Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vedran Batoš is active.

Publication


Featured researches published by Vedran Batoš.


IEEE Transactions on Magnetics | 2009

Efficient Force Analysis in CAD-Based Simulations

Zoran Andjelic; Vedran Batoš; David Pusch

The paper presents a BEM-based approach for efficient force analysis of the steady-state field problems. As an extension to the minimal-order H-phi formulation we introduce here an improved approach for the treatment of the skin-effect problems. This approach enables the designers to perform the CAD-based simulations without any additional modeling requirement. The classical BEM modeling methodology is combined with the multipole-based integral technique (MBIT) to accelerate/compress the densely populate BEM matrix. The verification of the discussed approach is done by comparison with the known analytical solutions. The proposed method is illustrated on the problems dealing with the force calculation in the real-world bus-bars systems.


information technology interfaces | 2003

Application of e-commerce in banking industry

Vedran Batoš; Krešimir Fertalj; Damir Kalpić

We initially present possible application of standard e-commerce models in banking industry. Required resources and standard e-commerce models are briefly considered and followed by the examples of implementation of particular models. There follows a description of application of some of the general models regarding the banking business. One combined model is presented and an example of combined B2C and B2B transactions is given. Security issues related to banking industry are exposed.


Archive | 2015

Human Identification by Simultaneous Recording of Acceleration and ECG Data

Ivan Luetić; Luka Celić; Vedran Batoš; Ratko Magjarević

This paper presents a method of human identification based on ensemble empirical mode decomposition (EEMD) of an one-lead electrocardiogram (ECG) signal and by box approximation geometry of reconstructed attractors in latent space of a signal measured by an accelerometer located on the waist. Preprocessing of the ECG signal eliminates effects of noise and heart rate variability. The ECG signal is decomposed into a number of intrinsic mode functions (IMFs) and significant heartbeat signal features are extracted using Welch spectral analysis. Human gait is considered a dynamical system and the features are the eigenvalues of the reconstructed attractor in the odd principal dimensions obtained using the Singular Spectrum Analysis methodology. The K-nearest neighbours (K-NN) method is applied as the classifier tool.


iberian conference on information systems and technologies | 2014

Towards a method to retrieving business process model from source code

Ivan Cesar; Krešimir Fertalj; Vedran Batoš

Understanding and keeping track of business processes is one of the most important tasks in development of business software. However, any documentation other than source code cannot be completely reliable. On the other hand, source code is rather unreadable by non-developers and can be challenging to determine business processes distributed among many files and layers. This paper introduces a methodology for extracting business process model from source code by identifying topics from object model, analysing application architecture dependency and developing a graph data structure to store information regarding semantic relationships within source code.


international conference on telecommunications | 2010

Testing traffic congestion by distributed protocol analysis

Vlatko Lipovac; Vedran Batoš; Boris Nemšić

In this paper, we propose the concept and the means for practical testing of TCP congestion window. With this respect, we present the architecture of the hardware and expert-system-based distributed protocol analysis that we used for practical data acquisition and testing, which we conducted on a major network with live traffic (Electronic Financial Transactions data transfer), as well as the appropriate algorithm for estimating the actual congestion window size from the measured data — mainly decoding with precise time-stamps (100 ns resolution locally and 1 μs with GPS clock distribution) and expert-system-processed results of the accordingly filtered data from the special-hardware-based capture buffer. We used statistical analysis for evaluation whether the data belonged to the specific (in this case assumed normal) cumulative distribution function, or whether two data sets exhibited the same statistical distribution — the condition-sine-qua-non for a stable interval. Finally, as the measured data-based congestion window values exhibited fitting, with satisfactory statistical significance, to the truncated normal distribution, we applied the appropriate model for estimation of the relevant parameters of the congestion window distribution: its mean value and variance.


consumer communications and networking conference | 2009

Integrated Dual-Display-Based 3G Mobile Phone / Wireless Terminal

Vlatko Lipovac; Vladimir Majer; Vedran Batoš

In this paper, we describe HW and SW features of the developed prototype of a hybrid of 3G mobile phone and wireless terminal, which provides integral video projection onto two VGA/2 displays. These could be fold/collapsed one onto each other, or re-mounted, while the ratio of the total length-to-height is 4:3, so preserving integral video VGA format and, consequently, displaying Internet content, e-mail messages, PC SW screens, multimedia etc. Two displays that share the image provides it with overall resolution of 640×480 pixels per inch. The device is driven by Texas Instruments OMAP 2420 multimedia processor with ARM1136 core and Linux operating system. In addition, the device is equipped with specially developped prototypes of unique spring/microgenerator-based battery charger as well as with ultra-thin mountable foil-based QWERTY keyboard.


Promet-traffic & Transportation | 2009

TESTING APPLICATION (END-TO-END) PERFORMANCE OF NETWORKS WITH EFT TRAFFIC

Vladimir Lipovac; Vedran Batoš; Antun Sertić

This paper studies how end-to-end application peiformance(of Electronic Financial Transaction traffic, in particular)depends on the actual protocol stacks, operating systemsand network transmission rates. With this respect, the respectivesimulation tests of peiformance of TCP and UDP protocolsrunning on various operating systems, ranging from Windows,Sun Solmis, to Linux have been implemented, and thedifferences in peiformance addressed focusing on throughputand response time.


Promet-traffic & Transportation | 2002

TRAFFIC RULES IN ELECTRONIC FINANCIAL TRANSACTIONS (EFT) NETWORKS

Vedran Batoš; Vlatko Lipovac; Antun Sertić

This paper presents the traffic rules in the EFT (ElectronicFinancial Transactions) networks, based on the implementationof the solution called Gold-Net developed and implementedby Euronet Worldwide Inc. Following the traffic rulesin EFT networks, out of its worldwide experience, Gold-Netevolved a comprehensive and expandable EFT network solutiondesigned to meet an institutions needs today and in the future.It is an ITM (Integrated Transaction Management) solution,modular and expandable, and consists of a comprehensiveEFT software modules with ATM and POS driving capabilities.The combination of ATM management and the onlineconnection form the intercept processing control module. Asthe marketplace grows, this solution ensures that an ente1prisemay position itself for future growth and expanded service offerings.


annual conference on computers | 2005

QoS control based on query response time prediction

Mario Miličević; Mirta Baranović; Vedran Batoš


Promet-traffic & Transportation | 2009

Testing TCP Traffic Congestion by Distributed Protocol Analysis and Statistical Modelling

Vladimir Lipovac; Vedran Batoš; Boris Nemšić

Collaboration


Dive into the Vedran Batoš's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ivan Grbavac

University of Dubrovnik

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge