Nebojša Bačanin Džakula, Ivana Štumberger, Eva Tuba, M. Tuba
{"title":"Hybridized Particle Swarm Optimization for Constrained Problems","authors":"Nebojša Bačanin Džakula, Ivana Štumberger, Eva Tuba, M. Tuba","doi":"10.15308/SINTEZA-2019-17-25","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-17-25","url":null,"abstract":"This paper presents hybridized implementation of the well-known particle swarm optimization algorithm that belongs to the family of swarm intelligence metaheuristics. The proposed approach was adapted for tackling constrained optimization problems. With the basic goals to enhance the converge of the algorithm and to improve the exploitation – exploration tradeoff, the mechanism that replaces exhausted solutions from the population with randomly generated solutions from the search domain was adopted from the artificial bee colony approach. Proposed metaheuristic was tested on standard constrained engineering benchmark, and comparative analysis with other state-of-the-art algorithms was conducted. Empirical results obtained from practical simulations proved that the hybridized particle swarm optimization for constrained problems is able to successfully tackle this type of NP hard challenges.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danilo Jovanović, Katarina Krivak, Marko Milić, T. Joksimović, M. Živković
{"title":"Inteligentni agenti za berzu","authors":"Danilo Jovanović, Katarina Krivak, Marko Milić, T. Joksimović, M. Živković","doi":"10.15308/SINTEZA-2019-203-207","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-203-207","url":null,"abstract":"","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127193892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Cicevic, Andrej A. Samcovic, Magdalena Dragović, Aleksandar Trifunović, A. Čučaković, M. Nesic, Milina Zivanovic
{"title":"Factors Affecting RFID Subcutaneous Microchips Usage","authors":"S. Cicevic, Andrej A. Samcovic, Magdalena Dragović, Aleksandar Trifunović, A. Čučaković, M. Nesic, Milina Zivanovic","doi":"10.15308/SINTEZA-2019-235-243","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-235-243","url":null,"abstract":"Microchips are used for many years for different purposes. Nevertheless, recently applications of radio frequency identification technology have been progressed tremendously with the potential to permeate throughout society as valuable tool for enabling automatic identification and management. However, they are perceived as threats at several levels that impede its implementation. Most of the research discusses the adoption of Radio Frequency Identification (RFID) devices from the provider’s point of view. Thus, it would be of interest to examine the factors of RFID subcutaneous microchip (RFID-SM) usage, adoption and diffusion by individuals from various perspectives, particularly in developing countries. Knowledge upon the factors that drive RFID adoption is a crucial step in creating the policies required for its successful implementation. This quantitative, descriptive study investigated whether young people in Serbia would be willing to use subcutaneous microchip. Preliminary findings indicate that positive attitudes prevail for the perceived usefulness and ease of use, while suspicions of confidentiality and privacy are strong, and what is most surprising none of the respondents showed willingness to use microchip implants for everyday home activities. Since the process of individual users’ acceptance of technology is very complex, the full range of variables should be investigated from broader perspective.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementacija microsoft SQL server baze podataka preko Hyper-V tehnologije","authors":"Saša Adamović","doi":"10.15308/SINTEZA-2019-208-214","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-208-214","url":null,"abstract":"Rezime: Porast broja korisnika i uređaja koji pristupa Internetu doveo je do toga da praćenje i upravljanje IT infrastrukturom postane problematično. U radu je detaljno opisana pravilna implementacija Microsoft SQL baze podataka na klijentskoj i serverskoj strani. Radom je obuhvaćen i bezbednosni aspekt zaštite informacija implementiranog rešenja. Implementacija je vršena po pravilima dobre prakse sa fokusom na pouzdanost sistema. Kompanije koje poseduju velike i komplikovane sisteme ne smeju da dozvole da ih kompjuterska infrastruktura sputava u ostvarivanju sopstvenih ciljeva. Razvoj hardverske infrastrukture omogućio je neograničen broj softverskih mogućnosti koje su uvidele svetlost dana, a za koji je potrebna odgovarajuća IT implementacija. Rad se bavi analizom pravilne implementacije u modernom virtuelnom okruženju.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126360895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors of a Perfect Strategy for Relationships in Organization - Example of Emotional Economy","authors":"M. Radivojević, G. Biševac","doi":"10.15308/SINTEZA-2019-11-16","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-11-16","url":null,"abstract":"The success of an organization depends not only on economic parameters. Relationships in organization represent social interaction and imply emotional reactions and various other forms of interpersonal relationships and form a very complex social field. The paper deals with the notion and phenomenon of emotional economy as a factor in successful management of relationships in the organization. The aim of the paper is to point out the importance of the influence of spiritual and emotional intelligence in interpersonal relations, as well as to present possible strategies for their management. Spiritual intelligence provides personal security and optimal effectiveness, building functional relationships among people, understanding and accepting change and resolving conflicts. Emotional intelligence is considered a key to business success. It is assumed that emotional and spiritual intelligence has a very significant impact on the creation of the competitive advantage of the organization, and that they are responsible for creating added value and building an organization's intellectual capabilities.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117351688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nikola Pavlović, Marko Šarac, S. Adamovic, Miloš Mravik
{"title":"Enchantment of Magento CMS Security","authors":"Nikola Pavlović, Marko Šarac, S. Adamovic, Miloš Mravik","doi":"10.15308/Sinteza-2019-223-228","DOIUrl":"https://doi.org/10.15308/Sinteza-2019-223-228","url":null,"abstract":"Magento is a CMS (Content Management System) platform used to create e-commerce websites and online stores. With it, users can fully manage their online store, display specific products, provide customers with different methods of payment and delivery, as well as many other options. Magento uses an authentication system based on the knowledge of the user name and password. In addition to increasing this problem, there is no mechanism that prevents an attacker from brute forcing passwords. The proposed solution is replacing default Magento authentication with OAuth.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132885569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dejan Dašić, Miljan Vucetic, Gardelito Hew A Kee, M. Stanković
{"title":"Deep Learning Applications in Mobile Networks","authors":"Dejan Dašić, Miljan Vucetic, Gardelito Hew A Kee, M. Stanković","doi":"10.15308/SINTEZA-2019-553-560","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-553-560","url":null,"abstract":"The expected deployment of 5G networks, growing percentages of mobile networks’ market penetration levels and increasing popularity of mobile applications induce new challenges and requirements for mobile network operators. One of the ways of tackling these new challenges is the deployment of advanced machine learning techniques in hopes of handling expected traffic volumes, performing real-time analytics and managing network resources. The paper presents the aspects of mobile networking in which deep learning methods can be implemented. After presenting the basic background and modern deep learning techniques and related technologies, paper presents an overview of the current advances made in these research areas. The paper also identifies the fields within the realm of mobile networking that show particular potential for new exploration.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131518966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efekat dejstva elektromagnetnog zračenja bežičnih mreža i mobilnih telefona na zdravlje ljudi","authors":"Violeta Tomašević","doi":"10.15308/SINTEZA-2019-424-429","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-424-429","url":null,"abstract":"","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134202050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Validacija upitnika stava o bezbednosti hrane tokom putovanja - primena mrežnih platformi u istraživanjima","authors":"Milan Milošević","doi":"10.15308/Sinteza-2019-418-423","DOIUrl":"https://doi.org/10.15308/Sinteza-2019-418-423","url":null,"abstract":"Rezime: Cilj ovog rada bila je konstrukcija i validacija Upitnika stava o bezbednosti hrane tokom putovanja (SBH-P). Na uzorku od 746 ispitanika urađene su desktriptivna, korelaciona i analiza pouzdanosti i analiza varijanse. Rezultati analiza govore u prilog dobrih metrijskih karakteristika mernog instrumenta što predstavlja uslov za njegovo dalje primenjivanje u istraživanjima bezbednosti hrane tokom putovanja. Podaci su prikupljani preko Amazonove mrežne platforme MTurk, koja se pokazala kao efikasan način formiranja velikog globalnog uzorka.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133247837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mogućnosti primene informacionih tehnologija u fizičkom vaspitanju","authors":"Radovan Ilić","doi":"10.15308/SINTEZA-2019-647-654","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-647-654","url":null,"abstract":"Rezime: Koncept nastave fizičkog vaspitanja u našoj zemlji već dugo vremena se zasniva na unapređenju fizičkih sposobnosti, motoričkih veština i znanja iz oblasti fizičke i zdravstvene kulture učenika. Ipak učenici nisu zadovoljni nastavom fizičkog vaspitanja kakva im se nudi školskim planovima i programima. „Milenijalci“ su u ogromnom broju aktivni na nekoj od društvenih mreža gde mogu da se upoznaju i sa raznim vrstama vežbanja i fitnes aplikacija. U praksi fizičkog vaspitanja najčešće su bile primenjivane tehnologije u vidu monitora srčane frekvencije i pedometara, što za „milenijalce“ predstavlja zastarelu tehnologiju. U savremenoj nastavi fizičkog vaspitanja se najčešće primenjuju aplikacije na iPad-u i mobilnim telefonima kao i aktivne video igre (AVI). Više savremenih autora se slaže da će wearables ili mobilni softveri imati sve veću primenu u praksi fizičkog vaspitanja kao i neke društvene mreže kao što je Edmodo. Moderne tehnologije nikada ne mogu da budu zamena za klasičnu fizičku aktivnost i da „tehnologija sagori“ kalorije umesto učenika, ali da može biti dodatno sredstvo ili podsticaj učenicima da egzaktnije prate svoj napredak i da razviju veću posvećenost vežbanju koja bi trebala da postane njihovo celoživotno opredeljenje.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128995881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}