Full 1
Full 1

Edgar Batista, Fran Casino, Agusti Solanas

2016 7th International Conference on Information, Intelligence, Systems & Applications (IISA), 1-6

Description: The growth of the world’s population and the dramatic increase in average life expectancy raise awareness of the global burden of elderly diseases. Mild cognitive impairments affect elderly people, which suffer a deterioration of their capa- bilities, with special regard to memory. Such problems often lead to disorientation or wandering: erratic movements and changes in mobility and behavioural patterns. In this context, an early and automatic detection of wandering symptoms avoids risks and possible damages to these patients, improving their quality of life. However, wandering detection is not trivial, because several factors such as patterns, environment or the severity of the dementia need to be considered. The research community has proposed several techniques, algorithms and technologies in order to properly detect such abnormal behaviours. Moreover, the new health paradigm, Smart Health, opens the door to a new generation of systems and technologies in order to overcome the shortcomings of the classical methods in this field of research. This paper analyses the most relevant wandering detection methods present in the state-of-the-art.

Agusti Solanas, Gloria Pujol, Antoni Martinez-Balleste, Josep M Mateo-Sanz

2008 Third International Conference on Availability, Reliability and Security, 1060-1066

Description: Protecting personal data is essential to guarantee the rule of law 1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can be stored and analysed. Thus, if the proper measures are not taken, individual privacy could be in jeopardy. Being the aim to protect individual privacy, a great variety of statistical disclosure control (SDC) techniques has been proposed. Amongst many others, k-anonymity is a promising property that, if properly achieved, can help protect individual privacy. In this paper, we propose a new post-processing method that can be applied after a k-anonymity algorithm, being the aim to lessen the errors resulting from the aggregation of data. We show that our method can be extended to work with many other SDC techniques and we provide some experimental results which emphasise the usefulness of our proposal.

Joan T Matamalas, Alex Arenas, Antoni Martínez-Ballesté, Agusti Solanas, Carlos Alonso-Villaverde, Sergio Gómez

2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA), 1-5

Description: The existence of certain comorbidities, the co- occurrence of different diseases in the same individual, is well- known in the medical community. However, finding temporal cause-effect relations between those diseases constitutes a big challenge. Clinical records can be used to extract the required information, but their analysis is elusive due to the vast and het- erogeneous amount of data. We propose a new methodology for time-preserving tensor networks decomposition to be applied in the analysis of big data problems where the temporal dimension of the key factual fields must not be modified. This methodology will also allow the creation of a new process mining modeling which can capture the cause-effect relations as low-order tensors associated to the transitions of the mined processes, and whose structure takes the form of a multilayer complex network. All these theoretical and methodological advances will allow their application to real biomedical data to analyze comorbidities.

Agusti Solanas, Antoni Martínez-Ballesté, Josep Domingo-Ferrer, Susana Bujalance, Josep M Mateo-Sanz

Actas de la Reunión Española sobre Criptografía y Seguridad Informática (RECSI), 539-547

Description: Resumen El Control de Revelación Estad?stica es una disciplina de protección de datos cuyo objetivo es impedir que la identidad de los respondedores quede revelada cuando terceras partes tienen acceso a grandes ficheros de estad?sticas. En este art?culo presentamos un conjunto de métodos para k-anonimato en bases de datos estad?sticas usando microagregación. Los métodos son analizados y comparados y se desarrolla el análisis computacional de cada uno.

Peio Lopez-Iturri, Erik Aguirre, Francisco Falcone, Leyre Azpilicueta, Fran Casino, Agusti Solanas

2016 7th International Conference on Information, Intelligence, Systems & Applications (IISA), 1-3

Description: The evolution of health systems derives in the implementation of Smart Health, integrated within the framework of Smart Cities and Smart Regions. In this context, vehicular communications provide additional means of interaction among users, administration and health professionals. In this work, characterization of wireless communication between ambulance and urban deployed access points will be analyzed, in order to assess operating conditions and service availability.

Page 19 of 32

Slide 1
Join us
Follow our last publications and stay connected!

Av. Països Catalans, 26, 43470 Tarragona, Catalonia, Spain