N
Nenad Petrovic
Researcher at University of Niš
Publications - 62
Citations - 253
Nenad Petrovic is an academic researcher from University of Niš. The author has contributed to research in topics: Computer science & Fading. The author has an hindex of 6, co-authored 42 publications receiving 114 citations.
Papers
More filters
Journal ArticleDOI
Data-driven framework for energy-efficient smart cities
Nenad Petrovic,Djordje Kocic +1 more
TL;DR: A data-driven smart grid framework which aims to make smart cities energy-efficient focusing on two aspects: energy trading and autonomous vehicle charging is proposed, which leverages deep learning, linear optimization, semantic technology, domain-specific modelling notation, simulation and elements of relay protection.
Journal ArticleDOI
SMADA-Fog: Semantic model driven approach to deployment and adaptivity in fog computing
Nenad Petrovic,Milorad Tosic +1 more
TL;DR: According to results of the two experimentally tested scenarios, the proposed approach improves the application performance, while the time required for deployment as well as service adaptation is reduced for at least an order of magnitude.
Proceedings ArticleDOI
Simulation Environment for Optimal Resource Planning During COVID-19 Crisis
TL;DR: A simulation environment leveraging the synergy of deep learning-based predictions and linear optimization for efficient resource planning shows satisfiable prediction performance and enables efficient resource exchange by reducing the trading costs.
Journal ArticleDOI
Semantic approach to RIoT autonomous robots mission coordination
TL;DR: A semantic-driven framework for automated autonomous robots coordination in the context of RIoT-based experimentation testbeds is proposed and framework for automatic coordinated mission generation within the robotics experimentation platform testbed is evaluated.
Proceedings ArticleDOI
Efficient PUF Based Authentication Protocol for Internet of Drones
TL;DR: In this paper, an efficient authentication protocol is proposed for internet of drones (IoDs) to counter both privacy and security attacks, and the simulation results show that this protocol is robust against attacks such as de-synchronization, replays, impersonation, tracing, side channel attacks and offers anonymity, forward and backward key secrecy.