Maravić-Cisar, Sanja

Link to this page

Authority KeyName Variants
cadadc2a-f53c-4794-8bc3-8d6c84bbfc2c
  • Maravić-Cisar, Sanja (12)
Projects
No records found.

Author's Bibliography

Implementation of Software-Defined Networks Using Open-Source Environment

Čisar, Petar; Erlenvajn, Dragan; Maravić-Cisar, Sanja

(Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek, 2018)

TY  - JOUR
AU  - Čisar, Petar
AU  - Erlenvajn, Dragan
AU  - Maravić-Cisar, Sanja
PY  - 2018
UR  - http://jakov.kpu.edu.rs/handle/123456789/842
AB  - The paper gives an overview and analysis of software-defined technologies in the context of the actual problems of conventional computer networks. The virtualization process lies at the basis of software-defined network architecture. The basic concepts of software-defined networks are elaborated, as well as their implementation and configuration in cloud environment using OpenStack open-source software with Microsoft Hyper-V hypervisor. The practical part of this research showed that the implementation of a software-defined network into an existing standard network is relatively simple to realize, remaining all the time in open-source framework. All existing network functionalities were held, and it is also possible to provide additional network operations such as traffic monitoring in a completely open-source environment.
PB  - Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek
T2  - Tehnicki vjesnik - Technical gazette
T1  - Implementation of Software-Defined Networks Using Open-Source Environment
VL  - 25
SP  - 222
EP  - 230
DO  - 10.17559/TV-20160928094756
ER  - 
@article{
author = "Čisar, Petar and Erlenvajn, Dragan and Maravić-Cisar, Sanja",
year = "2018",
abstract = "The paper gives an overview and analysis of software-defined technologies in the context of the actual problems of conventional computer networks. The virtualization process lies at the basis of software-defined network architecture. The basic concepts of software-defined networks are elaborated, as well as their implementation and configuration in cloud environment using OpenStack open-source software with Microsoft Hyper-V hypervisor. The practical part of this research showed that the implementation of a software-defined network into an existing standard network is relatively simple to realize, remaining all the time in open-source framework. All existing network functionalities were held, and it is also possible to provide additional network operations such as traffic monitoring in a completely open-source environment.",
publisher = "Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek",
journal = "Tehnicki vjesnik - Technical gazette",
title = "Implementation of Software-Defined Networks Using Open-Source Environment",
volume = "25",
pages = "222-230",
doi = "10.17559/TV-20160928094756"
}
Čisar, P., Erlenvajn, D.,& Maravić-Cisar, S.. (2018). Implementation of Software-Defined Networks Using Open-Source Environment. in Tehnicki vjesnik - Technical gazette
Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek., 25, 222-230.
https://doi.org/10.17559/TV-20160928094756
Čisar P, Erlenvajn D, Maravić-Cisar S. Implementation of Software-Defined Networks Using Open-Source Environment. in Tehnicki vjesnik - Technical gazette. 2018;25:222-230.
doi:10.17559/TV-20160928094756 .
Čisar, Petar, Erlenvajn, Dragan, Maravić-Cisar, Sanja, "Implementation of Software-Defined Networks Using Open-Source Environment" in Tehnicki vjesnik - Technical gazette, 25 (2018):222-230,
https://doi.org/10.17559/TV-20160928094756 . .
3
4

Measuring team member performance in Scrum - case study

Pinter, Robert; Maravić-Cisar, Sanja; Čisar, Petar

(IEEE, New York, 2017)

TY  - CONF
AU  - Pinter, Robert
AU  - Maravić-Cisar, Sanja
AU  - Čisar, Petar
PY  - 2017
UR  - http://jakov.kpu.edu.rs/handle/123456789/749
AB  - Based upon information received from the industry, one can define the knowledge and skills that are required for an engineer aiming to work in the IT industry. In this paper the authors present a possible method by which the learning process can be made more efficient. The authors highlight some advantages of the project-oriented approach in a programming course at Subotica Tech, an institution that educates professional engineers. In that course the students are developing applications for mobile devices. This novel method is based on the inclusion of the great number of demands from the industry, which the future engineers meet upon entering this sector.
PB  - IEEE, New York
C3  - 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY)
T1  - Measuring team member performance in Scrum - case study
SP  - 309
EP  - 314
DO  - 10.1109/SISY.2017.8080573
ER  - 
@conference{
author = "Pinter, Robert and Maravić-Cisar, Sanja and Čisar, Petar",
year = "2017",
abstract = "Based upon information received from the industry, one can define the knowledge and skills that are required for an engineer aiming to work in the IT industry. In this paper the authors present a possible method by which the learning process can be made more efficient. The authors highlight some advantages of the project-oriented approach in a programming course at Subotica Tech, an institution that educates professional engineers. In that course the students are developing applications for mobile devices. This novel method is based on the inclusion of the great number of demands from the industry, which the future engineers meet upon entering this sector.",
publisher = "IEEE, New York",
journal = "2017 IEEE 15th international symposium on intelligent systems and informatics (SISY)",
title = "Measuring team member performance in Scrum - case study",
pages = "309-314",
doi = "10.1109/SISY.2017.8080573"
}
Pinter, R., Maravić-Cisar, S.,& Čisar, P.. (2017). Measuring team member performance in Scrum - case study. in 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY)
IEEE, New York., 309-314.
https://doi.org/10.1109/SISY.2017.8080573
Pinter R, Maravić-Cisar S, Čisar P. Measuring team member performance in Scrum - case study. in 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY). 2017;:309-314.
doi:10.1109/SISY.2017.8080573 .
Pinter, Robert, Maravić-Cisar, Sanja, Čisar, Petar, "Measuring team member performance in Scrum - case study" in 2017 IEEE 15th international symposium on intelligent systems and informatics (SISY) (2017):309-314,
https://doi.org/10.1109/SISY.2017.8080573 . .
10
12
13

Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests

Maravić-Cisar, Sanja; Čisar, Petar; Pinter, Robert

(Pergamon-Elsevier Science Ltd, Oxford, 2016)

TY  - JOUR
AU  - Maravić-Cisar, Sanja
AU  - Čisar, Petar
AU  - Pinter, Robert
PY  - 2016
UR  - http://jakov.kpu.edu.rs/handle/123456789/696
AB  - This paper presents and analyzes the results of the application of computer-adaptive testing in knowledge evaluation of the programming language C++. The participants of the research were college students majoring in computer engineering from a polytechnic college (Republic of Serbia) with an average age of 20. The research was conducted over a two-year period. Overall 199 students took part in this research. Two groups of students, the experimental, and the control one were observed. The students in the experimental group took the computer adaptive test and the students from the control group did the paper-and-pencil test. For the purposes of determining the effects of applying the computer adaptive test for knowledge evaluation, the adaptive test was realized in the MATLAB software package. The test consists of multiple choice questions with five possible answers. The questions for the test are divided into three clusters according to the level of difficulty (easy, medium and hard). The score is calculated from the level of difficulty. The difficult questions earn more points than the easy ones. The examinees may answer the same percentage of questions correctly, but an examinee will gain a better score assuming they correctly answered more difficult items. The results of the research show that there is a statistically significant difference between the results of the control and experimental group. The students who worked on a computer-adaptive test achieved a higher average score than the students who did the traditional test.
PB  - Pergamon-Elsevier Science Ltd, Oxford
T2  - Computers & education
T1  - Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests
SP  - 142
EP  - 160
DO  - 10.1016/j.compedu.2015.10.016
ER  - 
@article{
author = "Maravić-Cisar, Sanja and Čisar, Petar and Pinter, Robert",
year = "2016",
abstract = "This paper presents and analyzes the results of the application of computer-adaptive testing in knowledge evaluation of the programming language C++. The participants of the research were college students majoring in computer engineering from a polytechnic college (Republic of Serbia) with an average age of 20. The research was conducted over a two-year period. Overall 199 students took part in this research. Two groups of students, the experimental, and the control one were observed. The students in the experimental group took the computer adaptive test and the students from the control group did the paper-and-pencil test. For the purposes of determining the effects of applying the computer adaptive test for knowledge evaluation, the adaptive test was realized in the MATLAB software package. The test consists of multiple choice questions with five possible answers. The questions for the test are divided into three clusters according to the level of difficulty (easy, medium and hard). The score is calculated from the level of difficulty. The difficult questions earn more points than the easy ones. The examinees may answer the same percentage of questions correctly, but an examinee will gain a better score assuming they correctly answered more difficult items. The results of the research show that there is a statistically significant difference between the results of the control and experimental group. The students who worked on a computer-adaptive test achieved a higher average score than the students who did the traditional test.",
publisher = "Pergamon-Elsevier Science Ltd, Oxford",
journal = "Computers & education",
title = "Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests",
pages = "142-160",
doi = "10.1016/j.compedu.2015.10.016"
}
Maravić-Cisar, S., Čisar, P.,& Pinter, R.. (2016). Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests. in Computers & education
Pergamon-Elsevier Science Ltd, Oxford., 142-160.
https://doi.org/10.1016/j.compedu.2015.10.016
Maravić-Cisar S, Čisar P, Pinter R. Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests. in Computers & education. 2016;:142-160.
doi:10.1016/j.compedu.2015.10.016 .
Maravić-Cisar, Sanja, Čisar, Petar, Pinter, Robert, "Evaluation of knowledge in Object Oriented Programming course with computer adaptive tests" in Computers & education (2016):142-160,
https://doi.org/10.1016/j.compedu.2015.10.016 . .
19
12
20

The Framework of Runtime Application Self-Protection Technology

Čisar, Petar; Maravić-Cisar, Sanja

(IEEE, New York, 2016)

TY  - CONF
AU  - Čisar, Petar
AU  - Maravić-Cisar, Sanja
PY  - 2016
UR  - http://jakov.kpu.edu.rs/handle/123456789/690
AB  - This paper describes the basic concepts of a relatively new security approach - Runtime Application Self-Protection Technology (RASP), whose wider implementation is expected in the near future. The current focus of this technology is on the vulnerabilities of Java and. NET platforms. In addition to typification, the paper presents the advantages and disadvantages of RASP. Despite the undoubted advantages, it is not an independent and comprehensive solution to ensure the security of the software. In combination with the tried and tested conventional methods, RASP provides an efficient way to prevent malicious activities.
PB  - IEEE, New York
C3  - 2016 17th IEEE international symposium on computational intelligence and informatics (CINTI 2016)
T1  - The Framework of Runtime Application Self-Protection Technology
SP  - 81
EP  - 85
DO  - 10.1109/CINTI.2016.7846383
ER  - 
@conference{
author = "Čisar, Petar and Maravić-Cisar, Sanja",
year = "2016",
abstract = "This paper describes the basic concepts of a relatively new security approach - Runtime Application Self-Protection Technology (RASP), whose wider implementation is expected in the near future. The current focus of this technology is on the vulnerabilities of Java and. NET platforms. In addition to typification, the paper presents the advantages and disadvantages of RASP. Despite the undoubted advantages, it is not an independent and comprehensive solution to ensure the security of the software. In combination with the tried and tested conventional methods, RASP provides an efficient way to prevent malicious activities.",
publisher = "IEEE, New York",
journal = "2016 17th IEEE international symposium on computational intelligence and informatics (CINTI 2016)",
title = "The Framework of Runtime Application Self-Protection Technology",
pages = "81-85",
doi = "10.1109/CINTI.2016.7846383"
}
Čisar, P.,& Maravić-Cisar, S.. (2016). The Framework of Runtime Application Self-Protection Technology. in 2016 17th IEEE international symposium on computational intelligence and informatics (CINTI 2016)
IEEE, New York., 81-85.
https://doi.org/10.1109/CINTI.2016.7846383
Čisar P, Maravić-Cisar S. The Framework of Runtime Application Self-Protection Technology. in 2016 17th IEEE international symposium on computational intelligence and informatics (CINTI 2016). 2016;:81-85.
doi:10.1109/CINTI.2016.7846383 .
Čisar, Petar, Maravić-Cisar, Sanja, "The Framework of Runtime Application Self-Protection Technology" in 2016 17th IEEE international symposium on computational intelligence and informatics (CINTI 2016) (2016):81-85,
https://doi.org/10.1109/CINTI.2016.7846383 . .
6
10
2
14

Smartphone Application for Tracking Students' Class Attendance

Maravić-Cisar, Sanja; Pinter, Robert; Vojnić, Viktor; Tumbas, Vanja; Čisar, Petar

(IEEE, New York, 2016)

TY  - CONF
AU  - Maravić-Cisar, Sanja
AU  - Pinter, Robert
AU  - Vojnić, Viktor
AU  - Tumbas, Vanja
AU  - Čisar, Petar
PY  - 2016
UR  - http://jakov.kpu.edu.rs/handle/123456789/677
AB  - The Bologna system makes class attendance mandatory. Recording attendance is inefficient and takes up too much class time especially with larger groups of students. If a professor records student attendance manually, they have to look at student, write it down and go to the next student. If the check takes five minutes of a 45-minute class, that means the teachers lose approximately 10 percent of the class just on attendance instead spending it on teaching. The majority of students have some kind of smart device and these can be used to make an application so that students can log in their attendance. One possible solution for this is the application called Muffin. Muffin consists of a mobile application that students have on their personal mobile devices, an Arduino Uno board with Bluetooth module, and a desktop application. The basic idea is that when students want to log in their attendance, all they need to do is send some log in data to the Arduino board, which is then forwarded to the application on the desktop PC that is directly connected to the board.
PB  - IEEE, New York
C3  - 2016 IEEE 14th international symposium on intelligent systems and informatics (SISY)
T1  - Smartphone Application for Tracking Students' Class Attendance
SP  - 227
EP  - 231
DO  - 10.1109/SISY.2016.7601502
ER  - 
@conference{
author = "Maravić-Cisar, Sanja and Pinter, Robert and Vojnić, Viktor and Tumbas, Vanja and Čisar, Petar",
year = "2016",
abstract = "The Bologna system makes class attendance mandatory. Recording attendance is inefficient and takes up too much class time especially with larger groups of students. If a professor records student attendance manually, they have to look at student, write it down and go to the next student. If the check takes five minutes of a 45-minute class, that means the teachers lose approximately 10 percent of the class just on attendance instead spending it on teaching. The majority of students have some kind of smart device and these can be used to make an application so that students can log in their attendance. One possible solution for this is the application called Muffin. Muffin consists of a mobile application that students have on their personal mobile devices, an Arduino Uno board with Bluetooth module, and a desktop application. The basic idea is that when students want to log in their attendance, all they need to do is send some log in data to the Arduino board, which is then forwarded to the application on the desktop PC that is directly connected to the board.",
publisher = "IEEE, New York",
journal = "2016 IEEE 14th international symposium on intelligent systems and informatics (SISY)",
title = "Smartphone Application for Tracking Students' Class Attendance",
pages = "227-231",
doi = "10.1109/SISY.2016.7601502"
}
Maravić-Cisar, S., Pinter, R., Vojnić, V., Tumbas, V.,& Čisar, P.. (2016). Smartphone Application for Tracking Students' Class Attendance. in 2016 IEEE 14th international symposium on intelligent systems and informatics (SISY)
IEEE, New York., 227-231.
https://doi.org/10.1109/SISY.2016.7601502
Maravić-Cisar S, Pinter R, Vojnić V, Tumbas V, Čisar P. Smartphone Application for Tracking Students' Class Attendance. in 2016 IEEE 14th international symposium on intelligent systems and informatics (SISY). 2016;:227-231.
doi:10.1109/SISY.2016.7601502 .
Maravić-Cisar, Sanja, Pinter, Robert, Vojnić, Viktor, Tumbas, Vanja, Čisar, Petar, "Smartphone Application for Tracking Students' Class Attendance" in 2016 IEEE 14th international symposium on intelligent systems and informatics (SISY) (2016):227-231,
https://doi.org/10.1109/SISY.2016.7601502 . .
9
4
11

Optimization Algorithms in Function of Binary Character Recognition

Čisar, Petar; Maravić-Cisar, Sanja; Subošić, Dane; Đikanović, Predrag; Đukanović, Slaviša

(Budapest Tech, Budapest, 2015)

TY  - JOUR
AU  - Čisar, Petar
AU  - Maravić-Cisar, Sanja
AU  - Subošić, Dane
AU  - Đikanović, Predrag
AU  - Đukanović, Slaviša
PY  - 2015
UR  - http://jakov.kpu.edu.rs/handle/123456789/660
AB  - The paper gives an analysis of some optimization algorithms in computer sciences and their implementation in solving the problem of binary character recognition. The performance of these algorithms is analyzed using the Optimization Algorithm Toolkit, with emphasis on determining the impact of parameter values. It is shown that these types of algorithms have shown a significant sensitivity as far as the choosing of the parameters was concerned which would have an effect on how the algorithm functions. In this sense, the existence of optimal value was found, as well as extremely unacceptable values.
PB  - Budapest Tech, Budapest
T2  - Acta polytechnica hungarica
T1  - Optimization Algorithms in Function of Binary Character Recognition
VL  - 12
IS  - 7
SP  - 77
EP  - 87
UR  - https://hdl.handle.net/21.15107/rcub_jakov_660
ER  - 
@article{
author = "Čisar, Petar and Maravić-Cisar, Sanja and Subošić, Dane and Đikanović, Predrag and Đukanović, Slaviša",
year = "2015",
abstract = "The paper gives an analysis of some optimization algorithms in computer sciences and their implementation in solving the problem of binary character recognition. The performance of these algorithms is analyzed using the Optimization Algorithm Toolkit, with emphasis on determining the impact of parameter values. It is shown that these types of algorithms have shown a significant sensitivity as far as the choosing of the parameters was concerned which would have an effect on how the algorithm functions. In this sense, the existence of optimal value was found, as well as extremely unacceptable values.",
publisher = "Budapest Tech, Budapest",
journal = "Acta polytechnica hungarica",
title = "Optimization Algorithms in Function of Binary Character Recognition",
volume = "12",
number = "7",
pages = "77-87",
url = "https://hdl.handle.net/21.15107/rcub_jakov_660"
}
Čisar, P., Maravić-Cisar, S., Subošić, D., Đikanović, P.,& Đukanović, S.. (2015). Optimization Algorithms in Function of Binary Character Recognition. in Acta polytechnica hungarica
Budapest Tech, Budapest., 12(7), 77-87.
https://hdl.handle.net/21.15107/rcub_jakov_660
Čisar P, Maravić-Cisar S, Subošić D, Đikanović P, Đukanović S. Optimization Algorithms in Function of Binary Character Recognition. in Acta polytechnica hungarica. 2015;12(7):77-87.
https://hdl.handle.net/21.15107/rcub_jakov_660 .
Čisar, Petar, Maravić-Cisar, Sanja, Subošić, Dane, Đikanović, Predrag, Đukanović, Slaviša, "Optimization Algorithms in Function of Binary Character Recognition" in Acta polytechnica hungarica, 12, no. 7 (2015):77-87,
https://hdl.handle.net/21.15107/rcub_jakov_660 .
1
2

Implementation of Immunological Algorithms in Solving Optimization Problems

Čisar, Petar; Maravić-Cisar, Sanja; Markoski, Branko

(Budapest Tech, Budapest, 2014)

TY  - JOUR
AU  - Čisar, Petar
AU  - Maravić-Cisar, Sanja
AU  - Markoski, Branko
PY  - 2014
UR  - http://jakov.kpu.edu.rs/handle/123456789/614
AB  - This paper gives a global review of artificial immune systems in computer science and their implementation. The performance of the immunological algorithm in solving optimization problems is analysed using the Optimization Algorithm Toollcit, with emphasis on determining the impact of parameter values. It is shown that these types of algorithms are particularly sensitive to the choice of parameters that affect the functioning of the algorithm.
PB  - Budapest Tech, Budapest
T2  - Acta polytechnica hungarica
T1  - Implementation of Immunological Algorithms in Solving Optimization Problems
VL  - 11
IS  - 4
SP  - 225
EP  - 239
UR  - https://hdl.handle.net/21.15107/rcub_jakov_614
ER  - 
@article{
author = "Čisar, Petar and Maravić-Cisar, Sanja and Markoski, Branko",
year = "2014",
abstract = "This paper gives a global review of artificial immune systems in computer science and their implementation. The performance of the immunological algorithm in solving optimization problems is analysed using the Optimization Algorithm Toollcit, with emphasis on determining the impact of parameter values. It is shown that these types of algorithms are particularly sensitive to the choice of parameters that affect the functioning of the algorithm.",
publisher = "Budapest Tech, Budapest",
journal = "Acta polytechnica hungarica",
title = "Implementation of Immunological Algorithms in Solving Optimization Problems",
volume = "11",
number = "4",
pages = "225-239",
url = "https://hdl.handle.net/21.15107/rcub_jakov_614"
}
Čisar, P., Maravić-Cisar, S.,& Markoski, B.. (2014). Implementation of Immunological Algorithms in Solving Optimization Problems. in Acta polytechnica hungarica
Budapest Tech, Budapest., 11(4), 225-239.
https://hdl.handle.net/21.15107/rcub_jakov_614
Čisar P, Maravić-Cisar S, Markoski B. Implementation of Immunological Algorithms in Solving Optimization Problems. in Acta polytechnica hungarica. 2014;11(4):225-239.
https://hdl.handle.net/21.15107/rcub_jakov_614 .
Čisar, Petar, Maravić-Cisar, Sanja, Markoski, Branko, "Implementation of Immunological Algorithms in Solving Optimization Problems" in Acta polytechnica hungarica, 11, no. 4 (2014):225-239,
https://hdl.handle.net/21.15107/rcub_jakov_614 .
1
7

Approximation of Internet Traffic in Wavelet Domain

Čisar, Petar; Maravić-Cisar, Sanja

(IEEE, New York, 2014)

TY  - CONF
AU  - Čisar, Petar
AU  - Maravić-Cisar, Sanja
PY  - 2014
UR  - http://jakov.kpu.edu.rs/handle/123456789/585
AB  - The paper elaborates the complexity and importance of modeling Internet traffic. In this sense, having in mind the nature of Internet traffic as well as actual information in this sphere, it was emphasized that there is no universally applicable model. This standpoint has initiated the idea of examining the possibility of approximation internet traffic. Because of the rather suitable property, namely that is not necessary to provide stationarity of the input signal, traffic analysis in this paper was performed in wavelet domain, using different types of wavelets, with the aim of determining the convenience of certain wavelets for the analysis of Internet traffic. It was concluded that all examined wavelets have generated approximately similar statistical results, which depend on the selected level of approximation and analyzed traffic curve. For different curves at the same level of approximation, statistical values have been obtained that do not differ significantly from the statistics of the corresponding original signals. It was also found that the discrete approximation of the symlet wavelet sym(2) provided the largest number of statistically accurate results, and in this regard proved to be the most suitable for the analysis of Internet traffic.
PB  - IEEE, New York
C3  - 2014 IEEE 12th international symposium on intelligent systems and informatics (SISY)
T1  - Approximation of Internet Traffic in Wavelet Domain
SP  - 87
EP  - 91
DO  - 10.1109/SISY.2014.6923563
ER  - 
@conference{
author = "Čisar, Petar and Maravić-Cisar, Sanja",
year = "2014",
abstract = "The paper elaborates the complexity and importance of modeling Internet traffic. In this sense, having in mind the nature of Internet traffic as well as actual information in this sphere, it was emphasized that there is no universally applicable model. This standpoint has initiated the idea of examining the possibility of approximation internet traffic. Because of the rather suitable property, namely that is not necessary to provide stationarity of the input signal, traffic analysis in this paper was performed in wavelet domain, using different types of wavelets, with the aim of determining the convenience of certain wavelets for the analysis of Internet traffic. It was concluded that all examined wavelets have generated approximately similar statistical results, which depend on the selected level of approximation and analyzed traffic curve. For different curves at the same level of approximation, statistical values have been obtained that do not differ significantly from the statistics of the corresponding original signals. It was also found that the discrete approximation of the symlet wavelet sym(2) provided the largest number of statistically accurate results, and in this regard proved to be the most suitable for the analysis of Internet traffic.",
publisher = "IEEE, New York",
journal = "2014 IEEE 12th international symposium on intelligent systems and informatics (SISY)",
title = "Approximation of Internet Traffic in Wavelet Domain",
pages = "87-91",
doi = "10.1109/SISY.2014.6923563"
}
Čisar, P.,& Maravić-Cisar, S.. (2014). Approximation of Internet Traffic in Wavelet Domain. in 2014 IEEE 12th international symposium on intelligent systems and informatics (SISY)
IEEE, New York., 87-91.
https://doi.org/10.1109/SISY.2014.6923563
Čisar P, Maravić-Cisar S. Approximation of Internet Traffic in Wavelet Domain. in 2014 IEEE 12th international symposium on intelligent systems and informatics (SISY). 2014;:87-91.
doi:10.1109/SISY.2014.6923563 .
Čisar, Petar, Maravić-Cisar, Sanja, "Approximation of Internet Traffic in Wavelet Domain" in 2014 IEEE 12th international symposium on intelligent systems and informatics (SISY) (2014):87-91,
https://doi.org/10.1109/SISY.2014.6923563 . .
1

Code Hunt - "Hunting" to Learn Programming

Maravić-Cisar, Sanja; Pinter, Robert; Čisar, Petar

(IEEE, New York, 2014)

TY  - CONF
AU  - Maravić-Cisar, Sanja
AU  - Pinter, Robert
AU  - Čisar, Petar
PY  - 2014
UR  - http://jakov.kpu.edu.rs/handle/123456789/580
AB  - Programming is a major subject in Computer Science (CS) departments. However, students often face difficulties on the basic programming courses due to several factors that cause these difficulties. The most important reason may be the lack of problem solving abilities that many students show. Learning to code can be made more effective if it is perceived as fun by the learner. Code Hunt uses puzzles that players have to explore by means of clues presented as test cases. Players iteratively modify their code to match the functional behavior of secret solutions. The aim of this paper is to introduce an educational, browser-based coding game which can help in learning coding.
PB  - IEEE, New York
C3  - 2014 IEEE 15th international symposium on computational intelligence and informatics (CINTI)
T1  - Code Hunt - "Hunting" to Learn Programming
SP  - 329
EP  - 333
DO  - 10.1109/CINTI.2014.7028698
ER  - 
@conference{
author = "Maravić-Cisar, Sanja and Pinter, Robert and Čisar, Petar",
year = "2014",
abstract = "Programming is a major subject in Computer Science (CS) departments. However, students often face difficulties on the basic programming courses due to several factors that cause these difficulties. The most important reason may be the lack of problem solving abilities that many students show. Learning to code can be made more effective if it is perceived as fun by the learner. Code Hunt uses puzzles that players have to explore by means of clues presented as test cases. Players iteratively modify their code to match the functional behavior of secret solutions. The aim of this paper is to introduce an educational, browser-based coding game which can help in learning coding.",
publisher = "IEEE, New York",
journal = "2014 IEEE 15th international symposium on computational intelligence and informatics (CINTI)",
title = "Code Hunt - "Hunting" to Learn Programming",
pages = "329-333",
doi = "10.1109/CINTI.2014.7028698"
}
Maravić-Cisar, S., Pinter, R.,& Čisar, P.. (2014). Code Hunt - "Hunting" to Learn Programming. in 2014 IEEE 15th international symposium on computational intelligence and informatics (CINTI)
IEEE, New York., 329-333.
https://doi.org/10.1109/CINTI.2014.7028698
Maravić-Cisar S, Pinter R, Čisar P. Code Hunt - "Hunting" to Learn Programming. in 2014 IEEE 15th international symposium on computational intelligence and informatics (CINTI). 2014;:329-333.
doi:10.1109/CINTI.2014.7028698 .
Maravić-Cisar, Sanja, Pinter, Robert, Čisar, Petar, "Code Hunt - "Hunting" to Learn Programming" in 2014 IEEE 15th international symposium on computational intelligence and informatics (CINTI) (2014):329-333,
https://doi.org/10.1109/CINTI.2014.7028698 . .
2
2
2

Kernel Sets in Compass Edge Detection

Čisar, Petar; Maravić-Cisar, Sanja; Markoski, Branko

(IEEE, New York, 2013)

TY  - CONF
AU  - Čisar, Petar
AU  - Maravić-Cisar, Sanja
AU  - Markoski, Branko
PY  - 2013
UR  - http://jakov.kpu.edu.rs/handle/123456789/514
AB  - Edge detection is an important operation in the analysis of a digital image and includes a set of mathematical methods to identify points of discontinuity. For this purpose, different algorithms are used for estimating image gradient. Many edge detection techniques are implemented with convolution mask and based on discrete approximations to differential operators. Differential operations measure the rate of change in the image brightness function. The compass approach implies taking a single mask and rotating it to major compass orientations. Using a suitable programming environment, this paper provides a comparative visual analysis of several digital images, with the ability to change the kernel set in compass edge detection.
PB  - IEEE, New York
C3  - 14th IEEE international symposium on computational intelligence and informatics (cinti)
T1  - Kernel Sets in Compass Edge Detection
SP  - 239
EP  - 242
DO  - 10.1109/CINTI.2013.6705199
ER  - 
@conference{
author = "Čisar, Petar and Maravić-Cisar, Sanja and Markoski, Branko",
year = "2013",
abstract = "Edge detection is an important operation in the analysis of a digital image and includes a set of mathematical methods to identify points of discontinuity. For this purpose, different algorithms are used for estimating image gradient. Many edge detection techniques are implemented with convolution mask and based on discrete approximations to differential operators. Differential operations measure the rate of change in the image brightness function. The compass approach implies taking a single mask and rotating it to major compass orientations. Using a suitable programming environment, this paper provides a comparative visual analysis of several digital images, with the ability to change the kernel set in compass edge detection.",
publisher = "IEEE, New York",
journal = "14th IEEE international symposium on computational intelligence and informatics (cinti)",
title = "Kernel Sets in Compass Edge Detection",
pages = "239-242",
doi = "10.1109/CINTI.2013.6705199"
}
Čisar, P., Maravić-Cisar, S.,& Markoski, B.. (2013). Kernel Sets in Compass Edge Detection. in 14th IEEE international symposium on computational intelligence and informatics (cinti)
IEEE, New York., 239-242.
https://doi.org/10.1109/CINTI.2013.6705199
Čisar P, Maravić-Cisar S, Markoski B. Kernel Sets in Compass Edge Detection. in 14th IEEE international symposium on computational intelligence and informatics (cinti). 2013;:239-242.
doi:10.1109/CINTI.2013.6705199 .
Čisar, Petar, Maravić-Cisar, Sanja, Markoski, Branko, "Kernel Sets in Compass Edge Detection" in 14th IEEE international symposium on computational intelligence and informatics (cinti) (2013):239-242,
https://doi.org/10.1109/CINTI.2013.6705199 . .
3
4
6

Delphi Application for Face Detection Using the Sobel Operator

Jović, Miodrag; Maravić-Cisar, Sanja; Čisar, Petar

(IEEE, New York, 2012)

TY  - CONF
AU  - Jović, Miodrag
AU  - Maravić-Cisar, Sanja
AU  - Čisar, Petar
PY  - 2012
UR  - http://jakov.kpu.edu.rs/handle/123456789/501
AB  - The subject of this work is a face detection. Face detection is the process of determining the positions and sizes of human faces in photos using computer technology. This is a very complex problem which has many solutions with different algorithms. Automatic face detection is the first step in recognizing faces, which leads to much greater opportunities, such as face recognition instead of password for email accounts, or automated banking machine.
PB  - IEEE, New York
C3  - 13th IEEE international symposium on computational intelligence and informatics (cinti 2012)
T1  - Delphi Application for Face Detection Using the Sobel Operator
SP  - 371
EP  - 376
DO  - 10.1109/CINTI.2012.6496791
ER  - 
@conference{
author = "Jović, Miodrag and Maravić-Cisar, Sanja and Čisar, Petar",
year = "2012",
abstract = "The subject of this work is a face detection. Face detection is the process of determining the positions and sizes of human faces in photos using computer technology. This is a very complex problem which has many solutions with different algorithms. Automatic face detection is the first step in recognizing faces, which leads to much greater opportunities, such as face recognition instead of password for email accounts, or automated banking machine.",
publisher = "IEEE, New York",
journal = "13th IEEE international symposium on computational intelligence and informatics (cinti 2012)",
title = "Delphi Application for Face Detection Using the Sobel Operator",
pages = "371-376",
doi = "10.1109/CINTI.2012.6496791"
}
Jović, M., Maravić-Cisar, S.,& Čisar, P.. (2012). Delphi Application for Face Detection Using the Sobel Operator. in 13th IEEE international symposium on computational intelligence and informatics (cinti 2012)
IEEE, New York., 371-376.
https://doi.org/10.1109/CINTI.2012.6496791
Jović M, Maravić-Cisar S, Čisar P. Delphi Application for Face Detection Using the Sobel Operator. in 13th IEEE international symposium on computational intelligence and informatics (cinti 2012). 2012;:371-376.
doi:10.1109/CINTI.2012.6496791 .
Jović, Miodrag, Maravić-Cisar, Sanja, Čisar, Petar, "Delphi Application for Face Detection Using the Sobel Operator" in 13th IEEE international symposium on computational intelligence and informatics (cinti 2012) (2012):371-376,
https://doi.org/10.1109/CINTI.2012.6496791 . .
1
1

Fitting Univariate Distributions to Computer Network Traffic Data Using GUI

Čisar, Petar; Maravić-Cisar, Sanja

(IEEE, New York, 2012)

TY  - CONF
AU  - Čisar, Petar
AU  - Maravić-Cisar, Sanja
PY  - 2012
UR  - http://jakov.kpu.edu.rs/handle/123456789/500
AB  - The available literature is not completely certain what type(s) of probability distribution best models computer network traffic. The statistical analysis presented in this paper aims to show the implementation of graphical interface for fitting univariate distributions to authentic network traffic data. The analysis is realized in Matlab based GUI, using distribution fitting tool.
PB  - IEEE, New York
C3  - 13th IEEE international symposium on computational intelligence and informatics (cinti 2012)
T1  - Fitting Univariate Distributions to Computer Network Traffic Data Using GUI
SP  - 285
EP  - 288
DO  - 10.1109/CINTI.2012.6496776
ER  - 
@conference{
author = "Čisar, Petar and Maravić-Cisar, Sanja",
year = "2012",
abstract = "The available literature is not completely certain what type(s) of probability distribution best models computer network traffic. The statistical analysis presented in this paper aims to show the implementation of graphical interface for fitting univariate distributions to authentic network traffic data. The analysis is realized in Matlab based GUI, using distribution fitting tool.",
publisher = "IEEE, New York",
journal = "13th IEEE international symposium on computational intelligence and informatics (cinti 2012)",
title = "Fitting Univariate Distributions to Computer Network Traffic Data Using GUI",
pages = "285-288",
doi = "10.1109/CINTI.2012.6496776"
}
Čisar, P.,& Maravić-Cisar, S.. (2012). Fitting Univariate Distributions to Computer Network Traffic Data Using GUI. in 13th IEEE international symposium on computational intelligence and informatics (cinti 2012)
IEEE, New York., 285-288.
https://doi.org/10.1109/CINTI.2012.6496776
Čisar P, Maravić-Cisar S. Fitting Univariate Distributions to Computer Network Traffic Data Using GUI. in 13th IEEE international symposium on computational intelligence and informatics (cinti 2012). 2012;:285-288.
doi:10.1109/CINTI.2012.6496776 .
Čisar, Petar, Maravić-Cisar, Sanja, "Fitting Univariate Distributions to Computer Network Traffic Data Using GUI" in 13th IEEE international symposium on computational intelligence and informatics (cinti 2012) (2012):285-288,
https://doi.org/10.1109/CINTI.2012.6496776 . .
2
2