Ninoslav Marina

ORCID: 0000-0003-4862-0199
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Advanced Data Storage Technologies
  • Caching and Content Delivery
  • Advanced MIMO Systems Optimization
  • Cellular Automata and Applications
  • Advanced Wireless Communication Techniques
  • Blockchain Technology Applications and Security
  • Security in Wireless Sensor Networks
  • Wireless Communication Networks Research
  • IoT and Edge/Fog Computing
  • Coding theory and cryptography
  • Image and Signal Denoising Methods
  • Advanced Image Fusion Techniques
  • Advanced Wireless Network Optimization
  • Transportation and Mobility Innovations
  • Cryptography and Data Security
  • Big Data and Business Intelligence
  • Energy Load and Power Forecasting
  • Data Visualization and Analytics
  • Network Security and Intrusion Detection
  • Energy Harvesting in Wireless Networks
  • Spectroscopy and Chemometric Analyses
  • Distributed systems and fault tolerance
  • graph theory and CDMA systems

University of Information Science and Technology St. Paul The Apostle
2013-2022

University of Information Science
2016-2022

HES-SO Arc
2022

Princeton University
2011-2018

Fraunhofer Institute for High Frequency Physics and Radar Techniques
2018

HES-SO University of Applied Sciences and Arts Western Switzerland
2017

Durham University
2017

University of Tehran
2016

Pusan National University
2016

Queen's University Belfast
2015

Physical layer security is an emerging area that achieves perfect secrecy data transmission between intended network nodes, while malicious nodes eavesdrop the communication obtain zero information. The so-called capacity can be improved using friendly jammers introduce extra interference to eavesdroppers. We investigate interaction source transmits useful and who assist by "masking" eavesdropper. To distributed solution, we a game theoretic approach. defined such pays interfere...

10.1155/2009/452907 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2010-01-06

Abstract The real estate industry is currently undergoing a digital transformation that not only changes its nature in terms of the markets and work environments, but also influencing growth. What are main trends concerns related to this transformation? To what extent already prepared for this? This paper reviews situation emergence phenomenon known as PropTech. PropTech characterized by massive implementation emerging technology such home matching tools, drones, virtual reality, building...

10.1088/1757-899x/869/6/062041 article EN IOP Conference Series Materials Science and Engineering 2020-06-01

Physical layer security is an emerging concept that achieves perfect secrecy data transmission between the intended network nodes, while eavesdropping malicious nodes obtain zero information. The so-called capacity can be improved using friendly jammers introduce extra interference to destination limited. In this paper, we investigate interaction source transmits desired and who assist by "disguising" eavesdropper. order a distributed solution, game theoretic approach. defined in such way...

10.1109/gamenets.2009.5137412 article EN International Conference on Game Theory for Networks 2009-05-01

The perceptual adaptation of the image (PAI) is introduced by inspiration from Chevreul–Mach Bands (CMB) visual phenomenon. By boosting CMB assisting illusory effect on boundaries regions, PAI adapts to perception human system and thereof increases quality image. proposed for application standard images or output any processing technique. For implementation image, an algorithm morphological filters (MFs) presented, which geometrically adds model effect. Numerical evaluation improvement...

10.1109/lsp.2017.2679608 article EN IEEE Signal Processing Letters 2017-03-08

Abstract The rapid development of internet things (IoT) is to be the next generation IoT devices are a simple target for attackers due lack security. Attackers can easily hack that used form botnets, which launch distributed denial service (DDoS) attack against networks. Botnets most dangerous threat security systems. Software‐defined networking (SDN) one developing filed, introduce capacity dynamic program network. Use flexibility and multidimensional characteristics SDN prevent DDoS...

10.1111/coin.12293 article EN Computational Intelligence 2020-02-21

Physical layer security is an emerging area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes eavesdrop communication obtain zero information. The so-called rate can be improved using friendly jammers introduce extra interference to eavesdroppers. Here, we investigate interaction multiple source-destination links and a jammer who assists by ''masking" eavesdropper. In order distributed solution, one...

10.1109/msn.2009.73 article EN 2009-01-01

The present study explores individual identity perception by analyzing the chemical peak information in gas chromatography-mass spectrometry (GC-MS) spectra of body odor samples with standard data mining approaches.

10.1039/c5ay02457a article EN Analytical Methods 2015-01-01

Today there exist many different types of smart assistants and devices, such as virtual assistants, smartphones wearables, which have a purpose to coordinate optimize the daily activities people worldwide. The assistants' focus is mainly on basic human needs, e.g. browsing, scheduling, navigating other similar activities. However, not are concerned with health overall. In this paper, we possibility using mirror detect issues. A new Smart eHealth Mirror model proposed, that consists works its...

10.1109/eurocon.2017.8011163 article EN 2017-07-01

Blockchain technology will bring a disruption in plenty of industries and businesses. Recently it proved the robustness, immutability, auditability, many crucial practical applications. The blockchain structure offers traceability actions, alterations, alerts, which is an important property system needed for development sustainable technologies. A part regarding optimization processes smart contract. It self-executable computer code, open transparent, encoding terms regular able to automate...

10.31803/tg-20200811113729 article EN cc-by Tehnički glasnik 2020-12-09

The memoryless noncoherent single-input-single-output (SISO) Rayleigh-fading channel is considered. Closed-form expressions are derived for the mutual information between output and input of this when magnitude distribution discrete restricted to having two mass points. It subsequently shown how these can be used obtain closed-form capacity signal noise ratio (SNR) values up approximately 0 dB, a tight lower bound SNR dB 10 dB. its given as functions parameter which obtained via numerical...

10.1109/tit.2008.924708 article EN IEEE Transactions on Information Theory 2008-06-16

Security is an important aspect for the future wireless networks. Since number of network nodes increases constantly, and, in addition, networks are decentralized and ad-hoc nature, it becomes more challenging to apply current cryptographic methods that require exchange keys between communicating parties. Information-theoretic secrecy emerging security field explores possibility achieving perfect data transmission intended nodes, while possible malicious (also called eavesdroppers) kept...

10.1109/wcnc.2010.5506566 article EN 2010-04-01

A simple four node network in which cooperation improves the information-theoretic secrecy is studied. The channel consists of two senders, a receiver, and an eavesdropper. One or both senders transmit confidential messages to while eavesdropper tries decode transmitted message. main result derivation newly achievable rate-equivocation region that shown be larger than derived by Lai El Gamal for relay-eavesdropper channel. When rate helping interferer zero, new reduces capacity-equivocation...

10.1109/isit.2011.6034100 article EN 2011-07-01

Peak mitigation is of interest to power companies as peak periods may require the operator over provision supply in order meet demand. Flattening usage curve can result cost savings, both for and end users. Integration renewable energy into infrastructure presents an opportunity use excess generation supplement alleviate peaks. In addition, demand side management shift from off-peak times reduce magnitude this work, we present a data driven approach incentive-based mitigation. Understanding...

10.1016/j.bcra.2021.100016 article EN Blockchain Research and Applications 2021-06-01

Physical layer security is an emerging field that explores the possibilities of achieving perfect secrecy data transmission between intended network nodes, while possible malicious nodes eavesdrop communication obtain zero information. In this paper, we observe how node cooperation improves physical a simple wireless by reducing surface geographical area in which can listen to transmitted from source destination. Our analysis and simulation results show dramatic improvement even with only...

10.1109/pimrc.2009.5450066 article EN 2009-09-01

Blind Components Processing (BCP), a novel approach in processing of data (signal, image, etc.) components, is introduced as well some applications to information communications technology (ICT) are proposed. The newly BCP with capability deployment orientation wider range applications. fundamental based on Source Separation (BSS), methodology which searches for unknown sources mixtures without prior knowledge either the or mixing process. Most natural, biomedical industrial observed signals...

10.1109/iciibms.2015.7439482 article EN 2015-11-01
Coming Soon ...