Muzafer H. Saračević

Muzafer H. Saračević
International University of Novi Pazar · Department of Computer Sciences

Ph.D. (Computer sciences)
Vice-Rector for Scientific Research, University of Novi Pazar

About

196
Publications
94,613
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
633
Citations
Citations since 2017
87 Research Items
539 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
Introduction
Prof. Dr Muzafer Saračević - Full Professor at MEF Belgrade and University of Novi Pazar (Department of computer sciences), Serbia. Education: BSc. Faculty of Informatics and Computing in Belgrade; MSc. Faculty of Technical Sciences, University of Kragujevac; Ph.D. Faculty of Science and Mathematics, University of Niš; He authored several university textbooks and over 190 scientific papers. He is a member of the editorial board for 15 journals. https://muzafers.wixsite.com/home
Additional affiliations
September 2007 - present
International University of Novi Pazar
Position
  • Professor (Associate)
Description
  • Programming, Web and Software engineering Cryptography and Data Security Computational Geometry and Graphics
Education
January 2014 - June 2017
Faculty of Informatics and Computing, Belgrade
Field of study
  • Cryptography & Data Security
October 2010 - December 2013
Faculty of Sciences and Mathematics, University of Nis
Field of study
  • Computational geometry
October 2009 - June 2010
Faculty of Technical Sciences, University of Kragujevac
Field of study
  • Technology in Mathematics Education

Publications

Publications (196)
Article
This paper presents a new method of data hiding using Catalan numbers and Dyck words. The proposed steganographic solution belongs to the category of techniques based on the key generating process, rather than steganographic techniques such as injecting or substituting bits. The complex stego key consists of three sets of values that provide the te...
Article
Full-text available
This study presents a secret key sharing protocol that establishes cryptographically secured communication between two entities. A new symmetric key exchange scenario for smart city applications is presented in this research. The protocol is based on the specific properties of the Fuss-Catalan numbers and the Lattice Path combinatorics. The propose...
Article
This paper presents a solution to secret key sharing protocol problem that establishes cryptographically secured communication between two entities. We propose a new symmetric cryptographic key exchange scenario based on the specific properties of Cat-alan numbers and the Lattice Path combinatorics. Our scenario consists of three phases: generating...
Article
This article presents a novel data encryption technique suitable for Internet of Things (IoT) applications. The cryptosystem is based on the application of a Catalan object (as a cryptographic key) that provides encryption based on combinatorial structures with noncrossing or nonnested matching. The experimental part of this article includes a comp...
Article
Full-text available
This paper presents a novel encryption method based on individual block ciphering using Catalan random walks. This paper aims to offer some new possibilities of multimedia data protection to realize the rights of participants in the multimedia distribution chain (image, text, video, sound). Also, the emphasis is on advanced analysis of Catalan numb...
Article
Full-text available
While studying Lie groups, we realized the importance of manifolds. Manifolds play an important role in mathematics and physics. Their applications are widespread in mathematical disciplines such as differential geometry, topology, Lie algebras and groups, and geometry. The purpose of this paper is to make it uniquely available to those involved in...
Article
Full-text available
This paper introduces a heuristic for multiple sequence alignment aimed at improving real-time object recognition in short video streams with uncertainties. It builds upon the idea of the progressive alignment but is cognitively economical to the extent that the underlying edit distance approach is adapted to account for human working memory limita...
Chapter
This chapter presents the possibilities of applying cryptography and steganography in design advanced methods of medical software. The proposed solution has two modules: medical data encryption and medical data hiding. In the first module for the encryption of patient data a Catalan crypto-key is used combined with the LatticePath combinatorial pro...
Article
Full-text available
Cancelable biometrics is a demanding area of research in which a cancelable template conforming to a biometric is produced without degrading the efficiency. There are numerous approaches described in the literature that can be used to generate these cancelable templates. These approaches do not, however, perform well in either the qualitative or qu...
Conference Paper
Mobile devices that are today at the global level with the largest usage rates are precisely those devices that are based on the Android OS platform. The work was based on the description of the created project, that is, the android game. Android games are the areas that are most represented in the IT development world, that is, the world of the mo...
Article
Full-text available
Applying machine learning techniques and methods in biometric recognition has gained significant attention in recent years as it can provide a better performance, high accuracy, and cancellable biometrics data. This paper proposes a new approach for fingerprint recognition based on machine learning methods and stylometric features. The proposed sol...
Article
Full-text available
The purpose of this article is to introduce to the literature a new extension of the Simple WISP method adapted for utilizing the triangular fuzzy numbers. This extension is proposed to allow the use of the Simple WISP method for addressing decision-making problems related to uncertainties and inaccuracies, as well as for solving problems related t...
Article
Full-text available
This paper describes some of the forms of violence in cyberspace and possible prevention. The second part of this paper provides an analysis of students’ views on possible online abuse and prevention. The research aims to highlight statistically significant opportunities for raising awareness of possible online abuse and the prevention of cyberbull...
Chapter
This chapter presents the possibilities of applying cryptography and steganography in design advanced methods of medical software. The proposed solution has two modules: medical data encryption and medical data hiding. In the first module for the encryption of patient data a Catalan crypto-key is used combined with the LatticePath combinatorial pro...
Conference Paper
Full-text available
This article presents a simplified adoption of the Simple Weighted Sum Product (WISP) method, Simplified WISP method. To check the similarity of the obtained results analysis was performed, using the Python programming language, where the similarity of the obtained results was checked using the cosine similarity measure. The similarity was also che...
Article
Full-text available
In the paper, the possibility of combining deep neural network (DNN) model compression methods to achieve better compression results was considered. To compare the advantages and disadvantages of each method, all methods were applied to the ResNet18 model for pertaining to the NCT-CRC-HE-100K dataset while using CRC-VAL-HE-7K as the validation data...
Article
Full-text available
An extension of the Integrated Simple Weighted Sum Product (WISP) method is presented in this article, customized for the application of single-valued neutrosophic numbers. The extension is suggested to take advantage that the application of neutrosophic sets provides in terms of solving complex decision-making problems, as well as decision-making...
Article
Full-text available
is paper is dedicated to machine learning, the branches of machine learning, which include the methods for solving this issue, and the practical implementation of the solution to the automatic image description generation. Automatic image caption generation is one of the frequent goals of computer vision. Image description generation models must so...
Article
Full-text available
Ayurvedic medicines are categorized into seven constitutional forms ‘Prakriti’ which is a constituent in the Ayurvedic system of medicine to determine drought tolerance and drug responsiveness. Prakriti assessment entails a thorough physical examination as well as queries about physiological or behavioral characteristics. The prevalence of certain...
Article
Age estimation has become inordinately significant for human beings for many reasons, such as detecting legal and criminal responsibility and other social events like a marriage license, birth certificate, etc. This paper aims to decide on the most desirable machine learning algorithm (from conventional machine learning algorithms to deep learning)...
Article
Full-text available
Biometric security is a major emerging concern in the feld of data security. In recent years, research initiatives in the feld of biometrics have grown at an exponential rate. The multimodal biometric technique with enhanced accuracy and recognition rate for smart cities is still a challenging issue. This paper proposes an enhanced multimodal biome...
Chapter
5G is generally regarded as a major improvement over 4G in terms of data encryption and network consumer authentication. 5G would be a physical transformation of our critical networks, with long-term implications. According to experts, the weakness in 5G protection is likely to be the contact between internet-connected devices. Anything from vehicl...
Article
Full-text available
This article presents a comparison of the results obtained using the newly proposed Simple Weighted Sum Product method and some prominent multiple criteria decision-making methods. For comparison, several analyses were performed using the Python programming language and its NumPy library. The comparison was also made on a real decision-making probl...
Article
In contemporary education, classes are designed to include children with various characteristics. Due to such a heterogeneous class structure, certain innovations in instruction are necessary for every pupil to maximise their abilities during the school period. In the subject of Islamic science, instruction individualisation can be performed succes...
Article
Blockchain technology has received more and more attention from all walks of life and has also been sought after by the market and financial institutions. More and more financial institutions and Internet companies have begun to participate in the research of blockchain technology. The application scenarios are also constantly expanding, and the la...
Article
Full-text available
It is not a secret that Internet of Things (IoT) devices often come with not so realistic processing power (i.e. processing power and storage requirements) that would provide a basis for strong security and encryption algorithms. This work proposes an approach to adding a simple interface as a security gateway architecture for IoT devices. The secu...
Article
Full-text available
Due to the massive use of wireless Internet of Things (IoT), the advent of multimedia-big-data in recent decades poses numerous obstacles for successful contact with the virtual era. Mobile Adhoc Network-based IoT (MANET IoT) framework is increasingly common in this regard owing to its increased communication protocols and economic efficiency. MANE...
Article
Full-text available
The environment in which the decision-making process takes place is often characterized by uncertainty and vagueness and, because of that, sometimes it is very hard to express the criteria weights with crisp numbers. Therefore, the application of the Grey System Theory, i.e., grey numbers , in this case, is very convenient when it comes to determin...
Article
Full-text available
The environment in which the decision-making process takes place is often characterized by uncertainty and vagueness and, because of that, sometimes it is very hard to express the criteria weights with crisp numbers. Therefore, the application of the Grey System Theory, i.e., grey numbers, in this case, is very convenient when it comes to determina...
Article
Full-text available
Some decision-making problems, i.e., multi-criteria decision analysis (MCDA) problems, require taking into account the attitudes of a large number of decision-makers and/or respondents. Therefore, an approach to the transformation of crisp ratings, collected from respondents, in grey interval numbers form based on the median of collected scores, i....
Article
Full-text available
Some decision-making problems, i.e., multi-criteria decision analysis (MCDA) problems, require taking into account the attitudes of a large number of decision-makers and/or respondents. Therefore, an approach to the transformation of crisp ratings, collected from respondents, in grey interval numbers form based on the median of collected scores, i....
Book
Full-text available
Matematiğin güzelliklerinin kolayca keşfedilmesini sağlamak amacıyla hazırlanan kitabımız yedi bölümden oluşmaktadır. Her bölümde öncelikle konunun teorik anlatımı ve konu ile ilgili çözülmüş örnekler bulunmaktadır. Bölüm sonunda elde edilen kazanımları ölçmek amacıyla alıştırma soruları sunulmuştur. Kitapta önemli olan hususların öğrenciler tarafı...
Article
Full-text available
This paper presents a new method of steganography based on a combination of Catalan objects and Voronoi–Delaunay triangulation. Two segments are described within the proposed method. The first segment describes the process of embedding data and generating a complex stego key. The second segment explains the extraction of a hidden message. The main...
Article
This paper analyzes the impact of multimedia content on success in learning to write and read the letters of the alphabet. For the research purpose and according to the ADDIE model of instructional design, a multimedia application was created for learning to write and read the letters of the alphabet. This paper describes the application interface...
Article
Full-text available
Modern access controls employ biometrics as a means of authentication to a great extent. For example, biometrics is used as an authentication mechanism implemented on commercial devices such as smartphones and laptops. This paper presents a fingerprint biometric cryptosystem based on the fuzzy commitment scheme and convolutional neural networks. On...
Preprint
Full-text available
Due to the massive use of wireless Internet of Things (IoT), the advent of multimedia-big-data (MBD) in recent decades poses numerous obstacles for successful contact with the virtual era. Mobile Adhoc Network-based IoT (MANETIoT) framework is increasingly common in this regard owing to its increased communication protocols and economic efficiency....
Article
Full-text available
A method of encryption of the 3D plane in Geographic Information Systems (GIS) is presented. The method is derived using Voronoi-Delaunay triangulation and properties of Catalan numbers. The Voronoi-Delaunay incremental algorithm is presented as one of the most commonly used triangulation techniques for random point selection. In accordance with th...
Article
Full-text available
Phishing is a network attack in which attacker generates a replica of current legitimate site to contrivance the users into submitting their personal and sensitive information. A good anti-phishing solution should have rapid access time and rapid detection rate, but most of the existing solutions fail to satisfy it. A new method is proposed to prev...
Chapter
This chapter presents the possibilities of applying the triangulation method in the biometric identification process. The chapter includes a method in field of computational geometry (specifically polygon triangulation) in combination with face recognition techniques. The chapter describes some authentication techniques with an emphasis on face rec...
Article
Full-text available
Secure remote user authentication is an authentication technique in which the remote server authorizes the identity of the user through an insecure communication network. Since then diverse remote user authentication schemes have been proposed, but each category has its advantages and disadvantages. Besides its strength and weakness, remote user au...
Article
Blockchain technology has received more and more attention from all walks of life and has also been sought after by the market and financial institutions. More and more financial institutions and Internet companies have begun to participate in the research of blockchain technology. The application scenarios are also constantly expanding, and the la...
Chapter
In this chapter, we outline the optimization techniques for intelligent IoT applications in transport processes. The travelling salesman problem (TSP) has an important role in operational research and in this case it was implemented in the design of the IoT (Internet of Things) application. The chapter describes some specific methods of solving, an...
Article
Full-text available
In this paper, we provide a new approach to data encryption using generalized inverses. Encryption is based on the implementation of weighted Moore-Penrose inverse A y MN nxm ð Þover the nx8 constant matrix. The square Hermitian positive definite matrix N 8x8 p is the key. The proposed solution represents a very strong key since the number of diffe...
Chapter
The Internet of Things (IoT) brings a new set of security concerns, especially regarding data integrity and confidentiality. Encryption protects data from unauthorized access or a potential attacker in IoT applications using an algorithm and a key to transform a plaintext into an encrypted text. This chapter presents an analysis of the Fuss–Catalan...
Article
Full-text available
This paper presents the authentication method using the Delaunay triangulation incremental algorithm and the Catalan objects. The proposed method is a combination of computational geometry and cryptography. This method presents a new step towards encoding the triangle coordinates using the Catalan-key. We provided specific suggestions for the appli...
Article
Full-text available
This research presents the epileptic focus region localization during epileptic seizures by applying different signal processing and ensemble machine learning techniques in intracranial recordings of electroencephalogram (EEG). Multi-scale Principal Component Analysis (MSPCA) is used for denoising EEG signals and the autoregressive (AR) algorithm w...
Article
Full-text available
This paper aims to examine the impact of digital tools in mathematics and the readiness of teachers and students applying these interactive tools in teaching. The data used in the research are obtained from the test results of 526 students, in five secondary schools in North Macedonia. The students in this research, are divided into two groups: mai...
Chapter
This chapter presents the possibilities of applying the triangulation method in the IoT application for smart cities data storage and processing. The chapter includes a method in field of computational geometry (specifically polygon triangulation as a fundamental algorithm in computational geometry). The implementation of the application was done w...
Article
This paper presents a novel iris recognition system based on machine learning methods. The motivation behind this research resides in the interrelatedness of biometric systems and stylometry, as shown in our previous research. The main goal of the proposed model is to reach virtually perfect classification accuracy, eliminate false acceptance rates...
Chapter
In this chapter, we present a new method of steganography using decomposition of Catalan numbers. The proposed steganographic method consists of two segments: the first segment refers to the process of embedding data and generation of a complex stego key, whereas the second segment refers to the process of extracting a hidden message based on the g...
Article
Full-text available
This paper presents the authentication method using the Delaunay triangulation incremental algorithm and the Catalan objects. The proposed method is a combination of computational geometry and cryptography. This method presents a new step towards encoding the triangle coordinates using the Catalan-key. We provided specific suggestions for the appli...
Article
Full-text available
It has long been recognized that learning content is very useful for developing the intellectual and creative abilities of children. Modern teaching requires dynamic, diverse teaching and its adaptability to the abilities of each individual student. This implies a skillful combination of modern teaching materials, methods, forms and the choice of t...
Article
Full-text available
Catalan numbers have a significant place and major importance in combinatorics and computer science. They form a sequence of natural numbers that occur in studying astonishingly many combinatorial problems. They appear in the triangulation problem of polygon and polyhedron, binary trees, multiplication ordering, lattice path problem, etc. Today, ap...
Chapter
In this chapter, are enlisted some specific examples of attacks in information systems and smart cities applications. The chapter consists of five parts. In the first and second part, the basic introductory considerations and some of our previous research in the field of security of information systems and security management in the cyberspace are...
Article
Full-text available
Mezuniyet, dünyanın her ülkesindeki eğitim sürecinin ve her öğrenci hayatının çok önemli bir parçasıdır. Günümüzde, bilgi temelli toplumun gelişimi ve küreselleşme sürecinin yaygınlaşması, eğitimin kişisel ve toplumsal gelişim açısından önemini vurgulamıştır. Her ülke, ulusal müfredat alanındaki değişikliklere özellikle vurgu yaparak, okul sistemin...
Article
Full-text available
This paper describes the importance of the development of information systems for the needs of small and medium enterprises. The paper refers to other researches which prove the necessity of introducing information systems in small and medium enterprises. Oracle Database Design is presented as a simple and efficient manner to create a database on t...
Article
Full-text available
This paper presents a new technique of generation of convex polygon triangulation based on planted trivalent binary tree and ballot notation. The properties of the Catalan numbers were examined and their decomposition and application in developing the hierarchy and triangulation trees were analyzed. The method of storage and processing of triangula...
Article
Full-text available
In this paper we implement the Block method for convex polygon triangula-tion in the web environment (PHP/MySQL). Our main aim is to show the advantages of the usage of web technologies in performing complex algorithm from computer graphics. The basic assumption is that once obtained, the results can be stored in a database and used for other calcu...
Article
This study presents a practical view of dynamic programming, specifically in the context of the application of finding optimal solutions for the polygon triangulation problem. The problem of the optimal triangulation of a polygon is considered to be a recursive substructure. The basic idea of the constructed method lies in finding an adequate metho...
Article
Full-text available
This paper analyzes the properties of Catalan numbers and their relation to the Lattice Path combinatorial problem in cryptography. Specifically, analyzes the application of the appropriate combinatorial problem based on Catalan-key in encryption and decryption of files and plaintext. Accordingly, we use Catalan numbers for generating keys and with...
Article
Full-text available
Computational geometry is an integral part of mathematics and computer science deals with the algorithmic solution of geometry problems. From the beginning to today, computer geometry links different areas of science and techniques, such as the theory of algorithms, combinatorial and Euclidean geometry, but including data structures and optimizatio...
Chapter
Full-text available
Başta internet olmak üzere birbirimizle iletişim kurmamıza ve çeşitli bilgilere ulaşmamıza imkân tanıyan birçok bilgi kaynağı mevcuttur. Bilgiye ulaşma, araştırma yapma ve kaynak kullanma alışkanlıkların geliştirilmesi, eğitim süreci esnasında öğrencinin öğrenmesi gereken sistematik yeteneklerin özünü temsil eder. Bilişim teknolojilerin gelişimi ge...
Preprint
Full-text available
Today, people and companies are open to innovation and continuously improve their strategies for successful business and investment. Therefore, all companies preparing their investment programs based on risk analysis. In the world of investments, risk management, decision and implementation of the investment policy as well as the selection of the o...