Dražen Drašković
YOU?
Author Swipe
View article: Aspect-based sentiment analysis of user-generated content from a microblogging platform
Aspect-based sentiment analysis of user-generated content from a microblogging platform Open
This research presents a practical application of advanced natural language processing techniques to understand people’s feelings during the global Covid-19 pandemic, using a set of big data of over 547 thousand tweets. Companies often use…
View article: Quality assurance strategies for machine learning applications in big data analytics: an overview
Quality assurance strategies for machine learning applications in big data analytics: an overview Open
Machine learning (ML) models have gained significant attention in a variety of applications, from computer vision to natural language processing, and are almost always based on big data. There are a growing number of applications and produ…
View article: Teaching computing for complex problems in civil engineering and geosciences using big data and machine learning: synergizing four different computing paradigms and four different management domains
Teaching computing for complex problems in civil engineering and geosciences using big data and machine learning: synergizing four different computing paradigms and four different management domains Open
This article describes a teaching strategy that synergizes computing and management, aimed at the running of complex projects in industry and academia, in the areas of civil engineering, physics, geosciences, and a number of other related …
View article: Research in computing-intensive simulations for nature-oriented civil-engineering and related scientific fields, using machine learning and big data: an overview of open problems
Research in computing-intensive simulations for nature-oriented civil-engineering and related scientific fields, using machine learning and big data: an overview of open problems Open
This article presents a taxonomy and represents a repository of open problems in computing for numerically and logically intensive problems in a number of disciplines that have to synergize for the best performance of simulation-based feas…
View article: Differentiable programming in machine learning
Differentiable programming in machine learning Open
This paper explains automatic differentiation, discussing two primary modes - forward and backward - and their respective implementation methods. In the context of issues encountered in machine learning and deep learning, the forward mode …
View article: Visual Simulator for Mastering Fundamental Concepts of Machine Learning
Visual Simulator for Mastering Fundamental Concepts of Machine Learning Open
Machine learning (ML) has become an increasingly popular choice of scientific research for many students due to its application in various fields. However, students often have difficulty starting with machine learning concepts due to too m…
View article: Retinal disease classification based on optical coherence tomography images using convolutional neural networks
Retinal disease classification based on optical coherence tomography images using convolutional neural networks Open
The challenges in today's medicine are progressively more related to the application of artificial intelligence and supervised learning techniques. Optical coherence tomography (OCT) is a noninvasive imaging technology used to obtain high-…
View article: Development of a Multilingual Model for Machine Sentiment Analysis in the Serbian Language
Development of a Multilingual Model for Machine Sentiment Analysis in the Serbian Language Open
In this research, a method of developing a machine model for sentiment processing in the Serbian language is presented. The Serbian language, unlike English and other popular languages, belongs to the group of languages with limited resour…
View article: An automated framework for runtime analysis of malicious executables on Linux
An automated framework for runtime analysis of malicious executables on Linux Open
One way of testing a malware detection tool is to expose it to a large number of diverse malware samples and verify its detection accuracy. During these tests, the host system must not be harmed by malware and yet be able to analyze its ha…