Logo

Publikacije (45999)

Nazad
Erwan Sallard, Katarzyna Niespodziana, Maja Bajić, T. Schlederer, P. Errhalt, A. Behrendt, Stefan Wirth, A. Meyer-Bahlburg et al.

Rhinoviruses (RV) account for a significant number of asthma exacerbations, and RV species C may be associated with a severe course in vulnerable patient groups. Despite important evidence on the role of RV reported by clinicians and life scientists, there are still unanswered questions regarding their influence on asthma exacerbation in young patients. Thus, we measured the RVspecies-specific IgG titers in our German pediatric exacerbation cohort using a microarray-based technology. For this approach, human sera of patients with exacerbated asthma and wheeze, as well as healthy control subjects (n = 136) were included, and correlation analyses were performed. Concordantly with previously published results, we observed significantly higher cumulative levels of RV species A-specific IgG (p = 0.011) and RV-C-specific IgG (p = 0.051) in exacerbated asthma group compared to age-matched controls. Moreover, atopic wheezers had increased RV-specific IgG levels for species A (p = 0.0011) and species C (p = 0.0009) compared to non-atopic wheezers. Hypothesizing that bacterial infection positively correlates with immune memory against RV, we included nasopharyngeal swab results in our analyses and detected limited correlations. Interestingly, the eosinophil blood titer positively correlated with RV-specific IgG levels. With these observations, we add important observations to the existing data regarding exacerbation in pediatric and adolescent medicine. We propose that scientists and clinicians should pay more attention to the relevance of RV species in susceptible pediatric patients.

Elmedina Avdibasic, Amanzholova Saule Toksanovna, B. Duraković

Cybersecurity is an important topic for Industry 4.0, which will face a lot of non-traditional challenges before it can be fully implemented to help society. The objective of the study is to recognize recent cybersecurity trends, newly occurring threats and challenges as well as their potential solutions. The articles reviewed in the paper are found through science direct, Scopus, Semantic scholar and google scholar. After reviewing them, ideas from articles were grouped together to show how different articles had similar thoughts. Through the analysis of 70 articles, it was found that cybersecurity still needs a lot of improvement in order to efficiently implement Industrial Internet of Things (IIoT), especially since many articles underline the need for security-by-design approach, followed by regular updating. Key challenges are lack of awareness and security experts, increased cybercriminal and the fact that the chain is as only as strong as its weakest point. Some of the most important solutions include incorporating security into design, stronger encryption, regular updates to patch vulnerabilities and good prevention and detection mechanisms. Once cybersecurity challenges are overcome, Industry 4.0 will be able to bloom to its full extent.

Abstract COVID-19 had undoubtedly speeded up adoption of digital technologies. Most of the theoreticians agree that changes that happened in the pandemic period would not happen in the next several years or even decades. There is almost no business operation that has not been affected by the pandemic, from customer relation and sales to supply chain. It influenced different business sectors leaving permanent change and making a significant proportion of organizations working in at least hybrid mode: combining digital and traditional pre-pandemic ways of working. COVID-19 had significantly changed the workplace and way of working. Workplace has shifted to digital or at least hybrid and employees and companies have adopted new ways of working, including usage of digital technologies but also accepting more agile and flexible procedures and rules. The research community has followed this phenomenon and tried to provide best possible recommendation to it accordance to recognized research methods. The paper provides a systematic literature review of the most significant scientific and industry publication in the years after the pandemic start. It is based on Kitchenham methodology of the systematic review with selected publication from recognized bibliographic databases. First part provides general effects of the pandemic to digital transformation of businesses all over the globe, mostly connected to analysis of the employees’ workplace preference. The second part is focused on digital workplace transformation and presents key theoretical and professional findings in the post-pandemic workplace. This part is consisted of the preview of benefits of the digital workplace transformation, identification of critical success factors and the most significant challenges of the process.

Faruk Pasic, Stefan Pratschner, R. Langwieser, C. Mecklenbräuker

Next-generation intelligent transportation systems require a communication technology that can satisfy high demands in terms of latency and reliability. One of the promising communication technologies to satisfy such demands is the fifth-generation (5G) new radio (NR) for the vehicle-to-everything (V2X). To support the development of NR-V2X systems in the 5.9 GHz band, it is essential to perform channel measurements in high-mobility scenarios. High-mobility scenarios in the 5.9 GHz band have been well investigated through drive-by measurement campaigns. Although such measurements deliver real-world results, they do not allow for controlled experiments. To investigate propagation characteristics of the 5.9GHz band, we perform controllable and repeatable channel measurements at different velocities (25, 50, 100 and 125 km/h) in an urban environment. Furthermore, we compare measured wireless channels in terms of the normalized average local scattering function.

Yusuf Korkmaz, Alvin Huseinović, Halil Bisgin, S. Mrdović, S. Uludag

Similar to any spoof detection systems, power grid monitoring systems and devices are subject to various cyberattacks by determined and well-funded adversaries. Many well-publicized real-world cyberattacks on power grid systems have been publicly reported. Phasor Measurement Units (PMUs) networks with Phasor Data Concentrators (PDCs) are the main building blocks of the overall wide area monitoring and situational awareness systems in the power grid. The data between PMUs and PDC(s) are sent through the legacy networks, which are subject to many attack scenarios under with no, or inadequate, countermeasures in protocols, such as IEEE 37.118-2. In this paper, we consider a stealthier data spoofing attack against PMU networks, called a mirroring attack, where an adversary basically injects a copy of a set of packets in reverse order immediately following their original positions, wiping out the correct values. To the best of our knowledge, for the first time in the literature, we consider a more challenging attack both in terms of the strategy and the lower percentage of spoofed attacks. As part of our countermeasure detection scheme, we make use of novel framing approach to make application of a 2D Convolutional Neural Network (CNN)-based approach which avoids the computational overhead of the classical sample-based classification algorithms. Our experimental evaluation results show promising results in terms of both high accuracy and true positive rates even under the aforementioned stealthy adversarial attack scenarios.

Nikola Prvulovic, S. Pantelić, R. Stanković, Saša Bubanj

Plyometric movement improves athletes’ muscular performance and is used in the plyometric training method as an unavoidable principle of explosive power and speed development training. The aim of this study is to determine the effects of plyometric programs on biomechanical parameters, including any differences between them. The study focused on three sports, junior age group athletes, and was based on a systematic analysis of previous results. Electronic databases such as PubMed, MEDLINE, Google Scholar, ScienceDirect, ERIC were searched for studies from 1999 to 2022. The results from 15 studies are summarized in detail. They show the positive effects of the plyometric programs on biomechanical parameters equally in the three sports. Training duration ranges from 20 to 90 min, and is directly related to the intensity of training and the number of jumps. Shorter sessions are of very high intensity with fewer jumps, while longer sessions are moderate and high intensity with fewer jumps (more than 138 to more than 2976). The most frequent training duration is 45 to 60 min, with high intensity and 600 to 900 different jumps. Greater improvements in explosive power and speed are seen in the parameters of sprint and jump tests. High intensity programs lasted from seven to 12 weeks, with a frequency of two to four times a week (СМЈ 6,2% to 16,9%, while for SJ 7,6% to 19,8%), while lower intensity programs lasted from three to six weeks (СМЈ 6,3% to 9,1%, and for SJ 6,6% to 8,9%). It is concluded that longer programs, of a moderate and high intensity and training sessions from 45 to 60 min, enable the best progress, regardless of sport.

Campylobacter jejuni and C. coli are contaminants of broiler skin, and in unauthorized numbers cause campylobacteriosis in consumers where symptoms range from gastrointestinal to life-threatening. The number of chicken bacteria and their genetic diversity depend on the growing conditions, and the presence of antibiotic resistance genes is the result of irrational use of antibiotics. The purpose of this paper is to point out the importance of reducing the contamination of Campylobacter spp. in broiler production as well as the importance of the rational use of antibiotics in the production of broilers with a contribution to the prevention of the spread of campylobacteriosis and antibiotic resistance. The incidence of campylobacteriosis can be prevented by the concept of Hazard Analysis Critical Control Point (HACCP) in broiler production and the use of probiotics as biological preservatives in broiler meat. The spread of antibiotic resistance genes can be reduced by prohibition of antibiotic use for   prophylaxis and only permitted for medication.

Belma Ramic-Brkic, B. Mijatovic, Faik Ćatibušić, Emina Mekic

Research has shown that technology promotes learning environments that stimulate improved learning performance, learners satisfaction and completion rates. Virtual reality (VR) is a computer-generated environment with scenes and objects that look and feel real, making the user feel immersed in that world. This immersion provides learning and training opportunities in a variety of areas. This paper aims to investigate the perceived usefulness, ease of use and impression of the presented solution and whether it can improve the safety and effectiveness of field demining missions. A focus group study was conducted. The findings of the study are very positive, and show an affirmative attitude towards the use of the presented application for the purpose of educating and training new deminers.

A. Rezazadeh Ardabili, S. Jeuring, Z. Mujagic, L. Oostenbrug, M. Romberg-Camps, D. Jonkers, A. V. van Bodegraven, M. Pierik

our study concerning the long- term effectiveness and safety of thiopurine monotherapy in bowel the benefit– risk balance of thiopurines in real- practice and observed that thiopurine monotherapy durable for patients IBD, A reassuring prolonged effectiveness at 5 and 10 years after therapy

S. Rizvić, B. Mijatovic, Dusanka Boskovic, I. Ivkovic-Kihic

A rapid increase in development and use of Extended Reality applications for all areas of life is expected in metaverse age. Many museums are in the last decade introducing digital content in their exhibitions. They hired digital curators to establish connection with developers and IT industry. Extended Reality technologies enable museum visitors to experience the topics of exhibitions, see original appearances of exhibits and travel to the past through Virtual Reality headsets or Augmented Reality applications on mobile devices. In this paper we show an example of good practice, describing the application Battle on Neretva VR installed in the Museum in Jablanica, Bosnia and Herzegovina. We present the application design and development workflow and show the impressions of museum management and visitors after introducing it in the exhibition. This workflow can be replicated to any museum topic or collection.

Fikret Basic, C. Steger, C. Seifert, R. Kofler

With the advent of clean energy awareness and systems that rely on extensive battery use, Battery Management Systems (BMSs) have seen an increased inclusion in modern complex systems like electric vehicles and power grids. This has presented a new set of security-related challenges. Security concerns arise when BMSs are intended to extend their communication with external systems, as their interaction can leave many backdoors open that potential attackers could exploit. Consequently, we explore and propose a security architecture solution intended for the authentication and session key establishment between BMS and other system devices. The aim of the proposed architecture is to be applicable in different industrial settings and systems, while at the same time keeping the design lightweight in nature. To achieve this, we use the implicit certificates with the ECQV schema. We show the applicability of the design through a security and performance analysis of our implemented test setup.

Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više