U radu je predstavljeno do sada neobrađeno djelo pod naslovom Kašf al–ʼasrār bi ḥaqāʼiq al–kitāb wa daqāʼiq al–ṭahāra (Otkrivanje tajni o značenjima riječi knjiga i osobitostima riječi čistoća), koje je u drugoj polovini XVIII stoljeća napisao Muhamed Sin Mustafin Čajničanin (Muḥammad Ibn Muṣṭafā al–Čāyničawī). Ovaj se autor u literaturi spominje kao muderis, sarajevski muftija i autor jednog poznatijeg djela iz logike. Djelo koje je predmet ovog rada, iako registrirano, ranije nije bilo predmet tekstološke analize niti analize sadržaja. U radu su korištena dva rukopisna primjerka ovog djela, od kojih se jedan čuva u rukopisnoj zbirci Gazi Husrev–begove biblioteke u Sarajevu, a drugi u zbirci rukopisa na orijentalnim jezicima Univerzitetske biblioteke „Svetozar Marković“ u Beogradu. Istraživanje obuhvata opis i tekstološku analizu dvaju dostupnih rukopisa, kritičku obradu djela, prijevod i analizu sadržaja s fokusom na analizu genitivne veze kitāb al–ṭahāra, te oblika i značenja njenih članova.
Attributive relative clauses introduced by adverbial relativizers are rarely used in Modern Standard Arabic, and are completely absent in its syntactic description. The intriguing aspect of this type of relative clause lies in the fact that their attributive function is opposed to the main purpose of the use of adverbial relativizers, namely the formation of adverbial clauses. The main task of this paper is the analysis of examples of attributive relative clauses introduced by the adverbial relativizers ḥayṯu, ḥīna, ʻindamā, kamā and munḏu found in works belonging to Modern Standard Arabic. The analysis is based on the analytical–descriptive method and the typological–functional approach, which allow examining of attributive relative clauses introduced by adverbial relativizers from different perspectives. Although the analysis will include exploring syntactic functions of head nouns in main and relative clauses, whereby the relative clause formation strategy using the relative word to encode the syntactic function of head noun in the relative clause is illustrated, this is not the only goal of the paper. The paper also aims to demonstrate that attributive relative clauses introduced by adverbial relativizers, although formally functioning as attributive modifiers, tend to convey diverse semantic content. Moreover, this type of Arabic relative clause is not only an embodiment of the law of linguistic economy but it also represents an exceptionally effective means of stylistic choice.
Understanding the impacts of climate on tourism has evolved since the late 20th century, shifting from one-dimensional and partial approaches to more comprehensive and multifaceted ones. To more accurately assess the climatic suitability of destinations for recreational tourism, the Holiday Climate Index (HCI) has been developed in recent years. The HCI's variable rating scale and component weighting system are based on insights into tourists' climatic preferences. Since different types of destinations have distinct climatic requirements, the HCI is designed with specifications for two major tourism segments—urban and beach. The HCI: Urban focuses on urban tourism, where the city and its attractions serve as the primary destination and point of interest. This study analyzes the HCI: Urban for Sarajevo, the most significant tourism destination in Bosnia and Herzegovina. The monthly probability is calculated by determining the frequency of daily index scores within ideal and unacceptable categories. Ideal climatic conditions for urban tourism are defined as days with scores between 90 and 100, while unacceptable conditions are those with scores below 40. Of all tourists visiting Bosnia and Herzegovina in 2023, 41% visited the Sarajevo Canton, which makes it a significant case study. This paper analyzes the HCI: Urban index for Sarajevo in relation to tourist visits throughout the year, and the obtained ratings reflect tourists' climatic preferences for urban destinations. Holiday Climate Index (HCI): Urban was analyzed for the Sarajevo area, the capital of Bosnia and Herzegovina, in order to more accurately assess the climatic suitability of this destination for tourism. The word “holiday” was chosen to better reflect what the index was designed for (i.e. recreational tourism), since tourism is much broader in definition. This paper analyzes the HCI: Urban index for Sarajevo in relation to tourist visits during the year, and the obtained scores reflect tourists' climate preferences for the city destination. Considering that tourists in Sarajevo stay only for a short time (average length of stay 2.1 days), determinants that affect tourist satisfaction and elements of the destination that need to be improved in order to increase the length of stay have been identified. Analysis of average daily values of climatic parameters of a particular destination and monitoring their trend plays an important role in the organization of tourist trips. This research is the first of its kind related to Sarajevo, and understanding local climatic conditions is crucial for developing tourism strategies, planning, and organizing tourism events in the capital of Bosnia and Herzegovina, which is the most visited tourist city in the entire country.
This document presents strategic guidelines and a development framework aimed at enhancing higher education programs in biotechnology within Bosnia and Herzegovina. It emphasizes the importance of aligning academic curricula, research capacities, and innovation ecosystems with global sustainable development goals (SDGs) and emerging scientific trends. Drawing on insights from the 2025 scientific-expert symposium "Next-Generation Biotechnologists – Skills of Future Educators," this work outlines key recommendations for modernizing educational approaches, strengthening interdisciplinary collaboration, and fostering the next generation of biotechnologists equipped to meet societal and technological challenges. The framework is intended for academic institutions, policymakers, and stakeholders committed to advancing biotechnology education and innovation in the region.
Small intestinal bacterial overgrowth (SIBO) is a major yet underrecognized driver of gastrointestinal morbidity in systemic sclerosis (SSc). Disordered motility, fibrosis, and dysbiosis promote microbial stasis, malabsorption, and malnutrition, contributing substantially to impaired quality of life and survival. Diagnostic accuracy remains limited: jejunal aspirate culture is invasive, whereas breath testing offers only moderate sensitivity and specificity. Empirical antibiotic therapy yields transient symptom relief, but recurrence is common, and evidence guiding optimal eradication strategies is sparse. Adjunctive measures, including probiotics, prokinetics, and dietary interventions, remain variably applied, with heterogeneous outcomes across studies. Novel microbiome-targeted, neuromodulatory, and antifibrotic therapies are emerging as promising mechanism-based options. Bearing this in mind, this narrative review aims to consolidate current knowledge on SIBO eradication in SSc. We first outline the pathophysiological rationale and clinical relevance of bacterial overgrowth. We then synthesize available evidence for treatment strategies, appraise barriers to durable remission, and discuss implications for multidisciplinary management. Finally, we highlight emerging approaches, including microbiome-directed therapies, novel prokinetics, and antifibrotic interventions, and define priorities for future clinical research.
Introduction: Post-traumatic embitterment syndrome is a pathological reaction to drastic life events and doesnot have the tendency to end. This syndrome also occurs relatively frequently in patients with post-traumatic stress disorder (PTSD).Aim: To investigate post-traumatic embitterment syndrome in patients with post-traumatic stress disorder.Subjects and methods: A cross-sectional study was conducted on a sample of 200 subjects who were participants in the past war. The research group consists of 100 subjects who participated in the war and have a diagnosis of PTSD, and the control group consists of 100 healthy volunteers who were in the war but were not previously diagnosed with PTSD.The study used a sociodemographic questionnaire, a self-assessment questionnaire for post-traumatic embitterment syndrome, and a clinical questionnaire for post-traumatic stress disorder.Results: Subjects with PTSD show a statistically significantly higher level of post-traumatic embitterment syndrome compared to subjects without PTSD. There were no statistically significant differences between the groups that actively and passively participated in the war, between genders, and between the groups with current PTSD and lifetime PTSD.Conclusion: Subjects with PTSD show a statistically significantly higher level of post-traumatic embitterment syndrome compared to subjects without PTSD.
<p>This study explores the use of natural plant extracts as a sustainable method to enhance the quality and safety of long-life sausages by incorporating them into natural edible casings. Ethanol (E) and aqueous (A) extracts of blackthorn (BT) and red cherry (RC), as well as their ethanol and water-based solutions, were prepared and analysed for their antioxidant and antimicrobial properties. The analyses included the quantification of total phenols, non-flavonoids, flavonoids, flavonols, and anthocyanins, along with antioxidant activity assessments using FRAP, DPPH, and ABTS assays. Antimicrobial efficacy was tested against Gram-positive and Gram-negative bacteria (<em>Staphylococcus aureus</em>, <em>Bacillus cereus</em>, <em>Escherichia coli</em>, and <em>Salmonella enterica</em>) and mold <em>Penicillium expansum</em> via agar dilution methods to determine MIC and MBC/MFC.</p> <p>Results showed that ethanol extracts had higher antioxidant activity than aqueous ones (p<0.05), with the ethanol extract of blackthorn (EBT) containing the highest levels of phenolics (54.11 mg GAE/g d.e.) and exhibiting the strongest antioxidant, antimicrobial, and antifungal activities. Casings treated with EBTE (ethanol BT extract dissolved in ethanol) demonstrated significant antibacterial properties, particularly against Gram-negative bacteria. This study confirms that plant-extract-enriched natural casings can protect against oxidation and microbial spoilage, thereby enhancing the overall quality and safety of dry-cured sausages. </p>
This paper presents a review of the application of machine learning to face detection in images, with a specific focus on face recognition in digital environments. The primary objectives of this research are to develop and analyze advanced machine learning algorithms to improve face identification accuracy. The study provides a detailed evaluation of several key algorithms, including Convolutional Neural Networks (CNNs) and the MTCNN (Multi-Task Cascaded Convolutional Networks). It also benchmarks the performance of established object detection models, such as Histogram of Oriented Gradients (HOG), Cascaded HAAR, and Maximum Margin Object Detection (MMOD). Through empirical evaluation, the MTCNN (Multi-Task Cascaded Convolutional Networks) algorithm demonstrated superior performance, achieving the highest accuracy and most efficient runtime among the tested models.
Abstract Introduction Peritoneal lymphangiomatosis is a rare benign lymphatic disorder with diagnostic and therapeutic challenges. It may mimic peritoneal carcinomatosis or mesothelioma, often requiring histological confirmation. Management options are limited, and long-term data on targeted therapies, including sirolimus, remain scarce. Case Presentation We present the case of a 45-year-old woman with a history of surgically corrected atrial septal defect, who developed progressive abdominal distension and dysuria in May 2014. Abdominal ultrasound and contrast-enhanced abdominal computed tomography revealed diffuse ascites, peritoneal thickening, and cystic changes. Diagnostic uncertainty led to an exploratory laparotomy in May 2015, where histopathology confirmed peritoneal lymphangiomatosis. After failed conservative management including dietary modification, diuretic therapy, and repeated paracenteses, she was started on sirolimus 2 mg/day in August 2016. Her serum trough levels were maintained between 5 and 15 ng/mL. She achieved a Karnofsky Performance Score of 100% (indicating full functional capacity) within 2 months and has remained in complete clinical and radiologic remission for over 8 years. Diabetes mellitus type 2 was diagnosed during follow-up and is well controlled with insulin therapy. Conclusion This case underscores the difficulty of diagnosing peritoneal lymphangiomatosis and highlights the transformative potential of sirolimus therapy. To our knowledge, this is one of the longest documented remissions of peritoneal lymphangiomatosis under mechanistic target of rapamycin (mTOR) inhibition.
Simple Summary Eye cancers can damage vision and, in some cases, threaten life. Retinoblastoma mainly affects children, while uveal melanoma is the most common eye cancer in adults. Doctors need better ways to judge how aggressive these tumors are and to find new treatment targets. We examined five proteins that help cells handle nutrients and signals, Megalin, Cubilin, Caveolin-1, GIPC1, and DAB2IP, in normal eye tissue, retinoblastoma, and different forms of choroidal melanoma. Using fluorescent staining, we measured the amount of each protein present, then compared our results with publicly available gene data and patient survival information. Our goal was to learn whether changes in these proteins track with tumor type and outcome. These findings may support the development of future tools for diagnosis, risk prediction, and therapy design in eye cancer.
Driver mutations in IDH1 and IDH2 are initiating events in the evolution of chondrosarcoma and several other cancer types. Here, we present evidence that mutant IDH1 is recurrently lost in metastatic central chondrosarcoma. This may reflect either relaxed positive selection for the mutant IDH1 locus, or negative selection for the hypermethylation phenotype later in tumor evolution. This finding highlights the challenge for therapeutic intervention by mutant IDH1 inhibitors in chondrosarcoma.
This paper presents an example of an approach to designing and techno-economic analysis of the feasibility for a battery energy storage system based on data from a real consumer in Bosnia and Herzegovina. Trends in electricity consumption of the considered consumer, as well as real location conditions, were taken into account when designing the system. Analytical deduction and decision-making based on possible business models in the local electricity market are presented. Trends in the analysis and assessment of battery system degradation are developed, and a comparison is made from the economic aspect of the feasibility of the system. Conclusions are drawn regarding the use of the system and guidelines for further research are set.
This study presents an empirical benchmarking comparison of two distinct speech-to-text approaches under identical conditions: the Speech Recognition module, which utilizes the online Google Web Speech API, and the offline Wav2Vec model developed by Facebook AI. Both approaches facilitate the transformation of spoken language into written language, although they demonstrate unique characteristics in terms of reliance on the internet, speed, and precision. This study utilizes the LJ Speech dataset, which contains short audio segments of a single reader supplemented by their corresponding transcriptions. Both examined models acquire text from the identical dataset and subsequently assess its similarity to the texts within the dataset. Our analysis reveals that wav2vec outperforms the speech recognition model in both accuracy and performance, suggesting the use of wav2vec in speech-to-speech implementations.
Classical models of cancer focus on tumour-intrinsic genetic aberrations and immune dynamics and often overlook how the metabolic environment of healthy tissues shapes tumour development and immune efficacy. Here, we propose that tissue-intrinsic metabolic intensity and waste-handling capacity act as an upstream gatekeeper of anti-tumour immunity, determining whether immune infiltration translates into effective immune function and safeguards the tissue from tumourigenesis. Across human cancers, tumours arising in high-metabolism tissues – like kidney, brain, and eye – tend to show high T cell infiltration but poor prognosis, suggesting pre-existing metabolic environments prior to malignant transformation may undermine immune function. This pattern is mirrored across species: large mammals with lower mass-specific metabolic rates (e.g., elephants, whales) accumulate fewer metabolic byproducts and show lower cancer incidence (Peto’s paradox), while long-lived small mammals like bats and naked mole-rats resist tumourigenesis via suppressed glycolysis or altered hypoxia responses leading to lower metabolic rates and/or byproduct accumulation. Through integrative synthesis spanning human single-cell expression data and cross-species comparisons, we outline a framework of “immunometabolic gatekeeping,” where tissues with high metabolic rate and poor waste clearance foster immune-exhausting niches even before transformation. This unifying framework reconciles multiple paradoxes in cancer biology: Peto’s paradox, T cell infiltration non-prognosticity, tissue tropisms, sex-based inequalities, and size-based tipping points (e.g., the 3 cm rule in ccRCC), and suggests new principles for identifying high-risk patients and metabolic-immune combination strategies for prevention and treatment. By shifting focus from tumour-intrinsic mutations to host-tissue metabolism, this work offers a novel, integrative lens on cancer vulnerability and immune failure.
Abstract The term "predatory journals" is widely used to describe publishing practices that exploit authors, compromise research quality, and mislead readers. Its use, however, has frequently led to legal threats and professional conflicts for individuals and institutions who call out such deceptive practices. Most notably, Jeffrey Beall, the creator of Beall’s List, faced legal threats and personal harassment, which ultimately led him to discontinue his work. To address these challenges, scholars have proposed replacing “predatory journals” with more neutral alternatives, such as “questionable journals”. This study recommends using the term “non-recommended journals,” which similarly avoids accusatory language while signaling the need for caution by scholars and institutions. By avoiding direct allegations of unethical conduct, the term "non-recommended" reduces the likelihood of legal repercussions and professional disputes. Adopting this terminology enables researchers and institutions to continue addressing concerns about low-quality or deceptive publishing practices while fostering a more constructive dialogue. This reframing encourages constructive dialogue, broader institutional engagement, and stronger collective efforts to uphold high ethical publishing standards and protect academic integrity. Introduction Since the 1990s, scholarly publishing has undergone a significant transformation from a subscription-based print model to a digital, open-access framework [1]. However, this shift has been accompanied by the rise of unethical and deceptive publishing practices [2]. Predatory journals, typically operating on a ‘pay-to-publish’ model, exploit the open-access system primarily for financial gain, prioritizing profit for their editor–owners rather than maintaining scholarly integrity [3]. In 2019, a panel of scholars and publishers from ten countries established a consensus definition of predatory publishing aimed at protecting the integrity of scholarly communication. According to this definition, predatory journals and publishers are “Entities that prioritize self-interest at the expense of scholarship and are characterized by false or misleading information, deviation from best editorial and publication practices, a lack of transparency, and/or the use of aggressive and indiscriminate solicitation practices” [4]. Such journals often employ unethical practices, including persistent and unsolicited requests for submissions, inadequate or entirely absent peer review despite claims to conduct it, opaque or excessive publication charges, and poor editorial or technical standards. Most importantly, their failure to ensure rigorous peer review threatens the credibility and trustworthiness of the scientific record [4]. The impact of these journals extends across a broad spectrum of researchers, affecting not only readers and early-career, inexperienced, or uninformed scholars, particularly those from developing nations and high- to upper middle-income countries, but also well-established academicians [5,6]. In response, various blacklists, whitelists, and institutional guidelines have been developed to help researchers identify these journals. The continued use of the term "predatory journals" has created conflicts and legal challenges for individuals and organizations addressing these practices. Jeffrey Beall, a librarian at the University of Colorado, curated "Beall's List," a compilation of potential predatory open-access publishers [3]. In 2013, the OMICS Publishing Group, featured on this list, threatened Beall with a 1 billion $ defamation lawsuit, leading him to feel "personally threatened" [7]. Similarly, the Canadian Center of Science and Education accused him of defamation, labeling his list as "actionable libel" and challenging his recommendations against engaging with certain publishers [3]. Importantly, Beall faced online harassment, including websites that attacked his character, labeling him an "academic terrorist" and making unfounded personal accusations [8]. Institutions such as the University of Montreal and initiatives like Cabells Predatory Reports have also faced lawsuits and threats. To mitigate these conflicts, we support the proposal of Kakamad et al. in the 18th general assembly of the European Association of Science Editors (EASE) to replace the term "predatory journals" with "non-recommended journals" [9]. In this article, we examine the historical and linguistic evolution of the term “predatory”, evaluating its institutional and ethical implications, and propose “non-recommended” journals as a pragmatic and defensible alternative. By analyzing the trajectory of terminology and policy responses, we argue that adopting more neutral language can help to protect academic integrity while reducing legal and reputational risks. The Evolution of "Predatory": From Plunder to Modern Exploitation The term "predatory" is deeply associated with exploitation and harm, evolving from its original meaning of physical plundering to its modern usage across various domains, including finance, publishing, and interpersonal interactions. The word "predatory" originates from the Latin "praedator," meaning "plunderer," which comes from "praedare" ("to plunder") and "praeda" ("prey"). Its earliest documented use in English dates to the late 1580s, describing acts of plundering or pillaging. This establishes its historical link to aggressive acquisition and territorial violation. By the 1660s, the term extended to zoology, describing animals that "habitually prey upon other animals." This shift expanded its meaning beyond human acts of looting to natural behaviors in the animal kingdom [10, 11]. The related term "predation" first appeared in the late 15th century as "predacioun," meaning "act of plundering," from the Latin "praedationem" ("a plundering") and "praedari" ("to rob"). The word "predator," specifically referring to an animal that preys on others, entered English in 1862. This relatively late adoption suggests a growing interest in the scientific study of animal behavior. Wiktionary traces "predator" back to the Latin "praedātor," meaning "loot" or "pillage." The word "prey" has an equally long history, dating to the mid-13th century as "preie," meaning "animal hunted for food." It was also used metaphorically to describe "souls captured by Satan" or "goods taken in war," stemming from the Old French "preie" and Latin "praeda," meaning "booty" or "game hunted." This linguistic evolution reinforces the concept of exploitation inherent in the term "predatory" [11, 12] In modern times, "predatory" has expanded to describe unethical or exploitative practices in multiple fields. "Predatory lending" refers to abusive loan terms imposed on vulnerable borrowers, while "predatory pricing" describes pricing strategies intended to eliminate competition. Vocabulary.com defines a predator as "an animal that eats other animals, or people or companies who act like they do," illustrating its figurative application [13, 14]. One of the most significant contemporary uses of "predatory" is in academic publishing. Initially coined by Beall in 2010 [15,16]. Tracing the Origins of Predatory Publishing The issue of what is now recognized as predatory publishing was first addressed as early as 2008. For instance, Gunther Eysenbach wrote a blog post [17], and Katharine Sanderson published an article [18], both discussing the prevalence of low-quality and potentially fraudulent publishing practices. They described such publishers using terms like "black sheep among open-access publishers" [17,18]. Beall’s early works on predatory publishing, all published in the Charleston Advisor, examined and analyzed several publishers. Of the 18 publishers discussed, only one was not categorized as predatory. In his first paper [19], Beall focused on Bentham Open, detailing its practices, such as charging membership and article processing fees, indexing methods, and search functionality on its website. He pointed out that Bentham Open published 236 journals, most of which featured articles that Beall deemed of low quality, suggesting they would likely not have been accepted by higher-tier journals. Because the journals were less than three years old, none yet had an impact factor. Beall concluded that Bentham Open, which entered scholarly publishing in 2007, primarily served as a platform for disseminating research of dubious quality. He argued that the publisher exploited the open access model for financial gain and inundated the scholarly community with substandard and questionable research [19]. In April 2010, Beall published another article, marking the first instance where he introduced the term "predatory" in a scholarly context. This article examined an additional nine publishers, with publication fees varying between $99.95 and $1,699. However, due to the differing pricing structures, direct comparison across all publishers was challenging and four of the nine publishers did not disclose their fees. Each publisher was assessed based on four criteria: Content, User Interface/Searchability, Pricing, and Contract Options. In this article, Beall highlighted that he was not the only one recognizing this emerging trend in academic publishing. He referred to prominent figures in the open access movement, including Stevan Harnad, who had also begun to criticize its implications. Beall cited Harnad’s blog, which discussed the increasing prevalence of rapidly established gold open-access journal networks. These journals often lack substantial scholarly or publishing expertise and primarily rely on aggressive online solicitation [20, 21]. In 2010, Beall published another paper analyzing three additional predatory publishers [22]. Then, in 2012, he expanded his investigation to include five more publishers. Of these, Beall identified four as predatory, while one was deemed legitimate [23]. These four studies collectively examined 18
Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više