Logo

Publikacije (45316)

Nazad
Petra Kovačević, P. Todorović, Nela Kelam, Suzana Konjevoda, Nenad Kunac, Josipa Marin Lovrić, Katarina Vukojević

Simple Summary Eye cancers can damage vision and, in some cases, threaten life. Retinoblastoma mainly affects children, while uveal melanoma is the most common eye cancer in adults. Doctors need better ways to judge how aggressive these tumors are and to find new treatment targets. We examined five proteins that help cells handle nutrients and signals, Megalin, Cubilin, Caveolin-1, GIPC1, and DAB2IP, in normal eye tissue, retinoblastoma, and different forms of choroidal melanoma. Using fluorescent staining, we measured the amount of each protein present, then compared our results with publicly available gene data and patient survival information. Our goal was to learn whether changes in these proteins track with tumor type and outcome. These findings may support the development of future tools for diagnosis, risk prediction, and therapy design in eye cancer.

Damiana Teliti, Olsi Shehu, Dželila Mehanović, Jasmin Kevrić, Bekir Karlik

This paper presents a review of the application of machine learning to face detection in images, with a specific focus on face recognition in digital environments. The primary objectives of this research are to develop and analyze advanced machine learning algorithms to improve face identification accuracy. The study provides a detailed evaluation of several key algorithms, including Convolutional Neural Networks (CNNs) and the MTCNN (Multi-Task Cascaded Convolutional Networks). It also benchmarks the performance of established object detection models, such as Histogram of Oriented Gradients (HOG), Cascaded HAAR, and Maximum Margin Object Detection (MMOD). Through empirical evaluation, the MTCNN (Multi-Task Cascaded Convolutional Networks) algorithm demonstrated superior performance, achieving the highest accuracy and most efficient runtime among the tested models.

Olsi Shehu, Damiana Teliti, Jasmin Kevrić, Samed Jukic, Bekir Karlik

This study presents an empirical benchmarking comparison of two distinct speech-to-text approaches under identical conditions: the Speech Recognition module, which utilizes the online Google Web Speech API, and the offline Wav2Vec model developed by Facebook AI. Both approaches facilitate the transformation of spoken language into written language, although they demonstrate unique characteristics in terms of reliance on the internet, speed, and precision. This study utilizes the LJ Speech dataset, which contains short audio segments of a single reader supplemented by their corresponding transcriptions. Both examined models acquire text from the identical dataset and subsequently assess its similarity to the texts within the dataset. Our analysis reveals that wav2vec outperforms the speech recognition model in both accuracy and performance, suggesting the use of wav2vec in speech-to-speech implementations.

Haris Čapelj, V. Helać, S. Hanjalic

This paper presents an example of an approach to designing and techno-economic analysis of the feasibility for a battery energy storage system based on data from a real consumer in Bosnia and Herzegovina. Trends in electricity consumption of the considered consumer, as well as real location conditions, were taken into account when designing the system. Analytical deduction and decision-making based on possible business models in the local electricity market are presented. Trends in the analysis and assessment of battery system degradation are developed, and a comparison is made from the economic aspect of the feasibility of the system. Conclusions are drawn regarding the use of the system and guidelines for further research are set.

William Cross, Iben Lyskjær, Christopher Davies, Abigail Bunkum, Ana Maia Rocha, Tom Lesluyes, F. Amary, R. Tirabosco et al.

Driver mutations in IDH1 and IDH2 are initiating events in the evolution of chondrosarcoma and several other cancer types. Here, we present evidence that mutant IDH1 is recurrently lost in metastatic central chondrosarcoma. This may reflect either relaxed positive selection for the mutant IDH1 locus, or negative selection for the hypermethylation phenotype later in tumor evolution. This finding highlights the challenge for therapeutic intervention by mutant IDH1 inhibitors in chondrosarcoma.

Abstract Introduction Peritoneal lymphangiomatosis is a rare benign lymphatic disorder with diagnostic and therapeutic challenges. It may mimic peritoneal carcinomatosis or mesothelioma, often requiring histological confirmation. Management options are limited, and long-term data on targeted therapies, including sirolimus, remain scarce. Case Presentation We present the case of a 45-year-old woman with a history of surgically corrected atrial septal defect, who developed progressive abdominal distension and dysuria in May 2014. Abdominal ultrasound and contrast-enhanced abdominal computed tomography revealed diffuse ascites, peritoneal thickening, and cystic changes. Diagnostic uncertainty led to an exploratory laparotomy in May 2015, where histopathology confirmed peritoneal lymphangiomatosis. After failed conservative management including dietary modification, diuretic therapy, and repeated paracenteses, she was started on sirolimus 2 mg/day in August 2016. Her serum trough levels were maintained between 5 and 15 ng/mL. She achieved a Karnofsky Performance Score of 100% (indicating full functional capacity) within 2 months and has remained in complete clinical and radiologic remission for over 8 years. Diabetes mellitus type 2 was diagnosed during follow-up and is well controlled with insulin therapy. Conclusion This case underscores the difficulty of diagnosing peritoneal lymphangiomatosis and highlights the transformative potential of sirolimus therapy. To our knowledge, this is one of the longest documented remissions of peritoneal lymphangiomatosis under mechanistic target of rapamycin (mTOR) inhibition.

Naomi Iris van den Berg, Matouš Elphick, Kevin Mulder, Omar Bouricha, O. Sadeghi-Alavijeh, Xiao Fu, S. Turajlic

Classical models of cancer focus on tumour-intrinsic genetic aberrations and immune dynamics and often overlook how the metabolic environment of healthy tissues shapes tumour development and immune efficacy. Here, we propose that tissue-intrinsic metabolic intensity and waste-handling capacity act as an upstream gatekeeper of anti-tumour immunity, determining whether immune infiltration translates into effective immune function and safeguards the tissue from tumourigenesis. Across human cancers, tumours arising in high-metabolism tissues – like kidney, brain, and eye – tend to show high T cell infiltration but poor prognosis, suggesting pre-existing metabolic environments prior to malignant transformation may undermine immune function. This pattern is mirrored across species: large mammals with lower mass-specific metabolic rates (e.g., elephants, whales) accumulate fewer metabolic byproducts and show lower cancer incidence (Peto’s paradox), while long-lived small mammals like bats and naked mole-rats resist tumourigenesis via suppressed glycolysis or altered hypoxia responses leading to lower metabolic rates and/or byproduct accumulation. Through integrative synthesis spanning human single-cell expression data and cross-species comparisons, we outline a framework of “immunometabolic gatekeeping,” where tissues with high metabolic rate and poor waste clearance foster immune-exhausting niches even before transformation. This unifying framework reconciles multiple paradoxes in cancer biology: Peto’s paradox, T cell infiltration non-prognosticity, tissue tropisms, sex-based inequalities, and size-based tipping points (e.g., the 3 cm rule in ccRCC), and suggests new principles for identifying high-risk patients and metabolic-immune combination strategies for prevention and treatment. By shifting focus from tumour-intrinsic mutations to host-tissue metabolism, this work offers a novel, integrative lens on cancer vulnerability and immune failure.

Almir Fajkić, Andrej Belančić, Yun Wah Lam, Valentino Rački, K. Pilipović, Tamara Janković, Silvestar Mežnarić, J. Mršić-Pelčić et al.

Spinal muscular atrophy (SMA) has transitioned from a uniformly fatal disease to a treatable condition, yet incomplete neuromuscular recovery underscores the limits of current SMN-restorative therapies. Emerging data implicate disrupted axon-to-muscle exosomal signaling as an important, overlooked driver of residual dysfunction. Exosomes, nanovesicles mediating bidirectional neuronal-muscular communication, carry synaptic organizers, trophic factors, and microRNAs essential for neuromuscular junction integrity. SMN deficiency alters exosomal biogenesis and cargo, leading to loss of agrin-MuSK signaling, impaired β-actin transport, and muscle atrophy. Comparative insights from amyotrophic lateral sclerosis and muscular dystrophy reveal that stem-cell-derived or engineered exosomes restore synaptic stability, enhance regeneration, and cross biological barriers safely. Thus, we speculate herein on a translational model integrating exosome-based therapies with existing genetic interventions to achieve durable, systems-level recovery in SMA. Exosomal profiling may further yield minimally invasive biomarkers for disease monitoring and treatment optimization, establishing vesicle-mediated communication as a novel therapeutic axis in neuromuscular medicine.

N. Goran, Semir Ibrahimović, Elma Avdagić-Golub

The expansion of telecommunication access networks is constrained by static planning methods unable to process diverse, dynamic data. To address this, we propose a novel Multi-Agent System (MAS) where autonomous, domain-specialized AI agents collaboratively evaluate criteria for network expansion. The framework uniquely integrates structured and geospatial data with insights from unstructured documents via a Retrieval-Augmented Generation (RAG) component and synthesizes the agents' collective findings using the Analytic Hierarchy Process (AHP) to transparently weigh decision factors. This work provides a scalable, explainable, and methodologically robust framework for dynamic network planning.

Frederick M. Tiesenga, Daniel Rodger, Benjamin Saracco, Baichang Zhong, Andrea Cortegiani, Sjaak Pouwels, R. Q. Salih, Ayman M. Mustafa et al.

Abstract The term "predatory journals" is widely used to describe publishing practices that exploit authors, compromise research quality, and mislead readers. Its use, however, has frequently led to legal threats and professional conflicts for individuals and institutions who call out such deceptive practices.  Most notably, Jeffrey Beall, the creator of Beall’s List, faced legal threats and personal harassment, which ultimately led him to discontinue his work. To address these challenges, scholars have proposed replacing “predatory journals” with more neutral alternatives, such as “questionable journals”. This study recommends using the term “non-recommended journals,” which similarly avoids accusatory language while signaling the need for caution by scholars and institutions. By avoiding direct allegations of unethical conduct, the term "non-recommended" reduces the likelihood of legal repercussions and professional disputes. Adopting this terminology enables researchers and institutions to continue addressing concerns about low-quality or deceptive publishing practices while fostering a more constructive dialogue. This reframing encourages constructive dialogue, broader institutional engagement, and stronger collective efforts to uphold high ethical publishing standards and protect academic integrity. Introduction Since the 1990s, scholarly publishing has undergone a significant transformation from a subscription-based print model to a digital, open-access framework [1]. However, this shift has been accompanied by the rise of unethical and deceptive publishing practices [2]. Predatory journals, typically operating on a ‘pay-to-publish’ model, exploit the open-access system primarily for financial gain, prioritizing profit for their editor–owners rather than maintaining scholarly integrity [3]. In 2019, a panel of scholars and publishers from ten countries established a consensus definition of predatory publishing aimed at protecting the integrity of scholarly communication. According to this definition, predatory journals and publishers are “Entities that prioritize self-interest at the expense of scholarship and are characterized by false or misleading information, deviation from best editorial and publication practices, a lack of transparency, and/or the use of aggressive and indiscriminate solicitation practices” [4]. Such journals often employ unethical practices, including persistent and unsolicited requests for submissions, inadequate or entirely absent peer review despite claims to conduct it, opaque or excessive publication charges, and poor editorial or technical standards. Most importantly, their failure to ensure rigorous peer review threatens the credibility and trustworthiness of the scientific record [4]. The impact of these journals extends across a broad spectrum of researchers, affecting not only readers and early-career, inexperienced, or uninformed scholars, particularly those from developing nations and high- to upper middle-income countries, but also well-established academicians [5,6]. In response, various blacklists, whitelists, and institutional guidelines have been developed to help researchers identify these journals. The continued use of the term "predatory journals" has created conflicts and legal challenges for individuals and organizations addressing these practices. Jeffrey Beall, a librarian at the University of Colorado, curated "Beall's List," a compilation of potential predatory open-access publishers [3]. In 2013, the OMICS Publishing Group, featured on this list, threatened Beall with a 1 billion $ defamation lawsuit, leading him to feel "personally threatened" [7].  Similarly, the Canadian Center of Science and Education accused him of defamation, labeling his list as "actionable libel" and challenging his recommendations against engaging with certain publishers [3]. Importantly, Beall faced online harassment, including websites that attacked his character, labeling him an "academic terrorist" and making unfounded personal accusations [8]. Institutions such as the University of Montreal and initiatives like Cabells Predatory Reports have also faced lawsuits and threats. To mitigate these conflicts, we support the proposal of Kakamad et al. in the 18th general assembly of the European Association of Science Editors (EASE) to replace the term "predatory journals" with "non-recommended journals" [9]. In this article, we examine the historical and linguistic evolution of the term “predatory”, evaluating its institutional and ethical implications, and propose “non-recommended” journals as a pragmatic and defensible alternative. By analyzing the trajectory of terminology and policy responses, we argue that adopting more neutral language can help to protect academic integrity while reducing legal and reputational risks. The Evolution of "Predatory": From Plunder to Modern Exploitation The term "predatory" is deeply associated with exploitation and harm, evolving from its original meaning of physical plundering to its modern usage across various domains, including finance, publishing, and interpersonal interactions. The word "predatory" originates from the Latin "praedator," meaning "plunderer," which comes from "praedare" ("to plunder") and "praeda" ("prey"). Its earliest documented use in English dates to the late 1580s, describing acts of plundering or pillaging. This establishes its historical link to aggressive acquisition and territorial violation. By the 1660s, the term extended to zoology, describing animals that "habitually prey upon other animals." This shift expanded its meaning beyond human acts of looting to natural behaviors in the animal kingdom [10, 11]. The related term "predation" first appeared in the late 15th century as "predacioun," meaning "act of plundering," from the Latin "praedationem" ("a plundering") and "praedari" ("to rob"). The word "predator," specifically referring to an animal that preys on others, entered English in 1862. This relatively late adoption suggests a growing interest in the scientific study of animal behavior. Wiktionary traces "predator" back to the Latin "praedātor," meaning "loot" or "pillage." The word "prey" has an equally long history, dating to the mid-13th century as "preie," meaning "animal hunted for food." It was also used metaphorically to describe "souls captured by Satan" or "goods taken in war," stemming from the Old French "preie" and Latin "praeda," meaning "booty" or "game hunted." This linguistic evolution reinforces the concept of exploitation inherent in the term "predatory" [11, 12] In modern times, "predatory" has expanded to describe unethical or exploitative practices in multiple fields. "Predatory lending" refers to abusive loan terms imposed on vulnerable borrowers, while "predatory pricing" describes pricing strategies intended to eliminate competition. Vocabulary.com defines a predator as "an animal that eats other animals, or people or companies who act like they do," illustrating its figurative application [13, 14]. One of the most significant contemporary uses of "predatory" is in academic publishing. Initially coined by Beall in 2010 [15,16]. Tracing the Origins of Predatory Publishing The issue of what is now recognized as predatory publishing was first addressed as early as 2008. For instance, Gunther Eysenbach wrote a blog post [17], and Katharine Sanderson published an article [18], both discussing the prevalence of low-quality and potentially fraudulent publishing practices. They described such publishers using terms like "black sheep among open-access publishers" [17,18]. Beall’s early works on predatory publishing, all published in the Charleston Advisor, examined and analyzed several publishers. Of the 18 publishers discussed, only one was not categorized as predatory. In his first paper [19], Beall focused on Bentham Open, detailing its practices, such as charging membership and article processing fees, indexing methods, and search functionality on its website. He pointed out that Bentham Open published 236 journals, most of which featured articles that Beall deemed of low quality, suggesting they would likely not have been accepted by higher-tier journals. Because the journals were less than three years old, none yet had an impact factor. Beall concluded that Bentham Open, which entered scholarly publishing in 2007, primarily served as a platform for disseminating research of dubious quality. He argued that the publisher exploited the open access model for financial gain and inundated the scholarly community with substandard and questionable research [19]. In April 2010, Beall published another article, marking the first instance where he introduced the term "predatory" in a scholarly context. This article examined an additional nine publishers, with publication fees varying between $99.95 and $1,699. However, due to the differing pricing structures, direct comparison across all publishers was challenging and four of the nine publishers did not disclose their fees. Each publisher was assessed based on four criteria: Content, User Interface/Searchability, Pricing, and Contract Options. In this article, Beall highlighted that he was not the only one recognizing this emerging trend in academic publishing. He referred to prominent figures in the open access movement, including Stevan Harnad, who had also begun to criticize its implications. Beall cited Harnad’s blog, which discussed the increasing prevalence of rapidly established gold open-access journal networks. These journals often lack substantial scholarly or publishing expertise and primarily rely on aggressive online solicitation [20, 21]. In 2010, Beall published another paper analyzing three additional predatory publishers [22]. Then, in 2012, he expanded his investigation to include five more publishers. Of these, Beall identified four as predatory, while one was deemed legitimate [23]. These four studies collectively examined 18

Dževad K. Kozlica, Stefan Ilic, Justin G. Connell, Jordi Cabana

Non-aqueous rechargeable metal-air batteries are very attractive for energy storage due to their high theoretical specific energies compared to state-of-the art Li-ion batteries. While Li-O 2 batteries are often seen as the primary alternative, Na-O 2 cells offer advantages over their lithium counterparts due to more reversible chemistry. Since the (electro)chemistry of this system is still in its infancy, one aspect we address is the stability of the aprotic electrolytes due to the high oxidation and reduction potentials in the operating environment. There is intrinsic disparity in understanding the interfaces at atomic/molecular level in organic-based solvents. This is partly due to the previously used poorly defined, polycrystalline, and/or high-surface area electrode materials in organic electrolytes containing trace levels of impurities. By employing electrochemical and in situ surface characterization methods on well-defined metal single crystal surfaces, we establish the stability range and reveal the decomposition products. Additionally, we demonstrate the impact of impurities on interfacial properties in organic environments, adding another piece to the overall understanding of selected aprotic electrolyte stability. We believe that this fundamental insight provides a pathway for the rational design of stable organic electrolytes, which are essential for the development of high-capacity sodium-air batteries. ___________________ The submitted manuscript has been created by UChicago Argonne, LLC, Operator of Argonne National Laboratory (“Argonne”). Argonne, a U.S. Department of Energy Office of Science laboratory, is operated under Contract No. DE-AC02-06CH11357. The U.S. Government retains for itself, and others acting on its behalf, a paid-up nonexclusive, irrevocable worldwide license in said article to reproduce, prepare derivative works, distribute copies to the public, and perform publicly and display publicly, by or on behalf of the Government. The Department of Energy will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan. http://energy.gov/downloads/doe-public-access-plan

J. Peterková, J. Zach, Vítězslav Novák, A. Korjenic, J. Schabauer, Abdulah Sulejmanovski

The indoor environment of buildings is of fundamental importance for the health of people and other living organisms residing in them. From this perspective, key factors include indoor temperature, relative humidity and the concentration of CO2 or other pollutants. These healthy indoor conditions are typically maintained through functional heating and ventilation systems. However, in the case of indoor humidity, increasing moisture levels when they are low can be relatively challenging. There are more energy-efficient solutions that can be combined with ventilation systems. These include, for example, placing plants and green walls in the interior, which have a significant impact not only on microclimatic and acoustic conditions of the interior, but also on the overall psychological well-being of occupants. Green elements contribute to the effective regulation of CO2 and certain other harmful substances within the indoor environment. Another possible solution involves the use of sorption-active materials in the form of cladding panels—elements capable of functioning as indoor regulators, i.e., absorbing moisture and releasing it back into the indoor environment when necessary. This study investigates the moisture behavior of natural composites based on montmorillonite clay and straw fibers, as well as their possible integration with green elements to create healthy indoor conditions for their inhabitants. The developed clay composite can be classified as water and steam absorption class WSIII according to DIN 18948—the moisture buffering capacity value was 152.73 g/m2 after 12 h. Based on the research results, it can be stated that these composites could serve as interior cladding elements in synergy with green elements (Chlorophytum comosum, Epipremnum aureum), ideally regulating the indoor microclimatic conditions, especially as an effective solution for short-term humidity changes. The maximum difference in relative humidity between the reference testing chamber (without green elements and clay plates) and the chamber containing plant Chlorophytum comosum and three clay composite plates was 23.04%.

Elmin Omičević, S. Nicolosi

Shared administration – EU migration agencies – The European Border and Coast Guard Agency Frontex – European Integrated Border Management and responsibility gaps – Unclear division of obligations in Frontex’s mandate – EU composite legal order and limits of EU judicial remedies – National courts and the right to effective judicial protection under Article 19(1) TEU and Article 47 Charter – Domestic judges as European judges – Advantages and potential of domestic remedies in multi-actor situations – Importance of preliminary references in shared administration– Domestic adjudication of human rights violations in European Integrated Border Management – Adjudication on member state responsibility – Adjudication on individual responsibility – Strengthening domestic judicial systems.

Aleksandra Anđelković, Marija Radosavljević, Sandra Milanović Zbiljić, Saša Petković, Stojan Debarliev, Perseta Grabova

This article explores experts’ perspectives on the most important soft skills for entrepreneurial success in the Western Balkans (WB) and identifies effective educational and workplace practices to foster these skills. Using a qualitative Delphi study supported by a literature review, the research gathered and synthesized opinions from 20 experts representing Serbia, Albania, North Macedonia, and Bosnia and Herzegovina. Findings show that communication, adaptability, flexibility, teamwork, and critical thinking are essential for business success, while leadership, emotional intelligence, problem-solving, and teamwork are considered most vital for future entrepreneurs. Experts emphasized that group projects, specialized courses, and blended learning approaches are effective in educational settings, while workplace skill development benefits from training programs, mentoring, active communication, and openness to feedback. This study provides region-specific insights into skill-building strategies for young entrepreneurs, addressing a key research gap. By integrating expert consensus with evidence-based practices, the article offers a framework for educators, policymakers, institutions, and businesses to strengthen entrepreneurship education and workforce readiness across the WB region.

Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više