Milan Gnjatović's research while affiliated with University of Criminal Investigation and Police Studies and other places

Publications (68)

Article
Full-text available
This paper introduces a parameter-free clustering-based approach to detecting critical traffic road segments in urban areas, i.e., road segments of spatially prolonged and high traffic accident risk. In addition, it proposes a novel domain-specific criterion for evaluating the clustering results, which promotes the stability of the clustering resul...
Article
Full-text available
This paper introduces a heuristic for multiple sequence alignment aimed at improving real-time object recognition in short video streams with uncertainties. It builds upon the idea of the progressive alignment but is cognitively economical to the extent that the underlying edit distance approach is adapted to account for human working memory limita...
Article
Full-text available
This paper introduces and illustrates an approach to automatically detecting and selecting “critical” road segments, intended for application in circumstances of limited human or technical resources for traffic monitoring and management. The reported study makes novel contributions at three levels. At the specification level, it conceptualizes “cri...
Article
Full-text available
Introduction/purpose: This paper reports on a pilot comparative analysis of the Cuckoo and Drakvuf sandboxes. These sandboxes are selected as the subjects of the analysis because of their popularity in the professional community and their complementary approaches to analyzing malware behavior. Methods: Both sandboxes were set up with basic configur...
Conference Paper
This paper reports on a pilot study of an approach to human activity clustering using inertial measurement data. At the signal level, we particularly consider the angular velocity and instantaneous acceleration data obtained from a three-axis inertial measurement unit placed on the right arm of the human subject. At the methodology level, the appro...
Article
Full-text available
Modern access controls employ biometrics as a means of authentication to a great extent. For example, biometrics is used as an authentication mechanism implemented on commercial devices such as smartphones and laptops. This paper presents a fingerprint biometric cryptosystem based on the fuzzy commitment scheme and convolutional neural networks. On...
Conference Paper
Full-text available
This talk provides a brief overview of recent research on automatic X-ray image classification for the purpose of COVID-19 diagnostic analysis. We reflect on the optimistic results reported in selected research papers, and conclude that machine learning approaches still omit to fully recognize the fundamental distinction-at least when observed from...
Conference Paper
Full-text available
Considerable scientific effort in the field of natural language processing has recently been dedicated to the broad research question ofautomatic extraction of COVID-19 related information from available textual sources. In this paper, we provide a brief overview of the research results in the field, and make a “diagnosis” that the natural language...
Research
Full-text available
FOREWORD The First International Scientific, “Covid-19 and Challenges of the Business World”, is held in organization Alfa BK University, Faculty of Finance, Banking and Audit in cooperation with Institute for Economy and Finance, on 25th of March 2021. Given the current epidemiological situation, the conference was being held in virtual, through...
Article
This paper presents a novel iris recognition system based on machine learning methods. The motivation behind this research resides in the interrelatedness of biometric systems and stylometry, as shown in our previous research. The main goal of the proposed model is to reach virtually perfect classification accuracy, eliminate false acceptance rates...
Article
This paper introduces a novel approach to human-machine collaborative learning that allows for the chronically missing human learnability in the context of supervised machine learning. The basic tenet of this approach is the refinement of a human designed software model through the iterative learning loop. Each iteration of the loop consists of two...
Article
Full-text available
This paper introduces an approach to automatic domain modeling for human–robot interaction. The proposed approach is symbolic and intended for semantically unconstrained task-oriented human–robot interaction domains. At the specification level, it is cognitively inspired, addressing selected cognitive mechanisms of the human memory system (e.g., in...
Conference Paper
Full-text available
This paper introduces a two-stage approach to digit detection and recognition. The approach is cognitively inspired to the extent that it integrates the dichotomy between the preattentive processing and the attentive processing that is present in the theories of human attention. It is non-connectionist to the extent that it does not require extensi...
Chapter
This chapter addresses the question of whether it is enough to extract from data the knowledge needed to implement socially believable conversational agents. Contrary to the popular views, the answer is negative. In this respect, the chapter points to some shortcomings of fully data-driven approaches to dialogue management, including the lack of ex...
Article
This paper 1 presents an approach to designing secure modular authentication framework based on iris biometrics and its' implementation into mobile banking scenario. The system consists of multiple clients and an authentication server. Client, a smartphone with accompanying application, is used to capture biometrics, manage auxiliary data and creat...
Article
This paper presents an approach to designing secure modular authentication framework based on iris biometrics and its’ implementation into mobile banking scenario. The system consists of multiple clients and an authentication server. Client, a smartphone with accompanying application, is used to capture biometrics, manage auxiliary data and create...
Article
This paper presents an experimental assessment of the children’s receptivity to the human-like conversational robot MARKO. It reports on a production of a corpus that is composed of recordings of interaction between children, with cerebral palsy and similar movement disorders, and MARKO, in realistic therapeutic settings. Twenty-nine children parti...
Conference Paper
Full-text available
Like any personal information, biometric templates can be intercepted, stolen, replayed or altered. Due to non-revocability of biometric data aforementioned attacks and may lead to identity theft. Having that said, it becomes clear that biometric systems operate with sensitive personal information and that biometric template security and privacy ar...
Conference Paper
Full-text available
Biometric cryptosystems are emerging technology that allow user to generate or unlock cryptographic key using biometric data, such as iris or fingerprint. In other words, biometric cryptosystems provide mechanisms for biometric-dependent key-release. A comprehensive survey of biometric cryptosystems is presented in this paper, i.e. state of the art...
Conference Paper
Full-text available
An exploit is software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in operating system or other software products to cause unintended or unanticipated behaviour of computer software, hardware, or other electronic devices. Such behaviour includes actions like unauthorized gaining control of a computer s...
Conference Paper
Full-text available
In this paper, we report on a prototype conversational agent for natural language human-robot interaction, integrated with the assistive human-like robot MARKO. The presented prototype conversational agent is based on an extended and upgraded functional architecture encapsulating the novel functionality of representational learning in natural langu...
Conference Paper
Full-text available
U radu su opisani izabrani aspekti specifikacije i dizajna centralne audio-biblioteke Univerziteta u Novom Sadu (CABUNS). Cilj projekta je unapređenje obrazovnog procesa kreiranjem audio-izdanja knjiga i predavanja. Aplikacija je realizovana kao veb-portal koji primenjuje automatsku sintezu govora za srpski jezik i generiše adekvatne audio-vizuelne...
Conference Paper
Full-text available
This paper presents an approach to designing secure modular authentication system based on conventional XOR biometrics. System consists of one or more clients, an authentication server and a trusted storage. Client is a device used to capture biometrics, obtain auxiliary data and create encrypted cancelable templates during the enrolment and verifi...
Conference Paper
Adversarial machine learning resides at the intersection of machine learning and computer security. Originally, machine learning techniques were designed for environments that do not assume the presence of an adversary. However, in the presence of intelligent adversaries, this working hypothesis is likely to be violated to at least to some degree,...
Conference Paper
Full-text available
This paper presents an approach to securing mobile banking biometric authentication. The proposed system is based on secure client-server conventional XOR biometrics, which stores, transmits and verifies templates in encrypted form. Encryption keys are stored on bank's authentication servers, thus protecting the user twofold: if the phone gets stol...
Conference Paper
Full-text available
The broad surveillance potential of automatic speech recognition has been recognized across a range of application domains. Although considerable research effort has been devoted to the research question of achieving robust large-vocabulary continuous-speech recognition, it is still a fragile technology. In this paper, we discuss a methodological d...
Conference Paper
This paper introduces a cognitively-inspired symbolic framework for knowledge representation in humanmachine interaction. The framework is developed within the ongoing research on a computational model of a hierarchical associative long-term memory. The model integrates neurocognitive understanding of the human memory system with selected insights...
Conference Paper
Full-text available
This paper proposes a novel modal architecture of a conversational robotic agent. Two important characteristics of this architecture are that it is general (i.e., it does not depend on specification requirements for a conversational agent) and modular in a way that it allows for introduction of functionally and structurally different modules in a g...
Article
Full-text available
Although the importance of contextual information in speech recognition has been acknowledged for a long time now, it has remained clearly underutilized even in state-of-the-art speech recognition systems. This article introduces a novel, methodologically hybrid approach to the research question of context-dependent speech recognition in human–mach...
Chapter
Although considerable effort has been already devoted to studying various aspects of human-machine interaction, we are still a long way from developing socially believable conversational agents. This paper identifies some of the main causes of the current state in the field: (i) socially believable behaviour of a technical system is misinterpreted...
Chapter
Full-text available
Actual research in the field of robot-supported therapy is dominantly oriented on systems for clinical neurorehabilitation of motor disorders and therapy of difficulties related to autism. However, very little attention is dedicated to the functional development of the therapeutic robot, which would be capable of participating, actively and intelli...
Article
An important research question in machine dialogue management is how to go beyond hand-crafted approaches. Currently, statistical approaches are prevalent. However, recently, researchers have focused again on the representational capacities of the human language processing system. The point of departure for this paper is that this methodological sh...
Conference Paper
Full-text available
This paper reports on work in progress towards development of a robot to be used as assistive technology in treatment of children with developmental disorders (cerebral palsy). This work integrates two activities. The first one is mechanical device design (humanoid robot) of sufficient capabilities for demonstration of therapeutical exercises for h...
Article
Significant research effort has already been invested in the field of robot-assisted therapy for children with developmental disorders, and the researchers generally agree that therapists should be involved in the development of assistive robotic tools. However, relatively little attention has been devoted to robots' capacity to autonomously engage...
Article
One of the most fundamental research questions in the field of human-machine interaction is how to enable dialogue systems to capture the meaning of spontaneously produced linguistic inputs without explicit syntactic expectations. This paper introduces a cognitively-inspired representational model intended to address this research question. To the...
Article
Full-text available
This paper presents a research towards implementation of a computer vision system for markerless skeleton tracking in therapy of gross motor skill disorders in children suffering from mild cognitive impairment. The proposed system is based on a low-cost 3D sensor and a skeleton tracking software. The envisioned architecture is scalable in the sense...
Article
Two fundamental nontechnical research questions related to the development of emotion-aware dialogue systems are how to identify different kinds of emotional reactions that can be expected to occur in a given interaction domain, and how the system should react to the emotional user behavior. These questions are especially important for dialogue sys...
Article
Full-text available
This paper considers the research question of developing user-aware and adaptive conversational agents. The conversational agent is a system which is user-aware to the extent that it recognizes the user identity and his/her emotional states that are relevant in a given interaction domain. The conversational agent is user-adaptive to the extent that...
Conference Paper
This paper proposes a computationally appropriate approach to evaluation of the dialogue act complexity in human-machine interaction inspired by a functional interpretation of the N400 and P600 components of electroencephalographic signals. Two main parameters of the dialogue act complexity are: the retrieval cost and the integration cost. At the c...
Conference Paper
A spatial context is often present in speech-based human-machine interaction, and its role is especially significant in interaction with robotic systems. Studies in the cognitive sciences show that frames of reference used in language and in non-linguistic cognition are correlated. In general, humans may use multiple frames of references. But since...
Conference Paper
This paper reports on the application of the dimensional emotion model in automatic emotional speech recognition. Using the perceptron rule in combination with acoustic features, an approach to speech-based emotion recognition is introduced, which can classify the utterance with respect to the valence-arousal (V-A) dimensions of its emotional conte...
Conference Paper
Full-text available
This paper reports and discusses an implementation of a cognitively-inspired and computationally appropriate linguistic encoding of motion events in human-robot dialogue. The proposed encoding is based on a schematic system of attention in spatial language and the conceptualization of the two fundamental cognitive functions in language – i.e., the...
Conference Paper
One of the most fundamental research questions in the field of human-machine interaction is how to enable dialogue systems to capture the meaning of spontaneously produced linguistic inputs. This paper introduces an approach to this research question inspired by recent neuroimaging studies of working memory operations. It is widely acknowledged tha...
Article
Full-text available
The paper addresses the research question of automatic emotional speech recognition for Serbian. It integrates two research issues: (i) selection of an appropriate feature set, and (ii) investigation of different classification techniques. The paper reports a set of experiments with three feature sets: (i) the prosodic feature set, (ii) the spectra...
Conference Paper
This paper reports certain aspects of the design and implementation of a prototype conversational agent embedded in Android-based mobile phones. The embedded conversational agent is intended to enable a speech-based interface between the user and the mobile phone, and thus to make the use of the phone more intuitive for nontechnical users. The inte...
Article
This paper introduces a new model of attentional state in task-oriented human-machine interaction. It integrates three lines of research: (i) neurocognitive understanding of the focus of attention in working memory, (ii) the notion of attention related to the theory of discourse structure in the field of computational linguistics, and (iii) investi...
Article
The paper presents a novel split-and-merge algorithm for hierarchical clustering of Gaussian mixture models, which tends to improve on the local optimal solution determined by the initial constellation. It is initialized by local optimal parameters obtained by using a baseline approach similar to k-means, and it tends to approach more closely to th...
Conference Paper
Full-text available
This paper reports a spoken natural language dialogue system that manages the interaction between the user and the industrial robot ABB IRB 140. To the extent that the dialogue system is multimodal, it uses three communication modalities: (i) spoken language (automatic speech recognition and text-to-speech synthesis), (ii) visual recognition of the...
Article
Full-text available
I. Jokic, S. Jokic, M. Gnjatovic, V. Delic, Z. Peric. Influence of the Number of Principal Components used to the Automatic Speaker Recognition Accuracy // Electronics and Electrical Engineering. - Kaunas: Technologija, 2012. - No. 7(123). - P. 83-86. This paper discusses possibilities to reduce dimensionality of the standard MFCC feature vectors b...
Conference Paper
This paper introduces an approach to linguistic encoding of temporal relations in robotic system scenarios. The underlying idea is that a dialogue system that manages the interaction between the user and the external robotic system should be able (i) to understand and adopt a scenario defined in natural language, and (ii) to express a scenario, sto...
Conference Paper
Full-text available
The paper describes the simulation software for preview of the motion of humanoid robot: either graphical in 3D environment or on the real robot (KHR-1 HV was used). Such software enable synthesis (both, online and offline) and execution of humanoid movements. Execution can be performed either on the 3D model or on the real robot. Such software bri...
Article
This paper summarizes some aspects of my previous work in the field of adaptive dialogue management in human-machine interaction. It focuses on the dialogue management functionalities of modeling context information (including the emotional state of the user), and of dynamic adaptation of the system's behavior according to the current state of the...
Article
Emotional corpora provide an important empirical foundation for investigation when researchers aim at implementing emotion-aware spoken dialog systems. One of the fundamental research questions is how to acquire an appropriate, realistic emotion corpus. The primary aim of this paper is to address the methodological desiderata in producing emotion c...
Conference Paper
This paper introduces an approach to handling miscommunication in human-machine interaction (HMI). Two aspects are considered: dealing with miscommunication (i.e., the recovery strategy) and detecting miscommunication (i.e., detecting changes of the user’s behavior). The first part of the paper discusses the recovery strategy implemented in two pro...
Conference Paper
In this paper, we consider three distinct but interacting “cognitive” features of spoken dialogue systems that may contribute to better acceptance by users: naturalness of the interaction, adaptation and cooperativeness. In order to achieve them, we particularly concentrate on the dialogue management functionalities of modeling contextual informati...
Conference Paper
The primary aim of this paper is to present the implementa- tion of adaptive dialogue management in the NIMITEK prototype spo- ken dialogue system for supporting users while they solve problems in a graphics system (e.g., the Tower-of-Hanoi puzzle). The central idea is that the system dynamically refines a dialogue strategy according to the current...
Conference Paper
This paper reports on the creation of the multimodal NIMITEK corpus of affected behavior in human-machine interaction and its role in the development of the NIMITEK prototype system. The NIMITEK prototype system is a spoken dialogue system for supporting users while they solve problems in a graphics system. The central feature of the system is adap...
Article
The primary aim of this paper is to address the methodological desiderata in obtaining a corpus of affected speech in human-machine interaction. We propose requirements that are to be met in order that a Wizard-of-Oz scenario designed to elicit affected speech could result in ecologically valid data. In addition, we report about the Wizard-of-Oz ex...
Article
One of the challenges in spoken human-machine interaction (HMI) is how a language interface should address various inherently present dialogue phenomena related to the users' language, such as syntactically very simple utterances, high frequency of ungrammaticalities, predominant use of anaphora over complex syntactic constructions, affected speech...

Citations

... The production of effective vision frameworks for programmed reconnaissance innovation is a troublesome and obliged issue [2]. Biometrics investigates how to recognize or match individuals in light of at least one biometric quality, like voice, unique mark, or face picture [3]. Free access and few usage restrictions are characteristics of semi-public areas. ...
... Some applications with nonlinear process demonstrate the different neural network-based models [6]. Some heuristic procedures can reduce computational complexity with respect to optimal multiple sequence alignment and thus outperform humans in the post-processing of recognition hypotheses [7]. Adaptive network enhancement method for the best least squares approximation using two-layer Rectified-Linear-Unit (ReLU) neural networks is introduce in [8]. ...
... Clustering Approach [1] traffic load analysis improved k-means clustering algorithm [2] traffic congestion analysis self-organizing maps neural network [3] traffic state classification k-medoids algorithm [4] road network level identification k-means algorithm [5] traffic congestion analysis grey relational clustering model [6] traffic accidents and pattern extraction ROCK algorithm [7] traffic accident pattern identification COOLCAT algorithm [8] traffic accident factor analysis k-means algorithm [9] road traffic accident modeling a comparative study of machine learning classifiers [10] traffic accident black spots identification HDBSCAN algorithm [11] traffic congestion analysis k-means algorithm [12] driving behavior risk analysis k-means algorithm [13] optimal path routing a modified K-medoids algorithm [14] analysis of pedestrian crash fatalities and severe injuries KDE method [15] traffic-management system DBSCAN agorithm [16] severity of traffic accident analysis DBSCAN algorithm [17] highway safety assessment k-means algorithm [18] pedestrian crash severity analysis KDE method [19] detection of road segments of spatially prolonged and high traffic accident risk a clustering algorithm based on the Gestalt principle of proximity This paper goes along the second research line. It introduces a parameter-free approach to clustering critical traffic road segments in urban areas, i.e., road segments of spatially prolonged and high traffic accident risk. ...
... The most representative tool for VMI is Drakvuf [11], capable of tracing Kernel and user-level malware by observing process execution, file operations, and system calls as kernel functions at the hypervisor level. Drakvuf injection technique allows it to monitor the instructions written into the VM memory at the location of interest and, therefore, can detect kernel rootkits and limits malware capability to perform evasive techniques. ...
... Sequences of strings are configured, obtained from symbol-based modeling of spatiotemporal signals using IMU data. Sequences of strings can be understood as weighted graph vertices, whereby the weight of an edge presents a modified Levenshtein distance [10] between its vertices. ...
... [1]. In recent years, with the rapid development of modern signal processing technology, many domestic and foreign scholars have proposed a variety of methods to improve the accuracy and speed of residual current detection, such as wavelet analysis, Empirical Mode Decomposition (EMD), neural networks [2,3] and other algorithms have been applied to residual current detection, combining these emerging technologies with RCD to further improve the reliability of RCD. For example, X. Xiao et al. proposed the adaptive filtering detection method [4], which achieves adaptive current detection by noise reduction and residual current separation of the measured current, but the N-LMS model has the disadvantages of too slow convergence and low detection accuracy; H. Yan et al. proposed the EMD detection method [5], which uses the characteristics of the time-frequency domain change of residual current as the basis for determining the occurrence of electrocution faults, which is better improved accuracy, but the detection is prone to problems such as modal mixing and endpoint effects; C. Li et al. performed the detection of residual current by combining VMD with LSTM [6], which has certain advantages due to LSTM in sequence modelling problems with long-time memory. ...
... Other studies include the determination of dialogue boundaries [43], a method for estimating utterance topics for conference support [44], and bilingual topic modeling [45]. However, their approach differs from ours, which is based on an originally constructed interview dialogue corpus. ...
... The replicable experimental findings on three publicly available datasets were provided in this study, demonstrating outperforming outcomes and validating the utility of the suggested technique. Liu et al. [36] utilize Gaussian, triangular fuzzy average, and median smoothing filters to pre-process the picture by fuzzifying the region outside the border to increase the signal-to-noise ratios. They used augmented photos to train deep learning systems using fuzzy operations, which sped up the convergence process and improved identification accuracy. ...
... Although machine learning may produce practical and advanced applications, more is needed to replace the human capacity for domain expertise. Gnjatović et al. [34] focused on reintroducing humans into the learning loop. For instance, false, inaccurate or incomplete information floated online in news, social media and on the Web causes societal harm. ...
... For example, Figure 1 shows a set of image frame segments derived from a video stream captured by a mobile phone application. Each frame is processed separately by the external number recognition system introduced in [1,6]. In Table 1, for each frame, a recognition hypothesis is provided. ...