Logo

Publikacije (7)

Nazad
Damir Pozderac, Nejla Bečirspahić, Dženis Muhić, Šeila Bećirović Ramić, Irfan Prazina, V. Okanović, Lejla Kafedžić

The applications presented in this conference paper focus on the development of a mobile and web application serving as a planner with a focus on tracking persons with Down syndrome. These innovative technological solutions contribute to the development of independence and functionality for persons with Down syndrome while emphasizing the importance of inclusivity in society. In addition to focusing on organizing activities, the mobile and web applications provide support and facilitate daily tasks. The web application allows parents/guardians/teachers to add new activities to the planner and track the progress of these activities. On the other hand, the mobile application enables persons with Down syndrome to record their activities within the application, considering their specific challenges, and customizing the user interface to their needs.

Damir Pozderac, Mujo Hadžić, Irfan Prazina, V. Okanović

Software development is implemented in several key phases, one of which is software testing. Software testing consists of selecting techniques for the purpose of finding software defects and bugs in the process of writing code. There are several ways and approaches that lead us to that purpose, with the goal of selecting the most adequate method in terms of cost, complexity, and efficiency. In this paper, we will take a deeper dive into mutation testing techniques. Mutation testing techniques are fault-based and focus more on test structures than the input data, which is considered the testing start point. The basic concept of mutation testing consists of a few steps, which will be covered in this paper, and metrics that measure how effective the tests really are. With a few code examples, we will show why code coverage, which is mostly taken as a measure while testing, is sometimes not the most reliable source and does not give a full picture when talking about the quality of written tests.

Digital credentials represent a cornerstone of digital identity on the Internet. To achieve privacy, certain functionalities in credentials should be implemented. One is selective disclosure, which allows users to disclose only the claims or attributes they want. This paper presents a novel approach to selective disclosure that combines Merkle hash trees and Boneh-Lynn-Shacham (BLS) signatures. Combining these approaches, we achieve selective disclosure of claims in a single credential and creation of a verifiable presentation containing selectively disclosed claims from multiple credentials signed by different parties. Besides selective disclosure, we enable issuing credentials signed by multiple issuers using this approach.

The visual layout has an enormous influence on human perception and is a subject of many studies, including research on web page similarity comparison. Structure-based approaches use the possibility of direct access to HTML content, whereas visual methods have widespread usage due to the ability to analyze image screenshots of entire web pages. A solution described within this paper will focus on extracting web page layout in forms needed by both above-mentioned approaches.

Damir Pozderac, Adna Ćato, Semina Muratović, Irfan Prazina, Lejla Kafedžić, V. Okanović

In this paper, we introduce and provide insight into the two innovative applications designed to enhance the lives of persons with Down syndrome, focusing on seamless integration between the two. The first is a mobile application that helps users manage their daily routines by monitoring and predicting activity durations, considering their unique challenges. The second is a web application for parents/teachers/other adults to streamline activity scheduling, progress tracking, and reminders.

Damir Pozderac, Jasmina Hasanović, Irfan Prazina, V. Okanović

Webpage layout presentation failures can negatively affect the usability of a web application as well as the end-to-end user experience. The need for automated methods of visual inspection becomes obvious in complex web applications. However, visual inspection still heavily relies on manual inspection because the tools currently available are not yet advanced enough. This paper compares the performance results of three visual testing tools: Galen, AyeSpy, and Percy, and focuses on opportunities for their enhancement.

Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više