Zoran Cekerevac - Academia.edu (original) (raw)
Papers by Zoran Cekerevac
FBIM Transactions, Apr 15, 2019
FBIM Transactions, Jul 15, 2014
MEST Journal
Thanks to cryptocurrencies, blockchain technology has recently become the focus of interest of bo... more Thanks to cryptocurrencies, blockchain technology has recently become the focus of interest of both scientists and the public. The paper presents the principles on which blockchain is based and analyzes the possibilities of the application of blockchain technology in more detail. In a part of the analysis, some of the most common cryptocurrencies were considered, such as Bitcoin, Ethereum, USD Coin, Ripple, and ADA. Blockchains' applicability in supply chains, finance, real estate, health care, voting, and smart cities the authors discussed in the chapter about the application of blockchain technology. A separate chapter discusses the limitations of blockchain technology. Based on the analysis, at the end of the paper, the authors conclude that blockchain technology has great potential in automating and optimizing business processes and protecting the information and privacy of users. Given the demonstrated interest of companies in blockchain technology, investments, and demand ...
FBIM Transactions, Apr 15, 2022
Thanks to applying of the newest achievements in the information and communication technologies (... more Thanks to applying of the newest achievements in the information and communication technologies (ICT), Truck and Trace systems experienced their rapid development. Users can benefit from the wide range of services as real-time giving the information about the traffic conditions; generating different traffic messages or signs on traffic displays; displaying warnings about traffic accidents, and traffic jams, including the expected delays on the route;location of the vehicle and/or load, and so on. ICTallow the control and adaptive road traffic management. For such applications implementation, it is necessary to possess adequate data. If the supply chains are understood as series of the basic logistics functions (transport, reloading, storage), it is not difficult to conclude that they coincide with the information chains that represent adequate physical activities. Related to the information flows' management, it is to expect that the information flows are precursors to the commo...
Systems for assisting drivers in driving vehicles, and even to allow automated driving of vehicle... more Systems for assisting drivers in driving vehicles, and even to allow automated driving of vehicles, became the focus of research in the automotive industry. But, similar systems are already in use in the production process in the automotive industry. In factories, the automatized guiding of vehicles is much easier to realize than in the road transportation conditions. In most cases, factories have well-defined transport routes, with or without crossings, and with a limited number and types of vehicles. Although it is to expect that the serial and mass production imply processes which are well defined, long lasting, and rarely changeable, automated guided vehicles (AGV) systems allow flexible routing and delivery of materials, components, and/or products. In the frame of this work, some of the systems for automatic guiding of vehicles used for parts transportation are presented, as well as some of the methodologies for their evaluation. Here are presented some ways of the vehicles co...
Communications - Scientific letters of the University of Zilina, 2015
The article presents an analysis about SMEs‟ needs for data saving and processing, and risks that... more The article presents an analysis about SMEs‟ needs for data saving and processing, and risks that can appear when using cloud as a place to fulfill their needs. A comparative analysis about risks of using cloud and in-house technology is given together with some examples. Special attention is paid to the problems of protection against risks on the Internet provider‟s side: hacking and surveillance. At the end of the work, some recommendations for SMEs in relation to cloud computing are given.
Communications - Scientific letters of the University of Zilina
This article deals with the challenges that are faced by micro and small enterprises using data. ... more This article deals with the challenges that are faced by micro and small enterprises using data. After naming main hypotheses of the research, the attention is paid to definitions of big and small data and to their comparison. In the paper, analyses of the connections between big data and Internet are given. The main attention is paid to the use of big data in micro and small enterprises through the analyses of needed skills, organizational changes and big data management including possible pros and cons. As a special item, the analysis of risks and implementation is given. The analyses are supported with a lot of research results and numerous literature sources. At the end of the article there are conclusions about directions how micro and small enterprises should use big data and how to invest rationally in big data.
Communications - Scientific letters of the University of Zilina
Bitcoin, digital money got into focus after the Mt Gox crash. It uses P2P interaction where an ow... more Bitcoin, digital money got into focus after the Mt Gox crash. It uses P2P interaction where an owner transfers the electronic coin to the next owner signing and adding a hash of the previous transaction and the public key of the next owner. Payment verification is accomplished by notifying the entire network about the transaction. This prevents double-spending and generation of non-existent money. Among the users, there is uncertainty about the safety on the theft and fraud. Among the authorities, there are dilemmas about present and future risks related to the Bitcoin implementation. The article deals with the benefits and risks of Bitcoin use.
Communications - Scientific letters of the University of Zilina
2. Used scientific methods and hypotheses Methodological basis of this research includes the prin... more 2. Used scientific methods and hypotheses Methodological basis of this research includes the principles of the systemic-functional approach to the analysis of phenomena. In justification of theoretical propositions and arguments, following scientific methods were widely used: hypotheticodeductive method, axiomatic method, analytical-deductive method, and comparative method, scientific abstraction, induction and deduction, synthesis,
MEST Journal
This paper presents some aspects of the Internet of Things (IoT) and attacks to which IoT may be ... more This paper presents some aspects of the Internet of Things (IoT) and attacks to which IoT may be exposed, above all, the man-in-the-middle (MITM) attack. After a short introduction, which describes the essence of the IoT and the MITM attack, used scientific methods and hypotheses are presented. The next chapters show the technology of MITM attacks and benefits that a successful attack provides to attackers. Here are presented also some of the most important examples of such attacks, which had a wider scope or significant impact on the Internet community. This part of the article ends by analyzing the possibilities of protection of IoT against MITM attacks. In the continuation, based on data available, an analysis of MITM attacks is given from an economic point of view. The conclusions show a summary of the entire analysis with assumptions of the future development of these issues.
The paper presents the basic concept of an original model of a computer adaptive testing (CAT) of... more The paper presents the basic concept of an original model of a computer adaptive testing (CAT) of students. The test is correlated with the current student's knowledge and provides an opportunity to estimate the optimal number of questions to get a realistic assessment of his/her knowledge. At the end of the paper there are presented some of the results of research carried out using the application based on the CAT model described.
Croatian Journal of Education-Hrvatski Casopis za Odgoj i obrazovanje, 2014
The purpose of this paper is to introduce the reader to the impact of information technologies, p... more The purpose of this paper is to introduce the reader to the impact of information technologies, primarily personal computers, on preschool child development from all aspects: pedagogical, psychological, sociological and medical. Furthermore, the paper discusses some of the main obstacles towards the application of information technologies. The research was conducted with the aim to gather opinions and suggestions from parents and preschool teachers on the (un)warranted use of personal computers in preschool upbringing and education, with particular emphasis on the possibility of computer use in preschools. The research procedure and results are presented in detail. Taking into account all four aspects (pedagogical, psychological, sociological, and medical) of the influence of new information technologies on preschool child development, the authors have concluded that the use of new technologies carries significant advantages, provided the use is adequate, targeted, and only suppleme...
After a brief analysis of the quality of work that the municipality administration needs, the pap... more After a brief analysis of the quality of work that the municipality administration needs, the paper discusses criteria and indicators of quality in public sector. The differences between TQM and CAF are analyzed as well as elements of quality assurance and assessment from stakeholder’s point of view. Some aspects of the implementation of TQM in public sector is followed by conclusions concerning suitability of TQM for improving quality in public sector.
When a message has been coded, it is ready to be transmitted through one or more channels of comm... more When a message has been coded, it is ready to be transmitted through one or more channels of communication to the desired recipient, along the ways that information travels, through a telephone line, television or radio signals, by mail or by Internet...The form of coding largely depends on how the information is to be transmitted; however, no matter which channel is used, it is important to transmit the coded message to the desired recipient correctly.
FBIM Transactions, Apr 15, 2019
FBIM Transactions, Jul 15, 2014
MEST Journal
Thanks to cryptocurrencies, blockchain technology has recently become the focus of interest of bo... more Thanks to cryptocurrencies, blockchain technology has recently become the focus of interest of both scientists and the public. The paper presents the principles on which blockchain is based and analyzes the possibilities of the application of blockchain technology in more detail. In a part of the analysis, some of the most common cryptocurrencies were considered, such as Bitcoin, Ethereum, USD Coin, Ripple, and ADA. Blockchains' applicability in supply chains, finance, real estate, health care, voting, and smart cities the authors discussed in the chapter about the application of blockchain technology. A separate chapter discusses the limitations of blockchain technology. Based on the analysis, at the end of the paper, the authors conclude that blockchain technology has great potential in automating and optimizing business processes and protecting the information and privacy of users. Given the demonstrated interest of companies in blockchain technology, investments, and demand ...
FBIM Transactions, Apr 15, 2022
Thanks to applying of the newest achievements in the information and communication technologies (... more Thanks to applying of the newest achievements in the information and communication technologies (ICT), Truck and Trace systems experienced their rapid development. Users can benefit from the wide range of services as real-time giving the information about the traffic conditions; generating different traffic messages or signs on traffic displays; displaying warnings about traffic accidents, and traffic jams, including the expected delays on the route;location of the vehicle and/or load, and so on. ICTallow the control and adaptive road traffic management. For such applications implementation, it is necessary to possess adequate data. If the supply chains are understood as series of the basic logistics functions (transport, reloading, storage), it is not difficult to conclude that they coincide with the information chains that represent adequate physical activities. Related to the information flows' management, it is to expect that the information flows are precursors to the commo...
Systems for assisting drivers in driving vehicles, and even to allow automated driving of vehicle... more Systems for assisting drivers in driving vehicles, and even to allow automated driving of vehicles, became the focus of research in the automotive industry. But, similar systems are already in use in the production process in the automotive industry. In factories, the automatized guiding of vehicles is much easier to realize than in the road transportation conditions. In most cases, factories have well-defined transport routes, with or without crossings, and with a limited number and types of vehicles. Although it is to expect that the serial and mass production imply processes which are well defined, long lasting, and rarely changeable, automated guided vehicles (AGV) systems allow flexible routing and delivery of materials, components, and/or products. In the frame of this work, some of the systems for automatic guiding of vehicles used for parts transportation are presented, as well as some of the methodologies for their evaluation. Here are presented some ways of the vehicles co...
Communications - Scientific letters of the University of Zilina, 2015
The article presents an analysis about SMEs‟ needs for data saving and processing, and risks that... more The article presents an analysis about SMEs‟ needs for data saving and processing, and risks that can appear when using cloud as a place to fulfill their needs. A comparative analysis about risks of using cloud and in-house technology is given together with some examples. Special attention is paid to the problems of protection against risks on the Internet provider‟s side: hacking and surveillance. At the end of the work, some recommendations for SMEs in relation to cloud computing are given.
Communications - Scientific letters of the University of Zilina
This article deals with the challenges that are faced by micro and small enterprises using data. ... more This article deals with the challenges that are faced by micro and small enterprises using data. After naming main hypotheses of the research, the attention is paid to definitions of big and small data and to their comparison. In the paper, analyses of the connections between big data and Internet are given. The main attention is paid to the use of big data in micro and small enterprises through the analyses of needed skills, organizational changes and big data management including possible pros and cons. As a special item, the analysis of risks and implementation is given. The analyses are supported with a lot of research results and numerous literature sources. At the end of the article there are conclusions about directions how micro and small enterprises should use big data and how to invest rationally in big data.
Communications - Scientific letters of the University of Zilina
Bitcoin, digital money got into focus after the Mt Gox crash. It uses P2P interaction where an ow... more Bitcoin, digital money got into focus after the Mt Gox crash. It uses P2P interaction where an owner transfers the electronic coin to the next owner signing and adding a hash of the previous transaction and the public key of the next owner. Payment verification is accomplished by notifying the entire network about the transaction. This prevents double-spending and generation of non-existent money. Among the users, there is uncertainty about the safety on the theft and fraud. Among the authorities, there are dilemmas about present and future risks related to the Bitcoin implementation. The article deals with the benefits and risks of Bitcoin use.
Communications - Scientific letters of the University of Zilina
2. Used scientific methods and hypotheses Methodological basis of this research includes the prin... more 2. Used scientific methods and hypotheses Methodological basis of this research includes the principles of the systemic-functional approach to the analysis of phenomena. In justification of theoretical propositions and arguments, following scientific methods were widely used: hypotheticodeductive method, axiomatic method, analytical-deductive method, and comparative method, scientific abstraction, induction and deduction, synthesis,
MEST Journal
This paper presents some aspects of the Internet of Things (IoT) and attacks to which IoT may be ... more This paper presents some aspects of the Internet of Things (IoT) and attacks to which IoT may be exposed, above all, the man-in-the-middle (MITM) attack. After a short introduction, which describes the essence of the IoT and the MITM attack, used scientific methods and hypotheses are presented. The next chapters show the technology of MITM attacks and benefits that a successful attack provides to attackers. Here are presented also some of the most important examples of such attacks, which had a wider scope or significant impact on the Internet community. This part of the article ends by analyzing the possibilities of protection of IoT against MITM attacks. In the continuation, based on data available, an analysis of MITM attacks is given from an economic point of view. The conclusions show a summary of the entire analysis with assumptions of the future development of these issues.
The paper presents the basic concept of an original model of a computer adaptive testing (CAT) of... more The paper presents the basic concept of an original model of a computer adaptive testing (CAT) of students. The test is correlated with the current student's knowledge and provides an opportunity to estimate the optimal number of questions to get a realistic assessment of his/her knowledge. At the end of the paper there are presented some of the results of research carried out using the application based on the CAT model described.
Croatian Journal of Education-Hrvatski Casopis za Odgoj i obrazovanje, 2014
The purpose of this paper is to introduce the reader to the impact of information technologies, p... more The purpose of this paper is to introduce the reader to the impact of information technologies, primarily personal computers, on preschool child development from all aspects: pedagogical, psychological, sociological and medical. Furthermore, the paper discusses some of the main obstacles towards the application of information technologies. The research was conducted with the aim to gather opinions and suggestions from parents and preschool teachers on the (un)warranted use of personal computers in preschool upbringing and education, with particular emphasis on the possibility of computer use in preschools. The research procedure and results are presented in detail. Taking into account all four aspects (pedagogical, psychological, sociological, and medical) of the influence of new information technologies on preschool child development, the authors have concluded that the use of new technologies carries significant advantages, provided the use is adequate, targeted, and only suppleme...
After a brief analysis of the quality of work that the municipality administration needs, the pap... more After a brief analysis of the quality of work that the municipality administration needs, the paper discusses criteria and indicators of quality in public sector. The differences between TQM and CAF are analyzed as well as elements of quality assurance and assessment from stakeholder’s point of view. Some aspects of the implementation of TQM in public sector is followed by conclusions concerning suitability of TQM for improving quality in public sector.
When a message has been coded, it is ready to be transmitted through one or more channels of comm... more When a message has been coded, it is ready to be transmitted through one or more channels of communication to the desired recipient, along the ways that information travels, through a telephone line, television or radio signals, by mail or by Internet...The form of coding largely depends on how the information is to be transmitted; however, no matter which channel is used, it is important to transmit the coded message to the desired recipient correctly.