Learning (ML) are being deployed for predictive healthcare delivery. In this regard, digital twins have been adopted in healthcare to enhance diagnosis and personalized treatment. Health Digital Twins (HDTs) are virtual representations of patients’ data, mirroring the...
Article
Full-text available
Artificial Intelligence and Machine Learning (AI/ML) as analytical tools can be applied across multiple social domains. Thus, these tools are being deployed in several ways to address societal issues and concerns for “social good”. For instance, AI/ML has applicable use cases for crisis response, economic empowerment, educational demands, environme...
Conference Paper
Full-text available
Security and privacy are primary concerns in IoT management. Security breaches in IoT resources, such as smart sensors, can leak sensitive data and compromise the privacy of individuals. Effective IoT management requires a comprehensive approach to prioritize access security and data privacy protection. Digital twins create virtual representations...
Preprint
Full-text available
Security and privacy are primary concerns in IoT management. Security breaches in IoT resources, such as smart sensors, can leak sensitive data and compromise the privacy of individuals. Effective IoT management requires a comprehensive approach to prioritize access security and data privacy protection. Digital twins create virtual representations...
Article
Full-text available
There are millions of People Living with HIV/AIDS (PLWHA) globally and over the years, addressing their concerns has been topical for many stakeholders. It is a well-known and established fact that PLWHA are at increased risk of victimization and stigmatization. Unfortunately, the world experienced an outbreak of the COVID-19 pandemic that has led...
Article
Data management is the collection, processing, storing, and sharing of data. In today's dispensation, data sharing and collaborative data processing is a necessity for multi-partner organizations as it can lead to the discovery of new insight. Shared data is generally for the purpose of marketing, advertising, and other institutional decision-makin...
Article
The use of machine learning (ML) in crop disease detection has gain significant attention from both academia and industry lately. This paper posits that ML techniques can be employed for early detection and diagnosis of the two (2) major diseases that affect cocoa production namely – Swollen Shoot and Black Pod. In this regard, a mobile application...
Article
The major setback for data sharing is that data producers (i.e., subjects) are not able to determine how their data is being used/misused by data collectors (custodians). In view of this challenge, data trusts have been suggested to solve the problem of mistrust in multi-partner data sharing scenarios. In this research, we proposed Data Trusts as a...
Article
Colorectal cancer is one of the leading causes of cancer-related death, worldwide. Early detection of suspicious tissues can significantly improve the survival rate. In this study, the performance of a wide variety of deep learning-based architectures is evaluated for automatic tumor segmentation of colorectal tissue samples. The proposed approach...
Article
Full-text available
Auditing provides essential security control in computer systems by keeping track of all access attempts, including both legitimate and illegal access attempts. This phase can be useful in the context of audits, where eventual misbehaving parties can be held accountable. Blockchain technology can provide the trusted auditability required for access...
Article
Full-text available
Trust is the main barrier preventing widespread data sharing. The lack of transparent infrastructure for implementing data trust prevents many data owners from sharing their data and concerns data users regarding the quality of the data. Data trust is a paradigm that facilitates data sharing by forcing data users to be transparent about the process...
Article
Full-text available
We propose a new platform for user modeling with blockchains that allows users to share data without losing control and ownership of it and applied it to the domain of travel booking. Our new platform provides a solution to three important problems: ensuring privacy and user control, and incentives for sharing. It tracks who shared what, with whom,...
Preprint
Full-text available
Computer-Aided Diagnosis (CAD) systems have emerged to support clinicians in interpreting medical images. CAD systems are traditionally combined with artificial intelligence (AI), computer vision, and data augmentation to evaluate suspicious structures in medical images. This evaluation generates vast amounts of data. Traditional CAD systems belong...
Preprint
Auditing provides an essential security control in computer systems, by keeping track of all access attempts, including both legitimate and illegal access attempts. This phase can be useful to the context of audits, where eventual misbehaving parties can be held accountable. Blockchain technology can provide trusted auditability required for access...
Conference Paper
Full-text available
Colorectal cancer is the third most common cancer-related death after lung cancer and breast cancer worldwide. The risk of developing colorectal cancer could be reduced by early diagnosis of polyps during a colonoscopy. Computer-aided diagnosis systems have the potential to be applied for polyp screening and reduce the number of missing polyps. In...
Chapter
Full-text available
Colorectal cancer is the third most common cancer-related death after lung cancer and breast cancer worldwide. The risk of developing colorectal cancer could be reduced by early diagnosis of polyps during a colonoscopy. Computer-aided diagnosis systems have the potential to be applied for polyp screening and reduce the number of missing polyps. In...
Preprint
Full-text available
The newly identified Coronavirus pneumonia, subsequently termed COVID-19, is highly transmittable and pathogenic with no clinically approved antiviral drug or vaccine available for treatment. The most common symptoms of COVID-19 are dry cough, sore throat, and fever. Symptoms can progress to a severe form of pneumonia with critical complications, i...
Preprint
Full-text available
Colorectal cancer is the third most common cancer-related death after lung cancer and breast cancer worldwide. The risk of developing colorectal cancer could be reduced by early diagnosis of polyps during a colonoscopy. Computer-aided diagnosis systems have the potential to be applied for polyp screening and reduce the number of missing polyps. In...
Preprint
Full-text available
IoT systems have enabled ubiquitous communication in physical spaces, making them smart Nowadays, there is an emerging concern about evaluating suspicious transactions in smart spaces. Suspicious transactions might have a logical structure, but they are not correct under the present contextual information of smart spaces. This research reviews susp...
Chapter
Full-text available
In recent years, the digital world has experienced a massive amount of data being captured in various domains due to improvements in technology. Accordingly, big data management has emerged for storing, managing, and extracting valuable knowledge from collected data. Due to the explosion of the amount of data, developing tools for accurate and time...
Chapter
Full-text available
Big Data analytics or systems developed with parallel distributed processing frameworks (e.g., Hadoop and Spark) are becoming popular for finding important insights from a huge amount of heterogeneous data (e.g., image, text, and sensor data). These systems offer a wide range of tools and connect them to form workflows for processing Big Data. Inde...
Conference Paper
Full-text available
Melanoma is one of the deadliest skin cancers. Early diagnosis plays an essential role in effective treatment planning and reducing the mortality rate of skin cancer. In this study, we propose a compact deep learning-based classification model with a separable convolutional neural network for melanoma detection. The proposed architecture is aimed t...
Conference Paper
Full-text available
Diabetic retinopathy (DR) is one of the major causes of blindness worldwide. With proper treatment, early diagnosis of DR can prevent the progression of the disease. In this paper, we present a new feature extraction method using a modified Xception architecture for the diagnosis of DR disease. The proposed method is based on deep layer aggregation...
Conference Paper
Full-text available
Breast cancer is one of the leading causes of death across the world in women. Early diagnosis of this type of cancer is critical for treatment and patient care. Computer-aided detection (CAD) systems using convolutional neural networks (CNN) could assist in the classification of abnormalities. In this study, we proposed an ensemble deep learning-b...
Conference Paper
Full-text available
Breast cancer is one of the most common causes of cancer-related death in women worldwide. Early and accurate diagnosis of breast cancer may significantly increase the survival rate of patients. In this study, we aim to develop a fully automatic, deep learning-based, method using descriptor features extracted by Deep Convolutional Neural Network (D...
Conference Paper
Full-text available
Automatic detection of leukemic B-lymphoblast cancer in microscopic images is very challenging due to the complicated nature of histopathological structures. To tackle this issue, an automatic and robust diagnostic system is required for early detection and treatment. In this paper, an automated deep learning-based method is proposed to distinguish...
Conference Paper
Access control is a mechanism in computer security that regulates access to the system resources. The current access control systems face many problems, such as the presence of the third-party, inefficiency, and lack of privacy. These problems can be addressed by blockchain, the technology that received major attention in recent years and has many...
Conference Paper
Full-text available
Community-based online platforms for hospitality services have connected hosts and guests globally. With the increasing popularity of those platforms - e.g., Airbnb - some management issues have attracted the attention of researchers — for instance, granting access to properties and rooms remotely, without requiring hosts and guests to meet in pers...
Preprint
Full-text available
Automatic detection of leukemic B-lymphoblast cancer in microscopic images is very challenging due to the complicated nature of histopathological structures. To tackle this issue, an automatic and robust diagnostic system is required for early detection and treatment. In this paper, an automated deep learning-based method is proposed to distinguish...
Preprint
Full-text available
Breast cancer is one of the most common causes of cancer-related death in women worldwide. Early and accurate diagnosis of breast cancer may significantly increase the survival rate of patients. In this study, we aim to develop a fully automatic, deep learning-based, method using descriptor features extracted by Deep Convolutional Neural Network (D...
Preprint
Full-text available
Breast cancer is one of the leading causes of death across the world in women. Early diagnosis of this type of cancer is critical for treatment and patient care. Computer-aided detection (CAD) systems using convolutional neural networks (CNN) could assist in the classification of abnormalities. In this study, we proposed an ensemble deep learning-b...
Preprint
Full-text available
With the advent of blockchain technology, some management tasks of IoT networks can be moved from central systems to distributed validation authorities. Cloud-centric blockchain implementations for IoT have shown satisfactory performance. However, some features of blockchain are not necessary for IoT. For instance, a competitive consensus. This res...
Preprint
Full-text available
The tremendous technological advancement in the last few decades has brought many enterprises to collaborate in a better way while making intelligent decisions. The use of Information Technology tools in obtaining data of people's everyday life from various autonomous data sources allowing unrestricted access to user data has emerged as an importan...
Preprint
Access to the system resources. The current access control systems face many problems, such as the presence of the third-party, inefficiency, and lack of privacy. These problems can be addressed by blockchain, the technology that received major attention in recent years and has many potentials. In this study, we overview the problems of the current...
Conference Paper
Full-text available
The high demand for food makes it necessary to implement plant phenotyping processes into breeding programs to deal with global food security. Image-based plant phenotyping generates vast amounts of data. Traditionally, this data has been managed in a centralized manner requiring that an administrator grants access permissions. This approach has so...
Conference Paper
Full-text available
Physical inactivity has been recognized as one of the leading causes of non-communicable diseases and mortality globally. Though persuasive technology has been identified as a potential tool for tackling physical inactivity and sedentary behaviors, very little attention has been paid to investigating the effectiveness of culture-tailored interventi...
Conference Paper
Distributed Ledger (blockchain) technology provides an alternative for distributed databases. It creates a secure and immutable record of data transactions, thus tracking how data are shared and accessed. The access and operations on data can be regulated via "smart contracts" that allows setting conditions for accessing the data - by whom, for wha...
Chapter
Full-text available
The idea of connecting physical things and cyber components to enable new and richer interactions is a key component in any smart space concept. One of the central challenges in these new smart spaces is the access control of data, services and things. In recent years, Distributed Ledger technology (DLT) like Blockchain Technology (BCT), emerged as...
Preprint
Full-text available
Many studies have been done to improve the performance of centrally controlled business processes and enhance the integration between different parties of these collaborations. However, the most serious issues of collaborative business processes remained unsolved in these studies, lack of trust and divided data on various confidential ledgers. Bloc...
Preprint
The set of distributed ledger architectures known as blockchain is best known for cryptocurrency applications such as Bitcoin and Ethereum. These permissionless block chains are showing the potential to be disruptive to the financial services industry. Their broader adoption is likely to be limited by the maximum block size, the cost of the Proof o...
Preprint
Full-text available
Using blockchain as a decentralized backend infrastructure has grabbed the attention of many startups entrepreneurs and developers. Blockchain records transactions permanently and protects them from undesirable tampering. It provides a reliable tamper-proof database which can be considered as a trustable source for tracking the previous system stat...
Conference Paper
Full-text available
With the advent of blockchain technology, some management tasks of IoT networks can be moved from central systems to distributed validation authorities. Cloud-centric blockchain implementations for IoT have shown satisfactory performance. However, some features of blockchain are not necessary for IoT. For instance, a competitive consensus. This res...
Article
Full-text available
Blockchain is the promising technology of recent years, which has attracted remarkable attention in both academic studies and practical industrial applications. The smart contract is a programmable transaction that can perform a sophisticated task, execute automatically, and store on the blockchain. The smart contract is the key component of the bl...
Article
Full-text available
A promise of mHealth is its capacity to facilitate the consumption of Electronic Health Record (EHR) data using mobile devices, which is central to promoting remote healthcare delivery. Our ongoing project, called SOPHRA, in collaboration with the City Hospital in Saskatoon, Canada, focuses on supporting care providers (e.g., physicians) in the col...
Conference Paper
Full-text available
The number of social media users and the amount of available digital information on them is growing exponentially. This explosive rise in the accessible data on social media may cause confusion for users and leads to unpleasant experience since the overwhelming number of various choices makes finding the items of interest too difficult. As an effec...
Preprint
Full-text available
The Semantic Web, an extension of the current web, provides a common framework that makes data machine understandable and also allows data to be shared and reused across various applications. Resource Description Framework (RDF), a graph-based data model for describing things (entities), facilitates data integration. Due to the explosion of the amo...
Preprint
Full-text available
In recent years, the advancement in modern technologies has experienced an explosion of huge data sets being captured and recorded in different fields, but also given rise to concerns the security and protection of data storage, transmission, processing, and access to data. The blockchain is a distributed ledger that records transactions in a secur...
Conference Paper
Full-text available
Nowadays, the cloud hosts the majority of IoT virtualizations. This approach depends on an active Internet connection. The question that emerges is how we can move those virtualizations to the edge of IoT networks without losing the power and flexibility from the cloud but fulfilling the requirements of constrained and pervasive environments. This...
Conference Paper
Many studies have been done to improve the performance of centrally controlled business processes and enhance the integration between different parties of these collaborations. However, the most serious issues of collaborative business processes remained unsolved in these studies – lack of trust and divided data on various confidential ledgers. Blo...
Conference Paper
Abstract—Using blockchain as a decentralized backend infrastructure has been attracting many startups entrepreneurs’ and developers’ attention. Blockchain records transactions permanently and protects them from undesirable tampering. It provides a reliable tamper-proof database which can be considered as a trustable resource for tracking previous s...
Conference Paper
Full-text available
Internet of Things (IoT) is experiencing exponential scalability. This scalability introduces new challenges regarding management of IoT networks. The question that emerges is how we can trust the constrained infrastructure that shortly is expected to be formed by millions of 'things.' The answer is not to trust. This research introduces Amatista,...
Conference Paper
Full-text available
In recent years, the advancement in modern technologies has experienced an explosion of huge data sets being captured and recorded in different fields, but also given rise to concerns the security and protection of data storage, transmission, processing, and access to data. The blockchain is a distributed ledger that records transactions in a secur...
Chapter
Two required features of a data monetization platform are query and retrieval of the metadata of the resources to be monetized. Centralized platforms rely on the maturity of traditional NoSQL database systems to support these features. These databases for example MongoDB allows for very efficient query and retrieval of data it stores. However, cent...
Conference Paper
Full-text available
The increasing variety of programming languages available to computer programmers has led to the discussion of what language(s) should be learned. A key point in the choice of a programming language is the availability of support from experienced programmers. In this paper, we explore the use of graph theory in recommending programming languages to...
Conference Paper
Full-text available
Current networking integrates common "Things" to the Web, creating the Internet of Things (IoT). The considerable number of heterogeneous Things that can be part of an IoT network demands an efficient management of resources. With the advent of Fog computing, some IoT management tasks can be distributed toward the edge of the constrained networks,...
Article
Full-text available
Until now, most systems for Internet of Things (IoT) management, have been designed in a Cloud-centric manner, getting benefits from the unified platform that the Cloud offers. However, a Cloud-centric infrastructure mainly achieves static sensor and data streaming systems, which do not support the direct configuration management of IoT components....