{"title":"Primena informacionih tehnologija u modernom sportu","authors":"Srđan T. Marković","doi":"10.15308/SINTEZA-2019-676-681","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-676-681","url":null,"abstract":"Rezime: Informacione tehnologije (IT) u sportu uključene su u sve segmente i to prvenstveno u rad sportista i trenera, a onda i zvaničnika i gledalaca. Sportisti i treneri IT koriste u treningu kao i na samom takmičenju. U treningu se koristi kroz kontrolu opterećenja, dijagnostiku i analizu, a na takmičenju kroz video tehnologiju, foto-finiš, Hawk-eye, gol-tehnologiju, miCoach Elite System. Tehnologija pomaže stručnjacima da podrže svoje komentare i analize za vreme i nakon igara, te da izvođači preispitaju svoju taktiku i svoje protivnike kako bi utvrdili što trebaju učiniti kako bi poboljšali i formulisali strategiju. Gledalac sportskog događaja nije više pasivan posmatrač kod kuć e ili na stadionu. Tehnologija je omoguć ila gledaocima da imaju aktivniju ulogu u događajima. Pokrivenost događaja mikro-kamerama pruža više uglova gledanja, prate pojedinačne sportiste ili sve izvođače, statističke informacije o pojedincima, utakmici i prethodnim nastupima. Interaktivni softveri aplikacije nude pristup robama, informacijama, takmičenjima, igrama i glasanju preko veza na ulaznicama i programima ili preko preuzimanja. Pomoću digitalnih medija može se pratiti širok spektar amaterskih i profesionalnih sportova na mnogo različitih načina, na telefonu, tabletu, laptopu, računaru, a društveni mediji dozvoljavaju fanovima da imaju ličnu vezu sa sportistima i klubovima.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kristina Božič, Nikola Penevski, S. Adamovic, Dejan Bulaja, Nebojša Bačanin Džakula
{"title":"Penetration Testing and Vulnerability Assessment: Introduction, Phases, Tools and Methods","authors":"Kristina Božič, Nikola Penevski, S. Adamovic, Dejan Bulaja, Nebojša Bačanin Džakula","doi":"10.15308/Sinteza-2019-229-234","DOIUrl":"https://doi.org/10.15308/Sinteza-2019-229-234","url":null,"abstract":"Penetration testing is the practice of testing a computer system, network or web application to find security vulnerabilities by using a diverse variety of tools and methods. This work is a brief overview of the phases, including reconnaissance or information gathering, scanning, vulnerability analysis, exploitation, and reporting, along with some of the basic tools and methods of penetration testing. It’s fundamental, for every penetration tester, to be familiar with these concepts in order to successfully execute a full testing process and forge good reports.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122292725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobilna aplikacija Hello Talk – nedovoljno iskorišćena mogućnost u učenju i usavršavanju stranih jezika","authors":"Tijana D. Gajić","doi":"10.15308/SINTEZA-2019-640-644","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-640-644","url":null,"abstract":"","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134493028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kriptografski radni okvir za bežične senzorske mreže","authors":"Mladen Veinović","doi":"10.15308/SINTEZA-2019-526-533","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-526-533","url":null,"abstract":"","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy and Communication Requirements for Network of E-Band Radars as Sensors","authors":"L. Dražeta, Bojan Džolić, M. Perić, M. Veinovic","doi":"10.15308/SINTEZA-2019-575-580","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-575-580","url":null,"abstract":"E-band radars EBR are very promising short distance high-resolution sensors for safety and smart city solutions. In order to achieve larger scale coverage, we have investigated possibility of gaining raw signal from multiple EBRs for purpose of centralized data processing and fusion. Based on publicly available data about EBR ranges, resolution and data formats, we have considered requirements for implementation of communication and power network for them. We have presented data for both static and dynamic scenario. In static scenario EBR positions are fixed, while in dynamic scenario some of EBRs are located on vehicles with known position obtained by GPS.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dronovi u poljoprivredi – IT podrška, zakonske regulative i prednosti upotrebe","authors":"Miloš Ilić","doi":"10.15308/SINTEZA-2019-394-400","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-394-400","url":null,"abstract":"","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"878 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133843239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Merenje parametara i testiranje performansi modela OTN mreže","authors":"Milan Krstić, Marina Jakovljević","doi":"10.15308/Sinteza-2019-511-518","DOIUrl":"https://doi.org/10.15308/Sinteza-2019-511-518","url":null,"abstract":"","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133165829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Predrag Milosav, Z. Banjac, M. Milosavljevic, T. Unkašević, Medhat Abdelrahman MohamedMostafa
{"title":"Overview and Classification of Digital Watermarking Algorithms","authors":"Predrag Milosav, Z. Banjac, M. Milosavljevic, T. Unkašević, Medhat Abdelrahman MohamedMostafa","doi":"10.15308/sinteza-2019-537-545","DOIUrl":"https://doi.org/10.15308/sinteza-2019-537-545","url":null,"abstract":"","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117045577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Ivković, M. Petrovic, Ivana Milošević, Dejan Đukić, Vladimir Maksimovic
{"title":"Inverse Filtering Method for Super-Resolution Digital Imaging","authors":"R. Ivković, M. Petrovic, Ivana Milošević, Dejan Đukić, Vladimir Maksimovic","doi":"10.15308/SINTEZA-2019-491-497","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-491-497","url":null,"abstract":"Super-resolution is a method of combining various techniques in digital image processing, in order to achieve higher resolution in certain image segments, which initially had insufficient resolution and quality. The principal idea in this work is the use of the analysis of the level of detail and of the standard deviation, which results in enhancing the resolution of the digital image, whilst maintaining the overall image quality. In the first part of this article, an experimental method for estimating the standard deviation and the level of detail in a digital image has been shown, together with the inferred facts that result from this analysis. The second part of this article uses these facts in the process of designing an inverse filter by applying the averages of pixel intensities. The proposed method has significant advantages over the heretofore used super-resolution techniques, as it achieves the enhancement of the resolution from a single image, whilst retaining the initial image potential.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130632548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Unkašević, Z. Banjac, M. Milosavljevic, Predrag Milosav, Medhat Abdelrahman MohamedMostafa
{"title":"Contribution oo the Theory and Practice of Generating RSA Algorithm Keys","authors":"T. Unkašević, Z. Banjac, M. Milosavljevic, Predrag Milosav, Medhat Abdelrahman MohamedMostafa","doi":"10.15308/SINTEZA-2019-589-594","DOIUrl":"https://doi.org/10.15308/SINTEZA-2019-589-594","url":null,"abstract":"The RSA cryptographic algorithm is widely used in data protection and electronic business. One of the most important parameter of the achieved level of security is the quality of the generated cryptographic keys with which the algorithm is applied. In this paper a few cases in which poorly generated RSA cryptographic keys caused dis-accreditation of the system are described. The recommendations and checks that must be fulfilled during generation of RSA algorithm cryptographic keys are formulated in order that keys were considered safe for implement on.","PeriodicalId":342313,"journal":{"name":"Proceedings of the International Scientific Conference - Sinteza 2019","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}