STATISTICAL ANALYSIS OF TEXTS OF THE BALKANS ELECTRONIC MEDIA COLUMNISTS
![](https://jita-au.com/wp-content/uploads/2024/03/cover_issue_949_en_US.jpg)
Vol. 9 No. 1 (2019): JITA – APEIRON Nedim Smailović Statistical Analysis of Texts of the Balkans Electronic Media Columnists Original scientific paper DOI:https://doi.org/10.7251/JIT1901005S Download Article PDF Abstract This paper presents results of statistical analysis of some segments in texts of the four columnists in the Balkans electronic media: Bosnia and Herzegovina – Dnevni avaz […]
ANALYSIS OF USING CLOUD BUSINESS IN BOSNIA AND HERZEGOVINA AND THE REGION
![](https://jita-au.com/wp-content/uploads/2024/03/cover_issue_949_en_US.jpg)
Vol. 9 No. 2 (2019): JITA – APEIRON Mihajlo Travar, Igor Dugonjić, Saša Ristić ANALYSIS OF USING CLOUD BUSINESS IN BOSNIA AND HERZEGOVINA AND THE REGION Original scientific paper DOI:https://doi.org/ 10.7251/JIT1902118T Download Article PDF Abstract Cloud business is the basic support to operations of modern companies. It enables companies to be more agile and innovative. […]
DESIGN, DEVELOPMENT AND IMPLEMENTATION OF DATABASES IN PHARMACEUTICAL AND MEDICINE
![](https://jita-au.com/wp-content/uploads/2024/03/cover_issue_949_en_US.jpg)
Vol. 9 No. 2 (2019): JITA – APEIRON Boris Kovačić, Nedim Smailović DESIGN, DEVELOPMENT AND IMPLEMENTATION OF DATABASES IN PHARMACEUTICAL AND MEDICINE Original scientific paper DOI:https://doi.org/ 10.7251/JIT1902106K Download Article PDF Abstract This paper presents the design and implementation of databases in pharmacy, points out the most common problems that may be encountered, and describes practical […]
REDUCTION OF ICT SECURITY RISKS USING LEVEL BASED APPROACH
![](https://jita-au.com/wp-content/uploads/2024/03/cover_issue_949_en_US.jpg)
Vol. 9 No. 2 (2019): JITA – APEIRON Ivo Džakula, Branko Latinović REDUCTION OF ICT SECURITY RISKS USING LEVEL BASED APPROACH Original scientific paper DOI:https://doi.org/ 10.7251/JIT1902099DZ Download Article PDF Abstract Security controls are certainly one of the most preferred ways of controlling the environment in which our system is “alive”. But although they are heavily […]
NEW APPROACH OF STORING AND RETRIEVING LARGE DATA VOLUMES
![](https://jita-au.com/wp-content/uploads/2024/03/cover_issue_949_en_US.jpg)
Vol. 9 No. 2 (2019): JITA – APEIRON Nedeljko Šikanjić, Zoran Ž. Avramović NEW APPROACH OF STORING AND RETRIEVING LARGE DATA VOLUMES Original scientific paper DOI:https://doi.org/10.7251/JIT1902089S Download Article PDF Abstract In today’s world of advanced informational technologies, society is facing a huge amount of data that is just getting impossible to store, process and analyze. […]
ON POSSIBLE CRYPTOGRAPHIC OPTIMIZATION OF MOBILE HEALTHCARE APPLICATION
![](https://jita-au.com/wp-content/uploads/2024/03/cover_issue_949_en_US.jpg)
Vol. 9 No. 2 (2019): JITA – APEIRON Goran Đorđević, Milan Marković ON POSSIBLE CRYPTOGRAPHIC OPTIMIZATION OF MOBILE HEALTHCARE APPLICATION Original scientific paper DOI:https://doi.org/ 10.7251/JIT1902080DJ Download Article PDF Abstract The paper deals with a possible SOA based m-healthcare online system with secure mobile communication between patients and medical professionals with medical and insurance organizations. An […]
DDLM – QUALITY STANDARD FOR ELECTRONIC EDUCATION PROGRAMS IN HIGHER EDUCATION OF BOSNIA AND HERZEGOVINA
![](https://jita-au.com/wp-content/uploads/2024/03/cover_issue_949_en_US.jpg)
Vol. 9 No. 2 (2019): JITA – APEIRON Siniša Tomić, Dalibor Drljača DDLM – QUALITY STANDARD FOR ELECTRONIC EDUCATION PROGRAMS IN HIGHER EDUCATION OF BOSNIA AND HERZEGOVINA Original scientific paper DOI:https://doi.org/ 10.7251/JIT1902067T Download Article PDF Abstract The Web-based technological revolution has brought new teaching opportunities and concepts. This expands the range of educational opportunities based […]
MISSION CRITICAL ICT
![](https://jita-au.com/wp-content/uploads/2024/03/cover_issue_949_en_US.jpg)
Vol. 9 No. 2 (2019): JITA – APEIRON Goran Đukanović, Dragan Popović MISSION CRITICAL ICT Original scientific paper DOI:https://doi.org/ 10.7251/JIT1902060DJ Download Article PDF Abstract In this paper, three technologies intended to be implemented in Private Mobile Radio systems are analyzed and compared: TETRA (Terrestrial Trunked Radio), LTE (Long Term Evolution) and DMR (Digital Mobile Radio). […]
CYBERSECURITY OF RAILWAY COMMAND AND CONTROL SYSTEMS
![](https://jita-au.com/wp-content/uploads/2024/03/cover_issue_949_en_US.jpg)
Vol. 9 No. 2 (2019): JITA – APEIRON Alexey Ozerov CYBERSECURITY OF RAILWAY COMMAND AND CONTROL SYSTEMS Original scientific paper DOI:https://doi.org/10.7251/JIT1902053O Download Article PDF Abstract With the large-scale migration to computer-based and network technology, the threat of unauthorized remote access to railway command and control systems does not appear to be something extraordinary.But external effects […]
THE ROLE OF POSTPROCESSOR IN THE TRANSLATION OF VECTOR GRAPHICS UNDERSTANDABLE TO THE CNC MACHINE CONTROLLER
![](https://jita-au.com/wp-content/uploads/2024/03/cover_issue_949_en_US.jpg)
Vol. 10 No. 1 (2020): JITA – APEIRON Boris Pauković, Dražen Marinković THE ROLE OF POSTPROCESSOR IN THE TRANSLATION OF VECTOR GRAPHICS UNDERSTANDABLE TO THE CNC MACHINE CONTROLLER Original scientific paper DOI:https://doi.org/ 10.7251/JIT2001058P Download Article PDF Abstract The purpose of this paper is to show the post-processor role and importance in the creation of programming […]