Philip Morrow's research while affiliated with Ulster University and other places

Publications (17)

Chapter
Full-text available
Internet of Things (IoT) services, to date, have been managed through affordances made by service providers (SP) to data provider (DP) customers who supply data for hosting in a shared repository. Services provided to data consumers (DC), on the other hand, are not managed in a similar way, with DCs being able to access datasets without providing d...
Article
Full-text available
Background: The status of the data-driven management of cancer care as well as the challenges, opportunities, and recommendations aimed at accelerating the rate of progress in this field are topics of great interest. Two international workshops, one conducted in June 2019 in Cordoba, Spain, and one in October 2019 in Athens, Greece, were organized...
Article
Full-text available
The desire to remain living in one’s own home rather than a care home by those in need of 24/7 care is one that requires a level of understanding for the actions of an environment’s inhabitants. This can potentially be accomplished with the ability to recognise Activities of Daily Living (ADLs); however, this research focuses first on producing an...
Preprint
BACKGROUND The status of the data-driven management of cancer care as well as the challenges, opportunities, and recommendations aimed at accelerating the rate of progress in this field are topics of great interest. Two international workshops, one conducted in June 2019 in Cordoba, Spain, and one in October 2019 in Athens, Greece, were organized b...
Article
We investigate various channel encoding techniques applied to breast density classification in mammograms; specifically, local binary, ternary, and quinary encoding approaches are considered. Subsequently, we propose a new encoding approach based on a seven-encoding technique, yielding a new local pattern operator called a local septenary pattern o...
Chapter
Full-text available
This chapter addresses security issues with respect to the Internet of Things (IoT) and in particular investigates the use of blockchain technology to address these issues. Some foundational concepts, related to the topic are highlighted, including smart contracts, verifiable claims, self-sovereign identity, along with General Data Protection Regul...
Chapter
This paper reviews image analysis approaches developed within the DESIREE European project for the implementation of a decision support system (DSS) for breast cancer. These include robust algorithms for image segmentation, classification and imaging biomarker extraction, as well as a solution for the simulation of surgery outcomes, including a bre...
Article
Full-text available
This paper presents a method for automatic breast pectoral muscle segmentation in mediolateral oblique mammograms using a Convolutional Neural Network (CNN) inspired by the Holistically-nested Edge Detection (HED) network. Most of the existing methods in the literature are based on hand-crafted models such as straight-line, curve-based techniques o...

Citations

... In our approach to defining a new business model, we focus primarily on the smart waste management domain, without attempt to make it generic to meet the needs of other domains. However, one of the features of our SLA provisioning mechanism is that it is generic and can be applied across domains-this work is presented in more detail in [12]. ...
... E-health promises to provide comprehensive treatment of chronic patients in rural areas, by means of innovative tools (such as Electronic Medical Records (EMRs), patient portals, telehealth and personal health records (PHRs)) and state of the art technologies (such as Artificial Intelligence (AI), cybersecurity, and High Performance Computing (HPC)) to support innovative integrated models for self-care from home, powered by a large diversity of personal data, and supported by an ecosystem for wellbeing to help motivate patients and engage a large community of support around the patient. Although several infrastructures and mobile apps have been developed so far for enabling integrated self-care for improving chronic patient's wellbeing, they usually focus on a single domain such as mental health [9], stress [10], frailty [11], COVID-19 [12], cancer [13,14] etc. ...
Reference: Proceedings
... Another study which was proposed by [79] aimed to address the challenges regarding security and identity management in IoT devices. This work leverages DLTs and SSI in order to grant total ownership and control over users' identities. ...
... Matthew et al. [19] proposed an unobtrusive pose recognition using five IR array sensors with a 32 × 31 resolution. The data are collected and classified using a CNN. ...
... The FH carries the data, control, synchronization and operation & maintenance signals. 5G developments challenges current FH transport and next-generation FH interface, radio-over-fiber, and xHaul were investigated in [32], [145]- [147]. Some more details are mentioned in the next sub-sections. ...
... Thus, it is possible to analyze textures of different sizes with LBP. An example of different LBP operators is given in Fig. 1 [38]. The LBP value obtained by combining the neighboring labels is used as a unique identifier for the center pixel [39,40]. ...
... Blockchain, as discussed earlier is an innovative distributed technology that provides immutability, integrity, and security to manipulated data. Combining the blockchain technology with cloud infrastructure facilitates with more promising solutions to IoT environment [5]. Initially, the blockchain technology was designed for the security of the public digital ledger of Bitcoin cryptocurrency used for economic transactions only [6]. ...
... Many breast density classification tasks are based on image features of local pattern operators [70,[73][74][75][76][77][78]. In 2012, ...
... Since 2019, the scientific community has been addressing the issue of the integration between DAGbased DLTs and IoT. After demonstrating the potential benefits of the union between the two [4]- [6], the DLT that best * * Corresponding author: Mario Merone (email: m.merone@unicampus.it). fits the requirements of IoT applications has been identified with IOTA [7], whose scalability has been experimentally demonstrated [8]- [10]. ...
... Following binarization, we applied the Canny algorithm [7] for the purpose of edge detection where a rough outer edge of the breast, excluding the pectoral muscle region, is found; see Fig. 1b. While there exist different ways for the purpose of edge detection, the Canny algorithm is very appealing for its simplicity and effectiveness in edge detection as discussed in several papers [8][9][10]. ...