Svetla B. PANAYOTOVA, Minka M. YORDANOVA, Živorad VASIĆ
The authors of the current report aim to present the importance of communication for effective organization management. In order to achieve the formulated goal we have considered the communication process and its stages; we have analyzed the types of communication used to achieve effective communication between different managerial levels in an organization.
Milan ANDRIĆ, Marko ARSENOVIĆ, Srđan SLADOJEVIĆ, Darko STEFANOVIĆ, Anderla ANDRAŠ, Dubravko ĆULIBRK
In the contemporary business world, the usage of information technologies and all the benefit it offers is implied, regardless of the branch of business. This paper deals with the detailed description of the application that serves as a part of a system used for electronic recording of work hours, business activities of the employees, as well as the tracking of business processes. The application covers all types of businesses, and therefore has a wide usage in all companies, without limitations. The application was developed in the ASP.NET technology and relies on a Microsoft SQL Server database. The system was developed for Windows IIS server deployment. Besides the application, the system includes a device based on a general packet radio service (GPRS) module with a Radio Frequency Identification (RFID) module attached. The device sends information to the server that uses an analyzer to parse the data and to store them in the database. This paper contains the description of the RFID technology and a description of the technologies used for the development of the web application.
Miroslav CVETANOVSKI, Petar BJELJAC, Igor ZEČEVIĆ, Sabolč HORVAT, Miroslav NIĆIN
The purpose of this article is to give an overview of principals, technologies and aspects used in building the security around Banking kiosks services. The study is based on ATM banking kiosk built and deployed in Serbia’s payment system. The evermore use of information technologies and automated teller machines (ATMs), that are located on remote and not so physically secure locations, require additional levels of security. Linking physical, networking, procedural, surveillance, logging, testing, integration with third party services, debugging, encryption and infrastructure redundancy is essential in today’s secure payment process.
Miloš ILIĆ, Petar SPALEVIĆ, Mladen VEINOVIĆ, Wejdan SAED ALATRESH
One of the biggest challenges for higher education today is to predict the paths of students through the educational process. Institutions would like to know, which students will need assistance in order to finish course successfully. Successful students’ result prediction in early course stage depends on many factors. Data mining techniques could be used for this kind of job. Based on collected students’ information, different data mining techniques need to be used. For the purpose of this research WEKA data mining software was used for the prediction of final student mark based on parameters in two different datasets. Each dataset contains information about different students from one college course in the past fourth semesters. Student data from the last semester are used for test dataset.
Dijana ILIŠEVIĆ, Nataša BANOVIĆ-ĆURGUZ
The ultimate goal of communication in future digital world is reliable, anytime-anywhere connection, and is got to be fast. Expectations from future networks will only rise, and there must be key strategic planning issues that must conceder today as we prepare for sustainable and ever – changing future. Connected world is creating major challenges for telco sector. This article presents basic principals for evolution towаrd a transport network ready to support new service model (cloud services which are hosted in data centers with architecture providing lower cost per bit).