Logo
User Name

Damir Pozderac

Društvene mreže:

Procedural modeling is used to generate virtual content in organized layouts of exterior and interior elements. There is a large number of existing layout generation methods, and newer approaches propose the generation of multiple layout types within the same generation session. This introduces additional constraints when manually created layout elements need to be combined with the automatically generated content. Existing approaches are either designed to work with existing elements for a single layout type, or require a high amount of manual work for adding existing elements within multiple layouts. This paper presents a method that enables the application of existing subdivision methods on multiple layout types by inserting existing content into the generation result. This method can generate test cases by creating variations of partially generated layouts for procedural modeling methods that can work with existing content.

Emsel Krupalija, Tarik Trbić, Ehlimana Cogo, Emir Cogo, Damir Pozderac

Professional football players often need legal help in managing disputes with football clubs. The Professional Football Players Syndicate of Bosnia and Herzegovina is an organization founded with this purpose. Due to an increasing need for legal help and a large number of cases, their legal associates need systematic management of data. This work presents the first information system entirely intended for the usage by sports law professionals. It contains a desktop application where legal disputes are shown in the form of an organized dispute table. Real-time information about football players is acquired by using the TransferMarkt web API. The system was successfully used for two years, resulting in 103 documented cases involving 87 players and 31 clubs. As a result, 69.90% of disputes were archived and 43.69% of disputes resulted in agreements, indicating that the productivity of legal associates and the mediator role of the Syndicate were improved.

Damir Pozderac, Nejla Bečirspahić, Dženis Muhić, Šeila Bećirović Ramić, Irfan Prazina, V. Okanović, Lejla Kafedžić

The applications presented in this conference paper focus on the development of a mobile and web application serving as a planner with a focus on tracking persons with Down syndrome. These innovative technological solutions contribute to the development of independence and functionality for persons with Down syndrome while emphasizing the importance of inclusivity in society. In addition to focusing on organizing activities, the mobile and web applications provide support and facilitate daily tasks. The web application allows parents/guardians/teachers to add new activities to the planner and track the progress of these activities. On the other hand, the mobile application enables persons with Down syndrome to record their activities within the application, considering their specific challenges, and customizing the user interface to their needs.

Damir Pozderac, Mujo Hadžić, Irfan Prazina, V. Okanović

Software development is implemented in several key phases, one of which is software testing. Software testing consists of selecting techniques for the purpose of finding software defects and bugs in the process of writing code. There are several ways and approaches that lead us to that purpose, with the goal of selecting the most adequate method in terms of cost, complexity, and efficiency. In this paper, we will take a deeper dive into mutation testing techniques. Mutation testing techniques are fault-based and focus more on test structures than the input data, which is considered the testing start point. The basic concept of mutation testing consists of a few steps, which will be covered in this paper, and metrics that measure how effective the tests really are. With a few code examples, we will show why code coverage, which is mostly taken as a measure while testing, is sometimes not the most reliable source and does not give a full picture when talking about the quality of written tests.

Digital credentials represent a cornerstone of digital identity on the Internet. To achieve privacy, certain functionalities in credentials should be implemented. One is selective disclosure, which allows users to disclose only the claims or attributes they want. This paper presents a novel approach to selective disclosure that combines Merkle hash trees and Boneh-Lynn-Shacham (BLS) signatures. Combining these approaches, we achieve selective disclosure of claims in a single credential and creation of a verifiable presentation containing selectively disclosed claims from multiple credentials signed by different parties. Besides selective disclosure, we enable issuing credentials signed by multiple issuers using this approach.

Digital credentials represent crucial elements of digital identity on the Internet. Credentials should have specific properties that allow them to achieve privacy-preserving capabilities. One of these properties is selective disclosure, which allows users to disclose only the claims or attributes they must. This paper presents a novel approach to selective disclosure BLS-MT-ZKP that combines existing cryptographic primitives: Boneh-Lynn-Shacham (BLS) signatures, Merkle hash trees (MT) and zero-knowledge proof (ZKP) method called Bulletproofs. Combining these methods, we achieve selective disclosure of claims while conforming to selective disclosure requirements. New requirements are defined based on the definition of selective disclosure and privacy spectrum. Besides selective disclosure, specific use cases for equating digital credentials with paper credentials are achieved. The proposed approach was compared to the existing solutions, and its security, threat, performance and limitation analysis was done. For validation, a proof-of-concept was implemented, and the execution time was measured to demonstrate the practicality and efficiency of the approach.

The visual layout has an enormous influence on human perception and is a subject of many studies, including research on web page similarity comparison. Structure-based approaches use the possibility of direct access to HTML content, whereas visual methods have widespread usage due to the ability to analyze image screenshots of entire web pages. A solution described within this paper will focus on extracting web page layout in forms needed by both above-mentioned approaches.

Damir Pozderac, Adna Ćato, Semina Muratović, Irfan Prazina, Lejla Kafedžić, V. Okanović

In this paper, we introduce and provide insight into the two innovative applications designed to enhance the lives of persons with Down syndrome, focusing on seamless integration between the two. The first is a mobile application that helps users manage their daily routines by monitoring and predicting activity durations, considering their unique challenges. The second is a web application for parents/teachers/other adults to streamline activity scheduling, progress tracking, and reminders.

Damir Pozderac, Jasmina Hasanović, Irfan Prazina, V. Okanović

Webpage layout presentation failures can negatively affect the usability of a web application as well as the end-to-end user experience. The need for automated methods of visual inspection becomes obvious in complex web applications. However, visual inspection still heavily relies on manual inspection because the tools currently available are not yet advanced enough. This paper compares the performance results of three visual testing tools: Galen, AyeSpy, and Percy, and focuses on opportunities for their enhancement.

...
...
...

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više