Logo

Publikacije (91)

Nazad
Faruk Selimovic, P. Stanimirović, M. Saracevic, A. Selimi, P. Krtolica

: This paper presents the authentication method using the Delaunay triangulation incremental algorithm and the Catalan objects. The proposed method is a combination of computational geometry and cryptography. This method presents a new step towards encoding the triangle coordinates using the Catalan-key. We provided specific suggestions for the application of this method in the authentication for bank clients by the image encryption. Client authentication verification is performed by asking the client to enter the (x,y) coordinate values of randomly selected indices of an array. If the entered coordinates match the index values in the banking system array, then the transaction or other operation is approved. If the matching fails, it means that we have an unidentified person who has followed the whole process and wants to break into the banking system. There are many advantages arising from a scenario for the user authentication by the assigned Catalan object and the stack permutation method. Also, we provided concrete examples for the Delaunay encryption of image with an authentication scenario and experimental results for the proposed method.

A. Selimi, Samedin Krrabaj, M. Saracevic, Selver H. Pepic

This study presents a practical view of dynamic programming, specifically in the context of the application of finding the optimal solutions for the polygon triangulation problem. The problem of the optimal triangulation of polygon is considered to be as a recursive substructure. The basic idea of the constructed method lies in finding to an adequate way for a rapid generation of optimal triangulations and storing - them in as small as possible memory space. The upgraded method is based on a memoization technique, and its emphasis is in storing the results of the calculated values and returning the cached result when the same values again occur. The significance of the method is in the generation of the optimal triangulation for a large number of n. All the calculated weights in the triangulation process are stored and performed in the same table. Results processing and implementation of the method was carried out in the Java environment and the experimental results were compared with the square matrix and Hurtado-Noy method.

Sead H. Masovic, M. Saracevic, P. Stanimirović, P. Krtolica

In this paper we implement Block method for convex polygon triangulation in web environment (PHP/MySQL). Our main aim is to show the advantages of usage of web technologies in performing complex algorithm from computer graphics. The basic assumption is that one obtained results we store in database and use it for other calculation. Databases are convenient and structured methods of sharing and retrieving data. We have performed a comparative analysis of developed program with respect to two criteria: CPU time in generating triangulation and CPU time in reading results from database.

M. Saracevic, A. Selimi

This paper presents a new technique of generation of convex polygon triangulation based on planted trivalent binary tree and ballot notation. The properties of the Catalan numbers were examined and their decomposition and application in developing the hierarchy and triangulation trees were analyzed. The method of storage and processing of triangulation was constructed on the basis of movements through the polygon. This method was derived from vertices and leaves of the planted trivalent binary tree. The research subject of the paper is analysis and comparison of a constructed method for solving of convex polygon triangulation problem with other methods and generating graphical representation. The application code of the algorithms was done in the Java programming language.

A. Selimi, M. Saracevic

Computational geometry is an integral part of mathematics and computer science deals with the algorithmic solution of geometry problems. From the beginning to today, computer geometry links different areas of science and techniques, such as the theory of algorithms, combinatorial and Euclidean geometry, but including data structures and optimization. Today, computational geometry has a great deal of application in computer graphics, geometric modeling, computer vision, and geodesic path, motion planning and parallel computing. The complex calculations and theories in the field of geometry are long time studied and developed, but from the aspect of application in modern information technologies they still are in the beginning. In this research is given the applications of computational geometry in polygon triangulation, manufacturing of objects with molds, point location, and robot motion planning.

Adis Rahmanović, M. Saracevic, A. Selimi

The aim of the article is to present the methodology, components, the benefits of introducing an electronic payment system in the specific case study. Through the case study, we attempt to prove the hypothesis, to show the system of electronic payments, required computer equipment, ICT infrastructure, information system and the benefits that such a system of electronic payments has made. The advantages are shown in economic, technical, social aspects regarding all the participants in the exploitation of this system.

In this paper is presented a procedure for the application of one computational geometry algorithm in the process of generating hidden cryptographic keys from one segment of the 3D image. The presented procedure consists of three phases. In the first phase, is done the separation of one segment from the 3D image and determination of triangulation of the separated polygon. In the second phase, is done a conversion from the obtained triangulation of the polygon in the record which represent the Catalan key. In the third phase, the Catalan-key is applied in encryption of text based on the balanced parentheses combinatorial problem.

M. Saracevic, A. Selimi, M. Mujević

This paper presents the method of creating Expert system for decision support on the Android platform. The system knowledge base for the given area of expertise is generated by inductive learning methods based on examples from the WEKA data research system. The system was realized using the Expert System shell for the e2gDroid lite mobile device, based on the application area and a set of training examples, specifically based on the Covertype Data Set qualification problem.

Adis Rahmanović, M. Saracevic, Ć. Sukić, M. Mujević

The paper presents the possibilities of applying Video surveillance and other ICT tools and services in the production process. The first part of the paper presented the system for controlling video surveillance for and the given opportunity of application of video surveillance for the security of the employees and the assets. In the second part of the paper an analysis of the system for controlling production is given and then a video surveillance of a work excavator. The next part of the paper presents integration of video surveillance and the accompanying tools. At the end of the paper, suggestions were also given for further works in the field of data protection and cryptography in video surveillance use.

Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više