Search Results - MIPRO

Refine Results
  1. 1

    A review of feature selection methods with applications by Jovic, A., Brkic, K., Bogunovic, N.

    “…Feature selection (FS) methods can be used in data pre-processing to achieve efficient data reduction. This is useful for finding accurate data models. Since…”
    Get full text
    Conference Proceeding
  2. 2

    An overview of free software tools for general data mining by Jovic, A., Brkic, K., Bogunovic, N.

    “…This expert paper describes the characteristics of six most used free software tools for general data mining that are available today: RapidMiner, R, Weka,…”
    Get full text
    Conference Proceeding
  3. 3

    Explainable artificial intelligence: A survey by Dosilovic, Filip Karlo, Brcic, Mario, Hlupic, Nikica

    “…In the last decade, with availability of large datasets and more computing power, machine learning systems have achieved (super)human performance in a wide…”
    Get full text
    Conference Proceeding
  4. 4

    Raspberry Pi as a Wireless Sensor node: Performances and constraints by Vujovic, Vladimir, Maksimovic, Mirjana

    “…The main building block of Wireless Sensor Network (WSN) is sensor node consisted of four basic elements: the sensor unit, processing unit, communication and…”
    Get full text
    Conference Proceeding
  5. 5

    Design of a domain specific language and IDE for Internet of things applications by Salihbegovic, A., Eterovic, T., Kaljic, E., Ribic, S.

    “…With the goal of relieving the Internet of things (IoT)application designers of the complexities and heterogeneity of wireless sensory networks (WSNs),…”
    Get full text
    Conference Proceeding
  6. 6

    Advanced Persistent Threats - detection and defense by Vukalovic, J., Delija, D.

    “…The term "Advanced Persistent Threat" refers to a well-organized, malicious group of people who launch stealthy attacks against computer systems of specific…”
    Get full text
    Conference Proceeding
  7. 7

    Synergy of volunteer measurements and volunteer computing for effective data collecting, processing, simulating and analyzing on a worldwide scale by Gordienko, N., Lodygensky, O., Fedak, G., Gordienko, Yu

    “…The paper concerns the hype idea of "Citizen Science" and the related paradigm shift: to go from the passive "volunteer computing" to other volunteer actions…”
    Get full text
    Conference Proceeding
  8. 8

    Evaluation of shared digital economy adoption: Case of Airbnb by Zekanovic-Korona, Ljiljana, Grzunov, Jurica

    “…Electronic market is a new economic space created by the development of the Internet and it has more than a billion of potential customers. In addition to all…”
    Get full text
    Conference Proceeding
  9. 9

    Microservices validation: Mjolnirr platform case study by Savchenko, D. I., Radchenko, G. I., Taipale, O.

    “…Microservice architecture is a cloud application design pattern that implies that the application is divided into a number of small independent services, each…”
    Get full text
    Conference Proceeding
  10. 10

    Smart home automation system for energy efficient housing by Skeledzija, Niksa, Cesic, Josip, Koco, Edin, Bachler, Vladimir, Vucemilo, Hrvoje Nikola, Dzapo, Hrvoje

    “…This paper presents a concept and implementation of modern smart monitoring and control system for building automatization. The system is designed to enable…”
    Get full text
    Conference Proceeding
  11. 11

    Performance evaluation of Websocket protocol for implementation of full-duplex web streams by Skvorc, D., Horvat, M., Srbljic, S.

    “…Besides traditional synchronous HTTP request-response communication paradigm that was used on the Web for decades, modern Web services require more flexible…”
    Get full text
    Conference Proceeding
  12. 12

    Retaining expressions on de-identified faces by Meng, Lily, Zongji Sun, Ariyaeeinia, Aladdin, Bennett, Ken L.

    “…The extensive use of video surveillance along with advances in face recognition has ignited concerns about the privacy of the people identifiable in recorded…”
    Get full text
    Conference Proceeding
  13. 13

    Artificial intelligence in network intrusion detection by Stampar, M., Fertalj, K.

    “…In past, detection of network attacks has been almost solely done by human operators. They anticipated network anomalies in front of consoles, where based on…”
    Get full text
    Conference Proceeding
  14. 14

    Four level provenance support to achieve portable reproducibility of scientific workflows by Banati, A., Kacsuk, P., Kozlovszky, M.

    “…In the scientist's community one of the most vital challenges is the issue of reproducibility of workflow execution. In order to reproduce the results of an…”
    Get full text
    Conference Proceeding
  15. 15

    Evolving genetic algorithms for fault injection attacks by Picek, Stjepan, Batina, Lejla, Jakobovic, Domagoj, Carpi, Rafael Boix

    “…Genetic algorithms are used today to solve numerous difficult problems. However, it is often needed to specialize and adapt them further in order to…”
    Get full text
    Conference Proceeding
  16. 16

    A model of speed profiles for urban road networks using G-means clustering by Erdelic, Tomislav, Vrbancic, Silvija, Rozic, Lovro

    “…In this paper, we present a method for computing speed profiles by processing GPS data collected by vehicles in an urban area. The vehicles were tracked during…”
    Get full text
    Conference Proceeding
  17. 17

    A practical NFC relay attack on mobile devices using card emulation mode by Cavdar, D., Tomur, E.

    “…In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NFC) equipped mobile devices. NFC is a promising…”
    Get full text
    Conference Proceeding
  18. 18

    Intelligent assistant for helping students to learn programming by Konecki, Mario, Kadoic, Nikola, Piltaver, Rok

    “…Students experience constant problems in their introductory programming courses. Along with difficulties to cope with abstract programming concepts students…”
    Get full text
    Conference Proceeding
  19. 19

    Web portals for visualizing and searching spatial data by Becirspahic, Lejla, Karabegovic, Almir

    “…Spatial data have proven to be extremely useful in many areas. Accordingly, there are more and more Web GIS solutions. These solutions allow the visualization…”
    Get full text
    Conference Proceeding
  20. 20

    Big data and sentiment analysis using KNIME: Online reviews vs. social media by Minanovic, Ana, Gabelica, Hrvoje, Krstic, Zivko

    “…Text analytics and sentiment analysis can help an organization derive potentially valuable business insights from text-based content such as word documents,…”
    Get full text
    Conference Proceeding