Category: Work
Things related to work
Scientific blogging
I have seen many advices on how important it is to blog if you want to become influential scientists. Even on my university (University of Manchester), faculties are organizing crash seminars on scientific blogging for researchers with introduction to WordPress. However, I am quite familiar with WordPress, since I was…
Brief introduction to Linked Data
My recent research brought me to linked data as quite interesting concept. I will here write some brief introduction and notes on linked data. Probably at some future point of time I will go deeper into standards and usage. Current state of the Web Internet have revolutionized the way we…
Political bot (AI) fighting human bots (using NLP and OCR)
Probably I should write this on Serbian, but to keep consistency, English it is. Since soon elections gonna be held in Serbia, there is a lot of talk about political campaigns. And one of the major issue in the news are human bots applied in the political campaign on the internet….
What is the big deal with natural language processing?
Recently here at Manchester University, at one class for all PhD students we realized that almost half of student in a group are doing some kind of natural language processing and almost everyone was doing something related with machine learning (even hardware guys are building neural network like multi-processor architecture)….
Introducing OWASP Seraphimdroid
About 2 months ago I started thinking about creating Android security application. I was looking where the other application are weak, since there are a lot of android device protection and anti malware application available on Google play. Thing I found that most of those application don’t use application permissions…
Lego Mindstorms NXT 2.0 car programmed in Microsoft Robotics
As I promissed before (https://inspiratron.org/lego-mindstorms-nxt-2-0-first-contact/), I tryed to build robot vehicle and program it using Microsoft robotics, instead of Development Kit that comes with the box. Development kit that comes with Lego mindstorms NXT 2.0 is some simplified version of LabView. I must admit that I never worked with LabView,…
Team performance – advantages of a small team
There are many teories on how to organize and how team to perform best. I would not talk about them all. I just want to point out one of my experiences where I feel most confortable and where I feel that team is most productive. I had experience with big…
Personalized relevance classifier of sentences
In this article I would like just to pitch idea about personalized classifier, and I would like to hear your opinion if this approach could be good and what can be problems with it. So what is the problem? I would like to build personalized relevance classifier. Problem definition Every…
income.io – Money saving app
In sunday we have finaly released in Prelovac Media income.io, money saving app for Android tablets and iPads. It is minimalistic financial application that will help you track your family finances. Simple in design, easy to use, secure, and most importantly free. INCOME.IO FEATURES: – Beautiful graphics – Easy-accessible and…
Lego Mindstorms NXT 2.0 – Humanoid first steps
I recently wrote post about my first contact with Lego Mindstorms NXT 2.0 and building robot vehicle. After several version I decided to disasseble vehicle and to build humanoid robot. It was a challange of a different kind. Most of people knows how to control vehicle. Espetially vehicle with continuous…
Lego Mindstorms NXT 2.0 – First contact
Couple of days ago to our company arrived LEGO Mindstors NXT 2.0 robot. Today I decided to bring it home for the first contact. It was quite successfull, I built starter robot that is avoiding obsticles and speaking. For about 2-3 hours of play, I think it is good enought….
Introduction to Social engineering
Social engineering is one of the main security issues these days. Most of companies invest to infrastructure to be hardly hackable, but they don’t educate people. Social engineering is quite common attack since the begining of 1980′. And many big corporate networks were infiltrated using these attacks. And the only…