Petra Grd

Petra Grd
University of Zagreb · Faculty of Organization and Informatics (FOI)

PhD in Information science

About

40
Publications
62,472
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
223
Citations
Additional affiliations
October 2009 - January 2017
University of Zagreb
Position
  • Higher teaching assistant
January 2017 - December 2022
University of Zagreb
Position
  • Professor (Assistant)
October 2009 - October 2016
University of Zagreb
Position
  • Higher teaching assistant
Education
October 2009 - June 2015
University of Zagreb Faculty of Organization and Informatics
Field of study
  • Infromation Science

Publications

Publications (40)
Article
Full-text available
This article proposes the Internet of Things-based self-sustaining modular grow room architecture for optimising the seed germination and seedling development process. The architecture is scalable and flexible as it can be adapted to particular environments, scopes, requirements and plant types; it is modular as the host room can contain one or mor...
Article
Full-text available
In the field of face biometrics, finding the identity of a person in an image is most researched, but there are other, soft biometric information that are equally as important, such as age, gender, ethnicity or emotion. Nowadays, ethnicity classification has a wide application area and is a prolific area of research. This paper gives an overview of...
Article
Full-text available
The classification of human face shapes, a pivotal aspect of one’s appearance, plays a crucial role in diverse fields like beauty, cosmetics, healthcare, and security. In this paper, we present a multi-step methodology for face shape classification, harnessing the potential of transfer learning and a pretrained EfficientNetV2S neural network. Our a...
Article
Full-text available
The rise of online transactions has led to a corresponding increase in online criminal activities. Account takeover attacks, in particular, are challenging to detect, and novel approaches utilize machine learning to identify compromised accounts. This paper aims to conduct a literature review on account takeover detection and user behavior analysis...
Preprint
Full-text available
This paper presents a comprehensive overview of Convolutional Neural Networks (CNNs) in the context of face recognition. By analyzing 150 research papers, we investigate major publication channels, temporal trends, prevalent CNN models, primary data sets, accuracy levels, primary research focuses, and future prospects for improving CNN-based facial...
Conference Paper
In the past two decades ambient intelligence (AmI) has been a focus of research in different fields and from different points of view. It can be defined as an electronic environment consisting of devices capable of recognising people presence and responding in a certain way. The security and privacy in these kind of environments is still a challeng...
Article
Full-text available
Today there is no criminal investigation that does not contain a digital dimension. A large number of criminal offenses, whether official investigations conducted by judicial bodies or corporate investigations, contain digital evidence, which in most investigations is key to the identification of perpetrators. Since the cyber space is undefined, it...
Article
Full-text available
Today there is no criminal investigation that does not contain a digital dimension. A large number of criminal offenses, whether official investigations conducted by judicial bodies or corporate investigations, contain digital evidence, which in most investigations is key to the identification of perpetrators. Since the cyber space is undefined, it...
Conference Paper
Full-text available
Acquisition of volatile data for further forensic analysis still represents a challenge to both practitioners and researchers. The current tools used for acquisition of such data are focused exclusively on a way to capture content. However, the development of forensic science, in particular in the area of digital evidence in terms of the admissibil...
Conference Paper
Full-text available
This paper deals with the issue of the preservation of privacy on surveillance cameras recordings. Increase in the number of surveillance cameras has lead to a reduction of privacy. In order to preserve privacy, a special .XML file which will be used in the algorithm was created. This research presents the method for creating an XML function throug...
Article
Content personalization reflects the ability of content classification into (predefined) thematic units or information domains. Content nodes in a single thematic unit are related to a greater or lesser extent. An existing connection between two available content nodes assumes that the user will be interested in both resources (but not necessarily...
Article
Full-text available
Computing in the Internet of Things is increasingly pervasive, with everyday items including clothes, smart-phones, cars and various household appliances gaining sophisticated communication and computing capacities. It seems to be just a matter of time before devices have to collaborate and compete mutually as well as with their users, in order to...
Book
Full-text available
Knowledge management is especially important in SMEs and can substantially improve business performance and business capacity for innovation. Nevertheless, traditional knowledge management methodologies are often too formal, complicated, time-consuming and expensive for SMEs. Web 2.0 solutions, like social networking used for communication, collabo...
Article
Age estimation is one of the tasks of facial image classification. It can be defined as determination of a person's age or age group from facial images. This paper gives an overview of recent research in facial age estimation. Along with an overview of previous research on this topic, descriptions of basic age estimation models are given: anthropom...
Conference Paper
In the 21st century, if a faculty wants to have an effective communication with their fans (for example former, potential or existing students) it must include social networking sites and see them as very important way of communication. With the number of internet, as well as social networking users constantly increasing, it is important and someti...
Article
Full-text available
Personal signature has become an important part of human identity verification. Therefore, it is important to protect ones signature and be able to detect signature forgery. We present a statistical based approach to signature verification with user oriented signature feature weights. Only basic on-line signature features are used in the verificati...
Chapter
Full-text available
http://www.intechopen.com/books/new-trends-and-developments-in-biometrics/basic-principles-and-trends-in-hand-geometry-and-hand-shape-biometrics
Conference Paper
Full-text available
Biometric face recognition is one of the fields of computer vision. The part of biometric person identification has been extensivly researched. This resulted in a large number of algorithms used for person identification. This paper gives an overview and classification of those algorithms. Because of large number of algorithms, knowledge visualizat...
Conference Paper
Application of biometric tools today is a major challenge for developers of biometric systems and for users of those systems. A specific application can be seen in systems requiring a certain accuracy in person authentication. A large number of systems is created in a way that the algorithms used are not verified as standardized, thus causing uncer...
Conference Paper
Full-text available
Aging process affects the appearance of people in different ways. One of the changes caused by aging are changes in craniofacial morphology of individuals. Different models of facial aging exist and this paper will apply anthropometric model of facial aging on pictures of 20 people at different ages of their lives to show the similarities between c...
Article
Full-text available
Handwritten signature is being used in various applications on daily basis. The problem arises when someone decides to imitate our signature and steal our identity. Therefore, there is a need for adequate protection of signatures and a need for systems that can, with a great degree of certainty, identify who is the signatory. This paper presents pr...
Conference Paper
Full-text available
In this paper we address the key questions on security and trust in communication over Internet, in a synthetic approach aimed to connect the technological and human aspects of the subject. As first, a brief outline of the Internet security technology is given. This serves as a ground for the exposition of the general security concepts and principl...
Conference Paper
Full-text available
The aging process affects the structure and appearance of people in different ways. One of such is the change in craniofacial morphology (CM) of individuals. The subject of a person's CM and age estimation is by itself insufficiently researched. Especially on the analysis of children's CM at different ages, because it hasn't been considered thoroug...
Conference Paper
Full-text available
Age estimation of humans is one of the problems in field of computer vision which is insufficient researched. To efficiently estimate the age of an individual based on his/her face image, characteristic points of the face have to be determined. In this paper the most common face recognition algorithms will be described.
Conference Paper
Full-text available
Handwritten signature is widely accepted and collectible biometric characteristic. Great entrophy makes that characteristic suitable for research and development of new models for personal authentication and identification. This paper presents basic differences between authentication and identification methods, followed by previous work in that fie...
Conference Paper
Full-text available
On-line handwritten signature-based personal authentication is still a challenging research topic. Although great efforts have been achieved in developing and defining a framework that systems for on-line authentication based on the handwritten signature of a person should adhere, these frameworks are still not enough because they do not include al...
Chapter
Full-text available
This chapter presents a semantic network formalism based on frame logic. Advanced techniques including HiLog extensions, transaction logic and dynamic module creation are applied to the problem of preferential routing and rerouteing. The deductive program is implemented in the FLORA-2 reasoning engine, which allows for scalable query execution. In...
Conference Paper
Full-text available
The idea behind this article is to give an overview of B-tree data structure and show the connection between B-tree indexing technique and computer forensics. B-tree is a fast data indexing method that organizes indexes into a multi-level set of nodes, where each node contains indexed data. This technique is most commonly used in databases and file...
Article
Full-text available
In the past decades, information and communication technologies affect all aspects of our lives, including politics. Political parties use the Internet to communicate with their potential voters. This paper will give a short introduction to communication over the Internet in general, description of political parties in question, and the main part o...
Article
Search engine optimization is an Internet marketing strategy, and as such, very important in building websites. Websites need to be optimized in order to atract users and to sell products and services. This paper will give an overview of selected SEO elements, and analyse websites of Croatian faculties related to computer science and engineering.

Network

Cited By