Aleksandar Tošić

Aleksandar Tošić
University of Primorska | UP · Computer Science

PhD

About

30
Publications
9,917
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
53
Citations
Citations since 2017
21 Research Items
49 Citations
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520
Additional affiliations
May 2011 - present
University of Primorska
Position
  • Researcher

Publications

Publications (30)
Chapter
Full-text available
The growing adoption of low-cost sensors is raising valid concerns with regards to data, user, computation, and network privacy. In this paper we propose a semantically-driven secure task execution on wireless sensor networks. We rely on blockchain smart contracts and onion routed task execution driven by semantic descriptions to respectively provi...
Preprint
Full-text available
The Internet of Things (IoT) is experiencing widespread adoption across industry sectors ranging from supply chain management to smart cities, buildings, and health monitoring. However, most software architectures for IoT deployment rely on centralized cloud computing infrastructures to provide storage and computing power, as cloud providers have h...
Article
Full-text available
Currently, the computational power present in the sensors forming a wireless sensor network (WSN) allows for implementing most of the data processing and analysis directly on the sensors in a decentralized way. This shift in paradigm introduces a shift in the privacy and security problems that need to be addressed. While a decentralized implementat...
Article
Full-text available
The Wireless Sensor Network (WSN) is a monitoring system consisting of a large number of wireless devices forming a multi-hop network without infrastructure. WSN nodes are generally cheap resource-constrained devices detecting environmental features using sensors. Although well-established communication protocols for Internet systems can provide re...
Article
Full-text available
In the past two decades, technological advancements in smart devices, IoT, and smart sensors have paved the way towards numerous implementations of indoor location systems. Indoor location has many important applications in numerous fields ranging from structural engineering, behavioral studies, health monitoring, etc. However, with the recent pand...
Article
Full-text available
The manuscript presents a study of the possibility of use of Benford’s law conformity test, a well proven tool in the accounting fraud discovery, on a new domain: the discovery of anomalies (possibly fraudulent behaviour) in the the cryptocurrency transactions. Blockchain-based currencies or cryptocurrencies have become a global phenomenon known to...
Article
Full-text available
Indoor Air Quality monitoring is a major asset to improving quality of life and building management. Today, the evolution of embedded technologies allows the implementation of such monitoring on the edge of the network. However, several concerns need to be addressed related to data security and privacy, routing and sink placement optimization, prot...
Preprint
Full-text available
Wireless Sensor Networks (WSNs) are composed of a large number of spatially distributed devices equipped with sensing technology and interlinked via radio signaling. A WSN deployed for monitoring purposes can provide a ubiquitous view over the monitored environment. However, the management of collected data is very resource-consuming and raises sec...
Article
Full-text available
Gathering information is the primary purpose of a Sensor Network. The task is performed by spatially distributed nodes equipped with sensing, processing, and communication capabilities. However, data gathered from a sensor network must be processed, and often the collective computation capability of nodes forming the sensor network is neglected in...
Article
To anonymous internet traffic, many popular protocols route traffic through a network of nodes in order to conceal information about the request. However, routing traffic through other nodes inherently introduces added latency. Over the past two decades, there were many attempts to improve the path selection in order to decrease latency with little...
Preprint
Full-text available
Blockchain-based currencies or cryptocurrencies have become a global phenomenon known to most people as a disruptive technology, and a new investment vehicle. However, due to their decentralized nature, regulating these markets has presented regulators with difficulties in finding a balance between nurturing innovation, and protecting consumers. Th...
Preprint
Full-text available
The Internet of Things (IoT) is experiencing widespread adoption across industry sectors ranging from supply chain management to smart cities, buildings, and health monitoring. However, most software architectures for IoT deployment rely on centralized cloud computing infrastructures to provide storage and computing power, as cloud providers have h...
Article
Full-text available
Benford's law, also known as the first-digit law, has been widely used to test for anomalies in various data ranging from accounting fraud detection, stock prices, and house prices to electricity bills, population numbers, and death rates. Scientific collaboration graphs have been studied extensively as data availability increased. Most research wa...
Article
Full-text available
A smart floor with 16 embedded pressure sensors was used to record 420 simulated fall events performed by 60 volunteers. Each participant performed seven fall events selected from the guidelines defined in a previous study. Raw data were grouped and well organized in CSV format. The data was collected for the development of a non-intrusive fall det...
Article
Full-text available
During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However, the public availability of data stored on the blockchain and its link to users may raise privacy and security issues. In some cases, addressing these issues requires block...
Preprint
Full-text available
The Wireless Sensor Network (WSN) is a monitoring system consisting of a large number of wireless devices forming a multi-hop network without infrastructure. WSN nodes are generally cheap resource- constrained devices detecting environmental features using sensors. Although well-established com- munication protocols for Internet systems can provide...
Conference Paper
Full-text available
In this paper we provide empirical results on training a neural network with a genetic algorithm. We test various features of the generalized genetic algorithms, namely spieciation and fitness sharing and present the statistical analysis of all three variations. An obstacle avoidance problem was created in which the objective is for vehicles to tra...
Chapter
Full-text available
Edge computing is a distributed computing paradigm that relies on the computational resources of end devices in a network to bring benefits such as low bandwidth utilization, responsiveness, scalability and privacy preservation. Applications range from large scale sensor networks to IoT, and concern multiple domains (agriculture, supply chain, medi...
Preprint
Full-text available
Edge computing is a distributed computing paradigm that relies on computational resources of end devices in a network to bring benefits such as low bandwidth utilization, responsiveness, scalability and privacy preservation. Applications range from large scale sensor networks to IoT, and concern multiple domains (agriculture, supply chain, medicine...
Conference Paper
Full-text available
In this paper we present a prototype implementation of location aware floor tiling system. The prototype is based on cost effective and readily available sensors and controllers. They were designed to be easy to install and modular. A dynamic range adjustment algorithm was developed to make the system more flexible and more material agnostic. This...
Conference Paper
Full-text available
Emphasis on ocean science in the past two decades has led to an increased demand for maritime observation and data collection. Such data is commonly collected by specially designed maritime observatories which are used by various stakeholders (e.g. civil society, NGO, government agencies, policy makers, researchers) for various purposes (e.g. envir...
Conference Paper
Full-text available
The field of reverse logistic modeling offers plentiful case studies and quite a few generalizations but the general models are to robust and need fine-tuning to be molded for specific real situations. In this article we present a reverse logistic model for wood recovery in Slovenia. The model is an extension of the generalized facility location pr...
Conference Paper
Full-text available
In the last decade, a lot of hope has been put into General Purpose computing on Graphical Processing Units with optimization algorithms being among the most researched [10, 6, 12, 13]. Unfortunately, the shift in programming paradigms and computation models makes implementation of existing algorithms non-trivial. Some algorithms are simply not sui...
Conference Paper
Full-text available
The article outlines the phases of developing a custom web application, for cultivar DNA analysis. The nature of the data forces the database to expand in dimensionality, which e�ects performance. We review the current statistical meth- ods for analyzing genotypization data in population genetics, and discuss a clustering approach for identifying i...
Conference Paper
Full-text available
Nowadays houses take advantage of a variety of IT controlled devices. Traditionally these devices were controlled by programmable logic controllers (PLC) with the devices as their periphery. Nowadays capable and cheep microcomputers are available and permit use of standards, open source development environments, that further reduce the price and im...
Chapter
Full-text available
Consumer awareness, strengthened by legally imposed green constraints, has led to the need for the safe return of products from the field, as well as more environmentally friendly products. As a result, logistics planning must now consider both forward and return flows of products, parts, subassemblies, scrap, and packaging. Reverse logistics is th...
Conference Paper
Full-text available
Modern houses are far from simple walls with windows and doors in which we spend our time. In order to achieve energy efficiency, security, and comfort, houses take advantage of a variety of IT controlled devices. Traditionally these devices were controlled by industrial micro controllers (PLC) with the devices as their periphery. Nowadays, there a...
Article
Full-text available
The paper describes a traffic optimization problem and its solving by using genetic algorithms. To evaluate the adequacy of individual solutions, a traffic simulator was built. The paper provides the basis for genetic algorithms and traffic simulators and presents our solution in more details. Our traffic simulator was designed by using an in...

Network

Cited By

Projects

Projects (2)
Project
In this project, we integrate graph and infection models with distributed data mining into a decentralized service-oriented framework to implement dynamic self-configuring networks.