Home Archive Organization Program News Contact
More Filters
09.06.2024. Original scientific paper
WAVELET TRANSFORMATION WITH EXAMPLES

 This paper presents Wavelet transformation in image and signal processing. Wavelet (small wave) is used as a principle by which various programming and engineering tasks are solved with the main goal of improving the shortcomings of the Fourier transformation in terms of data compression, image processing, computer graphics, signals and other...

By Alen Kamiš, Aleksandar Zakić, Saša Kukolj, Nemanja Deretić

18.06.2023. Review Scientific Paper
DEFENSE-IN-DEPTH OF MODERN RADIO SYSTEMS

 A purpose of this paper is to present the Defense-in-depth strategy for the protection of the information system, in this case of modern radio systems. It will explain the basic terms and systems of modern radio systems and how to implement them. Also, this paper will explain the basic concepts of radio communication systems, concepts of mobi...

By Alen Kamiš, Negovan M. Stamenković

05.06.2022. Review Scientific Paper
ESTABLISHING SECURE COMMUNICATION USING SSL VPN

 A following text represents a real life sample and as such it has a large possibility for use and everyday life. By setting up SSL-VPN connection, users can have access to local resources (LAN). SSL-VPN uses safe connections and creates a “safe tunnel” for clients to communicate from outside of local network to the local user netw...

By Alen Kamiš

 This document presents a sample of building a Web application which is used for „Voice over IP – VoIP„ calls, internal and external to the company. The application enables wired and wireless users to access “live” voice and video communications based on the webRTC technology. Containers (micro services) were used...

By Alen Kamiš

 Following text represents all methodological phases through which a single project of implementing an IT system should be taken through. A theme specifically is describing all methodological phases with practical examples during design, implementation and maintenance of the Internet of Things (IoT) system. Author's own work was used called &b...

By Alen Kamiš

10.10.2020. Preliminary communication
CYBER ATTACK AND THREAT PROTECTION

 This paper covers technologies needed for protection of an IT System. Cyber attacks are more frequent then ever and lots of attention should be given to protection from these attacks. This paper covers basis of protecting an IT system and data. In today's business a competitiveness is maintained mainly by high quality back-office processes an...

By Alen Kamiš

Journal Note Sample Text