scispace - formally typeset
N

Nenad Petrovic

Researcher at University of Niš

Publications -  62
Citations -  253

Nenad Petrovic is an academic researcher from University of Niš. The author has contributed to research in topics: Computer science & Fading. The author has an hindex of 6, co-authored 42 publications receiving 114 citations.

Papers
More filters
Journal ArticleDOI

Data-driven framework for energy-efficient smart cities

TL;DR: A data-driven smart grid framework which aims to make smart cities energy-efficient focusing on two aspects: energy trading and autonomous vehicle charging is proposed, which leverages deep learning, linear optimization, semantic technology, domain-specific modelling notation, simulation and elements of relay protection.
Journal ArticleDOI

SMADA-Fog: Semantic model driven approach to deployment and adaptivity in fog computing

TL;DR: According to results of the two experimentally tested scenarios, the proposed approach improves the application performance, while the time required for deployment as well as service adaptation is reduced for at least an order of magnitude.
Proceedings ArticleDOI

Simulation Environment for Optimal Resource Planning During COVID-19 Crisis

TL;DR: A simulation environment leveraging the synergy of deep learning-based predictions and linear optimization for efficient resource planning shows satisfiable prediction performance and enables efficient resource exchange by reducing the trading costs.
Journal ArticleDOI

Semantic approach to RIoT autonomous robots mission coordination

TL;DR: A semantic-driven framework for automated autonomous robots coordination in the context of RIoT-based experimentation testbeds is proposed and framework for automatic coordinated mission generation within the robotics experimentation platform testbed is evaluated.
Proceedings ArticleDOI

Efficient PUF Based Authentication Protocol for Internet of Drones

TL;DR: In this paper, an efficient authentication protocol is proposed for internet of drones (IoDs) to counter both privacy and security attacks, and the simulation results show that this protocol is robust against attacks such as de-synchronization, replays, impersonation, tracing, side channel attacks and offers anonymity, forward and backward key secrecy.