Ramo Sendelj

Ramo Sendelj
University of Donja Gorica · Humanistic Studies

Prof. Dr.

About

70
Publications
9,462
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
180
Citations
Additional affiliations
July 1995 - February 2006
Army of Serbia & Montenegro
Position
  • Managing Director
June 2006 - September 2013
Mediterranean University
Position
  • Head of Faculty
Education
October 2001 - May 2004
University of Belgrade
Field of study
  • Software Engineering
October 1997 - March 2001
University of Belgrade
Field of study
  • Software Engineering
September 1990 - June 1995
Vojna akademija Beograd
Field of study
  • Informatics

Publications

Publications (70)
Article
Montenegrin Digital Academic Innovation Hub established within Erasmus+ project DigNEST is essential institutional support for developing innovations in the field of health in academic-business cooperation and partnership. Experience of 18 months in running Hub service provides preliminary results in analysis received innovation ideas, provided sup...
Article
Full-text available
In recent years, small and medium enterprises worldwide have increasingly adopted digital technologies and cloud computing. The pace of this digital transition has varied across countries, and the socioeconomic conditions during the pandemic have further accelerated the digitalization of enterprises. This situation calls for an examination of the r...
Article
Full-text available
Montenegro restored its national independence in 2006, and in the 17 years since then, the country has made significant progress in digital transformation, which is especially important for its accession to the European Union. In this paper, this period of 17 years of Montenegrin digital transformation is reviewed. The work aims to provide comprehe...
Article
Full-text available
Health informatics plays a crucial role in modern healthcare provision. Training and continuous education are essential to bolster the healthcare workforce on health informatics. In this work, we present the training events within EU-funded DigNest project. The aim of the training events, the subjects offered, and the overall evaluation of the resu...
Article
Full-text available
This poster presents a Montenegrin Digital Academic Innovation Hub aimed to support education, innovations, and academia-business cooperation in medical informatics (as one of four priority areas) at national level in Montenegro. The Hub topology and its organisation in the form of two main nodes, with services established within key pillars: Digit...
Article
Full-text available
In this paper, we present a study on the utilization of smart medical wearables and the user manuals of such devices. A total of 342 individuals provided input for 18 questions that address user behavior in the investigated context and the connections between various assessments and preferences. The presented work clusters individuals based on thei...
Article
Full-text available
The digitization and general industrial development of Montenegro is a great challenge for engineering and science due to its special characteristics. As the accession of Montenegro to the European Union has been an ongoing agenda for over a decade now, and the accession of the country is expected by 2025, adapting the interconnectivity and smart a...
Chapter
Full-text available
Cyber security attacks evidence has shown that many sectors and industries are still at an insufficient level of readiness to counter these threats, including healthcare organizations and the entire healthcare industry. The COVID-19 pandemic has additionally launched the issue of cyber protection of healthcare systems and connected medical and othe...
Chapter
Full-text available
The variety of the artificial intelligence and machine learning methods are applied for data analysis in various areas, including the data-rich healthcare domain. However, aiming to improve health care efficiency and use the captured information to improve treatment methods is often hampered by poor quality of medical data collections, as high perc...
Chapter
Full-text available
Development of person-centred care (PCC) services require adjustment to specific domain of application and integration with existing processes implemented in healthcare institution. This poster present PCC services for monitoring stroke outpatient rehabilitation, enhanced by modern ICT technologies (thus enabling adjustments to different kind of pa...
Chapter
Full-text available
Health and health systems are not excluded from the influence of digitalization. In Montenegro, regarding the digitization process, when compared to other sectors, the health sector is lagging. In this poster presentation, we present an ambitious Erasmus+ DigN€ST project aimed on modernization of digitalization of healthcare system in Montenegro, a...
Chapter
The problems of “time-to-event’ data analysis explore data of processes with the defined end point of time when an explored event occurs. The methods of survival modelling, hazard analysis, risk evaluation are combined for understanding and exploring these data. In this article the time-to-event modelling addresses in-hospital mortality of stroke p...
Conference Paper
This paper deals with questions of cybersecurity in the Industry 4.0, existing cybersecurity models and their enhancement. Providing with a methodology for semantically enhancing and improving cybersecurity models, the paper promotes novel, adapted methodological frameworks for cybersecurity, by promoting diversity in characteristics, and quantifyi...
Chapter
Evaluation and analysis of different architectures of information systems attract attention of both, researchers and practitioners, especially when security requirements are considered and analyzed. On the other side, there is no systematic framework which enables evaluation of potential consequences and impacts of cyber-attacks and malicious activ...
Article
Recent decades made a change in health care by putting health information as a core asset for effective management and improved quality of care. That is a reason why applications of information technology in health and healthcare attract more attention by healthcare organisations with highly skilled health information management professionals havin...
Article
Modern education of healthcare managers is one of key preconditions in making reforms towards increasing quality of care and making the provision of health services more cost-effective and efficient. This paper presents unique multidisciplinary approach for education of healthcare managers developed and accredited in Montenegro with elaboration res...
Chapter
Full-text available
Person-centred care is known as a novel approach which contributes to wellbeing, prevention, care and support of patients. There is little evidence about practising PCC in stroke rehabilitation. In this paper, we develop a novel framework for creation of person-centred services for stroke rehabilitation which supports service configuration adapted...
Chapter
The Person-centred care (PCC) is an innovative approach that sees patients as equal partners in the planning, development and delivery of care, and active participants in the management of their health and wellbeing. Preliminary research over PCC applications showed advances in concordance between care provider and patient on treatment plans, impro...
Chapter
In most countries, the electricity sector is designated as critical infrastructure. Therefore, nowadays, the field of cyber security is a crucial component in the functioning of all factors in the electricity sector of a country. A similar situation is observed in Montenegro, where the energy sector is designated as critical and highly ranked on th...
Article
Montenegro plans to enhance and modernize the curricula and programs in public health fields in line with EU standards and hence the Erasmus-Phelim project developed a framework to develop, implement, and evaluate the education process. A stepwise approach consisting of three dimensions per step was implemented for workshop development. For the eva...
Article
Nowadays, medical informatics is unavoidable topic when talking about health innovations and modern practice. Education of professionals in medical informatics is a challenging issue since they need to be capable to respond to challenges of modern health care systems, heterogeneous health information systems with integrated devices and remote acces...
Chapter
Organisations are facing challenges of protecting their data in cyberspace since damages of cyberattacks might potentially run into billions, besides killing investor confidence and denting brand image. Recent data shows that one of key threats for organisations are insider attacks caused by person who has/had authorized access to an organization’s...
Book
Language: Montenegrin; The book provides an overview of public health practices in EU and other countries. The report commences with definitions of the domain of public health and proceeds with brief historical aspects of public health. Furthermore, it collects country descriptions on the basis of demographics, health indicators, healthcare syste...
Article
Business process model families (BPMF) provide collective representation of business processes that can be defined for a target domain of interest. They enable rapid development of appropriate business processes by setting up quick BPMF configuration based on the stakeholders’ needs and preferences. In this paper, we propose a novel framework for u...
Article
Montenegro plans to enhance its educational system in the area of health information management, in accordance with well-known EU best practices. Within the Erasmus+ project PH-ELIM, a Stratified Framework was developed to provide education of public health professionals making them highly skilled to support the nation in creating a sustainable and...
Conference Paper
Full-text available
This paper deals with the safety of the Internet of Things (IoT) and research of IoT architecture. It is based on theoretical foundations of IoT. The points that could be potential places for an attack on the system are presented in this paper. Architecture that is proposed is based on the physical organization of devices and sensors, as well as on...
Conference Paper
Full-text available
This paper deals with the safety of the Internet of Things (IoT) and research of IoT architecture. It is based on theoretical foundations of IoT. The points that could be potential places for an attack on the system are presented in this paper. Architecture that is proposed is based on the physical organization of devices and sensors, as well as on...
Conference Paper
Full-text available
In order to maintain constant communication with the family, friends or colleagues, we use a variety of devices whereby accessing the Internet mostly using unsecured hotspots. This makes an ideal target for potential digital threats and abuse. Consequences at the individual level may well be serious, however, digital threats can have an even bigger...
Chapter
This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described differ...
Conference Paper
The complexity and heterogeneity of “big data” sets in health systems are difficult to process using common database management tools or traditional processing applications. Stimulated by the promising solutions of Semantic Web for addressing the problems of management and monitoring of services shared by different parties, the service-oriented tra...
Chapter
This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described differ...
Conference Paper
Cyber-security threats evolve as rapidly as the Internet expands, and staying protected against cyber-security threats requires all users, ranging from children and their parents to the most sophisticated users, their risk awareness and improvement of security practices on an ongoing basis. However, cyber educational system with all educational lev...
Article
Full-text available
eLearning has become a key adjunct to both, education in general and the business world; it isbecoming an important tool to allow the flexibility and quality requested by such a kind of learningprocess. One of recent challenges in eLearning industry is personalized learning (PL), aimed onmeeting the needs and aspirations of each individual learner....
Conference Paper
Cloud Computing is a new paradigm for the IT industry. IT services such as infrastructures, platforms and applications are provided remotely, over the Internet, and all resources are virtualized. Challenges about confidentiality, integrity, authenticity, and non-repudiation are still opened representing the main concerns that reduces the growth of...
Article
eLearning has become a key adjunct to both, education in general and the business world; it isbecoming an important tool to allow the flexibility and quality requested by such a kind of learningprocess. One of recent challenges in eLearning industry is personalized learning (PL), aimed onmeeting the needs and aspirations of each individual learner....
Conference Paper
A university curriculum is generally flexible. The study program to obtain a university degree is conformed by several courses, which are distributed in academic terms. Prior to the beginning of each academic year or term (depending on the organizational and academic rules), the student should enroll on one or more courses of which some are compuls...
Article
Cloud computing is achieving increased popularity among both, researchers and practitioners; while security is one of the major issues which reduces its growth and complications with data privacy and data protection continue to plague the market. Stimulated by the promising solutions of Semantic Web (also known as Web 3.0) for addressing the proble...
Article
Full-text available
In this paper, we address the problem of peak-to-average power ratio (PAPR) reduction in orthogonal frequency-division multiplexing (OFDM) systems. We formulate the problem as an error vector magnitude (EVM) optimization task with constraints on PAPR and free carrier power overhead (FCPO). This problem, which is known to be NP hard, is shown to be...
Article
Personal Learning Environments (PLEs) are systems that help learners take control of and manage their own learning; allows learners to interact with diverse systems, tools, and services to access content, assess his/her knowledge, collaborate with other learners, etc. Research and development in recent years produced user-familiar environments for...
Conference Paper
The vast majority of today’s young adults see higher education as a way to earn society’s respect and insure career advancement and financial security. The decision about which university to enrol is a hard process of itself and has a considerable consequential effect on future career prospects and professional opportunities. The complex task about...
Conference Paper
Personal Learning Environments (PLEs) are systems that help learners take control of and manage their own learning; allows learners to interact with diverse systems, tools, and services to access content, assess his/her knowledge, collaborate with other learners, etc. Research and development in recent years produced user-familiar environments for...
Article
Full-text available
Aiming to facilitate and support online learning practices, TEL researchers and practitioners have been increasingly focused on the design and use of Web-based Personal Learning Environments (PLE). A PLE is a set of services selected and customized by students. Among these services, resource (either digital or human) recommendation is a crucial one...
Conference Paper
Cloud computing is achieving increased popularity among both, researchers and practitioners; while security is one of the major issues which reduces its growth and complications with data privacy and data protection continue to plague the market. Stimulated by the promising solutions of Semantic Web (also known as Web 3.0) for addressing the proble...
Conference Paper
This work analyzes and describes an assessment of achieved level of learning goals that are based on determined knowledge rules, skills and competences, according to the state's Qualification framework. Adaptive fuzzy framework architecture is presented, which is a part of adaptive-system for generating and adjusting e-courses. The proposed methodo...
Conference Paper
There are many factors that can influence the extent of learning. These would include factors such as the student’s learning style, motivation for learning, decisions about relevant learning resources and consequently, dynamics of learning and teaching. Many of mentioned factors are inter-correlated and recent research is mostly focused on retrieva...
Conference Paper
This paper analyzes different technical quantitative aspects of ERP systems development and maintenance in agile approach context. ERP systems usually have huge numbers of tables and related classes, with a growing complexity that easily gets difficult to manage. The problem is to identify what are the things that are used often, what are the thing...
Conference Paper
This paper describes the concepts of architecture of modern systems for e-learning based on semantic technologies with the aspects of adaptation, personalization and dynamic adaptability of learning material. The proposed architecture is able to generate the student's profile based on basic and historical data on the student which ensures the perso...
Conference Paper
One of the most common requirements in the software development projects is imposed by early estimation of the complexity and total costs. Various methods exist and they are constantly changing in order to enable faster and more comprehensive work and more accurate results. In this work authors present possible extension of Function Point Analysis,...
Conference Paper
Business process model families (BPMF) capture all of the possible business processes that can be defined for a target domain of interest. Configuration problem which arises is defined as the problem of both, unique business process model derivation, and services selection optimally implementing the activities of the process model.There is increasi...
Conference Paper
Ontologies, one of the cornerstone technologies of the Semantic Web are a very expressive and powerful means for domain modeling. To become really usable and ubiquitous, the implementations of ontology languages yet have to deliver satisfactory performance and before anything else have to be developer-friendly. We present an example of using Magic...
Article
The paper presents developing a web-based intelligent tutoring system named LEWITS. LEWITS (Learner Ontology Web-Based Intelligent Tutoring System) is aimed to use an ontology based student model and adaptation scenario of learning materials tailoring to individual student characteristics conceptualized in LeMONT ontology. The proposed learner mode...
Article
The paper presents an ontology-based learner modeling system for personalized Web-based education, named LeMONT. The proposed learner modeling system relies on learner ontology, using Semantic Web technologies, based on the IMS LIP specifications and extended with new Psychological preferences concept. In order to create comprehensive learner ontol...
Conference Paper
This paper describes hierarchical modeling of fuzzy logic concepts that has been used within the recently developed model of intelligent systems, called OBOA. The model is based on a multilevel, hierarchical, general object-oriented approach. Current methods and software design and development tools for intelligent systems are usually difficult ext...
Article
Full-text available
In order to recommend appropriate learning resources (content, tools, services, and human resources) to learners who use Personal Learning Environments (PLEs) to perform their learning activities, it is important to rely both on learner models and on learning context. In this paper we analyze algorithms for recommendation of relevant learning resou...

Network

Cited By