Dino Kečo

Dino Kečo
International BURCH University · IT Department

PhD

About

22
Publications
25,973
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
91
Citations

Publications

Publications (22)
Chapter
With the constant increase in the amount of available information, especially textual, there exists a need for an efficient and automated text summarization mechanism. Two main text summarization algorithms have been the focus of numerous research studies: extractive and abstractive summarization. This paper focuses on implementing a variant of abs...
Article
Full-text available
With the exponential growth of the amount of data being generated, stored and processed on a daily basis in the machine learning, data analytics and decision-making systems, the data preprocessing established itself as the key factor for building reliable high-performance machine learning models. One of the roles in preprocessing is variable reduct...
Chapter
Heart diseases are the number one cause of death all over the world. Many deaths are caused due to late detection of heart diseases. During the process of heart sound recording, beside heart sound, environment noise is being recorded too. In this work signal denoising was performed using wavelet denoising method. Furthermore, parameter values are c...
Chapter
The amount of websites on the internet has grown tremendously in recent years. With the rapid increase in volume of available World Wide Web resources, a need arises for an efficient and automated website categorization mechanism. This research proposes and implements several machine learning models for general-purpose classification of website con...
Article
Full-text available
Since the early beginnings of education systems, attendance has always played a crucial role in student success, as well as in the overall interest of the matter. The most productive way of increasing the student attendance rate is to understand why it decreases, try to predict when it is going to happen, and act on causing factors in order to prev...
Article
– Today, when looking at the quality of an online item, the feedback itself plays a very important role. Based on the feedback we can decide whether the desired item is good or not, get a picture of the seller and so on. Many companies that have online shops display the most positive feedback while hiding bad ones or display only a few of them. In...
Chapter
Heart disease is the one of the most serious problems in healthcare and affects large number of people. It is very important to detect it on time, otherwise it can cause serious consequences, such as death. In this paper, we applied artificial neural network, k-nearest neighbor and support vector machine algorithms to build model which will be used...
Article
Access control includes attendance checking and intrusion prevention. It is used to protect property, employees and other assets of a company or institution. Since attendance checking and intrusion detection are important segments of many educational institutions and other businesses as well, it is important to make these processes faster, easier a...
Article
A car price prediction has been a high-interest research area, as it requires noticeable effort and knowledge of the field expert. Considerable number of distinct attributes are examined for the reliable and accurate prediction. To build a model for predicting the price of used cars in Bosnia and Herzegovina, we applied three machine learning techn...
Article
Full-text available
Credit card default payment prediction studies are very important for any financial institution dealing with credit cards. The purpose of this work is to evaluate the performance of machine learning methods on credit card default payment prediction using logistic regression, C4.5 decision tree, support vector machines (SVM), naive Bayes, k-nearest...
Article
Full-text available
Cancer classification is one of the main steps during patient healing process. This fact enforces modern clinical researchers to use advanced bioinformatics methods for cancer classification. Cancer classification is usually performed using gene expression data gained in microarray experiment and advanced machine learning methods. Microarray experi...
Article
The main aim of the study is to develop a real-time epilepsy prediction approach by using the ensemble machine learning techniques that might predict offline seizure paradigms. The proposed seizure prediction algorithm is patient-specific since generalization showed no satisfactory results in our previous studies. The algorithm is tested on CHB-MIT...
Article
Objective of this study is to parallelize and apply distributed system paradigm to the whole process of EEG signal analysis including the signal segmentation, signal processing, feature extraction, and classification. This study is focused only on time required for execution of every signal processing part within real-time epileptic seizure predict...
Article
Full-text available
Cloud computing is a trending technology, as it reduces the cost of running a business. However, many companies are skeptic moving about towards cloud due to the security concerns. Based on the Cloud Security Alliance report, Denial of Service (DoS) attacks are among top 12 attacks in the cloud computing. Therefore, it is important to develop a mec...
Article
Full-text available
E-mail still proves to be very popular and an efficient communication tool. Due to its misuse, however, managing e-mails problem for organizations and individuals. Spam, known as unwanted message, is an example of misuse. Specifically, spam is defined as the arrival of unwelcomed bulk email not being requested for by recipients. This paper compares...
Article
Full-text available
In this paper we present parallel implementation of genetic algorithm using map/reduce programming paradigm. Hadoop implementation of map/reduce library is used for this purpose. We compare our implementation with implementation presented in [1]. These two implementations are compared in solving One Max (Bit counting) problem. The comparison criter...

Network

Cited By