Popović, Brankica

Link to this page

Authority KeyName Variants
orcid::0000-0002-8276-1481
  • Popović, Brankica (35)
  • Popović, Brankica M. (1)
  • Поповић, Бранкица М. (1)
Projects

Author's Bibliography

Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks

Čabarkapa, Danijel; Popović, Brankica; Čisar, Petar; Kuk, Kristijan

(Belgrade : University of Criminal Investigation and Police Studies, 2023)

TY  - CONF
AU  - Čabarkapa, Danijel
AU  - Popović, Brankica
AU  - Čisar, Petar
AU  - Kuk, Kristijan
PY  - 2023
UR  - http://jakov.kpu.edu.rs/handle/123456789/1530
AB  - Software-Defined Networks (SDN) is an important technology that enables a new approach to how we develop and manage networks. SDN divides the data plane and control plane and supports the logical centralization of network control. However, the centralized architecture of SDN is also a potential vulnerability for various types of malicious attacks. The paper elaborates on the security aspects of virtualization as a basic concept of SDN architecture. Among the many types of attack, one of the most frequent and destructive are Distributed Denial of Service (DDoS) attacks. This paper presents an analysis of techniques to detect DDoS attacks in SDN networks. It first describes the SDN architecture and then elaborates on different detection techniques for DDoS attacks. Additionally, this paper emphasizes the types, components, and categories of detection solutions according to the techniques or methods used. The important approaches and those that can answer the complexity of detecting DDoS attacks in SDN are the detection schemes based on entropy and machine learning principles. This paper in general focuses on these two detection techniques and summarizes their benefits and drawbacks and finally provides a guideline for future research directions related to DDoS detection techniques in SDN networks.
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - International scientific conference “Archibald Reiss Days”
T1  - Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks
SP  - 17
EP  - 35
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1530
ER  - 
@conference{
author = "Čabarkapa, Danijel and Popović, Brankica and Čisar, Petar and Kuk, Kristijan",
year = "2023",
abstract = "Software-Defined Networks (SDN) is an important technology that enables a new approach to how we develop and manage networks. SDN divides the data plane and control plane and supports the logical centralization of network control. However, the centralized architecture of SDN is also a potential vulnerability for various types of malicious attacks. The paper elaborates on the security aspects of virtualization as a basic concept of SDN architecture. Among the many types of attack, one of the most frequent and destructive are Distributed Denial of Service (DDoS) attacks. This paper presents an analysis of techniques to detect DDoS attacks in SDN networks. It first describes the SDN architecture and then elaborates on different detection techniques for DDoS attacks. Additionally, this paper emphasizes the types, components, and categories of detection solutions according to the techniques or methods used. The important approaches and those that can answer the complexity of detecting DDoS attacks in SDN are the detection schemes based on entropy and machine learning principles. This paper in general focuses on these two detection techniques and summarizes their benefits and drawbacks and finally provides a guideline for future research directions related to DDoS detection techniques in SDN networks.",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "International scientific conference “Archibald Reiss Days”",
title = "Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks",
pages = "17-35",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1530"
}
Čabarkapa, D., Popović, B., Čisar, P.,& Kuk, K.. (2023). Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks. in International scientific conference “Archibald Reiss Days”
Belgrade : University of Criminal Investigation and Police Studies., 17-35.
https://hdl.handle.net/21.15107/rcub_jakov_1530
Čabarkapa D, Popović B, Čisar P, Kuk K. Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks. in International scientific conference “Archibald Reiss Days”. 2023;:17-35.
https://hdl.handle.net/21.15107/rcub_jakov_1530 .
Čabarkapa, Danijel, Popović, Brankica, Čisar, Petar, Kuk, Kristijan, "Analysis of DDoS Attack Detection Techniques for Securing Software- Defined Networks" in International scientific conference “Archibald Reiss Days” (2023):17-35,
https://hdl.handle.net/21.15107/rcub_jakov_1530 .

Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia

Jovanović, Mihailo; Stojanović, Vladica; Kuk, Kristijan; Popović, Brankica; Čisar, Petar

(Basel, Switzerland : MDPI, 2022)

TY  - JOUR
AU  - Jovanović, Mihailo
AU  - Stojanović, Vladica
AU  - Kuk, Kristijan
AU  - Popović, Brankica
AU  - Čisar, Petar
PY  - 2022
UR  - http://jakov.kpu.edu.rs/handle/123456789/1519
AB  - This paper describes one of the non-linear (and non-stationary) stochastic models, the GSB (Gaussian, or Generalized, Split-BREAK) process, which is used in the analysis of time series with pronounced and accentuated fluctuations. In the beginning, the stochastic structure of the GSB process and its important distributional and asymptotic properties are given. To that end, a method based on characteristic functions (CFs) was used. Various procedures for the estimation of model parameters, asymptotic properties, and numerical simulations of the obtained estimators are also investigated. Finally, as an illustration of the practical application of the GSB process, an analysis is presented of the dynamics and stochastic distribution of the infected and immunized population in relation to the disease COVID-19 in the territory of the Republic of Serbia.
PB  - Basel, Switzerland : MDPI
T2  - Mathematics
T1  - Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia
VL  - 10
IS  - 20
SP  - 3849
DO  - 10.3390/math10203849
ER  - 
@article{
author = "Jovanović, Mihailo and Stojanović, Vladica and Kuk, Kristijan and Popović, Brankica and Čisar, Petar",
year = "2022",
abstract = "This paper describes one of the non-linear (and non-stationary) stochastic models, the GSB (Gaussian, or Generalized, Split-BREAK) process, which is used in the analysis of time series with pronounced and accentuated fluctuations. In the beginning, the stochastic structure of the GSB process and its important distributional and asymptotic properties are given. To that end, a method based on characteristic functions (CFs) was used. Various procedures for the estimation of model parameters, asymptotic properties, and numerical simulations of the obtained estimators are also investigated. Finally, as an illustration of the practical application of the GSB process, an analysis is presented of the dynamics and stochastic distribution of the infected and immunized population in relation to the disease COVID-19 in the territory of the Republic of Serbia.",
publisher = "Basel, Switzerland : MDPI",
journal = "Mathematics",
title = "Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia",
volume = "10",
number = "20",
pages = "3849",
doi = "10.3390/math10203849"
}
Jovanović, M., Stojanović, V., Kuk, K., Popović, B.,& Čisar, P.. (2022). Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia. in Mathematics
Basel, Switzerland : MDPI., 10(20), 3849.
https://doi.org/10.3390/math10203849
Jovanović M, Stojanović V, Kuk K, Popović B, Čisar P. Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia. in Mathematics. 2022;10(20):3849.
doi:10.3390/math10203849 .
Jovanović, Mihailo, Stojanović, Vladica, Kuk, Kristijan, Popović, Brankica, Čisar, Petar, "Asymptotic Properties and Application of GSB Process : A Case Study of the COVID‐19 Dynamics in Serbia" in Mathematics, 10, no. 20 (2022):3849,
https://doi.org/10.3390/math10203849 . .
5

A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective

Ilić, Slaviša Ž.; Gnjatović, Milan J.; Popović, Brankica M.; Maček, Nemanja D.

(Beograd : Univerzitet odbrane = Belgrade : University of defence, 2022)

TY  - JOUR
AU  - Ilić, Slaviša Ž.
AU  - Gnjatović, Milan J.
AU  - Popović, Brankica M.
AU  - Maček, Nemanja D.
PY  - 2022
UR  - https://jakov.kpu.edu.rs/handle/123456789/1623
AB  - Introduction/purpose: This paper reports on a pilot comparative analysis of the Cuckoo and Drakvuf sandboxes. These sandboxes are selected as the subjects of the analysis because of their popularity in the professional community and their complementary approaches to analyzing malware behavior.
Methods: Both sandboxes were set up with basic configurations and confronted with the same set of malware samples. The evaluation was primarily conducted with respect to the question of to what extent a sandbox is helpful to the human analyst in malware analysis. Thus, only the information available in Web console reports was considered.
Results: Drakvuf is expected to perform better when confronted with evasive malware and so-called “file-less” malware. Although still not mature in terms of integration, customization and tools, this sandbox is considered a second generation sandbox because of its agentless design. On the other hand, the Cuckoo sandbox creates a better overall experience: it is supported through good documentation and strong professional community, better integrated with various tools, support more virtualization, operating system and sample types, and generates more informative reports. Even with a smaller capacity to prevent evasive malware, its Python 2 agent script makes it more powerful than Drakvuf.
Conclusion: To achieve the optimal open-source sandbox-based protection, it is recommended to apply both the Cuckoo and Drakvuf sandboxes. In circumstances of limited resources, applying the Cuckoo sandbox is preferable, especially if exposure to malware deploying evading techniques is not frequently expected.
AB  - Введение/цель: В данной статье представлен экспериментальный сравнительный анализ программных сред песочниц Cuckoo и Drakvuf. Эти системы были выбраны в качестве предмета анализа из-за их популярности в профессиональном сообществе и их взаимодополняющих подходов к анализу воздействия вредоносных программ.
Методы: Обе системы имеют базовые настройки и подвергаются воздействию одного и того же набора вредоносных программ. Анализ преимущественно проводился с целью выявления степени полезности песочниц для аналитика-человека при анализе вредоносных программ. Следовательно, учитывалась только та информация, которая была доступа в отчетах веб-интерфейсов наблюдаемых систем.
Результаты: Можно ожидать, что Drakvuf даст лучшие результаты при воздействии вредоносных программ, использующих методы обхода песочниц в виртуальных средах. Несмотря на то, что данная среда пока не достигла своей полной мощности относительно интеграции, настроек и доступных программных инструментов, ее все-таки можно считать представителем второго поколения изолированных систем программной среды, благодаря ее безагентной технологии. С другой стороны, песочница Cuckoo в целом более удобна для пользователей: она поддерживается хорошей документацией и сильным профессиональным сообществом, лучше интегрирована с различными программными инструментами, поддерживает больше видов виртуализации, типов операционных систем и образцов, в том числе она лучше генерирует отчеты. Несмотря на то, что у этой песочницы гораздо меньше возможностей предотвращения атак вредоносных программ в виртуальной среде, применение сценария с выявлением действий вредоносных программ делает эту песочницу более эффективной.
Выводы: Для достижения оптимальной защиты на основе песочницы с открытым исходным кодом рекомендуется применять как песочницы Cuckoo, так и Drakvuf. В условиях ограниченных ресурсов предпочтительнее применять песочницу Cuckoo, особенно если не предполагается частое воздействие вредоносных программ, использующих метод уклонения от обнаружения.
AB  - Увод/циљ: У раду се приказује упоредна пилот-анализа софтверских окружења Куку и Драквуф за изоловано извршавање програма. Ови системи одабрани су за предмет анализе због своје популарности у професионалној заједници и комплементарних приступа анализи понашања злонамерних програма.
Методе: Оба система постављена су на основна подешавања и изложена истом скупу злонамерних програма. Анализа је примарно урађена с аспекта процене степена информативности добијених извештаја о извршавању злонамерних програма за људског аналитичара. Стога су, као предмет анализе, узете у обзир само информације доступне у веб-интерфејсима посматраних система.
Резултати: Може се очекивати да ће Драквуф остварити бољи учинак када се изложи злонамерним програмима који примењују технике избегавања извршавања у виртуалним окружењима. Иако ово окружење још увек није остварило пун капацитет у смислу интегрисања, прилагођавања и доступних софтверских алата, може се сматрати представником друге генерације система за изоловано извршавање програма, због свог дизајна који искључује примену софтверског агента. С друге стране, окружење Куку ствара боље свеукупно корисничко искуство: подржано је добром документацијом и јаком професионалном заједницом, боље је интегрисано са различитим софтверским алатима, подржава више типова виртуелизације, оперативних система и типова узорака и генерише информативније извештаје. Иако поседује мањи капацитет за откривање злонамерних програма који примењују технике избегавања извршавања у виртуалним окружењима, могућност примене скрипти с дефиницијама злонамерног понашања програма чини ово окружење ефективнијим.
Закључак: Да би се постигла оптимална заштита, заснована на окружењима отвореног кода за изоловано извршавање програма, препоручује се примена оба разматрана система. У условима ограничених ресурса, примена система Куку пожељнија је, посебно ако се не очекује често излагање злонамерним програмима који примењују технике избегавања извршавања у виртуалним окружењима.
PB  - Beograd : Univerzitet odbrane =  Belgrade : University of defence
T2  - Vojnotehnički glasnik = Military Technical Courier
T1  - A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective
T1  - Упоредна пилот-анализа софтверских окружења Куку и Драквуф за изоловано извршавање програма : перспектива крајњег корисника
T1  - Экспериментальный сравнительный анализ песочниц Cuckoo и Drakvuf : взгляд конечного пользователя
VL  - 70
IS  - 2
SP  - 372
EP  - 392
DO  - 10.5937/vojtehg70-36196
ER  - 
@article{
author = "Ilić, Slaviša Ž. and Gnjatović, Milan J. and Popović, Brankica M. and Maček, Nemanja D.",
year = "2022",
abstract = "Introduction/purpose: This paper reports on a pilot comparative analysis of the Cuckoo and Drakvuf sandboxes. These sandboxes are selected as the subjects of the analysis because of their popularity in the professional community and their complementary approaches to analyzing malware behavior.
Methods: Both sandboxes were set up with basic configurations and confronted with the same set of malware samples. The evaluation was primarily conducted with respect to the question of to what extent a sandbox is helpful to the human analyst in malware analysis. Thus, only the information available in Web console reports was considered.
Results: Drakvuf is expected to perform better when confronted with evasive malware and so-called “file-less” malware. Although still not mature in terms of integration, customization and tools, this sandbox is considered a second generation sandbox because of its agentless design. On the other hand, the Cuckoo sandbox creates a better overall experience: it is supported through good documentation and strong professional community, better integrated with various tools, support more virtualization, operating system and sample types, and generates more informative reports. Even with a smaller capacity to prevent evasive malware, its Python 2 agent script makes it more powerful than Drakvuf.
Conclusion: To achieve the optimal open-source sandbox-based protection, it is recommended to apply both the Cuckoo and Drakvuf sandboxes. In circumstances of limited resources, applying the Cuckoo sandbox is preferable, especially if exposure to malware deploying evading techniques is not frequently expected., Введение/цель: В данной статье представлен экспериментальный сравнительный анализ программных сред песочниц Cuckoo и Drakvuf. Эти системы были выбраны в качестве предмета анализа из-за их популярности в профессиональном сообществе и их взаимодополняющих подходов к анализу воздействия вредоносных программ.
Методы: Обе системы имеют базовые настройки и подвергаются воздействию одного и того же набора вредоносных программ. Анализ преимущественно проводился с целью выявления степени полезности песочниц для аналитика-человека при анализе вредоносных программ. Следовательно, учитывалась только та информация, которая была доступа в отчетах веб-интерфейсов наблюдаемых систем.
Результаты: Можно ожидать, что Drakvuf даст лучшие результаты при воздействии вредоносных программ, использующих методы обхода песочниц в виртуальных средах. Несмотря на то, что данная среда пока не достигла своей полной мощности относительно интеграции, настроек и доступных программных инструментов, ее все-таки можно считать представителем второго поколения изолированных систем программной среды, благодаря ее безагентной технологии. С другой стороны, песочница Cuckoo в целом более удобна для пользователей: она поддерживается хорошей документацией и сильным профессиональным сообществом, лучше интегрирована с различными программными инструментами, поддерживает больше видов виртуализации, типов операционных систем и образцов, в том числе она лучше генерирует отчеты. Несмотря на то, что у этой песочницы гораздо меньше возможностей предотвращения атак вредоносных программ в виртуальной среде, применение сценария с выявлением действий вредоносных программ делает эту песочницу более эффективной.
Выводы: Для достижения оптимальной защиты на основе песочницы с открытым исходным кодом рекомендуется применять как песочницы Cuckoo, так и Drakvuf. В условиях ограниченных ресурсов предпочтительнее применять песочницу Cuckoo, особенно если не предполагается частое воздействие вредоносных программ, использующих метод уклонения от обнаружения., Увод/циљ: У раду се приказује упоредна пилот-анализа софтверских окружења Куку и Драквуф за изоловано извршавање програма. Ови системи одабрани су за предмет анализе због своје популарности у професионалној заједници и комплементарних приступа анализи понашања злонамерних програма.
Методе: Оба система постављена су на основна подешавања и изложена истом скупу злонамерних програма. Анализа је примарно урађена с аспекта процене степена информативности добијених извештаја о извршавању злонамерних програма за људског аналитичара. Стога су, као предмет анализе, узете у обзир само информације доступне у веб-интерфејсима посматраних система.
Резултати: Може се очекивати да ће Драквуф остварити бољи учинак када се изложи злонамерним програмима који примењују технике избегавања извршавања у виртуалним окружењима. Иако ово окружење још увек није остварило пун капацитет у смислу интегрисања, прилагођавања и доступних софтверских алата, може се сматрати представником друге генерације система за изоловано извршавање програма, због свог дизајна који искључује примену софтверског агента. С друге стране, окружење Куку ствара боље свеукупно корисничко искуство: подржано је добром документацијом и јаком професионалном заједницом, боље је интегрисано са различитим софтверским алатима, подржава више типова виртуелизације, оперативних система и типова узорака и генерише информативније извештаје. Иако поседује мањи капацитет за откривање злонамерних програма који примењују технике избегавања извршавања у виртуалним окружењима, могућност примене скрипти с дефиницијама злонамерног понашања програма чини ово окружење ефективнијим.
Закључак: Да би се постигла оптимална заштита, заснована на окружењима отвореног кода за изоловано извршавање програма, препоручује се примена оба разматрана система. У условима ограничених ресурса, примена система Куку пожељнија је, посебно ако се не очекује често излагање злонамерним програмима који примењују технике избегавања извршавања у виртуалним окружењима.",
publisher = "Beograd : Univerzitet odbrane =  Belgrade : University of defence",
journal = "Vojnotehnički glasnik = Military Technical Courier",
title = "A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective, Упоредна пилот-анализа софтверских окружења Куку и Драквуф за изоловано извршавање програма : перспектива крајњег корисника, Экспериментальный сравнительный анализ песочниц Cuckoo и Drakvuf : взгляд конечного пользователя",
volume = "70",
number = "2",
pages = "372-392",
doi = "10.5937/vojtehg70-36196"
}
Ilić, S. Ž., Gnjatović, M. J., Popović, B. M.,& Maček, N. D.. (2022). A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective. in Vojnotehnički glasnik = Military Technical Courier
Beograd : Univerzitet odbrane =  Belgrade : University of defence., 70(2), 372-392.
https://doi.org/10.5937/vojtehg70-36196
Ilić SŽ, Gnjatović MJ, Popović BM, Maček ND. A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective. in Vojnotehnički glasnik = Military Technical Courier. 2022;70(2):372-392.
doi:10.5937/vojtehg70-36196 .
Ilić, Slaviša Ž., Gnjatović, Milan J., Popović, Brankica M., Maček, Nemanja D., "A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective" in Vojnotehnički glasnik = Military Technical Courier, 70, no. 2 (2022):372-392,
https://doi.org/10.5937/vojtehg70-36196 . .
1

Application of Artificial Immune Networks in Continuous Function Optimizations

Čisar, Petar; Maravić Čisar, Sanja; Popović, Brankica; Kuk, Kristijan; Vuković, Igor

(Budapest : Óbuda University, 2022)

TY  - JOUR
AU  - Čisar, Petar
AU  - Maravić Čisar, Sanja
AU  - Popović, Brankica
AU  - Kuk, Kristijan
AU  - Vuković, Igor
PY  - 2022
UR  - http://jakov.kpu.edu.rs/handle/123456789/1446
AB  - This paper deals with the application of artificial immune networks in continuous
function optimizations. The performance of the immunological algorithms is analyzed using
the Optimization Algorithm Toolkit. It is shown that the CLIGA algorithm has, by far, the
fastest convergence and the best score - in terms of the number of required iterations, for the
analyzed continuous function. Also, based on the test results, it was concluded, that the lowest
total number of iterations for the defined run time was achieved with the opt-IA algorithm,
followed by the CLONALG and CLIGA algorithms.
PB  - Budapest : Óbuda University
T2  - Acta Polytechnica Hungarica
T1  - Application of Artificial Immune Networks in Continuous Function Optimizations
VL  - 19
IS  - 7
SP  - 153
EP  - 164
DO  - 10.12700/APH.19.7.2022.7.8
ER  - 
@article{
author = "Čisar, Petar and Maravić Čisar, Sanja and Popović, Brankica and Kuk, Kristijan and Vuković, Igor",
year = "2022",
abstract = "This paper deals with the application of artificial immune networks in continuous
function optimizations. The performance of the immunological algorithms is analyzed using
the Optimization Algorithm Toolkit. It is shown that the CLIGA algorithm has, by far, the
fastest convergence and the best score - in terms of the number of required iterations, for the
analyzed continuous function. Also, based on the test results, it was concluded, that the lowest
total number of iterations for the defined run time was achieved with the opt-IA algorithm,
followed by the CLONALG and CLIGA algorithms.",
publisher = "Budapest : Óbuda University",
journal = "Acta Polytechnica Hungarica",
title = "Application of Artificial Immune Networks in Continuous Function Optimizations",
volume = "19",
number = "7",
pages = "153-164",
doi = "10.12700/APH.19.7.2022.7.8"
}
Čisar, P., Maravić Čisar, S., Popović, B., Kuk, K.,& Vuković, I.. (2022). Application of Artificial Immune Networks in Continuous Function Optimizations. in Acta Polytechnica Hungarica
Budapest : Óbuda University., 19(7), 153-164.
https://doi.org/10.12700/APH.19.7.2022.7.8
Čisar P, Maravić Čisar S, Popović B, Kuk K, Vuković I. Application of Artificial Immune Networks in Continuous Function Optimizations. in Acta Polytechnica Hungarica. 2022;19(7):153-164.
doi:10.12700/APH.19.7.2022.7.8 .
Čisar, Petar, Maravić Čisar, Sanja, Popović, Brankica, Kuk, Kristijan, Vuković, Igor, "Application of Artificial Immune Networks in Continuous Function Optimizations" in Acta Polytechnica Hungarica, 19, no. 7 (2022):153-164,
https://doi.org/10.12700/APH.19.7.2022.7.8 . .
1
2

Multi-Agent System Observer: Intelligent Support for Engaged E-Learning

Vuković, Igor; Kuk, Kristijan; Čisar, Petar; Banđur, Miloš; Banđur, Đoko; Milić, Nenad; Popović, Brankica

(Basel : MDPI, 2021)

TY  - JOUR
AU  - Vuković, Igor
AU  - Kuk, Kristijan
AU  - Čisar, Petar
AU  - Banđur, Miloš
AU  - Banđur, Đoko
AU  - Milić, Nenad
AU  - Popović, Brankica
PY  - 2021
UR  - http://jakov.kpu.edu.rs/handle/123456789/1531
AB  - Moodle is a widely deployed distance learning platform that provides numerous opportunities to enhance the learning process. Moodle’s importance in maintaining the continuity of education in states of emergency and other circumstances has been particularly demonstrated in the context of the COVID-19 virus’ rapid spread. However, there is a problem with personalizing the learning and monitoring of students’ work. There is room for upgrading the system by applying data mining and different machine-learning methods. The multi-agent Observer system proposed in our paper supports students engaged in learning by monitoring their work and making suggestions based on the prediction of their final course success, using indicators of engagement and machine-learning algorithms. A novelty is that Observer collects data independently of the Moodle database, autonomously creates a training set, and learns from gathered data. Since the data are anonymized, researchers and lecturers can freely use them for purposes broader than that specified for Observer. The paper shows how the methodology, technologies, and techniques used in Observer provide an autonomous system of personalized assistance for students within Moodle platforms.
PB  - Basel : MDPI
T2  - Electronics
T1  - Multi-Agent System Observer: Intelligent Support for Engaged E-Learning
VL  - 10
IS  - 12
SP  - 1370
DO  - 10.3390/electronics10121370
ER  - 
@article{
author = "Vuković, Igor and Kuk, Kristijan and Čisar, Petar and Banđur, Miloš and Banđur, Đoko and Milić, Nenad and Popović, Brankica",
year = "2021",
abstract = "Moodle is a widely deployed distance learning platform that provides numerous opportunities to enhance the learning process. Moodle’s importance in maintaining the continuity of education in states of emergency and other circumstances has been particularly demonstrated in the context of the COVID-19 virus’ rapid spread. However, there is a problem with personalizing the learning and monitoring of students’ work. There is room for upgrading the system by applying data mining and different machine-learning methods. The multi-agent Observer system proposed in our paper supports students engaged in learning by monitoring their work and making suggestions based on the prediction of their final course success, using indicators of engagement and machine-learning algorithms. A novelty is that Observer collects data independently of the Moodle database, autonomously creates a training set, and learns from gathered data. Since the data are anonymized, researchers and lecturers can freely use them for purposes broader than that specified for Observer. The paper shows how the methodology, technologies, and techniques used in Observer provide an autonomous system of personalized assistance for students within Moodle platforms.",
publisher = "Basel : MDPI",
journal = "Electronics",
title = "Multi-Agent System Observer: Intelligent Support for Engaged E-Learning",
volume = "10",
number = "12",
pages = "1370",
doi = "10.3390/electronics10121370"
}
Vuković, I., Kuk, K., Čisar, P., Banđur, M., Banđur, Đ., Milić, N.,& Popović, B.. (2021). Multi-Agent System Observer: Intelligent Support for Engaged E-Learning. in Electronics
Basel : MDPI., 10(12), 1370.
https://doi.org/10.3390/electronics10121370
Vuković I, Kuk K, Čisar P, Banđur M, Banđur Đ, Milić N, Popović B. Multi-Agent System Observer: Intelligent Support for Engaged E-Learning. in Electronics. 2021;10(12):1370.
doi:10.3390/electronics10121370 .
Vuković, Igor, Kuk, Kristijan, Čisar, Petar, Banđur, Miloš, Banđur, Đoko, Milić, Nenad, Popović, Brankica, "Multi-Agent System Observer: Intelligent Support for Engaged E-Learning" in Electronics, 10, no. 12 (2021):1370,
https://doi.org/10.3390/electronics10121370 . .
4

Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification

Vuković, Igor; Čisar, Petar; Kuk, Kristijan; Banđur, Miloš; Popović, Brankica

(Kaunas : Kauno Technologijos Universitetas, 2021)

TY  - JOUR
AU  - Vuković, Igor
AU  - Čisar, Petar
AU  - Kuk, Kristijan
AU  - Banđur, Miloš
AU  - Popović, Brankica
PY  - 2021
UR  - http://jakov.kpu.edu.rs/handle/123456789/1522
AB  - In a criminal investigation, along with processing forensic evidence, different investigative techniques are used to identify the perpetrator of the crime. It includes collecting and analyzing unconstrained face images, mostly with low resolution and various qualities, making identification difficult. Since police organizations have limited resources, in this paper, we propose a novel method that utilizes off-the-shelf solutions (Dlib library Histogram of Oriented Gradients-HOG face detectors and the ResNet faces feature vector extractor) to provide practical assistance in unconstrained face identification. Our experiment aimed to establish which one (if any) of the basic image enhancement techniques should be applied to increase the effectiveness. Results obtained from three publicly available databases and one created for this research (simulating police investigators’ database) showed that resizing the image (especially with a resolution lower than 150 pixels) should always precede enhancement to improve face detection accuracy. The best results in determining whether they are the same or different persons in images were obtained by applying sharpening with a high-pass filter, whereas normalization gives the highest classification scores when a single weight value is applied to data from all four databases.
PB  - Kaunas : Kauno Technologijos Universitetas
T2  - Elektronika Ir Elektrotechnika
T1  - Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification
VL  - 27
IS  - 5
SP  - 49
EP  - 58
DO  - 10.5755/j02.eie.29081
ER  - 
@article{
author = "Vuković, Igor and Čisar, Petar and Kuk, Kristijan and Banđur, Miloš and Popović, Brankica",
year = "2021",
abstract = "In a criminal investigation, along with processing forensic evidence, different investigative techniques are used to identify the perpetrator of the crime. It includes collecting and analyzing unconstrained face images, mostly with low resolution and various qualities, making identification difficult. Since police organizations have limited resources, in this paper, we propose a novel method that utilizes off-the-shelf solutions (Dlib library Histogram of Oriented Gradients-HOG face detectors and the ResNet faces feature vector extractor) to provide practical assistance in unconstrained face identification. Our experiment aimed to establish which one (if any) of the basic image enhancement techniques should be applied to increase the effectiveness. Results obtained from three publicly available databases and one created for this research (simulating police investigators’ database) showed that resizing the image (especially with a resolution lower than 150 pixels) should always precede enhancement to improve face detection accuracy. The best results in determining whether they are the same or different persons in images were obtained by applying sharpening with a high-pass filter, whereas normalization gives the highest classification scores when a single weight value is applied to data from all four databases.",
publisher = "Kaunas : Kauno Technologijos Universitetas",
journal = "Elektronika Ir Elektrotechnika",
title = "Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification",
volume = "27",
number = "5",
pages = "49-58",
doi = "10.5755/j02.eie.29081"
}
Vuković, I., Čisar, P., Kuk, K., Banđur, M.,& Popović, B.. (2021). Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification. in Elektronika Ir Elektrotechnika
Kaunas : Kauno Technologijos Universitetas., 27(5), 49-58.
https://doi.org/10.5755/j02.eie.29081
Vuković I, Čisar P, Kuk K, Banđur M, Popović B. Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification. in Elektronika Ir Elektrotechnika. 2021;27(5):49-58.
doi:10.5755/j02.eie.29081 .
Vuković, Igor, Čisar, Petar, Kuk, Kristijan, Banđur, Miloš, Popović, Brankica, "Influence of Image Enhancement Techniques on Effectiveness of Unconstrained Face Detection and Identification" in Elektronika Ir Elektrotechnika, 27, no. 5 (2021):49-58,
https://doi.org/10.5755/j02.eie.29081 . .
5

Prevalence of Overweight and Obesity among Students of University in Pristina/Kosovska Mitrovica, according to Different Anthropometric Indices

Mitić, Nebojša; Popović, Ljiljana; Milić, Marija; Radić, Ivan; Popović, Brankica

(Tehran University of Medical Sciences (TUMS), 2021)

TY  - JOUR
AU  - Mitić, Nebojša
AU  - Popović, Ljiljana
AU  - Milić, Marija
AU  - Radić, Ivan
AU  - Popović, Brankica
PY  - 2021
UR  - http://jakov.kpu.edu.rs/handle/123456789/1447
PB  - Tehran University of Medical Sciences (TUMS)
T2  - Iranian Journal of Public Health
T1  - Prevalence of Overweight and Obesity among Students of University in Pristina/Kosovska Mitrovica, according to Different Anthropometric Indices
VL  - 50
IS  - 9
SP  - 1919
EP  - 1921
DO  - 10.18502/ijph.v50i9.7078
ER  - 
@article{
author = "Mitić, Nebojša and Popović, Ljiljana and Milić, Marija and Radić, Ivan and Popović, Brankica",
year = "2021",
publisher = "Tehran University of Medical Sciences (TUMS)",
journal = "Iranian Journal of Public Health",
title = "Prevalence of Overweight and Obesity among Students of University in Pristina/Kosovska Mitrovica, according to Different Anthropometric Indices",
volume = "50",
number = "9",
pages = "1919-1921",
doi = "10.18502/ijph.v50i9.7078"
}
Mitić, N., Popović, L., Milić, M., Radić, I.,& Popović, B.. (2021). Prevalence of Overweight and Obesity among Students of University in Pristina/Kosovska Mitrovica, according to Different Anthropometric Indices. in Iranian Journal of Public Health
Tehran University of Medical Sciences (TUMS)., 50(9), 1919-1921.
https://doi.org/10.18502/ijph.v50i9.7078
Mitić N, Popović L, Milić M, Radić I, Popović B. Prevalence of Overweight and Obesity among Students of University in Pristina/Kosovska Mitrovica, according to Different Anthropometric Indices. in Iranian Journal of Public Health. 2021;50(9):1919-1921.
doi:10.18502/ijph.v50i9.7078 .
Mitić, Nebojša, Popović, Ljiljana, Milić, Marija, Radić, Ivan, Popović, Brankica, "Prevalence of Overweight and Obesity among Students of University in Pristina/Kosovska Mitrovica, according to Different Anthropometric Indices" in Iranian Journal of Public Health, 50, no. 9 (2021):1919-1921,
https://doi.org/10.18502/ijph.v50i9.7078 . .
1

Challenges of contemporary predictive policing

Vuković, Igor; Čisar, Petar; Kuk, Kristijan; Popović, Brankica

(Belgrade : University of Criminal Investigation and Police Studies, 2021)

TY  - CONF
AU  - Vuković, Igor
AU  - Čisar, Petar
AU  - Kuk, Kristijan
AU  - Popović, Brankica
PY  - 2021
UR  - http://eskup.kpu.edu.rs/dar/issue/view/6/4
UR  - http://jakov.kpu.edu.rs/handle/123456789/1290
AB  - Big data algorithms developed for predictive policing are increasingly present in the everyday work of law enforcement. There are various applications of such technologies to pre-dict crimes, potential crime scenes, profiles of perpetrators, and more. In this way, police officers are  provided  with  appropriate  assistance  in  their  work,  increasing  their  efficiency  or  entirely  replacing them in specific tasks. Although technologically advanced, police use force and arrest, so  prediction  algorithms  can  have  significantly  different,  more  drastic  consequences  as  com-pared to those that similar technologies would produce in agriculture, industry, or health. For further development of predictive policing, it is necessary to have a clear picture of the problems it can cause. This paper discusses modern predictive policing from the perspective of challenges that negatively affect its application.
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021
T1  - Challenges of contemporary predictive policing
SP  - 513
EP  - 526
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1290
ER  - 
@conference{
author = "Vuković, Igor and Čisar, Petar and Kuk, Kristijan and Popović, Brankica",
year = "2021",
abstract = "Big data algorithms developed for predictive policing are increasingly present in the everyday work of law enforcement. There are various applications of such technologies to pre-dict crimes, potential crime scenes, profiles of perpetrators, and more. In this way, police officers are  provided  with  appropriate  assistance  in  their  work,  increasing  their  efficiency  or  entirely  replacing them in specific tasks. Although technologically advanced, police use force and arrest, so  prediction  algorithms  can  have  significantly  different,  more  drastic  consequences  as  com-pared to those that similar technologies would produce in agriculture, industry, or health. For further development of predictive policing, it is necessary to have a clear picture of the problems it can cause. This paper discusses modern predictive policing from the perspective of challenges that negatively affect its application.",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021",
title = "Challenges of contemporary predictive policing",
pages = "513-526",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1290"
}
Vuković, I., Čisar, P., Kuk, K.,& Popović, B.. (2021). Challenges of contemporary predictive policing. in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021
Belgrade : University of Criminal Investigation and Police Studies., 513-526.
https://hdl.handle.net/21.15107/rcub_jakov_1290
Vuković I, Čisar P, Kuk K, Popović B. Challenges of contemporary predictive policing. in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021. 2021;:513-526.
https://hdl.handle.net/21.15107/rcub_jakov_1290 .
Vuković, Igor, Čisar, Petar, Kuk, Kristijan, Popović, Brankica, "Challenges of contemporary predictive policing" in Thematic conference proceedings of international significance [Elektronski izvor] / International Scientific Conference "Archibald Reiss Days", Belgrade, 9-10 November 2021 (2021):513-526,
https://hdl.handle.net/21.15107/rcub_jakov_1290 .

Application of artificial intelligence in detection of DDos attacks

Vuković, Igor; Popović, Brankica; Čisar, Petar

(Belgrade : University of Criminal Investigation and Police Studies, 2020)

TY  - CONF
AU  - Vuković, Igor
AU  - Popović, Brankica
AU  - Čisar, Petar
PY  - 2020
UR  - https://jakov.kpu.edu.rs/handle/123456789/1618
AB  - Services distributed over the Internet are ranging from entertaining and informative to those whose availability must not be interrupted because it affects the quality of life, but also safety and health. Due to its importance, the global computer network is a desirable target, attacks are continually taking place, and the damage is more than considerable. Among the many types of attacks, one of the most effective, given the relationship between the damage done and the challenge to be prevented, detect and control, are DDoS attacks. This paper discusses the phases, components, categories, and types of DDoS attacks and emphasizes detection approaches. The standout approach and one that can answer the complexity of detecting DDoS attacks is the classification with artificial intelligence techniques. This work shows why artificial intelligence represents the starting point for further research in information security.
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - Thematic conference proceedings of international significance [Elektronski izvor]
T1  - Application of artificial intelligence in detection of DDos attacks
VL  - 10
SP  - 557
EP  - 566
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1618
ER  - 
@conference{
author = "Vuković, Igor and Popović, Brankica and Čisar, Petar",
year = "2020",
abstract = "Services distributed over the Internet are ranging from entertaining and informative to those whose availability must not be interrupted because it affects the quality of life, but also safety and health. Due to its importance, the global computer network is a desirable target, attacks are continually taking place, and the damage is more than considerable. Among the many types of attacks, one of the most effective, given the relationship between the damage done and the challenge to be prevented, detect and control, are DDoS attacks. This paper discusses the phases, components, categories, and types of DDoS attacks and emphasizes detection approaches. The standout approach and one that can answer the complexity of detecting DDoS attacks is the classification with artificial intelligence techniques. This work shows why artificial intelligence represents the starting point for further research in information security.",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "Thematic conference proceedings of international significance [Elektronski izvor]",
title = "Application of artificial intelligence in detection of DDos attacks",
volume = "10",
pages = "557-566",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1618"
}
Vuković, I., Popović, B.,& Čisar, P.. (2020). Application of artificial intelligence in detection of DDos attacks. in Thematic conference proceedings of international significance [Elektronski izvor]
Belgrade : University of Criminal Investigation and Police Studies., 10, 557-566.
https://hdl.handle.net/21.15107/rcub_jakov_1618
Vuković I, Popović B, Čisar P. Application of artificial intelligence in detection of DDos attacks. in Thematic conference proceedings of international significance [Elektronski izvor]. 2020;10:557-566.
https://hdl.handle.net/21.15107/rcub_jakov_1618 .
Vuković, Igor, Popović, Brankica, Čisar, Petar, "Application of artificial intelligence in detection of DDos attacks" in Thematic conference proceedings of international significance [Elektronski izvor], 10 (2020):557-566,
https://hdl.handle.net/21.15107/rcub_jakov_1618 .

Performance Analysis of an IEEE 802.15.4 Network Operating Under κ–μ Fading, Interference and AWGN

Banđur, Đoko; Jakšić, Branimir; Raičević, Anđelija; Popović, Brankica; Banđur, Miloš

(Cham : Springer, 2020)

TY  - JOUR
AU  - Banđur, Đoko
AU  - Jakšić, Branimir
AU  - Raičević, Anđelija
AU  - Popović, Brankica
AU  - Banđur, Miloš
PY  - 2020
UR  - http://jakov.kpu.edu.rs/handle/123456789/1534
AB  - IEEE 802.15.4 standard is widely used in the field of low-power, low-cost and low-bit rate communications. In this paper, we analyze performance of an IEEE 802.15.4 network operating in 2450 MHz ISM (Industry, Science and Medicine) band in the presence of κ–μ fading, interference and additive white Gaussian noise. A novel analytical expression for the chip error probability evaluation of an IEEE 802.15.4 wireless channel has been derived. Its correctness is validated by Monte Carlo simulations. Capitalizing on the derived CEP expression, the symbol error probability and the packet error probability are also evaluated for various values of the κ–μ fading channel parameters and signal-to-interference-to-noise ratios.
PB  - Cham : Springer
T2  - Iranian Journal of Science and Technology, Transactions of Electrical Engineering
T1  - Performance Analysis of an IEEE 802.15.4 Network Operating Under κ–μ Fading, Interference and AWGN
VL  - 44
IS  - 4
SP  - 1549
EP  - 1557
DO  - 10.1007/s40998-020-00329-1
ER  - 
@article{
author = "Banđur, Đoko and Jakšić, Branimir and Raičević, Anđelija and Popović, Brankica and Banđur, Miloš",
year = "2020",
abstract = "IEEE 802.15.4 standard is widely used in the field of low-power, low-cost and low-bit rate communications. In this paper, we analyze performance of an IEEE 802.15.4 network operating in 2450 MHz ISM (Industry, Science and Medicine) band in the presence of κ–μ fading, interference and additive white Gaussian noise. A novel analytical expression for the chip error probability evaluation of an IEEE 802.15.4 wireless channel has been derived. Its correctness is validated by Monte Carlo simulations. Capitalizing on the derived CEP expression, the symbol error probability and the packet error probability are also evaluated for various values of the κ–μ fading channel parameters and signal-to-interference-to-noise ratios.",
publisher = "Cham : Springer",
journal = "Iranian Journal of Science and Technology, Transactions of Electrical Engineering",
title = "Performance Analysis of an IEEE 802.15.4 Network Operating Under κ–μ Fading, Interference and AWGN",
volume = "44",
number = "4",
pages = "1549-1557",
doi = "10.1007/s40998-020-00329-1"
}
Banđur, Đ., Jakšić, B., Raičević, A., Popović, B.,& Banđur, M.. (2020). Performance Analysis of an IEEE 802.15.4 Network Operating Under κ–μ Fading, Interference and AWGN. in Iranian Journal of Science and Technology, Transactions of Electrical Engineering
Cham : Springer., 44(4), 1549-1557.
https://doi.org/10.1007/s40998-020-00329-1
Banđur Đ, Jakšić B, Raičević A, Popović B, Banđur M. Performance Analysis of an IEEE 802.15.4 Network Operating Under κ–μ Fading, Interference and AWGN. in Iranian Journal of Science and Technology, Transactions of Electrical Engineering. 2020;44(4):1549-1557.
doi:10.1007/s40998-020-00329-1 .
Banđur, Đoko, Jakšić, Branimir, Raičević, Anđelija, Popović, Brankica, Banđur, Miloš, "Performance Analysis of an IEEE 802.15.4 Network Operating Under κ–μ Fading, Interference and AWGN" in Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 44, no. 4 (2020):1549-1557,
https://doi.org/10.1007/s40998-020-00329-1 . .
2

The Influence of Data Classification Methods on Predictive Accuracy of Kernel Density Estimation Hotspot Maps

Milić, Nenad; Popović, Brankica; Mijalković, Saša; Marinković, Darko

(Zarqa University, Jordan, 2019)

TY  - JOUR
AU  - Milić, Nenad
AU  - Popović, Brankica
AU  - Mijalković, Saša
AU  - Marinković, Darko
PY  - 2019
UR  - https://jakov.kpu.edu.rs/handle/123456789/1599
AB  - When it comes to hot spot identification, spatial analysis techniques come to the fore. One of such techniques, that has gained great popularity among crime analysts, is the Kernel Density Estimation (KDE). Small variation in KDE parameters can give different outputs and hence affect predictive accuracy of hotspot map. The influence these parameters have on KDE hotspot output sparked many researches, mostly analyzing the influence of the cell size and bandwidth size. Yet, the influence of different classification methods applied to calculated cell values, including the choice of threshold value, on the KDE hotspot predictive accuracy remained neglected. The objective of this research was to assess the influence of different classification methods to KDE predictive accuracy. In each KDE computation, calculated cell values were divided into five thematic classes, using three the most common (default) classification methods provided by Environmental Systems Research Institute (ESRI) Geographical Information System (Arc GIS) (equal interval classification, quantile classification and natural breaks classification) and incremental multiples of the grid cells’ mean. Based upon calculated hit rates, predictive accuracy indices and recapture rate indices and taking into account the necessity that mapping output should satisfy some operational requirements as well as statistical rules, this research suggest that incremental mean approach with hotspot threshold of 3 and above multiples of the grid cell’s mean, should be used.
PB  - Zarqa University, Jordan
T2  - The International Arab Journal of Information Technology (IAJIT)
T1  - The Influence of Data Classification Methods on Predictive Accuracy of Kernel Density Estimation Hotspot Maps
VL  - 16
IS  - 6
SP  - 1053
EP  - 1062
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1599
ER  - 
@article{
author = "Milić, Nenad and Popović, Brankica and Mijalković, Saša and Marinković, Darko",
year = "2019",
abstract = "When it comes to hot spot identification, spatial analysis techniques come to the fore. One of such techniques, that has gained great popularity among crime analysts, is the Kernel Density Estimation (KDE). Small variation in KDE parameters can give different outputs and hence affect predictive accuracy of hotspot map. The influence these parameters have on KDE hotspot output sparked many researches, mostly analyzing the influence of the cell size and bandwidth size. Yet, the influence of different classification methods applied to calculated cell values, including the choice of threshold value, on the KDE hotspot predictive accuracy remained neglected. The objective of this research was to assess the influence of different classification methods to KDE predictive accuracy. In each KDE computation, calculated cell values were divided into five thematic classes, using three the most common (default) classification methods provided by Environmental Systems Research Institute (ESRI) Geographical Information System (Arc GIS) (equal interval classification, quantile classification and natural breaks classification) and incremental multiples of the grid cells’ mean. Based upon calculated hit rates, predictive accuracy indices and recapture rate indices and taking into account the necessity that mapping output should satisfy some operational requirements as well as statistical rules, this research suggest that incremental mean approach with hotspot threshold of 3 and above multiples of the grid cell’s mean, should be used.",
publisher = "Zarqa University, Jordan",
journal = "The International Arab Journal of Information Technology (IAJIT)",
title = "The Influence of Data Classification Methods on Predictive Accuracy of Kernel Density Estimation Hotspot Maps",
volume = "16",
number = "6",
pages = "1053-1062",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1599"
}
Milić, N., Popović, B., Mijalković, S.,& Marinković, D.. (2019). The Influence of Data Classification Methods on Predictive Accuracy of Kernel Density Estimation Hotspot Maps. in The International Arab Journal of Information Technology (IAJIT)
Zarqa University, Jordan., 16(6), 1053-1062.
https://hdl.handle.net/21.15107/rcub_jakov_1599
Milić N, Popović B, Mijalković S, Marinković D. The Influence of Data Classification Methods on Predictive Accuracy of Kernel Density Estimation Hotspot Maps. in The International Arab Journal of Information Technology (IAJIT). 2019;16(6):1053-1062.
https://hdl.handle.net/21.15107/rcub_jakov_1599 .
Milić, Nenad, Popović, Brankica, Mijalković, Saša, Marinković, Darko, "The Influence of Data Classification Methods on Predictive Accuracy of Kernel Density Estimation Hotspot Maps" in The International Arab Journal of Information Technology (IAJIT), 16, no. 6 (2019):1053-1062,
https://hdl.handle.net/21.15107/rcub_jakov_1599 .

Implementation of an electronic service “e-Criminal record” on portal e-Administration

Ilijazi, Venezija; Popović, Brankica; Kuk, Kristijan; Milić, Petar

(Belgrade : University of Criminal Investigation and Police Studies, 2019)

TY  - CONF
AU  - Ilijazi, Venezija
AU  - Popović, Brankica
AU  - Kuk, Kristijan
AU  - Milić, Petar
PY  - 2019
UR  - http://jakov.kpu.edu.rs/handle/123456789/1364
AB  - In order to exchange information more efficiently and faster, transparency in the provision of public services and simpler communication between citizens and the public sector, Web services for obtaining data and information are increasingly being used, which provide easier exchange of
information in relation to traditional “paper” systems and therefore significantly accelerate the process and save the time of citizens and legal entities.
Bearing in mind the public administration reform in the Republic of Serbia, which is primarily reflected in the utilization of the potentials offered by modern information communication technologies, benefits for citizens,business and the public sector, the Ministry of Internal Affairs (MUP) strives to digitize its administrative processes to contribute to these aspirations. In this paper a new web service “eCriminal record” was presented for obtaining data on punishment and impunity for the needs of State authorities, enterprises, other organizations or entrepreneurs, along with a reasoned request
and justified interest based on the law.
PB  - Belgrade : University of Criminal Investigation and Police Studies
C3  - Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.
T1  - Implementation of an electronic service “e-Criminal record” on portal e-Administration
SP  - 321
EP  - 335
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1364
ER  - 
@conference{
author = "Ilijazi, Venezija and Popović, Brankica and Kuk, Kristijan and Milić, Petar",
year = "2019",
abstract = "In order to exchange information more efficiently and faster, transparency in the provision of public services and simpler communication between citizens and the public sector, Web services for obtaining data and information are increasingly being used, which provide easier exchange of
information in relation to traditional “paper” systems and therefore significantly accelerate the process and save the time of citizens and legal entities.
Bearing in mind the public administration reform in the Republic of Serbia, which is primarily reflected in the utilization of the potentials offered by modern information communication technologies, benefits for citizens,business and the public sector, the Ministry of Internal Affairs (MUP) strives to digitize its administrative processes to contribute to these aspirations. In this paper a new web service “eCriminal record” was presented for obtaining data on punishment and impunity for the needs of State authorities, enterprises, other organizations or entrepreneurs, along with a reasoned request
and justified interest based on the law.",
publisher = "Belgrade : University of Criminal Investigation and Police Studies",
journal = "Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.",
title = "Implementation of an electronic service “e-Criminal record” on portal e-Administration",
pages = "321-335",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1364"
}
Ilijazi, V., Popović, B., Kuk, K.,& Milić, P.. (2019). Implementation of an electronic service “e-Criminal record” on portal e-Administration. in Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.
Belgrade : University of Criminal Investigation and Police Studies., 321-335.
https://hdl.handle.net/21.15107/rcub_jakov_1364
Ilijazi V, Popović B, Kuk K, Milić P. Implementation of an electronic service “e-Criminal record” on portal e-Administration. in Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019.. 2019;:321-335.
https://hdl.handle.net/21.15107/rcub_jakov_1364 .
Ilijazi, Venezija, Popović, Brankica, Kuk, Kristijan, Milić, Petar, "Implementation of an electronic service “e-Criminal record” on portal e-Administration" in Thematic conference proceedings of international significance. Vol. 2 / International scientific conference "Archibald Reiss Days", Belgrade, 6-7 November 2019. (2019):321-335,
https://hdl.handle.net/21.15107/rcub_jakov_1364 .

An Assessment of Police Officers’ Perception of Hotspots: What Can Be Done to Improve Officer’s Situational Awareness?

Ilijazi, Venezija; Milić, Nenad; Milidragović, Dragan; Popović, Brankica

(Basel : MDPI, 2019)

TY  - JOUR
AU  - Ilijazi, Venezija
AU  - Milić, Nenad
AU  - Milidragović, Dragan
AU  - Popović, Brankica
PY  - 2019
UR  - http://jakov.kpu.edu.rs/handle/123456789/970
AB  - The idea behind patrol activity is that police officers should be the persons best acquainted with the events and people in their patrol area. This implies that they should have access to relevant data and information (e.g., where and how to pay attention, when and how crimes are committed) in order to effectively perform their police duties. To what extent their perceptions of the places prone to crime (hotspots) are accurate and what the implications are for police efficiency if they are incorrect is an important question for law enforcement officials. This paper presents the results of a study on police practice in Serbia. The study was conducted on a sample of 54 police officers and aimed to determine the accuracy of the perception of residential burglary hotspots and to evaluate the ways police officers are informed about crimes. The results of the study have shown that the situational awareness of police officers is not at a desired level, with ineffective dissemination of relevant data and information as one of the possible reasons.
PB  - Basel : MDPI
T2  - ISPRS International Journal of Geo-Information
T1  - An Assessment of Police Officers’ Perception of Hotspots: What Can Be Done to Improve Officer’s Situational Awareness?
VL  - 8
IS  - 6
SP  - 260
DO  - 10.3390/ijgi8060260
ER  - 
@article{
author = "Ilijazi, Venezija and Milić, Nenad and Milidragović, Dragan and Popović, Brankica",
year = "2019",
abstract = "The idea behind patrol activity is that police officers should be the persons best acquainted with the events and people in their patrol area. This implies that they should have access to relevant data and information (e.g., where and how to pay attention, when and how crimes are committed) in order to effectively perform their police duties. To what extent their perceptions of the places prone to crime (hotspots) are accurate and what the implications are for police efficiency if they are incorrect is an important question for law enforcement officials. This paper presents the results of a study on police practice in Serbia. The study was conducted on a sample of 54 police officers and aimed to determine the accuracy of the perception of residential burglary hotspots and to evaluate the ways police officers are informed about crimes. The results of the study have shown that the situational awareness of police officers is not at a desired level, with ineffective dissemination of relevant data and information as one of the possible reasons.",
publisher = "Basel : MDPI",
journal = "ISPRS International Journal of Geo-Information",
title = "An Assessment of Police Officers’ Perception of Hotspots: What Can Be Done to Improve Officer’s Situational Awareness?",
volume = "8",
number = "6",
pages = "260",
doi = "10.3390/ijgi8060260"
}
Ilijazi, V., Milić, N., Milidragović, D.,& Popović, B.. (2019). An Assessment of Police Officers’ Perception of Hotspots: What Can Be Done to Improve Officer’s Situational Awareness?. in ISPRS International Journal of Geo-Information
Basel : MDPI., 8(6), 260.
https://doi.org/10.3390/ijgi8060260
Ilijazi V, Milić N, Milidragović D, Popović B. An Assessment of Police Officers’ Perception of Hotspots: What Can Be Done to Improve Officer’s Situational Awareness?. in ISPRS International Journal of Geo-Information. 2019;8(6):260.
doi:10.3390/ijgi8060260 .
Ilijazi, Venezija, Milić, Nenad, Milidragović, Dragan, Popović, Brankica, "An Assessment of Police Officers’ Perception of Hotspots: What Can Be Done to Improve Officer’s Situational Awareness?" in ISPRS International Journal of Geo-Information, 8, no. 6 (2019):260,
https://doi.org/10.3390/ijgi8060260 . .
1
12
7
12

Comprehensive forensic examination with Belkasoft evidence center

Popović, Brankica; Kuk, Kristijan; Kovačević, Ana

(Belgrade : Academy of Criminalistic and Police Studies, 2018)

TY  - CONF
AU  - Popović, Brankica
AU  - Kuk, Kristijan
AU  - Kovačević, Ana
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/921
AB  - The enhancement and proliferation of information and communication technology (ICT) has tackled every aspect of human activity: work, leisure, sport, communication, medicine, etc. All around us we can see mobile phones and other connected devices that are now ubiquitous, changing trends in consumer behaviour. Therefore, there is no surprise in fact that such technologies can play a significant role in committing or assisting a crime, since data held on digital devices can give a detailed insight into people’s lives, communications, contacts, friends, family and acquaintances. In order to help law enforcement investigation of such crimes, digital forensic is performed with the aim of collecting crime-related evidence from various digital media and analyse it. Investigators use various forensic techniques to search hidden folders, retrieve deleted data, decrypt the data or restore damaged files, etc. Obtaining evidence such as location data, photos, messages or internet searches can be beneficial, if not crucial, in assisting the police with criminal investigations. Since advances in technologies have led to an increase in the volume, variety, velocity, and veracity of data available for digital forensic analysis, without efficient techniques and tools such investigation would require a tremendous amount of effort and time. That is the reason for expansion in the market of digital forensic tools, both proprietary and free for use, that are available today. In this paper an insight of digital forensic process is given, emphasizing the role of digital forensic tools in providing digital evidence. The possibility of one particular tool, Belkasoft Evidence Center – BEC, in acquisition and analysis of digital evidence was briefly described.
PB  - Belgrade : Academy of Criminalistic and Police Studies
C3  - International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. Vol. 2
T1  - Comprehensive forensic examination with Belkasoft evidence center
SP  - 419
EP  - 433
UR  - https://hdl.handle.net/21.15107/rcub_jakov_921
ER  - 
@conference{
author = "Popović, Brankica and Kuk, Kristijan and Kovačević, Ana",
year = "2018",
abstract = "The enhancement and proliferation of information and communication technology (ICT) has tackled every aspect of human activity: work, leisure, sport, communication, medicine, etc. All around us we can see mobile phones and other connected devices that are now ubiquitous, changing trends in consumer behaviour. Therefore, there is no surprise in fact that such technologies can play a significant role in committing or assisting a crime, since data held on digital devices can give a detailed insight into people’s lives, communications, contacts, friends, family and acquaintances. In order to help law enforcement investigation of such crimes, digital forensic is performed with the aim of collecting crime-related evidence from various digital media and analyse it. Investigators use various forensic techniques to search hidden folders, retrieve deleted data, decrypt the data or restore damaged files, etc. Obtaining evidence such as location data, photos, messages or internet searches can be beneficial, if not crucial, in assisting the police with criminal investigations. Since advances in technologies have led to an increase in the volume, variety, velocity, and veracity of data available for digital forensic analysis, without efficient techniques and tools such investigation would require a tremendous amount of effort and time. That is the reason for expansion in the market of digital forensic tools, both proprietary and free for use, that are available today. In this paper an insight of digital forensic process is given, emphasizing the role of digital forensic tools in providing digital evidence. The possibility of one particular tool, Belkasoft Evidence Center – BEC, in acquisition and analysis of digital evidence was briefly described.",
publisher = "Belgrade : Academy of Criminalistic and Police Studies",
journal = "International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. Vol. 2",
title = "Comprehensive forensic examination with Belkasoft evidence center",
pages = "419-433",
url = "https://hdl.handle.net/21.15107/rcub_jakov_921"
}
Popović, B., Kuk, K.,& Kovačević, A.. (2018). Comprehensive forensic examination with Belkasoft evidence center. in International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. Vol. 2
Belgrade : Academy of Criminalistic and Police Studies., 419-433.
https://hdl.handle.net/21.15107/rcub_jakov_921
Popović B, Kuk K, Kovačević A. Comprehensive forensic examination with Belkasoft evidence center. in International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. Vol. 2. 2018;:419-433.
https://hdl.handle.net/21.15107/rcub_jakov_921 .
Popović, Brankica, Kuk, Kristijan, Kovačević, Ana, "Comprehensive forensic examination with Belkasoft evidence center" in International Scientific Conference "Archibald Reiss Days", Belgrade, 2-3 October 2018. Vol. 2 (2018):419-433,
https://hdl.handle.net/21.15107/rcub_jakov_921 .

Spatial data visualization as a tool for analytical support of police work

Milić, Nenad; Popović, Brankica; Ilijazi, Venezija; Ilijazi, E.

(2017)

TY  - CHAP
AU  - Milić, Nenad
AU  - Popović, Brankica
AU  - Ilijazi, Venezija
AU  - Ilijazi, E.
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/806
AB  - Development of the information technology during the 80s has significantly improved the way data is collected, stored and processed. As a consequence police function becomes data driven more than ever before. Crime analysis units became the new element in police organizations’ structures worldwide and analytical information became important prerequisite for effective policing. Having in mind that virtually everything police do is related to an address or location, connecting locations with people (offenders, victims, community members) and their activities is becoming a powerful tool (almost a necessity) in understanding and managing communities security problems by law enforcement agencies. For that reason, visualization of spatial data receives a significant place in crime analysis. A number of sophisticated specialized software aiming to help police in conducting effective crime analysis exists, but accessibility of geospatial data sources make it feasible for police to use Geographical Information Systems (GIS) and crime mapping as essential tools. In addition to the visualization of geospatial data, GIS technology provides analytical capacity primarily in analyzing geospatial distribution of crime incidents. Therefore, it can be utilized to discover different factors contributing to crime in order to give timely and relevant information to all levels of police management, help them to make better decisions, target resources and formulate strategies, and enhance police proactive actions against crime. The aim of this chapter is to present some of the GIS technology capabilities in the function of analytical support of police work at all levels of police organization and management. The following cases are discussed in particular: optimization of police resources utilization (resource location based on network analysis), hotspot policing, crime data dissemination through Internet (Internet crime maps), offender targeting through geographic profiling algorithm and Crime Information Warehouse (CIW) Solutions. Lastly, innovative functionalities of predictive analytic solutions are briefly described.
T2  - Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling
T1  - Spatial data visualization as a tool for analytical support of police work
SP  - 19
EP  - 52
UR  - https://hdl.handle.net/21.15107/rcub_jakov_806
ER  - 
@inbook{
author = "Milić, Nenad and Popović, Brankica and Ilijazi, Venezija and Ilijazi, E.",
year = "2017",
abstract = "Development of the information technology during the 80s has significantly improved the way data is collected, stored and processed. As a consequence police function becomes data driven more than ever before. Crime analysis units became the new element in police organizations’ structures worldwide and analytical information became important prerequisite for effective policing. Having in mind that virtually everything police do is related to an address or location, connecting locations with people (offenders, victims, community members) and their activities is becoming a powerful tool (almost a necessity) in understanding and managing communities security problems by law enforcement agencies. For that reason, visualization of spatial data receives a significant place in crime analysis. A number of sophisticated specialized software aiming to help police in conducting effective crime analysis exists, but accessibility of geospatial data sources make it feasible for police to use Geographical Information Systems (GIS) and crime mapping as essential tools. In addition to the visualization of geospatial data, GIS technology provides analytical capacity primarily in analyzing geospatial distribution of crime incidents. Therefore, it can be utilized to discover different factors contributing to crime in order to give timely and relevant information to all levels of police management, help them to make better decisions, target resources and formulate strategies, and enhance police proactive actions against crime. The aim of this chapter is to present some of the GIS technology capabilities in the function of analytical support of police work at all levels of police organization and management. The following cases are discussed in particular: optimization of police resources utilization (resource location based on network analysis), hotspot policing, crime data dissemination through Internet (Internet crime maps), offender targeting through geographic profiling algorithm and Crime Information Warehouse (CIW) Solutions. Lastly, innovative functionalities of predictive analytic solutions are briefly described.",
journal = "Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling",
booktitle = "Spatial data visualization as a tool for analytical support of police work",
pages = "19-52",
url = "https://hdl.handle.net/21.15107/rcub_jakov_806"
}
Milić, N., Popović, B., Ilijazi, V.,& Ilijazi, E.. (2017). Spatial data visualization as a tool for analytical support of police work. in Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling, 19-52.
https://hdl.handle.net/21.15107/rcub_jakov_806
Milić N, Popović B, Ilijazi V, Ilijazi E. Spatial data visualization as a tool for analytical support of police work. in Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling. 2017;:19-52.
https://hdl.handle.net/21.15107/rcub_jakov_806 .
Milić, Nenad, Popović, Brankica, Ilijazi, Venezija, Ilijazi, E., "Spatial data visualization as a tool for analytical support of police work" in Knowledge Discovery in Cyberspace: Statistical Analysis and Predictive Modeling (2017):19-52,
https://hdl.handle.net/21.15107/rcub_jakov_806 .

Police Officer Perceptions of Crime Hot Spots and the Applicability of Analytical Support of Policing

Milić, Nenad; Popović, Brankica; Marinković, Darko

(Ministry Interior Republic Slovenia, Ljubljana, 2017)

TY  - JOUR
AU  - Milić, Nenad
AU  - Popović, Brankica
AU  - Marinković, Darko
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/781
AB  - One of the basic conditions for effective police work in the local environment is the disposal of information about the events that pose a threat to the safety and security of citizens in a particular location. Without such information, necessary measures and actions will not be taken, or if they are taken, they will not take place where and when needed. Answering the question as to the extent police officers know where crimes are committed is important, not only in terms of improving work efficiency of the police organization, but it can also be a significant indicator of (low)quality analytical support provided to police officers. In this context, this paper provides results of research on current police practices of the Ministry of Interior of the Republic of Serbia, specifically to answer the question as to extent the police officers know where crime areas (hotspots) are located, and the way in which they acquire information on relevant events at their patrol areas, as well as the influence of the crime analysis unit in their everyday work. Results showed that police officers believe that they are familiar with the locations of crime hotspots, although the analysis revealed that police officers' knowledge of hot spots do not correspond with real situations. We discovered that two key factors stand out - personal lack of interest of police officers, and inadequate analytical support of their work. In order to overcome the stated problems, it is necessary to decentralize the work of the department of analytics, to implement crime mapping in police practice, as well as to create adequate organizational prerequisites for better informing police officers.
AB  - Eden izmed temeljnih pogojev za učinkovito delo uslužbencev policije v lokalnem okolju je seznanjenost z informacijami o kakršnem koli dogajanju, ki pomeni grožnjo varnosti občanov na določeni lokaciji. Brez takšnih informacij ne bo potrebnega ukrepanja in delovanja ali pa do tega ne bo prišlo tam, kjer bi bilo potrebno, in v času, ko bi bilo potrebno. Odgovor na vprašanje, koliko so policisti seznanjeni s tem, kje se dogajajo kazniva dejanja, ni pomemben le zaradi izboljšanja učinkovitosti dela policijske organizacije, temveč je lahko pomemben kazalnik (ne)kakovosti analitične podpore njihovemu delu. V povezavi s tem v prispevku predstavimo izsledke raziskave o policijski praksi Ministrstva za notranje zadeve Republike Srbije, katere namen je bil odgovoriti na vprašanje, koliko policisti vedo, kje so kriminalne lokacije (kriminalna žarišča), kako pridobivajo informacije o varnostno pomembnem dogajanju na območju, za katero so pristojni, ter o prisotnosti analitične podpore pri njihovem vsakodnevnem delu.
Po izsledkih raziskave policisti menijo, da so dobri poznavalci lokacij kriminalnih žarišč, vendar pa je analiza žarišč razkrila, da njihovo mnenje ne ustreza dejanskemu stanju. Ugotovili smo, da kot dva ključna dejavnika izstopata osebno nezanimanje policistov in pomanjkanje ustrezne analitične podpore njihovemu delu. Da bi se sedanja situacija izboljšala, je nujno treba decentralizirati delo službe za analitiko, vključiti kartiranje kriminalitete v policijsko prakso in ustvariti ustrezne organizacijske razmere za boljše obveščanje policistov.
PB  - Ministry Interior Republic Slovenia, Ljubljana
T2  - Revija za kriminalistiko in kriminologijo
T1  - Police Officer Perceptions of Crime Hot Spots and the Applicability of Analytical Support of Policing
T1  - O zaznavah kriminalnih žarišč pri policistih in koristnost analitične podpore pri delu policije
VL  - 68
IS  - 1
SP  - 15
EP  - 30
UR  - https://hdl.handle.net/21.15107/rcub_jakov_781
ER  - 
@article{
author = "Milić, Nenad and Popović, Brankica and Marinković, Darko",
year = "2017",
abstract = "One of the basic conditions for effective police work in the local environment is the disposal of information about the events that pose a threat to the safety and security of citizens in a particular location. Without such information, necessary measures and actions will not be taken, or if they are taken, they will not take place where and when needed. Answering the question as to the extent police officers know where crimes are committed is important, not only in terms of improving work efficiency of the police organization, but it can also be a significant indicator of (low)quality analytical support provided to police officers. In this context, this paper provides results of research on current police practices of the Ministry of Interior of the Republic of Serbia, specifically to answer the question as to extent the police officers know where crime areas (hotspots) are located, and the way in which they acquire information on relevant events at their patrol areas, as well as the influence of the crime analysis unit in their everyday work. Results showed that police officers believe that they are familiar with the locations of crime hotspots, although the analysis revealed that police officers' knowledge of hot spots do not correspond with real situations. We discovered that two key factors stand out - personal lack of interest of police officers, and inadequate analytical support of their work. In order to overcome the stated problems, it is necessary to decentralize the work of the department of analytics, to implement crime mapping in police practice, as well as to create adequate organizational prerequisites for better informing police officers., Eden izmed temeljnih pogojev za učinkovito delo uslužbencev policije v lokalnem okolju je seznanjenost z informacijami o kakršnem koli dogajanju, ki pomeni grožnjo varnosti občanov na določeni lokaciji. Brez takšnih informacij ne bo potrebnega ukrepanja in delovanja ali pa do tega ne bo prišlo tam, kjer bi bilo potrebno, in v času, ko bi bilo potrebno. Odgovor na vprašanje, koliko so policisti seznanjeni s tem, kje se dogajajo kazniva dejanja, ni pomemben le zaradi izboljšanja učinkovitosti dela policijske organizacije, temveč je lahko pomemben kazalnik (ne)kakovosti analitične podpore njihovemu delu. V povezavi s tem v prispevku predstavimo izsledke raziskave o policijski praksi Ministrstva za notranje zadeve Republike Srbije, katere namen je bil odgovoriti na vprašanje, koliko policisti vedo, kje so kriminalne lokacije (kriminalna žarišča), kako pridobivajo informacije o varnostno pomembnem dogajanju na območju, za katero so pristojni, ter o prisotnosti analitične podpore pri njihovem vsakodnevnem delu.
Po izsledkih raziskave policisti menijo, da so dobri poznavalci lokacij kriminalnih žarišč, vendar pa je analiza žarišč razkrila, da njihovo mnenje ne ustreza dejanskemu stanju. Ugotovili smo, da kot dva ključna dejavnika izstopata osebno nezanimanje policistov in pomanjkanje ustrezne analitične podpore njihovemu delu. Da bi se sedanja situacija izboljšala, je nujno treba decentralizirati delo službe za analitiko, vključiti kartiranje kriminalitete v policijsko prakso in ustvariti ustrezne organizacijske razmere za boljše obveščanje policistov.",
publisher = "Ministry Interior Republic Slovenia, Ljubljana",
journal = "Revija za kriminalistiko in kriminologijo",
title = "Police Officer Perceptions of Crime Hot Spots and the Applicability of Analytical Support of Policing, O zaznavah kriminalnih žarišč pri policistih in koristnost analitične podpore pri delu policije",
volume = "68",
number = "1",
pages = "15-30",
url = "https://hdl.handle.net/21.15107/rcub_jakov_781"
}
Milić, N., Popović, B.,& Marinković, D.. (2017). Police Officer Perceptions of Crime Hot Spots and the Applicability of Analytical Support of Policing. in Revija za kriminalistiko in kriminologijo
Ministry Interior Republic Slovenia, Ljubljana., 68(1), 15-30.
https://hdl.handle.net/21.15107/rcub_jakov_781
Milić N, Popović B, Marinković D. Police Officer Perceptions of Crime Hot Spots and the Applicability of Analytical Support of Policing. in Revija za kriminalistiko in kriminologijo. 2017;68(1):15-30.
https://hdl.handle.net/21.15107/rcub_jakov_781 .
Milić, Nenad, Popović, Brankica, Marinković, Darko, "Police Officer Perceptions of Crime Hot Spots and the Applicability of Analytical Support of Policing" in Revija za kriminalistiko in kriminologijo, 68, no. 1 (2017):15-30,
https://hdl.handle.net/21.15107/rcub_jakov_781 .
1
1

The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment

Kuk, Kristijan; Milentijević, Ivan Z.; Ranđelović, Dragan; Popović, Brankica; Čisar, Petar

(Budapest Tech, Budapest, 2017)

TY  - JOUR
AU  - Kuk, Kristijan
AU  - Milentijević, Ivan Z.
AU  - Ranđelović, Dragan
AU  - Popović, Brankica
AU  - Čisar, Petar
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/756
AB  - A bot is one of the main elements of all computer video games, frequently used for the creation of various opponent characters within a game. Opponent modeling is the problem of predicting the agent actions in a gaming environment. This paper proposes and describes the implementation of a bot as a personal opponent in a small educational game. In order to increase the efficiency when using such a small educational application/module, artificial intelligence was added in the form of a bot competing with the students. Pedagogical elements of the intelligent learning system are introduced through the pedagogical model and the student model. This paper demonstrates the use of the student model to present the player model built by the experience of a human teacher, with true/false questions incorporated with the bot strategy into the opponent model. The authors use the Monte Carlo approach in this implementation, known as artificial intelligence technique and a best-first search method used in most video games, but to the best of their knowledge, it has not been used for prediction in educational games based on bot strategy. The results highlight that the Monte Carlo approach presented via the BFTree classifier provides the best classification accuracy compared with other predictive models based on data mining classifiers. It was shown that the training data from the human player can help in creating a bot strategy for a personalized game-based learning system. The Help option can be used for the assessment of the students' current knowledge by counting the number of Help option accesses, the player relies on Help as a 'source of knowledge' needed to complete the game task successfully. The obtained results show that the bot (personal opponent) stimulated players to replay the game multiple times, which may contribute to the increase of the students' knowledge.
PB  - Budapest Tech, Budapest
T2  - Acta polytechnica hungarica
T1  - The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment
VL  - 14
IS  - 4
SP  - 121
EP  - 139
DO  - 10.12700/APH.14.4.2017.4.7
ER  - 
@article{
author = "Kuk, Kristijan and Milentijević, Ivan Z. and Ranđelović, Dragan and Popović, Brankica and Čisar, Petar",
year = "2017",
abstract = "A bot is one of the main elements of all computer video games, frequently used for the creation of various opponent characters within a game. Opponent modeling is the problem of predicting the agent actions in a gaming environment. This paper proposes and describes the implementation of a bot as a personal opponent in a small educational game. In order to increase the efficiency when using such a small educational application/module, artificial intelligence was added in the form of a bot competing with the students. Pedagogical elements of the intelligent learning system are introduced through the pedagogical model and the student model. This paper demonstrates the use of the student model to present the player model built by the experience of a human teacher, with true/false questions incorporated with the bot strategy into the opponent model. The authors use the Monte Carlo approach in this implementation, known as artificial intelligence technique and a best-first search method used in most video games, but to the best of their knowledge, it has not been used for prediction in educational games based on bot strategy. The results highlight that the Monte Carlo approach presented via the BFTree classifier provides the best classification accuracy compared with other predictive models based on data mining classifiers. It was shown that the training data from the human player can help in creating a bot strategy for a personalized game-based learning system. The Help option can be used for the assessment of the students' current knowledge by counting the number of Help option accesses, the player relies on Help as a 'source of knowledge' needed to complete the game task successfully. The obtained results show that the bot (personal opponent) stimulated players to replay the game multiple times, which may contribute to the increase of the students' knowledge.",
publisher = "Budapest Tech, Budapest",
journal = "Acta polytechnica hungarica",
title = "The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment",
volume = "14",
number = "4",
pages = "121-139",
doi = "10.12700/APH.14.4.2017.4.7"
}
Kuk, K., Milentijević, I. Z., Ranđelović, D., Popović, B.,& Čisar, P.. (2017). The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment. in Acta polytechnica hungarica
Budapest Tech, Budapest., 14(4), 121-139.
https://doi.org/10.12700/APH.14.4.2017.4.7
Kuk K, Milentijević IZ, Ranđelović D, Popović B, Čisar P. The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment. in Acta polytechnica hungarica. 2017;14(4):121-139.
doi:10.12700/APH.14.4.2017.4.7 .
Kuk, Kristijan, Milentijević, Ivan Z., Ranđelović, Dragan, Popović, Brankica, Čisar, Petar, "The Design of the Personal Enemy - MIMLeBot as an Intelligent Agent in a Game-based Learning Environment" in Acta polytechnica hungarica, 14, no. 4 (2017):121-139,
https://doi.org/10.12700/APH.14.4.2017.4.7 . .
4
2
5

Influence of Vitamin C Supplementation on Oxidative Stress and Neutrophil Inflammatory Response in Acute and Regular Exercise

Popović, Ljiljana M.; Mitić, Nebojša R.; Mirić, Dijana; Bisevac, Boban; Mirić, Mirjana; Popović, Brankica

(Hindawi Limited, 2015)

TY  - JOUR
AU  - Popović, Ljiljana M.
AU  - Mitić, Nebojša R.
AU  - Mirić, Dijana
AU  - Bisevac, Boban
AU  - Mirić, Mirjana
AU  - Popović, Brankica
PY  - 2015
UR  - http://jakov.kpu.edu.rs/handle/123456789/666
AB  - Exercise induces a multitude of physiological and biochemical changes in blood affecting its redox status. Tissue damage resulting fromexercise induces activation of inflammatory cells followed by the increased activity ofmyeloperoxidase (MPO) in circulation. Vitamin C readily scavenges free radicals and may thereby prevent oxidative damage of important biological macromolecules. The aimof this study was to examine the effect of vitamin C supplementation on oxidative stress and neutrophil inflammatory response induced by acute and regular exercise. Experiment was conducted on acute exercise group (performing Bruce Treadmill Protocol (BTP)) and regular training group. Markers of lipid peroxidation, malondialdehyde (MDA), MPO activity, and vitamin C status were estimated at rest and after BTP (acute exercise group) and before and after vitamin C supplementation in both groups. Our results showed increased postexercise Asc in serum independently of vitamin supplementation. They also showed that vitamin C can significantly decrease postexercise MDA level in both experimental groups. Increased postexercise MPO activity has been found in both groups and was not affected by vitamin C supplementation. We concluded that vitamin C supplementation can suppress lipid peroxidation process during exercise but cannot affect neutrophil inflammatory response in either exercise group.
PB  - Hindawi Limited
T2  - Oxidative medicine and cellular longevity
T1  - Influence of Vitamin C Supplementation on Oxidative Stress and Neutrophil Inflammatory Response in Acute and Regular Exercise
DO  - 10.1155/2015/295497
ER  - 
@article{
author = "Popović, Ljiljana M. and Mitić, Nebojša R. and Mirić, Dijana and Bisevac, Boban and Mirić, Mirjana and Popović, Brankica",
year = "2015",
abstract = "Exercise induces a multitude of physiological and biochemical changes in blood affecting its redox status. Tissue damage resulting fromexercise induces activation of inflammatory cells followed by the increased activity ofmyeloperoxidase (MPO) in circulation. Vitamin C readily scavenges free radicals and may thereby prevent oxidative damage of important biological macromolecules. The aimof this study was to examine the effect of vitamin C supplementation on oxidative stress and neutrophil inflammatory response induced by acute and regular exercise. Experiment was conducted on acute exercise group (performing Bruce Treadmill Protocol (BTP)) and regular training group. Markers of lipid peroxidation, malondialdehyde (MDA), MPO activity, and vitamin C status were estimated at rest and after BTP (acute exercise group) and before and after vitamin C supplementation in both groups. Our results showed increased postexercise Asc in serum independently of vitamin supplementation. They also showed that vitamin C can significantly decrease postexercise MDA level in both experimental groups. Increased postexercise MPO activity has been found in both groups and was not affected by vitamin C supplementation. We concluded that vitamin C supplementation can suppress lipid peroxidation process during exercise but cannot affect neutrophil inflammatory response in either exercise group.",
publisher = "Hindawi Limited",
journal = "Oxidative medicine and cellular longevity",
title = "Influence of Vitamin C Supplementation on Oxidative Stress and Neutrophil Inflammatory Response in Acute and Regular Exercise",
doi = "10.1155/2015/295497"
}
Popović, L. M., Mitić, N. R., Mirić, D., Bisevac, B., Mirić, M.,& Popović, B.. (2015). Influence of Vitamin C Supplementation on Oxidative Stress and Neutrophil Inflammatory Response in Acute and Regular Exercise. in Oxidative medicine and cellular longevity
Hindawi Limited..
https://doi.org/10.1155/2015/295497
Popović LM, Mitić NR, Mirić D, Bisevac B, Mirić M, Popović B. Influence of Vitamin C Supplementation on Oxidative Stress and Neutrophil Inflammatory Response in Acute and Regular Exercise. in Oxidative medicine and cellular longevity. 2015;.
doi:10.1155/2015/295497 .
Popović, Ljiljana M., Mitić, Nebojša R., Mirić, Dijana, Bisevac, Boban, Mirić, Mirjana, Popović, Brankica, "Influence of Vitamin C Supplementation on Oxidative Stress and Neutrophil Inflammatory Response in Acute and Regular Exercise" in Oxidative medicine and cellular longevity (2015),
https://doi.org/10.1155/2015/295497 . .
53
32
16
31

Информациона безбедност – поглед у будућност

Поповић, Бранкица М.

(Београд : Криминалистичко полицијска академија, 2014)

TY  - CONF
AU  - Поповић, Бранкица М.
PY  - 2014
UR  - https://jakov.kpu.edu.rs/handle/123456789/1620
AB  - Динамичан развој савремених технологија (пре свeга информационо-комуникационих – ИКТ), драматично мења начин на који живимо, при чему су бенефити њиховог коришћења препознати као основа за функционисање модерног друштва. Никада није било лакше да се потребне информације пронађу и да им се приступи са било ког места у било које време, што значајно олакашава свакодневне активности, али са друге стране, и значајно повећава претњу информационој безбедности. Тако је данас разматрање проблема информационе безбедности нераскидиво повезано са питањима сигурности рачунарских система и мрежа. То је потенцирано новим трендовима развоја и имплементације ИКТ као што су cloud computing, обрада великих података (big data processing) и Интернет ствари (IoT – Internet of Things). Истовремено, интеграција података добијених од друштвених и сензорских мрежа са биометријским подацима и традиционалним техникама надзора омогућава готово неограничену моћ скривеног праћења и надгледања, што је опет потенцијални напад на приватност појединца. Све наведено указује да је, у светлу примене модерних технологија, потребна ревизија традиционалне стратегије и приступа информационој безбедности. Циљ овог рада је да укаже на отворена питања информационе безбедности приликом развијања и имплементације модерних ИКТ са посебним нагласком на питања приватности.
AB  - The rapid development of modern technologies (primarily information and communication technology- ICT), have been changing dramatically the way we live, thereby recognizing the benefits of their use as a basis for the functioning of modern society. It’s never been easier to find and access relevant information from anywhere at any time, making everyday activities much easier, but on the other hand significantly increasing the threats to information security. Today, addressing the problem of information security is inseparable with issues such as computer systems security, network security and application security. It is emphasized with the new trends of development and implementation of ICT such as cloud computing, big data processing and Internet of Things (IoT). IoT paradigm in which every physical object is mapped as one (or more) cyber entities with the possibility of mutual (smart) interaction and automated data exchange (even without the permission of the subject), introduces new challenges in the field of network and application security with an emphasis on ethical and legal issues related to the issues of information security and privacy protection. This issue is particularly pronounced in the case of large-scale data analysis (data mining, big data analytics) and the processing of information obtained from sensor networks and other distributed sources of data (including social media) that allow automated identification, tracking, monitoring and profiling of individual. By collecting and analyzing all the available data of the individual, targeted/individualized services are enabled (or denial of the same as well). They are increasingly being used not only by companies in order to increase their profits, but also by government agencies, above all security services, which makes it an controversial issue. By integrating the data from the social and sensor networks a ‘higher form of collective awareness’ is obtained, where the search technology, data mining and visualization allow trends to be detected and events anticipated. At the same time fusion of social networks data with biometric data and traditional surveillance techniques allows almost unlimited power of secret tracking and monitoring, which is again a potential invasion of privacy. On the other hand, cloud computing as a challenge recognizes the accumulation of data with insufficient guarantee of access control by authorized entities. There is also a growing outscoring of the company’s business operations, which includes a large number of business partners, external suppliers and independent professionals who all have access to classified information. All of the above suggests that a revision of the traditional strategies and approaches to information security is needed. The aim of this paper is to point out some of the challenges and open issues where no adequate answer exist, and that society has to take seriously before (non-selective) employing of modern technologies make pointless every effort of professionals to ensure information security and protect the privacy in modern society.
PB  - Београд : Криминалистичко полицијска академија
C3  - Структура и функционисање полицијске организације : традиција, стање и перспективе, Tематски зборник радова. 3
T1  - Информациона безбедност – поглед у будућност
T1  - Information security – look to the future
SP  - 1
EP  - 14
UR  - https://hdl.handle.net/21.15107/rcub_jakov_1620
ER  - 
@conference{
author = "Поповић, Бранкица М.",
year = "2014",
abstract = "Динамичан развој савремених технологија (пре свeга информационо-комуникационих – ИКТ), драматично мења начин на који живимо, при чему су бенефити њиховог коришћења препознати као основа за функционисање модерног друштва. Никада није било лакше да се потребне информације пронађу и да им се приступи са било ког места у било које време, што значајно олакашава свакодневне активности, али са друге стране, и значајно повећава претњу информационој безбедности. Тако је данас разматрање проблема информационе безбедности нераскидиво повезано са питањима сигурности рачунарских система и мрежа. То је потенцирано новим трендовима развоја и имплементације ИКТ као што су cloud computing, обрада великих података (big data processing) и Интернет ствари (IoT – Internet of Things). Истовремено, интеграција података добијених од друштвених и сензорских мрежа са биометријским подацима и традиционалним техникама надзора омогућава готово неограничену моћ скривеног праћења и надгледања, што је опет потенцијални напад на приватност појединца. Све наведено указује да је, у светлу примене модерних технологија, потребна ревизија традиционалне стратегије и приступа информационој безбедности. Циљ овог рада је да укаже на отворена питања информационе безбедности приликом развијања и имплементације модерних ИКТ са посебним нагласком на питања приватности., The rapid development of modern technologies (primarily information and communication technology- ICT), have been changing dramatically the way we live, thereby recognizing the benefits of their use as a basis for the functioning of modern society. It’s never been easier to find and access relevant information from anywhere at any time, making everyday activities much easier, but on the other hand significantly increasing the threats to information security. Today, addressing the problem of information security is inseparable with issues such as computer systems security, network security and application security. It is emphasized with the new trends of development and implementation of ICT such as cloud computing, big data processing and Internet of Things (IoT). IoT paradigm in which every physical object is mapped as one (or more) cyber entities with the possibility of mutual (smart) interaction and automated data exchange (even without the permission of the subject), introduces new challenges in the field of network and application security with an emphasis on ethical and legal issues related to the issues of information security and privacy protection. This issue is particularly pronounced in the case of large-scale data analysis (data mining, big data analytics) and the processing of information obtained from sensor networks and other distributed sources of data (including social media) that allow automated identification, tracking, monitoring and profiling of individual. By collecting and analyzing all the available data of the individual, targeted/individualized services are enabled (or denial of the same as well). They are increasingly being used not only by companies in order to increase their profits, but also by government agencies, above all security services, which makes it an controversial issue. By integrating the data from the social and sensor networks a ‘higher form of collective awareness’ is obtained, where the search technology, data mining and visualization allow trends to be detected and events anticipated. At the same time fusion of social networks data with biometric data and traditional surveillance techniques allows almost unlimited power of secret tracking and monitoring, which is again a potential invasion of privacy. On the other hand, cloud computing as a challenge recognizes the accumulation of data with insufficient guarantee of access control by authorized entities. There is also a growing outscoring of the company’s business operations, which includes a large number of business partners, external suppliers and independent professionals who all have access to classified information. All of the above suggests that a revision of the traditional strategies and approaches to information security is needed. The aim of this paper is to point out some of the challenges and open issues where no adequate answer exist, and that society has to take seriously before (non-selective) employing of modern technologies make pointless every effort of professionals to ensure information security and protect the privacy in modern society.",
publisher = "Београд : Криминалистичко полицијска академија",
journal = "Структура и функционисање полицијске организације : традиција, стање и перспективе, Tематски зборник радова. 3",
title = "Информациона безбедност – поглед у будућност, Information security – look to the future",
pages = "1-14",
url = "https://hdl.handle.net/21.15107/rcub_jakov_1620"
}
Поповић, Б. М.. (2014). Информациона безбедност – поглед у будућност. in Структура и функционисање полицијске организације : традиција, стање и перспективе, Tематски зборник радова. 3
Београд : Криминалистичко полицијска академија., 1-14.
https://hdl.handle.net/21.15107/rcub_jakov_1620
Поповић БМ. Информациона безбедност – поглед у будућност. in Структура и функционисање полицијске организације : традиција, стање и перспективе, Tематски зборник радова. 3. 2014;:1-14.
https://hdl.handle.net/21.15107/rcub_jakov_1620 .
Поповић, Бранкица М., "Информациона безбедност – поглед у будућност" in Структура и функционисање полицијске организације : традиција, стање и перспективе, Tематски зборник радова. 3 (2014):1-14,
https://hdl.handle.net/21.15107/rcub_jakov_1620 .

Improving minutiae extraction in fingerprint images through robust enhancement

Banđur, Miloš V.; Popović, Brankica; Raičević, Anđelija M.; Ranđelović, Dragan

(IEEE, New York, 2013)

TY  - CONF
AU  - Banđur, Miloš V.
AU  - Popović, Brankica
AU  - Raičević, Anđelija M.
AU  - Ranđelović, Dragan
PY  - 2013
UR  - http://jakov.kpu.edu.rs/handle/123456789/516
AB  - The paper describes in detail the skeletonbased algorithm for the automatic extraction of fingerprint minutiae. These distinguishing characteristics are used both in the manual and automatic (AFIS-Automatic Fingerprint Identification System) fingerprint matching process for identification purpose. Proposed enhancement algorithm, utilizing multiscale orientation field estimation along with Log-Gabor filters in frequency domain, significantly improves fingerprint image quality, resulting in reduced number of falsely minutiae extracted. Results of experiments conducted on collections of fingerprint images show competitive performance of proposed algorithm.
PB  - IEEE, New York
C3  - 2013 21st telecommunications forum (TELFOR)
T1  - Improving minutiae extraction in fingerprint images through robust enhancement
SP  - 506
DO  - 10.1109/TELFOR.2013.6716277
ER  - 
@conference{
author = "Banđur, Miloš V. and Popović, Brankica and Raičević, Anđelija M. and Ranđelović, Dragan",
year = "2013",
abstract = "The paper describes in detail the skeletonbased algorithm for the automatic extraction of fingerprint minutiae. These distinguishing characteristics are used both in the manual and automatic (AFIS-Automatic Fingerprint Identification System) fingerprint matching process for identification purpose. Proposed enhancement algorithm, utilizing multiscale orientation field estimation along with Log-Gabor filters in frequency domain, significantly improves fingerprint image quality, resulting in reduced number of falsely minutiae extracted. Results of experiments conducted on collections of fingerprint images show competitive performance of proposed algorithm.",
publisher = "IEEE, New York",
journal = "2013 21st telecommunications forum (TELFOR)",
title = "Improving minutiae extraction in fingerprint images through robust enhancement",
pages = "506",
doi = "10.1109/TELFOR.2013.6716277"
}
Banđur, M. V., Popović, B., Raičević, A. M.,& Ranđelović, D.. (2013). Improving minutiae extraction in fingerprint images through robust enhancement. in 2013 21st telecommunications forum (TELFOR)
IEEE, New York., 506.
https://doi.org/10.1109/TELFOR.2013.6716277
Banđur MV, Popović B, Raičević AM, Ranđelović D. Improving minutiae extraction in fingerprint images through robust enhancement. in 2013 21st telecommunications forum (TELFOR). 2013;:506.
doi:10.1109/TELFOR.2013.6716277 .
Banđur, Miloš V., Popović, Brankica, Raičević, Anđelija M., Ranđelović, Dragan, "Improving minutiae extraction in fingerprint images through robust enhancement" in 2013 21st telecommunications forum (TELFOR) (2013):506,
https://doi.org/10.1109/TELFOR.2013.6716277 . .
3
4
4

Outage probability analysis in shadowed fading channel with multiple cochannel interferencesac

Banđur, Miloš V.; Banđur, Đoko V.; Popović, Brankica

(IEEE, New York, 2013)

TY  - CONF
AU  - Banđur, Miloš V.
AU  - Banđur, Đoko V.
AU  - Popović, Brankica
PY  - 2013
UR  - http://jakov.kpu.edu.rs/handle/123456789/502
AB  - In wireless communication systems received signal may suffer from the both multipath fading (fading) and shadowing. In this paper, ascertaining on the suitability of the Weibull distribution to model fading channel and by utilizing the fact that the gamma distribution is more convenient for manipulation than the lognormal distribution, shadowed fading channel is modeled as the Weibull-gamma. The closed-form expressions for the probability density function (PDF) and cumulative distribution function (CDF) of the received signal are derived in terms of Bessel's and Meijer's G-functions, respectively. The synergy between the Weibull-gamma and the Weibull-lognormal model is explored and established by calculating the outage probability (Pout) and average bit error probability (ABEP). This is followed by the analysis carried out for the both fixed and random number of gamma shadowed Nakagami-m cochannel interferences (CCIs) in interference-plus-noise and interference-limited environment. The proposed mathematical analysis is complimented by various numerical results.
PB  - IEEE, New York
C3  - 2013 21st telecommunications forum (TELFOR)
T1  - Outage probability analysis in shadowed fading channel with multiple cochannel interferencesac
SP  - 299
DO  - 10.1109/TELFOR.2013.6716230
ER  - 
@conference{
author = "Banđur, Miloš V. and Banđur, Đoko V. and Popović, Brankica",
year = "2013",
abstract = "In wireless communication systems received signal may suffer from the both multipath fading (fading) and shadowing. In this paper, ascertaining on the suitability of the Weibull distribution to model fading channel and by utilizing the fact that the gamma distribution is more convenient for manipulation than the lognormal distribution, shadowed fading channel is modeled as the Weibull-gamma. The closed-form expressions for the probability density function (PDF) and cumulative distribution function (CDF) of the received signal are derived in terms of Bessel's and Meijer's G-functions, respectively. The synergy between the Weibull-gamma and the Weibull-lognormal model is explored and established by calculating the outage probability (Pout) and average bit error probability (ABEP). This is followed by the analysis carried out for the both fixed and random number of gamma shadowed Nakagami-m cochannel interferences (CCIs) in interference-plus-noise and interference-limited environment. The proposed mathematical analysis is complimented by various numerical results.",
publisher = "IEEE, New York",
journal = "2013 21st telecommunications forum (TELFOR)",
title = "Outage probability analysis in shadowed fading channel with multiple cochannel interferencesac",
pages = "299",
doi = "10.1109/TELFOR.2013.6716230"
}
Banđur, M. V., Banđur, Đ. V.,& Popović, B.. (2013). Outage probability analysis in shadowed fading channel with multiple cochannel interferencesac. in 2013 21st telecommunications forum (TELFOR)
IEEE, New York., 299.
https://doi.org/10.1109/TELFOR.2013.6716230
Banđur MV, Banđur ĐV, Popović B. Outage probability analysis in shadowed fading channel with multiple cochannel interferencesac. in 2013 21st telecommunications forum (TELFOR). 2013;:299.
doi:10.1109/TELFOR.2013.6716230 .
Banđur, Miloš V., Banđur, Đoko V., Popović, Brankica, "Outage probability analysis in shadowed fading channel with multiple cochannel interferencesac" in 2013 21st telecommunications forum (TELFOR) (2013):299,
https://doi.org/10.1109/TELFOR.2013.6716230 . .

Different methods for fingerprint image orientation estimation

Popović, Brankica; Banđur, Miloš V.; Raičević, Anđelija M.; Ranđelović, Dragan

(IEEE, New York, 2012)

TY  - CONF
AU  - Popović, Brankica
AU  - Banđur, Miloš V.
AU  - Raičević, Anđelija M.
AU  - Ranđelović, Dragan
PY  - 2012
UR  - http://jakov.kpu.edu.rs/handle/123456789/499
AB  - Orientation field as a global feature of fingerprints is very important in automatic fingerprint identification systems (AFIS). In fact the overall performance of fingerprint recognition process largely depends on it's accurate estimation. The subject of this paper is to present different methods for fingerprint image orientation estimation, including novel one based on multiscale approach.
PB  - IEEE, New York
C3  - 2012 20th telecommunications forum (TELFOR)
T1  - Different methods for fingerprint image orientation estimation
SP  - 662
EP  - 665
DO  - 10.1109/TELFOR.2012.6419297
ER  - 
@conference{
author = "Popović, Brankica and Banđur, Miloš V. and Raičević, Anđelija M. and Ranđelović, Dragan",
year = "2012",
abstract = "Orientation field as a global feature of fingerprints is very important in automatic fingerprint identification systems (AFIS). In fact the overall performance of fingerprint recognition process largely depends on it's accurate estimation. The subject of this paper is to present different methods for fingerprint image orientation estimation, including novel one based on multiscale approach.",
publisher = "IEEE, New York",
journal = "2012 20th telecommunications forum (TELFOR)",
title = "Different methods for fingerprint image orientation estimation",
pages = "662-665",
doi = "10.1109/TELFOR.2012.6419297"
}
Popović, B., Banđur, M. V., Raičević, A. M.,& Ranđelović, D.. (2012). Different methods for fingerprint image orientation estimation. in 2012 20th telecommunications forum (TELFOR)
IEEE, New York., 662-665.
https://doi.org/10.1109/TELFOR.2012.6419297
Popović B, Banđur MV, Raičević AM, Ranđelović D. Different methods for fingerprint image orientation estimation. in 2012 20th telecommunications forum (TELFOR). 2012;:662-665.
doi:10.1109/TELFOR.2012.6419297 .
Popović, Brankica, Banđur, Miloš V., Raičević, Anđelija M., Ranđelović, Dragan, "Different methods for fingerprint image orientation estimation" in 2012 20th telecommunications forum (TELFOR) (2012):662-665,
https://doi.org/10.1109/TELFOR.2012.6419297 . .
3
2
4

Jedna prakticna realizacija multifunkcionalog antihakerskog alata

Ranđelović, Dragan; Petrović, LJiljana; Popović, Brankica

(IEEE, New York, 2012)

TY  - CONF
AU  - Ranđelović, Dragan
AU  - Petrović, LJiljana
AU  - Popović, Brankica
PY  - 2012
UR  - http://jakov.kpu.edu.rs/handle/123456789/485
AB  - The paper discusses the multi-function antihacking tools and the best combination of which would constitute a means to protect the computers systems. The idea is that the synthesis of certain groups as simple hacking tools with a tools for viewing network traffic to ensure that the one place that can supervise and protect the flow of the data on computer networks, particularly the Internet. This application is simple to use and practical because it uses free and open source tools.
PB  - IEEE, New York
C3  - 2012 20th telecommunications forum (TELFOR)
T1  - Jedna prakticna realizacija multifunkcionalog antihakerskog alata
SP  - 1508
EP  - 1511
DO  - 10.1109/TELFOR.2012.6419506
ER  - 
@conference{
author = "Ranđelović, Dragan and Petrović, LJiljana and Popović, Brankica",
year = "2012",
abstract = "The paper discusses the multi-function antihacking tools and the best combination of which would constitute a means to protect the computers systems. The idea is that the synthesis of certain groups as simple hacking tools with a tools for viewing network traffic to ensure that the one place that can supervise and protect the flow of the data on computer networks, particularly the Internet. This application is simple to use and practical because it uses free and open source tools.",
publisher = "IEEE, New York",
journal = "2012 20th telecommunications forum (TELFOR)",
title = "Jedna prakticna realizacija multifunkcionalog antihakerskog alata",
pages = "1508-1511",
doi = "10.1109/TELFOR.2012.6419506"
}
Ranđelović, D., Petrović, L.,& Popović, B.. (2012). Jedna prakticna realizacija multifunkcionalog antihakerskog alata. in 2012 20th telecommunications forum (TELFOR)
IEEE, New York., 1508-1511.
https://doi.org/10.1109/TELFOR.2012.6419506
Ranđelović D, Petrović L, Popović B. Jedna prakticna realizacija multifunkcionalog antihakerskog alata. in 2012 20th telecommunications forum (TELFOR). 2012;:1508-1511.
doi:10.1109/TELFOR.2012.6419506 .
Ranđelović, Dragan, Petrović, LJiljana, Popović, Brankica, "Jedna prakticna realizacija multifunkcionalog antihakerskog alata" in 2012 20th telecommunications forum (TELFOR) (2012):1508-1511,
https://doi.org/10.1109/TELFOR.2012.6419506 . .

Robust Fingerprint Enhancement by Directional Filtering in Fourier Domain

Popović, Brankica; Banđur, Miloš V.; Raičević, Anđelija M.

(Kaunas Univ Technology, Kaunas, 2011)

TY  - JOUR
AU  - Popović, Brankica
AU  - Banđur, Miloš V.
AU  - Raičević, Anđelija M.
PY  - 2011
UR  - http://jakov.kpu.edu.rs/handle/123456789/388
AB  - Reliable extraction of true minutiae in fingerprint image is critical to the performance of an automated fingerprint identification system (AFIS). In order to utilize AFIS in law enforcement agencies first step is to digitalize an archive of fingerprints obtained by ink method. For improving the quality of automatically extracted minutiae (both in number and type) enhancement is previously performed, but, nevertheless, quite a number of spurious minutiae (especially in blurry or regions containing scars and creases) are extracted. It is crucial for AFIS performance that number of extracted (and consequently saved in fingerprint template) spurious minutia is minimized to maximal extent. In order to do so, we propose directional Log-Gabor filtering in frequency domain. Results proved to be preferable for a wide range of input digitized fingerprint images
PB  - Kaunas Univ Technology, Kaunas
T2  - Elektronika ir elektrotechnika
T1  - Robust Fingerprint Enhancement by Directional Filtering in Fourier Domain
IS  - 1
SP  - 37
EP  - 40
UR  - https://hdl.handle.net/21.15107/rcub_jakov_388
ER  - 
@article{
author = "Popović, Brankica and Banđur, Miloš V. and Raičević, Anđelija M.",
year = "2011",
abstract = "Reliable extraction of true minutiae in fingerprint image is critical to the performance of an automated fingerprint identification system (AFIS). In order to utilize AFIS in law enforcement agencies first step is to digitalize an archive of fingerprints obtained by ink method. For improving the quality of automatically extracted minutiae (both in number and type) enhancement is previously performed, but, nevertheless, quite a number of spurious minutiae (especially in blurry or regions containing scars and creases) are extracted. It is crucial for AFIS performance that number of extracted (and consequently saved in fingerprint template) spurious minutia is minimized to maximal extent. In order to do so, we propose directional Log-Gabor filtering in frequency domain. Results proved to be preferable for a wide range of input digitized fingerprint images",
publisher = "Kaunas Univ Technology, Kaunas",
journal = "Elektronika ir elektrotechnika",
title = "Robust Fingerprint Enhancement by Directional Filtering in Fourier Domain",
number = "1",
pages = "37-40",
url = "https://hdl.handle.net/21.15107/rcub_jakov_388"
}
Popović, B., Banđur, M. V.,& Raičević, A. M.. (2011). Robust Fingerprint Enhancement by Directional Filtering in Fourier Domain. in Elektronika ir elektrotechnika
Kaunas Univ Technology, Kaunas.(1), 37-40.
https://hdl.handle.net/21.15107/rcub_jakov_388
Popović B, Banđur MV, Raičević AM. Robust Fingerprint Enhancement by Directional Filtering in Fourier Domain. in Elektronika ir elektrotechnika. 2011;(1):37-40.
https://hdl.handle.net/21.15107/rcub_jakov_388 .
Popović, Brankica, Banđur, Miloš V., Raičević, Anđelija M., "Robust Fingerprint Enhancement by Directional Filtering in Fourier Domain" in Elektronika ir elektrotechnika, no. 1 (2011):37-40,
https://hdl.handle.net/21.15107/rcub_jakov_388 .
1
3

Visual analytics tools and theirs application in social networks analysis

Ranđelović, Dragan; Popović, Brankica

(2011)

TY  - CONF
AU  - Ranđelović, Dragan
AU  - Popović, Brankica
PY  - 2011
UR  - http://jakov.kpu.edu.rs/handle/123456789/360
AB  - The first association on the word data for common man is a visualization of the alpha-numeric characters and various pictures in the form of a table or chart. Distinction between data, information and knowledge, is one of the primary tasks of information science. The quantity of electronic data in today's information society is steadily increased by using Internet technologies (among other things with the e-government and all it's parts-from commerce, education to public health, also with the emergence of social networks and media in all their forms). It requires visualization of the data for easier understanding and analysis which are obviously necessary. In this paper some of the commercial and non-commercial visual tools and their application in analysis of social networks are considered, with especially interest for theirs application in the field of criminology.
C3  - 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers
T1  - Visual analytics tools and theirs application in social networks analysis
SP  - 1340
EP  - 1343
DO  - 10.1109/TELFOR.2011.6143801
ER  - 
@conference{
author = "Ranđelović, Dragan and Popović, Brankica",
year = "2011",
abstract = "The first association on the word data for common man is a visualization of the alpha-numeric characters and various pictures in the form of a table or chart. Distinction between data, information and knowledge, is one of the primary tasks of information science. The quantity of electronic data in today's information society is steadily increased by using Internet technologies (among other things with the e-government and all it's parts-from commerce, education to public health, also with the emergence of social networks and media in all their forms). It requires visualization of the data for easier understanding and analysis which are obviously necessary. In this paper some of the commercial and non-commercial visual tools and their application in analysis of social networks are considered, with especially interest for theirs application in the field of criminology.",
journal = "2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers",
title = "Visual analytics tools and theirs application in social networks analysis",
pages = "1340-1343",
doi = "10.1109/TELFOR.2011.6143801"
}
Ranđelović, D.,& Popović, B.. (2011). Visual analytics tools and theirs application in social networks analysis. in 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers, 1340-1343.
https://doi.org/10.1109/TELFOR.2011.6143801
Ranđelović D, Popović B. Visual analytics tools and theirs application in social networks analysis. in 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers. 2011;:1340-1343.
doi:10.1109/TELFOR.2011.6143801 .
Ranđelović, Dragan, Popović, Brankica, "Visual analytics tools and theirs application in social networks analysis" in 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers (2011):1340-1343,
https://doi.org/10.1109/TELFOR.2011.6143801 . .
1
1