Logo

Publikacije (91)

Nazad
R. Hassan, Selver H. Pepic, M. Saracevic, Khaleel Ahmad, Milan B. Tasic

M. Saracevic, S. Adamovic, N. Maček, A. Selimi, Selver H. Pepic

This paper presents a solution to secret key sharing protocol problem that establishes cryptographically secured communication between two entities. We propose a new symmetric cryptographic key exchange scenario based on the specific properties of Cat-alan numbers and the Lattice Path combinatorics. Our scenario consists of three phases: generating Catalan values, defining the Lattice Path movement space and defining the key equalization rules. In the experimental part of this study, we have merged our scenario with the Maurer‟s protocol, while in the information-theoretical approach to the key exchange we have presented how a partially split bit sequence can become the secret key that both parties in communication can use. Maurer's satellite scenario model for the exchange of the Catalan key is discussed in detail and its application is proposed. Security analysis of the protocol and testing for channel capacity or key generation speed is also suggested.

Adis Rahmanović, M. Saracevic

In this paper we discuss several elements of importance for securing QoS in multimedia networks. Firstly, we present the first factor, which refers to understanding the characteristics of multimedia traffic in order to define and implement the QoS requirements. Secondly, factor refers to translation between QoS parameters that implies the distribution of system and network resources, and thirdly the factor establishes the appropriate QoS architecture that can provide the required QoS guarantees for multimedia applications. We have been analyzing security-critical applications such as remote operation, which may require a guaranteed level of availability (hard QoS). There are basically two ways to secure a guaranteed QoS. The first is simply to provide a lot of resources, enough to meet the expected peak (peak) requirements with a significant security margin. This approach generously oversupplies the (over provisioning) network. We gave a detailed security analysis as features of WiMAX. More precisely, our analysis is based on the claim that its key feature of the WiMAX network is that the security layer is built into the protocol leg instead of being added later, i.e. the security layer is complex between PHY and MAC layers.

This research presents the epileptic focus region localization during epileptic seizures by applying different signal processing and ensemble machine learning techniques in intracranial recordings of electroencephalogram (EEG). Multi-scale Principal Component Analysis (MSPCA) is used for denoising EEG signals and the autoregressive (AR) algorithm will extract useful features from the EEG signal. The performances of the ensemble machine learning methods are measured with accuracy, F-measure, and the area under the receiver operating characteristic (ROC) curve (AUC). EEG-based focus area localization with the proposed methods reaches 98.9% accuracy using the Rotation Forest classifier. Therefore, our results suggest that ensemble machine learning methods can be applied to differentiate the EEG signals from epileptogenic brain areas and signals recorded from non-epileptogenic brain regions with high accuracy.

A. Selimi, M. Saracevic, Arafat Useini

This paper aims to examine the impact of digital tools in mathematics and the readiness of teachers and students applying these interactive tools in teaching. The data used in the research are obtained from the test results of 526 students, in five secondary schools in North Macedonia. The students in this research, are divided into two groups: mainly as a control group and an experimental group. The control group is the group of students who do not have access to the interactive tools at home and who use interactive tools only once a week in the school while the group of students in the experimental group have access to them and have the opportunity to use these interactive applications every day. The students in the control group and the experimental group were selected from the same year and the gender equality of the groups was taken into account. To further understand the relationship between teaching with digital tools and learning after testing was surveyed the participants. The results in our research suggest that interactive teaching tools have a positive impact on the teaching process and increase students' knowledge.

M. Saracevic, S. Adamovic, N. Maček, M. Elhoseny, S. Sarhan

This study presents a secret key sharing protocol that establishes cryptographically secured communication between two entities. A new symmetric key exchange scenario for smart city applications is presented in this research. The protocol is based on the specific properties of the Fuss-Catalan numbers and the Lattice Path combinatorics. The proposed scenario consists of three phases: generating a Fuss-Catalan object based on the grid dimension, defining the movement in the Lattice Path Grid and defining the key equalisation rules. In the experimental part, the authors present the security analysis of the protocol as well as its test. Also, they examine the equivalence of the proposed with Maurer's satellite scenario and suggest a new scenario that implements an information-theoretical protocol for the public key distribution. Additionally, a comparison with related studies and methods is provided, as well as a comparison with satellite scenario, which proves the advantages of solution presented by the authors. Finally, they propose further research directions regarding key management in smart city applications.

Voja Đorđev, Kristina Božić, Dejan Spalinger, M. Saracevic, Marko Petrović, Arsenije Mladenović, M. Milanović, J. Ćelić et al.

M. Saracevic, Nan Wang, E. E. Zukorlic, Suad Bećirović

To evaluate and promote ecologically responsible practices in the sintering business, conducting a sustainability evaluation of sintering flue gas is essential. An important step in making iron and steel, sintering releases flue gas emissions that, if not controlled, may harm the environment. Reducing emissions, improving energy efficiency, managing waste, using water, utilizing resources, monitoring community effects, complying with regulations, conducting a life cycle assessment, and continuously improving are all part of the assessment's extensive scope. When these aspects are considered, stakeholders may better understand the economic, social, and environmental effects of sintering flue gas management. This paper used the multi-criteria decision-making (MCDM) methodology to evaluate the criteria. We used the DEMATEL method as an MCDM method. The DEMATEL is used to build the relation between the criteria. We collect ten criteria in this study. We compute the criteria weights to show this study’s best and worst criterion. The DEMATEL method is used to draw the effect diagram between criteria.

M. Saracevic, A. Selimi, Selver H. Pepic

This chapter presents the possibilities of applying cryptography and steganography in design advanced methods of medical software. The proposed solution has two modules: medical data encryption and medical data hiding. In the first module for the encryption of patient data a Catalan crypto-key is used combined with the LatticePath combinatorial problem. In the second module for hiding patient data, the Catalan stego-key and medical image is used. The objective of the second part is to explain and investigate the existing author's method to steganography based on the Catalan numbers in the design of medical software. The proposed solution is implemented in the Java programming language. In the experimental part, cryptanalysis and steganalysis of the proposed solution were given. Cryptanalysis is based on time and storage complexity, leaking information and machine learning-based identification of the encryption method. Also, steganalysis is based on the amount of information per pixel in stego image, approximate entropy and bit distribution in stego-images.

N. Markus, I. Ivanov, Voja Đorđev, Kristina Božić, Dejan Spalinger, M. Saracevic, Marko Petrović, Arsenije Mladenović et al.

S. Nikolić, M. Saracevic, Mirela Šabotić

It has long been recognized that learning content is very useful for developing the intellectual and creative abilities of children. Modern teaching requires dynamic, diverse teaching and its adaptability to the abilities of each individual student. This implies a skillful combination of modern teaching materials, methods, forms and the choice of teaching form in each lesson. In that context, motivational games in the class have a special function. It is common knowledge of every teacher that students in classes need to be encouraged towards full engagement of cognitive abilities. This is not always easy to achieve. In every class, psychological preparation (application) is necessary to mobilize students' attention in the shortest possible period of time, prepare them for cognitive activities, whether it is preparation for the processing of new teaching contents, doing exercises or repeating old material. In all this, well selected motivational games can play a significant role. With engagement of cognitive process in solving such tasks, students can find successful solutions in a short time, and success is the best motive for further work in class.

Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više