Robots in future-ready schools. Case study: Robot Pepper at Primary School Savremena | Author : Valentin Kuleto, Milena Ilic, Maja Babic, Zorana Bodiroga, Andrijana Mladenovic | Abstract | Full Text | Abstract :Machine learning will be a component of the future learning environment. Robots may provide integrated knowledge to elementary, high school, and college or university students by merging human learning components with robotics. For example, teachers can use humanoid robots to converse with students remotely, which is considered a step above telepresence. A teacher can remotely attend a class through a display in this example. Currently, classrooms use robots to assist teachers rather than entirely replace them. However, colleges and universities will use robots instead of instructors in the future. The voice recognition software on the robots helps them understand what their human counterparts are saying. This increases the reading and understanding abilities of robots. Robot instructors are also equipped with projectors, which allow them to convey things in an entertaining way, piquing student interest.Social robots and educational robots may be employed to train students soon, but at the present time, they are in use only in future-ready schools. We will present one such school through a case study. |
| Disaster recovery plan in case of business interruption and data loss | Author : Goran Bogosavljevic | Abstract | Full Text | Abstract :Today, data is generated in large quantities. We know that cloud computing is a new type of computing platform in today’s world. This type of computing generates a large amount of private data in the cloud. Therefore, the need for data recovery services is growing day by day and requires the development of efficient and effective data recovery techniques. The purpose of this paper is to present the recovery techniques and help the user collect information from any backup server when the server has lost its data and is unable to provide data to the user. This paper will also discuss several cloud recovery techniques that are used to protect data and continue business operations in case of an unexpected interruption or a disaster, either a natural one or one caused by human error or deliberate action. |
| Designing and implementing the “Education Support” web application using Spring and Hibernate frameworks | Author : Vladimir Boškovic, Svetlana Jevremovic | Abstract | Full Text | Abstract :In this paper, we present the process of developing and implementing the web application “Education Support” using Spring and Hibernate frameworks. The objective of the paper is to explore the modes of designing and implementing this web application that aims to provide an accessible way of searching and selecting between various educational institutions, as well as to provide an easy way for educational institutions to communicate with their potential clients. This application aims to enable users to collect information, plan ahead and secure their enrolment with special benefits. Educational institutions would benefit from this app business-wise, thanks to having an efficient and user-friendly list of their subscribers, along with a list of the requests to schedule an informative visit to their institution, with the option to send promotional messages to users. We chose this subject as we noted that no such web application is available on our market. We have applied Larman’s methodology in each development phase of this web application. |
| Protection and security risk management, a proposal of cryptologic measures and solutions for Vesimpex company | Author : Ivan Jovanovic, Milosav Majstorovic, Hana Stefanovic | Abstract | Full Text | Abstract :The subject of this paper comprises the creation of an associative concept network in the realm of security management, and the application of cryptography through secondary research, along with perceiving the importance of security in a concrete organisation through primary research. The objective is to formulate, based on the analysis of a specific company, a proposal regarding security and cryptology measures to advance the security system of a company. The basic principles of information security of small and medium-sized enterprises, along with the application of adequate security algorithms based on a one-time pad (OTP) and visual cryptography (VC) are utilised for the design of a complete solution for the company in question. Alongside its theoretical foundation, the paper contains information about the company itself, collected through observation, note-taking and content analysis, as well as the process of creating the security solution incorporated into the project charter, and the solution itself. |
| Experiences and Recommendations regarding Cloud Cryptocurrencies | Author : Simo Jakovic, Dragana Petrovic | Abstract | Full Text | Abstract :Cryptocurrencies have been gaining incredible popularity in recent years. Their number has grown from a single cryptocurrency to several thousand, and the peak was reached in the period between 2021 and 2022 when the number of cryptocurrencies doubled to over 12,000. Many cryptocurrencies exist only to make money for their creators. The emergence of cryptocurrencies has changed the way in which people store money, invest, and pay for products and services. The number of companies that support payments in cryptocurrency is increasing, although there is still resistance from some countries to this method of payment. The paper explains how cryptocurrencies can be used, stored, and what cloud storage methods are currently available. It also provides a brief description of technologies that are used to create cryptocurrencies. The second part provides an overview of the profitability of cryptocurrencies, explains whether it is actually profitable to invest in this form of “digital gold”, and presents the best options for mining cryptocurrencies. |
|
|