
Aleksandar TošićUniversity of Primorska | UP · Computer Science
Aleksandar Tošić
PhD
About
30
Publications
9,917
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
53
Citations
Citations since 2017
Introduction
Additional affiliations
May 2011 - present
Publications
Publications (30)
The growing adoption of low-cost sensors is raising valid concerns with regards to data, user, computation, and network privacy. In this paper we propose a semantically-driven secure task execution on wireless sensor networks. We rely on blockchain smart contracts and onion routed task execution driven by semantic descriptions to respectively provi...
The Internet of Things (IoT) is experiencing widespread adoption across industry sectors ranging from supply chain management to smart cities, buildings, and health monitoring. However, most software architectures for IoT deployment rely on centralized cloud computing infrastructures to provide storage and computing power, as cloud providers have h...
Currently, the computational power present in the sensors forming a wireless sensor network (WSN) allows for implementing most of the data processing and analysis directly on the sensors in a decentralized way. This shift in paradigm introduces a shift in the privacy and security problems that need to be addressed. While a decentralized implementat...
The Wireless Sensor Network (WSN) is a monitoring system consisting of a large number of wireless devices forming a multi-hop network without infrastructure. WSN nodes are generally cheap resource-constrained devices detecting environmental features using sensors. Although well-established communication protocols for Internet systems can provide re...
In the past two decades, technological advancements in smart devices, IoT, and smart sensors have paved the way towards numerous implementations of indoor location systems. Indoor location has many important applications in numerous fields ranging from structural engineering, behavioral studies, health monitoring, etc. However, with the recent pand...
The manuscript presents a study of the possibility of use of Benford’s law conformity test, a well proven tool in the accounting fraud discovery, on a new domain: the discovery of anomalies (possibly fraudulent behaviour) in the the cryptocurrency transactions. Blockchain-based currencies or cryptocurrencies have become a global phenomenon known to...
Indoor Air Quality monitoring is a major asset to improving quality of life and building management. Today, the evolution of embedded technologies allows the implementation of such monitoring on the edge of the network. However, several concerns need to be addressed related to data security and privacy, routing and sink placement optimization, prot...
Wireless Sensor Networks (WSNs) are composed of a large number of spatially distributed devices equipped with sensing technology and interlinked via radio signaling. A WSN deployed for monitoring purposes can provide a ubiquitous view over the monitored environment. However, the management of collected data is very resource-consuming and raises sec...
Gathering information is the primary purpose of a Sensor Network. The task is performed by spatially distributed nodes equipped with sensing, processing, and communication capabilities. However, data gathered from a sensor network must be processed, and often the collective computation capability of nodes forming the sensor network is neglected in...
To anonymous internet traffic, many popular protocols route traffic through a network of nodes in order to conceal information about the request. However, routing traffic through other nodes inherently introduces added latency. Over the past two decades, there were many attempts to improve the path selection in order to decrease latency with little...
Blockchain-based currencies or cryptocurrencies have become a global phenomenon known to most people as a disruptive technology, and a new investment vehicle. However, due to their decentralized nature, regulating these markets has presented regulators with difficulties in finding a balance between nurturing innovation, and protecting consumers. Th...
The Internet of Things (IoT) is experiencing widespread adoption across industry sectors ranging from supply chain management to smart cities, buildings, and health monitoring. However, most software architectures for IoT deployment rely on centralized cloud computing infrastructures to provide storage and computing power, as cloud providers have h...
Benford's law, also known as the first-digit law, has been widely used to test for anomalies in various data ranging from accounting fraud detection, stock prices, and house prices to electricity bills, population numbers, and death rates. Scientific collaboration graphs have been studied extensively as data availability increased. Most research wa...
A smart floor with 16 embedded pressure sensors was used to record 420 simulated fall events performed by 60 volunteers. Each participant performed seven fall events selected from the guidelines defined in a previous study. Raw data were grouped and well organized in CSV format.
The data was collected for the development of a non-intrusive fall det...
During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However, the public availability of data stored on the blockchain and its link to users may raise privacy and security issues. In some cases, addressing these issues requires block...
The Wireless Sensor Network (WSN) is a monitoring system consisting of a large number of wireless
devices forming a multi-hop network without infrastructure. WSN nodes are generally cheap resource-
constrained devices detecting environmental features using sensors. Although well-established com-
munication protocols for Internet systems can provide...
In this paper we provide empirical results on training a neural
network with a genetic algorithm. We test various features
of the generalized genetic algorithms, namely spieciation
and fitness sharing and present the statistical analysis of all
three variations. An obstacle avoidance problem was created
in which the objective is for vehicles to tra...
Edge computing is a distributed computing paradigm that relies on the computational resources of end devices in a network to bring benefits such as low bandwidth utilization, responsiveness, scalability and privacy preservation. Applications range from large scale sensor networks to IoT, and concern multiple domains (agriculture, supply chain, medi...
Edge computing is a distributed computing paradigm that relies on computational resources of end devices in a network to bring benefits such as low bandwidth utilization, responsiveness, scalability and privacy preservation. Applications range from large scale sensor networks to IoT, and concern multiple domains (agriculture, supply chain, medicine...
In this paper we present a prototype implementation of location aware floor tiling system. The prototype is based on cost
effective and readily available sensors and controllers. They
were designed to be easy to install and modular. A dynamic
range adjustment algorithm was developed to make the system more flexible and more material agnostic. This...
Emphasis on ocean science in the past two decades has led to an increased demand for maritime observation and data collection. Such data is commonly collected by specially designed maritime observatories which are used by various stakeholders (e.g. civil society, NGO, government agencies, policy makers, researchers) for various purposes (e.g. envir...
The field of reverse logistic modeling offers plentiful case studies and quite a few generalizations but the general models are to robust and need fine-tuning to be molded for specific real situations. In this article we present a reverse logistic model for wood recovery in Slovenia. The model is an extension of the generalized facility location pr...
In the last decade, a lot of hope has been put into General Purpose computing on Graphical Processing Units with optimization algorithms being among the most researched [10, 6, 12, 13]. Unfortunately, the shift in programming paradigms and computation models makes implementation of existing algorithms non-trivial. Some algorithms are simply not sui...
The article outlines the phases of developing a custom web
application, for cultivar DNA analysis. The nature of the
data forces the database to expand in dimensionality, which
e�ects performance. We review the current statistical meth-
ods for analyzing genotypization data in population genetics,
and discuss a clustering approach for identifying i...
Nowadays houses take advantage of a variety of IT controlled
devices. Traditionally these devices were controlled by programmable
logic controllers (PLC) with the devices as their
periphery. Nowadays capable and cheep microcomputers are
available and permit use of standards, open source development
environments, that further reduce the price and im...
Consumer awareness, strengthened by legally imposed green constraints, has led to the need for the safe return of products from the field, as well as more environmentally friendly products. As a result, logistics planning must now consider both forward and return flows of products, parts, subassemblies, scrap, and packaging. Reverse logistics is th...
Modern houses are far from simple walls with windows
and doors in which we spend our time. In order to achieve
energy efficiency, security, and comfort, houses take advantage
of a variety of IT controlled devices. Traditionally
these devices were controlled by industrial micro controllers
(PLC) with the devices as their periphery. Nowadays,
there a...
The paper describes a traffic optimization problem and
its solving by using genetic algorithms. To evaluate the
adequacy of individual solutions, a traffic simulator was
built. The paper provides the basis for genetic
algorithms and traffic simulators and presents our
solution in more details. Our traffic simulator was
designed by using an in...
Projects
Projects (2)
In this project, we integrate graph and infection models with distributed data mining into a decentralized service-oriented framework to implement dynamic self-configuring networks.