Search Results - MIPRO
-
1
A review of feature selection methods with applications
Published in 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2015)“…Feature selection (FS) methods can be used in data pre-processing to achieve efficient data reduction. This is useful for finding accurate data models. Since…”
Get full text
Conference Proceeding -
2
An overview of free software tools for general data mining
Published in 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2014)“…This expert paper describes the characteristics of six most used free software tools for general data mining that are available today: RapidMiner, R, Weka,…”
Get full text
Conference Proceeding -
3
Explainable artificial intelligence: A survey
Published in 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2018)“…In the last decade, with availability of large datasets and more computing power, machine learning systems have achieved (super)human performance in a wide…”
Get full text
Conference Proceeding -
4
Raspberry Pi as a Wireless Sensor node: Performances and constraints
Published in 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2014)“…The main building block of Wireless Sensor Network (WSN) is sensor node consisted of four basic elements: the sensor unit, processing unit, communication and…”
Get full text
Conference Proceeding -
5
Design of a domain specific language and IDE for Internet of things applications
Published in 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2015)“…With the goal of relieving the Internet of things (IoT)application designers of the complexities and heterogeneity of wireless sensory networks (WSNs),…”
Get full text
Conference Proceeding -
6
Advanced Persistent Threats - detection and defense
Published in 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2015)“…The term "Advanced Persistent Threat" refers to a well-organized, malicious group of people who launch stealthy attacks against computer systems of specific…”
Get full text
Conference Proceeding -
7
Synergy of volunteer measurements and volunteer computing for effective data collecting, processing, simulating and analyzing on a worldwide scale
Published in 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2015)“…The paper concerns the hype idea of "Citizen Science" and the related paradigm shift: to go from the passive "volunteer computing" to other volunteer actions…”
Get full text
Conference Proceeding -
8
Evaluation of shared digital economy adoption: Case of Airbnb
Published in 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2014)“…Electronic market is a new economic space created by the development of the Internet and it has more than a billion of potential customers. In addition to all…”
Get full text
Conference Proceeding -
9
Microservices validation: Mjolnirr platform case study
Published in 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2015)“…Microservice architecture is a cloud application design pattern that implies that the application is divided into a number of small independent services, each…”
Get full text
Conference Proceeding -
10
Smart home automation system for energy efficient housing
Published in 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2014)“…This paper presents a concept and implementation of modern smart monitoring and control system for building automatization. The system is designed to enable…”
Get full text
Conference Proceeding -
11
Performance evaluation of Websocket protocol for implementation of full-duplex web streams
Published in 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2014)“…Besides traditional synchronous HTTP request-response communication paradigm that was used on the Web for decades, modern Web services require more flexible…”
Get full text
Conference Proceeding -
12
Retaining expressions on de-identified faces
Published in 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2014)“…The extensive use of video surveillance along with advances in face recognition has ignited concerns about the privacy of the people identifiable in recorded…”
Get full text
Conference Proceeding -
13
Artificial intelligence in network intrusion detection
Published in 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2015)“…In past, detection of network attacks has been almost solely done by human operators. They anticipated network anomalies in front of consoles, where based on…”
Get full text
Conference Proceeding -
14
Four level provenance support to achieve portable reproducibility of scientific workflows
Published in 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2015)“…In the scientist's community one of the most vital challenges is the issue of reproducibility of workflow execution. In order to reproduce the results of an…”
Get full text
Conference Proceeding -
15
Evolving genetic algorithms for fault injection attacks
Published in 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2014)“…Genetic algorithms are used today to solve numerous difficult problems. However, it is often needed to specialize and adapt them further in order to…”
Get full text
Conference Proceeding -
16
A model of speed profiles for urban road networks using G-means clustering
Published in 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2015)“…In this paper, we present a method for computing speed profiles by processing GPS data collected by vehicles in an urban area. The vehicles were tracked during…”
Get full text
Conference Proceeding -
17
A practical NFC relay attack on mobile devices using card emulation mode
Published in 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2015)“…In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NFC) equipped mobile devices. NFC is a promising…”
Get full text
Conference Proceeding -
18
Intelligent assistant for helping students to learn programming
Published in 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2015)“…Students experience constant problems in their introductory programming courses. Along with difficulties to cope with abstract programming concepts students…”
Get full text
Conference Proceeding -
19
Web portals for visualizing and searching spatial data
Published in 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2015)“…Spatial data have proven to be extremely useful in many areas. Accordingly, there are more and more Web GIS solutions. These solutions allow the visualization…”
Get full text
Conference Proceeding -
20
Big data and sentiment analysis using KNIME: Online reviews vs. social media
Published in 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (01-05-2014)“…Text analytics and sentiment analysis can help an organization derive potentially valuable business insights from text-based content such as word documents,…”
Get full text
Conference Proceeding