Goran Martinovic

Goran Martinovic
University of Osijek | UNIOS · Faculty of Electrical Engineering, Computer Science and Information Technology Osijek

PhD, Full Professor

About

121
Publications
27,649
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
630
Citations
Introduction
Embedded Systems, Real-Time Systems, Distributed Systems, Software Engineering, Computational Intelligence, Data Analysis
Additional affiliations
March 2013 - November 2017
University of Osijek
Position
  • Head of Department
October 1996 - present
University of Osijek
Education
May 2000 - May 2004
University of Zagreb, Faculty of Electrical Engineering and Computing
Field of study
  • Computer Science
September 1996 - February 2000
University of Zagreb, Faculty of Electrical Engineering and Computing
Field of study
  • Computer Science
September 1993 - May 1996
J.J. Strossmayer University of Osijek, Faculty of Electrical Engineering
Field of study
  • Electrical Engineering - Computer Engineering

Publications

Publications (121)
Article
Learning from data stemming from real-world problems is inherently challenging and difficult due to the numerous intrinsic characteristics present in datasets. The problem of class imbalance is known to significantly impair classification performance and has attracted increasing attention from researchers. On the other hand, some studies suggest th...
Article
Full-text available
Reducing the number of features when applying machine learning algorithms may be beneficial not only from the standpoint of computational cost but also of overall quality. Wrapper-based procedures are widely utilised to achieve this. The choice of the wrapper is of utmost importance. Bio-inspired computation algorithms represent a viable choice and...
Article
Over the last several years, cloud computing has grown into a major paradigm in software development by providing computer resources over the Internet. Among various cloud service models, Backend as a Service (BaaS) stands out as a model that targets the specific needs of web and mobile developers. By providing the backend for applications, it faci...
Article
Full-text available
In the field of machine learning, the problem of class imbalance considerably impairs the performance of classification algorithms. Various techniques have been proposed that seek to mitigate classifier bias with respect to the majority class, with simple oversampling approaches being one of the most effective. Their main representative is the well...
Conference Paper
Wrapper-based feature (subset) selection is widely used as an effective means for decreasing the dimensionality of datasets. However, it is not the most efficient approach in terms of computational cost. Hence, the choice of the wrapper is paramount. Ideally, the wrapper should be simple to use and understand, whilst yielding good solutions as fast...
Conference Paper
Building classification models on imbalanced data proves to be a challenging task despite the multitude of available classifiers. The classifier bias towards the majority class can be ameliorated through various manners and with varying degrees of success. Oversampling minority or undersampling majority instances are prominent amongst these due to...
Conference Paper
Tracking of attendance is a ubiquitous task in many institutions and during organised events. This, along with subsequent management of collected data can be a cumbersome activity that requires significant time and effort, from all involved parties. Tracking and managing student attendance during lectures and exams is an especially important instan...
Article
Full-text available
User requirements for a high availability and fast response time of network services require placing more than one server for accessing particular network service, often using multiple communication links and locations. Dynamic Server Selection (DSS) is a new DNS method for the optimal server selection of a multiple available network service that a...
Article
Full-text available
The aim of this paper is to assess the readiness of engineering students to enter the labour market and to make proposals for improving their knowledge and skills. Our research is based on the assumption that smart economic growth should be based on interdisciplinary knowledge including ICT, communication in foreign languages and economic knowledge...
Conference Paper
Building classification models often presents a significant problem that requires the selection of a classifier and a corresponding training approach. Radial basis function networks are a frequent choice among the classifiers for which a large spectre of training approaches exist. In that regard, an important role is played by bio-inspired methods,...
Conference Paper
When performing classification tasks on problems stemming from the real-world phenomena, issues requiring attention often arise due to the specific nature of the data. One common problem is the imbalance of datasets, the resolving of which is performed through several different approaches suggested in the literature. These approaches require the kn...
Conference Paper
Welcome to Osijek, Croatia. It is our great pleasure to welcome you to the 1st IEEE International Conference on Smart Systems and Technologies 2016 (SST 2016), organized and hosted by the Faculty of Electrical Engineering, Computer Science and Information Technology Osijek, Josip Juraj Strossmayer University of Osijek.
Conference Paper
Differential evolution requires a prior setting of its parameters. Appropriate values are not always easy to determine, even more since they may change during the optimisation process. This is where parameter control comes in. Accordingly, a scheme inspired by ant colony optimisation for controlling the crossover-rate and mutation factor is propose...
Article
The initial population of an evolutionary algorithm is an important factor which affects the convergence rate and ultimately its ability to find high quality solutions or satisfactory solutions for that matter. If composed of good individuals it may bias the search towards promising regions of the search space right from the beginning. Although, if...
Article
This paper deals with task scheduling in heterogeneous distributed embedded computer environments of renewable and timing variable resources. Real-time application performance can be considerably influenced by unexpected events in the environment. The predictive-reactive rescheduling procedure can enable significant improvements. The rescheduling p...
Conference Paper
Software engineering education is on a different level of maturity in different countries. In many countries software engineering is still on the way to be established. The aim of this workshop is to attract faculties to discuss and provide successful examples and lessons learned about development of software engineering courses or a curriculum on...
Conference Paper
During the creation of a classification model, it is vital to keep track of numerous parameters and to produce a model based on the limited knowledge inferred often from very confined data. Methods which aid the construction or completely build the classification model automatically, present a fairly common research interest. This paper proposes an...
Article
Full-text available
In the 1.5D terrain guarding problem, an x-monotone polygonal line is dened by k vertices and a G set of terrain points, i.e. guards, and a N set of terrain points which guards are to observe (guard). This involves a weighted version of the guarding problem where guards G have weights. The goal is to determine a minimum weight subset of G to cover...
Article
The task assignment problem commonly appears in distributed computing environments. It asks an assignment of tasks to processors is found such that it satisfies the imposed constraints and that the total execution and communication cost of the tasks is minimal. This paper presents an algorithm based on ant colony optimisation that incorporates idea...
Article
During the creation of a classification model, it is vital to keep track of numerous parameters and to produce a model based on the limited knowledge inferred often from very confined data. Methods which aid the construction or completely build the classification model automatically, present a fairly common research interest. This paper proposes an...
Conference Paper
This paper considers the effect of swapping vectors during mutation, which are used for mutant vector construction. In the classic/canonical differential evolution three mutually different vector are picked from the population, where one represents the base vector, and the difference of the remaining two represents the difference vector. Motivated...
Conference Paper
Full-text available
As the main focus of the Croatian Meteor Network (CMN) shifted from data collection to data analysis, primarily to the discovery of new meteor showers, it became clear that the current data processing pipeline was slow and outdated. In this paper new software for fully automatic data acquisition and processing is presented. Furthermore, a new tool...
Article
This paper focuses on a single aspect of learning management systems, i.e. knowledge assessment. The developed web application enables simple knowledge testing by providing the means for creating exam questions carefully. Questions used are MCSA-multiple choice, single answer. Guidelines for creating these questions are presented, while some additi...
Article
This paper investigates a greenhouse microclimatic environment controlled by a mobile measuring station with the aim of improving performance by using wireless sensor networks (WSN) technology. The algorithms for the mobile measuring station that perform navigation tasks are called Bug algorithms. The existing potential field method based algorithm...
Conference Paper
Full-text available
High performance computing (HPC) systems are omnipresent in processing huge amounts of data. However, power consumption of these systems is becoming far from negligible, forcing software developers and hardware providers to deviate from usual performance plans, and to address power consumption and costs. As a result, small-scale applications are be...
Conference Paper
Full-text available
High performance computing (HPC) systems are omnipresent in processing huge amounts of data. However, power consumption of these systems is becoming far from negligible, forcing software developers and hardware providers to deviate from usual performance plans, and to address power consumption and costs. As a result, small-scale applications are be...
Article
Full-text available
The feature selection problem often occurs in pattern recognition and, more specifically, classification. Although these patterns could contain a large number of features, some of them could prove to be irrelevant, redundant or even detrimental to classification accuracy. Thus, it is important to remove these kinds of features, which in turn leads...
Conference Paper
Data clustering is one of the fundamental tools in data mining and requires the grouping of a dataset into a specified number of nonempty and disjoint subsets. Beside the usual partitional and hierarchical methods, evolutionary algorithms are employed for clustering as well. They are able to find good quality partitions of the dataset and successfu...
Article
Requirements of digital libraries for computing power, as well as needs of smaller users for automated document processing and digitization are growing, making grid environments and multi-core systems a preferred platform for optical character recognition applications. This paper examines character recognition performance on the CRO-NGI grid and on...
Conference Paper
With the spread of Ethernet in the last decades, fieldbuses based on Industrial Ethernet have found their place in the market, with different implementations by several major vendors. One such technology is PROFINET IO. Among different options provided with this fieldbus is the Media Redundancy Protocol, the purpose of which is to add cheap, built-...
Article
Full-text available
Today’s embedded systems have evolved into multipurpose devices moving towards an embedded multi-agent system (MAS) infrastructure. With the involvement of MAS in embedded systems, one remaining issues is establishing communication between agents in low computational power and low memory embedded systems without present Embedded Operating System (E...
Article
Human-computer interfaces are getting more complex every day with the purpose of easing the use of computers and enhancing the overall user experience. Since research has shown that a majority of human interaction comes from non-verbal communication, user emotion detection is one of the directions that can be taken to enhance the overall user exper...
Article
This paper examines benefits of using concavity-based structural features in recognition of handwritten digits. An overview of existing concavity features is presented and a new method is introduced. These features are used as complementary features to gradient and chaincode features, both among the best performing features in handwritten digit rec...
Article
In the current work we present an algorithmic proposal for mobile robot navigation using a Wireless Sensor Network (WSN) for the location of a mobile measuring station in a controlled microclimatic environment. Another point of consideration is determining the navigation strategy. Publications in this field of robotics offer a large number of local...
Conference Paper
Full-text available
The paper presents hardware design of self-balancing vehicle with integrated GPS tracking system based on Android API (Application programming interface). XBee PRO S2B module is used in identification process of existing solution (Segway) based on programmable WSN (Wireless sensor node/network). Control and monitoring system of laboratory experimen...
Conference Paper
Although cloud computing applies the self-acting principles from autonomic computing, it's possible to achieve even greater synergy. In this paper definitions of basic terms concerning cloud computing and autonomic computing are given. A new model is presented which incorporates autonomic principles into cloud computing, and that model is later vie...
Conference Paper
Multi-hop communication in vehicular ad hoc networks is a challenging task due to the dynamic and unbalanced nature of these networks. In the suburban areas or during the night when the density of vehicles is low, multi-hop communication is only possible if (i) the vehicles store-carry-forward the messages or (ii) by using roadside units. Each of t...
Conference Paper
Full-text available
Genetic algorithms are a frequently used method for search and optimization problem solving. As such they have also been used to solve the traveling salesman problem. Since they are population-based, the initial population plays a very important role and affects the algorithm's convergence speed as well as the quality of the final solution. Commonl...
Conference Paper
Full-text available
The paper presents hardware design of self balancing vehicle. Vehicle is based on Segway concept with improvements on GPS tracking system, integration of Android API (Application programming interface) control and monitoring system. Wireless Sensor Network (WSN) installation enhances the operation of the vehicle and creates MESH network of such veh...
Article
The Traveling Salesman Problem is one of the most famous problems in combinatorial optimization. The paper presents an algorithm based upon the elitist ant system for solving the traveling salesman problem. 2-opt local search is incorporated in the elitist ant system, and it is used for improvement of a given number of solutions previously construc...
Article
Full-text available
The primary goal of most OSs (Operating Systems) is the efficient use of computer systems software and hardware resources. Since Windows OSs are most widely used OS for personal computers, they need to satisfy needs of all different kind of computer systems users. In comparison with Windows XP, new versions of the Windows OS; namely Windows Vista a...
Conference Paper
In this paper network performance evaluation of three latest versions of Windows OSs; namely Windows XP®, Windows Vista™ and Windows 7™ is conducted. Network performance measurements were obtained with D-ITG (Distributed Internet Traffic Generator) on a two identical computer systems connected with 1 Gbps Ethernet crossover cable. Following metrics...
Conference Paper
Full-text available
Anyone who has gone to a college or a high school in the last decade (or more) probably knows what the eLearning is. With the rise of Internet and affordable Internet-capable devices, lots of universities and schools provide even more eLearning materials than the classic ones. With the rise of smartphones and tablets the trend has gone mobile. Ther...
Conference Paper
Hash functions are used everywhere today, from wireless communications to password storage. Some of them are proven to be mathematically insecure, but still the only way to crack most of them is a brute-force or dictionary attack. Brute-force is usually discarded as an option since it consumes huge amounts of time. Dictionary attack is a regular ap...
Conference Paper
The paper evaluates mobile broadband access networks deployment from the techno-economic aspects. In this paper, the current situation in the European broadband market is analyzed. Furthermore, the model to assess the cost of mobile broadband access networks is introduced and the techno-economic analyses of mobile broadband networks deployments are...
Conference Paper
A power consumption of a high performance computer (HPC) system has been an issue lately. Many programming techniques are still relying on performance gain, but only few of them are concerning energy footprint of the increased computing power. MPI and OpenMP are considered as a core scientific HPC programming libraries for distributed-memory and sh...
Article
Text based CAPTCHA systems are widely used as a security mechanism for web access control. Considering their broad use, many attacks are challenging them every day. Most of the attacks aimed at CAPTCHAs are based on the latest computer vision techniques, AI methods and OCRs, so it is imperative to enhance these methods even more. There are number o...
Conference Paper
Genetic algorithms are a frequently used method for search and optimization problem solving. They have been applied very successfully to many NP-hard problems, among which the traveling salesman problem, which is also considered in this paper, is one of the most famous representative ones. A genetic algorithm usually makes use only of single mutati...
Article
Rapid advances in Wireless Sensor Networks (WSNs) indicate that they are becoming increasingly complex. Consequently users and applications are becoming more demanding. Due to unique characteristics of WSNs, like small dimensions and limited resources and capabilities, Quality of Service (QoS) is imposed as one of the key factors of WSNs. In this p...
Article
Full-text available
Rapid advances in Wireless Sensor Networks (WSNs) indicate that they are becoming increasingly complex. Consequently users and applications are becoming more demanding. Due to unique characteristics of WSNs, like small dimensions and limited resources and capabilities, Quality of Service (QoS) is imposed as one of the key factors of WSNs. In this p...
Conference Paper
This paper proposes a novel video quality metric - Foveation-based content Adaptive Structural SIMilarity index - FA-SSIM, which combines the Structural SIMilarity index (SSIM) and the foveation-based sensitivity function S<sub>f</sub>. Function S<sub>f</sub> is based on the Human Visual System (HVS) behavior that spatial resolution is the highest...
Article
Usage of nanotechnology in food with all of its possible different applications has potential to significantly change today's ways of food manufacturing and packaging as well as to alter fundamental functionality of food. Application of nanotechnology in food increases food safety, allows better delivery of new functional ingredients and extends pr...
Conference Paper
Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a test, most- ly used in web applications to verify that the user is human rather than an automated machine. However, with the ad- vances in technology, this security mechanism is being chal- lenged everyday through the use of different Artificial Intel- ligence...
Conference Paper
Automated form processing is a procedure that can dramatically accelerate system performance, reduce the proportion of human work and interventions, and is applicable in many areas. The aim of this paper is to describe the procedure that successfully locates various fields for data entry on scanned documents and prepare their content for further pr...
Article
This paper describes design, usage and multimedia properties of developed application Edukator. Edukator supports learning in computer classroom and enables screen content exchange and control between student and teacher. Picture transfer speed and safety represent an important factor in the design itself. Program is made on the basis of an altered...
Conference Paper
Multiple servers as a mechanism for scheduling aperiodic tasks in heterogeneous environments can increase performance of real time systems. This paper describes implementation of the multiple total bandwidth server (MTBS) mechanism, a version of total bandwidth server (TBS) for distributed systems, in a simulation tool. The tool enables evaluation...
Conference Paper
Full-text available
In this paper, we report on two year case study research in a software development organization which includes more than 20 architects of different social profile, knowledge and time zone locations. During that time, we built up understanding on how to support software architects in knowledge codification (converting human expertise to organized, c...
Article
Full-text available
When the omnipresent challenge of space saving reaches its full potential so that a file cannot be compressed any more, a new question arises: "How can we improve our compression even more?". The answer is obvious: "Let's speed it up!". This article tries to find the meeting point of space saving and compression time reduction. That reduction is ba...
Conference Paper
Full-text available
Virtualization enables installation and running of multiple virtual machines on the same computer system. Operating system that communicates directly with hardware is known as the host operating system whereas virtual operating systems have all the features of a real operating system, but they run inside the host operating system. A virtual machine...
Article
Full-text available
This article deals with the problem of textual data compression speed up by dividing a bigger file into smaller ones which are simultaneously compressed. This procedure is called parallel computing and this experiment uses a processor with four cores. Parallel processing is applied on five different algorithms, two of these are entropy coders and o...
Article
Full-text available
We developed the distributed system called "Distributer" in order to make use of millions of unused CPU cycles inside the LAN. The system is based on server-client architecture and the interaction with the system is implemented via web interface on the server side. Clients connect to server and periodically update their status based on which server...
Article
Full-text available
Network providers need very effective optimization tool for good utilization of scarce link capacities during exploitation. In the case of multiple link capacities with mutual traffic correlation such problem could be more demanding. The sizing problem is explained for satellite link, but it could be applicable for other transmission resources. Dim...
Conference Paper
The developed DnD grid system aims to improve building of distributed computer environments by dedicated and non-dedicated resources. The proposed approach supposes overdimensioned static performance and dynamic underloading of non-dedicated resources. Efficiency, availability and autonomy of such distributed heterogeneous environment depend on pla...
Conference Paper
This article presents a solution for distant monitoring and control of the greenhouse system via internet. It has a web based user interface with possibility of managing the sensors and actuators. Also allows to log events on the system like humidity, temperature, light etc. This Web based distant monitoring system uses a high end PIC microcontroll...
Article
Full-text available
Quality of Service (QoS) in the communication network becomes the most important element for the implementation of new and demanding applications. This paper describes different phases of the multimedia communication, which includes QoS negotiation, translation, scaling and resource admission. The main principles of QoS architectures, with special...
Article
MAN design includes elements of LAN and WAN design. A model of MAN design presented in this paper describes a methodological approach to MAN modeling and necessity for single link optimization and link system optimization in case of common communication link sharing. MAN optimization methods are presented using experimental MAN made in IEEE 802.11g...
Conference Paper
In modern communication systems with video transmission as their important part, objective video quality evaluation is necessary in the QoS (quality of service) assessment. This article analyzes spatial masking effects on the visibility of compression artifacts, and consequently its importance in the digital video quality evaluation process. Lumina...
Conference Paper
Full-text available
The general parameters that affect the performance of MANs are physical topology and hierarchical model of the network. The performance of each individual link depends on the type and intensity of network traffic that is characterized by the traffic direction (download/upload), the packet size and the number of packets. If MAN links share a common...
Article
MAN design includes elements of LAN and WAN design. A model of MAN design presented in this paper describes a methodological approach to MAN modeling and necessity for single link optimization and link system optimization in case of common communication link sharing. MAN optimization methods are presented using experimental MAN made in IEEE 802.11g...
Article
This paper analyzes the process of learning by using ICT as a platform the goal of which is to facilitate accessibility and flow of information as well as interaction among participants involved in learning, which aims at improving the learning process itself. Special stress is placed on distance learning in a webbased environment. Proposals for a...