Igor Tasic

ORCID: 0000-0003-4059-8134
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Entrepreneurship Studies and Influences
  • Anomaly Detection Techniques and Applications
  • Blockchain Technology Applications and Security
  • Innovation and Knowledge Management
  • Smart Agriculture and AI
  • Business and Management Studies
  • Innovation Diffusion and Forecasting
  • Innovation and Socioeconomic Development
  • Digital Transformation in Industry
  • Big Data and Business Intelligence
  • Complex Systems and Decision Making
  • User Authentication and Security Systems
  • Impact of AI and Big Data on Business and Society
  • Augmented Reality Applications
  • Big Data Technologies and Applications
  • Smart Grid Security and Resilience
  • E-Learning and Knowledge Management
  • COVID-19 epidemiological studies
  • Advanced Malware Detection Techniques
  • Quantum Computing Algorithms and Architecture
  • Ethics and Social Impacts of AI
  • University-Industry-Government Innovation Models
  • Chaos-based Image/Signal Encryption
  • Virtual Reality Applications and Impacts

Universidad Politécnica de Cartagena
2022-2024

Universidad Católica San Antonio de Murcia
2024

European Association of Social Psychology
2008

This study explores the process of creating avatars for Virtual Reality and metaverse environments using a variety specialized applications, including VRChat, Ready Player Me, VRoidStudio, Mixamo, Convai, MetaHuman. By evaluating these platforms, research identifies strengths limitations each tool in terms customization, integration, overall user experience. The practical implementation focuses on avatar creation within Unity Unreal Engine, highlighting technical aspects rigging, animation,...

10.3390/info15100624 article EN cc-by Information 2024-10-10

Abstract Agritech uses advanced technologies to boost the efficiency, sustainability, and productivity of farming. The Internet Things (IoT) in agriculture has brought sensors networked technology gather analyse environmental crop data, enabling precision farming that optimises resource usage increases yields. Yet, current agricultural methods suffer from unsecured decentralised data management, causing inefficiencies complicating traceability across supply chain. integration IoT with...

10.1049/cim2.12109 article EN cc-by-nc IET Collaborative Intelligent Manufacturing 2024-06-01

As quantum computing advances, current cryptographic protocols are increasingly vulnerable to attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC). This paper presents a comprehensive review of Post-Quantum (PQC) as solution protect digital systems in the era. We provide an in-depth analysis various quantum-resistant algorithms, including lattice-based, code-based, hash-based, isogeny-based, and multivariate approaches. The...

10.3390/technologies12120241 article EN cc-by Technologies 2024-11-23

The COVID-19 pandemic has recently brought attention to several acute human needs. However, it also demonstrated how crisis can spark innovation in the context of information asymmetry and uncertainty. It raised importance early warning systems (EWS) prevent similar future events prepare governments, organizations, individuals advance. Such efforts innovating under uncertainty resemble process entrepreneurs face when creating new ventures launching products services. Moreover, increasing...

10.3390/app12094407 article EN cc-by Applied Sciences 2022-04-27

10.1109/piers62282.2024.10618442 article EN 2022 Photonics & Electromagnetics Research Symposium (PIERS) 2024-04-21

This work looks at the decision process of entrepreneurs when they create a new businessin an atmosphere uncertainty and without clear objectives, using notion 'effectuation'. The effectualapproach suggests that, company is just beginning, emphasize howmuch can afford to lose try as many different strategies combinations resource possible,given resources that are already under their control. objective this article, therefore, toexamine if, what extent, build companies in real world effectuation.

10.12660/joscmv1n1p12-23 article EN Journal of Operations and Supply Chain Management 2008-06-27

Abstract Communication architectures based on the Internet of Things (IoT) are increasingly frequent. Commonly, these solutions used to carry out control and monitoring activities. It is easy find cases for manufacturing, prediction maintenance, Smart Cities, etc., where sensors deployed capture data that sent cloud through edge devices or gateways. Then processed provide useful information perform additional actions if required. As crucial as deploying verify their operation. In this...

10.1049/wss2.12066 article EN cc-by-nc-nd IET Wireless Sensor Systems 2023-09-14

The scientific community is focusing on developing 6G solutions beyond the 5G communications network, which will use Artificial Intelligence (AI) at all levels of architecture. potential benefits AI automate and optimize network operation, boost cognitive capability a fully AI-enabled This paper proposes framework for solving current problem orchestrating cooperative control autonomous vehicles using 6G, identifies new challenges, requirements, improvements to deploy future Connected...

10.1109/crc60659.2023.10488509 article EN 2024-04-09

Novo modelo propõe uma inversão na forma tradicional de se compreender e ensinar o empreendedorismo. Em vez focar nas causas para abrir um novo negócio, surge atenção especial aos efeitos das ações já tomadas

10.12660/gvexec.v8n2.2009.23805 article PT GV executivo \b (Impresso)/GV Executivo 2009-05-26

Entrepreneurship has been gaining momentum is Europe over the last years as a way to reduce unemployment levels, and in line with take-off of digital economy world. education still an open research area, many courses being launched almost all universities. We describe our experience running summer school mentoring teams created context EU-XCeL project, ICT focused project funded by European Union's Horizon 2020 Research Innovation Programme. From this experience, we extract some conclusions...

10.1109/isie.2017.8001482 article EN 2017-06-01

Abstract Cyberthreats continue their expansion, becoming more and complex varied. However, credentials passwords are still a critical point in security. Password cracking can be powerful tool to fight against cyber criminals if used by cybersecurity professionals red teams, for instance, evaluate compliance with security policies or forensic investigations. For particular systems, one crucial step the password-cracking process is comparison matchmaking between password-guess hashes real...

10.1186/s42400-023-00193-6 article EN cc-by Cybersecurity 2023-11-09
Coming Soon ...