Professional Documents
Culture Documents
Initial two independent graphics that come to- Picture A is a computer graphic with some ten
gether in a CMYFIR separation are shown in Fi- color tones in the style of “security clothing”. Some
gure 2. and 3. areas have been designed as uniform spot tones
with the goal to determine more easily the transition
states in picture B. This is “control quality” of the
CMYF separation mathematical presentation, be-
cause our eyes will detect anomalies in rough repla-
cements of darker or lighter tones that come from
picture B. This picture must be completely hidden
from our sight in the final printing reproduction.
UV graphics are single-tone graphics (bankno-
tes, documents) in the area of security graphics.
The most frequent UV colorants are colorless,
invisible colorants with a transition into yellow,
orange or blue under the influence of UV light [4].
These graphics are recognized with the help of
“UV lights”. They are totally independent of the
other graphics in the documents. Most often it is
a print over a print – an overprint. For example,
the invisible color does not interfere with the other
graphic elements on the banknote.
In this paper we start from the assumption that
a dark UV colorant is used for producing the spe-
cial B graphic. However, although it is made with
Figure 2. Picture A for the visible spectrum a visible colorant, this B graphic’s form is hidden in
the neighboring CMY colorants and is not displayed
in the visible spectrum. Reproduction of multi-to-
ne pictures uses the transfer of the colorant into the
screening cell as a positive and null state for each
colorant channel separately. The ultraviolet colorant
has been set for this printing technology as a repla-
cement for CMY colorants. The channel for the UV
colorant is equal to the screened graphic from pictu-
re B. The colorant is not black, more precisely – it
is not carbon black according to CMYKIR techno-
logy. New relations are set in this paper for mutual
changing of CMY and the brown F colorant towar-
ds the CMYFIR separation, with the goal of having
picture B appear in the UV and NIR spectrum only.
The portrait chosen for this paper has different
coverage tones. The portrait as a theme is the usual
task in banknote security graphics that is designed
in a single tone with linear structures [4]. A por-
trait in the form of a multi-color graphic is set in
the paper for experiments that can be observed in
all phases of translation from its initial form to the
Figure 3. The target B picture for the infrared ultraviolet and infrared states.
spectrum C0 (Cyan), M0 (Magenta), Y0 (Yellow) in pixel
coverage percentage are the only input data for
color process printing. The decrease coefficint the CMY process colorants and the ultraviolet F
values range from 0.3 to 0.7 and are not correla- spot colorant create a new method of separation in
ted with individual CMY components. Only the security graphics. The new method is based on the
introduced model given in the relations from 1 to UV colorant’s characteristic to absorb the infrared
5 has linked a wide tone system range of changing light as well. Color management has thus been
CMY as a dependence on C0M0Y0 null separati- extended to three spectrum areas setting therewith
on without the UV fluorescent colorant. a new system in security printing.
Small values of the colorant CMY decrease is The proposed mathematical model is a linear
favorable for the CMYFIR separation because a equation system whose parameters have been set
design with lighter tones can be planned. On the experimentally for a precisely set fluorescent secu-
other hand, CMYKIR separation is critisized for rity colorant. This method may be extended to rese-
the presence of dark tones and „white“ patches arching of other mutual relationships in spot color
in lighter tone areas. The low values of the CMY separation with process components. The stegano-
decrease coefficient open the possibilities to use graphic approach in hiding the secrity graphic is
thicker coats of the F colorant and to change the extended with the goal to disable producing copies
40% coverage that is a limitation of the mathema- of documents or securities with the help of known
tical model in the paper. The limit is determined and existing tools and graphic technologies.
as the moment when one of the CMY components
drop to null value. That is the end of CMYFIR References
separation application. A compromise is introdu-
ced here for the described state: the value null is 1. Klaudio Pap, Ivana Žiljak, Jana Žiljak-Vujić. Image
Reproduction for Near Infrared Spectrum and the In-
set for negative values of C or M or Y, and this is
fraredesign Theory. // The Journal of imaging science
at the expense of picture Z quality in the infrared and technology. 2010; 54 (1): 10502 -1-10502 -9.
spectrum. Such a case is at point 5 (188,384) whe-
re the Cyan colorant is estimated with the value 2. Vilko Žiljak, Klaudio Pap, Ivana Žiljak-Stanimirović,
of minus four. If picture B coverage at this point Jana Žiljak-Vujić. Managing dual color properties
with the Z-parameter in the visual and NIR spectrum.
amounted to 40% or more, the program controls
// Infrared physics & technology. 2012 ; 55: 326-336.
would set this data back to null. However, as point
5 has the need for Z state to be only a 16% covera- 3. www.forensictechnology.com/projectina/; http://www.
ge value, this data has remained and there was no projectina.ch/eng/products.aspx?id=7&lang=EN.
need to carry out a correction in the reproduction
4. Žiljak Vilko, Kuna, papirnati novac Republike
with CMYF separation. Hrvatske, Hrvatska narodna banka i FS, Zagreb
ISBN 953-6052-14-8, 1994.
5. Conclusion 5. Kipphan Helmut (ed.), Handbook of Print Media:
Steganography has been introduced into secu- Technologies and Production Methods (Springer-
Verlag, Berlin, Germany, ISBN 978-3-540-67326-2,
rity graphics for the ultraviolet, visible and infrared 2001.
spectrum. A colorant has been produced that has a
different response in the listed areas, but in such
a way that it is possible to control the hiding and Corresponding Author
appearing of graphics according to a set design.A Ivana Ziljak Stanimirovic,
Faculty of Graphic Arts,
multi-color graphic is set in the visible spectrum, Zagreb,
independent of the graphic carrying the informati- Croatia,
on with steganographic characteristics. A conditi- E-mail: ivana.ziljak@grf.hr
on is set for the two graphics – that the second one
can not be seen by the naked eye if observed un-
der the usual white (sun) light. A fully independent
graphic is set in the visible spectrum that hides the
security graphic. The mutual relationship between
of traffic accidents and to ensure safe operation 2. a|Test integral information system
of road transport with the least undesirable con-
By the Decision of the Government of Federa-
sequences. Employees at stations for technical in-
tion of B&H, dated 01 April 2008, the entry of all
spections are corrective factor who directly affect
data on technical inspections into a unified infor-
the traffic safety. Although in years 2009, 2010,
mation system a|TEST has become mandatory in
2011 and 2012 there was significant growth of
the area of Federation of B&H, before the other
number of defective vehicles, we are still far from
two parts of the state.
the average of defective vehicles in comparison to
Unified information system a|TEST is a web-
the standards of European countries.
based application for data entry on technical in-
Application of the information system a|TEST
spections into the central database. It is designed
enables authorised staff of Professional institution
to be placed together with the data at one place,
of IPI L.L.C. Zenica significantly greater control
and that stations for technical inspection access it
and surveillance over the work of stations for
through the internet connection (Figure 4.). Print-
technical inspections. As a result of the measures
ing of all reports shall be made from a central
of control and surveillance over the work, the au-
server. Thus, everything that is entered into a uni-
thorised users of information system at stations for
fied information system is recorded, such as who,
technical inspections are permanently indicated
what and when someone did it and from which
to the mistakes and shortcomings in the work, as
station for technical inspection of vehicles.
soon as they are detected.
In the beginning of year 2008 numerous seminars
The importance of this project was recognized
were held on the issue of the problems from men-
by the State Ministry of Communications and
tioned authorisations where all employees from 156
Transport, so the unified information system was
stations for technical inspection of vehicles had to be
defined in the amendments to the Regulations on
present, on a regional principle in the entire area of
technical inspections of vehicles (Official Gazette
FB&H. After that mandatory education prescribed
of B&H, No. 13/07, 72/07, 74/08, 3/09, 76/09), (1),
by the Regulations, we conducted first assessment-
which was published on 28 September 2009 on the
acreditation tests whch resulted in the issuance of
State level. According to this regulation, it states:
licenses and stamps for the persons who passed the
“Information system is a comprehensive whole
exam. By the end of year 2009 the same education
which incorporates the equipment for measuring
was held for professional staff in FB&H and in all 12
of prescribed values for the vehicle about vehicle
stations for technical inspection of vehicles in Brčko
roadworthiness and which enable print of meas-
District of Bosnia and Herzegovina. [2]
urement results including, on graphic display, in-
Professional staff in all stations for technical in-
put of values and measurement results that cannot
spection of vehicles in FB&H (controllers of vehicle
be automatically downloaded into the information
roadworthiness and managers of stations for techni-
system. The system is connected through IT with
cal inspection of vehicles) was informed about the
the computer support for automatic processing
work of a unified information system a|TEST in
of measured values, their storing into a unified
written form and through the video instructions.
database and includes equipment, programs and
Introduction of a unified information system
method (internet connection) for transmission,
into the work of stations for technical inspection
distribution and use of data in the process of vehi-
of vehicles changed public opinion on the com-
cle registration and other tasks that are performed
plete territory of Bosnia and Herzegovina because
in authorised station for technical inspection of
there was a common practice to carry out techni-
vehicles, authorised entity ministries or service of
cal inspections irregularly. Insurance companies
Brčko District of Bosnia and Herzegovina, pro-
and agencies for vehicle registration dictated the
fessional institution or Agency for Identification
work of stations for technical inspection oe vehi-
Documents and Electronic Data Interchange (ID-
cles in the way that they “increased” their business
DEA)”.[1]
and introduced a fictious conduction of technical
inspection of vehicles.
Figure 8. Comparative ratio of number of recorded defects in years 2009 and 2010. [8], [9]
Figure 9. Comparative ratio of number of recorded defects in years 2011 and 2012
There is an evident increase in the number of The average number of consucted inspections
detected irregularities in years 2010 and 2011 in in Federation of B&H per one station for technical
comparison to year 2009, that is year 2012 as well inspection in year 2009 was 3739 inspections.
as number of inspections. In year 2010 this number was increased to
In relation to total number of conducted inspec- 3803 inspections, in year 2011 3720, and in year
tions there were only 3% of returned vehicles at 2012 3718 inspections of vehicles per one station
their first and repeated inspections. for technical inspections. [4]
Data on detected irregularities on the occasion of On the basis of data on results of conducted in-
vehicle inspections for year 2008 was not compared spections (year 2012) for the vehicles with engine
with the data from years 2009 and 2010 because it there are approximately selected 37% of vehicles,
is about data from the period of 01 April 2008 when with selected fuel tape of petrol, while 63% of ve-
we implemented the information system. hicles with selected fuel type of diesel. It should be
underlined that in the Federation of B%H for the
Table 4. Number of defected vehicles at their first and repeated inspections and number of recorded
malfunction of devices in the period of 2009-2012 years
Number of defected vehicles at Number of defected vehicles at Total number of
Year
their first inspection their repeated inspection defects
2009 9.027 256 17.852
2010 10.711 349 19.606
2011 9.324 186 19.640
2012 8.300 72 17.596
2011 - 2012 1.024 114 2.044
first time we entered vehicles with selected fuel type relevant authorised state bodies and other profes-
of petrol/LPG, and there are 3173 of such vehicles, sional organizations and individuals, which would
which is extremely small, and on this example it enable data collecting directly from the measuring
can be seen how much the negative impact has the device.
human factor, because these vehicles should and In this way we will resolve the problem which
must be more on the roads in FB&H. [4] was previously pointed out, that the authorised
personel at stations for technical inspection ocas-
5. Conclusion sionally enter invalid and irregular data into the
integral information system a|TEST. For these rea-
In coordination with the Federal Ministry of sons, a number of reports created from the integral
Transport and Communications the major step information system a|TEST do not serve properly
which was done by a system of professional insti- and we cannot make appropriate analysis. Thus,
tution and contractor, the IPI - Institute for Com- the impact of human factor would be decreased to
mercial Engineering L.L.C. Zenica, represents a a minimum.
significant contribution to bringing order to the run- All relevant bodies will be included in this im-
down area of vehicle roadworthiness as an impor- plementation, and it is a step forward that this will
tant factor for traffic safety, and thus an incentive affect establishing of safer road transport.
that other activities puts under control thorugh this
IT solution, such as various billing duties for vehi- References
cle registration, payments for budgets and so forth.
This work presents the results of data collected 1. Law on basics of traffic safety on the roads in B&H
on stations for technical inspection in Federation (Official Gazette, no. 6/06, 75/06, 44/07, 84/09)
of B&H for the period of year 2007 until the end 2. Klisura F.: Master’s Thesis, Subject: “Contribution
of year 2012. As it can be seen, the system for to a Survey of the impact of stations for technical
data monitoring as well as the quality of inspec- inspection of vehicles to the traffic safety in Bosnia
tion was improved since year 2009. A significant i Herzegovina“, Mechanical Engineering Faculty,
Zenica. 2010.
number of returned vehicles durinig inspections
presented in this work point to the fact that in- 3. Branković N., Klisura F.: (26-30.08.2008),
spections are carried out much more in details TMT 2008, 12 International Research/Expert
than in the previous period. Conference“Trends in the Development of Machin-
The results of the introduction of video surveil- ery and Associated Tehnology“, Thema :“The analy-
sis of the technical stations state in Federation of
lance system gave an invaluable contribution of im- Bosnia & Herzegovina and informatic integration in
provement to the field of traffic safety from all as- unique system“, Istanbul, Turkey, 2008.
pects. Also, it was proved that this area, regardless
all its specificity, can and must follow new trends in 4. Klisura F., Brdarević S., Mustafić I., Jašarević S.,
science. This all can help to better understanding of Plevljak F.: Efficiency of the integral information sys-
tem and Video surveillance over the work of stations
the issues of vehicle roadworthiness in both every- for Technical inspection of vehicles and traffic safety
day life and in reconstruction of traffic accidents. Contribution, Annals of Enginering Hunedoara-
With the intention that technical inspections are International Journal of Enginering Tome X(2012)-
not carried out by any “shortened process” and in Fascicule 3 (ISSN 1584-2673), Romania.
order to register all defective vehicles it is planned
5. Barut M., Klisura F., Đidić H., Hasić S.,: Profes-
to make IT connection of devices at stations for sional bulletin – IPI number 13., IPI – Institute for
technical inspection, for which the testing solution Commercial Engineering L.L.C. Zenica, January
which was made in the Institute and IT company 2011; pp 3-46.
aNET was coordinated with the Federal Ministry
6. Barut M., Klisura F., Halilović N., Peulić V.,: Profes-
of Transport and Communications, and pursunt
sional bulletin – IPI number 17., IPI – Institute for
to the order of the Government of FB&H. Pro- Commercial Engineering L.L.C. Zenica, January
fessional institution of Institute for Commercial 2012; pp 1-130.
Engineering has intensified cooperation with all
Corresponding Author
Fuad Klisura,
IPI-Institute for Commercial Engineering,
Zenica,
Bosnia and Herzegovina,
E-mail: fuad.k@ipi.ba
1. The formation and development of cracks Figure 2. The fracture of the beam which was
under load, the strain of concrete and manifested as a shock
rebar, breaking force and break types
In this paper, the behavior of beams is given: re- When the break of the beam was caused by
inforced with ribbed reinforcement (Figure 1) for bending, along the reinforcement, while the prin-
the reception of the bending moment, but not for cipal stresses were less than the carrying power
receiving the transverse force, without the trans- of concrete, the pressure force in the press could
verse reinforcement - binders, which served as the have been increased even more for a certain value,
mark – referential standard beams. Representative while the beam underwent significant plastic de-
break types of beams with “T” cross section are formity; the registered stress in the armature con-
given, after being loaded until breaking. All “T” siderably exceeded the yield point, which means
beams were loaded with the concentrated force at that the reinforcement of such beams entered the
l/2 until the break occurred. reinforcement zone. If the stress in the armature
enters the reinforcement zone, the load increase
is possible, until the break of the concrete beams
happens in the meantime. The diagram σ – ε (Fig-
ure 3) present the results of the test of the concrete
prisms and diagram σ – ε the results of the tested
profiles showed in (tab.1) with their mechanical
characteristics (Figure 4).
The largest dilatations in the reinforcement
which qualitative analyse is given in (tab.1) oc-
cur at the point where the crack intersects the rein-
Figure 1. Method of reinforcing beams by ribbed
forcement (Figure 5). For a period, the appearing
reinforcement RA Figure 1-1 The cross section
cracks are expanding, and the new ones are occur-
ring, until the moment when one of them or the Table 1. Characteristics of the steel used
entire zone, starts to spread. With increasing width Carbon
of cracking, their length increases, the pressed Ф sv sm d10
content
zone of concrete is decreased, while the slightly RA 8 511,90 764,50 20%
the arm of internal forces gets slightly increased. 400/500 12 652,40 652,40 18% 4,8%
Figure 3. Diagram σ – ε
Figure 5. The developement of the cracks in the Figure 7. The development of the craks referential
beam standard beams
forcement. When the cracks occur, redistribution caused by bending. Vertical crack were registered
of forces takes place. in these beams.
At the spot where the crack intersects the rein- The appearance of first cracks mostly depend-
forcement (the main or lateral), the total tension is ed on nurturing process of the elements and the
taken over by the reinforcement. Between individu- quality of the concrete.
al cracks there is concrete without cracks, which still The state of tension and deformation of the
connects the compressed and tensioned zone of the beam with cracks was not monitored in func-
beam. Reinforcement, intersected with the crack be- tion of the reinforcement percentage of the
haves like a “grappling”, “because in the immediate main reinforcement, because it did not vary.
vicinity around the crack, destruction of adhesion Dilatation arrangement in the stirrups εa in the
between concrete and reinforcement occurs. monitored cross sections (vertical and diagonal or
First appearance of cracks and their further de- diagonal) indicate that the dilatations are largest in
velopment depended on the quality of concrete, the lower zone of the beam or in the vicinity of the
particularly on the concrete maintaining process, neutral plane, which depends on where and how
(construction yielding in exploitation and possibly they occurred.
later), the type of load - short or long term. Tests In the compressed to break zone of the beam,
carried out by Kedič [1]. on the wall beams, indi- the stirrup tension was significantly lower than the
cate that the width of cracks in the period of one calculated one.
year, at constant long term load, can increase up On the basis of the measured dilatations and
to 2.5 times in comparison to the short term load. tensions in the stirrups, it can be concluded that the
He found, by monitoring the development most efficient reinforcement of the beam is with
of cracks whose width at short-term load ranged the diagonal, followed by the combined diagonal
from 0.15 to 0.17 mm, that these cracks expanded and vertical and vertical stirrups. The Figure indi-
after one year period, now ranged from 0.4 to 0.45 cates that the stirrup surface does not significantly
mm, noting that the new cracks appeared. change, as the inclination changes from 40° - 50°
Diagonal cracks in the tested beams were and the angle ranges between 30°- 60°. Increasing
forming an angle with the beam axis whose value the inclination of cracks for over 50° , the surface
was 35° -75° (Figure 11). of the transverse reinforcement begins.
The largest measured dilatation in the main re- Carrying capacity of reinforced beams with
inforcement before the beam break was εy = 23.26 diagonal stirrups strengthened with diagonal pins
‰, while dilation at which the reinforcement flux- in the support vicinity practically does not change.
ion was registered was εy = 2.43 ‰. However, it is useful to strengthen this area with
The fluxion was not registered in the stirrups, pins, in order to avoid local damage to the beam,
at least for loads for which it was possible to read which may result in the premature break.
the instrument. - Tensions measured in the concrete at the stage
The appearance of vertical cracks was only reg- before the onset of cracks can be said to agree with
istered in beams in whom the break was achieved the calculated tensions determined according to
by bending. the laws of the theory of elasticity.
These cracks occurred when the normal - In all observed cross sections, longitudinal
tension stress on the lower edge of the beam and transverse dilatations were measured. Their
reached the concrete tension strength in bend- development could not unobstructedly monitored
ing. The intensity of force during the occur- with the load increase. However, it is significant
rence of vertical cracks principally depended on to mention that tensions σy occur even in linear
the nurturing processes of the tested elements. beams, although minor compared to the tensions
The reinforcement percentage of reinforcing the σx. These beams operate as a kind of space grid.
main reinforcement did nor vary - it was con-
stant, while the reinforcement percentage of trans-
verse reinforcement varied. A number of diagonal
cracks appeared in the beam where the break was
Abstract 1. Introduction
The route guidance system developed in this The vehicle routing problem (VRP) has played
paper is an Adaptive Neuro Fuzzy Inference Guid- a very important role in the distribution and supply
ance System (ANFIGS) that provides instructions chain management, in addition to many other areas.
to drivers (soldiers) based upon “optimum” route During the past five decades, many have engaged in
solutions. The possibility for more confidential research on various types of vehicle routing prob-
predictions, leaning on scientific methods and ac- lems and have had a lot of success. Most of them
complishments of information technology leaves have aimed at static VRPs, and all their information
more time for the realization of logistic needs. In is assumed to be known and not to be changed dur-
the DRG system for selecting a road route, which ing the whole process. However, most vehicle rout-
is presented in this paper, the experiential knowl- ing problems are dynamic in the real world. Dis-
edge of military drivers who run transport vehicles patchers often need to readjust the vehicles routes
in logistics support units is accumulated in a neu- to improve vehicle efficiency and enhance service
ro-fuzzy network which has the capacity to gener- quality when accidents or unexpected incidents
alize solutions. Longstanding ambitions to acquire occur. With advances in modern communication
desired levels of efficiency within the system with technology to enable people to quickly access and
minimal costs of resources, materials, energy and process real-time data, the dynamic vehicle routing
money are the features of executive structures of problem (DVRP) is being given more and more at-
logistic systems. Uncertainty is prevalent and una- tention. In dynamic vehicle routing problems, the
voidable in business operations. A dynamic route situation is essentially different. Transport requests
guidance (DRG) system routes drivers using the arrive in time according to a stochastic pattern, and
current traffic and combat conditions. ANFIGS the task is to route the vehicles in an orderly fashion
can provide actual routing advice to the driver to satisfy the demand.
(soldier) in light of the real-time traffic and com- Relative to the static problem, the dynamic
bat conditions. In the DRG system for the choice problem has many notable features [1,2,3]. They
of road route, the experiential knowledge of mili- include that the time dimension is essential, future
tary drivers who control the transport in logistics information is imprecise or unknown, rerouting and
support units is accumulated in a neuro-fuzzy reassignment decisions may be warranted, faster
network which has the capability of generalizing solution speed is necessary and so on. In particular,
a solution. The adaptive neuro-fuzzy network is it must be dynamic, given that the decision-making
trained to select the optimal road route on the basis is based on incomplete, uncertain and changing in-
of standard and additional criteria. As a result of formation. Thus, it is not possible for the decision
the research, it is shown that the suggested adapt- maker to solve the entire problem at once [4]. Re-
able fuzzy system, which has the ability to learn, views on the problem can be found in [5,6,7,8].
has the capability of imitating the decision mak- In the last decades, there have been many at-
ing process of the transport support soldiers and of tempts to solve the problem of assigning vehicles
showing a level of competence which is compa- to transportation routes. In its simplest form, the
rable with the level of their competence. vehicle assignment problem (VAP) can be formu-
Key words: vehicle routing, fuzzy logic, lo- lated as a linear programming problem [9] and
gistic. solved with an application of the simplex method
[10], the assignment algorithm often called the than their single criterion equivalents. Zeleny [30]
Hungarian method [11], network algorithms [10] proposes one of the first multiple criteria formula-
or the transportation method [12], as well as its ex- tions of a classical transportation problem. Singh et
tensions [13]. In real life situations, however, VAP al [25] investigate another variant of a transporta-
is more complicated and requires more advanced tion problem focused on optimization of the total
methods to be solved. Some authors [14,15,16] transportation time between certain origins and
formulate VAP in terms of the linear, integer or destinations. The authors consider three non-linear,
mixed integer programming problem. Some oth- time oriented criteria, such as: riding time, loading
ers [17] transform the linear, discrete model into time and unloading time, and a set of numerous
a non-linear, continuous form. In both cases, the constraints. The problem is solved by a heuristic
problems are formulated either in a deterministic procedure that utilizes a specific and original struc-
or non-deterministic form [17,18]. Many models ture of the problem. The optimal solution defines
are based on the queuing theory, too [19,20], and the minimum flow of materials in the transportation
they consider either a homogeneous [16,17] or a network and the minimum time required to distrib-
non-homogeneous fleet [14,15]. Some of the mod- ute this flow in a network. The computational ef-
els combine VAP with other fleet management ficiency of the proposed algorithm is analyzed on a
problems, such as fleet sizing [17,21,22], vehicle real life case study focused on the transportation of
routing [17] or vehicle scheduling [16,23] with- iron ore in the steel industry.
in time and capacity constraints [21,22,24]. The Milosaviljevic et al [18] formulate a VAP for
models usually refer to specific transportation en- a road transportation company. The authors con-
vironments, such as urban transportation [16], rail sider a heterogeneous fleet operating from a cen-
transportation [15,23] or air transportation [14]. In tral depot and define types of vehicles allocated
the majority of cases, the proposed vehicle assign- to specific transportation jobs. The decision prob-
ment models have a single objective character, lem is formulated in terms of fuzzy mathematical
however, different objective functions are consid- programming and solved by an original heuristic
ered. The most popular are: total transportation procedure. Fuzzy numbers are applied to model
costs [15], profit [14,17] or empty rides (flows) the dispatcher’s preferences and different catego-
[16]. Depending on the specific characteristics of ries of constraints associated with fleet assign-
VAP and the complexity of the decision models, ment. Further extension of this research is pre-
various solution procedures and algorithms are sented in the articles of Vukadinovic et al [28] in
applied to solve specific instances of VAP. which neural networks are applied to generate a
Rushmeiner [14] present interesting consider- set of fuzzy decision rules allocating vehicles to
ations on the assignment of airplanes to particu- transportation routes. Due to the fact that in many
lar transportation routes. They formulated VAP real life situations VAP is characterized by high
in terms of mixed integer mathematical program- computational complexity, especially when it is
ming with price-wise linear constraints. The deci- combined with other fleet management problems,
sion problem is solved by a Cplex solver for the several authors apply heuristic procedures to solve
GAMS system and a heuristic procedure for the the analyzed problems. In some cases heuristics
rounding of non integer solutions. are combined with other well-known techniques,
The most up to date approaches to modeling such as branch-and-bound algorithms [14]. In the
and solving VAP involve: stakeholders’ analysis last several years metaheuristic algorithms have
leading to multiple objective formulations of the earned great popularity as solution procedures for
problem [24], analysis of uncertainty and impreci- an assignment problem [32,33].
sion of data [18,26,27] and the application of arti-
ficial intelligence methods in the problem solving 2. Problem statement and definitions
procedures [28,29,30].
Zeleny [30] and Singh et al [25] claim that mul- The purpose of logistics in the Serbian Army is
tiple criteria formulations of different categories of to create force, weaponry and military equipment
transportation decision problems are more realistic and secure ongoing support in combat operations.
The primary goal of military logistics is to contrib- During combat operations in Bosnia and in
ute to national security by providing the necessary Kosovo, it could be seen that units actively partici-
systems and weaponry and military equipment pating in combat operations require active logis-
whose properties are reliability, effectiveness and tical support that is expressed primarily through
efficiency, a high degree of readiness and techno- the delivery of the necessary quantity of infantry
logical superiority over potential adversaries. Ac- and artillery ammunition. The amount of ammuni-
cording to the military doctrine of the Republic of tion used during combat operations is large, and
Serbia, the basic functions of logistics are: main- the lack of possibility to supply units with the am-
tenance, production, supply and transportation, munition they need threatens the combat readiness
services and facilities. of the units. The experience of logistics support
One of the most important functions of lo- officers involved in supplying the units during
gistics is transport and supply. Supply means combat operations shows us that in addition to the
the procurement, deployment, storage and care basic criteria for selecting a route for carrying out
of material reserves, including determining the a transport assignment, it is necessary to consider
type and amount of reserves at each level. Each the additional criteria that are primarily based on
day, traffic support units receive a large number the experience of the decision makers.
of transport requests from other units who want Experienced officers have constructed criteria
to carry different types of load to various des- which they use for selecting a route for carrying
tinations. Each transportation request is charac- out a transport assignment. When selecting routes,
terized by a large number of attributes, among vehicles are chosen with the structural and techni-
which the most significant are type of goods, cal characteristics which satisfy the conditions for
quantity of goods (weight and volume), place transporting particular types of load. Fuzzy sets can
of loading and unloading, the preferred time of quantify linguistic i.e. qualitative and imprecise
loading and / or unloading, and the distance to information that occurs when making decisions.
which the goods are shipped. Thus, fuzzy reasoning can be used as a technique
Since the Serbian Army fleet has many differ- by which descriptive heuristic rules are translated
ent types of vehicles, dispatchers have to make into automatic management strategy i.e. decision-
decisions every day about which type of vehicle is making. By developing a fuzzy system it is possible
most suitable to perform the task. In logistics bas- to transform the deployment strategy for vehicles
es, the vehicles most commonly used for transpor- on specific routes into an automatic control strategy.
tation tasks are the TAM 4500/5000 capacity 5 t,
FAP 1314 capacity 8 t, TAM 150 T11 capacity 12 3. Mathematical Model
t and FAP 2026 capacity 20 t. One of the essential
prerequisites for the choice of vehicle is the choice Different than existing studies, our research
of route for carrying out the transport request. problem addresses three unique uncertainty fea-
The criteria by which the logistics support or- tures (i.e., soft time windows for vehicle arriv-
gan selects and makes a decision regarding which als, fuzzy random pickups of unwanted materials,
route the vehicle should use for the task are: and fuzzy random travel times) that often exist in
– Type of road surface, a fuzzy random environment. To formulate our
– travel distance, model, necessary notations are defined below.
– travel time,
– route capacity, 3.1. Notations for modelling
– vulnerability of the roads to blockage, The variables and parameters used in the model
– traffic capacity and road capacity, are:
– vulnerability of the road route to enemy
K - The number of vehicles.
action,
– the existence of alternative roads along the N - The number of customers.
length of the route. J - Vertex set of all customer nodes, where
J = {1, 2,..., N } .
- The load of vehicle k leaving from customer The objective function (3) is to minimize the to-
j. tal travel distance of all vehicles, where 0 is the start
EET j - The endurable earliness time of customer j . node of all vehicles. Constraint (4) is to ensure that
the vehicle capacity is not violated for each vehicle
ELT j - The endurable lateness time of customer j . k e V. Constraint (5) is to make sure that each cus-
tomer i e J is visited by one and only one vehicle
Then, our research problem can be formulated k e V. Constraints (6) and (7) are to show the rela-
as the following model: tionship between xijk and yik, i e J, j e J and k e V,
which are the flow conservation constraints of VRP.
Constraints (8) and (9) are to ensure that the time
min f1 = ∑∑∑ xijk dij ..................... (1) window of each node is taken into account whenthe
k∈V i∈J j∈J
service starts. Constraint (10) puts restrictions on the
load of customer j, j e J, in which the pickup amounts
∑d j y jk , ∀k ∈ V .......................... (2) q~j are often unknown, because the customers just
j∈J can present an approximate amount. Constraint (11)
is to make sure that vehicle capacity is not violat-
∑y jk = 1, ∀j ∈ J .......................... (3) ed for each vehicle keV when it leaves customer j.
k∈V Constraint (12) is to ensure that the customer satis-
faction level is higher than Sa. Constraint (13) is to
∑x
i∈J
ijk = y jk = 1, ∀j ∈ J , k ∈ V ................ (4) ensure that xijk and yik are binary variables, where i
e J, j e J and keV. Constraint (14) is to ensure that all
vehicles start and end from start node 0.
As known, it is hard to handle the problem
∑x
j∈J
ijk = yik = 1, ∀i ∈ J , k ∈ V ................ (5)
when it involves uncertainty. Kwakernaak [25]
proposed an algorithm to get the expectation of
a discrete fuzzy random variable, and later Kruse It is worth noting that Model (15) is formulated
and Meyer [23] formalized it in a clear way. to target the actual problem faced by a large-scale
According to Angeles Gil et al. [2], a fuzzy ran- construction project. As pointed out early in the
dom variable can be transformed into a fuzzy inter- introduction, existing VRP research with uncer-
val by using the expected value function. An examp- tainties has mostly focused on fuzzy variables or
le is given below to illustrate the method of obtai- random variables but very limited coverage of
ning the expected value of a fuzzy random variable. fuzzy random variables. To our best knowledge,
Though a fuzzy random variable can be trans- known studies have only dealt with fuzzy random
formed into a fuzzy number easily, it is still hard customer demands or travel times, or both. In con-
to handle the model involving fuzzy numbers. The trast, our model extensively addresses the fuzzi-
method proposed by Heilpern [20] is used to trans- ness in time windows for arrival times as well as
form these fuzzy variables into the deterministic the fuzzy randomness in both pickups and travel
� , nL times. This model is new and relatively compli-
ones. Suppose that there is a fuzzy number N a
cated, and, moreover, there exists no known solu-
and na are the upper and lower ends of the α-cut of
R
tion algorithms in solving Model (15).
the fuzzy number respectively, the expected value
� is defined by Eq. (14):
of a fuzzy number N 2. From Fuzzy to Neuro-Fuzzy
1 1 The development of fuzzy logic was motivat-
∫ na da + ∫ na da
L R
ed in large measure by the need for a conceptual
E(N) = 0 0
.................. (14) framework which can address the issue of uncer-
2 tainty and lexical imprecision. Some of the essen-
In this study, it is assumed that there exists a tial characteristics of fuzzy logic relate to the fol-
least tolerable customer satisfaction level S a that lowing [24]:
can be accepted by the decision makers. Following – exact reasoning is viewed as a limiting case
the discussion above, our mathematical model can of approximate reasoning,
be transformed into Model (15) as described below: – everything is a matter of degree,
– knowledge is interpreted as a collection of
min f1 = ∑∑∑ xijk dij elastic or, equivalently, fuzzy constraint on
k∈V i∈J j∈J a collection of variables,
∑ d j y jk , ∀k ∈ V – Inference is viewed as a process of
j∈J propagation of elastic constraints,
y = 1, ∀j ∈ J
∑k∈V
jk – Any logical system can be fuzzified.
∑ xijk = y jk = 1, ∀j ∈ J , k ∈ V Fuzzy logic [33] enables a mathematical po-
i∈J
∑ xijk = yik = 1, ∀i ∈ J , k ∈ V tential for the description of indefiniteness related
j∈J to cognitive processes with man, such as thinking
{ ) }
and reasoning. It enables reasoning with incom-
(
t j ≥ max EET j , ti + si + t ij xijk , j ∈ J , i ∈ J , k ∈ V
plete and insufficiently precise information, which
is also called approximate reasoning.
t j ≤ ELT j , j ∈ J
Fuzzy logic is mostly used for modeling com-
k
=
k
{( k
) }
l j max li + q j − d j xijk , j ∈ J , i ∈ J , k ∈ V plex systems in which it is hard to define, by us-
ing other methods, the interdependence that exists
l j ≤ Ck , j ∈ J , k ∈ V
1 between certain variables. The models based upon
∑ L j ( t j ) ≥ Sa fuzzy logic are based upon “IF-THEN” rules [26].
N j∈J Each rule establishes a relation between the lin-
guistic values through an IF-THEN statement
....................................... (15) IF x1 is Aj1 AND … AND xi is Aji AND … AND xn is Ajn THEN y is B j
where xi, i=1, . . ., n are the input variables, y tive Network Based Fuzzy Inference Systems
is the output variable Aj and Bj are linguistic va- [28,29,30]; Fuzzy Neural Networks [31]; Simpli-
lues labeling fuzzy sets. The degree with which fied Fuzzy Inference Networks [32]. These ap-
the output variable y matches the corresponding proaches to FLSs generate what are called neuro-
fuzzy set Bj depends on the degrees of matching fuzzy systems that, in the view of all the different
of the input variables xi, i=1, . . ., n to their fuzzy authors and subsequent users, bring together the
sets, Aj, and on the logic format (AND, OR) of ease of – linguistic – interpretation and mainte-
the antecedent part of the rule. So, it immediate nance of FLSs, with the computational power of
calculates the degree of matching in each rule as neural networks that can be trained through a gra-
shown in Figure 1. dient-type similar to the back-propagation (BP)
algorithm. The BP algorithm is a gradient descent
algorithm in which the derivatives of an objective
function (generally an approximation error in the
form of (13) or (14)) with respect to the param-
eters are calculated by the chain derivative rule.
A first forward pass is performed to determine
the network output and a second backward pass
is performed to adjust the parameters for better
approximation in a pattern-by-pattern fashion. In
the second pass, gradient information is computed
through the quantities calculated in the forward
Figure 1. Applying rules
pass, originating in some computational savings.
Thus, the algorithms developed for supervised
Each rule gives a fuzzy set as a result, with a
learning or tuning of FLSs adjust the parameters
membership function cut in the higher zone. Each
based on gradient information.
of the rules gives a set of fuzzy sets with differen-
tly cut membership functions, whose deterministic
values all have a share in the inferential result [31].
There are two main characteristics of fuzzy
systems that give them better performance for spe-
cific applications:
– Fuzzy systems are suitable for uncertain or
approximate reasoning, especially for the
system with a mathematical model that is
difficult to derive.
– Fuzzy logic allows decision making with Figure 2. Structure of adaptive neuro fuzzy infer-
estimated values under incomplete or ence system
uncertain information.
The adaptive-network view of FLSs is useful
Artiflcial neural systems can be considered as in translating many existing approaches from the
simplified mathematical models of brainlike sys- neural network field to the fuzzy system field, as
tems and they function as parallel distributed com- well as to generate hybrid approaches, compari-
puting networks. However, in contrast to conven- sons etc. By using the given input/output data, an
tional computers, which are programmed to per- Adaptive Neuro Fuzzy Inference System (AN-
form specific tasks, most neural networks must be FIS), Figure 2, forms a fuzzy system of reasoning
taught, or trained. They can learn new associations, in which the parameters of affiliation function are
new functional dependencies and new patterns. set by using the algorithm of back propagation or
In the early ‘90s some researchers started combined with the method of the smallest square
looking at FLSs as adaptive networks i.e., Adap- error. The merit of the back-propagation algorithm
is to devise an efficient computational approach for delivery to the customers. The data used in our
for the determination of the gradients necessary model were based on the surveys collected from the
for updating all the (many) network parameters. customers (e.g., time window, demand, and pickup
While fuzzy logic performs an inference mech- at each site) and documents provided by the sup-
anism under cognitive uncertainty, computational plier (e.g., loading times, vehicle capacities).
neural networks offer exciting advantages, such as As can be seen (section 4) summarizes the dis-
learning, adaptation, fault tolerance, parallelism tance between every two nodes. Note that a ‘-’ is
and generalization. A brief comparative study be- used when there is no route between the two des-
tween fuzzy systems and neural networks in their ignated nodes. Section 5 is the summary of the up-
operations in the context of knowledge acquisi- loading time (for pickup) at each point, the demand
tion, uncertainty, reasoning and adaptation is pre- of material at each point. The permissible time
sented in the following table 1 [13]. windows for each point are detailed in Table 2, and
the amount of the materials to be picked up at each
5. Case study point is listed in Table 1. Also note that the pickup
amounts in Table 1 are expressed as fuzzy random
The GLNPSO algorithm described in Section 4 variables, i.e., numeric specific values are translat-
has been successfully implemented and applied to ed from original statements such as “it is about 0.2
solve a vehicle routing problem for material trans- ton more likely,” “it is 0.3 now, but it may increase
portation encountered by a large-scale water con- a little more in the future.” Furthermore, the dead
servancy and hydropower construction project in weight of each vehicle is assumed 10 tons.
Serbia. Computational results of using GLNPSO
have been compared to those produced by the tra- 5.2. Comparison between GLNPSO and the
ditional PSO technique as well as those under an classic PSO
environment with different conditions.
To have further insight into the performance
5.1. Case overview differences between GLNPSO and the classic
PSO, our computational work has been conduct-
In real world, a material supplier may provide ed for two separate algorithms, one is coded us-
materials to many construction projects. It is the ing GLNPSO as presented in Section 4, and the
case faced by the construction firm (i.e., referred to other, based on the classic PSO technique. Each
as the supplier hereinafter) that is in charge of the algorithm has been run 200 iterations to search for
material supply for four large-scale water conser- the best feasible solution. The search convergence
vancy and hydropower construction projects to be history towards the best solution found is recorded
completed in the mountain areas in west of Serbia. separately and depicted in Figures 3 and 4 respec-
Due to the fuzziness and randomness in pickups tively. By comparing Figure 3 with Figure 4, it is
and time windows constraints on travel times, in clear to see that GLNPSO performs much better
this study only one kind of material is considered to than PSO both in terms of the speed of conver-
This function expresses the MSE in approxi- where h is called the learning rate (i.e., the
mating the data samples. The optimization of an step-size) and is generally a small positive con-
FLS can be stated as finding the parameters w that stant. Training points are generally shuffled be-
minimize E(w). tween epochs so that they are always presented to
A common approach in the FLS and neural net- the FLS in a different order. Using Equation (13)
work literature, motivated by ease of computation, the update for w can be computed as
consists of presenting a sample datum, say the i-th,
to the FLS (or neural network) and updating the ∂E ( w ) 1 N ∂Ei ( w )
= ∑ ................... (23)
adjustable parameters in order to only minimize ∂w N i =1 ∂w
Ei(w). By constantly repeating this process while
In the pattern-by-pattern training mode the
alternating the presentation of all the data and
same sensitivities are computed but the parameters
using small updates, it is hoped to minimize the
whole E(w). This procedure is a type of stochastic are instantly updated, thus yielding N updates per
gradient algorithm generally named pattern-by- epoch and a different algorithmic path. The sen-
pattern (or on-line) training. The presentation of sitivities of interest (i.e., partial derivative of the
the entire set of data to the FLS is generally re- instantaneous error function with respect to the
ferred to as an epoch. In pattern-by-pattern train- adjustable parameters) can be computed by chain-
ing the adjustable parameters are updated N times rule derivation of Equation (14), thus, yielding
every epoch. The pattern-by-pattern approach is
an approximation to the minimization of (13) and ∂E ( w ) ∂Ei ( w ) ∂y ∂y
= = y ( xi , w ) − ydi
it has some rigorous theoretical foundations in the ∂w ∂w ∂w ∂w
stochastic gradient approximation (SGA) [18,19]. ....................................... (24)
We are now going to develop the problem for-
mulation for the pattern-by-pattern training mode. Substituting Equation (20) in (18) we obtain
The supervised learning problem can be formu- the training update equation
lated as
∂y
min E ( w ) .............................. (20) wold − h y ( xi , w ) − ydi
wnew = ,i =
1, 2,..., N
w ∂w w = wold
FLS is linear in the consequent parameters (as can the results obtained, we can conclude that the AN-
be seen from (12)), once the antecedent param- FIS model can reproduce the decisions of dispatch-
eters are fixed. In the case of a discrete universe ers with great accuracy, and thus allocate vehicles
of discourse, the result of defuzzification is calcu- to meet transport requirements. This is particularly
lated in accordance with important in situations when a decision needs to be
made by a logistics support organ which has a lack
n
of sufficient experiential knowledge and in condi-
∑ m (x )⋅ x i i
tions when making a quality decision is influenced
u= i =1 ......................... (26)
n by a large number of uncertainties. In addition, the
∑m (x )
i =1
i numerical results imply the potential applicability
of the proposed model used as a decision-making
where m(xi) represents the fuzzy set that re- tool for route selection.
sults after the accumulation phase, n represents
the number of levels of discretisation of the stated
fuzzy set along x, xi is i discrete value, and m(xi) is Acknowledgements
the fuzzified value of xi. The work reported in this paper is a part of
If there is a difference between the obtained the investigation within the research project TR
and expected data, modifications are made to the 36017 supported by the Ministry for Science and
connections between the neurons in order to re- Technology, Republic of Serbia. This support is
duce error i.e., membership functions are tuned gratefully acknowledged.
into adaptive nodes. Figure 4 shows the appear-
ance of the membership functions of the ANFIS
References
model after training the adaptive neural network
1. Abara J. Applying integer linear programming to the
fleet assignment problem. Interfaces 1989; 19(4):
6. Conclusions 20-28.
The hybrid neuro-fuzzy system briefly pre- 2. Altug S, Chow MY, Trussell HJ. Fuzzy inference sys-
sented in this paper was successfully applied in tems implemented on neural architectures for motor
designing an intelligent decision support system fault detection and diagnosis. IEEE Transaction on
industrial Electronics 1999; 6: 1069-1079.
for route selection in uncertainty conditions. The
research conducted proves that fuzzy neural net- 3. Beaujon GJ, Turnquist AM. A Model for Fleet Siz-
works are a very effective and useful instrument ing and Vehicle Allocation. Transportation Science
for the implementation of intelligent decision sup- 1991; 1: 19-45.
port systems for route selection. Developing the 4. Booler JM. The Solution of Railway Locomotive
ANFIS model enabled the deployment strategy for Scheduling Problem. Journal of Operations Research
vehicles on transport routes to be transformed into Society 1980; 31: 943-948.
an automatic control strategy. The performance 5. Bradley SP, Hex A, Magnanti T. Applied Mathemati-
of the developed system depends on the number cal Programming. Addison-Wesley 1977.
of experienced logistical support officers, and the
6. Chiclana F, Herrera F, Herrera-Viedma E, Alonso
ability of analysts, after long communication with S. Some induced ordered weighted averaging opera-
them, to formulate a decision-making strategy. tors and their use for solving group decision-making
As a result of the research, it has been shown problems based on fuzzy preference relations. Euro-
that the proposed adaptive fuzzy system, which pean Journal of Operational Research 2007; 182:
has the ability to learn, can imitate the decision- 383-399.
making of logistics support officers and demon- 7. Cooke WP. Quantitative Methods for Management De-
strate a level of expertise that is comparable to the cision. McGraw-Hill Book Company, New York 1985.
level of their expertise. 8. Crainic TG. Service Network Design in Freight
By reviewing the performance of the trained Transportation, European Journal of Operational
neural network i.e. the adjusted fuzzy system and Research 2000; 122: 272-288.
9. Crainic TG, Laporte G. Planning models for freight problem. Transportation Planning and Technology
transportation. European Journal of Operational 1996; 20: 33-47.
Research 1997; 97: 409-439.
24. Pamučar D, Božanić D, Đorović B, Milić A. Model-
10. Delgado M, Herrera F, Herrera-Viedma E, Martín- ling of the fuzzy logical system for offering support
Bautista M J, Martínez L, Vila A M. Communica- in making decisions within the engineering units
tion model based on the 2-tuple fuzzy linguistic rep- of the Serbian army. International journal of the
resentation for a distributed intelligent agent system physical sciences 2011; 3: 592 - 609.
on internet. Soft Computing 2002; 6: 320-328.
25. Park B. Hybrid neuro-fuzzy application in short-
11. Green LV, Guha D. On the Efficiency of Imbalance term freeway traffic volume forecasting. In Trans-
in Multi-Facility Multi-Server Service Systems. portation Research Record, National Research
Management Science 1995; 41: 179-187. Council, Washington 2002; 190-196.
12. Henn V. Fuzzy route choice model for traffic assign- 26. Pilot C, Pilot S. A Model for Allocated versus Ac-
ment. Fuzzy Sets and Systems 2000; 116: 77-101. tual Costs in Assignment and Transportation Prob-
lem. European Journal of Operational Research
13. Herrera F, Herrera-Viedma E, Martínez L. A fuzzy
1999; 3: 570-581.
linguistic methodology to deal with unbalanced
linguistic term sets. IEEE Transactions on Fuzzy 27. Rushmeier RA, Kantogiorgis AS. Advances in the
Systems 2008; 16: 354-370. Optimization of Airline Fleet Assignment. Trans-
portation Science 1997; 2: 159-169.
14. Hillier FS, Lieberman J G. Introduction to Opera-
tions Research. McGraw-Hill, New York 1995. 28. Singh P, Saxena P. The Multiple Objective Time
15. Ichoua S, Gendreau M, Potrin YJ. Vehicle Dispatch- Transportation Problem With Additional Restric-
ing With Time--Dependent Travel Times. European tions. European Journal of Operational Research
Journal of Operational Research 2003; 2: 379-396. 2003; 3: 460-476.
16. Jang JSR. ANFIS: Adaptive Network based Fuzzy 29. Sneider H, Frank MP. Observerbased supervision
Inference Systems. IEEE Transactions on Systems, and fault detection in robots using nonlinear and
Man and Cybernetics 1993; 3: 665–685. fuzzy logic residual evaluation. IEEE Transaction
on Control System Technology 1996;3: 274-282.
17. Jaszkiewic A. A Metaheuristic Approach to Multiple
Objective Nurse Scheduling. Foundations of Com- 30. Taillard ED. Comparison of Iterative Searches for
puting and Decision Sciences 1997; 3: 169-184. the Quadratic Assignment Problem, Location Sci-
ence 1995;3: 87-105.
18. Khosravi A, Talebi HA, Karrari M. Fault detection
and isolation for unknown nonlinear systems us- 31. Takagi H. Fusion technology of neural networks and
ing expert methods. Proceedings of the 2005 IEEE fuzzy systems. International journal of applied math-
Conference on Control Applications, Canada 2005; ematics and computer science 2000; 4: 647-675.
1486-1490. 32. Teodorovic D. Fuzzy logic systems for transporta-
19. Lee B, Fujiwara A, Sugie Y, Namgung M. A sequen- tion engineering: The state of the art. in trans-
tial method for combining random utility model and portation research. Journal of the transportation
fuzzy inference model. Journal of Advanced Com- research board 1999; 33: 337-364.
putational Intelligence and Intelligent Informatics
33. Vemuri AT, Polycarpou MM, Diakourtis AS. Neural
2003; 3: 117-121.
network based fault detection in robotic manipula-
20. Löbel A. Vehicle Scheduling in Public Transit and tors. IEEE Transaction on Robotic and Automation
Lagrangean Pricing. Management Science 1998; 1998; 2: 342-348.
44: 1637-1649.
21. Lotfi V, Pegels C. Decision Support Systems for Corresponding Author
Management. Science/Operations Research, Irwin, Miodrag Regodic,
Homewood 1989. Military Academy,
University of Defence,
22. Martínez L. Sensory evaluation based on linguistic
Belgrade,
decision analysis. International Journal of Aproxi-
Serbia,
mated Reasoning 2007; 2: 148-164.
E-mail: mregodic62@gmail.com
23. Milosavljevic N, Teodorovic D, Papic V, Pavkovic
G. A fuzzy approach to the vehicle assignment
This is the main reason for the distributional 5. total printed edition – Nu,
and organizational allocation of work in a way that 6. total print time – Vu.
rational rotary printing is possible only in the area
of large circulations. The first part implies the recorded time in
The aim is to find the optimum method to lower which the printing of a certain publishing product
the limit of rationalization and enable rotary print- is entirely finished. The second part is character-
ing in the field of small and medium circulations ized by the time recorded at the beginning of the
(circulations of several thousand copies). This con- print process of the next publishing product. It is
tributes to the existing trends of a significant fall in necessary to emphasize that the plan is to record
the number of circulations of rotary printing key the time of new printing in which the subject of
products – magazines, books, newspapers, direc- the research and analysis does not limit the type
tories, marketing advertising brochures and flyers, of work. Subsequent publishing product is mea-
etc. Nowadays, although there are other examples, sured according to industrial and technological
there are still a large number of industrial rotary in- schedule. The aim is not to adjust time to the test
stallations, without the necessary supplements that samples. On the contrary, the aim is to adapt to
contribute to the rationalization and automation, the technological schedule of a realistic indus-
according to GAIN [3]. Given the demanding ini- trial production of magazines and journals. This
tial investment in the rotary complex (several times is considered a particularly important contribu-
more significant compared to the flat printing), thus tion since the measuring of results is carried out
contributing to the efficient and economically justi- within the daily production. There is no laboratory
fiable use of this technology [4]. adjustment or necessary confidence in the norma-
It is necessary to position the possibility of use tive characterization of machinery manufactur-
of rotary printing technique in a more rational way, ers, which is often a set of parameters that cannot
both in the smaller circulations, as well as in the be achieved in reality. It is realistic to expect the
area of improvement of economic category factors dependence of time and technical differences be-
of productivity factors – this is both for the effi- tween the two recorded times with more different
ciency in technology, and for the economic crisis in parameters (format, paper type, color print cov-
the printing segment on the global level, and for the erage, paper weight, paper strip width, different
influence of other media, according to Primir [5]. layers of color fastness, various factors of product
quality). It has been decided to methodologically
2. Theoretical background and research ignore these differences and to set the research ob-
plan ject in a way that the concentration measurement
is set by these parameters exclusively. If unit or
The experimental process of printing is lim- test measurement were performed, these variables
ited to journals and magazines in a large industrial could be significant. Given the experience, since
press, equipped with rotary planographic printing this is a long-term measurement, through twelve
systems. The results of printing are measured in working shifts in the printing department (four full
the following way: days), with a number of variables in a technical
1. the printing termination time of the current job description, these deviations are average in
publishing product (magazine sheet) – the long-term and do not generate significant differ-
print of the last sheet - v1, ence of the time component.
2. the printing start time of the first following The objective of this phase of time measure-
publishing product – machine preparation ment (v2 and v1) is to get a total machine prepara-
time - v2, tion time between two jobs, i.e. the time necessary
3. the number of copies of the new printed for the adjustment of all technological parameters
product before the first sales copy - the needed for the new job. This time was named the
amount of maculature copies – Ns, machine preparation time (Vs). Given the experi-
4. the copies printed during the whole edition ence, the average machine preparation time, ac-
– Np, cepted as normative and generally acceptable, is
between 45 and 70 minutes. It is a technological sary to detect and identify these instabilities and
and experiential value of the existing generation do the test and measurement after implementing
of machines for rotary planographic printing, the measures. The analysis within the unstable
without specifically installed automation routines, conditions is neither credible nor gives realistic
where the set relation is as follows: results in variables decided to be measured, and
the results could suggest insufficient quality of the
Vs=v2- v1 potential conclusion.
In doing so, the following relation is applied:
The number of copies required to stabilize the
print (density), the relationship of printing param- Nu=Ns+Np,
eters (register, relation water-color), and all other
elements necessary for the achievement of the val- Using the relational ratio of prints and needed
ue and quality of printing on the level of sales cop- printing time, the picture of efficiency of the press
ies (Ns) are necessary in order to measure the total is given. These parameters are sufficient for the ini-
number of start maculature copies, i.e. the number tial analysis, as the basis for the suggestion of meth-
of copies that are thrown away and are not for sale. ods for improving the parameters of rationalization.
Parameters Vs and Ns are basic measurable ele- The parameters measured in this way contra-
ments which are given a picture of initial efficien- dict the parameters that are believed to significant-
cy and flexibility of the printing plant and make ly improve the printing process in the direction of
a significant element of measuring the efficiency realistically emphasized parameters of rationaliza-
of the press. Empirically, depending on the qual- tion, which makes the printing system applicable
ity level of the magazine, the expected amount of and appropriate.
start maculature copies is 3,500-5,000. Two technical parameters are added to the sys-
Further measurements are restricted to the en- tem for the experimental and testing purposes:
tire process of printing the full run and the process – CIP3 (Cooperation for Integration of
number of printed copies is measured – Np. These Prepress, Press and Postpress) protocol [6],
parameters are measured precisely (time; number – console measuring systems according to
of printed copies), while the parameters related to the principle of Close Loop measuring
the interval of washing rubber blankets (the num- parameters [2].
ber of washings within the run and the interval be-
tween the two washes) are observed and recorded, The initial measurement process (without the
but are registered only within the total circulation proposed improvements) is measured experimen-
(Nu) and the overall time, and are not analyzed tally and implemented continuously, four days in a
numerically and separately. row, in 12 shifts (total time that is available for test-
The reason for this methodology is the follow- ing in real industrial conditions, which amounts to
ing - the interval of washing rubber blankets and 96 hours). The measurement process with the pro-
the frequency itself are important parameters of posed parameters of improvements requires con-
printing process stability. Given the experience, siderably more time (within one month of work)
but depending on the level of quality, they are ex- – this is the time required for periodic repetition
pected to reach a value in the range between 40,000 of weekly, semimonthly and monthly magazines
and 60,000 copies (the number of printed copies that are the subjects of the experiment. Therefore,
between the washing intervals). If the obtained only the magazines (all sizes) whose periodicity
results were within these parameters, the defined is known in advance are selected for the experi-
parameters of the experiment would be sufficient; ment. This is the only way it is possible to com-
however, if there is a need for higher frequency pare the unique parameters between the initial and
of washing rubber blankets, the experimental pro- improved measurement processes, with identical
cess should be stopped because different and less prints. It is necessary to further define or eliminate
favorable numerical values would result in some the possibility of changing any of the key vari-
of the instability factors in the press. It is neces- ables for the printing process. It is ensured that,
within the month in which the measurements are full tones (k, c, m and y) density value for different
made, the following constants can be found on the dot area values (25%, 50% and 75%), as well as
machine (identical color, identical rubber blanket, density combination of different intensity and dif-
identical wetting solution and silicone coating, un- ferent combinations of coloring by primary colors
changed dot gain curves in the field of creating the of subtractive synthesis – in the visual field of gray
printing form, and the constancy of the dot gain balance (cmy 25%, cmy 50%, cmy 75%), and in
increment on the printing machine). full tones (my 100%, cm 100%, cy 100%).
Minimal differences of technical parameters of
periodicity of testing repeat in two measurement
processes (initial and advanced) – they refer to the
minimal difference in the circulation and number
of pages, cumulatively do not represent a signifi- Figure 1. Control strip for the density control
cant variability and, for the purposes of this ex-
periment, are methodologically fully excluded. Initial and updated measurement in the CIP3
In both measurement cases, the determinant of system is measurable in a simple way. This system
measurability is the standardized print. Here the does not affect the process values of printing, but
pre-planned system of standardization is not given only the initial time and initial maculature copies.
up and the system which has been checked and Although the progression could be expected in
tested exists in the industrial process in everyday both variables by installing the CIP3, and with-
use in the press where the measurement is per- out installing the Close Loop console system, the
formed. Testing and measurements are done ac- experimental measurement process is integrated.
cording to the classification Fogre [6]. The starting The initial measurement provides an initial (found
point is the print of standardized quality, which is at the press) and basic hardware installation, while
the print that during the entire printing process of the measurement with the proposed methods of
full circulation achieves printing values within the improvement includes an integrated installation
standard according to which the printing process of both the proposed improvement systems. Cer-
is performed. The quality control of the print is tain elements of progression would be realistically
checked by measuring the control stripes placed on expected in both the single and the segment in-
the paper edge and on the part of the sheet which stallation. However, since these systems are con-
will be cut off and removed after the performed nected, the suggestions for integrated installation
test. In the area of quality printing, the focus is on are given. It is believed that this enables more sig-
achieving the standard values. Density of all color nificant and measurable areas of improvement and
values is measured, and printing of color prints is rationalization of printing, which detects the path
performed using the process colors of subtractive to more efficient business process.
synthesis. The request e d density value is mea-
sured as it shows the ability of the printed area to 3. Initial measurement process with the
keep an optimum level of color and how much the interpretation of results
measured print retained and reflected the light is
registered. Color strip is defined by measuring the The object of measurement is defined – the
quality of the prints of each of the colors in the se- sheets of a magazine within procedural and tech-
lected intensities, as well as the correlation of two nological schedules of the press without affecting
colors and all the colors respectively. their sequence, similarity, or quality difference. The
In the field of the initial measurement, the el- time frame of measurement is defined – four full
ements are measured by hand. In the field of the working days, i.e. twelve full shifts or ninety-six
measurement with an installed device, the elements hours, as the machine is available in the test period.
are measured mechanically using a Close Loop sys- Within that time, the sheets are printed as follows in
tem of console dynamic measurement of the wedge the table (Table 1), and the times Vs are given.
width, placed through the entire width of the paper The measurement fields are defined:
strip. The color strip measures density values for Ns, Np (Nu) and Vs.
Table 1. Test samples and registered times according to the real schedule of industrial production courses
Estimated
No. Technical description of the tested sample v1 v2 Vs
circulation
1 1st sheet (magazine I), cylinder width 96 cm, paper LWC 80 g/m2, 54,000 00.12 01.11 59
2 2nd sheet (magazine I), cylinder width 96 cm, paper LWC 80 g/m2, 54,000 03.11 03.54 43
3 3rd sheet (magazine I), cylinder width 96 cm, paper LWC 80 g/m2, 54,000 06.48 07.32 44
4 4th sheet (magazine I), cylinder width 96 cm, paper LWC 80 g/m2, 54,000 10.01 12.21 140
5 1st sheet (magazine II), cylinder width 88 cm, paper LWC 65 g/m2, 17,000 13.22 14.16 54
6 2nd sheet (magazine II), cylinder width 88 cm, paper LWC 65 g/m2, 17,000 15.23 16.01 38
7 3rd sheet (magazine II), cylinder width 88 cm, paper LWC 65 g/m2, 17,000 16.55 17.34 39
8 4th sheet (magazine II), cylinder width 88 cm, paper LWC 65 g/m2, 17,000 18.28 19.09 41
9 5th sheet (magazine II), cylinder width 88 cm, paper LWC 65 g/m2, 17,000 20.02 20.41 39
10 5th sheet (magazine II), cylinder width 88 cm, paper LWC 65 g/m2, 17,000 21.22. 22.04 42
11 1st sheet (magazine III), cylinder width 84 cm, paper SC 75 g/m2, 22,000 23.01 23.47 46
12 2nd sheet (magazine III), cylinder width 84 cm, paper SC 75 g/m2, 22,000 0.22 01.11 49
13 3rd sheet (magazine III), cylinder width 84 cm, paper SC 75 g/m2, 22,000 01.53 02.37 44
14 4th sheet (magazine III), cylinder width 84 cm, paper SC 75 g/m2, 22,000 03.22 04.02 40
15 1st sheet (magazine IV), cylinder width 88 cm, paper LWC 75 g/m2, 41,000 05.34 06.09 35
16 2nd sheet (magazine IV), cylinder width 88 cm, paper LWC 75 g/m2, 41,000 07.41 08.23 42
17 3rd sheet (magazine IV), cylinder width 88 cm, paper LWC 75 g/m2, 41,000 09.55 10.31 36
18 4th sheet (magazine IV), cylinder width 88 cm, paper LWC 75 g/m2, 41,000 12.02 12.41 39
19. 5th sheet (magazine IV), cylinder width 88 cm, paper LWC 75 g/m2, 41,000 14.04 14.41 37
20. 6th sheet (magazine IV), cylinder width 88 cm, paper LWC 75 g/m2, 41,000 16.03 16.41 38
21 1st sheet (magazine V), cylinder width 88 cm, paper LWC 65 g/m2, 151,000 22.23. 23.11 48
22 2nd sheet (magazine V), cylinder width 88 cm, paper LWC 65 g/m2, 151,000 05.21 06.12 51
23 3rd sheet (magazine V), cylinder width 88 cm, paper LWC 65 g/m2, 151,000 12.01 12.41. 40
24 4th sheet (magazine V), cylinder width 88 cm, paper LWC 65 g/m2, 151,000 19.22 20.09 47
25 5th sheet (magazine V), cylinder width 88 cm, paper LWC 65 g/m2, 151,000 02.22 03.03 41
26 6th sheet (magazine V), cylinder width 88 cm, paper LWC 65 g/m2, 151,000 09.21 09.57 36
27 1st sheet (magazine VI), cylinder width 84 cm, paper SC 65 g/m2, 221,000 18.41 19.28 47
28 2nd sheet (magazine VI), cylinder width 84 cm, paper SC 65 g/m2, 221,000 03.21 03.56 35
Table 2. The system of density in industrial parameters of the press
Class A and B - Fogra 46 Class C - Fogra 41 Class D – Fogra 42
Cyan: 1.30 – 1.40; Cyan: 1.30 – 1.40; Cyan: 1.05 – 1.20
Magenta: 1.30 – 1.50; Magenta: 1.30 – 1.50; Magenta: 1.05 – 1.20
Yellow: 1.30 – 1.40; Yellow: 1.30 – 1.40; Yellow: 1.05 – 1.15
K: 1.55 – 1.75; K: 1.50 – 1.70; K: 1.20 – 1.40
The interval of washing rubber blankets is mea- Altogether, there are twenty-eight different
sured, as defined, but only as an indicator factor of samples measured, with a wide range of techni-
printing process stability. All parameters are mea- cal characterization in all major segments – pa-
sured by the standards of press (Table 2), which per type, paper weight, paper strip width, average
makes the target density values, as a parameter color coverage, complexity of the product quality.
which needs to be reached in order for the N and V The obtained values of Vs – machine prepa-
variables to be measured. ration time are shown in the following scheme
Here, A, B and C are groups of products ac- (Scheme 2).
cording to the demands of quality (A – products of The minutes necessary to prepare the machine
the highest quality, B – products of high quality, (V2-V1) are shown on the horizontal axis, be-
C – products of medium and lower quality). tween two jobs, for all the tested 28 jobs. On the
in 12 shifts, in twenty-eight different jobs. Based It is necessary to analyze the medium obtained
on the above, one might conclude (1290/4) that, values. The table shows the following:
on average, more than five hours is spent daily for
the machine preparation. This is a really significant Δ Ns = 3,608 copies
time component because it generates close to two Δ (Nu – Nd) = 5,009 copies
thousand hours a year in which the machine is not
printing but is executing the necessary preparatory The above shows that the average number of
processes. Thus, in a press organized in this way, 81 maculature copies required for printing twenty-
days a year is spent on preparing the printing press eight different products is 3,608 copies, while the
in the rotary industrial production area. average total number of maculature copies (actual
In the area of circulation, all printed copies printed copies for the press, without the technolog-
are elaborated and measured, and the results for ical supplement for graphic processing) is 5,009
all twenty-eight products are provided in the table copies. Here the following relation is applied:
(Table 3). The starting point is the sales circulation Δ Ns + Δ (Nu – Nd) = 8,617
that is defined in the first tabular view; the starting
circulation – which is needed for the printing stabi- Therefore, to print twenty-eight different prod-
lization before the first sales printed copies (macu- ucts in defined circulations, 21.5 hours were spent
lature) – is measured, and the process circulation (from the total of 96 hours), and for each product,
through the entire process of printing the real cir- 8,617 of maculature copies were spent on average.
culation (without the start maculature copies). It is The results have clearly demonstrated the initial
necessary to emphasize that the measurements are hypotheses about the possible application of rotary
restricted to the predicted circulation variables - printing within the area of the large circulation.
Ns (start maculature copies), Np (process circula- Only large circulations can justify the technological
tion during the print), and, for the exactness of the loss in time and the number of printed copies of this
experiment, the part (50-150 copies) needed as a kind. Although certain machine preparation time,
technological supplement for graphic processing, the normative number of maculature copies, and
is deducted from each of the total circulations. For the overall technological normative component of
each work order, the amount of technological sup- printed copies and the time required are expected,
plement for graphic processing is deducted sepa- the obtained results show a lack of competitive-
rately in order to limit the measuring exclusively ness of rotary printing in the area of planographic
to the printing process efficiency. printing in small circulations. An objection to the
The obtained values of Ns – start maculature methodological drawback of the summation Δ Ns
samples are displayed in the following scheme and Δ (Nu – Nd) is possible since the differences
(Scheme 3). On the horizontal axis, the tested sam- within the Δ (Nu - Nd) are noticeable. This could
ples are shown, while the vertical axis shows the probably be acceptable to a certain extent since the
values of maculature copies. larger the circulation of the product, the bigger the
number of washing rubber blankets is (regardless
of their interval), and in every wash (given the ex-
perience) 400-500 prints are lost (these values were
confirmed in the measurements). However, since
the integrated suggestions for the improvement
of these values are projected, the motive is to also
monitor the condition Δ (Nu – Nd) after the imple-
mented improvements, i.e. to see whether there is a
correlation between the number of process macula-
ture copies and the suggested improvements. In this
way, the possible objection to methodology would
lose its significance and would not be relevant for
Scheme 3. Maculature values – Ns this experiment.
4. Measurement process using the suggested cal comparison of both experimental phases to re-
rationalization methods main correct. Average values from the initial test-
ing were not re-calculated since by excluding the
It is realistic to conclude that the previously ob-
two products this new value shows insignificant
tained results are positioned clearly enough. Previ-
differences. This distinction does not affect either
ous measurements suggest that the methods used to
of the elements of the defined methodology. Due
reduce all of the measured values are necessary. Time
to the different printing schedule compared to the
saving is necessary in the field of machine prepara-
initial measurement, the table (Table 4) provides
tion. Saving in the area of start maculature copies is
only the total time component – Vs.
necessary. Process savings are also necessary.
Table 4. The time component measured using the
By the experimental method of measuring the
new suggested printing methods
printing parameters within realistic industrial pro-
No. Vs
duction conditions, it is proposed to implement a
close application relation between the process of 1 27
creating a printing form and the printing process 2 31
itself. This is the first suggestion within the meth- 3 24
ods of improvement and the first essential step of 4 24
5 32
technical acceleration of this type of communica-
6 37
tion. It is believed that properly set protocol CIP3
7 39
system [6], according to Barisic, contributes sig-
8 19
nificantly to the automation and speed of manag-
9 18
ing this phase of the industrial process. Schematic
10 24
presentation of the organization of the protocol
11 17
within the CIP3 system and Print Production For-
12 27
mat (PPF) application support is shown in the fol-
13 25
lowing scheme (Scheme 4).
14 31
15 31
16 26
17 24
18 19
29 30
20 27
Scheme 4. The operation of CIP3 PPF protocol 21 24
22 32
As stated in the research plan, the products 23 36
with regular and periodical publishing were se- 24 42
lected for the experiment. Although a challeng- 25 41
ing time component is required for repeating the 26 34
experimental measurements of identical products,
and even though these products are not printed The obtained results are shown graphically in
in the same order as during the initial testing, the the following scheme (Scheme 5).
tabular description of new experimental measure- Here the relation for the improved measured
ments is shown in the following table (Table 4). time component is applied:
Due to the reduced number of sheets (magazine
ΔVsk = 28.5 minutes
II and magazine IV) in real publishing periodi-
cals of tested products, the experimental part was Going back now to the obtained time results
carried out on 26 products – the products under in Table 1 (and if we exclude the products under
numbers 10 and 20 were excluded from the first numbers 10 and 20, for transparent comparison),
tabular description in order for the methodologi- the comparative time results are visible in the fol-
lowing scheme (Scheme 6), where the lower curve ally, the circulations compared to the previous
shows the improved values, while the upper curve month were slightly changed, which does not af-
shows the process of the initial measurement. fect the significance of the experiment.
Table 5. Real circulation values within the prin-
ting process obtained using the suggested impro-
vement methods
Defined
No. of
circulation Ns Np Nu Nu-Nd
the job
(Nd)
1 52,000 1,706 53,131 54,837 2,837
2 52,000 1,841 53,073 54,914 2,914
3 52,000 2,111 52,754 54,865 2,865
4 52,000 1,736 52,687 54,423 2,423
5 19,000 1,643 19,758 21,401 2,401
Scheme 5. Obtained results 6 19,000 2,004 19,613 21,617 2,617
7 19,000 2,134 19,911 22,045 3,045
8 19,000 2,454 19,681 22,135 3,135
The total time saving of the machine prepara-
9 19,000 1,987 19,882 21,869 2,869
tion is visible in the following record:
10 22,000 2,093 23,011 25,104 3,104
Δ Vs – Δ Vsk = 17.5 minutes 11 22,000 2,243 22,916 25,159 3,159
12 22,000 2,132 22,849 24,981 2,981
where Δ Vsk is updated and improved time. 13 22,000 2,227 22,693 24,920 2,920
It can be noticed that with the proposed im- 14 36,000 1,988 38,391 40,379 4,379
provement, it is possible to save up to 40% of the 15 36,000 2,399 38,131 40,530 4,530
total time. If this information is displayed relation- 16 36,000 2,066 37,682 39,748 3,748
ally in the longer period of time, within a four-day 17 36,000 2,087 37,725 39,812 3,812
production, we do not need 21.5 hours, but much 18 36,000 2,772 37,923 40,695 4,695
less – 12.9 hours (which makes a saving of few 19 147,000 2,152 149,123 151,275 4,275
hours a day). Within one year it is no longer 81 20 147,000 1,759 148,894 150,653 3,653
but 46 days a year. Therefore, the suggested ra- 21 147,000 1,976 149,583 151,559 4,559
tionalization method can realistically save more 22 147,000 1,591 149,711 151,302 4,302
than one month a year, just in the time process 23 147,000 2,421 148,864 151,286 4,285
of preparing the printing press. 24 147,000 2,143 149,131 151,274 4,274
25 206,000 1,439 208,032 209,471 3,471
26 206,000 1,754 208,473 209,786 3,786
Δ 2,133 3,502
5. Conclusion
The key segment of the whole printing process
and measuring the given variables
Ns, Np (Nu) and v1, v2 and Vs
proves the projected hypotheses. Rotary indus-
trial environment in all key parameters is more de-
manding than the printing processes in the domain
Scheme 8. Comparative description of the initial
of flat printing. The time component of managing
and updated number of start maculature copies
the entire rotary business is an extremely demanding
variable. Unlike planographic printing, all the print-
Here it is necessary to analyze the medium ob-
ing corrections, adjustments and definitions occur
tained values. The table shows the following:
during the full-speed of the rotation work. Precisely
Δ Nsk = 2,133 because of this fact, along with the exceptional com-
plexity of the managing the variable of time spent –
Δ (Nuk – Ndk) = 3,502 maculature copies are one of the key segments of the
Where: rotary efficiency. Although the investment in the ro-
tary industrial environment is many times more de-
Δ Nsk + Δ (Nuk – Ndk) = 5,635 manding compared to investment in offset printing,
Finally, the following scheme (Scheme 9) great caution is needed when configuring rotation.
shows a comparison of the initial and updated to- Due to the major financial investment expenditures,
tal number of maculature copies, with the same a withdrawal from the significant elements of auto-
curve ratio as in previous schemes. mation is common. Although a rotation equipped in
The above shows that the average number of this way raises the level of investment for several
updated maculature copies (using the improved hundreds of thousands of euros, all the drawbacks in
method) is for 1,475 copies lower than in the ini- operating with the initally equipped rotations with
tial testing, while the total number of maculature the elements of basic equipment were proven. This
copies required for printing twenty-eight different decision results in a printing process which is not
products is 3,608 copies, while the average total fully rational and efficient.
number of maculature copies of Δ Nsk + Δ (Nuk – By measurements and conducting the experi-
Ndk) is lower for 2,982 copies. ment, it is proven that the process of printing pa-
rameters set in this way resulted in one full work-
has single neutral axes and two flexural stresses are key/anchor connectors [4-5, 7, 9-19]. Examples
identical at interface. This stress distribution results of continuous systems include epoxy adhesives,
also in different strains resulting in much lower de- glued-in punched metal plates or steel meshes
formations in the composite element. Therefore the and punched steel profiles screwed into timber
mechanical behaviour of the joint has a crucial im- [17-21]. If investigated through shear tests, these
portance in the behaviour of composite structures. connections show very different behaviour both in
It has a direct influence on the stresses as well as on terms of stiffness and of failure load. To evaluate
deformations of the structure. the effectiveness of some of the proposed discrete
connection systems for timber-concrete compos-
ite beams, a basically comparative experimental
research has been carried out. It has to be empha-
sized, however, that with the low number (three)
of samples tested for each connection type, values
of mechanical properties can only indicate the rel-
ative performance of one connection system with
respect to another. More specimens need to be
tested in order to identify design values represen-
tative of the actual performance of each connec-
Figure 1. Various composite actions under
tion system. In the following experimental results
bending action
are presented and discussed.
The calculations of stresses and deformations
in timber-concrete composite structures are usual- 2. Materials and methods
ly performed on the basic of linear-elastic behav-
iour for all the materials and joints, as indicated 2.1 Test specimens properties
in Eurocode 5-Part 1-1, Annex B [8]. This mod-
Shear tests can be conducted with either asym-
el uses two properties of the joint, the stiffness
metrical or symmetrical specimens [16]. In this
through the slip modulus and the strength through
experimental program, the symmetrical configu-
the ultimate capacity of joint. The slip modulus
ration was chosen. In general, the test specimens
is necessary to determine the effective bending
consisted of a central timber beam connected to
stiffness. This parameter is basic for calculation
two side concrete slabs by means of two or four
of the stresses distribution, the deflection and the
connectors, symmetrically arranged, by shear
shear load in the fasteners. On the other hand, the
plan. The series of specimens are characterized
ultimate strength is necessary to verify the shear
only by different connections systems made with
capacity of the fasteners. With these two proper-
nails or screws. The dimensions of test specimens
ties, the behaviour of the joints is represented by
are presented in Figure 2.
a bilinear load-slip curve defined by slip modulus
The timber used for timber member was glued
and the ultimate load capacity.
laminated Fir with mean density of 476 kg/m3.
Since the beam-to-slab connection plays a lead-
The specimens were stored at climate conditions
ing role on the behaviour of composite structures,
20/65 (temperature of 20°C and air humidity of
different solutions have been proposed in the past
65%), leading to a moisture content of approxi-
to get out connections those are at the same time
mately 12% in timber.
simple, economical and stiff enough. Generally,
The concrete slab is made of normal weight
connection system can be either discrete, such as
concrete. The concrete used was selected to repre-
when it is composed using a number of discrete
sent a concrete type commonly used in these situ-
mechanical fasteners, or it can be a continuous
ations. To avoid cracks due to shrinkage reinforce-
element along the timber beam. Common dis-
ment (Q131) is installed in the concrete.
crete systems include nails, screws, dowels, nail
As mentioned above, specimens in each se-
plates, specific proprietary connectors and shear
ries are characterized by different beam-to-slab
connection system. In detail, specimens named E – ZP: the connection is made with screws
have nails as connectors, while specimens named Ø10x150 mm placed perpendicularly with
Z have screws as connectors. They are clearly il- respect to the shear plane at a spacing of 100
lustrated in Figure 2 and described hereafter: mm;
– EP: the connection is made with nails 5.0x150 – ZK: the connection is made with screws
mm placed perpendicularly with respect to Ø10x150 mm inserted at an inclination of
the shear plane at a spacing of 100 mm; 45° to the shear plane at a spacing of 100 mm.
– EK: the connection is made with nails
5.0x150 mm inserted at an inclination of 45° Nails of series EK are set in pairs with one nail
to the shear plane at a spacing of 100 mm; in the direction of shear and one against it. Screws
of series ZK are set all together in the direction of The tests were conducted in accordance with
shear. The basic idea of inclined fasteners was to EN 26891 [22]. This standard sets out the rules and
load the connectors longitudinally, in tension and principles for determination of the strength and de-
compression, a mode in which they demonstrate a formation properties of timber-timber joints made
considerable stiffness. This leads to truss-like ar- with mechanical fasteners. However, since there is
rangement of the connectors with angle of 45° to no specific standard for timber-concrete joints, this
the shear plane [9]. procedure is normally used. The experimental pro-
Properties of materials (timber, concrete, steel) cedure involves a multi-stage loading regime, the
are determined according to the Serbian Code pro- key elements of which are: initial loading to 40% of
cedure (SRPS Standards). Table 1 lists material estimated maximum load (Fest), approximately the
mechanical properties. working load of the joint; removal of load to 10%
Table 1. Material properties of Fest and finally loading to failure. The tests were
Timber performed with load control up to 70% of Fest and
Modulus of elasticity (// to grain) 10920 MPa from that point, with displacement control. In ac-
Flexural strength 86.5 MPa cordance with the specifications, the total duration
Compression strength (// to grain) 45.1 MPa of the tests should be between a minimum of 10 min
Tension strength (// to grain) 104.7 MPa and a maximum of 15 min. The load reached before
Concrete (after 28 days) or at a slip of 15 mm, was recorded as the maxi-
Modulus of elasticity 34129 MPa mum load Fmax for each specimen. The estimated
Compression strength 42.9 MPa maximum loads Fest were based on the results of the
Steel nails screws preliminary tests. Afterwards, if estimate deviated
Tensile strength 602 MPa 591 MPa too much from the maximum (ultimate) load, for
the next tests the load procedure was changed.
The preparation of the timber element for the
test specimens began with pre-drilling. The pre-
drilling was done to ordinarily diameter of holes
for the metal dowel-type fasteners (d1 = 0.85d
= 4.3 mm for nails and d1 = 0.7d = 7.0 mm for
screws) and to a depth equal to the length of the
fastener in the timber member. The fasteners had
depths inside timber of 100 mm and of 50 mm in-
side concrete (see Figure 2). The timber sections
were then placed on formwork in preparation for
pouring the concrete. A plastic foil was installed
between the timber and the concrete in order to
prevent excessive wetting of timber and reduce
the timber-concrete friction that would occur dur-
ing the tests. The specimens were cured for 7 days.
The first specimens were tested 28 days after the Figure 3. Push-out test set-up
concrete was poured.
The load was applied with a 250 kN capacity
2.2 Test set-up and procedure hydraulic jack and recorded by means of a load
cell. In order to distribute the force applied at the
The so called “push-out tests” were conducted top of timber element and at the bottom of the con-
at the Material Testing Laboratory of the Faculty crete members, tick steel plates were used for the
of Civil Engineering, University of Belgrade, Ser- entire area. To measure the slip deformation four
bia. A total of 12 specimens (3 samples in each test transducers linear variable differential transducers
batch) were tested using the experimental set-up (LVDTs) were used. The load was measured at the
as presented in Figure 3. point of application, on the top of the timber mem-
ber, while the relative displacement between tim- Numerical characteristics of the load-slip rep-
ber and concrete was measured at half height of resentative are given in Table 2 where the values
the test specimens in two shear planes in the front refer to par of nails in connectors EP and EK and
and in the back. The measurements were recorded one screw in connectors ZP and ZK. The maxi-
by data acquisition equipment every 0.5 second. mum load Fmax and corresponding slip νmax provide
information about the load capacity of the joint,
3. Results and discussion while the slip modulus Ks provides information
about the load-slip behaviour of the joint at an
For the evaluation of the push-out tests the elastic stage. The maximum load and maximum
measured displacements of the 4 LVDTs were av- slip are obtained directly from load-slip curve,
eraged. Results for all of the tested connectors, for while the slip modulus is obtained from Fest (es-
all replications, by means of load-slip curves are timated maximum load), ν01 (slip measured when
presented in Figure 4. All test specimens showed 10% of the estimated load is applied) and ν04 (slip
a real ductile performance until reaching the ulti- measured when 40% of the estimated load is ap-
mate load. In general, there are two main parts in plied) in accordance with Eq. 1 [22]:
the load-slip behaviour before and after yielding.
The initial part is characterized by relatively high 0.4 Fest 0.4 Fest .................. (1)
stiffness contrary to the stiffness of the second = Ks =
4
phase that is far lower. The plastic behaviour pre- (n 04 −n 01 ) í 04,mod
3
sented on the curves reaffirms that a steel failure
occurred for each specimen.
This value is the stiffness of the joint which is load in comparison of all series. However, this
considered in the serviceability limit states. In the connection type is characterized by a relative low
ultimate limit states, the joint stiffness is consid- deformation capacity. In all tests of the ZK series
ered as [8]: maximum load is achieved much before the slip
of 15 mm. Dispersion of ultimate load and slip
2 modulus values for joints in ZK series is rather
Ku = K s ................................ (2)
3 high, thus a large number of specimens need to be
analyzed in order to reach more accurate results.
The EP series connector appeared as the most The characteristic failure modes of investigated
ductile system due to its ability to carry load under connectors are shown in Figures 5-8. Cause of fail-
large deformation. Resistance was still increasing ure in these tests were either shearing off or pulling
for the slip exceeding 15 mm. out the fasteners. In order to observe the deforma-
Connector types EP and EK reached compara- tion of connector, specimens pulled apart after test
tive ultimate load and slip modulus. Type EP con- to destruction. The portion of the fasteners that was
nection had the higher resistance while the higher embedded in the concrete member was remained
initial stiffness was observed by the EK type con- undamaged. On all occasions there were clear plas-
nection. All EK series tests showed a decrease in tic deformation in metal fasteners on the timber side
capacity once the peak load was reached. In one of at the interface between timber and concrete mem-
the three tests the maximum capacity was reached bers, indicating that plastic hinge was formed.
for the slip less then 15 mm. As expected, the connection failure was caused
The results are consistent for the ZP specimens. by reaching the bending and withdrawal capac-
The initial stiffness was less then the one in EP or ity of the fasteners and the timber embedding
EK series connectors. However, the ZP series con- strength. Timber to concrete connections with fas-
nectors had the ultimate load higher then obtained teners loaded perpendicular to their axis (EP, ZP)
in EP or EK connectors and slip modulus did not failed due to a combined embedding/bending fail-
drop off quickly as the slip increased. The ZP type ure. With decreasing angle between the fasteners
connector continued to increase in load capacity axis and the direction of shear, the tension (with-
even after a slip of 15 mm. drawal) component became dominated (ZK). The
As expected, the ZK specimens showed the nails in type EK connections, which were not sub-
highest stiffness and reached the highest ultimate jected to tension, were affected by bending.
Figure 5. Failure with EP connectors: (a) specimens after testing, (b) concrete pulled from timber, (c)
timber pulled from concrete
Figure 6. Failure with EK connectors: (a) specimens after testing, (b) concrete pulled from timber, (c)
timber pulled from concrete
Figure 7. Failure with ZP connectors: (a) concrete pulled from timber, (c) deformed screw
Figure 8. Failure with ZK connectors: (a) specimens after testing, (b) concrete pulled from timber, (c)
timber pulled from concrete
5. Steinberg E., Selle R., Faust T. Connectors for 18. Lukaszewska E., Johnsson H., Fragiacomo M. Per-
timber-lightweight concrete composite structure. J formance of connections for prefabricated timber-
Struct Eng 2003; 129(11): 1538-1545. concrete composite floors. Mater Struct 2008; 41:
1533-1550.
6. Buchanan A.H. Can timber buildings help reduce
global CO2 emissions? Proc. of the 9th world confer- 19. Miotto J.L., Dias A.A. Glulam-concrete composites:
ence on timber engineering WCTE 2006, Portland, experimental investigation into the connection sys-
Oregon, USA. 2006. tem. Materials Research 2011; 14(1): 53-59.
7. Dias A.M.P.G. Mechanical behaviour of timber- 20. Clouston P., Civjan S., Bathon L. Experimental be-
concrete joints. Doctoral thesis, Delft University of haviour of a continual metal connector for a wood-
Technology, Delft, The Netherlands. concrete system. For Prod J .2004; 54(6): 76-84.
8. CEN (2004) Eurocode 5: Desing of timber structure- 21. Negrão J.H., Oliveira F.M., Oliveria C.L. Investi-
Part 1-1: General rules and rules for buildings, EN gation on timber-concrete glued composites. Proc.
1995-1-1. Brussels, Belgium, 2005. of the 9th world conference on timber engineering
WCTE 2006, Portland, Oregon, USA, 2006.
9. Meierhofer A.U. RF 2000, a new efficient for timber/
concrete composite structural elements. Proc. of the 22. CEN, Timber structure-Joints made with mechani-
1992 Conference- Timber Engineering, Bordeaux, cal fasteners-General principles for the determina-
France, 1992; pp 383-393. tion of strength and deformation characteristics,
EN 26891, Brussels, Belgium, 1991.
10. Stevanović B. Practical use of composite timber-
concrete beams connected by nails. Proc. of the 5th
world conference on timber engineering, Lausanne, Corresponding author
Switzerland, 1998; pp 4.256-4.263. Ivan Glisovic,
University of Belgrade,
11. van der Liden M. Timber-concrete composite Faculty of Civil Engineering,
beams. Heron, 1999; 44(3): 215-238 Belgrade,
Serbia,
12. Gutkowksi R.M., Brown K., Shigide A., Natterer J. E-mail: ivang@imk.grf.bg.ac.rs
Investigation of notched composite wood-concrete
connections. J Struct Eng ,2004; 130(10): 1553-
1561.
Problematic features of the genetic algorithms are can be calculated after adopting the final rein-
improved by introducing the Tabu search as the sec- forcement pattern and depends on diameters and
ondary search tool, which reduced the size of the lengths of chosen bars and stirrups.
basic optimization problem to just two variables Since the structural geometry, material proper-
(cross-sectional dimensions). Since the required ties and prices, support conditions and loads (except
steel area in critical cross sections depends on the self-weight) are usually predefined in the design-
sectional dimensions, the problem of detailed rein- ing process, the only variables in this study are the
forcement design according to its applicability in cross-sectional dimensions, i.e. width b and depth
practice is solved within the built-in Tabu search h. There is no need to include the total steel area in
module. Proposed approach is tested on different critical cross sections in the variables because it can
examples and the comparison of the results with the be calculated according to the given code of prac-
ones obtained by non-hybridized genetic algorithm tice, in this particular case EUROCODE2 standard
and the ones obtained by the standard designer (EC2) for the reinforced concrete structures. Ac-
practice confirmed that improved genetic algorithm cording to EC2, the required steel area for typical
outperforms other techniques both from the practi- cross section (Figure 1) is given as:
cal and the economical point of view.
M
As =
sd
................................ (4)
2. Optimal design of the reinforced-concrete z fyd
beam
Standard mathematical form of any structural
optimization problem can be defined as:
Minimize objective function
F(Xi), i =1,…,n
subject to constraints:
with XiL ≤ Xi ≤ XiU, i =1,…,n Figure 1. Typical cross section with flexural rein-
If the aim is to achieve the final price as low forcement
as possible (cost optimization), mathematic form
of the objective function will be defined as a total However, as it was said earlier, complete solution
price of the beam: of the problem should include details about bars di-
ameters and placing scheme, especially considering
F ( x) = V P c+ W P s+ A P f .............. (1)
c s f
the great variety of possible combinations. There-
where Vc is the volume of concrete, Ws is weight fore, detailed reinforcement design needs special at-
of steel, Af is total area of formwork and Pc, Ps and tention and will be discussed in the Section 3.
Pf are unit price of concrete per m3, of steel per Constraints in this optimization problem are
kg and of formwork per m2, respectively. Prices of chosen based on geometry, serviceability and re-
the materials include material, fabrication and la- quirements given in the EC2. Reinforcement fea-
bour. Total amount of concrete and formwork can tures, such as bar diameters, numbers and pattern,
be calculated as: are considered separately, as will be explained
later. All constraints are presented in the normal-
V c = b h l ................................. (2) ized form. For every constraint cj, there is corre-
sponding penalty coefficient pj which represents
A f = (b + 2 h ) l ............................. (3)
normalized degree of violation of that constraint.
where b and h are cross-sectional dimensions, 1. Depth of the beam should be greater then or
l is length of a beam. Total amount of the steel equal to the corresponding width:
produce the total reinforcement area within a very building site faster and with more accuracy. Value
narrow interval of values slightly greater than the of the reinforcement pattern coefficient can be cal-
required value. Therefore, when talking about the culated as:
reinforcement pattern, the term ‘optimal’ should
not necessarily mean ‘the minimal one’ but also j r = c d c u .............................. (12)
the one that would be relatively simple for man-
ufacturing at the building site and with minimal where cd is coefficient of distribution and cu is
possibility of making mistake. When it comes coefficient of uniformity.
down to a choice between two solutions with ap- Coefficient of distribution (cd) describes spatial
proximately equal solutions, one of which consists distribution of reinforcement bars within a given
of different bar types and other one of the same cross section and includes number of rows (nr) and
bars in cross-section, an experienced designer number of bars per row (nb), as well as the correction
would always choose the second one. if the number of bars in the last row (nbl) is not the
As it can be seen in the Figure 2, complete de- same as in the other rows. If the last (highest) row is
scription of the reinforcement pattern would de- full, i.e. the same as the other rows, than nbl=nb.
mand additional variables (number and diameter
of bars in each group), as well as penalty functions ( )
c d = a n r2 + b n r + c 1 0 −3 .................... (13)
for all the requirements considering bars’ spacing, where:
which would demand additional variables per
beam. This problem can be solved either by sim- a = −2 5 − 5 n b ............................ (14)
plification of the reinforcement pattern [2, 3], or
by solving it by partial or total extraction from the b = 8 2 5 + 115n b −1 0 n bl .................... (15)
genetic algorithm [4, 5]. In order to avoid any un-
necessary simplification and to develop efficient c = −11 0 (n b −n bl ) ......................... (16)
and applicable algorithm, the latter approach was
used in this study. Coefficient of uniformity (cu) describes num-
Since the exact value of the penalized fitness ber of different bar diameters used in a given cross
function (11) can not be calculated without suf- section (nd) and can be calculated as:
ficient data about the chosen reinforcement pat-
tern, for every solution (pair of cross-sectional di- cu = 0 .9 0 + 0.1 0 n d ....................... (17)
mensions b and h) considered within the primary
search, built-in module generates temporary data- 4. Optimization tools
base of acceptable reinforcement patterns which
meet requirements given in Figure 2, as well as During last decade, hybridization of me-
the demands considering minimum and maximum taheuristics has been successfully implemented in
percentage of steel given in the EC2 standard. Af- solving different NP-hard problems by combin-
ter that, secondary search tool refines the search ing best features of different search methods [6].
by estimating generated patterns according to The most common method of hybridization is to
their applicability in practice described by the re- use population-based metaheuristic for the search
inforcement pattern coefficient, empirically devel- space exploration and to improve the solution by
oped after field research at the building sites [5]. introducing some local search method. Beside
The reinforcement pattern coefficient (φr) is de- that, researchers have shown that hybridization
fined as the ratio of time needed for placing and can also produce good or required results within
fixing a given pattern and time needed for the sim- considerably less computational time [7].
plest pattern, consisting of only two same bars in
the bottom row. If a choice between two patterns 4.1 Genetic algorithms
with the same steel area is to be made, the one with
lower reinforcement pattern coefficient would be Genetic algorithms belong to the class of the
the preferable one because it can be made at the population-based evolutionary algorithms, for-
mulated by the direct analogy with the evolution 4.3 Hybridization of genetic algorithm and
process, i.e. by the Darwinian principles of natural Tabu search
selection. Analogically with genes and chromo-
somes in nature, every variable in genetic algo- The idea of hybridization, i.e. combining dif-
rithm is called gene, while the vector consisting ferent meta-heuristics, is to use their different
of complete set of variables is called chromosome. advantages in order to overcome problematic
Genetic model of a search space is defined by a features of one method by including the second
data coding scheme, where the design variables meta-heuristic where the first one fails to perform
are transformed into a character string. The most in desirable manner. The advantage of the genet-
common coding scheme is the binary scheme, ic algorithms is that a solution improves rapidly
where design variables are transformed in strings during the initial phase, which is good for finding
consisting only of characters 0 and 1. promising regions for global optimum within giv-
During the process of reproduction, two par- en search space, but later the convergence slows
ents combine their good characteristics (genes) to down remarkably. On the other hand, depending
produce a better offspring. In genetic algorithms, on number and nature of the variables and chosen
this is accomplished through genetic operators, genetic operators, genetic algorithm can converge
namely reproduction, crossover and mutation. Af- prematurely to a local optimum. This indicates
ter all the stages of the reproduction are finished, that genetic algorithm is suitable for finding prom-
the new population of the individuals is created ising region for optimal solution, while the finer
and the reproduction starts all over. This process search should be performed by some other meta-
repeats until the stopping criterion is satisfied. The heuristic, in this case the Tabu search [10, 11].
convergence is assumed to be attained either when
average fitness of several successive generations 5. Implementation
remains unchanged or when the maximum prede-
In order to include all the above mentioned cri-
fined number of generations is reached [8].
teria and conclusions, as well as to obtain compa-
rable results, the computer program is developed
4.2 Tabu search and set to offer three possibilities: HD (Human
While the genetic algorithms work simultane- Design), GA (Genetic Algorithm) and GA-TS
ously on a group of solutions, Tabu search oper- (hybrid of Genetic Algorithm and Tabu Search).
ates on a single solution at a time and uses prob- Option HD represents the simplest form of the
lem-specific operators to explore a search space genetic algorithm, oriented only on finding opti-
and memory (called the Tabu list) while keeping mal cross-sectional dimensions and the required
track of parts already visited. The main advantage amount of steel As (4), leaving a designer to find out
of Tabu search is its possibility of strategic con- appropriate bars diameters and pattern. In the other
straining and freeing the search process by using two cases, for every solution considered within the
pre-defined restrictions and aspiration criteria i.e. genetic algorithm, i.e. for every pair of cross-sec-
favorizing and saving the attributes that have been tional dimensions b and h, a built-in module gen-
found good and guiding the search into new re- erates temporary database of satisfactory reinforce-
gions, and thus to overcome local minima and to ment patterns which would give total reinforcement
reach the global optimum [9]. area equal or slightly greater than the calculated
In general, Tabu search consists of the follow- one. Level of precision (maximal percent for which
ing four steps: the considered patterns may increase the required
1. Initialization, i.e. choosing a starting solution. amount of steel) is pre-defined by user.
2. Neighbourhood exploration. In case of the GA option, program finds the pat-
3. Choosing a new non-tabu solution. tern with minimal steel area without further con-
4. Repeat steps 2 and 3 until the termination sideration of its applicability, while the GA-TS
criteria are satisfied. option (solution proposed in this work) examines
the database by using the Tabu search module and
finds the most appropriate pattern considering its kN/m3 and 78.5 kN/m3 respectively. The strength
applicability, having in mind that the upper bound of concrete is 25 MPa and the strength of steel is
of allowable total steel area is already chosen by 400 MPa. Assumed prices of the materials are Pc
user and therefore can be considered economi- = 60 €/m3 for concrete, Ps = 1 €/kg for steel and
cally acceptable. Pf = 10 €/m2 for formwork. Database of possible
reinforcement patterns was formed with assump-
6. Design example and results tion that minimal required area of steel can be in-
creased up to 5%.
The program was tested on different examples In each case, an initial population of 50 individ-
by applying all three abovementioned modes on uals is randomly generated. Based on the previous
the same set of input data. In case of the HD mode, experiences and the nature of the problem, genetic
the final choice of the reinforcement bars diam- operators chosen for this study are: tournament se-
eters and pattern was done manually, with the typ- lection scheme, two-point crossover with probabil-
ical reasoning used in engineering practice. Ob- ity of crossover pc=1 and probability of mutation
tained results were compared and estimated both pm=0.03. Maximal number of generations is 100.
from the economical and practical point of view.
In this paper, the effectiveness of the proposed 6.2 Results and discussion
approach is illustrated on example of simply sup-
ported beam. Results obtained after running the program in all
three modes are presented in Figure 4 and Table 1.
6.1 Input data As it was explained before, reinforcement pattern
for the HD mode was created manually. In all three
Geometry and loading details are presented in cases, program has found the same optimal cross-
Figure 3. For every considered solution, value of sectional dimensions (25/32.5 cm), so the results
the self-weight (ws) is calculated according to the quantitatively differ only considering the amount
cross-sectional dimensions and added to the con- of reinforcement and, consequently, the total price.
stant dead load of 16 kN/m1.
would demand adding one more bar for achiev- ation of both economical and practical aspect of
ing symmetrical formation 4+2; 3Ø22 (11.40 cm2) considered solutions resulted in designs which are
would increase amount of the steel for 22.6 %. more applicable in practice than the ones obtained
Results presented in Table 1 show that proposed by using only the economical criterion. Proposed
methodology for optimal design has proven to be methodology can be successfully implemented in
successful in comparison with traditional design the design process.
method and genetic algorithm aimed only to find
solution with minimal cost. Solution found by the Acknowledgement
GA-TS mode has slightly higher price than the one
found by the GA (1.11%), but, on the other hand, Presented research was supported by the Min-
is remarkably simpler and easier to be successful- istry of Science and Technological Development,
ly implemented at the building site. Besides that, Republic of Serbia, project TR 36023.
according to the reinforcement pattern coefficient,
reinforcement scheme obtained this way would be References
achieved approximately twice as fast as the other
two, which can remarkably lower the amount of 1. Coello Coello CA, Christiansen AD, Santos Hernan-
dez F.: ‘A simple genetic algorithm for the design of
labour and duration of bar fixing.
reinforced concrete beams’, Engineering with Com-
Performances and basic chromosome statistics puters, 1997; 13: 185–96.
obtained from ten independent runs per mode are
shown in Table 2. Slightly faster program perfor- 2. Matous K., Leps M., Zeman J., Sejnoha M.: ‘Apply-
mance in the HD mode can be explained by its ing genetic algorithms to selected topics commonly
encountered in engineering practice’, Computer
simplicity in comparison with other two modes. Methods in Applied Mechanics and Engineering,
From the data about obtained results and the stan- 2000; 190: 1629–1650
dard deviations it can be concluded that hybrid
GA-TS have outperformed other two approaches 3. Camp C.V., Pezeshk S., Hansson H.: ‘Flexural de-
considering the reliability of results, which can be sign of reinforced concrete frames using a genetic al-
gorithms’, Journal of Structural Engineering ASCE, ,
explained by inclusion of the Tabu search as the 2003; 129(1): 105–15.
secondary search tool.
4. Govindaraj V., Ramasamy J.V., ‘Optimum detailed
design of reinforced concrete continuous beams us-
7. Conclusion ing genetic algorithms’, Computers and Structures, ,
2005; 84: pp. 34–48.
A methodology for optimum design of the re-
inforced concrete beams using a hybrid genetic 5. Milajić A., Beljaković D., Milovanović Z.: Compara-
algorithm is presented. The procedure is formu- tive analysis of genetic algorithms used for rein-
lated in such a manner that sequence of steps imi- forced concrete structures design, Proceedings of
the 4th International Conference Civil Engineering
tates decision making process in traditional de-
– Science and Practice, Zabljak, Montenegro, CD-
sign method in accordance with requirements and ROM, 2012.
specifications given in the EC2. Reduced number
of variables to just two significantly simplifies the 6. Blum C., Aguilera M.J.B., Roli A., Samples M.: ‘Hy-
calculation. Hybridization of the genetic algo- brid Metaheuristics: An Emerging Approach to Op-
timization’, Springer-Verlag Berlin, Heidelberg, SCI,
rithms has proven to be successful in comparison 2008; 114: 1-30.
with the non-hybridized genetic algorithm. Evalu-
Table 2. Program performances from ten independent runs
Number of generations Time (s) Price (€)
Mode
min max min max Min avg. max std.dev.
HD 5 14 9 30 103.68 105.50 108.20 1.66
GA 7 20 12 39 98.88 102.52 105.45 2.54
GA-TS 5 16 10 32 99.98 100.46 101.20 0.46
Corresponding author
Aleksandar Milajic,
University UNION Nikola Tesla,
Department for Civil Engineering,
Belgrade,
Republic of Serbia,
E-mail: a.milajic@sezampro.rs
Abstract WHO data [1] also show that, out of the total
number of deaths due to traffic accidents, 90% oc-
This study shows a deeper analysis of traffic
cur in undeveloped and developing countries, as
accidents involving intoxicated drivers, at the area
well as that these countries have less than 50%
of Sokolac and Vlasenica municipalities in the
of all the registered vehicles. Details on traffic
Republic of Srpska. Intoxicated drivers have been
accident victims show that undeveloped and de-
classified on the basis of their gender, age, edu-
veloping countries need urgent measures of traffic
cation level, and alcohol concentrations in their
safety level improvement, at all state levels. Ac-
organisms at the time of accident occurrence. Ve-
cording to WHO estimate [1], lack of imperative
hicle structure has been classified based on vehicle
measures towards traffic safety improvement will
category, whereas time of accident occurrence has
contribute to the fact that traffic accidents will be-
been analysed in relation with times of the day
come the fifth cause of death in the world, and that
and months of the year. A deep analysis of traffic
the number of death cases resulting from traffic
accidents has shown that the most frequently in-
accidents will grow to be 2.4 million a year.
volved drivers were male, with secondary educa-
United Nations General Assembly has brought
tion, aged between 21 and 25 or between 36 and
Resolution 64/2551 to declare the Decade of Ac-
45. Most frequently involved vehicles are passen-
tivities on Road Traffic Safety (2011-2020) [2],
ger vehicles, and accidents occur most frequently
with the emphasis on stabilization in regards with
within the period from March to October, from
injuries and deaths caused in traffic accidents, as a
19.00 to 5.00, on the roads inside resided areas as
global objective. The Decade of Activities on Road
well as on trunk roads. The analysed data showed
Traffic Safety represents a plan to decrease the num-
that most of the traffic accidents were fatal ones.
ber of deaths and injuries due to traffic accidents
Key words: traffic safety, traffic accidents,
on global level, with increasing activities towards
causes, circumstances, alcohol
traffic safety improvement at national, regional and
global levels [1]. The Global Plan of Decade of
1. Introduction Activities on Road Traffic Safety [3] specifies ac-
tivities being undertaken by national and local state
Injuries and death caused in traffic accidents authorities following the five columns, amongst
have become a growing global problem, which which is a column marked as ’’safer road users’’ [1].
can be seen in the WHO data [1]. Approximately Aiming to improve traffic safety level, coun-
1.3 million people get killed in traffic accidents tries should focus their activities towards a better
every year, and 20 to 50 million people obtain in- behaviour of traffic participants, and elimination of
juries [1]. Approximately 3,000 people get killed factors (risks) which contribute to traffic accident
every day, and half of them were either drivers or occurrence, since a decreased number of victims
passengers in automobiles. Injuries obtained in could be achieved through an enhanced awareness
traffic accidents are among three leading causes of the significance of safe participation in traffic,
of death to persons aged between 5 and 44. It has as well as through consistent law implementation.
been estimated that material damage due to traffic Factors which contribute to deaths and injuries due
accidents amounts over $ 500 billion a year, i.e. to traffic accidents include use of safety belts, use
between 1% and 3% of BDP/GDP [1]. of safety helmets, driving within the speed limits,
driving under the influence of alcohol. WHO [1] cohol in blood, nearly 50% of the total number of
has listed decreased driving under the influence of drivers [8]. According to the WHO [1], between
alcohol as the third activity concerning better be- 1% and 5% of drivers drive under the influence of
haviour of traffic participants. alcohol, while approx 20% of fatal and traffic ac-
Driving with alcohol concentration in the or- cidents involving heavy bodily injuries are caused
ganism larger than it is allowed (intoxicated driv- by driving under the influence of alcohol. In some
ers) is one of the most frequent factors contribut- countries (Canada, Slovenia, The United States,
ing to fatal traffic accidents, and achieving a de- France, Ireland, New Zealand), the percentage of
creased number of intoxicated drivers is a measure traffic accidents due to driving under the influence
giving the best results in regards with reduction to of alcohol exceeds 30% [9]. IRTAD’s report [10]
the number of deaths. Countries undertake system also confirms these facts, stating that there is more
measures aiming to decrease the number of intoxi- risk during the night than at daytime.
cated drivers, and efficiency of these measures is [11] has shown that male intoxicated drivers in
a result of intensified awareness of traffic partici- Florida are involved in about 4 times larger number
pants, planning, organizing, control, and sanction- of traffic accidents than female intoxicated drivers.
ing the violation at all state levels. In Florida, there are more intoxicated drivers in-
At the EU territory, approximately 31,000 peo- volved in traffic accidents aged between 25 and 64
ple were killed in traffic accidents during the year than those aged between 20 and 24, and the largest
2010 [4]. ETSC [4] shows that driving while the number of intoxicated drivers involved in traffic ac-
amount of alcohol in organism is 0.5 g/l enlarges cidents are aged 25-34. The number of intoxicated
the risk of traffic accident occurrence five times, drivers involved in traffic accidents is decreasing
and that a reduced number of intoxicated driv- with drivers’ age, which has been demonstrated by
ers could contribute to decreasing the number of [12]. [13] has shown that the largest number of in-
killed persons by 4,000, number of the injured by toxicated drivers involved in traffic accidents in the
150,000 a year, within the EU. During 2010, po- USA were aged between 15 and 34, and that a con-
lice reports from the territory of 22 EU countries siderable decrease to the number of traffic accidents
showed that approx 3,200 killed people had been due to reduced number of intoxicated drivers has
under the influence of alcohol during the accident, been recorded during the period 1950-2002, with
while approx 6,400 people killed in traffic acci- driving under the influence of alcohol having con-
dents in 2001were recorded to have been intoxi- tributed to 39% of total number of traffic accidents
cated during the accident. During the period 2001- in the USA. According to the information provided
2010, a decreased number of intoxicated drivers in [14], during the year 2005, 53.8% of the total num-
Ireland, Latvia and Slovakia, has contributed to a ber of fatal traffic accidents in Sao Paulo was de-
reduced number of deaths by 15% a year; whereas tected to have been related to drivers’ intoxication.
Italy, Cyprus, Israel, Portugal and Romania re- 11% of the total number of traffic violation reports
corded an increased number of victims as a result in Serbia within the period 2003-2007 was related
of enlarged number of intoxicated drivers [4]. At to alcohol influence [15].
the level of 22 EU countries, during the period A reduced number of intoxicated drivers at the
2001-2010, an average decrease to the number of area of Republic Srpska could contribute to a re-
killed persons due to driving under the influence duced number of deaths due to traffic accidents.
of alcohol was recorded to have been 7.6% a year, Efficient planning and implementing measures of
while an enhanced compliance with other rules precaution aiming to decrease the number of in-
and regulations contributed to reduction of death toxicated drivers at the area of Republic Srpska
cases by 5.3% a year. requires an analysis of fatal traffic accidents as
Many researches [5], [6], [7] have shown a well. The effects of prevention measures depend
considerable influence of alcohol on traffic acci- upon understanding the ratio and structure of in-
dent occurrence. Looking in absolute numbers, the toxicated drivers being involved in fatal traffic ac-
largest number of drivers who caused accidents cidents. No significant researches in relation to the
under the alcohol influence had up to 1.5‰ of al- ratio and structure of intoxicated drivers having
been involved in fatal traffic accidents, resulting age of the drivers; vehicle make and type; con-
in an emphasis on the importance of undertaking sequences of the accident; the period from traffic
prevention measures with a system approach to accident occurrence to indictment and verdict pro-
reduced number of intoxicated drivers, have been nunciation; amounts of fines and protection mea-
recorded at the area of Republic Srpska. sures depending on the circumstances of traffic ac-
Traffic participant intoxication control systems cident occurrence; were taken from court records.
are applied in countries with a tradition of traffic An analysis of court record availability, as well as
safety. Entry details in these systems are those re- that of details from the records, shows the signifi-
lated to an individual (who has committed a crimi- cance of performing a comprehensive analysis as
nal act or violation), with the result in the form to the percentage and structure of intoxicated driv-
of integrated – individual, group and general in- ers having been involved in traffic accidents (fatal
formation relevant for the system of intoxicated ones) in the Republic of Srpska; aiming to deter-
traffic participant management; with a particular mine the factual situation and provide precondi-
relevance to the education, health service, insur- tions for defining a system of prevention measures
ance organizations, police, prosecution and court, and system of intoxicated traffic participant con-
as well as regulatory authorities responsible for trol with a purpose to reduce the number of intoxi-
amending, i.e. passing the law. cated drivers and deaths due to traffic accidents in
The objective of this research is an analysis the Republic of Srpska.
of percentage and structure of intoxicated driv- The research has been performed following
ers having been involved in fatal traffic accidents interviews with court organs (chosen randomly)
(at the area of Sokolac and Vlasenica), as a basis aiming to ensure data availability and implement a
for performing comprehensive analyses as to the deep analysis of traffic accidents, which included:
percentage and structure of intoxicated drivers be- – Taking over and registering the available
ing involved in traffic accidents in the Republic of records;
Srpska, in order to determine the present situation – Inspection, listing and systematization of
and establish a system of prevention measures to- details from the records;
wards achieving a decreased number of intoxicat- – Data analysis and synthesis;
ed drivers and deaths due to traffic accidents. The – Drafting conclusions, proposals and
research has been carried out on a random sample recommendations.
of court records related to 34 traffic accidents in-
volving intoxicated drivers, which were available The data analysed in this study have been taken
at the Municipal Courts of Sokolac and Vlasenica. from relevant proving material contained in the re-
cords. Details on alcoholemia of those involved in
2. Research method and material traffic accidents were taken from medical documen-
tation contained in the records, the details on traffic
It is necessary to investigate the circumstances accidents were taken from records on initial investi-
under which traffic accidents involving intoxicat- gations, and the details on circumstances leading to
ed drivers occurred. For this purpose, a research traffic accidents were taken from experts’ findings
on a random sample of the available criminal court and opinions included in the records.
records at the Municipal Courts of Sokolac and The data were analysed by applying a percentage
Vlasenica has been done. Prior to data collection ratio of individual details within the total sample.
from court records, it is necessary to make crimi- Criminal court records are kept in an archive
nal court records available. The records contain of the competent courts upon closure of the pro-
certain details relevant for determining the cir- ceedings (bringing an effective court verdict) and
cumstances under which traffic accidents involv- they are not available to the public. An interview
ing intoxicated drivers occurred. Details needed (presenting the case, objective and purpose of the
for the analysis of traffic accident tendency by research) with the competent judicial bodies, and
months; parts of the day; weather conditions; cir- a written request, have provided availability (ac-
cumstances of accident occurrence; gender and cess) to court records. Court record inspection,
listing and systematization of the details contained nocturnal driving conditions, which is shown in
therein, were done in full compliance with the re- traffic accident analysis by time of the day. 65% of
quirements of competent courts. traffic accidents involving intoxicated drivers was
Two out of four interviewed courts made their recorded to have occurred during the night, while
data available, provided the records were analysed in 35% of traffic accidents was recorded to have oc-
the premises thereof. 34 court records were analysed, curred at daytime (Table 2 and Graphic 2).
out of which 13 records were within the jurisdiction
of Sokolac Municipal Court, and 21 were within the
jurisdiction of Vlasenica Municipal Court.
3. Results
Frequency analysis of traffic accidents by
months showed that the largest number of traffic
accidents was recorded during July (17.6%), with
the least number of traffic accidents having been
recorded in February, October and December (Ta-
Graphic 1. Traffic accident frequency per month
ble 1 and Graphic 1). 70.6% of traffic accidents
out of the total number thereof was recorded dur- Out of the total of 34 accidents involving in-
ing the period from March to October. toxicated drivers, 1 accident was recorded on a re-
The largest percentage of traffic accidents gional road, 22 accidents were recorded on trunk
(11.8%) has been recorded within the period from road (65%), and 11 of them in resided areas (32%).
2.00 to 3.00 hours and from 22.00 to 23.00, where-
as traffic accidents have not been recorded during
the periods from 5.00 to 6.00, 7.00-10.00, 13.00-
14.00 and 17.00-19.00 (Table 2 and Graphic 2).
67.6% of traffic accidents were recorded during the
period from 19.00 to 5.00.
Drivers’ intoxication contributes to an extend-
ed time before a reaction, further on it diminishes
focus and perception. Driving in nocturnal vis-
ibility conditions additionally reduces perception
capabilities, thus intoxicated drivers are more ex-
posed to the risk of traffic accident occurrence in Graphic 2. Traffic accident frequency per hour
Table 1. Traffic accident frequency per month
Month January February March April May June July August September October November December
Number
of 2 1 2 4 3 4 6 4 3 1 3 1
accidents
% 5.9 2.9 5.9 11.8 8.8 11.8 17.6 11.8 8.8 2.9 8.8 2.9
Table 2. Traffic accident frequency per hour
12-13
13-14
14-15
15-16
16-17
17-18
18-19
19-20
20-21
21-22
22-23
23-24
10-11
11-12
9-10
Time
0-1
1-2
2-3
3-4
4-5
5-6
6-7
7-8
8-9
Number
of 1 1 4 3 2 0 2 0 0 0 1 2 1 0 2 2 1 0 0 3 1 3 4 1
accidents
11.8
11.8
%
2.9
2.9
8.8
5.9
0.0
5.9
0.0
0.0
0.0
2.9
5.9
2.9
0.0
5.9
5.9
2.9
0.0
0.0
8.8
2.9
8.8
2.9
Out of the total number of injured individuals, traffic accidents (20.6%) involved a participant of
63.3% of them obtained injuries resulting in death, the accident with the detected alcohol concentra-
and 36.7% of individuals obtained heavy bodily tion in organism between 2.5 and 3.49‰, while 4
injuries. traffic accidents (11.8%) involved a participant of
4 drivers (out of the total number of drivers) the accident with the detected alcohol concentra-
abandoned the spot unauthorized and unlawfully tion in organism between 0.5 and 0.99‰.
between the time of traffic accident occurrence Analysis of court record details related to es-
and arrival of initial investigation team. tablishing alcohol concentrations in accident par-
The largest number of traffic accidents (29.4%) ticipant organism showed that:
occurred due to vehicle switching to roadway lane – Authorized individuals did not always
intended for movement of vehicles from the op- conduct breathalyzer test upon all the
posite direction, and a collision occurred while persons involved in a traffic accident;
overtaking in 5 traffic accidents (Table 8). 2 traffic – Authorized individuals did not conduct
accidents resulted in knocking down a pedestrian, breathalyzer test upon those involved in a
2 accidents led to vehicle getting off the roadway, traffic accident immediately after securing
while 1 traffic accident involved a collision in the the spot.
middle of the roadway.
Out of the total number of traffic accidents, 12 Gathering evidence on intoxication of all the
of them (35.3%) involved a participant of the ac- individuals involved in a traffic accident could
cident with the detected alcohol concentration in contribute to accuracy in determining the cause
organism between 1.5 and 2.49 ‰, while 10 traf- and circumstances leading to the accident, time
fic accidents (29.4%) involved a participant of the of alcohol consumption, as well as inaction of
accident with the detected alcohol concentration persons involved in a traffic accident. Authorized
in organism between 1 and 1.49 ‰ (Table 9). 7 individuals’ failure to gather evidence on intoxica-
tion of individuals involved in a traffic accident possible further planning the measures to reduce,
affects the accuracy of determining intoxication of i.e. prevent driving under the influence of alcohol:
persons involved in a traffic accident at the time – The described results show that the largest
of its occurrence. A proof of alcohol concentration number of traffic accidents with intoxicated
in the organism of a person involved in an acci- drivers, looking by the months, occurred in
dent, collected during the initial investigation can July, and the least number of traffic accidents
contribute to establishing the intoxication phase of was recorded in February, October and
the person at the time of the accident (absorption, December, with the largest number of traffic
peak, or elimination). Failure and delay in gath- accidents involving intoxicated drivers
ering evidence on intoxication exclude gathering having happened within the period from
evidence on intoxication of the participants at the March to October.
time of the accident. – An analysis of traffic accidents by hours
During the first 12 months, 32 indictments shows that the largest number of traffic
were brought, out of which the largest number accidents with intoxicated drivers has
was brought during the first and 4th month (18.8% occurred from 2.00 to 3.00 and within the
each), then during the 6th month (15.6%) upon ac- period 22.00-23.00. In regards with time
cident occurrence. 53.1% of indictments were ini- of the day, the largest number of traffic
tiated during the first 4 months after the time of the accidents has occurred from 19.00 to 5.00,
accident, and 75% of indictments were brought and details show that nocturnal visibility
during the first 6 months (Table 10). conditions reduce perception ability, thus
An analysis of court record data shows that intoxicated drivers are more exposed to the
19 (55.9%) verdicts were brought upon finaliza- risk of a traffic accident during the night.
tion of court proceedings, 9 (26.5%) verdicts were – An analysis of accident location, depending
brought after a settlement between the defendant on road category, shows that the largest
and court, in 3 cases the process was adjourned, number of traffic accidents has occurred
and 3 cases were not brought to an end (Table 11). on a trunk road and in a resided area, with
8 (42.1%) verdicts were brought during the first the least number of traffic accidents having
year from traffic accident occurrence time, 5 ver- occurred on a regional road, while an
dicts (26.3%) were brought during the second year analysis of roadway conditions showed that
after the traffic accident. the largest number of traffic accidents had
Analysis of court verdicts does not provide a occurred in dry roadway conditions, and in
basis to determine the legal relationship between dry and wet – humid conditions respectfully.
criminal acts and pronounced sentences. It can be – The analysed details show that the largest
seen that different imprisonment sentences are number of drivers involved in traffic accidents
pronounced for the same criminal acts, and that was aged between 21 and 25, then of those
the pronounced sentences of imprisonment are not aged from 36 to 45, and the analysis of gender
followed by the same measures of prohibition to ratio shows that there are more male drivers
steer a vehicle. involved. Out of the total number of drivers
involved in traffic accidents, the largest
4. Discussion and conclusion number of them has secondary education.
– The described details show that the largest
An analysis of the research results lead to cer- number of vehicles involved in traffic
tain conclusions which could represent a basis for accidents are passenger automobiles, and
Table 11. Demonstration of analysis of the time elapsed from accident occurrence to bringing a court verdict
Elapsed time in 24 36 48 84 96 108
6 9 11 12
months (2 years) (3 years) (4 years) (7 years) (8 years) (9 years)
Number of accidents 2 2 1 3 5 1 1 2 1 1
% 10.5 10.5 5.3 15.8 26.3 5.3 5.3 10.5 5.3 5.3
that transporting compositions, a freight Some measures of preventing, i.e. reducing the
vehicle and a bus were involved in traffic number of drivers under the influence of alcohol
accidents as well. include an intensified police control, and cam-
– Half of the traffic accidents were fatal ones. paigns of traffic safety in regards with the time,
– Details on alcohol concentrations in the location and target group of drivers.
organism of drivers involved in traffic
accidents show that certain number of References
drivers was not subjected to breathalyzer
testing, thus there is no evidence on 1. World Health Organization (WHO) World report on
road traffic injury prevention, Geneva.2004.
alcohol concentration in the organism of
these drivers, while the largest number of 2. WHO (2011a). Decade of Action for Road Safety
drivers were detected to have had alcohol 2011-2020 (http://www.who.int/violence_injury_pre-
concentrations in their organism between vention/publications/road_traffic/decade_booklet/en/
1.5 and 2.49 ‰. index.html, accessed 15.06.2012.). 2011.
– An analysis of circumstances leading to 3. WHO (2011b). Global Plan for the Decade of Ac-
traffic accidents showed that the largest tion for Road Safety 2011-2020 (http://www.who.int/
number of traffic accidents had resulted from roadsafety/decade_of_action/plan/en/index.html, ac-
vehicle switching to a traffic lane intended cessed 15.06.2012). 2011.
for opposite direction vehicle movement,
4. European Transport Safety Council (ETSC) Drink
which leads to a conclusion that intoxication Driving: Towards Zero Tolerance. 2012.
influences drivers’ capability to assess the
traffic conditions. A less number of traffic 5. Haworth N, Smith R, Brumen I Case-control Study
accidents resulted from a collision while of Motorcycle Crashes Report CR 174. Australian
Transport Safety Bureau. 2002.
overtaking, as well as hitting a pedestrian.
– Details on breathalyzer to individuals 6. Fontaine H, Gourlet Y Fatal Pedestrian Accidents in
involved in traffic accidents show that France: A Typological Analysis. Accident Analysis
authorized persons do not always conduct and Prevention,1997; 29: 303-312.
alcohol-testing upon all those involved
7. Elvik R, Vaa T, The Handbook of road safety mea-
in traffic accidents, and that authorized sures. Oxford, United Kingdom, Elsevier. 2004.
persons do not perform alcohol-testing upon
accident participants immediately after 8. Pandurović S . The methodology of medical preven-
securing the spot. tion of road traffic injuries caused by alcohol. Fac-
– The largest number of indictments was ulty of Medicine, Belgrade. 1983.
brought during the first 6 months after the 9. World Health Organization . Drinking and driving: a
traffic accident, and the largest number of road safety manual for decision-makers and practi-
court verdicts was brought during the first tioners, Geneva. 2007.
year after the traffic accident, which is
10. OECD/ITF . IRTAD Road Safety 2011 Annual
visible from the record data. Report, Organisation for Economic Co-Operation
and Development, International Transport Forum.
Considering the aforementioned results, it is 2012.
clear that the target group of undertaking system
measures of precaution and repression towards 11. Abdel-Aty AM, Abdelwahab TH . Exploring the
relationship between alcohol and the driver charac-
reducing the number of traffic accidents with in- teristics in motor vehicle accidents. Accident Analy-
toxicated drivers, are male drivers (age between sis and Prevention, 2000; 32: 473–482.
21 and 25 and from 36 to 45) who drive passenger
automobiles in resided areas and on trunk roads. 12. Mason J, Fitzpatrick K, Seneca D, Davinroy T .
Identification of inappropriate driving behaviours.
Intensified measures are to be implemented with-
J. Transport. Eng. 1992; 118, 2.
in the period from March to October (during the
year), and from 19.00 to 5.00 (during the day).
Corresponding author
Relja Mirovic,
Republic Administration of Inspections Banja Luka,
Department Bijeljina,
Bosnia and Herzegovina
E-mail: r.mirovic@inspektorat.vladars.net
and the system depths in the lithosphere of Serbia. °C) and dolomite (150–200 °C) metamorphism
The points of departure were the assumptions that were determined in situ by Patrick and White [6] in
CMW formation must have been related to the part the Salton Sea geothermal system from drill-holes.
of the lithosphere in which the CO2 gas was gener- For identification of the lithostratigraphic CO2
ated, that the main CO2 degassing rocks were car- substrata and the depth of the CMW systems, this
bonates [3] or the dominant lithostratigraphic CO2 study considered the spatial relationship between
substrata, and that CO2 was generated from cal- the CMW occurrences and the regional geologi-
cite, dolomite and/or graphite during their meta- cal-structural units and zones based on the chemi-
morphism under certain geothermal conditions. cal composition and genetic relation between the
The study also considered previous available CMW and the structural-lithologic magmatite
research data concerning the U, Ra, Rn and F con- units. Pursuant to the study of geothermal con-
centrations in the CMW that confirmed the genetic dition, or segments of the lithosphere in which
CMW relation to magmatic processes, regional geotemperature provided for the transformation
geological prospecting [5], a geothermal model of of carbonate and graphite minerals and for gen-
the Serbian lithosphere [4] and experimental ther- eration of CO2, it was possible to relate individual
mal transformation of dolomite and calcite [6] and lithostratigraphic CO2 substrata to the correspond-
of graphite [7]. On the grounds of the above-men- ing rock complexes in the lithosphere identi-
tioned, the depth ranges of CO2 generation from fied during regional geological and geophysical
thermally metamorphosed carbonate and graphite prospecting. The parts of the Serbian lithosphere
could be determined and a schematic model of the recognized as the primary CO2 generators and
Serbian lithospheric zones of CO2 generation (I containing the major actual CMW systems were
and II), infiltrate and CO2 mixing (III) and CMW zoned with respect to geochemistry, hydrogeol-
system depth (IV) developed. ogy, structure, structural-geology and geologic
The depths of the CMW systems in the litho- thermometry.
sphere of Serbia [8] are related to the depth of the
thermal transformation of carbonate and/or graph- Results and discussion
ite minerals degassing CO2 and to the expected
depth of free water and CO2 mixing. The assumed Igneous rocks and CO2
depth of mixing, and thereby the depth of the
CMW systems, is based on the interpretation that The CMW occurrences in Serbia are spatially
the permeability of deep tectonic discontinuities related to granite intrusions and to volcanic rocks
decreases with the depth, on the one hand, and the (Fig. 1). Generally, the prevailing CO2 substrata
concentration of CO2 and other ascending gases are not igneous rocks because the amount of car-
increases, on the other. This led to the conclusion bon in their minerals is low. Thus, the amounts
that meteoric water percolates not deeper than the of carbon in igneous and in sedimentary or meta-
zone of CO2 generation, and thereby the water cir- morphic rocks, cited by Omoto and Raj [7], are
culation process can evolve to the same depth. 7 % and 93 %, respectively. The relationship of
CO2 and igneous rocks (Fig. 1) originates from the
contact-metamorphism of magmatite and adjacent
Methods
rocks that contained carbon in their minerals [3].
The researches [4] of geotemperatures in the lith- Carbonate acid gas may generate also through the
osphere of Serbia were based on geophysical ther- process of regional metamorphism [9]. Previous
mometry in more than fifty deep boreholes drilled research data indicated a carbonate concentration
for different purposes. The same author identified over 90 % about 10 km deep into the Proterozoic,
the meteoric origin of CMW based on δ18O and Paleozoic and Mesozoic of the Serbian lithosphere
δ2H isotope concentrations and standard diagrams. (Fig. 2). Carbonate concentrations of less than 7
Analyses of the two isotopes and of δ13C were made % are found in the “granite-metamorphic layer”
in the Jožef Stefan Institute of Ljubljana, Slovenia. roughly between 10 and 20 km deep.
The minimum temperatures of calcite (300–320
rocks is most abundant in the VZ (Figure 1). Car- of Serbia (Figures 2, 3 and 4) and regional research
bonate-high rocks within the extensive VZ permeat- data on the lithosphere geology (Figure 4) are the
ed by Tertiary intrusive and igneous magmatites and following (Table 2):
abundant hydrothermal water indicate magmatism – Lithostratigrahic CO2 substrata in the SMM
as the principal catalyst of CO2 release from carbon- and in the VZ, DIE, OP, IDB and KB a
ate rocks. Thus, the assumed correlation seen in Fig- priori pertain respectively to the Proterozoic
ure 1 between Tertiary intrusive and volcanic rocks metamorphic rocks and the “granite-
and the CMW systems in Serbia is plausible. If the metamorphic layer”, and to the Mesozoic–
“granite-metamorphic layer”, roughly between 10 Proterozoic complex of rocks and the
and 20 km below the surface, contains carbon up to “granite-metamorphic layer”;
7 %, which is far less than in the layer of sedimen- – The actual CMW systems are mainly
tary and metamorphic rocks, it would suggest a very related to the lowest temperature gradient of
slight possibility of the CO2 generation dominantly the lithosphere, where calcite and dolomite
from this layer. transformation may evolve at depths of less
The established correlation between the CMW than 3–5 km;
and igneous rocks and magmatic processes is sig- – The temperature gradient increases with
nificant for a definition of the CO2 substratum and the distance from where it is the lowest,
the depth of CMW systems, because it confirms and so does the minimum depth suitable for
that neotectonic structures, which were preferen- dolomite and calcite transformation, which
tial water conduits, intersected or were concordant is 5–7 km deep or more;
with the faults and, according to Miličić [10], were – The lithostratigraphic CO2 substrata and the
feeders of abundant igneous and intrusive rocks CMW systems were formed in the transitional
on the territory of Serbia. The high geotempera- zone between Proterozoic metamorphites and
ture in the lithosphere (Figure 3) accounts for the Paleozoic–Mesozoic rock complexes and the
small depth of mineral (dolomite, calcite, graph- “granite-metamorphic layer” (Figures 2 and 4).
ite) thermal transformation and CO2 generation. It
is known that elevated concentrations of radioac-
tive elements (U, Ra, and Rn) and F indicate their
derivation from acid igneous rocks. On this basis,
the CMW systems formed in the lithosphere of
Serbia are probably conformable with granitoid
rocks at a depth of about 15 km (Figures 2 and 4).
Table 2. Geological-structural and lithostratigraphic setting and minimum depths of the actual CMW
systems in the lithosphere of Serbia
Estimated min depth
Lithostratigraphic CO2 Number of
Geological-structural unit/zone of lithostratigraphic
substrata (location in Fig. 3) occurrences
CO2 supstrata
Carpathian-
Paleozoic metamorphic and 1
Balkan Region - 5-7 km
granite-metamorphic layer (3) (1,5 %)
(CB)
Serbian- Gneiss Proterozoic gneiss complex and
17
Macedonian Complex granite-metamorphic layer (2, 3-5 km
(25 %)
Massif (SMM) (GnC) 4, 6, 7)
Mesozoic-Paleozoic rocks and
Vardar Zone 37
granite-metamorphic layer (1, 4, 3-5 km
(VZ) (56 %)
5, 8, 9,10)
Drina-Ivanjica Mesozoic-Paleozoic rocks and 8
Inner Dinarides 5-7 km
Element (DIE) granite-metamorphic layer (11) (12 %)
(ID)
Ophiolite Belt Mesozoic-Paleozoic rocks and 3
5-7 km
(OB) granite-metamorphic layer (12) (4 %)
East-Durmitor Mesozoic-Paleozoic rocks and 1
5-7 km
Block (EDB) granite-metamorphic layer (13) (1,5 %)
Table 2 and Figures 1 and 3 illustrate the fre- strata, may transform into a source of CO2 thermal
quent occurrence of CMW in the VZ and its fluids mainly through two processes: oxidation (C
boundary area to the adjacent geological-struc- + O2 → CO2) and hydrolysis (for example, 2C +
tural units or zones (SMM-GK and DIE). Being 2H2O → CO2 + CH4). The former is significant for
related to deep tectonic discontinuities, their pres- the surface conditions, and both are important for
ence is evidence that the VZ, compared to other the conditions of high-temperature metamorphism.
geological-structural units and zones, is character- The reducing forms of carbon (graphite and graph-
ized by complex structural-geological and tecton- ite schist) in the lithosphere of Serbia are found in
ic patterns. The occurrences of CMW become less Proterozoic metamorphic rocks of the SMM [15]
frequent with distance east and west from the VZ, and Paleozoic schist of the Inner Dinarides. The
or disappear altogether. ranges of δ13C for the reducing carbon (in organ-
Figure 2 shows that the temperatures in the ic compounds and graphite) from –15 to –30 ‰
granite layer of the lithosphere conform to the [7] and of CMW carbon in free CO2 and HCO3
background heat flow, i.e., there is no notable tem- from –10.03 to +1.78 ‰ [4] suggest insignificant
perature anomaly. The elevated geotemperatures amounts of reducing carbon in the CMW of Serbia.
in the VZ part of the lithosphere (Figure 3) result
from the Tertiary volcanic activity and the effects Depth of the carbonated mineral water
of magma intrusion. Figure 2 also shows that the (CMW) systems
lithostratigraphic substrata from which CO2 is lib-
erated to form CMW must be deeper than 3–5 km, The depths of the CMW systems in the litho-
where the geothermal conditions (t > 150 °C) sup- sphere of Serbia are presumably related to the depth
port dolomite and calcite transformation, or deeper and intensity of the CO2 generation zones, and to
than 8 km (t > 350–360 °C) for the transformation the deep tectonic discontinuities, their size, porosity
of carbonate and reducing carbon. and the like [16, 3]. The meteoric origin of the ther-
Omoto and Raj [7] maintain that the reducing mal waters in Serbia [4], including CMW, are also
forms of carbon (graphite), as potential CO2 sub- considered. If transformation of carbonate miner-
als (dolomite and calcite) and reducing carbonate zones. This leads to the conclusion that the depths
(graphite) evolved in the lithosphere of Serbia at of the CMW systems in Serbia are 2–3 km. The wa-
depths smaller than 8 km and the transformation of ter circulation processes in these systems evolved
carbonate within the depth range from 3–5 km to within the established CMW time intervals (from
8 km (Fig. 2), the gas concentration in the porous 18000 – 40000 years for the major CMW systems).
tectonic structures would gradually increase from
8 km to 3 km below the surface. The tectonic dis-
continuities and the general porosity of rock masses
increase in density upwards from the CO2 genera-
tion depth; hence the CO2 is distributed through an
ever larger network of discontinuities (Fig. 5). As a
consequence of the foregoing, there must be den-
sity and intensity zones of the tectonic structures
and of the rock porosity in the Vardar Zone of the
Serbian lithosphere. While rising through deep tec-
tonic structures, the CO2 is distributed by younger
discontinuities. The CO2 distribution, according to
the example of the Western Eger Rift [16], evolves
10–15 km below the land surface though a Y-struc-
ture, to which the CO2 free zones on the surface are Figure 5. CO2 degassing and CMW formation
related. In the lithosphere of Serbia, CO2 is gener- zones and CMW system depths in the lithosphere
ated at smaller depths and even if conducted by of Serbia (see Figs. 2 and 4).
Y-structures, the “free zones” at the surface cannot 1. Upper temperature boundaries (a) over 150 °C and (b)
be very wide. Water percolates deep into the litho- over 360 °C; 2. Deep discontinuity; 3. Comparatively deep
discontinuity; 4. Inferred VZ boundary depths; 5. CO2 flow
sphere only where it is conducted by neotectonic
direction; 6. CMW surface occurrence.
fault zones that intersect the deep-seated fault zones I - Graphite and carbonate transformation and CO2 genera-
or revived fault structures. Neotectonic structures tion zone; II - Carbonate transformation and CO2 generation
provide for the percolation of meteoric water from zone; III - Percolated water and CO2 mixing zone; IV - CMW
the surface and its mixing with CO2 from the litho- system depth interval.
spheric depth (below 3–5 km). The sketch figure
given in Fig. 5 shows a section through the consid- Conclusions
ered segment of the lithosphere based on the infer-
ences in this paper that more than 93 % of the CMW The distributions and depths of the CMW sys-
systems in the Serbian lithosphere are related to the tems, determined using data on the spatial posi-
VZ and the boundary areas of the adjacent geolog- tion of the lithostratigraphic CO2 substrata, are
ical-structural zones and the analogous knowledge useful information for an exact and qualified study
of the gas flow in the Western Eger Rift [16]. of the hydrogeological aspect of their formation.
Figure 5 shows the CO2 degassing zones I and The inferred spatial and the identified genetic re-
II, the CO2 and free water mixing zone III, and the lation of the actual CMW systems in the Serbian
formation of the CMW system zone IV. The CO2 lithosphere to Tertiary magmatism and δ13C iso-
mixes with free water at a certain depth while as- topic analysis in the CMW led to the conclusion
cending, which may be considered the depth of that the CO2 derived from oxidizing carbon (do-
the formation of the CMW system. If the “granite lomite and calcite) primarily gassed through the
layer” of the lithosphere decreases in porosity with processes of thermal metamorphism. The conclu-
increasing depth, on the one hand, and the CO2 sion based on the known geothermal conditions
concentration increases in deep discontinuities, on in the Serbian lithosphere and the deep geother-
the other, the percolation of water will certainly mal processes was the depth correlation of the
be more difficult and the mixing zone (III) will be thermal processes and the Proterozoic metamor-
above the CO2 degassing and high-concentration phic rocks and the Paleozoic–Mesozoic complex
of sedimentary and metamorphic rocks, precisely 9. Korotkov A.I. Hydrogeochemistry in Regional Geo-
the transitional “granite-metamorphic layer” be- logical and Hydrogeological Prospecting (in Russian).
Nedra, Leningrad, 1983; 231.
tween these rocks, 3–8 km deep. The established
spatial and genetic relation of the CMW to the 10. Miličić J. Fluorite in the Tectonomagmatic Activa-
geotectonic unit the Vardar Zone and the latest tion Zone in Serbia (in Serbian), Bulletin of the
Tertiary magmatism will help searches for the Geoinstitute, Belgrade, 1991; 25: 217–220.
location and abstraction of CMW. The acquired
11. Dimitrijević M.D. The Dinarides, a View about the
data were employed to subdivide the lithosphere Tectonics (in Serbian), Vesnik (Geology) XI, Ser.
segment of the formation of the largest CMW A, Vol. XL, YU ISSN 0514-5961. UDK: 55.001.
system into the following zones: I graphite and Federal Institute for Geological and Geophysical
carbonate transformation and CO2 degassing at Investigation, Belgrade, 1982; 113–147.
a depth of 8 km; II carbonate transformation and
12. Popović R. Geochemical and Metallogenic Evolu-
CO2 degassing 3–8 km deep; III free water and tion of the Moravian Massif in the pre-Mesozoic
CO2 mixing in the depth interval from 2 km to Time (in Serbian). Bulletin of the Geoinstitute, vol.
4 km and IV CMW systems 2–3 km under the 31. BIBLID 0537-846X (1995), 31 (267–284). UDK
surface. Pursuant to these studies, the maximum 550.4+553.07, Belgrade, 1995; 267–284.
depth of the CMW prospects in the lithosphere of 13. Popović R. Interrelation of the Gneiss and Green-
Serbia is less than 2 km. rock Complex in the Moravian Massif (in Serbian).
Bulletin of the Geoinstitute, vol. 37. BIBLID 0537-
846X (2002), 37, UDK 551.1 (497.11), Belgrade,
References 2002; 67–72.
1. Protić, D. Mineral and Thermal Waters in Serbia
(Monograph in Serbian). Geoinstitute, 17, UDK 14. Bogdanović O. Serbian–Macedonian (Rhodopean)
553.7 (615.327) (497.1). ISBN 86-7156-003X, Bel- Mass – Boundaries, Geology and Tectonics (in
grade 269, 1995. Serbian). Vesnik (Geology) XXXV/XXXVI, Ser. A.
Federal Institute for Geological and Geophysical
2. Ceron J.C., Palido-Bosch A. and de Galdeano C.S. Investigation, Belgrade, 1978; 141–151.
Isotopic Identification of CO2 from a Deep Origin
in Thermomineral Waters of Southeastern Spain. 15. Pavlović Z. Distribution and Minerogenetic Char-
Chemical Geology 149, 1998 ; 251–258. acter of Graphite in Serbia (in Serbian). Bulletin of
the Geoinstitute, Belgrade, 1996; 32: 263–271.
3. Xiaoyong Y. et al. Calculation of the CO2 Degassing
during Contact Metamorphism and Its Geological 16. Weinlich F.H., Bauer K. et al. Gas Flux and Tecton-
Significance: The Model and Example from the Sh- ic Structure in the Western Eger Rift, Karlovy Vary
uanshan Area of the South Tan-Lu Fault Belt. Acta – Oberpfalz and Oberfranken, Bavaria. GeoLines,
Geologica Sinica. 2008; 82; 3 562–576. 2003; 15: 181–187.
..........................................(3)
......................................... (4)
........................................ (5)
value 13.483 3,436 4,403 1,339 0,398 0,923 -0,143 0,241 0,402 0,050 0,236
p-value 0.000 0.000 0.000 0.000 0.053 0,002 0,407 0,188 0,052 0,764 0,196
The general check of the suitability and ade- Figure 9 presents the contour plot which shows
quacy of the model is done by the help of analy- as a area with the main factors (weight of the ram
sis of variance. Because the value of adjusted R- A, height of the ram impact B) on the axes and the
squared is 97,70%, it means that the found constant values of the response value are shown
regression model explains experimental results as lines. The lines in the contour plot are slightly
next to 98%. curved what shows evidence of the weak interac-
The value from the equation (7) is called sup- tion among these factors.
posed (fitted, theoretical) value and real vaules
of the response obtained by the experiment are
called as observed (real) values. In the case of set-
ting of minimal level of important factors A,B and
C the supposed value is calculated by the equation:
4. Conclussion
The results of the experiment show that the
weight of the ram, the height of ram impact, the
type of the belt and common interaction of the first
two main factors have the major effect on the the
Figure 7. Plot of residuals versus fitted values size of the impact force. The last main factor – type
(Output: Minitab) of the ram shows as an unimportant factor by the
examined height of the impact (from 0.6 m to 1.6
Monitored values and obtained supposed val- m). The other interactions among factors (except
ues allow to calculate residuals. Figure 7 presents for the interaction among the weight of the ram
the plot of residuals versus supposed values and and impact height) are also unimportant. Analysis
Figure 8 presents the normal probability plot of and evaluation of the experiment was done in the
residuals. program Minitab.
Planning of experiments is a powerful and im-
portant tool which gives a possibility to find those
factors which significantly effect the process. It is
based on the fact that various setting of the inputs
and examination of corresponding responses of
outputs allows to know and subsequently to im-
prove the process. The use of the method is advan-
tageous for the experiment with more factors be-
cause it discloses factors significantly influencing
the response. The method has an importance for
planning and effective realization of experiments
and it conduces to the reduction of the number of
Figure 8. Normal probability plot of residuals
required tests what may results in the first place
(Output: Minitab)
time, financial or material savings.
channel deformations represent the synthesis of all – taking of undisturbed samples of material
calculations in the sphere of river hydraulics [6,7 ] from the river channel, bottom and banks
The theoretical description of the channel de- for labaratory analyses of geomechanical
formation phenomena is reduced to the system of characteristics.
equations which define the three-dimensional two-
phase turbulent current in the deformable channel Further morphological research included the
(the Reynolds equation, 1950). data on cross profile geometry characteristics, and
The theoretical analysis of river channel defor- the stream hydrological-hydraulic and psammo-
mation consists of two basic modern approaches: logical characteristics.
– analytical approach, which includes the This study presents the results of the research
simulation of the complete physical proce- on the river Toplica. The study method was direct
sses, starting from the physical laws of measurement of the changes in cross-section pro-
two-phase fluid motion in the deformable file over a long time period. The regulation was
channel; sized for Q5%=18m3·s-1. The morphological chang-
– stochastic approach, which treats river es were analysed on the selected 22 fixed profiles
channel as the product of alluvial processes along the alignment. After the regulation works
of random character [8]. were completed, the new channel was left to the
natural cycle of development during which it was
This paper deals with the effect of hydrological- subject to a series of morphological phases and the
hydraulic parameters on the development of chan- balancing of sediment supply and the transport ca-
nel morphology [7] in the middle course of the river pacity of the reach. The accurate research required
Toplica during the research period 1982 - 2011. the modelling method with the 1:1 scale model, so
The river Toplica is the right tributary of the the experiment was established in the field. In this
river Kolubara. Its location is Europe, the Bal- aim, we selected a 3 km long reach from Vrujci
kans, the western part of Serbia, between 44005’ Spa to the village Komanice. The pofiles were pre-
- 44022’ N and 20007’-20008’ W. The river Toplica cisely marked by land surveying beacons (poly-
is a small river with catchment area of 96 km2. The gon points) outside the embankment zone, on both
main stem is 30 km long, and the mean catchment sides of the regulation. Cross profiles, longitudi-
slope is 18.00%, and mean stream slope 2.55%, nal profiles and situation plans were successively
and the lower course slope is 0.27%. The aver- measured by surveying instruments over the pe-
age floodplain width is 700 m, it is very fertile and riod starting from the execution of the regulation
suitable for agricultural production. works in 1982 to 2011.
The river is equipped with two gauging stations Hydrological-hydraulic analyses are based
and water level is recorded automatically. The ob- on the analysis of the recorded water levels and
jective of our study was to define the physical- the discharges at the gauging stations “Markova
geographical parameters which are decisive in Crkva“ and “Komanice“. Water with suspended
the formation and establishment of stable channel sediment was sampled from the channel every day
reaches [9]. at the same time, to determine the suspended sedi-
ment concentration in water samples. The daily
2. Material and Method concentrations and the total water discharge were
calculated (Figure 1).
The effect of the selected parameters on the de- To reduce the too large amount of measured
velopment of morphological changes of improved data, this paper presents only three characteristic
channels was researched by the following methods: cross profiles. The presented results (surveyed in
– experimental research on the selected 1982-83, 1988, 1992 and 2009) point to intenten-
experimental reach on the river Toplica: sive morphological changes.
– direct surveying of the changes in the river
alignment and the changes in the channel
longitudinal profile and cross profile;
3. Results and Discussion 1989, 1990, 1991, 1992, 1993, 1996, 1998, 1999,
2000, 2001, 2002, 2008 and 2009 were the years
The field type of earth regulation is applied in
with elevated discharges, and 1982, 1983, 1986,
non-urban zones to protect the riverine area and
1987, 2005, 2006 and 2007 were the years with
agricultural lands from overbank flooding and to
relatively lower discharges.
prevent waterlogging and covering the fertile land
Maximal annual discharges were recorded at
with sterile sediment. [10].
the gauging station “Markova Crkva“ during the
The hydrological research was performed at the
period 1980 – 2009. The highest annual discharge
gauging station “Markova Crkva“, near the con-
in the study period amounting to Q= 29.43 m3.s-
fluence in Kolubara over the period 1980 - 2009. 1
was recorded in 2009, and the lowest maximal
Table 1. Maximal annual discharges recorded at
discharge Q=4.45m3.s-1 was recorded in 1983.
the gauging station “Markova Crkva“ and the
The duration of peak discharges was short, and
discharge duration (Source: original)
the duration of low discharges was long, which
Extreme discharges Discharge duration points to the torrential regime. Table 1 shows the ex-
Year Qmin Qmax Q>1 Q>5 Q>10 treme discharges of the river Toplica. The duration
m3.s-1 m3.s-1 Days of discharge Q >1.0 m3.s-1 was >100 days in rainy
1980 0.070 12.20 120 17 5 years, <50 days in dry years. Peak water discharges
1981 0.110 15.00 100 10 2 Q >10 m3.s-1, lasted for 4-5 days in rainy years, and
1982 0.120 8.70 48 4 0 in dry years, they appeared once or did not appear at
1983 0.060 4.45 96 40 0 all. To analyse the effects of hydrological-hydraulic
1984 0.100 15.20 90 14 4 parameters of the stream, the discharge was record-
1985 0.140 16.20 60 18 5 ed at the gauging stations and the discharge curve
1986 0.123 8.25 88 19 0 was defined in the function of water depth.
1987 0.150 9.00 125 13 0 At the same gauging station, torrential water
1988 0.230 19.20 100 20 1 was sampled to determine the suspended sediment
1989 0.125 14.90 94 11 5 concentration. It can be concluded that the variation
1990 0.180 16.00 132 20 4 (C) ranged from the maximal value close to 1.0kg/
1991 0.090 24.10 112 35 2 m3, to the minimal value close to 0, Figure 2.
1992 0.075 18.50 110 25 2
1993 0.045 16.20 96 23 5
1994 0.067 13.80 120 29 4
1995 0.053 14.80 118 25 4
1996 0.086 17.60 100 33 5
1997 0.092 12.80 135 35 5
1998 0.120 16.42 123 15 3
1999 0.135 18.34 110 32 3
2000 0.110 18.43 145 12 4
2001 0.098 17.56 122 10 3 Figure 2. Correlation between water discharge
2002 0.080 19.35 115 13 4 and suspended sediment transport at “Markova
2003 0.125 13.28 89 12 3 Crkva“ P (kg s-1) (Source: original)
2004 0.132 14.45 93 8 2
2005 0.076 12.82 95 4 1 The correlation of discharge and suspended
2006 0.092 13.93 103 5 1 sediment transport qas a very strong correlation.
2007 0.090 13.15 132 5 2 Table 2 presents the maximal annual values of
2008 0.089 18.26 125 13 3 suspended sediment concentration. Higher sus-
2009 0.245 29.43 118 15 5 pended sediment concentrations over 1991, 1992,
and 1996 were expected because they were rainy
Table 1 shows that, during the study period, the years with the discharges Q>10 m3.s-1 occurring
following years 1980, 1981, 1984, 1985, 1988, 4-5 times per year and the channel morphological
where: ∆Z – denivelation of the water level in some of the essential causes of lowering the regu-
the reach from a profile to a profile, К – is mean lated channel bottom line. The changes in the par-
ticle-size distribution of the material from the river
value of the discharge module ( ), and
bed and banks presented in Figure 10 induced the
V u and V n are discharge rates on upstream and
2 2
onset of periodic sediment motion, leading to non-
downstream profiles (from a profile to a profile).
uniform sediment grain sizes along the river chan-
The results of hydraulic calculations and analysis
nel. Also, there are lateral tributaries which deliver
are presented on Figure 9 for the three morphologi-
coarser sediment fractions into the main stem.
cal states (1982, 1992, and 2004).
Critical tractive force refers to the sediment in To fully understand the effect of hydraulic pa-
the river channel in the case when 50% of sedi- rameters on the morphological development of
ment from the particle-size distribution curve, unlined regulated watercourses, we shall present
in the determined hydrological-hydraulic condi- the flow velocity changes under the discharge Q =
tions, starts to move along the course. The onset 15 m3.s-1, as well as the permissible tractive forces
of sediment motion creates the conditions for the along the river bed for three morphological states
appearance of non-uniform morphological char- of the regulated channel, in 1982, 1992 and 2009,
acteristics in the channel. In this way, the phases according to the formula:
of accumulation and the repetitive motion of the
deposited sediment are defined . The value of criti- [N·m-2]
cal tractive force was defined for all the cross pro-
files along the experimental reach based on Mey- where:
er-Peter Muller’s formula (1975). The results are - tractive force
presented in Figure 9. - water density;
g - acceleration of gravity;
t 0 = 0,047 ⋅ g ( r s − r )d sr hmax – maximal water depth in the stream cross-
section;
If permissible tractive force is greater than the J0 – slope of the water surface in decimal form.
critical tractive force, the result is channel erosion,
and if permissible tractive force is equal to critical
tractive force, the result is the beginning of sedi-
ment accumulation in the river channel.
Based on Meyer-Peter Muller’s formula, criti-
cal tractive force was defined for all the cross pro-
files along the experimental reach and presented
in Figure 12.
in the cross profile. The sizes of the cunette are not Based on the above, it can be concluded that
sufficient for the analysed discharge Q>15m3.s-1. the tractive force depends on the maximal depth
Greater discharges lead to greater velocities in in the cross profile and not on the hydraulic radius:
the regulated channel, which in turn caused ero-
sion and the lowering of the channel bottom line. [N·m-2]
Greater velocities and grater tractive forces are the
causes of general channel deformation through- The river hydraulic and psammological param-
out the sector. Also, permissible tractive forces eters are adjusted over stationary time. After the
are greater than critical tractive forces under dis- works which disturbed the natural balance, the
charges Q > 15m3.s-1. In the study conditions, river improved channel commenced an altered mor-
channel was not able to resist the elevated tractive phological development, which should lead to a
forces, and this resulted in morphological changes new equillibrium state of the river morphological,
in the cross profile. hydraulic and psammological parameters which
were disturbed both in the catchment and along
the natural river alignment. There is a dependence
4. Conclusions between the intensity of the channel morphologi-
The goal of this research was to point to the cal changes and the variation in the hydraulic pa-
consequences of the flood wave passage through rameters along the river.
the unprotected and unlined regulated river chan- Also, there was a time tendency of the balance
nel and also to point out the possible directions of hydraulic parameters along the experimental
of development of morphological processes in reach. However, the variations in sediment grain
the regulated conditions. After the morphological sizes point to the torrential character and to peri-
changes were observed, we analysed the condi- odic detachments of river sediment in peak wa-
tions which lead to major morphological changes ter waves. The greatest morphological changes in
and the methods of ther attenuation and control, in the regulated channel of the experimental reach
order to create favourable and safe conditions for occurred during the periods of peak waters. In
agricultural production. the past period, in some reaches, hydraulic pa-
According to literature sources, it is generally rameters of discharge (velocities, tractive forces)
accepted that morphological changes mainly oc- conditioned general deformations of the regulated
cur as the result of increased tractive forces in the channel. Such changes caused the bed lowering
streams and the wetted perimeter, in which the and the channel incision in the alluvium, forming
interparticle cohesion cannot sustain the the shear a cunette within the designed cross profile. The
forces defined by the equation: cunette formation created the conditions for the
incidence of higher velocities and increased trac-
[N·m-2] tive forces, and to the development of vegetation
on the streambanks.
However, it was found that the above was The concentration of suspended sediment in
not true, because (R) is the hydraulic radius, or the river is directly dependent on water discharge,
the mean depth in the cross profile. Morphologi- defined by the formula:
cal changes occur where the depths are maximal
(h=hmax). The maximal depths in the cross profile
create the conditions for augmented tractive forc-
es, and exceed the critical value at which tractive
forces are higher than critical tractive forces, at The greatest concentrations of suspended sedi-
which the cross profile is still stable. It is defined ment occurred during the periods of maximal dis-
by the formula: charges. Consequently, the theoretical conclusion
that sediment in torrential watercourses is trans-
ported periodically by peak water waves was con-
firmed by this study. At the end of the study pe-
riod (1982-2011) on the experimental reach of the 8. Muškatirović D., Textbook, Regulacija reka.
river Toplica, it can be concluded that small and Građevinski fakultet, Belgrade. (in Serbian) 1991.
medium waters with long duration periods formed 9. Petković S., Đeković V., Relation Between Morpholo-
the cross profile in the cunette (canal) form. Flood gy of Small Streams and Geomorphic Geological and
waters which had short duration periods over- Erosional Factors of Watersheds. 6th International
topped the cunette, but did not flow over the de- Symposium on River Sedimentation. New Delhi.
signed profile. Bed load was moved by the waves 1995; 425–433.
of peak stream flows. It was formed by stream- 10. Cowan W. L., Estimating hydraulic roughness
bank scouring and collapsing, which created new coefficients. Agricultural Engineering, July 1956;
conditions for lateral delivery of eroded material. 473– 475.
This occurrence caused periodical widening of the
11. Kondolf G.M., Piegay H., Landon N., Channel
river channel and the harmonisation of transport
response to increased and decreased bedload sup-
capacity and the available quantity of sediment in ply from land-use change: between two catchments.
the river profile. During the study period, the sizes Geomorphology 2002; 45:35– 51.
of the cross profile increased many times. The de-
signed alignment was sized to accommodate peak 12. Sloan J., Miller J.R., Lancaster N., Response and
recovery of the Eel River, California, and its tribu-
water amounting to Q5%=18m3·s-1, but due to mor- taries to floods in 1955, 1964, and 1997. Geomor-
phological changes, at the end of the study period phology 2001; 36: 129– 154.
the channel cross profile accommodated peak wa-
ter amounting to Q1%=46.40m3·s-, Figure 2. 13. Đeković V., Analysis of the effects of drainage-basin
physical-georaphical parameters on the develop-
ment of erosion processes and channel morfology
References - the example of the river Resava, Barcelona. First
European Coference on Erosion Control; Abstract
1. Keesstra S.D., Huissteden J.van, Vandenberghe J., Book, Barcelona-Sitges May 1996; 29-31.
Dam O.V., Gier J. de, Plezier I. D., Evolution of the
morphology of the river Dragonja (SW Slovenia) due
to land-use changes. Geomorphology , 2005; 69: Corresponding Author
191-207. Nedjo Milosevic,
Faculty of Forestry,
2. Ortigosa L., Ruiz Flano P., Changes in runoff and University of Belgrade,
erosion as a consequence of land-use changes in the Belgrade,
Central Pyrenees. Physical Chemical Earth 1995; Serbia,
20: 301– 307 E-mail: nedjo.milosevic@gmail.com
3. Lamakin В.В., Textbook, Dinamiceskie fazi rechnih
dolin i aluvialnih atlazenii - Zemljevedenije Moskva.
(in Russian) 1950.
a group of geodetic projections, that is the pro- squares method, provided that coordinates of sev-
jection in which geodetic coordinates (j, l) can eral common points are known for both coordinate
be easily determined using Cartesian coordinates systems (both projections). Starting with known
(x,y) [4]. In the majority of other map projections coordinates, equations for deviation are developed
transformation is possible only through approxi- (3.2) i.e. an appropriate system of normal equa-
mate methods. One particular problem related tions, separately for abscissas and ordinates. So-
to map projection transformation is the impact lution to these equations requires that the sum of
brought by the change of ellipsoid, orientation, squared differences between calculated and source
and scale parameters. coordinates is minimum.
Differences between the source and calculated
3. Direct transformation of map projections coordinates of corresponding points are character-
ized by n-degree transformation errors. If system-
Direct transformation entails finding a direct atic errors for a given area do not exceed certain
analytical relation between Cartesian coordinates limit, than the n-degree transformation for that
of the points in the source projection and their cor- area is acceptable [2] and [3].
responding points in the new projection, using ex- Expanded expression (3.2) is:
panded projection equations. Strict solution to the
problem of direct transformation is very complex, X = a0 + a11 x + a1 2 y + a21 x 2 + a2 2 x y + a2 3 y 2 + a31 x 3 +
so typically approximation is used, which entails
+ a3 2 x 2 y + a3 3 x y 2 + a3 4 y 3 + a41 x 4 + a4 2 x 3 y +
developing F3 and F4 functions into polynomials:
+ a 4 3 x 2 y 2 + a 4 4 x y 3 + a 4 5 y 4 + Rx ( x , y ) ,
k m
X = ∑∑ ai j , x i , y i , Y = b0 + b11 x + b1 2 y + b21 x 2 + b2 2 x y + b2 3 y 2 + b31 x 3 +
i =0 j =0
..................... (3.1) + b3 2 x 2 y + b3 3 x y 2 + b3 4 y 3 + b41 x 4 + b4 2 x 3 y +
k m
Y = ∑∑ bi j , x i , y i . + b4 3 x 2 y 2 + b4 4 x y 3 + b4 5 y 4 + Ry (x, y ),
i =0 j =0
..................................... (3.3)
where xi, yi represent coordinates of the points where coefficients:
in the source projection, aij and bij represent con-
stant coefficients calculated on the basis of value
1 ∂ n F3
of F3 and F4 functions in a row of equally arranged ai = ,
points in an area1, and X, Y coordinates represent n! ∂x i ∂y j
....................... (3.4)
the corresponding points in the new projection. 1 ∂ n F4
Polynominals (3.1) can also be expressed as: bi = i j ,
n! ∂x ∂y
k i
for which it is necessary to know the coordinates When coordinates of the points in the new pro-
depends on the number of unknown coefficients jection are represented in the form of fractions of
i.e. the degree of the polynomial. This practi- liner functions with common denominator:
cally means that for a first degree polynomial it a0 + a11 x + a1 2 y
is necessary to know the coordinates of at least X= ,
three points in the source, and their corresponding c0 + c11 x + c1 2 y
points in the new projection; for a second degree ................... (3.7)
b0 + b11 x + b1 2 y
polynomial at least six points; for a third degree Y= ,
c0 + c11 x + c1 2 y
polynomial ten points, etc. If the same point is
used as the coordinate origin, that is, when Car- this is called homographic or line transforma-
tesian coordinates (x, y) and (X, Y) are based on tion, which necessitates knowing at least four pairs
a unique geodetic coordinate system (j, l), then of points. Points lying on one line in the source
coefficient a0 = b0 = 0, so the minimum number of projection are replicated to the points also lying
necessary points is lower by one. For the purpose on one line.
of transformation control it is recommended to use Cases more complex than those stated above
more points than the previously stated minimum are transformations of straight lines into curves and
number, where the system of linear equations is vice versa. This type of transformation implies con-
solved using least squares method with an appro- sidering members of the second or higher degrees.
priate accuracy evaluation [5]. Naturally, the ques- Having in mind (3.2) and (3.3), equations for the
tion now is which degree polynomial should be second, third and fourth degree transformations are:
used in map projection transformation? Selection
of polynomial is affected by the projection type, X = a0 + a11 x + a1 2 y + a21 x 2 + a2 2 x y + a2 3 y 2 ,
scale of the graphic content and size of the terri-
Y = b0 + b11 x + b1 2 y + b21 x 2 + b2 2 x y + b2 3 y 2 ,
tory that is the subject of transformation.
The simplest type of transformation is similar- ...................................... (3.8)
ity transformation, which necessitates two pairs of
given points (identical in both projections), and X = a0 + a11 x + a12 y + a21 x 2 + a2 2 x y +
which can be presented by equations:
+ a2 3 y 2 + a31 x 3 + a3 2 x 2 y + a33 x y 2 + a3 4 y 3 ,
X = a0 + a1 x , Y = b0 + b11 x + b12 y + b21 x 2 + b2 2 x y +
.......................... (3.5)
Y = b0 + b1 y . + b2 3 y 2 + b31 x 3 + b3 2 x 2 y + b33 x y 2 + b3 4 y 3 ,
Similarity transformation can be applied in a ...................................... (3.9)
group of cylindrical projections, that is, when both
the source and new projections are either confor- X = a0 + a11 x + a12 y + a21 x 2 + a2 2 x y + a2 3 y 2 +
mal, equivalent or equidistant.
+ a31 x 3 + a3 2 x 2 y + a33 x y 2 + a3 4 y 3 + a41 x 4 +
One of the possible transformations is affine
transformation which necessitates three pairs of + a4 2 x 3 y + a4 3 x 2 y 2 + a4 4 x y 3 + a4 5 y 4 ,
given points under the conditions that they do not
Y = b0 + b11 x + b12 y + b21 x 2 + b2 2 x y + b2 3 y 2 + b31 x 3
lie on the same line. Affine transformation is usu-
ally applied in systems with different laws of pro- + b3 2 x 2 y + b33 x y 2 + b3 4 y 2 +b 41 x 4 + b4 2 x 3 y +
jecting ellipsoidal surface on a plain2. Affine trans- + b4 3 x 2 y 2 + b4 4 x y 3 + b4 5 y 4 .
formation equations are first degree polynomials:
.................................... (3.10)
X = a0 + a11 x + a1 2 y ,
.................... (3.6)
Y = b0 + b11 x + b1 2 y . Solving these equations requires 6 (six), 10
(ten), or 15 (fifteen) pairs of points. Appropriate
2 For example, transformation from Gauss-Kruger to system of normal equations is formed separately
stereographic projection. for abscissas and ordinates, and their solution re-
quires that the sum of squared differences between If the transformation parameters are not known, it
calculated and source coordinates is minimum: is possible to determine them only if coordinates
of identical points in both systems are known.
2
In general, two Cartesian coordinate systems can
∑ [x − f (x , y )] = [v ] = min .
n
2
i i i x be distinguished by the position of the origin, axis
i =1
2
...........(3.11) orientation and scale. Regarding the datum trans-
[ ]
n
formation, it would be preferable but not necessary
∑ [y
i =1
i − f (xi , yi )] = v y2 = min .
to determine seven parameters:
– three translations,
where, n – is the number of necessary (given) – three rotations and
points, or unknown coefficients ai or bi. – scale factor.
Mean systematic error of transformation for
specific degree is calculated from the difference To solve the above mentioned system of seven
between the given values and values of coordinates unknown variables it is necessary to know the coor-
calculated after transformation. If this value does dinates of at least two corresponding points and the
not exceed certain limit, transformation of the cho- height of the third point in both coordinate systems
sen degree is acceptable. Transformation accuracy (datums). Having the coordinates of a greater num-
increases when moving from a second to a third de- ber of corresponding points enables higher-quality
gree of polynomial approximation, while differenc- transformation, that is, greater number of points al-
es in results decrease with the increase of degree [4]. lows the application of the least squares method,
and renders evaluation of parameters more reliable.
4. Determining global transformation The most commonly used direct transforma-
parameters for the Republic of Serbia tion is similarity transformation that can be gener-
ally expressed as:
The State Survey and Cadaster Law from 2009
stipulates that the position of points in the horizon-
tal reference system is expressed by two-dimen- ( )
N B = U 0 + (1 + s )R OA − U 0 + T , ........... (4.1)
sional, rectilinear coordinates in the conformal
Universal Transverse Mercator (UTM) projection, where:
on the GRS80 ellipsoid. Previous state coordinate s – scale factor,
system (JU datum) was defined by the Gauss- R – rotation matrix,
Kruger projection (three degrees zone) with pa- T – translation vector between datum origins,
rameters of the Bessel ellipsoid and Hermanskogel
datum. The orientation of the ellipsoid was gener- N – coordinates in the new datum,
ally global and topocentric [6], and the entire state O – coordinates in the original datum,
system was materialized through the trigonometric
network. Characteristics of the former state coor- U 0 – centroid coordinates.
dinate system, which are primarily related to the
wrong network orientation, assuming mathemati- Usually, the central point of the area is taken as
cally correct transformation, are a source of vari- transformation starting point. Matrix R describes
ous problems. The aforementioned problems with rotations of points relative to coordinate axis of
regard to the transformation of map projections in the old datum (projection).
the broad sense can be collectively referred to as Therefore, there are three matrices:
problems of geodetic and cartographic continuity.
Knowing the transformation parameters enables the cos k sin k 0
transformation process to establish a direct analyti- RX (k ) = − sin k cos k 0 , ............. (4.2)
cal relationship between the coordinates of points 0 0 1
in both datums, that is, between the coordinates
of points in the original and the new projection.
where:
cosq 0 sin q
XA, YA, ZA – denote source projection coordi-
RY (q ) = 0 1 0 ,............. (4.3) nates and datum,
− sin q 0 cosq XB, YB, ZB – denote new projection coordinates
and datum,
TX, TY, TZ – denote translation components,
1 0 0
s – denotes scale factor change,
RZ (w) = 0 cos w sin w ,............ (4.4) R – denotes rotation matrix.
0 − sin w cos w
Matrix R describes rotation of points relative to
coordinate axis of the new datum and represents
where: k, q, w are rotation angles relative to X, the product of three matrices (4.2), (4.4) and (4.4).
Y and Z axis, respectively. One characteristic of this model of transformation
If rotation angles are less than 3² the above is that the required rotation effect about datum axis
three matrices can approximated with one matrix: can be achieved through translation parameters.
For example, the required rotation about Z – axis
1 k −q can be replaced by a combination of appropriate
RX ,Y , Z = − k 1 w ,................ (4.5) translations along X and Y - axis.
q − w 1 In the following part global transformation
parameters are determined for the territory of the
Republic of Serbia using Bursa-Wolf model, as a
where k,q and w are expressed in radians. specific case of Helmert (similarity) 7-parameter
Most commonly used transformation models transformation, in three different versions. Global
[7] are Bursa-Wolf [8], [9] (Fig. 2) and Moloden- transformation parameters required for the trans-
sky-Badekas [10], [11], [12]. The Bursa-Wolf formation from UTM system on WGS84 ellipsoid
model is a specific 7 – parameter similarity trans- to the former state coordinate system have been
formation described in the equation (4.1). determined using the least squares method, with
condition that the sum of squared difference of co-
ordinates in the new system and coordinates in the
original system is minimum.
These parameters have been determined using
13 common points equally distributed across the
territory of Serbia. Coordinates of correspond-
ing points in the UTM (WGS84) system were
obtained in field measuring. In the first version,
transformation problem is solved with translation
parameters, where rotation parameters and scale
factor change are zero (Table 4.1).
Table 4.1 Translation parameter value (Bursa-
Wolf 3 – parameter transformation)
Figure 2. Bursa-Wolf transformation model
Parameter Value Dimension
This transformation model can also be present- dx - 693,029 [m]
ed as: Translation dy 199,322 [m]
dz - 483,275 [m]
X B X A TX eX 0,0 [²]
Y = (1 + s ) R Y + T Rotation eY 0,0 [²]
B A Y eZ 0,0 [²]
ZB
ZA
TZ
Scale factor change s 0,0 [ppm]
z B z m Tz z A − z m
(Bursa-Wolf 7 – parameter transformation)
Parameter Value Dimension
where:
dx -508,290 [m]
Translation dy -240,311 [m]
- xm, ym, zm – denote centroid coordinate in the grid,
dz -458,459 [m] - Tx, Ty, Tz – denote Molodensky-Badekas trans-
formation parameters.
eX 6,130092 [²]
Rotation eY 2,119025 [²]
Although this model provides values for ro-
eZ -15,161066 [²]
tation and scale parameters like the Bursa-Wolf
Scale factor change s -4,755358 [ppm]
model, translation parameters are different. Table
4.4 gives global transformation parameters for
Generally, in all three versions of the Bursa-
the territory of Serbia, calculated according to the
Wolf model the rotation origin coincides with the
Molodensky-Badekas model.
origin or the source coordinate system, that is,
Table 4.4 Global transformation parameters for
centroid coordinates in the new datum are zero.
the Republic of Serbia (Molodensky-Badekas)
This model is based on a high correlation between
translation and rotation parameters. Transforma- Parameter Value Dimension
tion parameters shown in previous tables define dx - 693,029 [m]
the mathematical relation between the UTM sys- Translation dy 199,322 [m]
tem and the former national coordinate system, dz - 483,275 [m]
which, it should be noted, contain the effects pro- eX 6,130092 [²]
duced by the change of position of certain points Rotation eY 2,119025 [²]
eZ -15.161066 [²]
that occurred in time between different surveys.
Molodensky-Badekas model (Figure 3) is a Scale factor change s - 4,755358 [ppm]
more general transformation model in which rota-
tions are relative to the grid centroid in the new All transformation parameters presented above
datum. This model excludes a high correlation be- are used for datum transformation from WGS84 to
tween rotation and translation parameters. Bessel ellipsoid with orientation of the former state
coordinate system. For reverse transformation,
from the old datum to WGS84, all that is necessary
is to change the signs of transformation parameters.
Table 5.2 Evaluation of translation and rotation parameters (6 – parameter Bursa-Wolf transformation)
Parameter Value s Dimension
dx -528,768 15.2006 [m]
Translation dy -248,013 20.3688 [m]
dz -479.389 13.7055 [m]
eX 6.130092 0,5740 [²]
Rotation eY 2.119025 0,6299 [²]
eZ -15,161066 0,6001 [²]
Scale factor change s 0,0 0,0 [ppm]
[vv] 60,5426 [m2]
WGS84 to the old national datum are “transient” 10. Molodensky M.S. Eremeev, V. F., Yurkina, Mi I.,
(current) and relate to the time when measure- Methods for Study of the External Gravitational
Field and Figure of the Earth, Israeli Program for
ments were taken. Observing from that perspec-
the Translation of Scientific publications, Jerusa-
tive, the resulting transformation parameters com- lem, 1962.
pletely satisfy the accuracy required for transfor-
mation of map projections. 11. Badekas J. Investigations Related to the Establish-
ment of a World Geodetic System, Report No. 124,
Department of Geodetic Science, Ohio State Uni-
Acknowledgements versity, Columbus, Ohio, USA, 1969.
The work reported in this paper is a part of the 12. Coordinate Conversions and Transformations
investigation within the TR 36017 research proj- including Formulas, OGP Publication 373-7-2 –
ect supported by the Ministry for Science and Geomatics Guidance Note number 7, part 2 – July
2012. (http://info.ogp.org.uk/geodesy/guides/docs/
Technology, Republic of Serbia. This support is G7-2.pdf).
gratefully acknowledged.
Corresponding Author
References Miodrag Regodic,
1. ISO/TC 211, 2007a, ISO19111:2007 Geographic in- Military Academy,
formation - Spatial referencing by coordinates (In- University of Defence,
ternational Organization for Standardization), 2007. Belgrade,
Serbia,
2. Jovanović V. Coordinate systems and the necessity to E-mail: mregodic62@gmail.com
secure geodetic and cartographic continuity with neigh-
boring countries, Military Academy, Belgrade, 1974.
level of correlation between size and organizational organizational size and organizational structure
structure in metalworking enterprises of a country parameters. The results also indicated that in Aus-
in transition. Also, the results indicated that large tralian organizations there is a higher dependence
size firms, especially of the metal industry, were between organizational size and the number of
tending to reduce their size, so as to adapt to newly hierarchy levels than between organizational size
developed conditions of business operations and and span of control.
to become more flexible. The opening of markets, Mileti, Gillespie and Hass [9] studied the inter-
pressure imposed by competition, reduced product dependence of organizational size and the spatial,
demands etc. result in lower turnover and thereby vertical and horizontal complexity of an organiza-
downsizing. Profitable business operations in such tion in the heterogeneous sample of government or-
conditions call for rational operations and utiliza- ganizations in California. The conclusions point to
tion of internal potentials. One of the measures specified changes and expansions compared to the
to make use of internal potentials is the manage- conclusions of Blau’s generalized formal theory of
ment of organizational changes. The size and form differentiation. They measured organizational size
of an organizational structure are tools that can be only through the number of employees. Horizon-
employed by the management to more efficiently tal differentiation was measured via the number of
adapt to newly developed conditions of doing busi- departments, divisions. Vertical differentiation was
ness. The results of previous research [2] indicate expressed by the number of different work posi-
that there is a big unused organizational change tions calculated from a top -bottom organizational
potential which could be used to enhance business structure. Spatial dispersion was represented by the
results. The influence of organizational size on or- number of geographically distant, separate organi-
ganizational structure is one of the most heavily zational units. Using the results, they established a
researched issues in organizational theory. Among positive dependence between vertical and horizon-
the earliest investigations related to the mentioned tal declining size differentiation with growing or-
topic the works by Mansfield [3] and Meyer [4] ganizational size (similar to Blau and Schoenherr’s
were the most prominent. Afterward, as early as conclusions), and a stronger influence of size on
1970, Blau [5] established that with growing orga- vertical differentiation than on horizontal differ-
nizational size the declining size differentiation is entiation (coefficients of dependence are 0.51 and
generated. Blau and Schoenherr [6], among other 0.24). Such conclusions support those claiming that
conclusions, indicate a causal relationship: A large in larger size organizations divided organizational
size promotes structural differentiation. Structural units are more pronounced.
differentiation always includes horizontal com- Delmastro [10] tested some of the predictions
ponents, such as the number of different jobs or of economic theory (a recent conclusion could be
branches. A vertical component means the number found in [11]) on organizational architecture by
of levels of authority. looking at the relation between the depth of the
On the basis of research in Japanese manufac- management hierarchy of plants and plant and
turing firms, Marsh and Mannari [7] concluded that industry-specific variables in 438 Italian manu-
results for a cross-sectional relationship of organi- facturing plants. “The findings show that the plant
zational size-structure are different from those ob- size, the characteristics (i.e. vintage, and extent of
tained by longitudinal analysis. In Japanese manu- use) of the production and communication tech-
facturing firms, the changes in administrative inten- nology in use, the plant’s ownership status (i.e.
sity in declining size organizations are not simply State versus private ownership, and differences
the mirror image of what happens to personnel in the nationality of firms to which plants belong)
components in growing organizations. They call it figure prominently in explaining the complexity
the ratchet effect by which the number of manag- of a plant’s organization.”
ers increases more rapidly in growing organizations Gareth [12] argues that there is an interdepen-
than decreases in declining size organizations. dence between the number of employees in an en-
Blunt and Jones [8], based on empirical stud- terprise and the number of hierarchy levels, where
ies, found a strong positive correlation between it was found that:
ber of employees as a basic criterion of firm size, which we can test the effects of several parameters
but other criteria were also taken into account, and on the change of a particular parameter of organi-
those are total turnover and total assets. zational structure.
In determining the number of hierarchy levels In a previous investigation [2] it was indicated
in the macro-organizational structure of the ob- that in a transitional economy inflexibility of large
served firm, the following procedure was applied: size companies comes to the fore. In this regard, we
– hierarchy levels in the organizational have extended the previous investigation to point
structure of a particular firm were numbered out that firms should implement organizational ad-
starting from the top of the macro- justment to the conditions of business operations in
organizational structure, the transitional economy. The sample was expanded
– number of hierarchy levels in the department/ to 100 Serbian firms, the primary factor not being
division, where the hierarchy is highest i.e. the large size firm and its dealing with metalwork-
“deepest”, was taken as a representative of ing, but that the firm is of a manufacturing profile
the number of hierarchy levels of the macro- and successful in business operations, i.e. that there
organizational structure in a particular firm. exists s rising trend in profit rate. Consequently, the
sample of firms was not defined in a random man-
Span of control as a parameter by which we de- ner, but the Chamber of Commerce was asked for
scribe the organizational structure of a particular data on more than 100 of the most successful firms
firm, was considered as follows: in the previous period irrespective of their size and
– on the first hierarchy level in the organizational manufacturing orientation. Data on income size, in-
structure of the observed firm, depending come growth for each period 03/04, 04/05, 05/06,
on the type of organizational structure i.e. 06/07, 07/08 and 08/09 were available for each firm
horizontal differentiation principle where from the Republic Agency for Development, Bel-
there are departments, divisions and the grade Stock Exchange and the Republic Institute
like, while span of control was considered for Development. The aim of thus set up research
as the number of those organizational units was to obtain information about the model of or-
– departments, divisions etc. ganizational structure adjustment in successfully
operating firms, i.e. firms that have a defined de-
The characteristics of the proposed model for velopment strategy and proved to be successful in a
investigating the changes in organizational struc- transitional economy.
tures in manufacturing firms in transitional condi- The concept underlying the research is found in
tions, which affect the model recognition level are the hypotheses as follows:
as follows: – There is a high dependence between change
– investigation was conducted on a sample of of organizational structure parameters and
100 manufacturing firms, change of profit rate in firms operating
– investigation is a longitudinal study, which successfully in a transitional economy.
may generate different results in the case – There is a high positive correlation between
when investigations are cross-sectional. change of profit rate and per cent of change
– span of control was taken at the first in the span of control in firms operating
hierarchy level in the macro-organizational successfully in a transitional economy.
structure of the observed firms, but not as a – There is a higher is correlation between change
mean value of span in all superior-inferior of profit rate and the studied parameters of
relations, which indicates that the result thus organizational structure than between number
obtained is a horizontal differentiation level. of employees and the studied parameters of
organizational structure.
In the choice of method for testing the obtained
data a correlation analysis will be applied to test The first hypothesis set should indicate if there
interdependence among the studied parameters is dependence between change of profit rate and
and multiple regression as a statistical method by per cent of change in organizational structure pa-
rameters, which shows the organizational adjust- served period. It should be pointed out that chang-
ment level relative to changed business operating es were calculated in this case for the first and last
conditions. If this hypothesis is confirmed, it is of observed years (2003 and 2009). In the remaining
importance to find out whether in successful firms cases, changes in the observed parameters were
operating in transitional conditions there exists the monitored for two successive years each.
trend of flatness shaping in organizational struc-
ture, i.e. if a rising trend in profit rate entails the
reduction of the number of hierarchical levels and
the expansion of the span of control.
3. Findings
The diagram below, Figure 1, shows changes
in the number of employees in 100 manufacturing
firms followed up through the period 2003-2009. Figure 2. Changes in profit rate for the period
The diagram shows that during the observed pe- 2003-2009
riod the number of employees in the observed
manufacturing firms had a trend of growth. By expanding the correlation analysis with the
parameters of organizational structure, such as the
per cent of change in the number of hierarchical lev-
els and the per cent of change in the span of control,
we obtained a high correlation coefficient between
some parameters but with a different proportional
relationship.
Table 1 shows the results obtained by applying a
correlation analysis between profit rate and organiza-
tional parameters. A positive relationship exists be-
tween profit rate and per cent of change in the num-
ber of employees and per cent of change in the span
Figure 1. Changes in the number of employees
of control, and a negative relationship exists between
for the period 2003-2009
profit rate and per cent of change in the number of
hierarchical levels. This indicates that the observed
Figure 2 shows changes in profit rate in 100
manufacturing firms adapt to a business environment
manufacturing firms followed up through the pe-
by decreasing the number of hierarchical levels and
riod 2003-2009. The diagram shows that during
expanding the span of control by employing new
the observed period the observed manufacturing
workers in order to increase profitability.
firms had a growing trend in profit rate.
A high regression coefficient (0.87) indicates
The correlation coefficient between the change
that a variation of organizational parameters has a
oin profit rate and the percent of change in the
significant influence on the potential financial re-
number of employees amounts to 0.69 for the ob-
sults of the manufacturing firm.
Table 2. Multiple regression between relevant hierarchical levels than for number of employees/
number of hierarchical levels. The results of the
factors ( DP i j (%) and DB N i j (%) , DRM i j (%) )
investigations lead to the conclusion that the hy-
Regression Statistics potheses are confirmed. There is a higher corre-
Multiple R 0,880401 lation level between the change in the profit rate
R Square 0,775105 and studied organizational parameters compared
Adjusted R Square 0,770468 to the correlation coefficients between the change
Standard Error 5,008073 in the number of employees and the studied or-
Observations 100 ganizational parameters indicates a more efficient
redistribution of work tasks, increased efficiency
Table 2 shows the results obtained by applying of work due to contemporary technologies imple-
multiple regression analysis between profit rate mentation in compliance with a change in profit
and organizational parameters. A high regression rate. It is interesting that the level of dependence
coefficient (0.88) indicates that a variation of or- between change in profit rate and organizational
ganizational parameters has a significant influence parameters is higher than that between change
on the profit rate of a manufacturing firm. in profit rate and the number of employees. The
Table 3 shows the results obtained by applying results obtained by multiple regression analysis
multiple regression analysis between the per cent have just confirmed the starting assumptions from
of change in the number of employees and organi- the hypotheses. There are high regression coeffi-
zational parameters. A high regression coefficient cients between the summative impact of change in
(0.79) indicates a significant relationship between the studied parameters of organizational structure
the number of employees and the organizational and change in profit.
parameters of a manufacturing firm. There are rate (0.88), i.e. between the summa-
Table 3. Multiple regression between relevant tive impact of change in organizational structure
factors ( DBZ i j (%) and DB N i j (%) , DRM i j (%) ) parameters and the change in the number of em-
Regression Statistics ployees, the dependence being more pronounced
Multiple R 0,796505
in the former case (0.79).
R Square 0,63442
Adjusted R Square 0,626883 5. Conclusion
Standard Error 0,051104
Observations 100 The paper presents an investigation of the in-
terdependence between profit rate, number of
employees and organizational structure param-
4. Discussion
eters in manufacturing companies with a rising
The results show that a trend of flatness is trend in profit rate over a longer period of time
present in shaping the organizational structure (2003-2009) under conditions of doing business
pyramid, which means that there is a trend of de- in a transitional economy. All firms comprised in
creasing the number of hierarchical levels and of the sample are doing business in the same region
expanding the span of control in manufacturing under identical economic conditions, have a man-
firms doing business in a transitional economy. ufacturing orientation and a rising trend in profit
Also, the results show a high positive correlation rate during the observed period.
between profit rate and a change in the span of Results have shown that the relationship profit
control, and between number of employees/span rate-organizational structure is an important com-
of control, the coefficient of the correlation being ponent in the process of manufacturing firms’ ad-
higher for profit rate/span of control than for num- justment to the dynamic environment. In changing
ber of employees/span of control. There is also a conditions of economic operations, span of control
high negative dependence between number of em- is a parameter of organizational potentials by adapta-
ployees/number of hierarchical levels, this depen- tion of which the firm can respond faster to changes
dence being again higher for profit rate/number of in the region. Also, results obtained by the research
indicate that there is a higher dependence between 10. Delmastro M. “The determinants of the manage-
change in profit rate and change in the observed or- ment hierarchy: evidence from Italian plants”,
International Journal of Industrial Organization,
ganizational parameters than between change in the
2002; 20( 1): pp 119-137.
number of employees and change in the observed
organizational structure parameters, which is op- 11. Milanovic Lj.D., Milanovic D.D, Misita M., Klarin
posite to the belief that size-structure is dominant M., and Zunjic A. “Universal equation for the rela-
relationship. Results indicate that relationship profit tive change in profit of manufacturing company“,
Production Planning & Control, 2010; 21( 8): pp
rate-organizational structure becomes a predomi- 751-759.
nant component which is in line with the global aim
of a business manufacturing firm and reason for ad- 12. Gareth R.J. Organizational Theory, 4thed., Prentice
aptation to a dynamic business environment. The Hall,USA: 2004.
presented investigation indicates that in transitional
economies manufacturing companies, irrespective Corresponding author
of their size, should harmonize the parameters of Miladin Stefanovic,
organizational structure with the trend in profit rate The Faculty of Mechanical Engineering, University
along with shaping the flatness of an organizational of Kragujevac,
pyramid and an increase in employee efficiency. Serbia,
E-mail: miladin@kg.ac.rs
References
1. Aulakh S.P., Kotabe M.”Istitutional changes and
organizational transformation in developing econo-
mies”, Journal of International Management, 2008;
14: pp. 209-216.
By tradition, design bureaus in former Yugosla- eration of a grid model is much easier to program
via are well equipped with software solutions for than that of a TIN model. But, for subsequent geo-
road design. Taking into account the fact the Eu- metrical analyses, the TIN model is much simpler
ropean design tradition imposes very demanding to work with. In fact, each triangular facet is a part
technical documentation (meticulous grading plans of a simple plane (as the three triangle’s vertices
for crossroads and other planar facilities, detailed define the perfect plane), while the grid cell is a
cross sections, specific superelevation concepts for part of a curved (twisted) surface. Since the cut-
pavement surfaces and pavement layers etc.) many ting of the longitudinal profiles and cross sections,
bureaus developed their own software solutions. volume calculations and other geometrical analy-
The years of crises and wars, during which it was ses are much easier to program on simple trian-
hard to adequately validate the engineering profes- gular facets, even when we are given grid terrain
sion, encouraged many young engineers to turn to models, we “explode” them into triangles. In fact,
software development instead. Thus, at any level each “twisted” grid cell (defined with four points)
of planning or design (master planning, conceptual could be easily exploded into two triangles (each
design, preliminary design, or construction draw- one defined with three points).
ings), almost every element of the airside (runway,
taxiway, holding bay or apron) is well supported
with adequate software solutions, yet these soft-
ware solutions were primarily intended for roads.
Of course, there are many features that are specific
to airports only: aircraft parking modules, fillets (in-
ner taxiway edges at curves) etc. But, even these el-
ements are covered with several domestic software
solutions. All in all, only the early stages of airport
location studies, dealing with the approaches and
general terrain limitations, are not adequately cov-
ered with the specific software tools. And that is
what this particular article is about: how to resolve Figure 2. TIN terrain model
problems in runway/approach orientation by using
software tools for general geometrical analyses de-
veloped for road design.
and the existing surface). At the location of each covered, the scale of Type B map and the sole pur-
node (from both triangulated surfaces) the differ- pose of these isopachytes, the interval of 50m was
ence between the two surfaces is measured and the adopted (Figure 10).
new point, having the elevation equal to that differ-
ence, is set at this position. The TIN model gener-
ated from these new points represent the thickness
between the two surfaces. On grading projects, the
model is negative in cut areas and positive in areas
to be filled. Contours generated from such a TIN
model are isopachytes (Figure 9) [10].
As the isopachytes resemble the general mor- are parts of the planes, it is very easy to develop
phology of the terrain, the picture of the terrain the software tool which incrementally moves the
penetration extent becomes quite clear. When one imaginary horizontal plane upwards, intersecting
of the two surfaces to be compared is rather flat, this plane with the models’ triangles [5], [10] . The
then the general flow of the isopachytes resembles set of straight intersecting lines generated at each
the contours of the opposing surface. incremental elevation presents contours (at a par-
Though aware of the value of the isopachytes on ticular elevation). A serious numerical problem is
grading projects, in some cases we were not thor- not to generate intersecting lines at each incremen-
oughly satisfied with their application. When the tal elevation, but to connect these scattered lines in
first author of this article was engaged on a dredg- continuous (open or closed) chains that can be fur-
ing plan for Kuwait harbor, the isopachytes gener- ther splined, in order to produce smooth contours.
ated between the existing and the proposed bottom In fact, contours generated from obstacle limitation
of the harbor were hard to follow even for the eye surfaces could be left unsplined.
of the professional. This happens whenever the
vertical differences between the two surfaces are
relatively small and when the surfaces frequently
change sides in the vertical sense (between cut and
fill). Even when there is no vertical change in sides,
the isopachytes may produce quite a vague picture.
The first author of this article also recalls the proj-
ect of a landfill in Switzerland, when large quanti-
ties of material excavated from the tunnel had to
be disposed of in a valley. Though there was only
a fill to depict (no cut), the undulated valley bot-
tom caused rather irregular shapes of the isopach-
ytes. Anyway, while the isopachytes may produce a Figure 11. Contours generated from the obstacle
graphical “nightmare” on simple grading and resur- limitation surfaces
facing projects, their shapes are nice when applied
on the differences between the terrain surface and
the obstacle limitation surfaces surrounding the air-
port. In this case, obstacle limitation surfaces make
the unique surface that is a flat one and to make the
picture even clearer, only the ishopachytes in the
areas where the terrain is higher than the obstacle
limitation surfaces, are needed. Thus, if assigned a
similar project in the future, we will surely be using
isopachytes again, as no set of cross sections con-
tains more (and more readable) data than a single
plan with the isopachytes.
Contours generated from the obstacle limitation
surfaces are always welcome. In plan projection Figure 12. Aerodrome Obstruction Chart – Type A
they give a general three-dimensional picture of
the entire assembly of obstacle limitation surfaces. 5. Profiles of obstacles
In municipality plans they impose vertical limits
on the structures planned in the area surrounding The Aerodrome Obstruction Chart – Type A is a
the airport. With the triangulated 3D model of the combination of plan and profile projection (Figure
obstacle limitation surfaces completed, it is excep- 12). In the lower part of the document there is a rel-
tionally easy to generate contours from such a mod- atively narrow plan depicting the approach surface,
el (Figure 11). Bearing in mind that the triangles with all the obstacles marked with the symbols pro-
up. Then, the lines of sight (half the length of the the application of the isopachytes for the terrain
runway long) are drawn between the points of the penetration analyses and with the use of the clouds
copied alignment. If no intersection with the ac- of points for the creation of shadow profiles.
tual vertical alignment of the runway exists, then
the available sight distance is satisfactory. References
1. ICAO Airport Planning Manual – Part 1., Montreal,
1987.
neering, especially Model-based User Interface De- A form generator should enable easy addition
sign. However, unlike that of other domains,Web of new forms for different user channels: web
Engineering endeavors are seen as distinct from forms, MIDP (Mobile Information Device Profile)
general Software Engineering projects [5], [6]. [12], etc. Such generator should fulfill the follow-
ing conditions:
– should shorten the complete cycle of form
generation: from process analysis, over
static forms to dynamic forms in the end,
– should shorten the time needed for
implementation of the service layer for form
data processing,
– should generate code which guarantees the
consistency and formal compliance of the
business form design and business rules
specification.
Figure 1. Tax payer registration form Forms generator, based on a formal description
of form attributes, generates components of the
In this paper we present an automated forms user interface for web channels, API of the service
generator. More precisely, we describe key points layer, business logic, data access objects (DAO)
which forms generator should fulfil. Main focus of and a base for form components, as shown in Fig-
this paper is to describe Model-Driven automated ure 2. Generator should be able to execute the fol-
form filling, along with localized server-side vali- lowing services:
dation error messages. Although idea of automat- – reaction to user actions related to adding of
ed generation of resulting forms from XML de- the new forms, as well as changes, deletion
scription, using XSLT transformations, is not new and archiving of the existing forms,
[7], [8], it is new in a context of XForms - based – generation of service API for support of user
applications. Clean separation of model from vi- interface for different channels.
sual forms components, makes XForms ideal can-
didate for forms development.
Form description (model, navigation, rules and
calculations), can be utilized in one of following
manner, or by their combination: 1) AutoWeb Sys-
tem, based on HDM-lite language – a variant of the
Web design language HDM, proposed by Fraternali
and Paolini [9] allowing the automatic generation
of data-intensive Web sites. 2) Custom Documents
Metadata Repository used for registration of meta- Figure 2. Conceptual model of the Form Generator
data of business documents of the system and their outcome
mapping to system mechanisms. One of its com-
ponents, UI screens model, describes form fields, Components generated by form generator,
actions and validation rules using database entries should be able to perform the following actions:
and presentational metadata are generated along – reaction to user actions,
with specialized tables for the data described by the – form validation and generation of error reports,
conceptual model, in similar manner as [9]. In both – processing of submitted form, in case of
cases, information is used by a runtime environ- successful validation.
ment to generate Web forms dynamically. 3) Using
UML and ER notations, in a fashion similar to one Form description is defined by using XML tech-
used by Executable UML [10] and [11]. nologies, and in this case, based on the XForms 1.1
specification [13]. A system that would use such In its structure and usage, forms generator is not
generator should enable gathering data from a set intended to be similar to any other ”heavy” plat-
of predefined data sources. Transformation scripts form as for example Oracle Forms [15]. From us-
would also be defined for the purpose of filling the ability stand, platform preceding forms generation
form with the data from the data sources. It is pos- should enable visual creation of XForms forms:
sible to use standardized and well documented tech- – Creation of visual appearance of the forms
nologies to describe transformations (XSLT [14]). by simple drag-and-drop of the controls of
In the context of tax return workflow, for example, it the user interface.
is possible to define business rules for the server side – Possibility to import a predefined XML
(targeting Java / Spring business layer and Spring schema, generate and create an XML model
/ JSP UI components) and the client side alike. All defined by it, as well as, bind model with the
rules are an integral part of the business flow event controls of the user interface.
and can operate over the form data model and data – Definition of model item properties, through
model from the data source. It is possible to define which it is possible to specify visibility,
the following actions on the client side: accessibility and other constraints in the
– calculation of the co-dependent values of model.
the form based on the entered data – Definition of calculation expressions.
– demanding additional data from the server – Definition of different strategies for
side based on user’s entry, displaying errors in case the server side
– defining a list of values for, so called, look- validation was unsuccessful, after form data
up form fields (e.g. a data choice from a submission, using an event handler or in
dropdown menu of predefined values), some other way.
– definition of user interface control types, – Possibility of form deployment to the server,
– enabling / disabling a field based on user’s thus enabling quick check of the visual
entry or from the server side data, appearance of the form,
– hiding / showing fields based on user’s entry – Calculation and validation.
or from the server side data. – Possibility of form archiving.
It is possible to define the following actions on Finally, we practically tested form generator for
the server side: different kinds of forms. The most comprehensive
– pre-population of the form data model using were forms for tax payer registration. Such forms
the server side data sources represent ideal example for testing and presenta-
– extraction of the data from the form data tion because they are composed of numerous parts
model and generation of system services with over two hundreds input fields, containing a
calls based on user’s actions. lot of client side validation and calculation rules.
is rendered - for one form definition it is possible element is usually placed inside <head> element
to define different so called XForms processors of XHTML document (the part of the document
for different types of devices, like PDA, mobile that has no visual representation).
phones, etc. Also, with XForms the need for Ja- The model instance is defined using <in-
vaScript is drastically reduced. stance> element, as a child of the <model>
According to [13], [17] and [18], by using element. Data in the model can be used for defin-
XForms, form is divided into three main layers: ing initial form data, and they can be changed as
–– Instance, which contains only form data, well through the user interface controls to which
without any description of presentation layer they are bound to.
or validation. Instance is used for storing The Model Item Properties are defined using
and sending of data between user and server. <bind> element. For example, if model instance
It is defined in form of XML segment inside in tax registration form is registration-
a containing document, or as an external Form-instance, then it makes sense to define
XML entity which is then referenced using following constraints:
XLink [19]. – registration number must be eight digits
–– Model, which contains instances along with positive integer, required for input
various validation definitions, constraints, <xf:bind nodeset=”/registrationForm-in-
calculations and necessary meta-data which stance/registrationNumber”
required=”true()”
are used to define communication with the id=”registrationNumber”
Web server. Validation can use associated constraint=”. castable as
XML schema. Constraints and calculations xs:positiveInteger and string-length(.)
are defined using XPath 1.0 language [20]. = 8” />
–– User interface composed of various types
of controls, which are used to define the – In case the company, that is being registered
appearance and relations to a model instance as a tax payer, is selected to be a partner
(so called binding). This layer also includes company, it is obligatory to specify the
advanced functionalities, like repeating of number of partners
controls, dynamic bindings of user interface <xf:bind nodeset=”/registrationForm-in-
stance/numberOfPartners”
controls, etc. required=”/registrationForm/
partnerCompany=’true’”
XForms is not a free-standing document type, readonly=”/registrationForm/
instead it is designed to be a part of some other partnerCompany=’false’”
XML-based language, like XHTML, Synchro- id=”numberOfPartners”
constraint=”(/registrationForm-in-
nised Multimedia Integration Language (SMIL) stance/partnerCompany=’true’
[21] or Scalable Vector Graphics (SVG) [22]. and string-length(.) > 0
and . castable as xs:positiveInteger)
or
2.1 Model (not(/registrationForm-instance/
partnerCompany=’true’)
Model in XForms describes what form repre- and string-length(.) = 0)” />
sents and which data it contains. It is defined with
<model> element, containing data about model Attribute ”constraint” specifies a predicate that
instances, along with associated constraints. Con- needs to be satisfied for the associated instance
straints on XML instance can be static, expressed data node to be considered valid [13]. The value
through the XML Schema [23] suitable for defi- of this attribute is XPath logical expression.
nition when the rules are not changed during the XForms model also contains one or more
user’s interaction. On the other side, the model can <submission> elements for data submission,
include so called Model Item Properties - dynamic used to define information about what is sent,
constraints or calculations defined using XPath, where is it sent to and how.
and evaluated by XForms processor. The model
Figure 4. Processing XSLT transformation and inserting model instance into XForms form flow
code(s). This kind of approach does not of errors or errors with defined attribute ’path’,
burden XForms processor and does not whose value has been adjusted to contain the ab-
make the form more complex. Moreover, solute path to the invalid model node for easier
it is necessary to add model item properties matching with the value of the ’ref’ attribute of the
to the generated fragment, in order to mark corresponding user interface control). The content
the invalid model nodes to the processor. of such container elements is copied by applying a
This causes dispatching of the xforms- template with name ’copyError’.
invalid event to the related controls. <xsl:template name=”copyErrors”
match=”err:errors” mode=”copy-errors” >
<xsl:param name=”modelRootName”
In case that there are errors, the XML docu- required=”yes” />
ment with model instance, passed as an argument <xsl:element name=”{local-name()}”>
to the XSLT transformation, contains: form model <xsl:apply-templates mode=”copy-er-
instance and instance with the errors, both within rors”>
a <bind> element. This model is more appropri- <xsl:with-param name=”modelRootName”
select=”$modelRootName” />
ate for processor handling than the model where </xsl:apply-templates>
instances are defined separately. At the same time, </xsl:element>
errors element is part of namespace with the ’err’ </xsl:template>
prefix; model instance sent from the form does <xsl:template name=”copyErrorWithPath”
not belong to any namespace, while the remaining match=”err:errorGroup |
err:error[@path]” mode=”copy-errors”>
elements belong to the namespace with the ’bnd’ <xsl:param name=”modelRootName”
prefix. Document with errors is inserted through required=”yes” />
transformation as one of the instances of the form <xsl:element name=”{local-name()}”>
model. Part of the XSLT transformation, that per- <xsl:attribute name=”path”
forms insertion of the error model instance, called select=”xslext:getAbsolutePath($m
odelRootName, @path)” />
when there are errors in server, has XML docu- <xsl:apply-templates mode=”copy-er-
ment with the model instance as a parameter, and rors” />
it is divided into three parts: </xsl:element>
The first part of the template named ’inser- </xsl:template>
tErrors’ adds ’error-instance’ instance to the <xsl:template name=”copyError”
match=”err:*” mode=”copy-errors”>
form. XForms instances must not belong to any <xsl:element name=”{local-name()}”>
namespace, and since in XHTML forms there is <xsl:copy-of select=”@*” />
usually a default namespace (xmlns=”http:// <xsl:apply-templates mode=”copy-er-
www.w3.org/1999/xhtml”), it is necessary rors” />
to assign xmlns=”” next to the model instance. </xsl:element>
<xf:instance xmlns=”” id=”error-in- </xsl:template>
stance”>
<xsl:apply-templates By executing transformation, an instance with
select=”$modelDocument/bnd:bind/ errors is created, similar to the starting XML doc-
err:errors” mode=”copy-errors” > ument with errors, but with namespace removed
<xsl:with-param name=”modelRootName”
select=”name($modelDocument/bnd:bind/ and paths replaced by absolute ones.
bnd:model/*)” /> The second part of the template is related to no-
</xsl:apply-templates> tifying XForms processor about the user interface
</xf:instance> controls bound to invalid model nodes. This is
achieved by adding model item properties through
From ’insertErrors’ template, two other tem- transformation for every node having a reported
plates are applied. The first one inserts root ele- error. Nodes of the model, marked as invalid, are
ment ’errors’, without namespace (i.e. with local matched with errors by absolute path.
name), by applying function local-name(). <xsl:for-each select=”$modelDocument/
The second generates ’container’ elements (groups bnd:bind/err:errors/err:errorGroup
$modelDocument/bnd:bind/err:errors/
err:error[@path]”> /errorGroup[@path=’/registrationForm/
<xsl:variable name=”modelRootName” fullName’]) = 0” />
as=”xs:string”
select=”name($modelDocument/bnd:bind/ Model item properties are calculated and
bnd:model/*)” />
<xsl:variable checked on every change of the form state. As
name=”absolutePath” as=”xs:string” sending form data is disabled, as long as the form
select=”xslext:getModelRootAbsolutePath is invalid, it’s necessary to erase the error instance,
($modelRootName, @path)” /> so that constraints defined by added model item
<xf:bind nodeset=”{$absolutePath}” properties will be satisfied. This is achieved by
constraint=”count(instance(‘error-
instance’) adding an event handler for the xforms-sub-
/error[@path=’{$absolutePath}’]) = 0 mit event, to xf:submission control:
and <xf:delete ev:event=”xforms-submit”
count(instance(‘error-instance’) nodeset=”instance(error-instance)/*” />
/errorGroup[@path=’{$absolutePath}’])
= 0” /> Such handler removes the error instance from
</xsl:for-each> the model, causing the logical expression in the
constraint definition to be evaluated into value
Using transformation, every error grouping el- ”true”. In that way the form is marked as valid and
ement and every basic error type with ’path’ attri- its submitting is enabled.
bute, adds one model item property, with the fol- The third part of the template is related to the er-
lowing constraint: ror display itself. Template copies all user interface
count(instance(‘error-instance’)/er-
ror [@path=’{$absolutePath}’]) = 0 controls and checks if there are reported errors on
and the model node bound to current control with ’ref’
count(instance(‘error-instance’)/er- attribute. Matching is performed by comparing the
rorGroup[@path=’{$absolutePath}’]) = 0 value of the control’s ’ref’ attribute with the value
of error or errorGroup element’s ’path’ attri-
Such constraint checks whether there are re- bute. If such errors exist, an XHTML fragment is in-
ported errors on specific node set. Using added serted through transformation (in this case a <div>
model item properties, XForms processor is sig- element with certain style). Using xf:repeat
naled about invalid model nodes. For such nodes XForms element, nodes of the error instance, cor-
the processor will fire an xforms-invalid responding to the current user interface control, are
event on the related user interface controls. For iterated through and for each of them the content of
example, if there are reported errors for a regis- their message element, representing a localized
tration number and full company name, two fol- error message, is displayed.
lowing model item properties will be inserted by <xsl:template name=”copyControl”
transformation: match=”xf:input |
<xf:bind nodeset=”/registrationForm/ xf:textArea | xf:range |
registrationNumber” constraint=” xf:select | xf:select1 | xf:secret”>
count(instance(‘error-instance’) <xsl:call-template name=”copyAny” />
/error[@path=’/registrationForm/ <xsl:variable name=”path”
registrationNumber’]) = 0 as=”xs:string”>
and <xsl:value-of separator=”/”>
count(instance(‘error-instance’) <xsl:sequence
/errorGroup[@path=’/registrationForm/ select=”ancestor::xf:group/@ref” />
registrationNumber’]) = 0” /> <xsl:sequence select=”@ref” />
<xf:bind nodeset=”/registrationForm/ </xsl:value-of>
fullName” constraint=” </xsl:variable>
count(instance(‘error-instance’) <div class=”msg-error” xmlns=”http://
/error[@path=’/registrationForm/ www.w3.org/1999/xhtml”>
fullName’]) = 0 <xf:repeat nodeset=”instance(‘error-
and instance’)/error[@path=’{$path}’]
count(instance(‘error-instance’) |
2. Girgensohn A., and Lee A. Seamless integration of 17. Dubinko M. XForms Essentials. O’Reilly, 2003.
interactive forms into the Web Computer Networks
and ISDN Systems, 1997; 29: pp 1531–1542. 18. Honkala M. and Vuorimaa P. XForms in X-Smiles.
Journal of World Wide Web, Internet and Web In-
3. Lovreković Z., Sukić Ć., Šabanović M., Desktop, web formation Systems, Kluwer, 2001; 4( 3).
and web2.0 application comparing on the aspect of
the realisation possibility the complex user interface, 19. XML Linking Language (XLink) Version 1.0 W3C
TTEM-Technics Technolologies Education Manage- Recommendation at http://www.w3.org/TR/xlink/,
ment, ISSN 1840-1503, 2010; 5( 4): pp. 678-688. 2001
4. Gitzel R., Korthaus A. and Schader M. Using 20. XML Path Language (XPath) Version 1.0 W3C Rec-
established Web Engineering knowledge in model– ommendation at http://www.w3.org/TR/xpath/, 1999.
driven approaches Science of Computer Program-
ming, 2007; 66: pp 105–124. 21. Synchronized Multimedia Integration Language
(SMIL 2.0) W3C Recommendation at http://www.
5. Glass R. Some heresy regarding Software Engineer- w3.org/TR/SMIL2/, 2001.
ing IEEE Software, (July/August) 2004.
22. Scalable Vector Graphics (SVG) 1.1 W3C Recom-
6. Deshpande Y. and Hansen S. Web Engineering: Cre- mendation at http://www.w3.org/TR/SVG/, 2011.
ating a discipline among disciplines IEEE MultiMe-
dia . April, 2001; 82-87. 23. XML Schema W3C Recommendation at http://www.
w3.org/TR/xmlschema-0/, 2004.
7. Maverick MVC framework at http://mav.sourceforge.
net/, (accessed June 2012). 24. Raman T. V. XForms: XML Powered Web Forms.
Addison Wesley, 2003.
8. Apache Software Foundation: The Apache Cocoon
Project at http://cocoon.apache.org/, accessed June 25. Johnson R. Expert One-on-One Design and Devel-
2012. opment Wrox Press, 2003.
12. Java Platform Micro Edition, J2ME at http://www. 32. XML Process Definition Language - XPDL at
oracle.com/technetwork/java/javame/index.html. http://www.wfmc.org/xpdl.html.
13. XForms 1.1 W3C Recommendation at http://www. 33. Oh S. et al. An Effective Role Administration Model
w3.org/TR/xforms11/, 2009. Using Organization Structure. ACM Transactions
on Information and System Security, May 2006;
14. XSLT Version 2.0 W3C Recommendation at http:// 9(2): 113–137.
www.w3.org/TR/xslt20, 1999.
Corresponding Author
15. Oracle Forms at http://www.oracle.com/technet- Andrija Jandrlic,
work/developer-tools/forms/overview/index.html/, Faculty of Mechanical Engineering,
accessed June 2012. Belgrade,
Serbia,
16. Honkala M. Web User Interaction a Declarative E-mail: ajandrlic@mas.bg.ac.rs
Approach Based on XForms. Ph.D. thesis, Helsinki
University of Technology, 2006
∞
t t 3.1. Fullbridge inverter simulation results
x(t ) = ∑ a n cos 2π n + b n s i n 2 π n
n =0 T T
T
2 t
an =
T0∫ x(t ) c o s 2 π n d t
T
T
2 t
T ∫0
bn= x (t ) 2 π n d t
T
2π ∞
X = k = ∑ x[n]e − j 2 π k n / N , k = 0,1,2,..., N − 1
N n= x Figure 6. Voltage waveform on the fullbridge
inverter
numerical analysis can be applied with built in
Matlab FFT functions. With mathematical formu- Voltage waweform clearly shows number of
lation FFT analysis could be done using parallel triggers created by semiconductors in order to rec-
computing or computing cluster speeding up in- reate near sinusoidal waweform.
dependent calculations within application of the
executable code or creating large scale cumulative
analysis in systems consisting of higher of vari-
able sources such as wind farms. It is necessary
to implement such speed optimizations in order
to evaluate any physical component in given cir-
cuitry which results in significantly large samples
in every component output. Within this simulation
recorded waveforms have been captured at the
outputs of the semiconductor devices. Values are
recorded for the output voltage and current. In the
analysis, due to sample size, it is possible to ana-
lyze only one period of signal due to its periodic
character, discarding the initial transient effects.
Figure 7. Harmonic analysis of first 50 harmon-
3. Simulation results ics of voltage
Several IEEE and IEC standards which target
It is clear that higher harmonics are evident and
electromagnetic compatibility problems define
in consideration of power quality standards there
maximum allowed interference up to first 50 har-
are components that need attention.
monics for different classes of devices. The simula-
Analyzing the frequencies in targeted 2.4 GHz
tion results in his analysis will also include frequen-
range, it is evident that 3∙10-5 amplitude of initial am-
cy range up to 3 kHz.[9] Due to large number of
plitude of voltage at power system base frequency.
harmonics analyzed and a density of visualization
Current waweform created by semiconductors
graph it was feasible to visualize targeted range of
in order to recreate near sinusoidal waweform, is
2.3-2.45 GHz only which is presented in the paper.
singificant in far field analysis. It clearly shows the
effects of semiconductor triggering.
I ⋅ d ⋅ l ⋅ sin q
dHΦ= (1 + g ⋅ r ) e − g ⋅r
4⋅π⋅r2
d Er =
I ⋅ d ⋅ l ⋅ s i nq 2 cos q
4 ⋅ π ⋅ jwro
⋅
r3
[
(1 + g r )e − g r ]
Figure 10. Harmonic analysis of first 50
d Eq =
I ⋅ d ⋅ l ⋅ s i nq s i nq
[
⋅ 2 (1 + g r + ( g r ) 2 e − g r ]
harmonics of current 4 ⋅ π ⋅ jw r o r
IDS e − g ⋅r
H q ≅ w2 s i nq
4πC 2 r
Z w IDS e − g ⋅r
l 〈 〈 r → Ej ≅ w2 s i nq
4πC 2 r
mo
Zw =
eo
2
2 π DS
Wr = Rr I Rr = Z w
2 l
4. Measurements
Measurements have been conducted at the roof
of solar plant at the main inverter cumulative out- Figure 15. Results of 4 open area EMC measure-
put distribution point. Distance selected for the ment at 2.4 GHz
radiated measurements were 0.25 m, 3m and 10m.
According to the measurement such low intensi- Table 1. ERC recommendation 70-03 relating to
ty radiation on the powerlines could not be detected the use of short range devices (SRD) within 2.4
at tested distances, due to relatively small current at GHz range
the base frequency of the grid. Initial measurements Freq. range Power
were made using AARONIA SPECTRAN HF- Typical usage
(MHz) output
4060 Rev.3 Spectrum Analyzer (100Mhz-6GHz). Low Power Active Medical
Control measurements were created with a AGILE- 10 dBm
2483.5 – 2500 Implants and
NT 9320A RF Spectrum Analyzer (9 kHz - 3 GHz). e.i.r.p
associated peripherals
10 mW Telemetry,Telecommand,
2400.0-2483.5
5. Conclusion e.i.r.p. Alarms and Data in general
Wideband Data
Considering fundamentals of electromagnetic Transmission
compatibility (EMC), there are no significant dif- 100 mW Systems and Wireless
ferences between communication systems and 2400.0-2483.5
e.i.r.p. Access Systems including
power electronic based devices. From EMI point Radio Local Area Networks
of view the switching frequency in an electrical (WAS/RLANs)
system is much lower than in a communication Automatic vehicle
system, but with much higher operation voltage, identification systems
current, and power. However, from an application 2446-2454 500 mW for railways including
point of view, the electromagnetic Interference e.i.r.p. Automatic Vehicle
(EMI) problem in power devices is very different Identification for Railways
in a view of normal operation and desired effects. (AVI)
EMI problems can manifest themselves as errors SRD radiodetermination
or failures toward other equipment working with applications including SRD
25 mW
low power communications. 2400.0-2483.5 radar systems, Equipment
e.i.r.p.
During diagnostics other hardware or software for Detecting Movement
problems may be suspected and investigated which and Alert
are typical for usage of this type of communication ≤500 mW
Radio frequency
devices and the wideness of its public usage. 2446-2454 – 4W
identification (RFID)
Considering effects with parasitic inductance and e.i.r.p.
capacitance in the circuit’s emissions can be signifi-
cant to bring communication systems to a halt if sig- Due to power saving features typical usage usu-
nificant power can be emitted near receivers. ally starts from 1mW (class 3 Bluetooth). Although
This problem becomes more obvious consider- power emission in case of 150 kVA power plant
ing current trends of electrical drivetrain in automo- is not detectable with commercial communica-
tive industries, renewable resource popularity with tions measurement equipment (EMC frequency
grid integrations, as well as reduction of power in analyzer) due to low values expected to be found
the mobile devices, wireless networks, home en- at this frequency. Unnfortonatelly, considering that
tertainment and control, wireless sensor networks, currents in solar grid tied systems ranging from 20
medical data collection, building automation and A up to 100 kA in high power renewable sources
generally all low power devices using the 2.4 GHz integration currents with 2.4 GHz component can
ISM band for operation. Semiconductor device be significant enough and coupled with parasitic
manufacturers additional cost due to shielding and capacitance and inductance parameters on lines (in-
filtering could be reduced at design level. cluding the grounding installations) to significantly
According to ERC/REC/ 70-03 short range impact performance or even bring these systems
radars, wideband communication devices and to a halt starting from 2 kA. At best considerable
RFID (Radio-frequency identification) compo- drop of communications device range, as well as in-
nents have allowed power outputs ranging from creased number of errors during transmisson can be
25mW up to 4W. present. Considering wavelengths at these frequen-
cies is close to 125 mm it is not uncommon to find 8. R.Gonzalez, E. Gubia, J. Lopez, and L.Marroyo,
these lengths as well as half-length open conductors “Transformerless singlephase multilevel-based pho-
tovoltaic inverter,” IEEE Trans. Ind. Electron., Jul.
in such power electronics devices, which can lead
2008; vol. 55, no. 7: pp. 2694–2702.
to almost ideal transmission expected in modern
antenna device applications. 9. Harmonic analysis of PWM waveforms using the
Current power delivery standards are analyzing Powergui/FFT tool, G. Sybille (Hydro-Quebec)
parameters up to first 50 harmonics as the ones most
10. S. B. Kjaer, J. K. Pedersen, and F. Blaabjerg, “A
important for power system functions (protections, review of single-phase grid-connected inverters for
fault detection, measurements etc.) and are actually photovoltaic modules,” IEEE Trans. Ind., 2005;
encourage higher switching frequency which gives vol. 41, no. 5: pp. 1292–1306, Sep./Oct.
better results in terms of power quality criteria. Due
to higher switching frequency of power electron-
Corresponding author
ics even higher levels of high frequency signals Amir Hadzimehmedovic,
are found in power system integration parameters University of Tuzla,
which contribute EMI in bands typically regulated Tuzla,
within communication industry. Bosnia and Herzegovina,
E-mail: amir.hadzimehmedovic@untz.ba
References
1. International Energy Agency (2012.), “Trends in
photovoltaic applications:Survey report of selected
IEA countries between 1992 and 2011,” [On-
line]. Available: http://www.iea-pvps.org/index.
php?id=1&eID=dam_frontend_push&docID=1239
the fact that the effects of deficit differ depending However, despite the fact that there are no suf-
on taxes i.e. expenditures being changed. From ficient hard evidence of fiscal deficit and public
the aforementioned in can be concluded that the debt impact mechanisms on economic growth,
impact of deficit on economy should be consid- some sufficient evidence can be produced of their
ered in the context of particular fiscal policy and negative effects on economic growth:
measures it rests on. 1. Squeezing out private investments;
The following important observation, which is 2. Squeezing out exports;
related to the previous stance, is the fact that there is a 3. Increase of interest expense in total
difference in the effects of permanent and temporary government spending;
deficits. Temporary deficit can have stabilising ef- 4. debt service diminishes growth chances;
fects while the impact of permanent deficits depends 5. financial instability. [7].
on the deficit financing: by monetary emissions and /
or debt. Namely, public debt does not increase when Аd 1) High public debt to GDP ratio may
deficit is financed by monetary emission nor does it “squeeze out” private investments, absorbing pri-
affect the change in the level of public debt, except vate savings which could, otherwise, serve for pri-
in the case when debt is denominated in the national vate investment financing, as follows:
currency and when it is not indexed. This basically – government debt increases total credit de-
means that public debt occurs as the consequence mand of economy, which can contribute to the
of permanent deficits which are financed from bor- increase in interest rates on the capital market;
rowing (in country or abroad). From the above, it – if maximum total debt to GDP (private and
can be concluded that deficit represents the change public) is defined, the increase in public debt
in the level of public debt between two years (if not causes the decrease in private debt;
financed by monetary emission), and its effects on – if there is a control of interest rates, public
economy match in the cases of permanent fiscal sector can squeeze out private sector
deficit and debt financing. [4]. competing for credits through implicit
taxation of financial assets;
2. Impact of fiscal deficit and public debt – investors may abandon the investments,
on economic growth particularly long-term ones, if higher taxes
are expected to be imposed in order to cover
There are three theories of the effect of budget a growing debt, thus creating the uncertainty
deficit and public debt: Keynesian, Ricardian and concerning future macroeconomic conditions;
Neoclassical school. Their common characteristic – reduced investments can slow down capital
is mostly in the fact that they consider deficit oc- increase in economy and also have an adverse
currence due to the decrease in tax revenues and impact on the employment decisions, which
not due to the increase in public expenditures (al- in the long run can have unfavourable effects
though Keynesian school in its original version on economic growth. [8].
observes the effects of increase in public expen-
ditures on the change in employment and output, Аd 2) Cumulative deficit i.e. public debt may
and subsequently the effects of decrease in tax cause “squeezing out” of net exports, since a rise
revenues). Generally speaking, differences re- in interest rates as the consequence of deficit at-
garding deficit and public debt stem from different tracts foreign investments and increases the de-
assumptions of different school models. [5]. mand for the domestic currency. In addition, par-
Key knowledge claim of conventional theory ticularly in circumstances of flexible exchange
says: all effects of deficit follow from a single initial rate, increased demand may lead to domestic cur-
effect: deficits reduce national saving. When bud- rency appreciation and thus, to trade deficit. Once
get deficit reduces national saving, it must reduce the government becomes a net importer of goods
investments and /or net exports. These consequenc- it also becomes a net exporter of assets. In other
es of deficit are explained by the effects of two main words, this leads to increased foreign ownership
mechanisms: interest rates and exchange rate. [6]. of domestic assets which, in the long term, indi-
cates the decline in national product although, not bigger in case the private sector does not have
necessarily the decline in domestic product. [9] . sufficient foreign currency i.e. if it is also
All indicators of macroeconomic aggregates in the indebted. [10].
last years lead to the conclusion that Serbia hur-
riedly moves along this track. Аd 5) High and growing public debt always en-
tails potential or actual financial instability. Finan-
Аd 3) Growing public debt to GDP ratio, as a cial instability can be caused by real pressures on
rule, contributes to increased government expen- monetary policy (increased money supply or in-
ditures on interests, which diminishes chances for terest rate), change in the psychological attitude of
economic growth, due to the following reasons: economic entities toward money and capital mar-
– debt repayment by new borrowing leads to kets, and sensitivity of domestic financial stability
debt explosion and government solvency to the changes in interest rates on the international
crisis as creditors „send the bill“ for additional capital markets. [11].
rate in the form of the risk premium;
– if the government opts for debt financing by 3. The most important identities of macro-
reducing other outlays, it usually does so by economic relationships
revising capital expenditures which in the
structure of government outlays have the most From the perspective of macroeconomics,
pronounced positive effects on economic there are two very important relationships in every
growth. Planned measures of the Serbian economy. According to the first relationship, add-
Government for 2012 confirm this rule; ed value produced in a given year equals the sum
– debt financing by increasing taxes leads of consumption and investments minus net for-
to inefficiency and distortions relating to a eign inflows or plus net foreign outflows. To that
higher marginal tax rate. extent, we can say that the sum of consumption
and investments represents the aggregate demand.
Аd 4) Growth impact of high public debt to Thus, for example, if for any reason the sum of
GDP ratio is adverse, regardless of whether the foreign investments equalled zero, the government
debt is financed by borrowing in the country or can spend and invest only what was produced. The
abroad, because: aggregate demand supply imposes limitations to
– if the government is borrowing from its aggregate demand and vice versa. [12].
own citizens, receipts are redistributed to The second relationship in the form of math-
the benefit of securities holders who have ematical “identity” defines that investment in
different marginal inclinations to consume a given year equals national saving in the same
and save; year, plus /minus foreign financing. As is known,
– if the government is borrowing from abroad, national saving originates from three sectors – in-
problems in the balance of payment are come owners: households, economic entities and
likely to occur. Namely, debt repayment the government. Saving of these sectors can be
means the need to transfer the increased either positive or negative. Main relationship is
part of domestic resources abroad and the always fulfilled, even if a part of income creates
necessity to achieve a higher trade surplus deficit, since the positive saving of other income
(unless the foreign borrowing continues). owners and/or foreign financing (debt increase)
As such surplus in trade can occur only in contribute to balancing. [13].
private sector, the government will need Since mentioned relationships are not equal,
surpluses on domestic fiscal accounts to be their materialisation is not automatic. They repre-
able to buy foreign currency from the private sent the proof of the so-called „rules of thumb“ the
sector in a non-inflatory manner. This means acceptance of which can have its benefits, however,
that the government requires more taxes, they are also possible to break. This is exactly what
which implicates the occurrence of new has been happening in Serbia since 2000 to date.
tax distortions. The problem becomes even Aggregate demand grows faster than production:
consumption per capita grows faster than produc- G – T + rB = dB/dt + dM/dt.................. (1)
tion per capita, while real wage movements does
not depend on labour productivity. In saving equa- where: G – level of government spending (ex-
tion, negative government saving (budget defi- cluding interest payments on government debt),
cit) continuously grows, which coincides with the Т – tax revenue, r – interest rate on the govern-
drop in household net savings rate, intensified pur- ment debt B, and М – the level of high-powered
chase of real property, cars and other luxury goods, money (monetary base). The left side of equation
through the mechanism of consumer credit. On the (1) represents the budget deficit. The debt consists
other hand, business sector is by that very fact a net of primary public budget deficit (G - Т) and the in-
debtor, because this is the only way for it to finance terest payment on the government debt (rB). The
projects, which, as its final consequence, does not right side is the financing: budget deficit can be
produce a negative effect on the final picture. Inevi- financed by either issuing public debt (dB/dt) or
table consequence of it all is that foreign financing by issuing high-powered money (dM/dt).
considerably grows, which is primarily reflected in After a few iterations, the following equation
the increased current account deficit in the balance may be derived: [16].
of payments. [14].
Since relationships are discussed here which in ḃ = (g-t) + (r-x)×b.......................... (2)
the mathematical interpretation are called „identi-
ties” i.e. equations which are true irrelevant of the where: g = G/Y; t = T/Y and x - Ẏ/Y (the
value of any variable they contain, we can call growth rate of GDB).
them: “ a rule”. As is known, in general case the rule The equation (2) specifies the public debt dy-
can apply depending on whether the government or namics: when nominal interest rate r exceeds nomi-
any other supranational institution requires the rule nal growth rate x, the government should take the
to prevail or not. If observed dynamically, to direct measures to run a primary budget surplus (g-t), and
the economy growth towards the state of balance, if it fails to do so, the debt-to-GDP ratio would in-
the materialisation of the mentioned relationships crease without bounds. Finally, it would resulted in
should assume the following characteristics: outstanding public debt, which means that the ulti-
– a sound production rate, which can be mate condition for government solvency is:
achieved if in a few years time the average
consumption does not grow faster than ḃ= 0 or (r - x)×b = t - g. [17].
production, and from investments, even
in the circumstances when the foreign Accordingly, if government has accumulated
resources are withdrawing; sizeable deficit in the past, in the future, it will
– domestic saving does not lag behind the have to run adequate budget surpluses in order to
investment growth, which means that the prevent the debt - GDP ratio from increasing auto-
foreign investment proportion does not grow matically. At first, it can be concluded that the sole
and thus, the government does not enter in solution for the government would be the spend-
the condition of accelerated indebtness. ing reduction and/or tax increase. [18].
If the government is stable, then ḃ equals 0,
3.1. Budgetary convergence of Maastrichtian which implies d ≡ g × b (3) . [19].
type This identity corresponds with the key con-
vergence criteria for governments that intend to
The relation between budget deficit, public join European Monetary Union, and relates to
debt and economic growth rate may be considered the request for reduction of budget deficit to 3%
to be the third identity of macroeconomic relation- and public debt to 60% of GDP (defined by the
ships. A well-known budget restriction may serve Stability and Growth Pact). If we consider the
as the starting point for consideration of the afore- mathematical identity d ≡ g × b, and introduce
mentioned relationships: [15]. the budgetary convergence criteria, we will reach
the conclusion that stabilization of public debt to
60% of GDP can be achievable if and only if the the key Maastrichtian criteria, which defines the
nominal GDP growth rate equals 5%, i.e. 0,03 = relation between budget deficit, public debt and
0,05 × 0,60. However, there is no economically ra- economic growth rate, mathematically express as
tional explanation of this rule, since the reason for follows: d ≡ g × b. However, even if that is not the
reduction of public debt to 60% remains unclear. case, that is, in a situation of stable relation of bud-
From that point of view, this rule may be taken ar- get deficit and public debt, Serbia still has a practi-
bitrarily which is demonstrated in the calculations cal problem related to net cash flow to debt ration,
set out in the following table. [20]. which may have a negative influence on the cur-
Table 1. Simulation of budgetary convergence rency stability due to disarrangement caused by
Maastrichtian type the increase of interest rate. This policy keeps the
d g B Republic of Serbia at a respectful distance from
“given” criteria 3,0 5,0 60,0 EU integration, since it diminishes the chances
1. scenario 3,5 5,0 70,0 for fulfillment of the remaining three key conver-
2. scenario 2,5 5,0 50,0 gence criteria, which are no longer mentioned in
3. scenario 4,2 7,0 60,0 the official documents of the Serbian Government.
4. scenario 4,5 7,5 60,0
5. scenario 1,8 3,0 60,0 3.2. Unsustainability of budget deficit and
6. scenario public debt of Serbia
4,5 ??? 45,0
Serbia
Source: author’s calculation Public debt of Serbia has reached legally au-
thorized maximum of 45% of GDP, which is not
The calculations from Table 1 demonstrate that remotely the greatest debt in Europe. [22] None-
numbers 70% and 50% fit in very well in the given theless, Serbia has other problem: distrust of in-
identity (rule), and in that case, the correspond- vestors in its capability to repay relatively small
ing deficits are 3,5% and 2,5%. Secondly, since debt. Consequently, the debiting per rates is few
this identity (rule) is conditioned by the nominal times higher than GDP growth rate.
growth of GDP, in case of nominal growth that is On the other hand, foreign debt is already very
higher/lower then 5%, the budget deficit which high – over 70% of GDP. Experiences from other
stabilizes public debt to 60%, increases above or developing countries indicate that foreign debt of
decreases below 3%. Consequently, this rule al- over 60% of GDP is becoming critically high, i.e. it
lows quite high degree of flexibility, but it is, can result in debt crisis: cessation of payment (so-
unfortunately, indicative for candidate countries called Argentine crisis) or debt restructuring. Co-
and it is imposed as one of the conditions for new sidering the budget deficit projected for 2012 to the
countries to join the European Union. amount of 4,5% of nominal GDP, there is a reason
The observations of inconsistency between the to pose the question: how is this debt going to be
two criteria go in favor of the fact that public debt repayed? The final result of the policy the Serbian
is measured on the cash flow basis while budget government is leading would be the debt of 80% of
deficit is measured on actual basis. Consequently, GDP which will inevitably cause bankruptcy. This
the value of debt is put in relation to GDP in its is applicable even in a situation when fiscal stimu-
gross value, while deficit is expressed in net value. lus brings the investment process ’alive’.
Some opinions on granting to each country a high- Most of the european governments have de-
er degree of freedom in terms of fiscal deficit, are cided to ’fight’ the crisis of public debt and bud-
widespread, though under the condition that pub- get deficit with the increase of tax or decrease of
lic debt remain below some critical level. Thus, public spending, or with the combination of the
the government would have more possibilities for two policies. As opposed to the aforementioned
maneuvering in a short period of time. [21]. governments, Serbian government opted for new
The calculations given in the Table 1 (6th sce- indebtedness. In the next mid term period the fis-
nario) lead to the conclusion that the Serbian Gov- cal deficit is planned to be financed by loans from
ernment has withdrawn from the fulfillment of international financial institutions and the EU and
by issuing treasury bills of different maturity in or- would qualitatively narrow down the possibilities
der to reduce the rollover risk. [23]. for further decisions. The government’s use of pub-
Consequently, Serbian government discarded lic debt for financing the current deficit or invest-
both of the aforementioned policy, or as opposed ment projects and shifting such expenses to the fu-
to the idiom ‘choose the lesser of two evils’, the ture, very often has negative influence on the flex-
government has chosen both. Thus: the general tax ibility of public finance and usually implies a slow
remained the same, while public spending and bud- development of economy in subsequent years.
get deficit were not decreased, therefore, in the past Optimal limit of public debt would be the
three years, the public debt has increased for over 6 amount of debt that provides the accomplishing of
billion Euros. However, it is obvious that Serbian economic stabilization, development of financial
government should lead extremely conservative market and economic growth, while possible eco-
macroeconomic policy in order to gain credibility, nomic and social development are not threathened.
which implies significant reduction of budget defi- In that sense, the government should not reach the
cit and public spending in mid term, with moder- state of indebtedness that would lead to financial
ate interest rates which would boost the economic insolvency and instability, and that is achievable
growth, since it is the only way to gain the trust of if the growth rate of public debt is not higher than
foreign and domestic investors. [24]. the GDP growth rate for a long period of time.
When dealing with the macroeconomic context The amount of Serbia’s public debt is very dis-
of fiscal policy, the government should apply the turbing, regardless of the fact that it is still below
measures that will contribute to the sustainability the level of 60% of GDP determined by Maas-
of the level and public debt growth rate in order to trichtian criteria. The growth rate of Serbia’s to-
secure debt service. If the Fiscal reform is based tal public debt which was greater than the GDP
on the decrease of expenses, especially the wages growth rate in the past years is problematic, as
in public sector and expenditures for social secu- well as the reluctance of Serbian government to
rity, fiscal balance will be long-lasting and shall undertake the measures that would lead to fiscal
not lead to the drop in output and disruption in sustainablity and the stability of public finance.
economic environment neither in short nor in long
term. If fiscal reform is primarily based on the rise References
in tax income, the effects of such a reform would
be unsatisfying and the fiscal balance should not 1. Davina J, Schoeman N, van Heerden J. Alternative
Definitions of the Budget Deficit and its Impact on
be sustainable for a long period of time. [25].
the Sustainability of Fiscal Policy in South Africa,
Though it is possible to define the term ’fiscal http://www.essa.org.za/ download/ papers/006.pdf://
sustainability’ in varios ways, it is in general de- www.essa.org.za/ download/papers/006.pdf i http://
fined by its possibility to be coninued in the future, ideas.repec. org/a/ bla/sajeco/v70y 2002 i3p 251-
without any changes[26]. Therefore, sustainable 257.html
fiscal policy imposes the government to be able to
2. International Monetary Fund, IMF institute, Fiscal
service its debt today and in the future, without the Policy and Macroeconomic Stability International
adjustment of primary surplus. Monetary, World Economic Outlook, May 2001; pp.
85-116.
4. Conclusions 3. Tobin J. Its Macroeconomics in Perspective, Cowles
Foundation for Research in economics, Yale univer-
High public debt, especially if we consider its sity Box 208281, New Haven, Connecticut, available
foreign component, does not contribute to the de- at http://cowles.econ.yale.edu /P/cd/d13a/d1301.pdf
velopment of economy and it should not be the in-
strument for economic growth encouragement. In 4. Tobin J. Macroeconomic Strategy in Wartime, Feb-
ruary 10, 2002, Cowles Foundation for Research in
that sense, the government should take measures economics, Yale university Box 208281, New Haven,
that contribute to the adjustment of the amount of Connecticut, available at: http://cowles.econ.yale.
public debt and the prospects of its servicing. Con- edu/P/cd/ d13b/ d1357.pdf
trary to the aforementioned, the short-term policy
5. Tempelman HJ, Buchanan Mj. On Public-Debt Fi- 19. Where: b – (stable government) the level at which
nanse, http://www. jerrytempelman. com/Jerry’s%20 the public debt is being stabilized (expressed in %
website/Publications/03.%20Government%20 GDP); g – nominal GDP growth rate; d – budget
debt%20finanse/01.%20Buchanan%20Gov’t- deficit expressed in % of GDP.
Debt%20Finanse%20paper.pdf
20. Nikolić A.“Teskoće funkcionisanja Evropske unije u
6. Ball L, Mankiw NG. What Do Budget Deficits Do?, odsustvu čvršće fiskalne koordinacije”, Ekonomija-
http://www.kansascityfed. org/publicat/sympos/1995/ teorija i praksa,1/2011.
pdf/s95manki.pdf
21. Casella A.“Tradable Deficit Permits”, in A. Bruni-
7. Bernheim BD. “A Neoclassical Perspective on la, M. Buti and D. Franco (eds.) The Stability and
Budget Deficit”, Journal of Economic Perspectives, Growth Pact The Architecture of Fiscal Policy in
http://www.jstor.org/pss/1942669, 1989; 3(2): pp EMU, Basingstoke: Palgrave. 2001.
55-72.
22. See the example: Source: Statistical Annex, Euro-
8. Tanzi H, Zee V. and H. “Fiscal Policy and Long- pean Economic Forecast – Autumn 2011., http://
Run Growth”, IMF Staff Papers, 44(2), pp 179-209. ec.europa.eu/ economy _finance/eu/ forecasts/2011_
http://www.jstor.org/ pss/3867542. 1997. autumn_forecast_en.htm
9. Ball L, Mankiw NG. What Do Budget Deficits Do?, 23. Revised Memorandum on Budget and Economic
http://www.kansascityfed. org/publicat/sympos/1995/ and Fiscal Policy for 2011 with forecasts for 2012
pdf/s95manki.pdf and 2013, December 2010
10. Tobin J. Macroeconomic Strategy in Wartime, Feb- 24. International Monetary Fund, Republic of Serbia,
ruary 10, 2002, Cowles Foundation for Research in Fourth Review Under the Stand-By Arrangement
economics, Yale university Box 208281, New Ha- and Requests for Waiver of Non-Observance of
ven, Connecticut, available at: http://cowles. econ. End-March Performance Criterion and Modifica-
yale.edu/P/cd/d13b/ d1357.pdf tion of End-June Performance Criteria, and Fi-
nancing Assurances Review, http://www.imf. org/
11. Tanzi, Fanizza Vito i Domenico, “Fiscal Deficit and external/ pubs/ft/scr/2010/cr10210.pdf
Public Debt in Industrial Countries, 1970-1994”,
IMF Working Paper, br. 49, http://ec.europa.eu/ 25. Alesina A, Ardagna S. Forthcoming in Economic
economy_finance/ publications/ publication11240_ Policy n.27, October 1998., http://www.econom-
en.pdf, 1995. ics.harvard.edu/faculty/ardagna/ files/ Economic_
Policy _1998_b.pdf
12. Ball L, Mankiw NG. What Do Budget Deficits Do?,
http://mostlyeconomics. wordpress.com/2009/06/05/ 26. Alvarado CD, Izquierdo A & Panizza U. Fiscal Sus-
what-do-budget-deficits-do/ tainability in Emerging Market Countries with an
Application to Ecuador, Inter-American Development
13. Bajt A. Osnove ekonomske analize i politike, Infor- Bank, http://www.iadb.org/ res/publications/ pubfiles /
mator, Zagreb, 1979; pp 403-411. pubWP-511.pdf. August 2004.
Abstract 1. Introduction
Supply chains are a collection of organizations Organizations in the supply chain need to plan,
that define common objectives, strategies and plans. purchase, produce and deliver raw materials/prod-
To improve performance of whole supply chain, or- ucts in order to meet current or projected market
ganizations need to define the key elements of the demands. In addition, they should support the post
chain (processes, process maps, inputs and outputs sales activities in the warranty and non-waranty
from the processes, both internal and external com- period in the field of product quality, customer
munications, methods and techniques, interface, complaints, product returns and others. Every or-
standards, external environment, etc.). Researches ganization in the supply chain has a defined role,
suggests that the already known factors that affect structure and resources. Organizations can have dif-
organizational performance, such as strategy, tech- ferent roles as a supplier, customer or carrier, while
nology, human resources and others, must include elements of the structure include functional units,
an important determinant of performance of the processes, information, information resources, ma-
organization, which refers to the ability to manage terials, facilities, decisions, business practice, inter-
and improve business processes in organization. action and performance. The elements of the struc-
The main goal of research presented in this paper is ture of each organization are compatible and can be
to show development and verification of the model observed integrally as a single coherent whole, to
for the evaluation, selection and ranking of suppli- effectively achieve a common goal. Supply chain
ers, as an important factor for effective manage- is an integration of very large and complex, multi-
ment of supply chain processes. disciplinary dependent processes and information.
The methodological approach is based on the To improve performance of whole supply chain,
general theory of supply chains, quality manage- organizations need to define the key elements of the
ment system, business processes management and chain (processes, process maps, inputs and outputs
requirements of stakeholders. from the processes, both internal and external com-
The main results of research aiming to the veri- munications, methods and techniques, interface,
fication of the model for evaluation, selection and standards, external environment, etc.). At the same
ranking of suppliers, which is applied throughout time, all participants in the supply chain have to
the whole supply chain. In this way, the participa- apply the same principles to achieve the expected
tion of each member in the supply chain can be results of operations. In addition, organizations
determined by the product added value in the sup- conduct intensive and interactive relationships with
ply chain. their suppliers, collaborating in new product de-
The originality of this research is reflected in velopment, integrating key business processes and
the multidisciplinary and interdisciplinary ap- sharing information about the behavior and state of
proach to developing the model and its implemen- the system, as well as information for improving
tation in terms of limited financial, technological the system as a whole. Coordination of activities is
and human resources. a critical process in the supply chain [1]. To cope
Key words: Management, Supply Chain, Pro- with the challenges they face, the organization must
ces Performance, Evaluation and Selection of accept the management principles based on the pro-
Suppliers cess, especially if they want to successfull manage
their supply chains. Researches indicates that the and operational issues. In addition, supplier selec-
already known factors that affect organizational tion is decision-making process that exams many
performance, such as strategy, technology, human quantitative and qualitative indicators rather than
resources and others, must include an important bids. Many different supplier selection approaches
determinant of performance of the organization, have designed. In this research, approach oriented
which refers to the ability to manage and improve to business objectives and company stakeholder’s
business processes in organization [2]. Empirical requirements is proposed.
studies suggest a positive impact on process-orient-
ed organizational design on performance of organi- 2. Background for Research
zations [3]. Business Process Improvement (BPI)
in conditions of globalization of markets, for orga- The term Supply Chain Management was first
nization is a conditio sine qua non to keep up with presented by the consultants in the early 1980s.
changes in business environment, through business The concept is geared towards the integration of
processes adjustment to continuous technological, internal business functions in an organization, such
organizational, political and other changes [4]. as procurement, production, sales and distribution.
Development of supply chain management Intra-organizational view of the supply chain is
(SCM) requires a comprehensive system of per- then extended beyond the observed organization,
formance measurement process. Process perfor- which includes “upstream production chain” and
mance measurement system provides manage- “downstream channels of distribution” [7].
ment with information for monitoring, control, Simchi - Levi and Kaminsky [8] define SCM as
evaluation and feedback. This may be a driver of follows: “Supply chain management is a set of har-
motivation, action, continuous improvement and monized approach to the integration of suppliers,
achieving strategic goals [5]. manufacturers, warehouses and shops”. In this way,
The importance of business processes is reflect- planned production is realized and planned quanti-
ed in the fact that they are the main components of ties are delivered to the right location at the right
the organization and are used, among other things, time, while minimizing costs in the delivery sys-
to analyze the problems in organizations where it tem and a certain level of service and satisfaction
is based on the result of causes of conflict perceive of consumer demands”. The identified problems re-
the process to increase effectiveness and efficien- lated to supply-chain management, mainly related
cy of the planned achieve organizational goals. to poor coordination of activities and a large num-
Suppliers selection is a critical process of pur- ber of partners under uncertainty. Process-oriented
chasing management in supply chain due to the organization comprehensively applies the concept
key role of supplier`s performance on cost, qual- of a Business Process Management (BPM). BPM
ity, delivery and service in achiving the objectives not only involves the identification, design, imple-
of a supply chain. mentation and execution of business processes, but
In theory and praxis is emphasized the impor- also includes the interaction, control, analysis and
tance of supplier management since the cost of sup- optimization of processes [9].
plied parts and components greatly influence on Performance measurement of supply chain is
final cost of product. That means supplier selection based on supply chain performance model that
is the one of the most important decision making includes the planned objectives, measures, mea-
problems. The same conclusion could be found in surement methods, with specified procedures and
selection the adequate supplier significatly reduces responsibilities of participants in the supply chain.
the purchasing costs, improves corporate compe- Upon review of relevant literature in supply chain
tiveness and improves supply chain performances, area may be seen several important system for
eventually [6]. In comparison to former, conven- measuring supply chain performance. Gunasek-
tional approach of supplier selection, which was the aran et al. [10] lists several types of performance
matter of lowest bidder, recent trends of supplier se- measures for strategic, tactical and operational
lection, tends to long term partnership with resolv- level, as well as financial and non-financial mea-
ing various product developments, organizational sures. Measures for strategic decisions affecting
the top level of management. The tactical level ship) and AHP (Analytic Hierarchy Process) were
deals with resource allocation and performance the most common approaches. However, AHP
measurement in terms of objectives to be met in was more suitable for dealing with qualitative and
order to achieve the results specified in the stra- quantitative criteria for supplier selection then
tegic level. At the operational level indicators are TCO, which considered only data related to costs.
relevant to daily operations. Another research presented in [14] where 70
Shepherd and Gunter [11] have performed the journal articles analysed for period 2000-2008 re-
categorization of supply chain performance mea- vealed Data Envelopment Analysis (DEA) and
surement in the five supply chain processes: plan- AHP as the most used individual approaches. Since
ning, procurement, production, delivery and return DEA has been modified to handle qualitative data,
of the product or customer satisfaction, whether such as amount of know-how transfer or supplier
measured in cost, time, quality, flexibility and inno- reputation. AHP is still very frequently used multi-
vation, and whether the measures are quantitative criteria decision making technique in many differ-
or qualitative. The measures are categorized ac- ent areas such as education, engineering, finance,
cording to business processes or from management government, industry, management, manufactur-
level as strategic, operational and tactical. ing, etc. AHP can be used to make a consistent de-
Chan and Qi [12] present an innovative method cision with respect to multiple qualitative and quan-
of measuring performances. The goal is to build a titative criteria. The most popular AHP-GP (Goal
team to measure the performance of which mem- programming), dealing with three goals: cost, qual-
bers should be from different organizations. SCM ity and deliver reliability. Another used approach,
should be measured beyond organizational bound- QFD-AHP gives better integration of business
aries, and it is not to just focus on one organization. strategies into supplier selection process.
SCM can be divided into six general processes that Based on best practices and experiences to-
are interrelated: processes of suppliers, input lo- gether with business objectives and stakeholder
gistics, manufacturing, output logistics, marketing requirements many criterions were defined and
and sales processes and end customer, with each used in supplier selection process, such as: qual-
of the main process may be decomposed into sub- ity, delivery, price/cost, manufacturing capability,
processes. Typical problems that occur when mea- service, management, technology, research and
suring performances in supply chains are related development, finance, flexibility, reputation, rela-
to the weak linkages of performance measurement tionship, risk, safety and environment, etc. Each of
system with a defined business strategy, focus on the above-mentioned criterions can be expressed
partial performance indicators (mainly financial), with many related attributes [15, 16, and 17].
the use of isolated and incompatible measures and
a low level of integration in supply chains. 3. The proposed supplier selection model
In fact, many organizations in supply chains
are not yet ready to expand and improve model In this research, the importance of impact of
of performance measurement process that will business objectives and stakeholder requirements
include interaction and compatibility with mod- to the evaluating criteria and factors is ephasized.
els from other organizations in the supply chain Factors can be given arbitrarily and subjectively.
and thereby improve the performance of the entire If that happens, supplier selection process will not
supply chain. Sometimes it is very difficult to un- give adequate suppliers. The model was developed
derstand what is happening in the organization or for participant in the supply chain who belongs to
supply chain, because the information flow can be the third level, and distributes its products to manu-
limited and fragmented both within the organiza- facturers OEM X and OEM Y. The analyzed com-
tion (internal fragmentation) and between organi- pany purchase material from N suppliers. Supply
zations (external fragmentation). chains for individual projects are intertwined and
According to research presented in [13] where form a supply network globally. Procurement man-
154 journal articles on supplier selection analysed agement must constantly analyze suppliers on their
for period 1986-2002, TCO (Total Cost of Owner- ability to meet long-term needs of the organization.
ing a relatively high level of overall quality of all rions and sub-criterions. In certain situations, joint
suppliers (Figure 3). teams are formed to monitor the implementation,
Average score for all criteria is relatively high verification and validation of implemented correc-
(87-92 points), with the lowest average score was tive measures.
for the criterion for sales and service conditions.
Individual lowest overall average score of 62
5. Conclusions
points is established for the supplier number 10,
where the individual average marks for each cri- In modern business environment SCM has
terion are 55 points for quality, 82 points for the become a critical success factor, which must be
logistic requirements and 80 points for sales and viewed and analyzed as a macro process, in line
service requirements (Figure 4). with business objectives, stakeholder require-
After analysis of supplier evaluation, priority ments, the requirements of relevant ISO standards,
management activities are carried out with suppli- applied ICT and BPM approaches, and must be
ers from groups C and B. Because of organization decomposed into key processes of the supply
management activities, suppliers received the re- chain participants and interactions between pro-
sults of evaluation and analysis. cesses and entities of the environment. One of the
key factors that affect the performance of SCM is
the level of processes quality in supply chains, in
which the significant role has processes of evalua-
tion and selection of suitable suppliers.
Based on the present model for the evaluation
and selection of suppliers and conducted research
of key processes for evaluation, selection and
Figure 4. Influence of factors on range for choice of suppliers, which are presented in this
suppliers in range C paper, we stressed the following:
Model for evaluation, selection and choice of
At the same time, suppliers are required to de- suppliers is based on the assumptions about the
fine corrective action plan, in accordance with the quality and management science, requirements of
overall and individual assessments within all crite- the relevant ISO standards, stakeholders and man-
Corresponding author
Zora Arsovski,
University of Kragujevac,
Faculty of Economics,
Kragujevac,
Serbia,
E-mail: zora@kg.ac.rs
rections of actions which can be taken in some system for knowledge and ability estimation that in
given circumstances. Outcomes are the final re- its base there would be located the Battery of mod-
sults of each alternative which are supposed to els. The Battery of models consists of models com-
come closer to some extend to the set goal. ing from various designers from different sources,
The first and ever actual problem, which is in different kinds and applications, which can mea-
relation to the process of making a decision, is the sure the same or different characteristics and if they
choice. The choice procedure makes some sense are connected, they can be used for achieving some
only if it is possible to assess the desired knowl- practical aim (Figure 1). The defined system oper-
edge and abilities, that is, to anticipate and at the ates in two regimes: freely and adaptively guided.
same time to reject an ignorance or an inability The free regime means that the system will assign
which does not meet the set criteria. all models which are predefined by the definite aim.
The forecasting consists of a chain of proce- As for the adaptive regime, the system itself on the
dures which are usually finished by a statement of basis of identifying and general data (IOP) gener-
the decision maker about certain ability or a pos- ates a set of models which form the system for the
session of some knowledge, which was unknown specific testee. The guided regime means the res-
at the moment of making the statement. posability of the decision maker (expert in his field)
In this paper, the application of two models to designate which models will be used for testing
will be investigated: the model of a specific archi- the testee. The model of the Decision Support Sys-
tecture for the Decision Support System for the tem consists of four logical packages and these are:
purpose of knowledge and abilities estimation of a) Database (DB), b) Model base (MB), c) Dialog
individuals and groups and the model for selecting subsystem (executing the models) (DS) and d) the
tests from the Battery of models [4, 5]. The battery Report (R).
of models is usually used in practice when choos- The database consists of two groups of data:
ing professions. The models represent the tests of internal (basic data about the testee and answers
abilities or capabilities as well as the question- of the testee to some particular items of some
naires on interests. test) and the table of authentic data which were
For the sake of the pre-research, we generat- obtained by the empirical research. The tables of
ed the Battery of models with a set of items for authentic data are the data which are being used as
knowledge estimation on the course: Decision inlets or as initial values for the operation of indi-
Support System on the Faculty for Organizational vidual models. The data have been obtained by the
sciences in Belgrade. The Battery was applied and process of research and they make the compulsory
evaluated in the experiment which had been car- part of data base which can be changed only by
ried out on this faculty [6, 7]. the authorized researchers after the verified new
The formalization and methodological descrip- research have been conducted.
tion of the model of the specific decision support
system for knowledge and abilities estimation ap-
peared after a long period of research.
sources and they are mostly selected from various in necessary for the decision maker so that he can
active data base by means of extraction. The data choose the proper test according to the set goal for
sources can be internal and external. Over the data the sake of which the whole testing is being con-
there exists the relational system for controlling ducted. The address register for tests within itself
these data. determines the set of assigning methods to a defi-
The Model base consists of two following nite test.
parts: the model of individual tests which are inte- Address register for methods. Like the ad-
grated in the Decision Support System, as well as dress register for tests, it helps the decision maker
mathematical models, procedures and simulating to become familiar with this method as well as its
models which are being used in those integrated content. The address registers are automatically
tests. The control over these models is hardly generated according to their definitions so that
necessary since they have been created purpose- the decision maker has no chance for making any
fully and they are being executed hierarchically changes. The address book also contains within
through the component “execution of models” and itself a special catalog of implementing methods.
they are implemented through the software com- Address register for procedures. It contains
ponents which exist as separate libraries of the ex- the overviewed data as well as explanations about
ecutive programs. The data for the bank of models each procedure with separate links on models
are mostly generated by the professional decision which are activated in each of these procedures.
makers and they usually contain the models which The decision maker does not have the possibility
will use the applications for an assessment. From to change procedures.
this Model base, the unique tests for a testee are Address register for models. The address reg-
generated. The Model base contains within itself ister for models is conceptually completely the
the implemented models and systems for control- same as the address register for tests. It is also a
ling these models. very specific catalog which contains the descrip-
The decision making usually requires the chang- tion of all models contained in the Model Base
es of the existing and entering of the new models. with a separate link on components which repre-
These requirements are achieved in that way that sent the executives of these models.
the model base is being projected as a flexible and The component of execution model has got a
adaptive one. In order to realize a quick answer of task to provide the model integration with the data
the Decision Support System to the requirements of and tests within the battery as well as the combi-
decision makers, the model base must have a good nation of defined operations (components) for the
connection with the data base. sake of conducting an interview or processing the
According to Turban [8] the model address reg- results. These components make it possible to do a
ister is a specific catalog in the model base. This simple operation with the components of the sys-
catalog contains the description of basic func- tem. This is a model which provides a direct con-
tions. The description of functions is available nection of the Decision Support System with the
to the user at any moment while using Decision user and it is achieved in such a way that the Deci-
Support System. Definitions, which are an integral sion makers can use the Decision Support System
part of the address register, can be obtained for the in a very simple way.
mathematical models as well. The address register The system can generate four types of reports
contains: 1) Address register for tests; 2) Address about each testee: numeric–graphic (profile), ver-
register for methods; 3) Address register for pro- bal–professional (intended for the decision mak-
cedures and 4) Address register for models. ers), standardized (intended for the customer) and
Address register for tests. The address regis- personal (intended for the testee). The number of
ter for tests is a specific catalog of integrated tests information about the testee, but (to some extend)
whose methods are being used for processing the and their validity depend on the number of tests
results of testee’s answers. The catalog contains a which are used to test the testee.
description of basic functions through which it is The numeric–graphic report shows graphically
possible to recognize the test. The test recognition the testee on the T–nomogram out of which it is
possible to read the gross and T–scores in relation designed according to the Barnum–effect1. This is
to the basic (valied) samples (Figure 2 – structural done deliberately so that it could be possible to
profile). avoid the immunity system of the defense mecha-
The verbal–professional report is a describing nism and so that the testee could accept the idea to
inventory of characteristics factors of the person- think of himself.
ality of the testee. The criterion for leaving out the
appropriate sentence from the verbal source for 2.1 Generating the battery of models for a
describing any testee is a T–score which is greater particular testee
than 55 or less than 46 (above and under the aver-
age scores: Figure 2). In other words, the profile For generating the battery of models for test-
of the proper sample is the psychometric basis for ing a particular testee, the leading method which
generating the verbal–professional report obtained is used by the model for identifying questionnaire
on the sample of 8009 testee. (IOP) (Figure 3.) has been used. The identifying
questionnaire as well as the general data about the
testee, on the basis of their content, ranges the tes-
tee into the group for determining the type of the
model which will be assigned to the testee.
j
the data base, have been memorized in the
following format: “2134444111 142441 2{ for O d j > 3 for j = 5 , 9
TSPO = ... F .3.,
3421224231”. Each character of this record j
3{ for O d j < 3 for j = 4
is an answer to one of the items. The char-
acter whose values are “O”, represent the 0{ for O d j = 0 for j > 0
items to which the testee did not give any
{
answer.
1 forfor OO dd jj <>13 forfor jj==21,58
for O d <3 for j = 5 , 7 , 9 , 10 ,15 ,18 , 2 0 , 2 2
2. The message to the user. In cases when the
testee did not give a sufficient number of j
answers, the system sends the message to TTKD = 2{ for O d j <3 for j = 3 , 6 ... F .4.,
j
the decision maker that the protocol is not
usable.
0{ for O d j =0 for j> 0
3. Forming the matrix for the answers of the
testee. In this step, the initial matrix for the
1{ forfor OOddjj >>33 forfor jj==21,213
for O d <3 for j = 2 0
testee answers is formed. OdIOP.(F.1.) The
matrix is formed out of the data which are 2{ for O d jj >1 for j = 2 5
in the data base and represent the testee TBIG = ... F .5.
j 3{ for O d j >3 for j =15
answers to the items of the test. The matrix
is stored in the memory and is ready for
further usage. Upon the request of the user 0{ for O d j =0 for j > 0
about a new testee, the matrix is reset each
time and from the beginning initialized with 4. Forming the empirical matrix OekIOP. (F.2.).
new data. The initialized matrix is shown on The matrix contains the in-between results
Figure 4. and it is formed each time when a new testee
is in question. (F.3, F.4, and F.5). The updated
25
Score calculating The values for scores are be- LICNOST = ∑ TBIG j = 2 + 1 + 1 = 4
j =1
ing calculated by summing up the matrix columns
OekIOP . (F.6, F.7, and F.8). for TTKD j ≠ 0... F .8.
In this step, the method represents scores for
IOP test to the decision maker. PIE − JRS compulsory in the battery
Battery generation. By analyzing the obtained Space , Perception , Intruder , Relations for KOG _ FAK 1< 7
Chose test : TDK for VOLJ _ FAK 2 >5
results, the method includes some particular tests BIG 5 for LICNOST >3
in a battery according to the following regulations
(F9, Table 2): ......... F .9.
References
1. Čupić M., Novaković T. “Application Generators for
Decision Support”, Naučna knjiga, Belgrade 1992.
Corresponding author
Jelena Andjelkovic Labrovic,
Department of Human resource management,
Faculty of Organizational Sciences,
Belgrade,
Serbia,
E-mail: jeca@fon.rs
3. Differential dynamic current analysis key are in blue color) and Key8=1000 (in Figure
5 traces for this key are in red color), to show the
When executing differential dynamic current
difference between the traces of dynamic currents,
analysis attack, there are few steps that have to be
and to come to know if differential dynamic current
accomplished (Figure 4). First of all, an attacker
analysis written in Matlab program is faultless.
must be able to precisely measure and record dy-
namic currents of created crypto core with the dig-
ital oscilloscope, while the algorithm is running.
When measuring dynamic currents, we cannot
prevent the influence of noise. Various noise com-
ponents have to be considered, such as external
noise, intrinsic noise, quantization noise and algo-
rithmic noise. By careful use of mentioned high-
quality measurement equipment, external noise
for investigations described and done within this
paper has been notably reduced. Also, an attacker
must know what algorithm is computed (in this
case Serpent), just as the plaintext or the cipher-
Figure 5. Zoomed difference for recorded traces
text (output to an encryption algorithm). Our strat-
for two different keys
egy is to make a lot of measurements of dynamic
currents and then divide them with the aid of some The success of differential dynamic current
oracle into two different sets. Statistical methods analysis strongly depends on the number of used
will be used to verify the oracle and if and only samples. For this paper, 1000 samples were taken
if the supposed oracle has the same value as the for each key (Key2=0010 and Key8=1000). For
secret key in crypto core’s architecture, we will be example, obtained results for Key8=1000 have
able to see noticeable peaks in the statistics. shown that even 100 samples are enough to reveal
the secret key (Table 1). This is the consequence
of using precise measurement set-up.
The target of this attack were clock periods
where data values change and where dynamic cur-
rents have been measured. Since there is a delay
of one clock period in the crypto-core’s activity,
an offset of 100ns has been specified. For all 100
samples (traces taken for Key8) a Target_Bit has
been verified. This bit depends on value of input
data and the correct key, and particularly in these in-
vestigations represents the second bit of the crypto-
Figure 4. Steps of differential dynamic current core’s output data. There is no 100% right choice
analysis for Target_Bit, it is a matter of experience in crypto
core attacking area. Depending on the value of Tar-
For each of sixteen 4-bit input data, data_gen- get_Bit, counter_1 or counter_2 are increasing. Ac-
erator generates 16 possible changes of input data, cording to the value of Target_Bit (0 or 1), traces
which demands 32 clock periods. The number of all are divided into two groups. After computing the
clock periods is 16*32=512. Using clock frequency difference between mean values of two groups of
of 10MHz, the duration of this process is 51,2μs. traces, simulation of the differential dynamic cur-
Since height of oscilloscope’s window is 15μs, trac- rent analysis written in Matlab program can start.
es for almost first five input data can be recorded. After computing the difference between mean
Two different keys have been used for the mea- values of two groups of traces and executing the
surements, Key2=0010 (in Figure 5 traces for this simulation of differential dynmic current analysis,
the results of this attack show that the highest value age of high-quality and precise equipment set-up,
of all gained peaks is the one for the Key8=1000, numerous measurements of dynamic current over
which actualy has been used as a secret key. From crypto-core have been executed. This data in form
all above mentioned steps, it can be concluded of dynamic current traces has made possible to
that the programmed differential dynamic current actualize an attack using differential dynamic cur-
analysis attack was effective (Figure 6). rent analysis method and to reveal the secret key.
Table 1. Maximum values of DPA peaks for
different key_values References
Key MAX DPA
1. Mayes K. E., K. Markantonakis, “Smart Cards, To-
0000 1.0953
kens, Security and Applications,” Springer, 2008.
0001 1.1070
0010 1.1566 2. Rankl W., Effing W., “Smart Card Handbook,” 3rd
0011 1.1961 edition, John Willey and Sons, 2003.
0100 1.2286 3. Kocher P. C. , Jaffe J. , and Jun B. , “Differential
0101 1.2059 power analysis,” in Proc. of Advances in Cryptology
0110 1.2059 (CRYPTO’99), , 1999; pp. 388-397.
0111 1.0909 4. Rabaey J. M., “Digital Integrated Circuits: A Design
1000 1.5860 Perspective,” Prentice Hall, 1996.
1001 1.0213
5. Djukanovic M. , Vujicic V., “Influence of imple-
1010 1.1225
mented technology on e-payment systems security,”
1011 1.2777 OLS Journals Special Issue on Mobile Learning, E-
1100 1.2914 Society & E-Management, 2011.
1101 1.3383
6. Djukanovic M. , Giancane L., Scotti A. Trifiletti, “Im-
1110 0.9971
pact of Process Variations on LPA Attacks Effective-
1111 0.9853 ness,” in Proc. of International Conference on Com-
puter and Electrical Engineering (ICCEE09) , 2009.
7. Djukanovic M. , Giancane L., Scotti G., Trifiletti
A., Alioto M., “Leakage Power Analysis Attacks:
Effectiveness on DPA Resistant Logic Styles under
Process Variations,” in Proc. of IEEE International
Symposium on Circuits and Systems (ISCAS2011),
2011; pp. 2043-2046.
8. Pedroni V. A., “Circuit Design with VHDL,” MIT
Press, 2004.
9. “Data Encryption Standard,” in FIPS publication
46, National Bureau of Standards, U.S. Department
of Commerce, 1977.
Figure 6. Results of differential current analysis
10. Anderson R. , Biham E., and Knudsen L., “Serpent:
attack depending on key_value A proposal for the Advanced Encryption Standard,”
National Institute of Standards and Technology, 1998.
4. Conclusion 11. Cummings C. E., “State Machine Coding Styles for
Synthesis,” Sunburst Design, 1998.
This paper shows the realistic possibility of ex-
ploiting dynamic currents in order to detect and
reveal secret key in a cryptographic hardware. A Corresponding author
simple model of cryptographic core with charac- Milena Djukanovic,
Faculty of Electrical Engineering,
teristics of Serpent cryptographic algorithm has
University of Montenegro,
been VHDL designed and used for testing. After Montenegro,
FPGA implementation of crypto-core, with the us- E-mail: milenadj@ac.me
In the region of former Yugoslavia, in all constitu- of Electrical Engineering, master postgraduate
ent countries, there are study programmes of me- studies, study programme Energetics and Auto-
chatronics: Maribor University, Slovenia, Faculty mation, course Automation and course Industrial
of Mechanical Engineering, interdisciplinary study electronics there is also an elective subject of Me-
programme - Mechatronics [2, 3]; School Centre chatronics with 5 ECTS.
in Celje, Slovenia, Secondary Vocational School, Higher education institutions are responsible
study programme - Mechatronics [4]; Polytechnic for technical, technological and economic de-
of Zagreb - Undergraduate professional study in velopment of a country. Their duty is to follow
Mechatronics [5]; Karlovac University of Applied global technological developments and contrib-
Sciences, Croatia, Mechatronics [6]; Secondary ute to economic development of the state. They
Technical School in Bjelovar, Croatia, Vocational are responsible for the development of education
study - Mechatronics [7]; University of Banja Luka, system which should educate innovative, creative
Bosnia and Herzegovina, Faculty of Mechanical and inventive engineers who are able to cope with
Engineering [8]; University of Tuzla, Bosnia and demands and needs of modern industry. We are of
Herzegovina, Faculty of Mechanical Engineering, the opinion that education in the field of mecha-
study department of Mechatronics, undergraduate tronics is of vital importance to the society, and
[9] and postgraduate studies [10]; Faculty of Techni- at the Faculty of Mechanical Engineering, Uni-
cal Sciences, University of Novi Sad, Serbia, under- versity of Montenegro, we initiated the procedure
graduate academic studies, master academic stud- to establish study programme of Mechatronics.
ies, doctoral academic studies, study programme of In order for the programme to be adequately de-
mechatronics [11]; Technical Faculty Čačak, Uni- fined, we have conducted a research of the needs
versity Kragujevac, Serbia, undergraduate academic of Montenegrin industry for Engineers of Mecha-
studies of Mechatronics [12] and study programme tronics and what skills they should possess.
of master academic studies of Mechatronics [13];
Faculty of Mechanical Engineering of the Univer- 4. Number of Engineers of Mechatronics in
sity of Niš, Serbia, study course of Mechatronics Montenegro
[14]; High Technical School of Vocational Studies,
Subotica, Serbia, study programme of Mechatronics Records of the Employment Agency of Mon-
is in the process of opening [15]; University of “St. tenegro states there are no unemployed Engineers
Cyril and Methodius“ in Skopje, Macedonia, Fac- of Mechatronics which got their degrees at foreign
ulty of Mechanical Engineering, academic 4-year universities. Additionally, in 31 wood processing
study programme of Mechatronics [16] and post- and furniture factories, 17 IT companies, around 80
graduate studies [17], etc. companies dealing with food (fruit, fish, vegetable
Analysis and comparison between the men- and meat processing, production of oils, bread, con-
tioned study programmes of mechatronics, and fection, milk, beverages, bottled water), 71 com-
similar studies all around the world, particularly panies producing electrical and machine elements,
in Europe, have shown that there are differences Aluminium Plant Podgorica (KAP), Tobacco Plant
between study concepts influenced by industrial Podgorica (DKP), Electric Company, Oil industry,
needs and demands. For world leading universi- Chemical industry, pharmaceutical industry, (Hemo-
ties with strong connexion and cooperation with mont Podgorica), Public Water Supply Company,
the industry it is normal to change study plans ac- i.e. in all the companies registered in Montenegro
cording to industrial needs. there are no employed engineers of mechatronics.
University of Montenegro has not still fully
recognised the need for the education in the field 5. Needs of the Montenegrin industry for
of mechatronics. At the Faculty of Mechanical Engineers of Mechatronics
Engineering, postgraduate specialist studies, Pro-
duction Mechanical Engineering, course Flexible With a view to investigating needs of the Mon-
Automation there is an elective subject of Mecha- tenegrin industry for engineers of mechatronics,
tronics with 4.5 ECTS credits, and at the Faculty the Faculty of Mechanical Engineering organised
Round table “Needs of the Montenegrin econ- On the Round table, 11 questionnaires were com-
omy for mechatronics engineers”. Representa- pleted, while 19 of them were completed via mail
tives from the field of economy expressed their or fax. The questionnaire was filled by competent
opinions regarding the knowledge necessary for company managers (owners, CEOs, technical direc-
modern engineers, according to the needs of their tors, heads of different sectors, etc.) and appropriate
respective companies. Additionally, they put their experts (mechanical and electrical engineers).
remarks and suggestions into a questionnaire.
The questionnaire consists of two parts. Part tain existing equipment from both mechanical and
I of the questionnaire, question 1-5, addresses the electrical engineering aspects. This point was em-
industry needs for mechatronics engineers, LLL phasised during Round table.
courses and mechatronics master studies graduates. Answers to questions 2 and 3 showed what
The largest three companies gave multiple profile of future engineers of mechatronics com-
answers to the question number 1, i.e. they need panies want to employ.
experts in mechatronic and mechanical engineer- Forth question was related to the readiness of
ing, and mechatronics and electrical engineering. the companies to invest into additional education
87% of companies consider that modern engineers of their employees through LLL courses. Two of
need multidisciplinary knowledge from the field the companies with less than 20 employees an-
of mechanical, electrical engineering and IT. swered they do not need a specialised training for
Answer to the question number two was that all mechatronics engineers, and two companies did
of the companies need engineers of mechatronics not give definitive answers. Remaining 26 compa-
now or in the future. nies (87%) has positive opinion in relation to this
Although it was necessary to choose one answer issue, and 17 of them think they will have the need
to the question number three, 3 companies with for specialised training of their engineers from the
more than 100 employees, chose multiple answers filed of mechatronics, but sometime in future. Oth-
regarding the fields for which they need engineers er 8 companies already feel the need for additional
of mechatronics, which is understandable and ac- education of their enginner when it comes to me-
ceptable as an answer. Lowest number of answers chatronics. 77% of companies consider it useful if
for new product development can be interpreted their engineers would continue their education on
through the context of status and structure of the postgraduate studies of Mechatronics.
Montenegrin industry, in which a small number of Answers fro the first part of the questionairre
companies deal with development of new techni- showed that Montenegrin industry needs engineers
cal products. Most of the companies want engi- of mechatronics, and showed that companies support
neers capable of applying advanced technologies specialised trainings for their engineers from the filed
or improving existing processes. Furthermore, the of mechatronics and continued education of their en-
companies want engineers who are able to main- gineers on postgraduate studies of mechatronics.
Table 2. Part I of the questionnaire with answers
Question 1. What type of knowledge should modern engineers have? No. of answers
specialised knowledge only in mechanical engineering 4
specialised knowledge only in electrical engineering 2
specialised knowledge only in information technologies 1
Interdisciplinary knowledge in mechanical engineering, electrical engineering and information
26
technologies
Question 2. Do you think that your company might need mechatronics engineers?
12 Yes 18 Yes, in future 0 No 0 I don’t know
Question 3. Which department of your company would have a need for mechatronics
No. of answers
engineers?
new product development 4
new advanced technology application 12
automation of existing processes 7
maintenance 10
Question 4. Do you have a need for specialised training for your engineers in mechatronics or related fields?
9 Yes 17 Yes, in future 2 No 2 I don’t know
Question 5. Would you benefit if your engineers could continue their education in Mechatronics master
studies?
10 Yes 13 Yes, in future 3 No 4 I don’t know
Part II of the questionnaire (questions 6, 7 and given answer is graded as very important - (5) to
8) helps in creating the study programs according insignificant - (1).
to the industry needs. The 6th question refers to Answers to the question number 6 clearly
the engineers in general. The importance of every showed the companies consider that the most
Insignificant
importance
No answer
important
important
important
important
Everadge
What particular knowledge would you request for
not so
very
less
6.
employment of an engineer?
Insignificant
importance
No answer
important
important
important
important
Avarage
What specific knowledge would you expect from a
not so
very
less
7.
Mechatronics engineer?
importance
important
important
important
important
Without
Avarage
answer
What are the skills which you would want your new
not so
very
less
8.
engineers to have?
important for their engineers is interdisciplinary Answers to the questions gave basic information
knowledge from the field of mechatronics. 73% regarding the skills which are necessary for en-
of them graded that knowledge as very important, gineers of mechatronics on the labour market of
others graded it as important. Montenegro. It was the basis for the establishment
Four companies did not provide answers re- of Study Programme of Mechatronics on the Fac-
garding the grading of advanced knowledge from ulty of Mechanical Engineering in Montenegro.
mechanical and electrical engineering and IT.
Their indecisiveness can be interpreted as an ex- 6. Discussion and conclusion
clusive support to interdisciplinary knowledge in
the field of mechatronics. Other companies graded Recognising the need for the education in the
the importance of advanced knowledge from the field of mechatronics, the Faculty of Mechanical
field of mechanical engineering with 4.23, from Engineering, decided to open Mechatronics stud-
electrical engineering 4.11, and IT 4.38. ies with the structure 3+2. This structure was cho-
It is interesting that 25 companies marked ad- sen in accordance to development trends in this
vanced knowledge of IT as very important, and that field in Europe with exactly the same structure
only one company put that modern engineers should 3+2 (analysis of 87 European universities, [18]).
have special knowledge only in this field. It clearly As opposed to other, fundamental engineer-
shows the companies consider that multidisciplinary ing fields, for the successful development of this
skills are more important to specialised ones. study programme it is of vital importance to es-
One or two companies did not give answers to tablish cooperation between experts (professors)
some sub questions under question 7, so that aver- from different disciplines in order to: create opti-
age mark related to the importance of specific skills mal blend of courses and skills from the fields of
is calculated out of the number of provided answers. mechanical, electrical engineering, electronics, IT,
The highest mark was given to particular skills prepare teaching materials and new laboratory ex-
related to electro-mechanical components function- ercises and experiments from the field of mecha-
ality (4.67), specification and application of sensors tronics. Therefore, Study Programme of Mecha-
and actuators (4.38), machines and process control tronics (undergraduate and postgraduate academic
(4.27), law regulation and standards awareness studies) at the Faculty of Mechanical Engineering
(4.21), CAD programs (4.03) and controllers pro- is developed as a new study programme in coop-
gramming (4). It shows the highest marks were giv- eration with the Faculty of Electrical Engineering
en to knowledge necessary to use mechatronic sys- of the University of Montenegro.
tems. Slightly lower marks (ranging from 3.32 to Study Programme of Mechatronics, under-
3.93) were given to specific skills which are more graduate and master postgraduate studies, at the
connected to the development of mechatronic prod- Faculty of Mechanical Engineering is in the ac-
ucts, which is the reflection of the abovementioned creditation process. Plan and programme of the
condition of Montenegrin industry. studies, after the accreditation, will be available
Average mark related to importance of every on our website www.mf.ac.me.
skill of new engineers which are listed under ques-
tion 8 is above 4, which shows that they are con- Acknowledgement
sidered as very important by the companies. Above
mark 4.5 are: solving problems skills, team work Study Programme of Mechatronics at the Fac-
ability, practical solving of engineering problems, ulty of Mechanical Engineering of the University
comprehension of new advanced technologies and of Montenegro was developed through Tempus IV
computers and internet use, which shows that skills project 158644 – JPCR “Development of Region-
leading to fast reaction and problem solving are al Interdisciplinary Mechatronic Studies”-DRIMS
very useful. [19]. The project, apart from other things, enabled
The survey and questionnaire showed that us to adequately equip laboratories, development
Montenegrin companies strongly support, we can of specific courses, teaching materials and training
say, demand education of mechatronics engineers. of the teaching staff.
References
1. hochschulkompass.de, Stand 09/2007
2. http://www.fs.uni-mb.si/podrocje.aspx?id=717
3. http://www.fs.uni-mb.si/podrocje.aspx?id=812
4. http://www.sc-celje.si/vis/programi/Strani/
Izobra%c5%beevalni%20programi.aspx
5. http://www.tvz.hr/strucni-studij-mehatronike/
6. http://www.educentar.net/HR/Programs/De-
tails/10248/Strucni-studij-mehatronike/
7. http://vtsbj.hr/visoka-skola/
8. http://www.scribd.com/doc/59474165/Nastavni-
Planovi-Prvog-i-Drugog-Ciklusa-Studija
9. http://www.mf.untz.ba/index.php?option=com_conte
nt&view=category&layout=blog&id=4&Itemid=23
#Mehatronika
10. http://www.mf.untz.ba/index.php?option=com_cont
ent&view=article&id=40&Itemid=29
11. http://www.ftn.uns.ac.rs/index.php?mode=view&ac
tion=document&document=282
12. http://www.tfc.kg.ac.rs/smerovi/mehatronika
13. http://www.tfc.kg.ac.rs/studije/master-mehatronika
14. http://www.masfak.ni.ac.rs/sitegenius/topic.php?id=94
15. http://www.vts.su.ac.rs/sr/study/mechatronika
16. http://www.mf.ukim.edu.mk,
17. http://www.mf.ukim.edu.mk,
18. http://vvv.etc.tuiasi.ro/reforma/eieee.pdf
19. www.tempus-drims.eu
cast signals for customer knowledge management adapted to each acoustic class (one for music and
purposes, these input broadcast audio signals have one for speech) using eight Gaussian mixtures per
to be divided and classified into conversational class.
speech and music and then annotated. The clas-
sification result can be used for different purposes, 2.3. Speaker recognition
such as CRM-statistics or further processing of
speech (automatic speech recognition and tran- With respect to speaker recognition, two do-
scription etc.) or music identification (genre detec- mains of research are of actual interest, identifica-
tion, music identification etc.). tion and verification [43], [44]:
In the typical speech and music signals spectra, In speaker identification, the task is to deter-
humans can clearly recognize the difference be- mine which of a group of known speakers or
tween these two acoustic classes. Typically, differ- voices best matches a given input voice sample.
ent kinds of speech have certain common features; Speaker identification can be done for two known
for example, most speech energy is concentrated scenarios. In the so-called closed-set mode, the
at the lower end of the frequency spectrum (usu- scenario assumes that all speakers in the given au-
ally below 900 Hz). Depending on the type of mu- dio sample come from a group of known voices.
sic, the frequency spectrum can vary widely. This Otherwise, the system operates in an open-set sce-
depends on the musical genre. Because new do- nario where speakers who are ‘imposters’ and do
mains for segmentation are constantly emerging, not belong to a set of known voices can reduce the
speech/music discrimination and segmentation is accuracy of identification. Speaker identification
an active field of research. To date, a great deal is used for multiple applications, in forensics, in
of research effort has been put into speech/ music the adaptation of models for speech recognition,
segmentation [37], [38], [39], [40]. and data indexing.
Many nowadays known segmentation systems To verify that a given sample belongs to a par-
perform differently so that research in the field of ticular speaker from a known group, speaker veri-
systems features is still one of the main factors fication is used in order to determine whether a
in final performance [40]. Several approaches to person is who they claim to be based on a sample
speech/music discrimination have been proposed of their voice. Speaker verification is the basis for
by many authors [41]. They conducted various commercial speaker recognition applications. The
experiments with different speeches and music open-set task can be considered as the merger of the
signals and reported an accuracy of between 90% closed-set identification and open-set verification
and 94%, and used up to 13 features to charac- tasks. Up to now speaker verification is used for
terize distinct properties of speech and music sig- security applications such as controlling telephone
nals [42]. To find the appropriate system features access to banking services and broadcast news
which best fit to the customer knowledge manage- speaker identification, where verification is used
ment approach is of highest importance. to verify an identification claim.
Therefore the classification process can be per- The speaker recognition procedure performs
formed with a GMM classifier which uses a prob- speaker identification and verification through nat-
ability estimate for each model (speech and music ural human modality speech. The speaker recogni-
in our case) to measure how well the calculated tion process can be classified into text-dependent
feature is modelled by trained Gaussian clusters. and text-independent methods [45]. The former
A feature is assigned to whichever class is the best requires the speaker to provide samples from the
model of that feature. On the basis of the prob- same text for both training and recognition, while
ability values, the frames are classified, and in the the latter does not depend on a specific text. In this
segmentation step they are grouped into time an- system, a text-dependent speaker recognition pro-
notated segments according to predefined rules cess is implemented through a speech recognition
for segment duration. Training sets of dedicated technique. A typical speaker recognition model
training speech and music broadcast databases are consists of a feature extraction module and a pat-
used to train GMM models whereby one model is tern matching module [46]:
– The first module is the feature extraction where wj is the mixture weight of the particu-
module. The module estimates a set lar Gaussian and Ф(x;θj) is the mixture compo-
of features from the speech signal that nent. Input vectors are formed by using a defined
constitute speaker-specific information. The speaker training database, which is further used to
specific information is the result of complex estimate maximum probability model parameters
transformations occurring at various levels by using the iterative expectation maximization
of speech production: semantic, phonologic, (EM) algorithm.
phonetic and mostly acoustic [47]. To minimize the influence of background
– The second module is the pattern matching sounds which are present in different utterances
module, which is responsible for comparing of the training sessions, background modeling is
features derived from the feature extraction used to train a single spea-ker-independent GMM
module with the speaker models [48]. background model, also called a universal back-
ground model (UBM) [51].
In the process of verification, this module out- The verification process is then performed on
puts a similarity score between the test sample and the speech utterance x via a probability ratio test,
the claimed identity. The final module handles the where a hypothesis tests of two hypotheses are
decision process [46]. performed [52]:
Speaker recognition is a process whereby the a. Utterance x is from the hypothesized
speaker claims to be a certain person and the voice speaker,
is used to verify this claim. It is based on a Gaussian b. Utterance x is not from the hypothesized
mixture procedure, using Gaussian mixture mod- speaker
els (GMM) for speaker modeling [49]. A GMM is
defined with a combination of unimodal Gaussian The test between these two hypotheses is de-
densities, where a Gaussian density for a d-dimen- fined as:
sional feature input vector is defined as [49] [50]:
................ (6)
......... (1)
ect plan with detailed work packages. In this case mutual benefit. A precondition for this is a mixed
the research collaboration is part of an interna- project team of men and women and scientists and
tional R & D project on e-business and new busi- practitioners of the university and the industry.
ness models between university and enterprises in
the UK and Austria. The objective of the research 3.2. Measurable work packages
project is to identify, evaluate and develop new in-
novative strategies, methods and tools for CKM In order to make the research manageable and
with the integration of speech recognition func the success and costs measurable, the research
tions. The specific research questions and objec collaboration should be divided into several work
tives addressed by the research collaboration are: packages with the commitment of resources of
– What are the main failures, barriers and both, university and enterprise members, eg. WP 1
success factors in CKM in the U.K. in “Literature analysis”, WP 2 “Requirements analy-
comparison to Austria? sis”, WP 3 “Design model”, WP 4 “Gender issues
– What are the requirements regarding speech analysis”, WP 5 “Dissemination activities” and WP
recognition functions that can help in best 6 “Research collaboration/project management”, as
capturing customer knowledge from speech summarized in the following example project plan:
data?
– Which business model is appro priate for
this e-business domain?
Based on the findings of the literature and with Figure 3. Processing chain
respect to the TOM model, a technology and cul-
tural framework should be developed which de- Thus the involved international partner’s prima-
termines the contribution of speech recognition ry motivation is to understand and analyze current
to the CKM. The output of this WP 1 is a CKM usage, experiences, reasons for not using speech
framework with a special focus on speech recog- recognition technologies, possible improvements
nition, the preconditions, implications and ben- and the functions [62] and methods that are needed
efits, in order to determine the speech recognition to define CRM-statistics and reports.
contribution to the CKM. The output of this WP is a research study. This
Work package 2, the requirements engineering raises the question as to whether there is a need
phase, manages the identification and documen- to develop a radically new business model, or if
tation of system requirements and methods [59], Porter’s strategic model from the 1970’s [63] can
[60]. Many frameworks and models have been be used even in a world of rapid change and ex-
suggested in the literature [61], [59]. For the pur- treme complexity. In affirmation of this, the author
pose of this research collaboration, an extensive finally proposes the first design model aspects that
review of the literature will result in the selection could support this development in the following
of the best suited requirements engineering frame- work package.
work. Drawing on this framework, the research Work package 3, design model aspects, evalu-
study will conduct a needs assessment by under- ates speech recognition software considering the
standing the existing stakeholder’s needs, condi- results of the interviews. It will provide an idea of
tions and environments, which would ensure the why it is difficult to capture speech and transform
acquisition of the relevant basic knowledge for an- it into text in terms of the impact on operational
alyzing and designing parameters and intelligent efficiency and effectiveness. It is of primary inter-
methods for speech recognition, which is only one est to analyze if the algorithms which are available
part of the knowledge processing chain, as seen in satisfy the relevant requirements.
the next figure: Work package 4 is dedicated to summarizing the
gender aspects of the research collaboration. At uni-
versities, the research is directly affected by gender
4. Footnotes
aspects [64] because subjects of the requirements
Footnotes - comments, explanations, etc., to analysis are people, and thus the gender dimension
the text should NOT be used. of the research undertaken in this work package
The research team intends to identify the level has to be arranged in a gender-sensitive balanced
of adoption of such systems, applications, methods sample of interview partners. The research in this
and algorithms by organizations and to identify the package is technology-driven, and therefore gender
currently perceived gap in the value provided by aspects should be considered. Men and women be-
such systems. The identification of such a gap is ex- have differently when using or evaluating technolo-
tremely helpful in understanding factors that affect gies, functions or technological methods.
use and in focusing on the services which people A very important task is to disseminate the re-
seek in order to make the new technology useful. search results. The focus here is on the promotion
of the research results to all types of public, the The management of the relevant data will
scientific community and other interested people. be carried out as shown in figure 3 “Processing
In WP 6, collaboration/project mana gement, Chain”, which transfers speech into text. This text
the optimal collaboration environment has to be will be refined and analysed in order to receive ef-
established with open co mmunication between ficient reports and customized statistics. With data
all team members, access to all information while collected from various decentralized sources and
running the collaboration, honest effort towards specific post processing technologies, a wide area
resolving tasks and all necessary resources and ex of solutions could be covered by this research:
pertise. As an international research collaboration – Market research – measuring trends and the
must give value to each partner, it must also have popularity of a particular product or service
financial benefits. on the basis of appearances in the media,
In order to reduce costs parts of the research such as internet, radio or television [65],
collaboration can be executed internationally and – CRM supporting statistics,
can be organized and managed with electronic me- – Public opinion research – for organizations
dia. With the help of these media the experience which conduct public opinion research,
gained at different places and the research results since they can obtain data for particular
will be integrated into one research collaboration relevant keywords under research, the
base. The main work packages to be carried out by frequency of recurrence and the positive or
the project team are (see the chart below) and can negative context of occurrence.
be implemented at different locations. – Control of commercials for advertising
The main activities in this research plan which companies which want to monitor their own
are carried out internationally are the development ads and those of the competition objectively
of a data interface, a query interface, the integra-
tion of the chosen speech recognizer and speech2 After completing the research activities the en-
text correction, and the integration of all the com- terprise transfers the research results and creates
ponents into the overall architecture, as is shown commercial products and services.
in figure 5 on the next side.
References
1. Polanyi M. The Tacit Dimension, London. 1966.
2. Hoffmann A.: Proposing a Framework for Frequent-
ly used Terms in Knowledge Management. In: Proc.
Of I-Know’08 and I-Media’08, Austria, September
3-5, 2008; pp. 267-275.
3. Polanyi M. Implizites Wissen, Frankfurt am Main. 1985.
4. Karagiannis D., Woitsch R.: The PROMOTE ap-
proach: Modelling Knowledge Management Pro-
cesses to describe Knowledge Management Systems.
In: Gronau, N. (eds.): Wissensmanagement – Strate-
gien, Prozesse, Communities, Aachen, Shaker, 2002;
Figure 5. Internationally distributed research pp. 35 – 52.
tasks: architecture of activities of an internation-
5. Müller J., Abecker A., Hinkelmann K., Maus H.
al research collaboration Geschäftsprozessorientiertes Wissensmanagement,
Springer. 2002.
4. Conclusion 6. Gronau N.: Sprache zur Modellierung wissensinten-
siver Geschäftsprozesse. In: Industrie Management,
This paper has shown that a successful imple- 2003; 19(3): pp. 9 – 13.
mentation of customer knowledge management
7. Riempp G. Integrierte Wissensmanagement-Systeme.
requires a concrete business case based on proper
Architektur und praktische Anwendung, Berlin,
planning with a forecast of the value that must Springer. 2004.
be acceptable to the university requirements and
the industry needs. Without this the research col- 8. Heisig P.: The GPO-WM® Method for the Inte-
gration of Knowledge Management into Business
laboration will fail. Processes. In: Proceedings of I-Know’06, Austria,
During this collaboration enterprises gain ac- September 6-8, 2006; pp. 331-337.
cess to new ideas and technology know-how and
utilise the academic researcher’s scientific net- 9. Prilla M., Herrmann Th.: Semantically Integrating
Heterogeneous Content: Applying Social Tagging as
work. They can spread risks and widen the range a Knowledge Management Tool for Process Model
of the research horizon and have the chance to Development and Usage. In: Proceedings of I-
recruit the brightest young student talents. They Know’07, Austria, September 5-7, 2007; pp. 16-24.
receive both guidance and concrete practises, 10. Lohmann S., Niesenhaus J.: Towards Continuous
methods, models and tools. Integration of Knowledge Management into Game
The university can better identify the area of Development. In: Proc. of I-Know’08 and I-Me-
competitive research and development and create dia’08, Austria, September 3-5, 2008; pp. 37-44.
practical models for solving research questions. 11. Pettersson U.: Success and Failure Factors for
KM: The Utilization of Knowledge in the Swedish
Armed Forces. In: Proceedings of I-Know’08 and I-
Media’08, Austria, September 3-5, 2008; pp. 45-52.
12. Lieberman H.: Managing Knowledge that Every-
body Knows. In: Proc.of I-Know’08 and I-Me-
dia’08, Austria, September 3-5, 2008; p. 7.
13. Lucier C.: When knowledge adds up to nothing –
Why knowledge management fails and what you
can do about it. In: Developed and Learning in Or-
ganizations, 2003; 17(1): pp. 32-35.
14. Cucu C., Rîşteiu M.: The Leap to Knowledge Man-
agement for Universities in Developing Economies.
In: Proc. Of I-Know’08 and I-Media’08, Austria, 27. Chua A., Lams W.: Why KM projects fail: a multi-
2008; pp. 142-149. case analysis. In: Journal of Knowledge Manage-
ment, , 2005; 9(3): pp. 6-17.
15. Mödritscher F., Hoffmann R., Klieber W.: Integra-
tion and Semantic Enrichment of Explicit Knowl- 28. Holden N.: Knowledge Management: Raising
edge through a Multimedia, Multi-source, Metada- the Spectre of the Cross-cultural Dimension. In:
ta-based Knowledge Artefact Repository. In: Proc. Knowledge and Process Management, 2001; 8(3):
of I-Know’07, Austria, September 5-7, 2007; pp. pp. 155-163.
365-372.
29. Moffet S. et al: Developing a Model for Technology
16. Corner I., Hinton M.: Implicit personal contracts and Cultural Factors in Knowledge Management:
and actor-group consensus in CRM implementa- A Factor Analysis. In: Knowledge and Process
tions – Evidence for their role in influencing suc- Management, 2002; 9(4): pp. 237-255.
cess. In: Proceedings of the 2nd European Confer-
ence on Information Management and Evaluation, 30. Schein E. H. Organizational Culture and Leader-
11 – 12. Sept. 2008, London, 2008; pp.89-98. ship, Oxford. 1991.
17. Bullinger H.-J., Wörner K., Prieto J. Wissensman- 31. Hall E. T., Hall M. R. Understanding Cultural Dif-
agement heute: Daten, Fakten, Trends. Fraunhofer ferences, 1990.Yarmouth.
IAO-Studie, 1997. 32. Schmidt S. Multikulturalität in der internationalen
18. Bjørn-Andersen N., Rasmussen L. B., Rasmussen Unternehmung, Göttingen. 1996.
S.: Web 2.0 Adoption by Danish Newspapers – Ur- 33. Weissenberger-Eibl M. A., Spieth P.: Knowledge
gent Need for New Business Models? In Proc.of Transfer: Affected by Organizational Culture?. In:
I-Know’08 and I-Media’08, Austria, September 3-5, Proc.of I-Know’06, Austria, 2006; pp. 68-75.
2008; pp. 185-193.
34. Ölçer F.: Practices of Knowledge Management
19. Oberbichler A., Böszörmenyi L.: Print in 4D User in Companies: A Turkey Survey. In: Proc. of I-
Interfaces. In: Proceedings of I-Know’07, Austria, Know’07, Austria, 2007; pp. 253-262.
September 5-7, 2007; pp. 376-383.
35. Thomas A. Psychologie interkulturellen Handelns,
20. Alavi M., Leidner D.: Review knowledge manage- 1996. Göttingen.
ment and knowledge management systems: con
ceptual foundations and research issues. In: MIS 36. Thomas A. et al (eds.) Handbuch interkulturelle
Quaterly, 2001;25(1): pp. 107-136. Kommunikation und Kooperation, Band 1: Grund-
lagen und Praxisfelder, Göttingen. 2003.
21. Bullinger H.-J., Warschat J., Prieto, J., Wörner, K.:
Wissensmanagement – Anspruch und Wirklichkeit: 37. Atal B., Rabiner L.: A Pattern Recognition Ap-
Ergebnisse einer Unternehmensstudie in Deut proach to Voiced-Unvoiced-Silence Classification
schland. In: Information Management, 1998;1: pp. with Applications to Speech Recognition. In: IEEE
7-23. Trans. on ASSP, Vol. ASSP-24, 1976; pp. 201-212.
22. Pawlowsky P., Forslin J., Reinhardt R.: Practices 38. Siegel L.: A Procedure for using Pattern Clas-
and Tools of Organizational Learning. In: Dierkes, sification Techniques to obtain a Voiced/Unvoiced
M. et al (eds.): Handbook of Organizational Lear Classifier. In: IEEE Trans. on ASSP, Vol. ASSP-27,
ning and Knowledge, Oxford University Press, 1979; pp. 83- 88.
2001; pp. 775-793.
39. Burrows T. L.: Speech Processing with Linear and
23. Ploder C., Fink K.: An Orchestration Model for Neural Network Models, Ph.D. thesis, Cambridge
Knowledge Management Tools in SMEs. In: Proc. University Engineering Department, U.K. 1996.
of I-Know’07, Austria, 2007; pp. 176-183.
40. Bachu R. G., Kopparthi S., Adapa B., Barkana B.
24. Simon H. A. Models of Bounded Rationality, MIT D.: Separation of Voiced and Unvoiced using zero
Press Cambridge. 1982. crossing rate and energy fo the speech signal, http://
www.asee.org/documents/zones/zone1/2008/student/
25. Happel H.-J., Stojanovic L.: Analyzing Organiza- ASEE12008_0044_paper.pdf, accessed 02.02.2012
tional Information Gaps. In: Proc. of I-Know’08
and I-Media’08, Austria, 2008; pp. 28-36. 41. Ajmera J., McCowan I., Bourlard H.: Speech/music
segmentation using entropy and dynamism features
26. Semmelrock-Picej M. Th. TOMI-Kunden in a HMM classification framework, Speech Com-
wissenschlingenmodell, 2008. Klagenfurt. munication, 2003;40(3): pp. 351–363,
42. Scheirer E., Slaney M.: Construction and evalua- 54. Frisk J.: Interpretative IT Evaluation in the public
tion of a robust multifeature speech/music discrimi- sector: two steps forward and one backwards. In:
nator. In: Proc. of the IEEE International Confe Proceedings of the 2nd European Conference on
rence on Acoustics, Speech and Signal Processing Information Management and Evaluation, Septem-
(ICASSP ’97), 1997;2: pp. 1331–1334. ber, London, 2008; pp. 177-184.
43. Kinnunen T., Li H.: An Overview of Text-Indepen- 55. Rantapuska T., Ihanainen O.: Acquiring Informa-
dent Speaker Recognition: from Features to Super tion Systems through Organisational Learning. In:
vectors. In: Speech Communication, 2010;52(1): Proceedings of the 7th European Conference on
pp. 12-40. Research Methodology for Business and Manage-
ment Studies, London, 2008; pp. 363-370.
44. Reynolds D. A., Rose R. C.: Robust Text-Indepen-
dent Speaker Identific ation Using Gaussian Mixture 56. Lagsten J.: Stakeholder Based Method for Evaluat-
Speaker Models. In: IEEE Transactions on Speech ing Information Systems – The VISU Method. In:
and Audio Processing, 1995; 3(1): pp. 72-83. Proc. of the 4th European Conference on Informa-
tion Management and Evaluation, Portugal 2010;
45. Saeed K., Nammous M. K.: A Speech-and-Speaker pp. 200-211.
Identification System: Feature Extraction, Descrip-
tion, and Classification of Speech-Signal Image. In: 57. Kern E.-M. et.al.: Knowledge barriers in CD&E
IEEE Trans. on Industrial Electron., 2007; 54(2): Projects in the German Federal Armed Forces. In
pp. 887-897. Proceedings of I-Know’08 and I-Media’08, Austria,
September 3-5, 2008; pp. 53-60.
46. Karpov K. Efficient Speaker Recognition for Mobile
Devices, Dissertation, Finnland. 2011. 58. Lamel L. et al.: Speech transcription in multiple
languages. In: IEEE, 2004; pp. 757-760.
47. Atal B. S.: Automatic Recognition of Speakers
from Their Voices. In: Proceedings of the IEEE, 59. Loucopoulos P., Karakostas V. Systems Engineering
1976;64: pp. 460–475. Engineering London, Mc Graw-Hill, 2005.
48. Campbell J. P.: Speaker Recognition: A Tutorial. 60. Sommerville I., Sawyer P. Requirements Engineer-
In: Proc.of the IEEE, 1997; 85: pp. 1437–1462. ing: A good practice guide Chichester, John Wiley
and Sons, 1997.
49. Reynolds D. A.: An Overview of Automatic Speaker
Recognition Technology. In: Proceedings of IEEE 61. Pohl K.: The Three Dimensions of Requirements
International Conference on Acoustics, Speech, and Engineering: A framework and its applications. In:
Signal Processing, Orlando, USA. 2002. Information Systems, 1994; 19: pp. 243-258.
50. Prasad K., Lotia P. , Khan M. R.: A Review on 62. Stoll M.: Workplace Process Integrated Learning
Text-Independent Speaker Identification Using and Knowledge Organization. In: Proceedings of
Gaussian Supervector SVM, in International Jour- I-Know’07, Austria, 2007; pp. 273-280.
nal of u- and e-Service, Science and Technology, 63. Porter M.: The Five Competitive Forces that Shape
March 2012,5(1): pp. 71-82. Strategy, Harvard Business Review. 1979.
51. Reynolds D. A., Quatieri T. F., Dunn R. B.: Speaker 64. European Commission: Gender in EU-funded re-
Verification Using Adapted Gaussian Mixture Mod- search, EUR 23857. 2009.
els. In: Digital Signal Processing Review Journal,
January 2000. 65. Pelzmann L., Malik C., Miklautz M.: The Critical
Mass of Preferences for Customization. In: Blecker
52. Bimbot F., Bonastre J.-F., Fredouille C., Gravier Th., Friedrich G. (eds.): Mass Customization, Con-
G., Magrin-Chagnolleau I., Meignier S., Merlin T., cepts – Tools – Realization, 2005; pp.327-331.
Ortega-Garcia J.: A Tutorial on Text-Independent
Speaker Verification. In: Journal on Applied Signal
Processing, 2004, pp. 430-451. Corresponding Author
Marija Th. Semmelrock-Picej,
53. Dawson L.: Active Exploration of Emerging
Klagenfurt University,
Themes in Interpretive Case Study Research: the
Klagenfurt,
“Evolutionary Case” Approach. In: Proceedings of
Austria,
the 7th European Conference on Research Method-
E-mail: maria.semmelrock-picej@aau.at
ology for Business and Management Studies, Lon-
don, 2008; pp. 125-136.
4. Related works and discussion In work [29] the authors compared machine
learning methods in forecast of the success in the
Most classification methods and classifiers
course (passed or failed) in Intelligent Tutor Sys-
mostly fit in data mining processes implemented
tems. For user knowledge modeling and forecast
in various environments. In case of their applica-
of student performance in tutor systems, the work
tion on the data extracted from the e-learning envi-
[30] describes the use of Bayesian networks.
ronment, the selection of an appropriate classifier
In work [31], an algorithm governed by the ge-
will mainly be influenced by the evaluation of ac-
netic programming grammar is used for forecasting
curacy and precision of the created classification
whether a student will fail or pass a specific LMS
model.
course through identification of activities that pro-
The use of traditional classification and re-
mote learning in the positive or negative sense, from
gression techniques in e-learning can be found in
the aspect of Multiple Instance Learning (MIL).
works [19,20,21].
The authors of [32] defines the framework of
Several regression techniques (decision trees,
software application development for the new
neural networks, linear regression, support vector
generation of educational systems. They conclud-
machines) have been used for forecasting student
ed that LMS development provides significantly
grades at the Hellenic Open University [22].
more information sources and information-gather-
The authors of [23] give comparison of dif-
ing methods.
ferent data mining algorithms in the process of
student classification for final grade forecasting
based on user data from the Moddle system. 5. Case study
The authors of [24] have analyzed specific be- For research described in this work we were
havior of students in a Moodle course. The work extracted data from the Computer Graphics LMS
describes the application of classifiers Neural Net- Moodle course held in the summer semester of the
works and Support Vector Machines (SVM) on school year 2010/11 at the School of Electrical
the data extracted from the log file of the analyzed Engineering and Computer Science Applied Stud-
Moodle course. ies in Belgrade. Electronic learning materials are
The use of artificial neural networks for ex- divided into several concepts: Tests for laboratory
traction of knowledge from the Moodle log file exercises, Moodle lessons, Self testing of student
is presented in work [25]. The information was knowledge, Semester knowledge checks. Students
combined with data on student final grades, and a could achieve the final score by taking the final
model for forecasting which students would com- exam in the paper form, held during the examina-
plete the course successfully was developed. tion period in the classroom.
In work [26] the authors compare different The goal of the classification process was to iden-
classification methods (decision trees, neural tify the patterns of student interaction with the of-
networks, Naive Bayes, instance-based learning, fered electronic material and to define the influence
logistic regression and support vector machines) they had on the grade achieved on the final exam.
with a genetic algorithm based on an induction The activities and behavior of all course par-
decision tree. From the discovered knowledge ticipants, students and teachers, are registered and
the authors derived short rules that explained and written in different tables of the relation database
forecast success or failure on the final exam. and in the event log. Transaction data from the re-
In work [27] the authors teach a neural network lation database are not a suitable source of data
for forecasting student performance in the course because data mining methods demand that all rele-
of informatics. To forecast the final grades they vant information for the analysis is grouped in one
use student results achieved during lessons, and table and organized at a certain detail level. This
they do not use grades obtained on the exam. summary table is made as a result of numerous
Thai-Nghe, N. and associates in work [28] preparatory operations such as extraction, group-
compare some techniques, using them for forecast ing, pooling, cleaning and transformation of data
of student performance. from the relation Moodle database.
Table 1. Discretization of attribute values of the analyzed table (Figure 1.a, 1.b, 1.c)
Attribute Attribute description Categorization of nominal values Labels
up to 50% bad
tests_ A sum of points obtained on tests for
between 50% and 80% good
exercises laboratory exercises
more than 80% excellent
up to 30% lessons low
lessons The number of read lessons between 30% and 60% medium
more than 60% high
Average points of all attempts of the up to 50% bad
preparatory
solving preparatory tests. between 50% and 80% good
tests (1, 2)
more than 80% excellent
up to 50% bad
Points obtained on the first and second
tests (1, 2) between 50% and 80% good
colloquium
more than 80% excellent
5 failed
6 passed
7 sufficient
grade Student grades on the final exam
8 good
9 very good
10 excellent
However, in the case of application of the Multi- Table 5. K-nearest classifier method
layer Perceptron classifier, the model was gener- Detailed accuracy by class Percent (%)
ated in 1.31 seconds, but the number of correctly Correctly classified instances 56.25
classified instances increased (72.32%), and we
Incorrectly classified instances 43.75
thus analyzed the model of this functional classi-
fier (Table 3). TP FP P F-M Class
Table 3. Multilayer Perceptron classifier model 0.71 0.19 0.62 0.66 fall
0.08 0.01 0.5 0.13 pass
Detailed accuracy by class Percent (%)
0.68 0.17 0.53 0.6 sufficient
Correctly classified instances 72.32
0. 7 0.22 0.54 0.61 good
Incorrectly classified instances 27.68 0 0 0 0 very good
TP FP P F-M Class 0 0 0 0 excellent
0.74 0.01 0.96 0.83 fall
0.62 0.01 0.89 0.73 pass 8. Comparison of accuracy of the applied
0.88 0.15 0.63 0.73 sufficient classifier evaluation
0.71 0.11 0.70 0.7 good
0.17 0 1 0.27 very good In Table 6 we presents evaluation of the ap-
1 0.06 0.36 0.53 excellent plied classification metods based on the common
criteria relevant for classification of data from the
7.3. Bayesian classifiers educational environment.
Table 6. Evaluation of the applied methods
To the analyzed set of data from the group of CCI TP FP P F-M
Bayesian classifiers we applied BayesNet, Na- Classification
(%) (%) (%) (%) (%)
ive Bayes, and Hidden Naive Bayes (HNB). The ID3 74 0.74 0.09 0.73 0.72
highest number of correctly classified instances MP 72 0.72 0.07 0.79 0.72
was generated in the case of the HNB classifier. HNB 69 0.69 0.10 0.7 0.67
Table 4 shows the values of other factors for the K-NN 56 0.56 0.16 0.51 0.51
evaluation of the HNB classification model.
Table 4. HNB classifier model Table 6 (Figure 2) shows that the highest per-
Detailed accuracy by class Percent (%) centage of correctly classified instances (74%) was
Correctly classified instances 68.75 generated with the use of the decision tree classi-
fiers, that is, ID3 classifier. However, the use of the
Incorrectly classified instances 31.25
Multilayer Perceptron function classifier generates
TP FP P F-M Class a negligibly smaller number of correctly classified
0.67 0.05 0.85 0.75 fall instances (Figure 2), and the value of the Precision
0.62 0.03 0.73 0.67 pass parameter is 0.79 (Figure 3), while F-Measure (Fig-
0.76 0.14 0.61 0.68 sufficient ure 4) has the same value in both cases.
0.87 0.2 0.62 0.72 good
0.17 0 1 0.27 very good
0 0 0 0 excellent
9. Conclusion
Classification techniques are widely used in tra-
ditonal education and modern educational technol-
ogies. The best classification results are achieved
when classifiers are trained on real data. The use of
classification methods for forecasting the learning
process successfulness in the e-learning environ-
ment opens a possibility for improvement of effi-
cacy, usefulness and adaptability of these systems.
In this work, with the use of four different sta-
Figure 3. Precision for ID3, MP, HNB, K-NN tistical techniques, we analyzed the accuracy of
classifier the created classification models for forecasting
the final exam grade based on the student activity
in the environment of the e-learning Moodle sys-
tem course. Selection of the appropriate classifier
was directed to creation of a model that would be
resistant to the occurrence of missing values and
outliers, and which would include all interdepen-
dencies between the class and other attributes. The
realization of this model is highly influenced by
data preparation and preprocessing.
Through an analysis and comparison of accura-
Figure 4. F-Measure for ID3, MP, HNB, K-NN cy results of the classifiers applied in this research
classifier we have found out that the most precise results
are achieved with the use of the decision tree ID3
Regardless of the fact that educational data are classifier.
mainly clean, the occurrence of outliers and miss-
ing values is unavoidable in most cases. A conse-
quence of this phenomenon is the appearance of
noise in the data, to which Bayesian and K-nearest
neighbor classifiers are especially sensitive. Deci-
sion tree classifiers can generate good results even
with the occurrence of missing values in the data,
but they are sensitive to data changes. In the de-
scribed study, most correctly classified instances
were obtained with the use of the ID3 decision tree
classifier, where its value of statistical measure
Precision was lower than in the case of the Mul-
tilayer Perceptron classifier. The higher value of
statistical measure Precision with the Multilayer
Perceptron classifier can be explained by the re-
sistance of neural network classifiers to noise and
incorrect inputs. Considering that neural networks
represent classifiers that generate more precise
models for big data sets, the number of correctly
classified instances is, however, slightly lower
when compared with the ID3 classification model.
35. http://www.cs.waikato.ac.nz/weka/arff.html
Corresponding author
Gabrijela Dimic,
School of Electrical Engineering and Computer
Science Applied Studies Belgrade,
Serbia,
E-mail: gdimic@gmail.com
Abstract more and more with less and less human effort,
Application of the lean philosophy in service less equipment, less time, and less space – while
systems and in higher education institutions is the coming closer and closer to providing customers
contemporary world trend. The Application of lean with exactly what they want“,[2]. Although they
approach can contribute to significant improve- have popularized the term ‘’lean’’ in order to de-
ments in real processes, rationalization, as well as scribe the production system of Toyota, the au-
the improvements in work process and work flow. thors of the MIT study were not the first people
In order to show the need for improvement of cer- who presented many of these ideas to the West.
tain processes, 350 students of the Faculty of Tech- Namely, numerous books had been written before
nical Sciences were polled and the application of Womack has pointed to different characteristics of
the Value Stream Mapping (VSM) tool with all of this concept. For example, Japanese architect of
its characteristics was shown afterwards. The VSM the Toyota manufacturing system [3] has written
tool, in terms of gathering data about the system, “Toyota Production System: Beyond Large-Scale
represents one of the elementary managerial tools Production”, [4] study on the Toyota production
for the implementation of Lean philosophy. This pa- system from the perspective of industrial engi-
per shows the analysis of the class preparation and neering, [5] have published the first edition of the
teaching by using the VSM – lean tools, improve- ‘’the Goal’’, [6] has written ”World Class Manu-
ment of the process as well as savings resources and facturing’’ etc. However, the book ‘’the Machine
improvement of the process. that Changed the World’’ was very popular with
Key words: VSM, Lean, Education, Service executives and a very sought-after document for
system lean manufacturing systems [7].
Lean approach represents a set of principles
(value, value stream, flow, pull and perfection),
Introduction
methods and managerial tools for effective and ef-
Lean manufacturing is a Japanese manufac- ficient planning, manufacturing and control in the
turing concept which has gained popularity since activity chain while supporting functions involved
the term “Lean”, designated as a part of the study in creation of new values. Its key components are:
on analysis of the world auto industry, was de- decentralized organization structures, quality man-
scribed in the book “The Machine that Changed agement in the function of consumer needs, see [8],
the World” by [1] The authors have shown how [9], [10], [11], [12], [13], [14] [15], humanization
the Japanese Toyota has taken over the leadership of work and management, integration of consumers
position from European and American auto in- and suppliers in the function of realizing maximum
dustries and realized hitherto unseen revival con- effects, oriented technology management in the
cerning manufacturing. Womack and Jones have function of business process demands, regionaliza-
defined the Japanese model “Lean” explaining tion, internationalization and mobility [16].
that it ”provides a way to specify value, line up When it comes to the tools and methods used in
value-creating actions in the best sequence, con- application of lean concept the most famous ones
duct these activities without interruption when- are: JIT (Just in Time), TPS (Toyota Production
ever someone requests them, and perform them system), 5S, Value Stream Mapping (VSM), Poka
more and more effectively. Lean means doing Yoke, Single minute exchange of dies (SMED)
etc. Although it has originated in manufactur- cused on the processes in the institutions of higher
ing systems, the application of Lean philosophy education, the benefits those institutions can get
in service systems is a new growing trend. In the by applying VSM according to Balzer are:
continuation of this paper, application of VSM “identification of the basic steps in the process,
(Value Stream Mapping) tool is shown that tool activity flow through the process,
enables creation of an image of the observed pro- information flows supporting the basic process,
cess, i.e. visualization of all activities in the pro- visual format used to present the steps, activi-
cess of creation of new or added value [17] Use of ties, flows in the process and
quality “tools” is a very significant for improving data on sizes of the system identified as the
effectiveness and efficiency in all organizations, most significant ones in the process evaluation,
including high education institutions [18] as well perspective of the university as well as the us-
as improvement of university processes and flows ers of the university services”.
[19]. The goal of this paper is to show the analysis
of the process of class preparation and teaching by Methodology
using VSM – lean tools as well as to suggest an
improvement to the process. In continuation this paper will show the appli-
cation of VSM - lean tools to the lecture prepara-
Lean tool - VSM tion and presentation. Besides the application of
VSM tools a survey has been conducted by few
“Wherever there is a product for a costumer, PhD students in which they interviewed 350 ran-
there is a value stream” represents the first defi- domly selected students from different depart-
nition that describes what Value Stream Map- ments at one faculty, which has around 12 000
ping in the book “Learning to See” [20]. In their students, on a large public university in the south-
book “Seeing the Whole – mapping the extended eastern Europe all in order to obtain more realis-
value stream”, MIT professors responsible for the tic perspective on the necessity of changes in this
worldwide promotion of Lean philosophy [21] segment of the faculty. The questionnaire consists
have described VSM as a “simple process of di- of 5 questions (answers are defined with 0 or 1 -
rectly observing the flows of information and ma- agree or disagree):
terials as they now occur, summarizing them visu- – Are you aware of the fact that your faculty/
ally, and then envisioning a future state with much university owns a comprehensive database
better performance”. Although there are many which enables access to complete lectures to
points of view on what VSM is [22], [23], [24], all students?
[25], [17] In other words, as one of many methods – Do you have the access to complete data on
i.e. tools, VSM makes it possible to promptly no- lectures from all subjects for every year of
tice the largest concentration of time that does not your studies at one place?
represent added value, but loss within the system. – Do you find it necessary to have a
On of the most important features of VSM is the comprehensive faculty/university database?
facts that it “represents one of the starting founda- – Do you think that would be useful to have
tions in data gathering and system analysis that, all the lectures and materials from other
next to the vision of the top management and staff departments of the faculty/university
training, represents the foundation for successful available?
implementation of Lean Philosophy” [17]. – Would you agree that the students could
When discussing the manufacturing and ser- prepare themselves for the exams better if
vice systems, we must note the benefits gained by they had all the lectures available at one
using VSM – lean tools. Authors [22] have given place?
a detailed description of the benefits concerning
manufacturing systems, while [24] has focused on The results of the survey (figure 1) with obser-
the application of VSM on service systems, spe- vations and initial state of process (figure 2) are
cifically on higher education. As this paper is fo- given further in the paper.
added (NVA) activities or activities that not direct- ing materials that are in mechanical engineering,
ly contributing to value production amounts to 5 if necessary). In addition, the site can be directly
hours 45 min, i.e. 7.22% of total time. Consider- connected to the university site, which would au-
ing the lost time and resources as well as analysis tomatically allow universities to increase Webo-
of the VSM in the initial state, further in this paper metric factor that measures the amount of free on-
we will make suggestions to improve and enhance line access to academic records [26]
the observed process (figure 3). The new propositions for improvements exclude
times spent on trip made for obtaining keys from
doorman and returning the equipment, which saves
approximately 1h 12min. on the observed sample.
The equipment in the classroom would be set in
such way that the computer would be simply turned
and would be directly connected with the lecture
database from which the professor/assistant would
use the presentations directly. If we assume that
635 lectures are held in the teaching block during
Figure 3. VSM of the proposed lecture prepara-
the semester, it can be concluded that through the
tion process improvement
suggested proposal approximately 36h 9min. by
semester would be saved through eliminating the
Under improvement we consider introduc-
necessity of departure for obtaining the equipment
tion of a single internet platform at which all the
and keys and 10h 35min to put the equipment into
lectures would be uploaded. After creating a pre-
operation and the presentation preparation (note:
sentation, professors or assistants could set up a
in this work only teaching block was observed, we
presentation on the site a couple of days or even
have not included other classrooms of the univer-
months earlier, which would open the possibility
sity, amphitheatres, laboratory classrooms, etc..).
that a student at any time, or at least a day earlier,
As for the equipment in the classrooms, we could
has the opportunity to prepare in advance for lec-
remove computer keyboards which would save
tures as well as during the preparations for exams.
resources for the equipment and result in reduced
In addition to having access to lectures from their
maintenance of computers due to potential danger-
fields, the students will also have access to other
ous viruses and similar problems. Certain improve-
fields within the faculties (e.g., the industrial en-
ments and savings are shown in Table 2.
gineering student may at any time access teach-
Table 2. Improvements in the lecture preparation process at faculty for the given case
Savings/
Current state Future state
Improvements [%]
No. of keyboards in lecture blocks Saving 100% (minimum
25 pieces 0
classroom* of 30 000 RSD)
Total time for the given case* 75h 50min. 71h 56min. Decreased by 5.109 %
Time spent on obtaining keys and
Aprox. 7h 55min 0 Reduced by 100%
equipment from the doorman *
Time spent on assembling equipment
Aprox. 10h
and putting presentation into Aprox. 36h 9min Reduced by 68.68%
35min
functional work*
Time spent on disassembling Aprox. 5h
Aprox. 15h 52min Reduced by 66.7%
equipment * 17min
Currently ranked inside 10% of
Website traffic (Webmetrics) Increased Increased
all universities on Webmetrics
Student statisfaction / Increased Increased
*Times obtained through researched sample have been used as measuring data on the level of one semester
From table 2 it can be seen that implementa- conducted within other faculty and university pro-
tion of VSM tool can bring several improvements cesses, which represents a demanding challenge in
related to costs of equipment, time spending and the future.
website traffic. First, by applying VSM tool, a
number of keyboards in lecture block classrooms References
will decrease in total. Whole amount of costs will
be saved, costs are around 30.000 money units. 1. Womack J. & Jones D. Machine that change the
world, Macmillan Publishing, New York.1990.
Second, the biggest saving will be made in time
needed for preparation of lectures. Specifically, 2. Womack J. & Jones D., Lean Thinking: Banish
three processes are identified: time spent on ob- Waste and Create wealth in Your Corporation,
taining keys and equipment from the doorman, Simon&Schuster, New York. 1996.
time spent on assembling equipment and putting
3. Ohno T., Toyota Production System: Beyond Large-
presentation into functional work, time spent on Scale Production, Produstivity Press, New York.
disassembling equipment. Improvements will 1978.
be significant, from time reduce for 66.7% and
68.68% for assembling and disassembling equip- 4. Shigeo S., The new Japanese manufacturing phi-
ment to time reduces of even 100% in time for ob- losophy, Yugoslav Bureau of labor productivity, Bel-
grade, 1986.
taining equipment. Also, the greater transparency
of the faculty site automatically provides universi- 5. Goldrat & Cox, Goal: Exellence in Manufacturing,
ties to increase rank on Webometric. North River Press, New York,1984.
Based on the results of the survey conducted 7. Božičković R. Lean concept in efective manufacturing
on students and the completed research, it can be systems. Doctor disertation, FTN, Novi Sad. 2005.
concluded that changes in lecturing process and
8. Dotchin J., Oakland J., Total Quality Management in
the level of availability of the academic literature Services: Part 1: Understanding and Classifying Ser-
and lecturing materials are of vital importance. By vices, International Journal of Quality & Reliability
applying the Lean tool (in this case the VSM tool), Management, 1994; 11 ( 3): p. 9 – 26.
it is shown that the institutions of higher education
9. Dotchin John A., S. Oakland John, Total Quality
can meet students’ needs, simultaneously increas-
Management in Services: Part 2: Service Quality,
ing the quality, effectiveness and efficiency of the International Journal of Quality & Reliability Man-
learning process. The improvements in process- agement, 1994; 11 ( 3): p.27 – 42.
es can be achieved by decreasing the number of
equipment items and costs of maintaining them, as 10. Hackman R., Wageman R., Total Quality Management:
Empirical, Conceptual, and Practical Issues, Adminis-
well as making the duration of the processes itself
trative Science Quarterly, 1995; 4(2); p. 309-342.
shorter, where in the examined case the reduction
varies from 5.109% to 100%, together with the 11. George S., Weimerskirch A. Total Quality Manage-
saved energy and other resources. ment: Strategies and Techniques at Today’s Most
Apart from saving the abovementioned re- Successful Companies. John Wiley and Sons Inc.,
Canada,1998.
sources, other positive effects can be reached by
further internationalization of the university and 12. George M., Lean six sigma for service: how to use
improving its position on Webometric. Finally, the lean speed and six sigma quality to improve ser-
most significant step forward is a higher degree of vices and transactions, McGraw-Hill Companies,
students’ contentment with the university, which New York, 2003.
would, among other results, lead to the fulfilment 13. Kušar J., Duhovnik J., Tomažević R., Sstarbek M.,
of the first principle of the Lean philosophy – con- Finding and evaluating customers needs in the
sumer-centred “value”, i.e. meeting the consum- product-development process. Journal of Mechani-
ers’ requirements on time. Future research will be cal Engineering, 2007; 53( 2): p. 78-104.
14. Radlovački V., Beker I., Majstorović V., Pečujlija 26. http://www.webometrics.info (accessed: 5 Januar
M., Stanivuković D., Kamberović B., Quality man- 2012)
agers’ Estimates of quality management principles
application in certified organizations in transitional
conditions – is Serbia close to TQM, Strojniški Corresponding author
vestnik - Journal of Mechanical Engineering, 2011; Milan Radosevic,
57(11): p. 851-861 Faculty of Technical Sciences,
University of Novi Sad,
15. Vujovic A., Krivokapic Z., Sokovic M., Improvement Republic of Serbia,
of business processes performances trough establish- E-mail: r.milan13@gmail.com
ment of the analogy: Quality management system radosevic@uns.ac.rs
– Human organism. Strojniški vestnik - Journal of
Mechanical Engineering, 2011; 57(2): p. 151-161.
and regulations, management takes in order to pro- Strategic role of human resource management in
vide personnel of required capabilities, quality and the organization is characterized by the following:
potential and adequate training and motivation to – Employees are treated as resources or as
achieve organizational and personal goals. human capital that needs to be invested in
In the development of theoretical thought in the by providing learning opportunities and
management of human resources, there are four development of “learning organization”;
clearly distinguished periods: the period of scientific – Human resources are viewed as the source
management, the period of recognition of social fac- of competitive advantage;
tors, strategic management period and the Japanese – Reducing the number of management levels
management affirmation period (scheme 1). [2] to provide more direct communication
between managers and employees;
– Decentralization of management process, in
other words, transfer of some jurisdictions
from higher to lower management levels;
– Participation of employees in management
through the involvement and active
participation in management activities;
– Ongoing flexibility of management process
and activities in order to find acceptable
and sustainable solutions for environmental
requirements;
– Increased independence in work and
decision making for employees, making
Scheme 1. The impact on the development of the- them happier and more motivated to work;
oretical thought in human resource management – Favoring knowledge, skills and creativity,
“which leads to the intellectualization of
The main role of human resource management is work overall, when thoughts and ideas
the alignment of the number and structure of human become fuel of the economy [4] “;
resources with the volume and structure planned by – Orientation to the man and his values as the
the organization. That is care about the human com- most important resource of the organization;
ponent in structure of organization. We distinguish – Commitment to achieving individual goals
between strategic and operational human resource and interests, not just to the goals and
management. [3] Strategic human resource manage- interests of the organization;
ment is based on general strategy of organization – Humanization of relations of production
and on strategies of individual organizational units, between the management of organization
while the operational human resource management and employees.
works on strategic plans of human resources.
Strategic understanding of human resource Conclusion can be made, that there has been
management do not just treat a man as an indi- a decisive turn in treatment and management of
vidual who goes to work to get paid, but as the in- human resources in the organization. All that con-
dividual with purpose to make some difference in tributes to the strategic importance of human re-
organization, in other words employees are treated source management, and presents a serious chal-
as a subject of management. Constant environ- lenge for people involved in this process.
mental changes, rapid development of science and The most important objectives of human re-
technology, increased competitiveness, everyday source management at the strategic level, in achiev-
difficulties and challenges are forcing organiza- ing the efficiency of the organization are: [5]
tional management to constantly search for good – Inclusion of all members of the organization,
and adequate solutions. their knowledge, skills and motivation to
achieve the strategic goals of the organization;
– Strengthening organizational effectiveness cording to events within the organization and en-
by providing development, creative abilities, vironment. There are three theoretical approaches
knowledge, skills and employee motivation; to strategic management of human resources: 1)
– Developing and strengthening the process universal approach, 2) matching or opportunities
of linking human resource management approach, and 3) approach based on resources.
objectives with business goals of the 1) Universal approach is based on the concept
organization; of human resource management as “best prac-
– Continuous improvement of human tice” and it is based on four objectives of human
resource management practices in line with resource policies that must be met in order to
the trends and changes in the environment; achieve the desired results (scheme 2) [6] .
– Transforming abilities, knowledge, skills
and employee motivation into a competitive
and strategic advantage;
– Creating a comprehensive strategy for
developing human potential in line with the
strategic development of organization;
– Consideration of long-term needs and
opportunities for development of human
resources in the context of long-term needs
and strategic goals of the organization;
– Development of innovative human resource
strategy, which will initiate a strategic
change in the organization; Scheme 2. Objectives of Human Resource Policy
– Developing a culture and climate of constant
changes and adaptation to demands of the These objectives of human resource policy are:
environment. – Strategic integration (human resource
management is integrated into the strategic
The objectives of human resource manage- planning);
ment are changeable, dynamic, interrelated and – Commitment (employees feel like part of
stem from the results that management wants the organization and that reflects on their
to achieve, from the level of individual working performance);
place to the level of the whole organization. They – Flexibility (structure of the organization is
apply to every employee and organization as a flexible);
whole and everybody should participate in their – Quality (high quality employees provide
definition, not only managers. Only for objectives high quality goods and services).
defined that way, one can expect activation of all
available potentials for achieving them. 2) Matching or opportunities approach is based
on two basic forms of incorporation. The first one
Strategic approach to human resource involves external integration (human resources
management strategy needs to match the demands of business
strategy) and the second one involves the internal
One of the most significant differences between match (all human resource activities match to-
the management of human resources and person- gether to make a whole). Support for this model is
nel management is a strategic approach. Human shown in schemes 6 and 7.
resources have to be the key initiators of organiza- Scheme 3 shows the management of human re-
tional development. Human resources strategy has sources with respect to organizational strategy and
gradually changed and evolved. Human resources environmental impact. [7]
strategy is a political and development process that
is created rather than formulated, and it changes ac-
– Offer the abilities of variant management unit for human resources) to propose a functional
that can be used immediately. strategy that will enable the implementation of or-
ganizational strategy.
Organizational unit for human resources is of- Dialog model (C) involves mutual communi-
ten excluded from the strategy forming process, cation and consider other possibilities of organiza-
while the human resources strategy first reflects tional strategy.
in the implementation of organizational strategies. Holistic model (D) treats human resources as
The most successful organizations are those who a key competitive advantage for the implementa-
have the ability to quickly implement a strategy to tion of organizational strategy. According to Baird
work, or to carry out implementation strategy of (Baird, 1983), there is no strategy without a HR
human resources. strategy.
Scheme 6 gives an overview of possible rela- Model based on human resources (E) represents
tionships between the organization and strategies human resources as a key competitive advantage
of human resource management. These relations for the achievement of any strategy. This model
are characterized by five different models: Sepa- is reflection of strategic HRM perspective, which
ration model (A); Matching model (B); Dialogue is based on resources and is considered as a shift
model (V); Holistic model (G); and Model based of human resources strategy from implementer to
on HR (D). driving force in the formulation of strategy.
Conclusion
The profession and practice of human resource
management is subjected to significant change
and redefining. Unfortunately, in many systems
and organizations strategic importance and role of
human resource management are not sufficiently
perceived, and their role is reduced to performing
common administrative tasks related to personnel.
For modern systems and organizations to be
able to successfully cope with increasing competi-
tion and rapidly changing, it is necessary to allow
the release of creative potential of the employees
by applying new principles regarding the human
factor. Knowledge must be in the forefront, which
Scheme 6. Possible relations between organization leads to the intellectualization of work overall. For
and human resources strategy this purpose it is necessary to recruit, develop and
retain human resources who are highly trained,
Separation model (A) is common in smaller or- motivated and dedicated to their work.
ganizations where there is no link between human The strategic role of human resource manage-
resource strategy and organizational strategy. ment is focused on understanding, predicting, di-
Matching model (B) predicts the integration of recting, changing, development and adaptation of
human resource strategy to organizational strat- human behavior and human potential in the or-
egy and it sees employees as key in the imple- ganization, which requires from employees com-
mentation of organizational strategy. This model mitment, self-control, high degree of confidence,
is represented in the organizations that direct their professionalism, ongoing education and striving.
business goals from top management to lower
organizational units, but it is also expected from
organizational units (including the organizational
References
1. Kulić Ž., Upravljanje ljudskim potencijalima, NIP
Radnička Štampa, Beograd, 2005; p. 21.
Corresponding Author
Dobrivoje Mihailovic,
Faculty of Organizational Sciences,
University of Belgrade,
Serbia,
E-mail: mihailovic.dobrivoje@fon.bg.ac.rs
in the control character. Accounting information Cost of quality COQ) are the costs incurred to
with their qualitative characteristics - primary rel- prevent, or the costs arising as a result of, the pro-
evance and reliability - particularly the informa- duction of a low quality product. Costs of quality
tion contained in the financial statements arising are classified into four categories: [8]
from the management accounting, make the most 1. Prevention costs - costs incurred to preclude
dynamic and elastic part of the company informa- the production of products that do not
tion system. conform to specifications
How management and cost accounting, pro- 2. Appraisal costs - costs incurred to detect
vide managers information on all costs of enter- which of the individual units of products do
prises, it is for the purpose of monitoring the ef- not conform to specifications
fects of quality management accounting should be 3. Internal failure costs - costs incurred on
recorded costs thereby incurred. defective products before they are shipped
to customers
2.1 Concept and types of quality costs 4. External failure costs - costs incurred on
defective products after they have been
Quality costs in the history of Organizational shipped to customers
Sciences first mentioned in 1932. Today, many au-
thors agree that they constitute about 20% of the These four types of costs can be grouped into
total expenses. In Western Europe the largest per- two categories quality costs, with the costs of pre-
centage of the cost of waste on human resources vention and testing costs are considered costs of
while in South East Europe due to a number of cir- achieving quality and cost of internal deficiencies
cumstances caused by socio-political, social and and External costs include deficiencies in the cost
other effects of turmoil inability renewal means of of deviations from quality.
production and lack of equality in communication Table 1. Summary of quality costs in the company
with the surrounded by arms, most of the waste
Prevention costs Control
material. In our country, the cost of quality reach-
ing nearly up to 50%. This leaves our company Appraisal costs costs
Total quality
without oxygen, and it subside. [5] costs
The concept of cost of quality is ambiguous Internal failure costs Cost of poor
because the opinions of scholars quality divided, External failure costs quality
with one author under the specified term include
Source: Proposed by authors
only the costs caused by deviations from the spec-
ified quality, and others in this category include
Therefore, the total cost can be reduced by ob-
costs and expenses due to efforts to achieve or im-
serving the relationship between cost quality and
prove the quality of the process and outcomes.
level of compliance with the requirements of con-
The concept of quality cost appears fifties. [6]
sumers. When the degree of conformity to custom-
Quality-linked activities are those activities per-
er requirements are high therefore a poor quality
formed because poor quality may or does exist.
cost are low, but the control cost are high. When the
The costs of performing these activities are re-
level of compliance is low, the situation is reversed.
ferred to as costs of quality. Thus, costs of quality
Companies that measured the costs revealed
are the costs that exist because poor quality may
that the situation in certain companies, such that
or does exist. This definition implies that qual-
the total cost of quality processes represent 30%
ity costs are associated with two subcategories
of total sales. Some companies have achieved cost
of quality-related activities: control activities and
reduction from 30% to only 3%.
failure activities. [7] The costs arise because of the
quality control ensure that the effect (the product
or service) meets your specifications, and lack of
quality control costs arise when performance does
not meet predefined specifications.
2.2 Characteristic of the system of quality It is not enough to allocate quantities of defective
costs monitoring products, but to find the cause of the malfunction
and fix them. Possible causes of poor quality are:
Quality costs could have a significant share in – Inadequate raw materials,
total costs organization and as such they should be – Insufficient training for jobs,
monitored and controlled. Given that the informa- – Unclear procedures,
tion about the cost of great importance in decision – Faulty equipment.
making at all managerial levels, the cost of qual-
ity monitoring in the service is improving control Regular removal of the causes of poor quality
of business processes and, ultimately, achieving achieved stability of production processes and cre-
positive long-term business results. ates the opportunity for improvement.
The purpose of monitoring the quality and cost Better than this is definitely a preventive action
management has a basis in Deming cycle. Particu- to avoid the appearance of defects in the process.
larly, William Edwards Deming is considered one Prevention activities include product design pro-
of the guru quality management, in his honor in cess and prevention efforts, working with suppli-
the 1951st the Japanese-based national award for ers to improve service quality materials, training
contribution to quality. W. Edwards Deming in the staff before problems occur, and preventive main-
1950’s proposed that business processes should be tenance. Prevention costs less than the resulting
analyzed and measured to identify sources of varia- once they had occurred.
tions that cause products to deviate from customer The following figure will show the place of
requirements. He recommended that business pro- quality cost accounting within Deming’s cycle.
cesses be placed in a continuous feedback loop so According to the mentioned figure 1, the quality
that managers can identify and change the parts of cost accounting has an important role in continu-
the process that need improvements. As a teacher, ous quality improvement of business processes
Deming created a (rather oversimplified) diagram and effects of these processes. Specifically, ac-
to illustrate this continuous process, commonly counting planning should be accompanied by any
known as the PDCA cycle for Plan, Do, Check, Act. initiatives improve the quality of the organization.
The above cycle includes key actions to im-
prove quality, including: [9]
– Planning advancing,
– Plan implementation,
– Checking of plan implementation,
– Work towards achieving quality (if there is a
deviation) or towards improving the quality
(if the results of the verification phase
proved satisfactory).
After the implementation of improvement pro- measured to the extent possible and practical and the
grams quality following accounting records that benefits of those costs estimated. Such calculations
can be set up in two fundamental ways, one in the are likely to use estimates rather than actual figures.
general ledger [10] or as a separate accounting re- To collect quality costs, there needs to be a clas-
cord established as a quality costs (alternatively, sification of such costs to determine the expendi-
evidence in managerial accounting). Deming cy- ture type. The bulk of all quality costs incurred
cle, in this context, finish with quality costs report- by a company are associated with the quality of
ing and bring important information in managerial conformance. These costs are broken down into
decision making process, and, therefore, generat- four broad groups. Two of these costs - known as
ing ideas about further improvements in quality. prevention costs and appraisal costs – are incurred
Effective communication and interpretation of in an effort to keep poor quality of conformance
measurement and analysis cost of quality, manage- from occurring. The other two groups of costs -
ment is in the position better to evaluate and control known as internal failure costs and external failure
current activities to improve quality and plan future costs - are incurred because poor quality of con-
flow of initiatives. [11] A report of quality costs formance has occurred.
providing information about place of origin and the The costs of quality are accumulated and re-
holder of quality costs, namely, the activities that ported in a cost of quality report. The information
caused the lack of the process and products. This provided by a cost of quality report is used by
report is a good basis for making decisions about managers in several ways. [14]
further activities to exercise and improve quality. – Quality cost information helps managers see
the financial significance of quality. Because
2.3 Quality costs and reports quality costs are not normally accumulated by
the accounting system, managers are generally
Historically, quality costs have not been given not aware of the size and significance of these
separate recognition in the accounting system. In costs. Thus, cost of quality focuses attention
most instances the cost of quality is “buried” in on how costly poor quality can be.
a variety of general ledger accounts, including – To evaluate whether the distribution of
work-in-process inventory and finished goods quality costs is efficient or not. The report
inventory (for rework, scrap, preventive mainte- shows how much a firm spends in prevention
nance, marketing and advertising costs (e.g. recall and appraisal activities (voluntary
products) and personnel costs (e.g. training). expenditure) and the cost of internal and
Cost of quality is a measurement tool which external failure (involuntary costs). Quality
provides a measure of cost specifically associated costs should be distributed more towards
with the achievement or non-achievement of prod- prevention and appraisal activities and less
uct or service quality - as defined by all product or towards failure of various types. Otherwise,
service requirements established by the company this may indicate a poor distribution of
and its contracts with customers and society. The quality costs. However, while there are high
cost of quality can be substantial; on average it is payoffs from initially shifting quality costs
20 to 25 percent of sales for many US firms [12]. from the appraisal, internal failure, and
The measurement of quality performance is of external failure categories to the prevention
great importance in the business sector, particu- category, there is no “optimal” distribution
larly in view of the considerable efforts being put of quality costs among the four categories.
into the implementation of quality management – To help management in their efforts to reduce
techniques across a wide range of organizations. quality costs. The information accumulated
In trying to control the cost of quality, an orga- in the quality cost report provides a basis for
nization must first be able to calculate its total cost establishing budgets for various elements
of quality. Juran and Gryna [13] advocate the mea- of quality costs. These budgets can then be
surement of quality costs on a periodic basis as a used as a basis for evaluating management
management control tool. Quality costs should be performance and success with respect
to reducing total quality costs. Properly an overall measure of quality. Shank and Govinda-
designed quality cost reports assist in rajan [16] indicate that non-financial measures are
determining the type of activities that are essential to provide feedback to managers in their
most heretical in reducing quality costs pursuit of quality. Finally, in order to establish an
and when quality costs are accumulated in overall measure of quality, it is necessary to estab-
sufficient detail, quality cost reports help lish a range of measures (financial and non-finan-
management priorities quality improvement cial) which give an overall picture of the quality of
activities and promotes the idea that quality the products or services of the organization [17].
is everyone’s responsibility.
– To identify the relative importance of quality 3. Relationship analysis of accounting
problems faced by the firm. For example, the practices and quality management of
quality cost report may show that scrap is a enterprises in Serbia
major quality problem or that the company
is incurring high warranty costs. With this In the first part of research we need to look at
information, management can see where to the total number and structure of economic enti-
focus its efforts. ties in the Republic of Serbia. Therefore, we will
include data that directly affect the purpose and
Although a quality cost report is useful, it is im- goal of this paper.
portant to note that measuring and reporting quality When we analyze the numbers showed in fol-
costs do not solve the identified quality problems. lowing table and compare the total number of
Moreover, some important, but difficult to measure companies operating in Serbia in accordance with
and quantify, quality costs are typically omitted various types of ISO, HACCP and OHSAS stan-
from the quality cost report, such as unrecorded op- dards (see Table 3), and put in relation to the total
portunity costs, e.g., loss of further income arising number of business entities that exist in the terri-
from poor product design or customer ill will. tory of the Republic of Serbia 112.401 (Table 2),
Beside the financial measures of quality costs (2.343/112.401*100=2, 08%), we find that there is
(prevention, appraisal, and failure costs), compa- a better percentage those companies that meet inter-
nies use nonfinancial measures (e.g., number of national business standards than in 2011. year. This
customer returns, repeat purchases, the number of percentage is higher in neighboring countries, for
customers’ complaints, delivery delays, number of example in Croatia, 3.12%. But it is important to
defects and staff turnover) in order to evaluate how note that this trend is increasing, and that follows
well their actual performance satisfies customer world trend in number of companies aligns their
needs. Managers also pay close attention to first- operations with the ISO standard of 10%.
time pass rate in each process and in the company The ISO 9000 family addresses various aspects
as a whole, which indicates whether products are of quality management and contains some of ISO’s
being built to specifications. Non-financial mea- best known standards. The standards provide guid-
sures are helpful in revealing the future needs and ance and tools for companies and organizations
preferences of customers. They also indicate the who want to ensure that their products and services
specific areas which need improvement [15] and consistently meet customer’s requirements, and
may provide a viable alternative to quality costs as that quality is consistently improved. [18]
Table 2. Number and structure of enterprises and employees
Structure Number of firms % Number of employees %
Entrepreneurs 20.500 18,24 45.099 4,27
Small firms 88.306 78,56 372.573 35,26
Medium firms 2.751 2,45 213.591 20,21
Large firms 844 0,75 425.367 40,26
TOTAL 112.401 100 1.056.630 100
Source: Official dedication on the functioning of the economy in Serbia in 2011. Year [www.apr.gov.rs]
There are many standards in the ISO 9000 fam- Table 3. Structure and number of standards issued
ily, including: to enterprises in Serbia
– ISO 9001:2008 - sets out the requirements Type of Nr. of various
of a quality management system, %
standards standards
– ISO 9000:2005 - covers the basic concepts HACCP 359 15,32
and language, ISO 13845 17 0,72
– ISO 9004:2009 - focuses on how to make a ISO 14001 328 14,00
quality management system more efficient ISO 16949 1 0,04
and effective, ISO 22000 45 1,92
– ISO 19011:2011 - sets out guidance on ISO 27001 34 1,45
internal and external audits of quality ISO 9001 1355 57,84
management systems. OHSAS 18001 204 8,71
TOTAL 2343 100,0
Source: Register of certified enterprises in Serbia in 2012.
Year [www.pks.rs]
The subject of this paper is an ISO 9001 certi- 7. After the implementation of quality manage-
fied. The norm of ISO 9001 advocated process ap- ment program according to ISO 9001
proach in the development, implementation and standards, do you think that the Quality Costs
improvement effectiveness of quality management are lower than before? YES/NO
systems and increase customer satisfaction (satis- 8. Did the Quality Costs deviations are reduced
faction of their claims). The study included a sam- over time?
ple of 41 companies (see Table 4), which exist on
the territory of Serbia and also conducted through Respondents were strictly owners, financial
telephone interviewing. The course of study can be managers and chief accountants.
divided into two parts. In the next section we will
present results of research work within the frame- 3.1 Motives for the introduction of ISO
work of both the research work, respectively. standards in these companies and the
usefulness of the report on quality costs
Questionnaire used in research:
1. Do you think that the implementation of
3.1.1 Motives for Quality Certification
quality standards ISO 9001 enhance your
business? YES/NO This section highlights the factors which moti-
2. What are the motives for Quality Certification? vated Serbian companies to obtain ISO 9001 qual-
○ Customers’ pressure, ity certification. The adoption of total quality man-
○ Government contracts, agement by Japanese companies was motivated by
○ Market competition, the desire to compete in Western markets. The US
○ Overseas requirements, companies followed suit because they started to
○ Quality improvement. lose their domestic market to Japanese companies.
3. Did your company have implemented system The most important factors were: quality improve-
for preparation of Quality Costs Report? ment, market competition and overseas require-
4. How often do you prepare Quality Costs ments. Quality improvement received the highest
Reports: monthly, quarterly, semi-annually percentage (see table 4). Almost all respondents
or annually? acknowledged that quality improvement is an ex-
5. What are the uses of Quality Cost data? tremely important factor.
○ Product cost information, In summary, the motivation factors behind
○ Process improvement, ISO 9001 quality certification are competition
○ Product improvement, in the market, continuous quality improvement;
○ Quality cost planning. overseas requirements and cost reduction. These
6. How the accounting information on quality results are inconsistent with those found in some
costs affecting the reduction effects of the other countries. For example, Hudson [19] found
lack of production? that Australian manufacturing firms obtain quality
certification for the following reasons: continuous Table 5. Uses of quality cost data, [N=41]
improvement; to gain a competitive edge; over- Usefulness of
seas requirement; and customer pressure (private Frequency Percentage %
quality costs report
and government sectors). In addition, there are a. Product cost
some differences between Serbian companies and 9 21,95
information
companies in other countries. b. Process
Next table shows the results of interviewing 25 60,98
improvement
and percentage distribution of responses. It is im- c. Product
portant to note the following tabulation that most 12 29,27
improvement
companies reported two or three reasons or mo- d. Quality cost
tives for the introduction of ISO 9001 standards. 16 39,02
planning
Table 4. Motives for ISO 9001 quality certificati- Source: Research results
on, [N=41]
Motive Answers Percentage % 3.2 Analysis of accounting practices and
a. Customers’ pressure 9 21,95 quality management through three work-
b. Government contracts 4 9,76 ing hypotheses
c. Market competition 25 60,98
d. Overseas requirements 12 29,27 To prove the first working hypothesis was used
e. Quality improvement 29 70,73 McNemar’s test (at which is taken binomial distri-
Source: Research results bution). The above hypothesis is:
H1: Accounting information on the quality
3.1.2 Uses and benefits of cost of quality report costs affecting the reduction effects of the lack
of production.
When the respondents were asked about the Table 6. Overview of the relationship of accoun-
uses of a cost of quality report, they indicated ting quality costs records and achieving the lack
that they use it mostly for process improvement, of production
quality cost planning, product improvement and
Lack of production
product cost information (see table 5). This shows Record
that COQ is an integral part of continuous quality No Yes
improvement. This shows that although the litera- No 4 1
ture indicates that quality costs are being used for Yes 20 6
planning and control, they are not used in practice. Source: Research results
The results are consistent with previous research
[20]. Other uses added by respondents were: On the question of the existence of records of
– Targeting areas of quality improvement, quality costs replied positive 83% of the respon-
monitoring improvement efforts, motivating dents (Table 6) that were, at the same time, declared
employees towards quality goals to ensure the achievement of lower levels with the lack of ef-
that total quality control is applied to all fects of introducing a quality management system.
organization endeavors. Specifically, the results indicate that the records
– Customer satisfaction and continuous of the quality costs relating to the reduction of the
improvement. product realization insufficient quality.
The chart in figure 2 represented by the ratio of
Mentioned above will be presented through the observed companies at least occasionally monitor
following tabulation: the quality costs. It is evident that high percentage
(namely, 77%) of those organizations that recog-
nize the essential decrease defective products. The
result of the research is in line with one of the fun-
damental goals of quality management, and this is
the realization of the zero level shortfalls.
Table 7. Analysis of variance - the quality costs mation on the point of deviation from the quality
records as a factor of influence and remove them faster. Therefore, not surprising
V SV SDS Var. F σ that the survey data obtained 77% of companies
R - between
that recorded costs of quality observed a signifi-
19,065 1 0,000
samples 18,964 32 32,170 cant reduction of production inadequate products.
- within the 38,029 33 Enterprises that manage quality and have a record
samples of quality costs, notes increases of revenue since
- total they are dedicated improving business processes
L - between 30,422 1 0,000 and the final performance (goods and services).
samples 40,133 34 25,773 Cost accounting allows reporting of quality
- within the 70,556 35 costs, which is, in most cases, members of the
samples board of directors intended. Thanks such reports
- total shall be exercised feedback between accounting
I - between 2,837 1 6,540 0,016 and quality management and the administration
samples 11,714 27 is able to define corrective measures to individ-
- within the 14,552 28 ual organizational segments that show deviations
samples from the set specifications and develop quality
- total improvement plans for the entire organization.
Source: Research results So, there is no doubt that measuring and reporting
cost of quality would provide firms with important
4. Summary and conclusions information to measure quality improvement and
control costs associated with quality. The benefits
The purpose of this study was to provide em- of such reports are likely to cover its costs.
pirical evidence on quality certification and cost
of quality measurement and reporting by Serbian
References
companies. The results show that a low percentage
of the responding firms obtained quality certifica- 1. Buble M. Menadžment, Ekonomski fakultet Split,
tion and especially ISO 9001 quality certification Split, 2006; 42.
what was the main topic of this research.
2. Perišić M. “Upravljanje troškovima kvalitete”,
The rate of adoption of COQ reporting is low. Zbornik radova, Oskar, Zagreb, 2000; 146.
However, the majority is aware of the fact and is
planning to adopt COQ reporting in the future. If 3. Gowthorpe Catherine, Management accounting.
we include those companies which intend to adopt Belgrade: Datastatus, 2009; 4.
COQ reporting in the future, the results indicate 4. Perišić M. Janković S, Menadžersko računovodstvo
a reasonable rate of adoption. For many of the hotela, Hrvatska zajednica računovođa i financijskih
companies which have no intention of adopting djelatnika, Zagreb, 2006; 457-495.
a COQ reporting system, non-financial indicators
were used as performance measurement tools and 5. Jovetić S. Finansijski pokazatelji sistema kvaliteta u
bankama, Kvalitet, Beograd, 1998.
many of the firms stated that quality was part of
the firm’s culture. 6. Evans J.R. Lindsay W.M. The Management and
As can be seen in the work, very few compa- Control of Quality, Fifth edition, South-Western, Cin-
nies have their operations in tandem with the ISO cinnati (Ohio), 2002; 468.
9001 certificate, which as such is one of the many 7. Don R. Hansen Maryanne, Mowen M., Liming Guan,
reasons and barriers for exporting Serbian prod- Cost management: Accounting and Control, 6th
ucts in foreign markets. Edition, South-Western Cengage Learning, Mason,
Introduction of quality in companies results in 2009; 498.
reducing the number of defects produced. Howev-
8. Datar M. Srikant Horngren, Charles Madhav Rajan,
er, if those companies have implemented records Cost accounting: A Managerial emphasis, Fortheenth
costs of quality, being able to reach detailed infor- edition, Prentice Hall, New Jersey, 2012; 672-673.
Web site:
18. www.iso.org
Corresponding Author
Edin Suljovic,
University of Novi Sad,
Economic faculty of Subotica,
Finance manager,
BROS JEANS, DOO,
Republic of Serbia,
E-mail: edin_suljovic@yahoo.com
economic sense of franchising their businesses, es- the literature a number of theoretical explanations
pecially if they follow the best case studies made by for the existence of franchising and for the struc-
a business format franchise. We may therefore argue ture of franchise contracts [11] [12]. The major-
that in the near future franchising is set to become ity of studies analyse the franchise contract within
one of the most popular growth strategies in post- the framework of a principal-agent model. It is a
transition economies. dominant theoretical framework in organisation-
This study focuses on the agency relationship al economics focusing on the study of contracts,
between the franchisor and franchisees. The agency organisations, incentives, the theory of the firm,
model has its origins in the 1960s and 1970s [5] [6]. corporate control, labour, law and economics etc.
It explains the contractual relationship between a However, there are some unresolved problems as-
principal and an agent under information asymme- sociated with agency theory, especially the prob-
try. Specifically, it deals with the relations between lem of risk-sharing and incentives [13]. Research-
monitoring, incentives and uncertainty [7]. Agency ers have found negative and positive relationships
theory is the theoretical framework frequently used between risk and incentives [14] [15] [16] [17].
to address questions concerning how firms choose Still others have found no statistically significant
between franchised and company-owned units and relationship at all [18] [19] [20] [21].
how they select the terms of their contracts, such as Opportunism and control problems in agency
royalties and fees [8] [9] [10]. relationships arise from the delegation of tasks to an
The aim of this paper is to explain the relation- agent with private information. The basic agency
ship between risk and incentives in franchise re- model investigates the contract design as a tool to
lationships. Agency theory argues that incentives set up an efficient relationship between risk sharing
and risk are negatively correlated; however, several and incentives in franchising because the level of
empirical studies show a positive relationship. As a effort expended by franchisees is not directly ob-
result of our literature review, we propose a model servable by the franchisor. Empirical work has pro-
of the relationship between risk and incentives in posed a negative relationship between risk and in-
franchise contracts which will be empirically evalu- centives, yet the empirical results suggest a positive
ated in future research. We argue that the relation- relationship. The franchisor is typically responsible
ship between risk and incentives depends on the for providing training and general support to its
contractibility of assets and the underlying gover- franchisees. It is also the one in charge of promot-
nance mechanism. If a franchisor has entered into ing and advertising the chain globally, and (more
an employment contract with an outlet manager we generally) of developing and maintaining the value
expect a negative relationship, whereas if they have of the trade name. The franchisee, in contrast, is re-
entered into a franchise contract we expect a posi- sponsible for managing the outlet on a day-to-day
tive relationship between risk and incentives. basis. Its responsibilities include human resource
The paper is structured as follows: Section two management activities and keeping track of local
discusses the relevant literature. Section three de- needs together with taking care of local advertis-
velops hypotheses about the relationship between ing. The franchisee’s and franchisor’s inputs impact
risk and incentives in franchise contracting. The pa- on how the outlet performs. However, the intensity
per concludes with a trial of explanation how the re- of efforts devoted to such activities is not easily
lationship between the risk and incentives changes, monitored by the parties other than the individual
using past research suggestions [11] [13] [26] [28]. providers of such efforts. In a franchising-type re-
lationship both the franchisor and the franchisee
Literature review share the risk and incentives, as opposed to an em-
ployment relationship where a manager is tasked to
Franchising is typically defined as a contrac- run a company-owned outlet.
tual arrangement between two legally independent The central idea behind the principal and agent
firms. This form of organisation is a well-estab- model is that the franchisor as the principal has high
lished business phenomenon and, consequently, monitoring costs to control the outcome and behav-
given its economic importance, one can find in iour of the franchisees in the presence of asymmet-
ric information. According to agency theory, man- ously, to lower the costs of control, companies del-
agers of company-owned units have less incentive egate authority and transfer more residual income
to perform efficiently because a substantial propor- rights to the agents in riskier environments. In this
tion of their compensation is fixed income. Due to situation, employees with more authority and in-
moral hazard which arises through a lack of effort centives react more flexibly to the dynamics and
on the part of the agent and the principal’s inabil- complexity of the task environment. Consequent-
ity to adequately monitor the agent’s performance, ly, Prendergast can provide an explanation of the
this form of compensation encourages managers to positive relationship between risk and incentives
shirk or perform suboptimal. In this situation, the in agency relationships.
principal introduces a performance-based contract However, since Prendergast only focuses on
to motivate the agents. Based on agency theory, incentive contracts in employment relationships
there is a trade-off between transferring risk to the he cannot explain the varying roles of incentive
franchisees and the incentives [22]. This key char- contracts under different governance mechanisms.
acteristic of the principal-agent model has received On one hand, employment contracts are used in
a great deal of scholarly attention since the original hierarchical relationships. On the other, franchise
papers published by Holmstrom [23] and Shavell contracts are concluded between the franchisor (as
[24], yet the empirical results do not confirm the principal) and franchisee (as agent), the latter be-
negative relationship between risk and incentives in ing an entrepreneur. This fundamentally different
franchising. relationship may influence the design of incen-
To conclude, the research gap results from the tive contracts. Franchisees as entrepreneurs gain
inconsistency between the theoretical and empiri- profits due to uncertainty and risk, but employees
cal patterns regarding the allocation of residual (with risk aversion) prefer contracts with less in-
income rights (royalties) and risk. According to centive under high uncertainty.
the standard prediction of agency theory, royalties
(as performance-based incentives) and risk should Property rights theory and the relationship
be positively related. The empirical results do not between risk and incentives in franchising
confirm this relationship [25] [26]. In addition, re-
cent theoretical results in organisational econom- According to property rights theory, the struc-
ics also question the risk-incentive trade-off [27]. ture of residual income and ownership rights de-
In the following section, we develop hypotheses pends on the distribution of non-contractible assets
which may explain the positive relationship be- (intangible assets) that generate the firm’s residual
tween risk and incentives. surplus. In franchising, this means it involves a re-
lationship of sharing the intangible assets between
Relationship between risk and incentives in the franchisor and franchisee. For the franchisor,
contractual relationships the intangible assets refer to the brand name assets
and the system-specific know-how. These assets
Delegation View of Incentives represent proprietary knowledge that is not easy
to transfer because the investments in such assets
Prendergast [28] argues that the principal as- are costly and not easily controlled [29]. The in-
signs a task to the agent or allows the agent un- tangible assets of the franchisee are outlet-specific
restricted choice over its actions. In addition, he know-how, know-how about local advertising,
argues that under high uncertainty the relationship customer service, human resource management
between incentives and risk might be positive. An and administrative capabilities.
uncertain environment requires the delegation of The franchisor faces a problem of how to max-
responsibilities which, in turn, results in incen- imise its returns when they depend on the local
tive pay based on output. Companies (principals) intangible assets of the franchisee. In franchising,
offer high pay-for-performance arrangements in this intangibility of assets plays an important role
more uncertain markets as they have high costs in determining the allocation of residual income
of controlling the employees (agents). Simultane- and ownership rights [30]. If one of the agents
The second hypothesis can be specified for em- If we apply this framework to international
pirical testing as follows: If we differentiate the franchise relationships, the franchisor is less able
franchise systems according to the intangibility of to evaluate the environmental uncertainty than
the assets involved, we can expect that the positive under domestic franchising. Therefore, in an in-
(negative) relationship between risk and incentive ternational setting environmental uncertainty and
(royalties) is stronger for franchise systems with hence monitoring costs are increased due to the
more intangible assets compared to franchise sys- geographical and cultural distance involved [31]
tems with less intangible assets. [32]. In particular, exchange rate fluctuations, po-
H2a: The negative relationship between risk litical instability, legal uncertainty and high cul-
and royalties is stronger for franchise systems tural distance increase the uncertainty for the fran-
with more intangible assets. chisor which will impact the relationship between
H2b: The negative relationship between risk risk and incentives.
and royalties is weaker for franchise systems
with less intangible assets. Conclusion
Overall, we can summarise our research model This research paper develops a new framework
that focuses on the relationship between risk and to explain the relationship between risk and incen-
incentives under two franchise systems: (a) sys- tives in franchise relationships. Specifically, it is
tems with a higher degree of contractibility (less argued that the relationship between risk and in-
intangibility); and (b) systems with a lower degree centives depends on the contractibility of assets
of contractibility (high intangibility) (see Figures and the underlying governance mechanism of
3a and 3b). the contractual relationship. If the assets are eas-
ily contractible, the franchisor may establish an
employment relationship with the managers of
company-owned outlets. These employment con-
tracts are characterised by a negative relationship
between incentive and risk. If the assets are highly
non-contractible, the franchisor transfers the re-
sidual income and ownership rights to the franchi-
sees. Specifically, it will introduce franchise con-
tracts characterised by a negative relationship be-
tween royalties and risk/uncertainty. In addition,
Figure 3a. Intangibility and the relationship the negative relationship between uncertainty and
between risk and incentives royalties will be higher for franchise systems with
highly intangible local market assets.
However, each study has its shortcomings and
is confronted with some limitations. Hence, quali-
tative methodology may not fully capture all qual-
ity criteria of validity and reliability. With success-
ful replication and comparison between cases the
findings shall not be considered as the ultimate
answers to our research model. Our proposed
model refers to theory-testing research. We de-
cided to use the case study approach which tests a
probabilistic relation. This exploratory study with
proposed hypotheses does not give us the possibil-
ity to collect data from a large sample. The reason
Figure 3b. Risk and incentives in franchise lies within time demanding access to bigger retail
contracting and services companies in order to get appropriate
Economic Behavior and Organization, 2005; 58(2): 33. Dul J. & Hak T. Case Study Research Methodol-
246–276. ogy in Business Research. Oxford: Butterworth-
Heinemann/Elsevier. 2008.
20. Bushman R., Indjejikian R.J. & Smith A. CEO
Compensation: The Role of Individual Performance 34. Yin R.K. Case Study Research Design and Meth-
Evaluation. Journal of Accounting and Economics, ods. United States of America: Sage Publications,
1996; 21(2): 161-193. Inc. 2009.
Red circle presents the epicentre of the major of the so far strongest aftershock Figure 2 marked in
earthquake, yellow shows the strongest aftershock, the picture and epicentre map with yellow asterisk.
while lines show the faults along which the earth- Theoretical isolines are shown in dotted line on
quakes occurred. Blue circles present aftershocks isoseists map of wider area struck by earthquake.
epicentres. Blue colour shows earthquakes having The isolines were derived on the basis of prelimi-
occurred over the past 24 hours.The following his- nary data collected in a phone survey, and on the
togram shows magnitudes of aftershocks according basis of registered maximal accelerations read from
to their intensity. The number of aftershocks shown instruments installed in the network for strong
in the picture is compliant with Omori’s law of seis- earthquakes. Aftershocks can be also seen in Ko-
mic activity development in epicentre zone after the caeli earthquake, 1993 Killari earthquake, India,
occurrence of an intensive earthquake. The day after 1999 Chamoli earthquake in Garhwal Himalaya,
the main shock Figure 3, seismic activity in epicentre 2001 Bhuj earthquake, India and in Cariaco earth-
zone was reduced which resulted in the occurrence quake in Northeastern Venezuela [6, 7, 8, 9, 10].
Table 2. Settlements of the narrower area struck by earthquake
Place Intensity Place Intensity
Adrani 7 Mataruska Banja 6
Belusic 4-5 Milavcic 6-7
Bresnica 6 Milocaj 6-7
Velika Drenova 4-5 Milutovac 5
Vitanovac 7 Mrzenica 4
Vitkovac 6 Mrcajevci 6
Vranesi 5 Obrva 6-7
Vrnjacka Banja 5 Oplanici 7
Glavinci 4 Osaonica 4-5
Goricani 7 Pecenog 6
Gotovac 5 Podunovci 5
Grabovac 5 Poljna 5
Gracac 5 Prevest 5
Grdica 7 Rajinovac 6
Guberovac 6 Ratina 6
Donji Dubi 5-6 Rekovac 4-5
Drakcici 7 Ribnica 7
Zica 7 Samaila 7
Jagodina 4 Sarajevo 4
Jarcujak 7 Sijace Polje 7
Katrga 6 Sirca 7-8
Kaculice 7 Sirca Banja 7
Kovanluk 7 Sirca, Potocari village 7
Kovaci 7 Sirca, Ravni Gaj village 7
Konarevo 6 Slatina 6
Kosevi 5 Stubal 6
Kraljevo 7 Tavnik 6
Ladjevci Gornji 6 Trgoviste 6
Ladjevci Donji 6 Trstenik 5
Lepojevic 5 Cvetke 6
Lozna 5 Cibutkovac 7
Loznica 4 Sljivica 6
Loćika 4 Stulac 5
Mataruge 5 Sumarice 7
2. Post-seismic phenomena
Certain phenomena were observed in the soil of
epicentre area of Kraljevo after the main earthquake
Table 2. Namely, in the village of Sirca, a rupture
of more than 20 m long occurred, which is shown
in the map as location 1 Figure 4. The appearance
of the phenomenon itself, the rupture from which
warm grey-reddish sand emerged, is shown in the
picture. In the same village, location 4, at the spring
of Sircanska Banja, one of the springs increased its
capacity by 5-6 times. New aquifer also emerged.
Concentration of sulphur in water increased, but re-
stored to previous level two days later. Near Opla-
kici 2, a rupture of 4-5 m was observed, also pour-
Figure 2. Мagnitudes of aftershocks according
ing water and sand. In one of the wells 3 of Sirca,
to their intensity
which used to have water level at 5m of depth, the
water was completely displaced by sand.
Many buildings from class a and a lot of from 3. Luković M., Novi podaci o tercijaru okoline Kralje-
class b suffered damages of third degree. va, Collection of SASA papers, Geological Institute,
Volume I, Belgrade, 1950; 3.
Such macroseismic intensity is “in accordance
with the estimated intensity based on earthquake 4. Bačević M., Populacijsko agrarna obeležja ruralnih
magnitude of М=5.4 and hypocentre depth at 12 područja i njihova klasifikacija u opštini Kraljevo,
km, based on empirical equation for the estima- Univerzitet Kirilo i Metodije, Faculty of Natural
Sciences and Mathematics, Geographical Institute
tion of macroseismic intensity generated based
Skoplje, 1985.
on data of macroseismic effects of harmful earth-
quakes of Serbia”. 5. Nikolić M., Razvoj i oragnizacija mreže centralnih
naselja na primeru funkcionlanog područja Kraljeva
– prostorno planerski aspect, Doctorate thesis, Fac-
ulty of Geography, Belgrade, 2011.
Corespoding autor
Danijela Vukoicic,
Faculty of Science,
University of Pristina (Kosovska Mitrovica),
Institute of Geography,
Serbia,
E-mail: ddvukoicic@gmail.com
tined for the top positions in the economy, politics, self-esteem and conviction in the correctness of
military, education, culture and other fields. In the their views. Also, the research of university of
literature there are different approaches to this is- Mebill considered that charismatic persons have
sue. Peter Drucker argues that’’ the basic qualities ideal goals and a strong commitment to personal
of leadership cannot create or promote, teach and achievements. The defining characteristic of char-
learn’’. On the other hand there are authors who ismatic leaders can have dominant features, such
claim that leaders are’’ created’’, not born. Ac- as: the special sense of vision, the ability to effec
cording to them leadership skills are acquired and tively deliver the vision to his followers and the
not a matter of biological destiny, but a matter of consistency and emphasized the need for vision
choice. Leaders are born and created’’. and effort to capitalize on their own values [7].
In ancient Greece and Rome, the ruler’s power
was not as rigorous and oppressive as in the East,
moreover, the organs of state power in certain pe-
riods have been constituted and functioned in a
fairly democratic basis and in the republican tradi-
tion (Sparta, and most of the Greek polis, Rome
during the Republic ), and it is known that the de
mocratic constitution of Athens even today repre-
sents the ideal to be pursued by the modern demo-
cratic state and that the Athenian democracy, and
today is the wellspring from which are powered
by modern political and legal doctrine. In such a
socio-political environment, there is a favorable
climate for the emergence of charismatic person-
alities (leaders in the contemporary meaning of
the word), a statesman, a true leader of masses
and popular tribunes, generals, orators, lawyers,
politicians, who are to become due primarily to
Figure 4. Elements of transformational lea moral and the intellectual force of their personali-
dership [Heskett, JL, Sasser, WE, Schlesinger, ties, personal initiative, ingenuity and democratic
LA (1997): The Service-Profit Chain, The Free relation to those who were led by them, ready to
Press: United States] listen and accept other opinions. There is a wide
range of the ancient leaders (the most nobly mean-
4. Basic understanding of charismatic and ing of the word), we will mention only some, not
transformational leadership pretending that our choice is the best one, but to
properly illustrate our thesis about the origins (and
The basis for a complete analysis of charismatic perhaps the right leadership) in antiquity. In Spar-
leadership was given by R. Haus. It is based on ta, which has all along been an aristocratic repub-
the views of the charismatic personality has spe- lic, and who set the standards of morality, patrio-
cial features, emphasized the structure of behavior tism and collective solidarity so high that no one
backed by the reference sources of power and in- before or after it has not conquered, there was a
fluence and certain discrete manifested tendency whole constellation of leaders-leaders, such as the
to influence others, to represent them and lead to legendary leader and legislator Likurg, basileus
real and perceived terms. Charismatic leaders have Lacedaemonian, Menelaus, Leonidas, Cleomenes
a high level of competence and confidence, ambi- and others. In Sparta, the authority of leaders was
tion, will and conviction, charm and a tendency to formed under unique specific circumstances. The
dominance, openness and the need to act for the reason for their existence was torn between two ir-
sake of higher interests. Simply, these are attri- reconcilable extremes’’ defeat the enemy in battle
butes of individuals with pronounced dominance, or fall from his hands,’’ [8]. Legal and moral rules
Spartans have unconditionally obeyed, which tells The focus of the entire political and social
the story Xenophon, arguing that the Spartans action in Athens, and therefore the leader ship,
should be’’ nice’’ to die [9], before to live without people management skills, there is freedom (eleu-
glory, because the battlefield was a disgrace’’ es- theria) and freedom of thought and speech (parre-
cape’’ [9]. In these moral, patriotic and collectiv- sia). Thus, the Athenian leadership is in complete
ist postulates, where everything was subordinate accord with the ethical ideals of the Greeks- har-
to state reasons, and even family relations and so mony (kolakogatijom). Ancient Greece affirmed
subtle, such as feelings of love and physical attrac- a fundamental ethical principle in the process of
tion between men and women, arose the leader- leading the people and the state and promoted the
ship and management skills, which is very close highest possible level of interaction between gen-
today’s leadership. eral and particular interests – citizens and state [8].
In Athens, especially in its democratic period, On these postulates lays modern leadership, or at
the function of the leader and the leader of a dem- least should be based.
ocratic nation or state body has a more democra- In ancient Rome, especially in the era of the re-
tized and more relies on the personal authority of public, national leaders and government officials
the leader, his moral and intellectual profile, in- were required to possess traits that differentiated
ventiveness, courage, determination, resourceful- them from the mass of those who have been led or
ness and ability to offer more appropriate solutions managed. In short, they had to live a life of virtue.
for each individual situation, and a willingness to Roman leadership was based on the leadership of
accept different opinions if it contributes more to the Greek, but I was more focused on pragmatism
adequately resolve the problem. In democratic and its material components, rather than doctrinal
Athens, everything was located in the orbit of free abstractions and ideal of harmony and virtue of law,
citizen-individual, even the process of governing general and individual interests. The Romans also
and leading a nation. History of Athens is rich had their admirable leaders even today. We will
with examples of true leaders in political, military mention only some, and above all to those who have
and any other plan. Great statesman, a greater re- the power of his personality, his moral and spiritual
former and one of the seven Greek thinkers, Solon profile gained the glory to become national leaders.
is an example of leader and leadership, acquired Mania Courier Dentate (winner of the Third Sa-
outside domain of political power and authority of maritan War), originally’’ snob’’ (homo novus), had
state organs. Solon’s leadership was based on the seized the high position owing to its own qualities
then enormous internal values of his personality and support plebs. His biography has for centuries
and not imposed by external political or military been an example’’ of Roman simplicity and mod-
authority. For his unimpaired prestige and high eration in their personal lives’’ [10].
reputation among the Athenians we can see from From antiquity leadership never ceases, but
the fact that he was a thorough reformist of the so- only took on new contours and promote new
ciety entrusted with the same passion for rich and values, which need to have leaders of the people
poor. In gratitude for the successful reform ren- and holders of political power. As in much of the
dered the Athenians built a monument to him and middle Ages dominated church doctrine and the
crowned him as the inscription - agios nomotetes theory of predestination, by which everything
(‘’sacred’’ the legislator). Solon was a great na- is predetermined, and the reward comes only in
tional leader, but not far behind Cleisthenes, Peri- the world after this to the merits what is done in
cles, Alcibiades, Aristides the Just, Themistocles, this life. In the first centuries of Christianity, the
Miltiades, Demosthenes, and Dr. Kimon. To this most important leaders of the people appear to
number should be added and the whole Pleiades be the church fathers. The doctrine of the divine
of Athenian demagogues (this term is now often origin of the ruler’s power strengthens a person as
wrongly used in pejorative sense), people’s lead- God’s chosen ruler of the country, which narrows
ers, gifted speaker, which were in their memorable the scope for other forms of leadership, except
speeches exercised a strong influence on the po- for purely political-ruling father leadership. Add
litical life of Athens and social importance. to this the doctrine of the Christian state and the
frequent occurrence of fanatical fideism, which There is no doubt that the transformational style
produces intolerance in the political plane [11], it used in the special conditions of business enter-
becomes clear why the leadership in the Middle prises. Thus, for example, transformational style is
Ages stagnated relative to antiquity. applied in conditions of high intensity and change
Studies have shown that the whole set of per- of major form or scope changes. However, it is not
sonal values and the capacity to influence the be- really needed in a situation where a high coverage
havior of others, their commitment to achieve the of organizational change, but its weak intensity, or
goals and personal satisfaction. Viewing’’ set’’ a high rate of change, but low coverage. Transac-
charismatic leader skills is given in Table 1. tional style is applied under relatively low inten-
Table 1. Set of the attributes of charismatic leader [7] sity of change and its relatively low coverage. The
1. Confidence. Charismatic leaders deeply believe mechanisms of this style are based on the exchange
in their own thinking and ability. of “identity” enable efficient function of enterprises
2. Vision. Charismatic leaders have an idealized and relatively easily adapt demands.
goal that takes precedence over the present. The
difference between the desired and current state
of the attitude of the followers of the visionary
qualities of leaders
3. Ability to express a vision. Charismatic leaders
are able to successfully explain and present a
vision. Ability to express the vision shows the
ability of leaders to understand the needs of
followers and to motivate them.
4. Strong belief in a vision. Charismatic leaders
are willing to risk, sacrifice and commitment to
achieve the vision.
5. Unusual behavior. Their behavior is not
conventional, but unusual and it is outside the Figure 5. Model changes of leadership content [7]
existing rules and norms.
6. They appear as change agents. Charismatic The changes being implemented are of incre
leaders are the bearers of radical changes and mental nature, step by step, based on plans and
requirements. They are not advocates of waiting standard procedures. Possible changes in the na-
and keeping the status quo. ture of the request and the discontinuity cause
7. Sense of the environment. Charismatic leaders changes of transformation techniques and the us-
realistically assess the impact and limitations of age of transformational leadership. Practice shows
environment, as well as events that can cause that in these situations, companies make strategic
certain changes.
changes in highest levels of companies, involve
ment of new individuals, experienced leaders, or
Switching from transactional leaders to trans- they start and finance the transformation with the
formational leaders is not an easy process or a existing structure.
process that can be achieved quickly, by pres- In the combination of two organizational chang-
sure and directive. This shift implies a change in es, such as intensity and extent of changes, accord-
complex mental seed in corresponding changes in ing to trends and their habits, we can apply the con-
awareness, the development of certain desire to cept of transaction and transformational styles. The
bring change, overcoming new significant skills, figure 6 shows the styles change from incremental
knowledge and implementation of acquired skills, improvements to the transformation.
feedback, and gaining new abilities and predispo- Thus we can conclude that the different type of
sitions. The figure 5 shows a model of “transition” organizational change requires different types of el-
elements of transactional style into transforma- ements. In terms of continuous development of en-
tional style. terprises, the transition from one lifecycle stage to
another, the most appropriate approach is transfor- – participation structures and expanded
mational approach. In terms of discontinuity, radical knowledge and spectrum
change is an appropriate example of the transforma- – Efforts to achieve Excellence through
tional approach, whose skills and abilities go beyond competitive superiority and domination [5].
the usual norms and rules. Moreover, discontinuous
changes call into question the “standard” interpre- Under these conditions, transformational lead-
tation schemes and require changes in existing cul- ership is based on the vision, the ability to com-
tural facilities. This is the direction that company is municate to other social actors, clear principles of
ready to follow, ready to maintain and develop the decision-making and implementation, ability to
dominant paradigm in terms of discontinuity. acquire knowledge, respect and understanding of
its followers. On this basis, transformational lead-
ers tend to use specific models for the effective
positioning of their companies:
1. The reactive model
2. Model changes in internal environment
3. Model changes in external environment
are four catego ries of transformational leaders ning of chronological study of the history it
who differ in the way of accession to the resolu- is often referred to Moses.
tion of tasks and goals which they want to achieve:
1. The intellectual leader, see the ideas and
values that transcend the immediate, practi
cal needs and always change and transform
its social base, to keep in time with and it is
in a conflict with the status quo in the orga
nization. It has a vision to transform society
by raising social awareness.
2. The Reform leader requires the participa
tion of a large number of allies with various
reform and unreformed goals, which usually
originate from the leaders. Then he is often
faced with divisions in the organization and
his opponents are informal groups of orga
nizations that fight against the leader and his
reforms and seeking retention of the status
quo in the organization. They are afraid of
changes and their positions in the new re
formed organizational structure. Transfor
mational leader must with his moral dignity
to provide support in the organization for his
changes, and to increase daily number of his Figure 7. Transformation of leadership styles by
followers. Besides his moral characteristics James McGregor Burns
reform leader must have a sense of social
organization that he manages and to hold to The changes that occur in organizations or in
ethical principles in his work, which are so society leadership implications do not always rep-
cially useful. resent the chance for new opportunities. Burns’s’’
3. The revolutionary leader, as a transfor amoral’’ leader does not have the chance of new
mational leader requires of its employees changes that are beneficial to the organization and
to fulfill their obligations, perseverance, society. He fights for brute power and it cannot be
courage and selflessness. He is a reformer either transactional or transformational leader, but
who sees any change as a new possibility he can be the leader of the masses, but this lead-
of prosperity of the whole, therefore, his po ership always has a tragic end to his own people
wers as a leader he transferees to the entire (Mussolini, Hitler, Pinochet, and Stalin).
organization. It has a strong sense of vision Transformational leader transform moral val-
and mission. Often, if he is not a leader of ues into the leadership taking into consideration:
economic organizations, he appears as a po justice, freedom, team spirit and gender equality.
litical leader who motivates the masses to According to Edgar Schein transformation cre-
revolt in the service of the revolution. His ates a change in the company’s corporate culture
changes are profound and can cause earth and the way of how to design an organizational
quakes in all parts of society. Often it comes structure. The leader pays attention in any change
to social and political changes in the system. of measures that are taken in the organization, he
4. Charismatic leader often is treated in a control them and sends symbolic signals of corpo-
theory as a transformational leader, but rate culture so that set tasks will be achieved on
with special skills that gives him a greater the easiest way and achieve the stated goal [12].
prerogatives and personal charisma. As an
example of charismatic leaders in the begin
Corresponding author
Srdjan Nikezic,
University of Kragujevac,
Faculty of Science,
Kragujevac,
Serbia,
E-mail: srdjan_nikezic@yahoo.com
The aim of the present study was thus to deter- to every test the machine was calibrated, ROM was
mine muscle strength variables of lower limbs in set at 90º and a warm up consisting of bicycle run
cadet basketball players in order to detect possible and stretching of quadriceps and hamstring muscles
asymmetries. were applied. A more specific warm up consisting
of 3-4 sub maximal repetitions at the testing speed
Materials and methods of 60 deg/sec for both quadriceps (knee extensors -
KE) and hamstring (knee flexors - KF) muscles in
Subject sample order to prepare subjects for regular testing. After 2
min the subjects performed 4 repetitions of maxi-
The sample consisted of overall 68 cadet basket- mal voluntary contractions of thigh muscles. The
ball players (Table 1) of representative competitors same person conducted all measurements and the
of BiH (Bosnia and Herzegovina) that were regis- same protocol for both legs was used [15]. Relative
trated in KSBIH (Basketball Association of Bosnia peak values of thigh muscle torques were recorded:
and Herzegovina), as well as club level competitors right and left knee extensors (KE-R and KE-L re-
from the various clubs in Sarajevo Canton. All the spectively) and right and left knee flexors (KF-R
participants had at least one year training experi- and KF-L respectively).
ence, without serious injuries of lower extremities In assessing balance ability (proprioceptive
bone-muscle system in the past six months. qualities) Biodex balance system was used in cal-
Table 1. Physical characteristics of subjects studied culating leg stability index.
Basketball players (N = 68)
Age (years) 16.61 (0.49) Statistical analysis
Body height (cm) 188.26 (8.46)
Body mass (kg) 77.25 (11.97) In the first stage of data analysis for given vari-
BMI 21.72 (2.53) ables, central dispersion parameters were calcu-
lated. T-test for independent samples was used to
All participants were medically examined pri- determine qualitative differences of two explored
or to the beginning of the training protocol, and areas, whereas factor analysis was applied in the
were confirmed with no clinical disorders of lower multivariate level of statistical procedures.
limb. All of them gave their written consent to par-
ticipate in this study. Results
It can be seen in Table 3 that the total and the low correlation of leg stability index with strength.
average work-output achieved at the testing is sig- Results of T-test show differences between left
nificantly higher for the right leg. and right leg in variables that measures muscle po-
There were no statistically significant differ- tential of hamstrings, in particular Peak power of
ences found in anthropometric variables between knee flexors, Average power of knee flexors and
left and right leg, except for thigh girth on the low- Total work of knee flexors.
er level of significance (Table 4). Factor analysis of applied variables isolated
Hcon/Qcon ratios for left and right leg statistically four components that explain 81,030% of com-
differ in lower level of significance (p<0.05), how- mon variance in researched areas (Table 7). By
ever, measured values are in optimal ratio (Table 5). analyzing data, it can be noticed that each of
Table 5. Mean values (±SD) of Peak moment Hcon/ treated variables, except for balance index for left
Qcon ratios (%) of the right and left leg and right leg, has high projection. This somewhat
Hcon/Qcon ratios lower projection is in dominance of morphologi-
t p cal variables and isokinetic component that led to
L R
suppression of fewer number of balance variables.
54.17±8.84 56.58±8.82 -2.264 0.027
First isolated factor represents a factor of iso-
L – Left leg; R – Right leg
kinetic potential, for it has high projections of al-
For leg stability index measured with Biodex most every isokinetic parameters except for H/Q
balance system, no significant differences between ratio for both legs. Second isolated factor represents
left and right leg were found (Table 6). a combination of morphological characteristics,
Table 6. Mean values (±SD) of leg stability index variables that concerns girths as well as balance
for the right and left leg variables. Third factor is made of residual of mor-
Leg phological characteristics concerning longitudinal
t p
L R dimensionality of lower extremities. Forth factor is
Leg stability index 4.61±2.26 4.19±1.58 1.660 0.102 residual of values in two remaining variables of iso-
kinetic potential of H/Q ratio for both legs.
Heterogeneity of the sample in morphological
and motor abilities of isokinetic performance can
Discussion
be noticed in obtained values of basic and central
parameters for left and right leg. Variable that re- By analyzing values of basic and central param-
fers to balance shows no greater differences and eters for both legs, it can be noticed the presence
deviations indicating sample homogeneity. Inter- of heterogeneity within morphological characteris-
correlation matrix within motoric area is showing tics and motor abilities. The heterogeneity of ob-
tained results in morphology could mean that par- region was payed through applying isokinetics,
ticipants were not highly selected. Basketball rep- which have proved to be useful tool in identifying
resents sport for mainly tall men, where selection both physiological characteristics and pathologi-
from anthropometric point of view should be made cal conditions. However, there is still no general
in accordance to longitudinal dimensions, primar- consensus related with the importance of isokinet-
ily height, arm and leg length, foot size and hand ic as predictors for injury prevention.
diameter. In his recent study [1] suggest that the A variable that refers to balance in the motor
positional differences in quadriceps and hamstring area showed no major differences and deviations,
muscle strength of elite male basketball players are indicating the homogeneity of the sample. In ad-
the result of respective differences in body size, dition to reported results discussed within Inter-
whereas factors other than body size are respon- correlation matrix from present study, it has been
sible for the positional differences in ankle plantar- noticed low correlation of power variables with
flexor and dorsal flexor-strength. Heterogeneity of balance. The reason for this lower correlation
motor abilities (i.e. isokinetic potentials) is showing could be found in the explanation that force size
absence of training technology, within transforma- does not influence performance of balance tasks.
tional processes, that improves these performances. However, successful performance of balance tasks
In clinical and scientific research, knee joint depends on optimal level of force in synergy with
and thigh muscles have been described in nu- action of coordination and flexibility.
merous occasions using a variety of techniques In further analysis t-test for independent sam-
[14,15,3] . In last 30 years special attention to this ples for left and right leg was performed. Results
showed that Left and Right leg differed signifi- tion of its value as the predictor of the injury is open
cantly between tested levels in variables of knee [18,10]. Assessing muscle balance is considered im-
flexor muscle potential. These differences were portant, but independently, the peak moment ratios
in favor of Right leg. However, differences in provide limited amount of information.
balance (proprioceptive qualities) of basketball
players have not found. The structure of applied Conclusion
variables in factor analysis showed four isolated
main components: First component as factor of Muscle strength represents one of the main pa-
isokinetic potential (i.e. high projections in almost rameters of general physical condition, beside the
every isokinetic parameters except for H/Q ratio fact that is one of the most responsible parameters
for both legs). Second factor as combination of for sport results. In addition to maximal power, the
morphological characteristics, variables that con- correct strength ratio of different muscle groups,
cerns girths as well as balance variables. Third especially those related to the same kinetic chain is
factor is made of residual of morphological char- essential. In sample of subjects from different clubs
acteristics concerning longitudinal dimensional- presented in research, assumably, is not taken care
ity of lower extremities. Forth factor is residual of proper selection of basketball players, during the
of values in two remaining variables of isokinetic formation of youth selections. This is confirmed
potential of H/Q ratio for both legs. These given with facts of present study findings, where results
factors, with their predictive values, measured so- are showing large heterogenity of presented subject
phisticatedly, explain large proportion of variance, sample, especially for morphological characteris-
with 81.030%. This fact confirms the good psy- tics. Overall results have shown a muscle imbalance
chometric properties of instruments used. for knee flexor group, due to assimetry of stepping
It has been proved that bilateral imbalance in (dominant) compared to non-dominant leg. How-
strength especially of lower limb could be the ever, no imbalance for thigh muscles (quadriceps)
predictor of decreased performance or even the has been found, which can be explained as qonse-
predictor of higher injury risk. It has been stated quence of quality training process.
that bilateral deficit of quadriceps or hamstring
muscles greater than 10% is a milestone for in- Reference
creased injury risk [14,12] Low value of concen-
tric (Hcon/Qcon) ratio have been related with higher 1. Brown L. “Isokinetics in human performance. Cham-
paign IL: Human Kinetics.” 2000.
injury risk as well [4]. In our study the ratios for
left and right leg were 54.2 and 56.6 respectively 2. Dvir Z. “Isokinetics Muscle testing, Interpretation
which is close to optimal values. In other study and Clinical Applications (2nd edition). Churchill Liv-
of [9] was revealed that the concentric ratio was ingstone.” 2004.
lower than 0.5 in all subjects in initial isokinetc
3. Dervisevic E., Hadzic V., Karpljuk D., Radjo I. “The
testing, though the subjects were not only basket- influence of different ranges of motion testing on the
ball players. After this finding isokinetic training isokinetic strength of the quadriceps and hamstrings.
was applied in order to restore normal values of Isokinetics and Exercise Science”, 2004; 14(3): 269-
Hcon/Qcon ratio and decrease injury risk. 278.
Assessment of lower limb strength ratios is im-
4. Golik-Peric D., Drapsin M., Obradovic B., Drid
portant in assessing muscle imbalances [16]. Bilat- P. “Short-Term Isokinetic Training Versus Isotonic
eral muscle asymmetry and muscle imbalances of Training: Effects on Asymmetry in Strength of Thigh
knee flexor/extensor have been known as the etiolo- Muscles. Journal of Human Kinetics”, 30(Decem-
gy of many injuries, especially hamstrings [19,7,8]. ber) 2011; 29-35.
The questions like whether the correction of any
5. Dauty M., Potiron-Josse M., Rochcongar P. “Iden-
muscle imbalance could reduce the risk of injury, or tification of previous hamstring muscle injury by
if muscle imbalance causes injury has not been fully isokinetic concentric and eccentric torque measure-
investigated. The peak moment Hcon/Qcon has been ment in elite soccer players. Isokinetic and Exercise
used to assess thigh muscle imbalance, but the ques- Science”, 2003; 11: 139-144.
6. Drid P., Drapsin M., Trivic T., Lukač D., Obadov S., 17. Drapšin M., Klašnja A., Lukač D., Karaba-
Milosevic Z. “Asymmetry of muscle strength in elite Jakovljević D., Drid P. “Uticaj izokinetičkog
athletes. Biomedical Human Kinetics”, 2009; 1: 3-5. treninga na asimetriju u snazi mišića natkolenice.
U: Zborniku radova interdisciplinarnog naučno-
7. Drid P., Ostojic S., Vujkov S., Purkovic S. Trivic T., stručnog skupa sa međunarodnim učešćem „Po-
Stojanovic M. “Physiological adaptations of a specif- lovinu našeg tela čine mišići – koristite ih“,Novi
ic muscle-imbalance reduction training programme Sad: Medicinski fakultet.” 2011; 5-9.
in elite female judokas. Archives of Budo”, 2011;
7(2): 61-64. 18. Trivić T., Vujkov S., Drid P. “Mišićni disbalansi
natkoljenične muskulature kod različitih grupa
8. Schlumberger A., Laube W., Bruhn S., Herbeck B., sportaša i grupe nesportaša. U: I. Jukić (Ur.)
Dahlinger M., Fenkart G., Schmidtbleicher D., May- Kondicijska priprema sportaša 2008, Zagreb:
er F.”Muscle imbalances – fact or fiction? Isokinet- Kineziološki fakultet Sveučilišta u Zagrebu.” 2008;
ics and Exercise Science”, 2006; 14(1): 3-11. 167-171.
9. Madsen O.R. “Torque, total work, power, torque 19. Drid P., Drapšin M., Trivić T., Bratić M., Obadov S.
acceleration energy and acceleration time assessed “Thigh muscles flextion/extension ratio in elite judo
on a dynamometer: reliability of knee and elbow ex- players. Journal of Combat Sports and Martial
tensor and flexor strength measurements. European Arts”, 2010; 1(2): 21-25.
Journal of Applied Physiology”, 1996; 74: 206-10.
10. Bradic A., Bradic J., Pasalic E., Markovic G. “Iso- Corresponding Author
kinetic leg strength profile of elite male basketball Izet Radjo,
players. Journal of Strength and Conditioning Re- Faculty of Sport and Physical Education,
search”, 2009; 23(4): 1332-1337. University of Sarajevo,
Bosnia and Herzegovina,
11. Lord J.P., Aitkens S.G., McCrory M.A., Bemauer E-mail: piramida33@hotmail.com
E.M. “Isometric and isokinetic measurement of
hamstring and quadriceps strength. Archive of
Physical Medicine and Rehabilitation”,1992; 73:
324-330.
14. Radjo I., Mekic A., Drapsin M., Trivic T., Kajmovic
H., Drid P. “Isokinetic strength profile of shoulder
rotators and thigh muscle torques in elite judokas
and soccer players. TTEM”, 2011; 6(3): 631-635.
many other reasons as well as the purely economic may result from the failure of existing structures
ones, which indicate that the rehabilitation market due to their inadequate conservation can cause se-
has high growth potential in many countries: the vere consequences for the population and heritage.
growing social awareness that the conservation There are extreme situations and casuistry:
and enjoyment of built cultural heritage has ac- countries with no rehabilitation policy, countries
quired, the favorable prospects offered in certain that do not consider the possibility of traditional
areas by the cultural sector as an engine for ac- techniques. On the other hand, there is a remark-
tivity (Cultural Tourism), the progressive ageing able lack of basic knowledge about the behavior
of existing housing. Moreover, the rehabilitation of traditional materials, new components suitable
sector is a key topic in terms of sustainable urban for use and methods aimed at optimizing the dura-
growth: promoting low energy consumption (in bility of the rehabilitated structure.
contrast with demolition and new work), consum- In addition, the reasons for pathological process-
ing less material than new construction work, etc. es occurring in structures subject to rehabilitation
All these circumstances result in the need for are extremely varied, making it difficult to follow
specific training of the architects and engineers a model that serves as a general working protocol.
dedicated to this area, including civil engineers. The variables affecting these pathological process-
However, the definition of the basis of specific es, in turn, are very numerous and extremely com-
training that engineers involved in rehabilitation plex, since they can act synergistically.
should receive is not adequately dealt with [6], so At this point we must ask ourselves: When
their particular build-up is far from suitable for should a structure be rehabilitated? Is it more con-
this activity. venient to demolish the building and construct a
The purpose of engineering education research new one or to maintain the existing one? What
needs to extend beyond an interest in improving procedure should be adopted during the inspec-
an individual’s teaching, or developing a specific tion? Are the intervention proposals identical in
curriculum, by including a lot of questions that the all geographic locations? Moreover, we could add
teacher must be able to answer [7]. another question to all of these, why?
In practical terms, Civil Engineering educa- Civil Engineers, at the design level [10], should
tion must undergo significant changes, making be able to adopt an approach when answering these
Civil Engineers more creative and ready for the questions. We choose rehabilitation when, after an
challenges of the 21st century, adapting Civil exhaustive study of the existing pathological pro-
Engineers to the changing society and its evolv- cesses, we have objectively determined that the
ing needs (i.e., environmental protection, energy structure has lost the properties for which it was
independence, safety, etc.) [8]. A common theme designed, and presents a potential risk of failure,
in the courses is that engineering is an integrative with the socioeconomic impacts that this entails.
process and that curriculum innovation therefore Engineers should propose the use of the most
should be toward this end [9]. appropriate therapy for each case, always seeking
In this paper, we analyze the current dedication to a balance between rehabilitation process optimiza-
rehabilitation of construction within the Faculties or tion and cost [11]. In turn, those in charge of the
Schools of Civil Engineering worldwide, to provide rehabilitation work, usually also Civil Engineers,
sufficient input data to later reflect on the proposal should ensure the proper execution of work, with-
of a universal educational program with the aim of out skimping on resources [12]. This is of great sig-
joining forces and creating common strategies for nificance in highly industrialized countries, where
action in a building in need of rehabilitation. economic impact is the most important factor.
Within this working scheme, we must pay spe-
2. Motivation for the work cial attention to buildings whose need for rehabili-
tation and maintenance is especially significant due
We should see the rehabilitation of buildings as a to their status as World Heritage sites. These build-
necessity in the cultural, social, economic and envi- ings are included in the United Nations Education-
ronmental policy of any country, as the impact that al, Scientific and Cultural Organization (UNESCO)
List [13]. Nevertheless, there are recent buildings, metal or concrete. So the article tries to provide
which although not unique from the architectural an overview of the general approach in different
point of view, must be rehabilitated, sometimes countries, taking into account the different con-
simply due to changes in functionality or habitabili- struction types.
ty. Their lesser singularity does not preclude requir- We have based the methodology used in this pa-
ing similar exhaustive analysis. per on sending a carefully designed questionnaire,
In short, a rehabilitated structure will be a com- shown in Figure 1, to teachers from 89 universities
plex system, formed by the remains of old materi- in 30 countries in five continents. We have based
als, damaged or undamaged, and new materials, our criterion for selection of countries on the exis-
sometimes with different chemical compositions tence or nonexistence of World Heritage Sites listed
and properties. The result must have absolute by UNESCO. The selection criterion for the univer-
structural integrity, so it is necessary to develop sities in each country was essentially the university
a detailed study that will guarantee the suitability ranking, both worldwide, and within each continent
of the system to support service loads and guaran- and country concerned. For the selection of teach-
tee durability under the prevailing environmental ers, the criterion was teaching and research activities
conditions [14], while ensuring the compatibility related to the activity under study, namely rehabili-
of all materials used [15]. tation within Civil Engineering. We obtained their
The Civil Engineer must obtain the multidis- Email contacts either by consulting the websites of
ciplinary knowledge base necessary to carry out each university, or searching the database where the
optimal interventions on existing buildings in the authors of the most relevant research work on these
University. Teachers must motivate students to ac- issues appear. It should be noted that in a very large
quire skills for the rehabilitation of the building, number of schools this subject is not dealt with at
since it is affected by many variables. This situa- the teaching level, or from the quantitative, qualita-
tion requires clear objectives and methods coordi- tive or mixed viewpoint, as some authors working
nated with the help of the specialists experienced in the field of exploration of teaching methods sug-
in each particular area [16]. gested [17].
Therefore, we consider that this issue should
be obligatorily in Civil Engineering courses both
at bachelor’s degree and postgraduate levels, as
there is a growing demand for the rehabilitation
of buildings.
In this paper, after arduous logistical work,
based on detailed analysis of the questionnaire de-
signed by the authors from their experience, and
answered by teachers from around the world, it
has been concluded that rehabilitation of build-
ings is not sufficiently addressed in the Schools of
Civil Engineering worldwide.
The questions included in the questionnaire To perform the study, we initially considered
are a reflection of the preference and content countries with the highest number of listed build-
given by each teacher responsible for that subject ings (Figure 2), or in which these constructions
in the university, so we can see it as a novel, un- were of very high cultural significance worldwide
published study. in terms of: their age, having served as a model
for other later buildings due to the techniques and
3.1. Selection of countries based on the procedures followed, or their location. Europe is
UNESCO World Heritage Sites the continent that has most sites listed by UNES-
CO and wherein we found the broadest selection
UNESCO is a global body dedicated to review- of building types.
ing the need to select historic monuments, land-
marks, or recent buildings, due to their artistic and 3.2. Selection of universities based on QS
cultural value. As of March 2012, these include World University Rankings 2010 -
725 cultural, 183 natural and 28 mixed properties Engineering & Technology
in 153 participant countries.
Based on the QS World University Rankings
2010 - Engineering & Technology Database, we
selected universities in those countries with the
largest number of heritage sites listed by UNES-
CO, or those which, while having little relevant
heritage, occupy relevant positions in the ranking.
Moreover, in the case of countries that do not have
universities listed in the world rankings, we have
included those that are most significant in their
continent and/or country.
In Europe we contacted a total of 33 universi-
ties in 11 countries, in Asia, 17 universities, in 5
countries. In America we contacted 25 universi-
ties in 6 countries and in Africa, 11 universities
Figure 2. Countries selected for the study, detailing
in 6 countries. Finally, in Oceania, we contacted
the total number of Cultural Sites (UNESCO) and
a total of 3 universities in 2 countries. For each of
the universities we sent the survey to for each one
the countries, Table 1 summarizes: The number of
buildings or monuments listed by UNESCO, the
number of universities surveyed, and the name of
each and the number of surveys received.
4. Evaluation of the current state of for rehabilitation of steel and cast iron structures
education in rehabilitation worldwide which only 34% of respondents deal with. Thus,
Results and discussion explanation of general and methodological con-
cepts, examples of pathology reports and previous
The first piece of data, before any processing of
studies, and rehabilitation of concrete structures
the surveys collected, is that we received a signifi-
are the most commonly discussed topics at bache-
cant number of responses in which it is acknowl-
lor’s degree level. This is confirmed by more than
edged that rehabilitation of buildings is not taught
70% of the surveys. In postgraduate study, as well
in Faculties of Civil Engineering. Furthermore,
as some of the above, over 70% of respondents
we appreciated a greater intensity of participation
explain examples of intervention in old buildings.
in certain European and Latin American countries.
In contrast, the least studied topics are rehabilita-
Focusing on the surveys received (a total of 48,
tion of earthworks (17% in bachelor’s degree and
35 bachelor’s degree level and 13 postgraduate), it
8% in postgraduate), strategies for monitoring and
will be presented the results obtained below, com-
control of buildings (37% and 31% respectively),
menting on the most characteristic aspects. Simi-
concepts about the history of construction (37%
larly, it should be mentioned that it is complicated
and 46%), aspects related to intervention in foun-
to unify the responses due to the priority that each
dations of buildings, whether historic or modern,
teacher / syllabus gives to a particular topic [18].
and as a matter of concern, rehabilitation of steel
At global level, considering the average values
and cast iron structures (34% bachelor’s degree
around the world (Figure 3), education about heri-
and 46% postgraduate).
tage rehabilitation is more extensive in postgradu-
The first conclusion is that it seems reasonable
ate study. Only two topics have a relatively high
to balance the preference with which different top-
priority at bachelor’s degree level. Specifically,
ics, which might be included in the syllabus of a
teachers deal with the topic related to the rehabili-
building rehabilitation course, are dealt with.
tation of concrete structures at bachelor’s degree
Figure 4 shows the preference in the subjects
level in 80% of the surveys received, while in
surveyed, at bachelor’s degree level, discriminat-
postgraduate the value is 62%. Similarly, teachers
ing among continents (no surveys were received
include building maintenance strategies in 69% of
from Oceania). We can see that the study is more
the bachelor’s degree surveys received, compared
comprehensive in Europe and, to a lesser extent,
to 46% in postgraduate.
in America compared to Asia and Africa, while we
can see that teaching in history of construction and
rehabilitation of old buildings has, in general, less
dedication than other topics.
In addition, not all the topics covered in the sur- Figure 4. Radial diagram of teaching preference
vey are taught with the same preference. At bach- at bachelor’s degree level in different topics re-
elor’s degree level, there is less content related to lated to rehabilitation of construction in different
old buildings compared to modern ones, except continents (per unit)
Taking into account the results of this study, the dologies for the seismic safety assessment
fact that a country has a larger number of heritage of constructions. Seismic strengthening
sites listed by UNESCO is not a reason in itself solutions for old masonry buildings and for
for rehabilitation teaching to be more integrated reinforced concrete buildings.
and intense.
5. Conclusions
4.4. Other topics taught
Currently, intervention in historic buildings
In the survey we sent to teachers involved in remains one of the most important challenges for
the possible teaching of Construction Rehabilita- modern technicians. In addition, rehabilitation and
tion in Civil Engineering Faculties (Figure 1), we maintenance of buildings is one of the most impor-
included a section where those interested could tant economic segments in the construction sector.
enumerate other content that they teach, comple- If, in addition to this, we take into account that the
mentary to the more general content contemplated rehabilitation market has high growth potential in
in the survey. This section summarizes the infor- many countries, we can conclude that this topic is
mation collected in the surveys related to this in- already an important niche activity and, therefore,
formation (13 at bachelor’s degree level and 6 at it constitutes work which Civil Engineers should
postgraduate level). not ignore.
– Criteria and principles for conservation of Consequently, there is a compelling worldwide
architectural heritage. need for specialized teaching of Civil Engineers
– The importance of identifying the structural engaged in this field. The universities should re-
system. consider the base of multidisciplinary knowledge
– Rapid Visual Screening Procedures. necessary to carry out optimal interventions in ex-
– Assessment of Existing Structures: In- isting buildings. In this sense, we should motivate
situ (Non-destructive inspection and our students to acquire skills related to construc-
Monitoring), in-laboratory investigation tion rehabilitation. Therefore, we consider this
techniques, and calculation techniques. topic is essential in the syllabus of Civil Engineer-
– Evaluation of existing structures through ing at bachelor’s degree level, particularly in spe-
structural integrity methods. cialization in construction, due to the increasing
– Provisional scaffolding. demand for construction rehabilitation.
– Demolitions: Types of demolition, work A first step in designing the strategy to follow,
previous to demolition, demolition methods, which we should translate into a course program,
and equipment for carrying out demolition. is the analysis of the current dedication to this top-
Protection measures. ic within the Faculties or Schools of Civil Engi-
– Processes of degradation of structural neering worldwide. Therefore, the main objective
materials: prediction models. of this study was to deepen that knowledge. For
– Special materials adopted to rehabilitate or this purpose, we contacted a total of 89 universi-
strengthen structures. ties in 30 countries, spread across the five conti-
– Mechanics of masonry in compression, nents, from which 48 surveys were received. Due
tension, shear, out-of-plane bending. to, on the one hand, the lack of answers and, on the
– Surface protection: Masonry, wood, other, the high number of responses stating that
concrete, steel and cast iron / Corrosion. they did not address construction rehabilitation
– External building elements (roofs and in the Civil Engineering syllabi, we can conclude
facades) and internal elements and finishing. that in a very large number of faculties they do not
– Humidity problems in modern buildings / deal with this topic at the teaching level.
Ventilation design / Rising Damp. Globally, we can see that the topics that shape
– Seismological Engineering. Effects of the field of knowledge of architectural heritage
earthquakes on constructions: Pathological rehabilitation are dealt with more completely at
processes from recent earthquakes. Metho- postgraduate level, with the exception of the reha-
Corresponding author
Ignacio Lombillo
Dept. of Structural and Mechanical Engineering,
University of Cantabria,
Civil Engineering School,
Santander,
Spain,
E-mail: ignacio.lombillo@unican.es
In [15] it is supposed that every decision maker i=1,..,I; j=1,..,J; k=1,..,K; n=1,…,N; e=1,..,E;
gives fuzzy rating of criteria weights. Their esti- ~e
mations can be represented as positive trapezoi- wr ∈ R.
dal fuzzy numbers. According to the nature of the
problem, the authors are of the opinion that it can These triangular fuzzy numbers are given in
be supposed that goal weights on every perspective the following way:
are set as a group-decision problem. Fuzzy rating – least important (y;1,1,1)
of each decision maker is expressed by aforehand
– little important - (y;1.5,2, 2.5)
defined linguistic expressions which are modeled
by triangular fuzzy numbers, with analogy to the – fairly moderately important - (y; 2,3,4)
above mentioned papers. Authors suggest a new – moderately important - (y; 3.5,5,6.5)
method for determining business goal weights – fairly important - (y; 6, 7, 8)
based on Dephi method. It is held that suggested
methodology enables more precise determination –– highly important - (y; 7.5, 8, 8.5)
of business goal weights in relation to methodolo- – most important - (y; 8, 9, 9) .
gies proposed in papers which are to be found in
literature. Fuzzified Delphi method can be denoted 3.2 Fuzzy Delphi method
as one of the main contributions of this paper.
In this paper, Delphi method is proposed and is
realized in the following phases.
3. Problem statement Phase 1. Each decision maker of a management
The paper further explains the problem of team gives own estimations which are described
ranking business goals. Business goals on each by one out of seven defined linguistic expressions.
perspective of a profit organization are defined ac- Step 2. Estimation analysis is realized by man-
cording to literature data [1-4]. In this paper, the agement team in the following steps:
considered problem is stated as a group decision- (1) the estimation mean is calculated:
making problem under uncertainties. Period of ~I 1 E ~e
time for evaluating and ranking business goals is wr = ⋅
E ∑wr ,
defined in advance. e =1
~
Weight values gained for the other considered
j=1,.., J; k = 1,..,K; n = 1, …, N is denoted as wr. criteria are:
Relative weights vector of business goals be- ~
longing to the Learn and Growth Perspective is w 11 = (1.7 5, 3.1, 4.4 5) ,
gained according to the procedure described in ~
~
tegic importance for business operations. Goals
w 2 4 = (5. 6, 7, 8. 5) , defined on this perspective have similar develop-
~
ment values. Further follows a short overview of
w 3 4 = (3. 5, 5, 6. 5) , basic management measures to be undertaken for
~
improving progress of business goals belonging to
w 4 4 = (4. 3, 5. 8 , 7. 3) , the Internal Processes Perspective.
~
The second place of the considered goals in taken
w 5 4 = (1 .7, 3. 2 , 4. 7 ) , by the Financial Perspective goals. The most impor-
~
tant goal on this perspective is Maximizing free cash
w 6 4 = (1.6 5 , 3. 1, 4. 5 5) flow, which is achieved by better customer manag-
ing which further improves the cash flow efficiency,
Applying BSC programme, the following re- e.g. by applying up-to-date JIT methods. The third
sults are achieved: place is taken by Customer Perspective goals, which
are of the almost the same development importance.
The results imply that the management team of this
perspective should focus thier attention to all marked
goals of this perspective and undertake numerous
and various management measures which enable im-
provement of the named goals of Customer Perspec-
tive [6]. Goals set on the Learn and Growth Perspec-
tive have the least, but not negligible significance for
improving effectiveness of a profit organization busi-
ness operations. This perspective rank is expected as
all considered organizations operate in Serbia which
is a developing country. With the increased level of
economy growth, the importance of this perspective
can be expected to rise, as well as the goals defined
on this perspective.
6. Conclusion
Changes occurring in business environment
cause further changes in organization and man-
agement of profit companies. One of the ways to
improve the effectiveness of management is the
application of BSC method which enables an ex-
act way of achieving progress of each identified
5.1 Discussion goal on all organizational perspectives.
In general, determining goals priority on each
In this paper, by applying fuzzified BSC meth- perspective, as well as determining the growth of
od, the Internal Processes Perspective is shown each perspective of a profit organization adheres
to be the most important, though the Financial to uncertain and imprecise data which cannot be
Pespective could have been expected to be of the expressed by numerical values. It is appropriate
utmost importance, having in mind that profit or- to use linguistic expressions instead of numerical
ganizations have been observed. The achieved re- values for describing goal weights. In this paper,
sult implies that it would be neccessary to form weights of business goals are modeled by trian-
a special organizational unit (The Internal Pro- gular fuzzy numbers. Weight of each treated goal
cesses Perspective) which deals with problems of is obtained by fuzzified Delphi method which is
research and development which are of the stra- proposed in this paper.
This research work can be extended by adding Between Corporate Strategy and Business Process
more business goals, as well as adding different Management”, Int. J.of Quality Research, 2009;
2(4): pp. 317-325.
perspectives, depending on: (1) the considered or-
ganization type, (2) considered industry sector, (3) 12. Tadić D., Stefanović M., Milanović D.:”Fuzzy Ap-
corporate policy which is implemented within an proach in Evaluation of Operations in Food Pro-
organization, (4) internal and external changes, etc. duction”, Int. J.of Quality Research, 2007; 1(2): pp.
Also, it should be mentioned that the proposed mod- 97-104.
el presented in this paper can be easily extended to 13. Zimmermann H.J., “Fuzzy set Theory and its Ap-
analysis of other management decision problems in plications”, Lower Nijhoff Publishing, USA: Bos-
different industrial engineering research areas. ton, 1996.
Abstract 1. Introduction
Management of investment portfolio includes The investment portfolio is a collection of se-
technical and fundamental analysis, selection curities held by investors. The main motive for
of appropriate securities, designing the optimal investing in financial instruments is a profit poten-
portfolio structure, portfolio performance mea- tial of certain investments: fixed or variable yield
surement, monitoring and portfolio rebalancing. and capital gains. In addition, one of the motives
Investing in securities involves active, balanced of investments in securities is maintaining an ap-
or passive investment strategies. In addition, the propriate level of liquidity by reducing opportu-
structure of investment portfolio consists of in- nity cost. So, the portfolio management leads to
vestment securities and trading book. Investment the collision of two of the three basic investment
securities include liquid part that is a secondary principles - principles of liquidity and profitability.
liquidity reserve and the income part which is held Globalization, deregulation and IT develop-
to maturity in order to achieve the greatest possible ment has transformed the economic environment
profit. Trading book are securities that are traded across the globe. Investment in financial instru-
continuously in order to make a profit according ments reflects the changed economic environment
to current price differences. Investment activities in which financial institutions diversify their ac-
are based on information about rates of return, the tivities [1]. In this way, the demarcation line be-
degree of risk, economic forecasts and risk prefer- tween operations of banks, insurance companies,
ences. After creating an optimal portfolio that is mutual funds, hedge funds, financial companies is
on the efficiency frontier, investment managers removed. In the competitive “all against all” it is
perform ongoing monitoring by measuring per- necessary to continuously measuring and monitor-
formance of securities. Investment instruments ing performance of investment portfolios in order
and tools for evaluating portfolio performance to achieve satisfactory profitability at an accept-
are quite developed: Sharpe’s index, Treynor’s in- able level of risk. Financial theory and practice
dex, Sortino ratio, Jensen index, Modigliani alpha have developed several techniques and models
index, CAPM and APT. Using these indices and to measure the performance of securities. All of
models, portfolio managers assess portfolio per- these techniques and models are based on the real-
formance and redesign the portfolio structure to ized or expected rate of return that will reject cer-
bring current portfolio to the efficiency frontier as tain investments in the period of holding. Also, an
close as possible. Usability of these models and important determinant is variance of realized from
techniques are in creating and maintaining an op- expected rate of return, measured by standard de-
timal investment portfolio in accordance with the viation. Effective portfolio management is based
preferences of investors in terms of yield and risk. on active, balanced and passive investment strate-
Key words: investment portfolio, Sharpe’s in- gy in which investors in relation to their risk aver-
dex, Treynor’s index, Sortino ratio, Jensen index, sion and trade-off between return and risk trying to
Modigliani alpha index, CAPM and APT create their own portfolio that is optimal, efficient,
diversified and compatible with their preferences.
They apply a variety of models and technique of
portfolio performance evaluation - CAPM, APT,
Sortino’s index, Sharpe’s index, Jensen’s index to
as secondary reserves; in balance sheet this portfo- basis of the measurement results, investors con-
lio is referred as “available for sale”. This part of tinuously redesign the investment portfolio, pro-
portfolio is composed by government securities, mote business efficiency and increase profitability.
private money market securities and etc. These se- Increasing the micro efficiency causes an increase
curities are highly liquid, available for spot sales in efficiency at the macro level - increasing the fi-
with minimal losses, to maintain optimal liquidity; nancial market efficiency. Namely, based on mod-
(b) Investment securities: the income part – in re- els and techniques for portfolio performance mea-
ports of regulatory agencies it is referred as securi- surement, the investment analysis becomes more
ties held to maturity. This group includes a variety effective instrument in investment decisions mak-
of securities that investor hold to make a profit. ing. What is more effective investment analysis, it
It consists of bonds and notes with a state guar- is more efficient financial markets.
antee, corporate bonds, bonds issued by various
government agencies; (c) Trading book account - 4. Research methods
this part of the portfolio composed by the various
securities to increase profitability. These financial Investment portfolio valuation is one of the
instruments are not held to maturity, they are the main stages of portfolio management. Managers
subject of buying and selling to use the profit op- of banks, investment funds and other institutional
portunity from short-term price fluctuations. The investors improve portfolio performance through
value of the portfolio depends on the portfolio the various investment strategies. The success of
manager current assessment according to prices the investment fund is viewed through the degree
movement in the future. Here we apply the active of diversification, the expected return and risk [6].
investment strategy. Based on such factors, the numerous models have
After the portfolio structure built up, the next been constructed to assess portfolio performance.
step is investment portfolio performance measure- Sharpe’s index is an indicator of portfolio per-
ment, in order to assess the impact of each invest- formance based on relationship between risk pre-
ment on potential profit. Measuring portfolio per- mium and standard deviation of the portfolio. It
formance is extremely important task, given that in faces of these two parameters and it is called the
a changing economic environment, portfolio per- rate of prize in yield variability. This ratio implies
formance may vary at any time. These variations that the time series of expected returns have a nor-
can be positive and negative, so it is necessary to mal schedule. This is one of the main objections
determine portfolio performance by measuring to be sent to this portfolio performance measure.
whether the existing portfolio close or far from Namely, if there is skewness, this portfolio in-
the efficiency frontier. More importantly, based dex is not adequate measure of portfolio perfor-
on measurement results investment managers are mance, because then even the standard deviation
taking portfolio rebalancing (spot purchase-sale) as a measure of deviation is not effective. Also, in
to bring the portfolio to the efficiency frontier. evaluating portfolio performance this index takes
into account the total risk, and therefore market
3. The research purpose and specific risk. Since the process of diversifica-
tion reduces the non-systemic risk (specific risk),
The main purpose of the research is to improve there is a negative trade-off between the degree of
investment management techniques, in terms of diversification and reliability of the Sharpe’s index
investments in securities. Using different tech- as a measure of portfolio performance: the greater
niques to assess the performance of the investment diversification, the lower efficiency of this index.
portfolio, one gets a clearer picture of the securities
issuers because some changes in issuer business Is = average portfolio yield - risk-free investment
cause changes in securities prices in the financial yield / standard deviation
markets. In addition, by measuring investment
portfolio performance, investors improve basic In a graphical presentation of this index we
investment management techniques [5]. On the use the capital market efficiency line (efficiency
frontier). It has its “roots” at the point of risk-free Ri – the average portfolio yield; βim – the beta
investment return, and connects it with the inter- of the portfolio; Rf – the risk-free return;
section points of return and risk for each portfolio. Rm - the market index return;
Treynor’s index measures the portfolio per-
formance in a slightly different way compared to Modigliani risk-adjusted performance (M2
the Sharpe’s index. There are two key differences: or Risk-Adjusted Performance Alpha, RAPA) is a
first, Treynor’s index looks at the level of portfolio measure of portfolio performance relative to the
risk in the context of portfolio yield sensitivity to benchmark. This index compares the risk adjusted
systemic factors (this elasticity factor of portfolio portfolio return to a defined reference value. The
returns relative to growth in the market as a whole index measures how much the investor is reward-
is called the beta factor (β)), second, in a graphical ed for additional risk taking. It shows the ratio
presentation of this index we use a functional re- between the standard deviation of the underlying
lationship between yield and systemic risk (mea- portfolio and the comparable portfolio weighted
sured by the coefficient β), or instead of the capital with the average yield difference between the
market line we use security market line (SML - portfolio value and some reference value (eg,
risk-
Security Market Line). free rate of return).
CAPM model defines the relationship between the separation of factors that systematically affect the
expected portfolio return and portfolio β. Expect- portfolio rate of return through factor analysis, and
ed portfolio return is equal to the sum risk free rate then quantify the impact of these factors. A set of
of return and the difference between the expected influential factors is difficult to unambiguously
yield of the total market portfolio and risk-free define, but quantitative studies have marked some
rate, weighted with β [7]. Beta is the regression important factors [10]: (1) the industrial produc-
coefficient (slope) securities yield on the market tion index; (2) the risk premium between securi-
portfolio yield, which represents the sensitivity of ties with different investment grade; (3) interest
securities yield to changes in the overall market. rates changes; (4) inflation rate changes; (5) unex-
APT is developed by Ross at the 1976th and it is pected changes of yield curve.
based also on the quantification of the relationship
between return and risk. It discriminates factors on 5. Research results
the basis of influence on the yield and risk. This
model is based on the law of one price, which sug- 5.1. Sharpe’s index
gests that if two assets have the same characteris-
tics, should be sold at the same price [8]. Seen in If we create a hypothetical portfolio with four
the context of financial markets, financial instru- possible scenarios and with equal probability,
ments that have the same characteristics in terms which would consist of two stocks and one bond,
of return and risk should have the same price. If we could calculate the Sharpe’s index.
you make up the imbalance in prices, it would be a If we assume that the risk-free rate of return is
current phenomenon that would encourage inves- 1%, then the results of this index for each portfolio
tors to simultaneous purchase and sale. Arbitra- combination are as follows: S1 = 0,3545, S1;S2 =
tion operations would quickly eliminate the scope 0,3640, S2 = 0,3812, S2; B = 1,1111, B = 0,1490,
for profit [3]. In this model, the financial market S1; S; B = 1,2327
imbalance is only an exception that confirms the Based on the obtained results it is possible to
rule: the equal prices of two instruments with the evaluate the efficiency of the portfolio. By defini-
same qualitative characteristics. Arbitration activi- tion, the higher the index, the portfolio more ef-
ties are a function of the relationship between the ficient. This can be proved by observing graphical
expected returns of two investment alternatives. CML of this hypothetical portfolio.
If there is a discrepancy between the expected re-
turns, the investors sell the asset with lower ex-
pected return and buy assets with higher expected
return. These arbitration transactions do not re-
quire additional money because the revenues from
the sale of an asset are equal to the expenditures
for the purchase of other assets [9].
In relation to the CAPM that incorporates all
factors into a single measure of systemic risk, Figure 1. CML of hypothetical portfolios
the operational version of APT models perform (Source: Table 1)
Table 1. Hypothetical portfolio of two stocks (S1, S2) and one bond (B)
Scenario Probability HPR S1 HPR S2 HPR B HPR S1; S2 HPR S2; B HPR S1; S2; B
R 0,25 -12,82 -8 9 -10,41 0,5 -2,64
P 0,25 17,95 14 -9 15,97 2,5 5,98
N 0,25 8,97 6 5 7,48 5,5 6,49
SQ 0,25 5,77 4 3 4,88 3,5 4,13
Expected return 4,97 4 2 4,48 3 3,49
Variance 125,41 62 45 91,48 3,25 4,083
Standard deviation 11,20 7,87 6,71 9,56 1,80 2,02
Figure 1 confirms the hypothesis about portfo- variability of return that is below a certain accept-
lio efficiency. Portfolio whose yield-risk combina- able limit (MAR, minimal acceptance volatility).
tion has a “steepest slope” is the most effective. Denominator in this ratio represents only negative
This is exactly the portfolio (S1, S2, B) which has deviations, those that overcome the lower bound
the highest Sharpe’s index. This portfolio has the (MAR) but MAR is usually 0%. The higher Sor-
biggest yield prize compared to the level of risk. tino ratio, the less ability that investment will
produce large investment losses. Therefore, more
5.2. Treynor’s index conservative investors prefer investments with the
maximum value of this index.
If we assume that the coefficient β for the hy-
pothetical portfolios are 1.00, 0.8, 0.6, 0.4, 0.3 and 5.4. Jensen index
0.2, respectively, we can calculate this index and
graphically present the SML for each portfolio. Jensen index is instructive to estimate abnormal
With the other data from Table 1, results are as returns relative to a targeted level. The logic of fi-
folows: S1 = 3,97%, S1;S2 = 8,70%, S2 = 3,75%, nancial markets is as folows: the risky instrument
S2;B = 6,66% B = 1,66%, S1; S2; B = 12,45% provides a higher yield compared to less risky in-
struments, or if the financial market is efficient,
each investment provides risk adjusted yield.
However, if a portfolio provides higher yield com-
pared to the risk adjusted returns, this portfolio has
a “positive α”, or it provides abnormal returns. The
limited value for assessing portfolio performance
using this index is 0 (zero): if the portfolio has a
Figure 2. SML of hypothetical portfolios index value less than zero, it achieved lower yields
(Source: Table 1) than the yield which is expected relative to risk
level; if the index value is zero this portfolio pro-
This index uses SML lines that start from the vides returns that are expected in accordance with
origin point towards the northeast, connecting the the degree of risk or it has average performance; if
origin point and the yield-beta combination of dif- the index value is greater than zero, this portfolio
ferent portfolio in the first quadrant of the coordi- provides extra yield.
nate system. It measures the angle that every SML
lines forming relative to x coordinate and also as 5.5. Modigliani risk-adjusted performance
the Sharpe’s index suggests that the most effective
portolio (with best performance) is portfolio that This index is very instructive for the interpretation
includes all three financial instruments (S1, S2, of the investment risk comparing the risk-adjusted
B). In relation to the Sharpe’s index, which is more yield and benchmark values. It suggests that the re-
effective in measuring portfolio performance of turns and risks of the portfolio should start “conces-
stocks, this index is more efficient when portfolio sion for concession” in relation to the benchmark. If
includes stocks and other investment alternatives. a portfolio has five times more average deviation of
risk in relation to the benchmark, then the portfolio
should have five times more average deviation of re-
5.3. Sortino ratio
turn. In this case investor will earn fair risk premium
Suppose, that the investment A provides a 5% and the yield is adjusted for additional risk.
yield in the first year and 5% yield in the second
year. Investment B provides a yield of 0% in the 5.6. CAPM
first year and 10% in the second year. The total
variance for these two investments is the same, but This model is based on approximations that do
B investment is more efficient. Therefore, when not fully correspond to reality in the capital mar-
calculating this index we use as a denominator ket, but its usability is indisputable. It could be ap-
plied to real world capital markets but it is neces- of 2009, these assets again achieved positive rates
sary to make appropriate modifications of initial of return, but it is noticeable that these rates are very
settings. One of the most important hypothesis close to zero yield at the end of period. Government
that needs to be modified is the “expected rate of bons provide much lower yield in observed period,
return.” Substituting the expected rate with real- but the yield is consistently positive.
ized rate of return we can apply this model to as- Based on informations from the website of the
sess the performance of securities, and its issuers. Belgrade Stock Exchange we calculated the rate
of return, average return, variance and standard
RXT = αx + βx + x RMT εxt deviation of the portfolio and whole market.
Based on regression analysis of KMBN addi-
If we take as example stocks of Comercial bank tional yields in relation to the market index (BEL-
Belgrade (KMBN) that is listed on the Belgrade EX15) we obtained the following results.
Stock Exchange listing and it is part of BELEX15, Statistics of regression is very interesting. All
and a government bond (A12) as risk-free invest- values obtained by regression may be indicated by
ment, we can create an index model to assess sys- statistically significant. These results tell us that
temic and non-systemic risk. the correlation coefficient between the extra yield
on KMBN shares and market index are 0.62 which
indicates a fairly uniform movement of these two
parameters. The adjusted R squared tells us that
38.44% variation in additional yields of KMBN
can be explained by variations of market index
additional yields, while 61.56% of variation can
Figure 3. Cumulative monthly returns on KMBN, be explained by specific factors. The standard er-
Belex 15 and government bond (A12) ror tells us that this stock has fairly large volatil-
Source: [11], [12], [13]
ity in observed period. This volatility has a range
from ± 0.74%. This stock provided yield below
Figure 3 shows the cumulative monthly rate of
the expected yield in relative to risk level, with
return for the stocks of Commercial Bank, BEL-
very small standard error estimate. Also, with 95%
EX15 and RS bonds (Series A12) form September
probability it can be confirmed that the alpha is
2006 to December 2011th. We see that in the initial
somewhere between -0.057% and -0.054%. Beta
period KMBN stocks and market index recorded
coefficient is 1.14 with a very small standard er-
positive return rates, and after that it became nega-
ror estimate, while the original beta is somewhere
tive. Interestingly, the amplitude of the variation rate
between 1.05 and 1.22. This estimate is based on
of return of these two assets is very high. At the end
Table 2. Descriptive statistics -September 2006 – December 2010 (Source: www.belex.rs)
Average yield Variance Standard deviation Coefficient of variation
KMBN -0,000238 0,000989 0,031451 -13191,6
BELEX15 -0,000451 0,000331 0,018193 -4032,31
Gov. Bond 0,055994 0,000108 0,010390 18,55
Table 3. Regression analysis results of KMBN stock (Source: www.belex.rs)
R 0,620475
R2 0,384989
Adjusted R2 0,384425
Standard error 0,745582
Number of observations 1090
Koef. Std. E. t-stat. p-value - 95% +95%
Intercept -0,055720 0,000792 -70,3804 0,00 -0,572773 -0,054166
Slope 1,136868 0,043523 26,1214 0.00 1,051471 1,222265
a 95% probability. We can conclude that it is an ment portfolio by using different models and tech-
investment (share), whose yields vary according niques. All models and techniques are based on
to the cyclical market fluctuations, since it is a beta the expected and the realized rate of return, devia-
greater than 1. tion actual yield from the expected yield, regres-
sion and correlation analysis. By applying these
5.7. APT techniques its promote portfolio management and
financial market is becoming more efficient itself.
APT is an additional instrument of investment Based on the index it is possible to make a com-
analysis that provides more efficient portfolio parative analysis of portfolio performance against
management. Although based on factors that are a benchmark portfolio. If two investment portfo-
difficult to determine, this model has improved the lios have the same risk level, but the first one has
analytical tools to define expected portfolio return. a lower profitability compared to the benchmark,
More broadly, this model is another useful tool for it is necessary to redesign the investment portfo-
improving the efficiency of financial markets. lio in accordance with the return-risk preferences.
Based on the results of performance measurement
6. Discussion it is possible to evaluate the quality of invest-
ment managers decision making. Also, using the
The research results show that it is possible to CAPM model it is possible to estimate the invest-
apply different indices and models to assess the in- ment portfolio performances, but also to separate
vestment portfolio performances. All performance the factors affecting the volatility of returns to the
measures are based on yield, expected rate of re- systemic (market) and non-systemic (specific)
turn, standard deviation, regression and correlation factors. This is very important, since it is based on
analysis. In terms of indices for measuring portfo- this model we can monitor the effectiveness of the
lio performance, the higher the index value sug- portfolio diversification.
gests that the portfolio more efficient. Also, based
on the index can be made a comparative analysis
References
of portfolio relative to portfolio benchmark. If a
portfolio has a greater risk than the benchmark, it 1. Markowitz H., Foundations of Portfolio Theory. The
should more profitable [14]. Results of regression Journal of Finance , June 1999, 46(2): pp. 289-321.
analysis show that the highest level volatilonosti 2. Barr R., McKibben W., The Prediction of Sistemic
in yield can be attributed to business factors re- and Specific Risk in Common Stocks. Journal of Fi-
lated to the issuer. This is logical, given that in- nance and Quantitative Analisis, March 1977; 8(2):
creasing number of securities (diversification of p.p. 317-333.
investment portfolio) can significantly reduce
3. Vunjak N., Davidović M., Antonijević T., Upravljanje
non-systemic portfolio risk . Investment managers investicionim portfoliom u funkciji ostvarivanja su-
use these indexes and models to improve the in- periornih korporativnih performansi banaka, NMM,
vestment portfolio quality. Based on these models Palić, 2011.
and techniques it is possible to evaluate the invest-
4. Rose S. P., Hudgins C. H., Bankarski menadžment
ment portfolios performances and the investment i finansijske usluge (prevod), Data Status Beograd,
managers efficiency. 2005.
10. Chan N., Roll R., Ross S., Economic Forces and
the Stock Market, Journal of Business, , July 1986;
56(3): 383-403.
Corresponding Author
Milivoje Davidovic,
The Faculty of Economics Subotica,
Subotica,
Serbia,
E-mail: milivojed@ef.uns.ac.rs
a direct and indirect impact on poverty. Negative and prevent households to become better stand-
economic developments officially not fully reflect ing? Answers to the above-mentioned issues, but
the increase in the number of unemployed. How- the additional hypotheses that will be formed in
ever, the reduction in economic activity in these the rest of the analysis will be based on data from
conditions led to a decrease in real wages of the Strategy living standards for the period 2002/2010
population, which ultimately caused the impover- year, which are available on the website of the
ishment of the population and social layering. World Bank in the part that follows the movement
Economic reforms were implemented after the of the population (www. Worldbank.org / LSMS).
2000 contributed to the acceleration of real eco- The following chapter presents this information,
nomic growth. This acceleration is accompanied the selection of the determinants of consumption
by even higher growth of real wages, pensions and and the methodology we used. Results are pre-
other social grants, remittances from abroad and sented in section 3 and the conclusions of the 4th.
other income of the population. Mentioned the pos-
itive macroeconomic developments and the impact 2. Poverty profile in Serbia - the key
on poverty reduction and economy stratification of indicators of poverty
the population. All the greater involvement of the
state in devising and implementing measures to im- A significant and continuous economic growth
prove living conditions can contribute to poverty since 2000, with real wage growth (which was high-
reduction. In order to reduce poverty the Govern- er than the growth of gross domestic product), then
ment of the Republic of Serbia 2003. adopted the the growth of pensions and other social transfers and
Strategy for Poverty Reduction. This strategy is in other income of the population caused a significant
line with the Millennium Declaration which, within decline in poverty in Serbia in period 2002 – 2010.
the United Nations in September 2000., signed by However, the number of employees stagnation and
189 countries of the world, including the Serbian. high unemployment are certainly mitigate the im-
Poverty Reduction Strategy in Serbia was focused pact that economic growth could have on poverty
on three strategic directions: reduction is achieved with the growth of unemploy-
– of dynamic economic growth with emphasis ment and the decline in unemployment. The number
on the creation of new jobs and increase wages, of poor by half 2007th year compared to the 2002nd
– on the prevention of new poverty as a result year Table 1. The basic goal is that the Government
of restructuring the economy, of the Republic of Serbia set for poverty reduction,
– on the effective application of existing and to halve poverty by 2010. achieved already in 2007.
creation of new programs, measures and acti- year. In 2002, 14%, or about one million people
vities directly aimed at poorest and vulnerable were poor, and 2007th year 6.6%, or about 490,000
groups (children, elderly, persons with [4]. Thus the total number of poor decreased by
disabilities, refugees and internally displaced more than 500,000. The poor were all persons
persons, Roma, the rural poor and uneducated), whose consumption per consumer unit was on aver-
particularly in less developed areas. age less than the poverty line that is in 2002. 5234
amounted dinar in 2007 8883 dinar. Extreme pov-
The aim of this analysis is to isolate the factors erty is not existed in this period, since almost no per-
that affect poverty in Serbia and demonstrate the sons whose consumption was below the food. The
importance and role of socially responsible mar- remaining two indicators of poverty, the depth and
keting in the fight against poverty, where the com- severity of poverty, which shows the distribution
pany is publicly demonstrating the value of your of poverty also significantly reduced in this period.
brand and motivate consumers to buy their prod- Depth (gap) of poverty in 2007 was 1.3%, which
uct, ie. percentage of sales given to charity, which indicates that poverty, if the state mobilized funds in
creates synergy. Among other things, will provide the amount of 1.3% the poverty line for each person
answers to the following questions: what defines, (poor and not poor) and focused poor (in addition to
and what affect consumption and poverty? What funds that the state has directed the most vulnerable
are the socio-economic factors that cause poverty categories), theoretical or eliminated.
Poverty Reduction in Serbia after the 2002nd is Regional structure of consumption of the popu-
a direct consequence of increasing consumption. lation indicates that the 2002/03 least poor popula-
Namely, according to data from the LSMS, more tion lived in Belgrade, which is not changed even
than double the increase in consumption after the in 2009 (figure 1, b). This fact is not surprising,
2002. The drop corresponds to the participation of given that the Belgrade households realized the
the population living below the poverty line from largest consumption per family member. How-
11.4% to 7.3%. Increase spending with poverty ever, in the period from 2002 to 2010. in Belgrade
reduction is inherent to the urban and the rural and recorded the largest increase in spending,
population. In fact, despite increasing absolute contributing to the participation of the popula-
differences in consumption in urban compared to tion living below the poverty line upward relative
rural population, poverty in rural areas decreased change (from 8.8% to 3%) compared to other re-
to a greater extent than urban. In this motion and gions in Serbia [5]. In Belgrade, poverty is highest
refer the following two charts, which represent the in the monitored period OPAC in Vojvodina and
trends in our sample. Sumadija, since in these regions recorded relative-
ly high growth of consumption. On the other hand,
the largest share of poor people living in Southeast
Serbia (14.4%) which corresponds with the lowest
consumption per household member [6].
a)
Figure 2. Percentage of households below the
poverty line by half the head the household
theoretical perspective, a higher level of consump- per consumer unit. The reasons are as follows:
tion and low poverty rates that are sustainable in first, their individual consumption is financed and
the long run, mean income from work activities local public goods in his household, as implied by
(except when the person in any way be prevented the theory of clubs [6]. Namely, if one spends on
from working the active). In addition to income, non-exclusive goods (eg electricity, heating, cable
consumption and poverty can largely depend on television, air conditioning), it will affect their
which household wealth has. To comprehend the spending on other individuals. Second, domestic
effects of wealth, this analysis will use the imput- and family safety net, ie. insurance system that
ed value of durable goods, which has a specific serves individuals to ensure minimum consump-
household. In addition to this measured wealth, tion. Thus, for example, consumption of which
this analysis will also examine how housing con- is above the poverty level can result in individual
ditions and possession of certain durable goods consumption below the poverty level of household
affect consumption and poverty. For example, in- if the individual meets the needs of their consump-
frastructure projects (water supply and sanitation tion of other individuals in the household whose
services) can also have an impact on consumption consumption is currently threatened.
and poverty. This analysis gives particular impor- Also, the assessment of consumption in SZS
tance to study these factors. Infrastructure factors Belgrade takes as a reference value when examin-
are the focus of this analysis because only the state ing the influences of the region. However, in such
can affect them - this is a public good. Therefore, settings, we can not conclude that much, except
this analysis examines the indirect impact on state that the consumption in all other regions is lower
spending and poverty expressed through the avail- compared with Belgrade. Therefore, this analysis
ability of public goods. Besides indirect impact on chooses to take the reference value of Eastern Ser-
poverty through infrastructure projects and public bia, so we compare it with other regions.
goods, the impact of the state of poverty can be im-
mediate. One immediate impact is tested through 2.3 Econometric methods
the social welfare. The second is through a greater
occurrence of the state as an employer, or through The SZS (2010.) econometric evaluation are
an increase in public expenditures that directly af- limited to linear regression in which the consump-
fect revenues, and thus consumption and poverty. tion of households and explains the features of
his carrier, region, size of agricultural holdings,
2.2 Facts and figures education and status in the labor market. How-
ever, Econometric literature indicates that the
The semple panel from 2002 to 2010. in all evaluation equation of consumption must adjust
households with available data who participated the characteristics of linear regression data are
in the survey getting the relevant answers to cer- inconsistent and imprecise (which results can be
tain questions require the inclusion in the analysis misleading advice socioeconomic policy holders).
of data on municipal level. Although the data at The starting point in this analysis is the assess-
the municipal level comprehensive, highest level ment of household consumption equation similar
of the individual’s personal characteristics. The present in SZS. The equation we evaluate for each
reason is the possible aggregation of data from year as follows:
the household level to a higher level which leads
to loss of significant variations between the pres- Consumptioni=α+β’x,+εi .................... (1)
ent level of individuals, so coefficient of these
variables statistically negligible. Census data are where the variable is defined as the logarithm
available round the same basis SZS, which is for of consumption expenditure per consumer unit, i
the purposes of this analysis to a sufficient source. is household, α is a constant, x is a vector contain-
Although this analysis considers the additional ing the independent variable, β is the vector cor-
determinants of consumption compared with SZS, responding coefficients and εi is a error. This equa-
the unit of observation remains the consumption tion was evaluated by the method of least squares.
significantly increases spending, and a significant services significantly reduces the consumption in
impact on the confidence level of 1%. Also, con- 2003. and 2010. year, while the same variable has
sumption is higher in the Census circle in which the opposite effect in the panel. Humanitarian aid
the state is among the top three employers, and in the fuel significantly affects consumption only
this effect was statistically significant at the level in 2010. year, and the impact is negative. Over-
of confidence of 5%. Therefore we can conclude all, the impact of social assistance is much smaller
that public spending within the circle register list than expected, and the lack complete template
stimulate private consumption in the census round. prevents us to derive more general conclusions.
Infrastructure household may also have an im- When we analyze the impact of the region in
pact on consumption. Central heating significantly which households live on consumption, observed
increases the consumption of the panel and in each the following: consumption in South Serbia, Bel-
year except 2003. Having the phone and cable grade and Vojvodina are significantly different
television apparently increase spending. However, from consumption in eastern Serbia (which is the
this effect disappears when the application panel reference category). Consumption in South Ser-
fixed effects, which suggests that these character- bia is smaller, while the consumption of Belgrade
istics of household infrastructure actually draw and Vojvodina, more than consumption in Eastern
their influence from the correlation with some in- Serbia. Sumadija and Western Serbia does not dif-
visible features, and their influence disappears if fer in consumption of Eastern Serbia. Also, we see
using fixed effects. that the impact of the region in South Serbia are
It is interesting to also observe the impact of the not significantly different from eastern Serbia in
availability of gas consumption. If you look at the 2010. years, with the reduction coefficient in 2002.
age regression, we can conclude that the availabil-
ity of gas does not affect consumption. However, 3.2 What causes poverty and what it reduces?
panel regressions indicate the opposite -the avail-
ability of gas significantly increases spending, As was expected, the total income available and
and a significant impact on the confidence level durable goods have a significant effect on poverty.
of 5% to 1% (depending on specifications). From The panel regression results for 2002/3 year reve-
these results it follows that if we compare the two nue increase or the new durable goods to a large ex-
households with identical characteristics, differ- tent reduce the likelihood that a household is poor.
ences in terms of availability of gas will not cause At the same conclusions, with a confidence level of
significant differences in consumption. However, 1% of the allegations and the results of regression
if we compare one household through several pe- by age, except in the assessment for 2003. year.
riods, the household consumption will be higher Urban households in 2002. year had a lower
in the period in which the pipeline is available. probability of being poor, while household size
When you look at impacts of social assistance, was significant only in 2003. An interesting result
we see that the MOP significantly increased con- follows from the assessment for 2010., where we
sumption in the panel, while this has no impact when see that, if the catch of two families with identical
we can perceive each year separately (in the panel, characteristics, except that one Serbian and other
the impact is statistically significant at the level of minority nationalities more likely to be poor, we can
trust of even 1%). From this it follows that if we prescribe a minority household. This result was sta-
compare the two households, differences in terms of tistically significant at the level of confidence of 1%.
participation in the MOP will not cause significant Influences of the region have confirmed only for
differences in consumption. If, however, compare South Serbia, while households in other regions are
more than one household through the period, the less likely to be poor compared to Eastern Serbia.
household consumption will be higher in the time in Impact of infrastructure and public goods at the
which the household participated in the MOP. local level poverty was confirmed in 2010. year (for
Impact of discount for payment of electricity the 2002nd and 2003rd year is only available indi-
consumption is negative in 2002. year, while posi- cator of distance from infrastructure). Distance enu-
tive in other years. Discount for payment of utility merated round of infrastructure and public goods
increases the likelihood that a household in the cen- care system. After all, inadequate health insurance
sus round are poor. On the other hand, the presence keeps many women from detecting breast cancer
of infrastructure and public goods in the census in its early, and most curable, stage.
round reduces the likelihood that a household in the The Government of the Republic of Serbia
census round are poor. Condition of roads also af- faced with the process of company restructuring,
fect poverty, where better roads in the census circle high unemployment and high levels of social ex-
reduce the likelihood that households from the enu- clusion and consequences of internal migration
merated circle be poor. These effects were statisti- of population, was recognized and confirmed the
cally significant at the level of confidence of 1%. need to implement fundamental reforms in the
In addition to the impact through the infrastruc- field of social policy. Scarcity of reliable data on
ture, the rating for 2007. see also the year that the the households affected adversely the consistent
state affects poverty and direct consumption (eg, conduct of social policy in the past. Special cir-
impact on poverty reduction by increasing human- cumstances in Serbia led to it that some social
itarian aid to the fuel). groups were excluded and marginalized. Data on
poverty and living standards are viewed as part of
3.3 Socially responsible marketing in Serbia - the information system that Serbian government
the result of the actions that affect poverty and its ministries assist in decision making. The
reduction public is also very interested in data on poverty.
Therefore data on poverty are essential for stra-
In the 1980s, a new form of marketing was born: tegic planning in the Serbian government and for
Cause-Related Marketing (CRM), a hybrid of prod- donors in evaluating their strategy in the Pov-
uct advertising and corporate public relations. CRM erty Reduction Strategy. Data on poverty will be
aims to link corporate identities with nonprofit or- needed and when Serbia’s EU accession. Multi-
ganizations and good causes. As a tax-deductible dimensional poverty line, as he sees the EU (in-
expense for business, this form of brand leverag- cluding the output indicators health, education,
ing seeks to connect with the consuming public be- labor market and access to social pomooći), but is
yond the traditional point of purchase and to form part of the Poverty Reduction Strategy in Serbia,
long-lasting and emotional ties with consumers [9]. and this focus is necessary to maintain to meet the
However, what might seem like a fair exchange be- future demands on that plan. At a time when the
tween corporations in search of goodwill and non- prepared Poverty Reduction Strategy, the World
profits in search of funds also raises a range of trou- Bank together with other donors, enabled the
bling social, political and ethical questions. implementation of two surveys on the standard
CRM is, first and foremost, a market-driven of living. Analysis of data obtained in these sur-
system. Therefore, a non-profit organization’s veys by the Government of Serbia and the World
chance of obtaining CRM funding hinges on its Bank team for assessing poverty has become the
ability to complement sales messages [10]. How- backbone of the objectives of the Strategy for
ever, it is often the case that vital social issues are Poverty Reduction. Because of the constant need
only -- or are best -- addressed by “edgy” groups for data on poverty, DFID and World Bank agreed
or by using controversial tactics. For example, in to finance the next survey on living standards of
1983 American Express might have saved lives by citizens, in order to compare the results with data
highlighting HIV/AIDS, then considered a taboo from two surveys of living standards, and to mea-
subject because of its association with homosex- sure changes in the level of poverty and establish
ual lifestyles. Instead, the credit card raised funds time series data. Living Standards Measurement
to restore the Statue of Liberty and Ellis Island. Survey contributes to the improvement of links
Today, companies “fight” breast cancer by sell- between official statistics and user data, and this
ing pink ribbon pins, teddy bears or yoghurt, and in turn has resulted in numerous actions that are
donating some of the proceeds to research efforts. triggered by the fit of NGOs, which represent a
Imagine the impact if the companies instead, or in real example of Cause Related Marketing. Within
addition, advocated for a more equitable health- the “Food for All” arising under the media B-92,
which supports the Red Cross of Serbia, for the way that will help, and so are Aurora 212 and the
national cuisine began to arrive contingents food. National Theater decided to donate part of their in-
This was only the beginning of the widest ever come from the sale of tickets. If this is the biggest
undertaken actions to suppress poverty, and is an hunger strike in Serbia, where no matter how will
excellent example of connection between corpora- help, but the good will was crucial, and confirms
tions and NGOs in the implementation of Cause the fact that pupils Economic School “Valjevo”
Related Marketing. Action “Straik hunger against organized a humanitarian action to collect flour,
hunger” was launched by the widest population of sugar, oil, rice and similar foods. The entire action
our country to action. Within the “Food for All”, is guided by adequate marketing propaganda most
the total has so far collected food worth 930,000 popular TV and radio company in the territory of
euros. Donations of food were delivered folk cui- Serbia B 92, which is the initiator and the initia-
sine, humanitarian centers, shelters for adults, pen- tor of this good example of how companies can
sioners clubs, associations of single mothers and actively participate in the implementation of com-
the social work centers throughout Serbia. “Invej” prehensive social goals, in this case acting on the
company has donated 330 tons of edible oil and problem of poverty is evident in Serbia.
flour, thus the need for these foods by the national
cuisine to be done for several months. 12 million 4. Concluding remarks and
is the total value of these donations and consists of recommendations
80 tons of edible oil and 250 tons of flour. Lucic
group action is “Food for All” has joined a dona- Faced with enterprise restructuring, high unem-
tion of 250 tons of potatoes, 200 tons of onions ployment and high levels of social exclusion, as
and 100 tons of carrots and cabbage. The value of well as the consequences of international population
the donation is 200 thousand euros. This donation displacement, the Goverment of Serbia and SORS
is very important because it is a large quantity of recognized and acknowledged the need for funda-
donated foods. In addition, since it is a good qual- mental reforms in social policy area and collection
ity vegetables, not only solves the problem of lack of adequate data of social statistics. The public is
of food but take care about the overall health of also keenly interested in poverty data. Poverty data
users popular cuisine. Victoria Group Company, will become part of EU accession agenda: social
a leader in the manufacture of food products from inclusion indicators are facilitating coordination
soybeans, wheat and oil, solidarized with years of social inclusion [11]. Analysis of the poverty
and donated food in an amount of 600,000 euros. profile in Serbia shows relatively large regional dis-
Victoria Group is, in addition to donations of food, crepancies in poverty rates, as well as strong links
donated food and transportation to the place where between poverty and unemployment an education.
they will be distributed, which is an important ad- Our results clearly indicate that this statement is
ditional donations, because that would have other- true, because revenues from operating activities in-
wise had to pay for such services. Donation given creased consumption and also reduce the likelihood
by manufactures and Drugs Group Kolinska -5 that a household is poor. However, although rev-
tons of products, juices donation in 1000 has pro- enues from operating activities of the key determi-
vided Nectar companies, while Imlek donated 90 nants of poverty, there are other factors that deserve
liters of milk. Dr.Oetker Company donated 50,000 further observing. In previous chapters we saw that
bags of yeast Vileda has provided products for the the state may affect spending of households and
maintenance of hygiene, while Bozen Cosmetics poverty. The results showed that this effect may be
and donated by 1,000, or 500 meals in the Nation- direct (eg through social assistance to vulnerable)
al kitchens throughout Serbia. Companies Dia- and indirect (eg through investment in infrastruc-
mond and Frikom also donated 5 tons of products, ture and public goods, or through participation in
a donation in 1000 has provided a juice company the labor market on the employer). Therefore, our
Nectar, while Imlek donated 90 liters of milk. All analysis indicates that states can significantly stim-
companies and organizations that have joined the ulate private consumption if the infrastructure and
strike had the ability to independently develop the public good way, “which present” and “as close as
possible.” However, these activities are associated 4. Vukmirović Dragan i Smith Govoni Rachel, urednici,
with the process of decentralization and delegation Study of Living Standards Serbia 2002-2007, Re-
public Statistic Office of Serbia, Belgrade, Republic
that is currently taking place. The optimum ratio of
statistical Office . 2008.
these two types of public spending is not a ques-
tion that researchers can answer, but value the court 5. Hillman Arye L. Public Finance and Public Policy:
which made the carriers of socio-economic policy Responsibilities and Limitations ofGovernment,
based on the importance and benefits given to these Cambridge: Cambridge University Press. 2003.
types of spending [12]. 6. Mroz Thomas A. The sensitivity of an empirical
In order to reduce the level of poverty, social model of married women’s hours to work economic
problems to deal with other sectors such as pri- and statistical assumptions, Econometrica 1987; 55:
vate and nonprofit marketing to stimulate positive 765–799.
social change is social marketing, which includes
7. Barone Micheal J., Miyazaki Anthony D., Tailor
Cause-Related marketing, and is a powerful instru- Kimberly A. The influence of cause-related market-
ment for achieving change. Indicates the applica- ing on customer choice: Does one good turn deserve
tion of relevant principles of market marketing non- another?, Journal of the Academy of Marketing Sci-
marketing purposes - to influence the thinking and ence, 2000; 28( 2): 248-262.
behavior of certain groups of people direct positive 8. Bjeloglav Dragiša, David Hana , Krstić Gordana i
social change. Consumers can not take more than Matković Gordana, LSMS Project 2002-2003: life in
just the product that is present in the media or on Serbia through survey data. Beograd: Strategic Mar-
billboards, but for those goods company which per- keting. 2008.
forms some socially useful goals. Support social
9. Simcic Bronn Peggy, Belliu Vrioni Albana, Corporate
problems of the company has a tendency of growth. Social Responsibility and Cause Related Marketing:
Design and realization of high quality social cam- an Overview, International Journal of Adverting 2001.
paigns may provide greater interest of the citizens
for certain problems, their active involvement, 10. Hsiao Cheng , Analysis of Panel Data, Cambridge:
and greater performance and better positioning of Cambridge University Press. 2003.
non-profit organizations in the public. On the other 11. Petrović Zoran , Social marketing tools of social
hand, social marketing is an important communica- changes, Political review, 2007; 7( 2): 493-512.
tion bridge between civil society organizations and
the private sector - all factors of their sustainability. 12. Ross John K., III, Larry T. Patterson, Mary Ann
Stutts, Consumer Perceptions of Organizations that
Every year the U.S. spends over 1 billion dollars by Use Cause-Related Marketing, Journal of the Acad-
marketing to the social order [13]. While in Serbia emy of Marketing Science, 1992; 20( 1): 93-97.
growing number of companies that recognize the
importance of investing in the community, due to 13. Wooldridge Jeffrey M., Econometric Analysis of
lack of market inter-sectoral cooperation such ini- Cross Section and Panel Data, Cambridge: MIT
Press. 2001.
tiatives remain under-exploited.
ronment so that most of information, values and pation across wider geographical boundaries, gen-
preferences get integrated with the goal. Historic erating feedback on actions taken (the managerial
data keeps on updated with time so that decision version of “informating” a process), and stream-
environment remains current. Segregation of data lining the time and resources a specific process
through applications and adequacy of hardware to consumes. While many firms have developed ex-
meet user’s required performance criteria today ecutive information systems (EIS) for their senior
across wide area network is providing new di- managers, at Xerox Corporation headquarters, IT
mensions to decision making process. Life cycle has been used to improve a specific managerial
approach to development is one such emerging process, i.e., the review of division strategic plans.
dimension. It emerges conclusively that ICT pres- Despite great possibilites, two decades ago only
ents alternative choices to be considered as many few companies have rigorously analyzed manage-
as possible to choose the one that has the highest rial activities as processes subject to redesign. Even
probability of success or effectiveness and best fits the notion of managerial activities involving de-
with our goals, desires, lifestyle, values, and so on. fined outcomes (a central aspect of our definition
Information technologies are not easy to de- of business processes) was somewhat foreign. [7]
fine, as for their intensive development so for the However in the meandime situation has con-
constant expansion of their application in both the siderably changed. Today it is notorious that In-
work and management process in a company. In formation Communication Technologies are in-
addition to this, information technologies should evitable tool for modern managers on various
be understood as a system combining computer levels and in different sectors. They are of enor-
equipment and communication devices, as well mous help in improving all basic management
as corresponding knowledge, methods and skills functions: planning, organizing, staffing, leading
required for their practical use, both in the process or directing, and controlling an organization or ef-
of production and the system of management. [4] fort for the purpose of accomplishing a goal.
Besides the term Information Communication It should be noted that, despite management’s
Technologies also is in use the term Advanced in- best intentions, the co-introduction of IT and com-
formation technologies that comprise devices that plementary organizational changes may not result
(a) ransmit, manupulate, analyze or exploit in immediate success, due to adjustment costs
information, learning, and other factors. [8]
(b) in which a digital coputer processes infor- The focus of our attention will be on the impact
mation integral to users communication or of ICT on management as a part of organizational
decision task; and structure of modern companies.
(c) that have either made their appearance
since 1970 or exist in a form that aids in 2. Influence of information technology on
communication or decision tasks to a management as a part of a company or
significanlty greater degree that did pre- organizational structure
1971 forms. [5].
IT contributes to faster and more successful ad-
It is not a new idea to apply IT to management aptation of a company to environmental changes.
tasks. For over twenty years, the potential of deci- Thanks to them and their application, the compa-
sion support systems, executive support systems, ny has become more flexible, and therefore more
and other managerial productivity and informa- ready to face challenges that are increasing under
tion tools have been trumpeted. Accordint to Dav- the conditions of contemporary business activities.
enport and Short the benefits have remained more The company which respects IT sufficiently and fa-
potential than actual because of the absence of vours their application in work and management is
systematic process thinking. [6] as a rule capable of fast and mainly painless change
The generic capabilities of IT for reshaping of production program. It all happens without many
management processes include improving analyt- crashes and in the manner in which the survival of a
ic accuracy, enabling broader management partici- company cannot be brought into question. The pro-
duction program change is made in order to raise in order to contribute to achieving set goals. Vision
the work productivity and product quality to a high- and strategy planning is their responsibility. They
er level and to provide for more rational and more can do it on their own or relying on the knowledge
successful business operation of a company. of other company subjects. It has started being re-
The more the company is information-based, the alized more seriously recently that the knowledge,
more it is in a position to produce inexpensive prod- capabilities and experience of each man within an
ucts, or to offer more inexpensive services. Even organization are valuable. They should be used
small companies, which cannot provide so-called skilfully. In that sense, the company management
optimum product series, can produce sufficiently is no more in a position to neglect or fail to observe
cheap products if they rely on information tech- the potentials available to them, which is also as-
nologies in the right manner or their everyday ap- sisted in a corresponding manner by Information
plication in work and management. Therefore, the Communication Technologies.
importance of optimum series which could have Information Communication Technology wid-
been provided only by large companies under the ens perspectives, enriches knowledge, accelerates
traditional business operations is not the same as it responses and increases the possibilities of com-
used to be. Rapid development and ever increasing pany leaders. Computers and other information
application of information technology have done equipment relieves them more and more from
the job. The production for the sake of scale gave current operative work, providing them to engage
place to the production for the sake of sale, since in the activities which are of company’s strategic
the company cannot benefit from a product which interest in more relaxed manner. Thanks to infor-
cannot be sold. On the contrary, it has only losses. mation data processing, it is possible for the man-
Under the circumstances when it is more difficult to agement at any time to know what the results of
sell and collect payment than to produce and pack business activities are, where the problems appear,
the goods, such an orientation is quite justified. what is the performance of the employees, what
Ever increasing presence of information tech- should be changed, and similar. This kind of infor-
nologies both in the company and its business op- mation is no longer needed from middle and other
erations contributes to changing its structure. The level of administration and management.
parameters shaping this structure also change form Well-conceived and updated data bases enable
to a certain extent, enriching it with new contents. company leaders to respond quickly and adequate-
The IT influence on these and such changes is not ly to all challenges and temptations. If the relevant
always the same. It manifests variously in differ- data and information are at hand at any moment
ent parts of organizational structure. Although it even the most complex situations are easy to re-
could be discussed in more details, our attention solve. Entrepreneurship psychology becomes a
here will focus only on the effects achieved by the rule and relying on knowledge, innovations and
IT influence on: [9] company management and timely information are the imperatives of the time.
their activities and middle management. [10] Instead of centralized and bureaucratic manner of
decision making the decentralized system of man-
2.1. Influence of ICT on company manage- agement is favoured. Organizational culture and
ment and their activities climate by which business philosophy, work cul-
ture, work moral and work discipline are recog-
Company management runs the company, its re- nized are easier to shape and accept, because the
sources and business operations and has the highest employees, in principle, do not have serious rea-
responsibility for the results of its business opera- sons to oppose the dominant system of values and
tions. High degree of responsibility means also high rules. Therefore, thanks to information technology
level of authority, which under certain conditions there have been great changes in the process of
can, and often must be used for the purpose of the company managements and its resources. Compa-
business success. Company management, as a rule, ny leaders are now turned more towards creative
consists of competent, responsible and conscien- activities and issues of strategic importance, since
tious people, whose task is to direct their activities they are largely relieved from operative or routine
jobs. In the recent twenty years many things have very fast the necessary data, information, analy-
changed in favour of a man and his future. ses and reports. A large number of middle manag-
Introduction of information technologies chang- ers and experts employed at the intermediate level
es the style of management in that the traditional of organization become excess, since information
management, which bases on autocratic style of technologies take over the largest part of their tradi-
management, is superseded. Namely, in the infor- tional jobs. Everything is changing so that even the
mation era, the quantity of live labour in companies company structures acquire new forms.
is reduced, but the large number of activities can be Reducing middle managers and various ex-
done outside the company, from distance, etc. The perts from the middle level of the company (such
concentration of labour at one place is also reduced, as analysts, independent advisors, reporting and
and thus the capability to manage by means of re- information experts and similar) to a minimum
ward and punishment. Taking into account that ev- number of people, in addition to some positive ef-
ery organization works in some interest in view, this fects, which mainly consist of reduction of busi-
means that that organization cannot be successful ness costs, entails also some negative consequenc-
in contemporary economy if it does not change its es, which reflect in limiting the development and
relationship with the employees and starts treating promotion of managers. If it is known that middle
them as its most valuable asset. managers are actually personnel nursery-garden
and the most important basis for recruitment of
2.2. Influence of information technology to perspective managers who are necessary to fill in
middle management the most responsible or the most prominent func-
tions in the company, it is not hard to conclude
Although the middle management usually in- how important it is to preserve it intact. However,
cludes several levels of management, this term despite this, the things evolve in the direction of
will be used here for so-called middle managers, further reducing of middle managerial level, since
who supervise the work of managers at the lower this provides for considerable work savings. Posi-
position(s), and in some cases even the activities tive effects of information technology influence
of the employees. Therefore, these are the manag- on middle managerial level, judging from every-
ers positioned at the middle of hierarchy inside the thing, prevail and this is why it should not oppose
company, wherefrom the conclusion can be made them. On the contrary, the application of informa-
on their duties, which in principle range all the tion technology in labour process and company
way to operative level, i.e. to production operative management system should still increase, since it
of the company. Their responsibility comes from is one of the important preconditions for success-
their position. In other words, middle managers ful business operations and survival in the market.
are responsible for the work and work results of
those subordinate to them, and under certain con- Instead of a conclusion
ditions for the work of the employees. At the same
time, they are obliged to make regular reports on Besides the influence on managerial procedures
the results of their work to higher managers, i.e. and effectiveness, ICT had also significant influence
the top management of the company. on overall management system in modern ogranzia-
Thanks to information technology, the system tions. The process of managing company, its opera-
of management and operation functions more suc- tions and its resources becomes simpler, more effi-
cessfully. It is easier and faster to access the nec- cient and more democratic. While the need for mid-
essary information, which contributes to more ef- dle management personnel partially decreased, the
ficient control of lower-positioned managers and all importance of the company management increased,
the employees. Computer systems and other infor- particularly in the part related to assuming the re-
mation devices provide data which are updated on sponsibility for the most creative, most responsible
a daily basis. Managing company and human re- and most complex jobs within a company.
sources has become simplified in many ways. Even New knowledge and new technologies create
in the biggest companies it is possible to access new civilization. If new civilization is not turned to-
wards a man, his increasing needs and interests, or 11. Milošević G., Osnovi ekonomije, Beograd, 2009;
economic progress, it is doomed to failure sooner str. 171.
or later. This fact is so obvious that even the crea-
tors of new economic order have become aware of Corresponding Author
it. [11] Under the influence of new knowledge and Zivko Kulic,
new technologies there appear constant changes in Megatrend University,
all spheres of human activities. These changes are Belgrade,
Serbia,
particularly expressed in the sphere of IT influence
E-mail: zkulic@megatrend.edu.rs
on the development and change in company’s or-
ganizational structure as a whole, and particulary
companies top and middle management.
References
1. Buble M. (ed.): “Strategijski management”, Eko-
nomski fakultet Split, Split, 1997; pp 77-78.
tion gaps. The estimates of regression coefficients application of weights on the sensitivity to every
obtained by the application of Stone’s model may defined time zone. The weights are usually based
be used as input for the study of factors that ex- on estimates of the duration of receivables and li-
plain the impact of variations of interest rates on abilities that are classified in each time span.
the banks’ stock return. Stone’s linear two-index The measure of percentage change of econom-
regression model is mathematically expressed as ic value of a particular balance sheet item, which
follows [5]: occurs due to the small changes in interest rate, is
called duration. Duration is the weighted value of
jt = β 0 j + β 1j mt + β 2j it + jt all payments from the time of issuing securities
to their maturity. Generally, duration is greater in
Rjt- the holding period return to the j- th bank the case of longer maturity (or the date of the next
common stock over the period ending at time t; price change) of a financial instrument and the less
Rmt- the holding period return to the market coupon payment occurring before the maturity.
portfolio over the period ending at time t; With the greater duration, changes in the level of
Rit- the holding period return on an index of interest rates have greater impact on the economic
constant maturity risk-free zero bonds (interest value of the given balance sheet item. Duration of
rate approximation), a particular balance sheet item can be mathemati-
b1j- regression coefficient which assesses the cally expressed as follows [7]:
sensitivity of stock return to the unit change of Rmt
b2j- regression coefficient which assesses the
sensitivity of stock return to the unit change of Rit .
banks may use two strategies while planning the of the balance sheet and thus protected itself
structure of their balance sheet. The banks that from the influence of the change of the
want to take advantage from the changes in in- interest rate on the market value of equity.
terest rate have an aggressive approach meaning
the adjustment of asset and liabilities duration in The shown regularities which are obtained on
line with their own expectations. Conversely, the the basis of the pre-sign and size of the coeffi-
banks that want to be protected from interest rate cient β2j may be useful in the process of planning
risk have a passive strategy, i.e. the rule of the im- the structure of the balance sheet for a particular
munization of portfolio meaning the adjustment future period, especially if managers rely on the
of flows of assets and liabilities to get weighted technical analysis.
duration [9].
The possible variants of the impact of the struc- 4. Application of Stone’s regression model
ture of the balance sheet on the market value of
equity are shown in Table 1. If there is a positive The research of the impact of balance sheet struc-
duration gap in the level of balance sheet, the inter- ture on the stock return of banks in the case of varia-
est rate rise has influence on the fall in the market tions of interest rate was carried out on the sample
value of equity. On the other hand, a negative dura- of sixty-six US banks between 2001 and 2010. The
tion gap in the level of balance sheet influences the model is applicable for corporate enterprises but
rise in the market value of equity in the case of the better results are achieved in the banking sector be-
interest rate rise. Finally, banks may use the strategy cause the balance sheets of banks usually consist of
of immunization, whereby the duration of asset is interest rate-sensitive assets and liabilities.
equalled to the duration of liabilities (Table 1). The dependent variable of the model is the
The use of Stone’s regression model enables seven-day stock return of the bank holding com-
the estimates of regression coefficients. Based on panies from the sample, calculated on the basis
the pre-sign of the regression coefficient β2j the of weekly share prices. The market changes are
following conclusions may be made: assessed according to the seven-day return on the
– In the case of the positive value β2j, a rise market index S&P 1500 Composite [10]. The ap-
in the market value of equity of banks is proximation of the interest rate change is calculat-
influenced by interest rate fall and by the ed according to the series of weekly return on ten-
structure of the balance sheet in which the year constant maturity risk-free zero-bonds [11].
duration of asset is greater than the duration To determine the value of interest rate the concept
of liabilities. of yield to maturity was used. This concept rep-
– In the case of the negative value β2j, a rise resents the most reliable measure of interest rate
in the market value of equity of banks is [12]. In the case of countries with high credit rat-
influenced by interest rate rise and by the ing, the assessment of interest rate is based on the
structure of the balance sheet in which the calculation of the yield to maturity of long-term
duration of liabilities is greater than the risk-free zero-bonds. On the basis of these values,
duration of assets. the independent variable of the model is construct-
– If β2j= 0, it can be concluded that the bank ed, which can be expressed in the following way:
has applied the strategy of the immunization
Table 3. Estimates of Stone’s model regression coefficients for the sample banks
Rjt = b0j + b1j* Rmt + b2j * Rit +εjt
Bank holding company
b0j b1j b2j
1. Bank of America, National Association 0.0024 1.8586 ***
-0.3589***
2. JPMorgan Chase Bank, National Association 0.0023 1.5902*** -0.5033***
3. Citibank, National Association 0.0003 2.3122*** -0.4172***
4. Wells Fargo Bank, National Association 0.0026 1.4436*** -0.3256***
5. U.S. Bank National Association 0.0024 1.2151*** -0.3062***
6. PNC Bank, National Association 0.0019 1.3029*** -0.3409***
7. The Bank of New York Mellon 0.0005 1.3007*** -0.3962***
8. Capital One, National Association 0.0023 1.9401*** -0.4196***
9. SunTrust Bank 0.0015 1.4961*** -0.3242**
10. State Street Bank and Trust Company 0.0015 1.4573*** -0.3097***
11. Branch Banking and Trust Company 0.0012 1.1025*** -0.2576***
12. Regions Bank 0.0013 1.5980*** -0.2042**
13. Fifth Third Bank 0.0023 1.7407*** -0.4810**
14. KeyBank National Association 0.0010 1.6483*** -0.4254***
15. The Northern Trust Company 0.0006 1.1644*** -0.2899***
16. Manufacturers and Traders Trust Company 0.0019 1.0249*** -0.2547***
17. Comerica Bank 0.0017 1.4000*** -0.4094***
18. The Huntington National Bank 0.0023 1.6282*** -0.2910***
19. M&I Marshall and Ilsley Bank 0.0014 1.5853*** -0.3032***
20. New York Community Bank 0.0034** 0.9134*** -0.1804***
21. Banco Popular de Puerto Rico 0.0002 1.0953*** -0.2383*
22. Synovus Bank 0.0001 1.4723*** -0.3274***
23. First Tennessee Bank, National Association 0.0009 1.3214*** -0.3404***
24. BOKF, National Association 0.0030** 0.9472*** -0.1904***
25. Associated Bank, National Association 0.0014 1.2049*** -0.2255***
26. City National Bank 0.0024 1.0678*** -0.2625***
27. First-Citizens Bank & Trust Company 0.0026* 0.7911*** -0.2460***
28. East West Bank 0.0039 1.4781*** -0.4758***
29. Commerce Bank, National Association 0.0018* 0.7750*** -0.2090***
30. TCF National Bank 0.0014 1.2351*** -0.3947***
31. Webster Bank, National Association 0.0022 1.5367*** -0.3028**
32. The Frost National Bank 0.0019 0.7502*** -0.2228***
33. Silicon Valley Bank 0.0028 1.4832*** -0.5127***
34. Firstbank of Puerto Rico -0.0016 1.2767*** -0.4747***
35. First National Bank of Omaha 0.0015 0.3577*** -0.0176
36. Valley National Bank 0.0013 1.0065*** -0.2518***
37. Firstmerit Bank, National Association 0.0012 1.0556*** -0.2447***
38. Susquehanna Bank 0.0012 1.3298*** -0.2780***
39. BancorpSouth Bank 0.0022 0.9917*** -0.2411***
40. Bank of Hawaii 0.0034*** 0.9947*** -0.1709***
41. The PrivateBank and Trust Company 0.0058** 1.2160*** -0.2869***
42. UMB Bank, National Association 0.0028** 0.8607*** -0.1768***
43. International Bank of Commerce 0.0030 0.9832*** -0.3914***
44. Whitney National Bank 0.0012 1.0867*** -0.3061***
45. Umpqua Bank 0.0028 1.2705*** -0.3144***
The results of the application of the model assets is longer than the duration of liabilities.
show that β2j in all sixty-six cases has a negative However, Basel II recommends that the positions
sign, suggesting that the interest rate rise contrib- without definite intervals of repricing of interest
utes to the growth of the stock return of j, and vice rate or contracted maturity (e.g. demand deposits
versa. The positive correlation between interest and time deposits) and the positions whose real
rates and the stock return is in favour of the Behav- maturity may be considerably different from their
ioural Theory that advocates the view that the in- formal maturity should be classified into time
vestors often make decision without relying on the zone according to the previous experience [8].
fundamental indicators [17]. The period between Since the investors showed in this period strong
2001 and 2010 was characterized by two great cri- confidence in the growth of the US economy,
ses of the US financial market, which means that these balance sheet positions may be considered
the investors tend to believe in the growth of US long-term, which confirms the correctness of the
financial market despite the instability. results of the regression model.
On the basis of the negative sign of the re-
gression coefficient β2j, the inferences about the 6. Conclusion
structure of the balance sheets of the banks can
be made. If in this period the interest rate rise af- Stone’s regression model on the basis of the
fects the growth of the market value of equity, it publicly available information gives statistically
means that the duration of liabilities is greater than significant assessment of the sensitivity of the
the duration of assets (Table 1). The balance sheet stock return to the variations of interest rate. The
structure where exist is the negative duration gap significance of the model is reflected in the pos-
witnesses that the banks are financed from primar- sibility to have an assessment of the influences of
ily long-term sources. Such structure of the source the balance structure on the market value of equity
is at first sight uncommon for the banking sector without complex calculations of duration gaps.
since the traditional deposit-loan activity assumes Formally, in the research on the impact of in-
the balance sheet structure where the duration of terest rate variations on the stock return a positive
value of the coefficient β2j is expected. The reason 5. Kwan Simon H., Re-examination of Interest Rate
lies in the fact that banks finance long-term loans Sensitivity of Commercial Bank Stock Returns Using
a Random Coefficient Model, Journal of Financial
from short-term sources, which results in the ex-
Services Research, Nr.5, 1991; page 61-76.
istence of the positive duration gap in the balance
sheet. Therefore, the coefficient β2j with a positive 6. Flannery Mark J., James Christopher, M., Market
sign indicates that interest rate rise influences a Evidence of the Effective Maturity of Bank Assets
and Liabilities, Journal of Money, Credit, and Bank-
decrease in bank’s stock return. From the macro- ing, 1984 (part 1); 16 (4): page 435-445.
economic perspective, this scenario is in favour
of the Classical theory of fundamental analysis 7. Bodie Z., Kane A., Marcus A. J., Osnovi Investicija-
šesto izdanje, Datastatus, Beograd, 2009; page 323.
which is based on the assumptions that investors
act rationally and that they consider all the avail- 8. Bulaić M., Savić G., Savić. S.,et al, Efficiency assess-
able information in their decision-making process. ment of banks in Serbia, TTEM- Technics Technolo-
However, the results of the research deny all these gies Education Management, 2011; 6(3): page 657.
standpoints. The use of Stone’s two-index regres- 9. Ivanović P., Upravljanje rizicima u bankama, Beo-
sion model showed that in the period between gradska bankarska akademija- Fakultet za bankarst-
2001 and 2010 the increase in interest rate was vo, osiguranje i finansije, Beograd, 2009; page 364.
followed by the rise in the stock return of bank 10. Kapor P., Racionalnost i iracionalnost u finansi-
holding companies in the USA. From the perspec- jama, Industrija, 2011; 39(4): page 15- 41.
tive of the structure of the balance sheet, it means
11. Richie Nivine F., Mautz David R., Sackley William
that the duration of liabilities was longer than the H., Duration and Convexity for Assesing Interest
duration of assets, and that the banks expected an Rate Risk, Bank Accounting and Finance, Febru-
interest rate rise in this period of time. ary- March 2010; page 25-30.
The period between 2001 and 2010 was marked 12. http://www.standardandpoors.com/indices/sp-
with the two crises in the financial market in the composite-1500/en/us/?indexId=spusa-15--usduf--
USA. According to the research, it did not influence p-us---- taken 14.08.2011.
a fall in trust into the US financial market since the
13. http://www.federalreserve.gov/econresdata/re-
confidence in the market rise was retained despite searchdata.htm --> The U.S. Treasury Yield Curve:
the worsening of fundamental indicators. This con- 1961 to the Present, SVENY10. taken 12.06.2011.
clusion was supported with the Behavioural The-
14. Mishkin S. F., Monetarna ekonomija, bankarstvo i
ory, which argues that investment decisions often finansijska tržišta- sedmo izdanje, DATASTATUS,
ignore fundamental indicators including cognitive Beograd, 2006; page 64.
bias that lead to less rational behaviour [18].
15. Newbold P., Carlson W. L., Thorne B., Statistika za po-
slovanje i ekonomiju, Zagreb, MATE, 2010; page 869.
References
16. Mladenović M, ,Petrović P., Uvod u ekonometriju,
1. Stojković D., Đorđević D., Important aspects of cus- treće izdanje, Centar za izdavačku delatnost Eko-
tomer relationship management concept in banking nomskog fakulteta u Beogradu, Beograd, 2007.
quality, TTEM- Technics Technologies Education
Management, 2010;5(4): page 749. 17. http://www.stanford.edu/~clint/bench/dwcrit.htm
(Durbin- Watson critical values) taken 15.08..2011.
2. http://www.bis.org/publ/bcbs128.pdf. [taken
05.02.2012. 18. Newey Whitney K., West Kenneth D., A Simple,
Positive Semi-definite, Heteroskedasticity and Auto-
3. Stone B., Systematic Interest Rate Risk in a Two- correlation Consistent Covariance Matrix, Econo-
Index Model of Returns, Journal of Financial and metrica, 1987;55(3): page 703-708.
Quantitative Analysis, No. 9, 1974; page 709-721.
4. Flannery M., James M., The Effect of Interest Rate Corresponding author
Changes on the Common Stock Returns of Financial Zeljko Racic,
Institutions, The Journal of Finance, Wiley- Black- Higher School of Professional Business Studies,
well for American Finance Association, 1984;39(4): University of Novi Sad,
page 1141-1153. Serbia,
E-mail: raciczeljko@gmail.com
conduct of legal and natural entities related to fire However, Article 10 of this Regulation exempts
protection measures. from prescribed measures business facilities of up
to 150 square metres which are utilized for operat-
Methods ing independent businesses (surgeries, pharmacies,
agencies, services, catering). Apart from this cat-
This study comprises the application of the egory, there are two more categories of facilities ac-
following methods: 1) Analysis of existing legal cording to the degree of vulnerability to fire: I cat-
documents of the Republic of Serbia in the field of egory facilities (high vulnerability) and III category
fire protection; 2) Statistical analysis, processing facilities (certain degree of vulnerability).
and review of information about performed fire Law on Fire Protection for legal entities and re-
protection inspections of facilities and the num- sponsible natural entities imposes fines, as well as
ber of filed misdemeanour and criminal charges; potential temporary ban on operating a business.
3) Cost-benefit analysis in case of (non)compli- All forms of violating regulations and prescribed
ance with prescribed fire protection measures; 4) fines may be classified into two main groups: 1)
Interviews with professionals from the Ministry of Economic violations. Fines imposed on legal enti-
the Interior in charge of monitoring of regulatory ties for violations range from RSD 500,000.00 to
compliance and reaction in case of fire. RSD 3,000,000.00 (approximately EUR 4,000.00
– 16,500.00) and 2) Offences committed by legal
Legislation on fire protection in the Republic entities. Fines imposed for offences range from
of Serbia RSD 300,000.00 to RSD 1,000,000.00 (approxi-
mately EUR 2,500.00 – EUR 8,500.00).
The field of fire protection in the Republic of Certain provisions of the Regulation make the
Serbia is regulated by the Law on Fire Protection. preparation of protection plans a technical issue
[7] This Law and the accompanying bylaws, such more than a concrete operative task, which ren-
as the Regulation on Classification of Facilities, ders those plans unwieldy instead of making reac-
Activities and Land according to Categories of tions concise and precise by prescribed measures
Vulnerability to Fire [7], and Rulebook on the or- and prevention plans.
ganization of fire protection by the threat categories
[8] regulate among others the following issues in
Statistical analysis of data on activities of
the field of fire protection: entities subject to moni-
department for prevention - results and
toring compliance with regulations, fire protection
comments
measures, categorization of facilities according to
the degree of vulnerability to fire, criminal and mis- The Republic of Serbia has faced numerous
demeanour liability of legal and natural entities. fires in recent years. With the complexity and con-
Legal entities are obliged to act in accordance sequences they have, fires in hospitality facilities
with the mentioned Law and relevant bylaws, and forest fires pose a particular problem. In the
implement fire protection plans, as well as to pre- past several years, forest fires consumed a large
pare rehabilitation plans for the elimination of the amount of forest vegetation, and our fire brigade
consequences of fire. For performing duties and requested the assistance in manpower and tech-
implementing preventative measures and fire pro- nology from Greece and the Russian Federation
tection measures, entity – legal entity may engage for fire fighting. The environment suffered great-
another legal entity which obtained a licence for est consequences. However, in recent years, fires
performing such activities from the Ministry of in hospitality facilities inflicted casualties apart
the Interior of the Republic of Serbia. from material damage and therefore the research
According to the aforementioned Regulation, in this paper is focused precisely on this type of
hospitality facilities are categorized as II category crisis situations. In two fires which occurred in
facilities with increased vulnerability to fire, and 2008 and 2012 in Novi Sad, administrative center
they belong to a group of public and business facili- of the northern Serbian province, the total number
ties which accommodate from 200 to 1000 people. of 13 young people lost their lives.
The events presented in this paper as charac- The number of filed criminal charges in 2008
teristic and in relation to which data analysis was amounted to 189 which was by 18.18% lower than
conducted and created statistical review of activi- in 2007 (231 in total). The number of filed misde-
ties of Department for Prevention of the Sector meanour charges in 2008 amounted to 21 and in re-
for Emergency Situations are as follows: 1) Fire lation to 2007 it was also lower, namely by 41.67%.
in “Lounge” café on 17 February 2008 when 7 In 2012, data analysis and statistical indicators
young people died from fire and 2) Fire in “Con- of inspections and filed charges were conducted in
trast” nightclub on 1 April 2012 when 6 young relation to the data from April 2012 which repre-
people died from fire and 4 were injured. sented the constant in information processing. On
The data presented in this part of the paper repre- 1 April 2012, fire broke out in Contrast nightclub
sent official data of the Ministry of the Interior of the in which 6 young people lost their lives. Since the
Republic of Serbia. We statistically processed the fire occurred on the first day of April, it can be
data provided by the Ministry of the Interior which considered with certainty that it affected the activ-
are related to the two previously mentioned extraor- ities performed throughout the whole month. The
dinary events, which in temporal and numerical number of regular inspections in 2012 processed
sense represented reference points for further analy- by month amounts to: 1) In January 1.654, 2) In
sis and information processing. In 2008, the total February 2.120, 3) In March 3.079, 4) In April
number of regularly inspected facilities by inspec- 2.487, 5) In May 2.583 and &) In June 2.909.
tion bodies amounted to 39,515 which is by 12.76% The presented data indicate that there were no
more than in 2007 (when 35,044 regular inspec- significant fluctuations in the frequency of regu-
tions were performed). The following data should lar inspections. However, the data related to the
indicate the frequency and efficiency of activities number of extraordinary inspections show com-
performed by inspection organs, and the statistics pletely different activity. In the period from Janu-
and data analysis were determined in relation to the ary to March 2012, a total of 411 extraordinary
data from February 2008 as a month in which the inspections were performed, while in April 2012
described tragic accident in Lounge café occurred. that number amounted to 3.451. This piece of in-
In February 2008, a total of 2,758 regular in- formation indicates that the activity of competent
spections were performed. In the period follow- services multiplied in relation to monitoring com-
ing the said fire that number was higher, namely: pliance with the Regulation on Fire Protection,
in March by 39.81%, in April by 62.62% and in however, such extensive inspections started only
May by 35.06%. It is interesting that the number after the fire with tragic consequences.
of inspections during the summer months (when
hospitality facilities accommodate more visitors Cost-benefit analysis
due to tourist season, holidays and school holidays)
was lower. In relation to February 2008 and previ- This study uses the Rational Polluter Theory as
ously mentioned percentages, 22.04% more inspec- a theoretical framework for the preparation of ba-
tions were performed in June, 17.15% in July and sic cost–benefit analysis in case of compliance with
8.38% more in August. The analysis of the number fire protection measures. This theory is founded on
of extraordinary inspections of facilities indicates various economic theories of business operations
that the activities of government bodies multiplied [9] . Every employer or producer tends to minimize
in the month following the said fire. In February the costs of their products and maximize profits.
2008, the number of extraordinary inspections [10] According to this theory, temporal application
amounted to 253, whereas in March 2008 that num- of penalties brings a note of vagueness, but the con-
ber amounted to 2349, which is by 828.46% higher. ditions for violating the law are defined through this
This information may indicate that the activities of widely accepted mathematical formula:
competent services were intensified as a result of
the unfortunate event. However, as early as in April E(NC) = [S – p • F]
2008, the number of extraordinary inspections was
Where:
by 55.73% lower than in February 2008.
E(NC) – represents total expected value (ben- EUR 29,178.50. This amount represents a value
efit) from violating the law; – S – in the previously described formula.
S – represents economic benefit; This study has the objective to comprehensively
p•F – represents expected costs incurred by analyze cost-benefit concept. To this end, profes-
violating the law (whereas p represents the prob- sional assessment was previously performed in
ability of uncovering misdemeanours, and F is the relation to legal liabilities and costs necessary for
expected amount of fine). If the final value of the furnishing a hospitality facility in accordance with
equation is negative, a rational polluter will com- the Law on Fire Protection. The second part of the
ply with the law. However, positive final value of formula representing fines which a legal entity may
the equation is a signal for a rational polluter that face, shall apply maximum penalties in accordance
they may break the law. with the Law on Fire Protection. For economic vi-
olations the fine amounts to EUR 16,500.00, and
For the purpose of preparing cost-benefit analy- for the offences committed by legal entities EUR
sis of compliance with the law and the installation 8,500.00. Maximum penalty amounts to EUR
of legally prescribed fire protection equipment, a 25,000.00. This amount is represented by p•F in
model facility was designed – a nightclub of an the described formula. When previously calculated
area of 1,500 square metres. Single level model values are entered into the formula
facility is made of hard material. The facility is
equipped with basic catering equipment, electric E(NC) = [S – p • F],
cupboards, as well as technical equipment for cre- the following values are reached
ating sound and visual effects (light and smoke ef-
fects). The maximum capacity for guests in this E(NC) = [29,178.50 EUR – 25,000.00 EUR],
facility is 300. Taking into account the purpose
and the number of people, this facility is classified where the expected total benefit from violating
according to previously mentioned Regulation as the Law amounts to EUR 4,178.50. The aforemen-
II category facility – facility with increased vul- tioned facts imply that the difference in finances in
nerability to fire. This model facility with its size favour of violating the Law may be greater. In
and characteristics represents a model of a smaller other words, responsible persons for hospitality
space capacity nightclub. In this way, we intend facilities may count on lower fines in the process
to analyze on a simple model, the liabilities, costs of furnishing and starting operations in a facil-
and possible penalties related to the responsible ity. Also, cost assessment of the implementation
person of a hospitality facility. of fire protection measures was conducted for the
Previously described model hospitality facility, model nightclub – a facility of a relatively small
according to the Law on Fire Protection and ac- area, which indicates that basic costs of fire pro-
companying bylaws, must possess at a minimum tection may be significantly higher.
the following systems and equipment: a) Sprinkler
valve installation, the price of its elements and as- Analysis of results of questionnaire
sembly amounts to EUR 20,933.50; b) 15 pieces completed by professional staff of ministry
of portable fire extinguishers, model S9, whose of the interior
total price amounts to EUR 525.00; c) 2 pieces of
CO2 portable fire extinguishers, whose total price The questionnaire completed by the employ-
amounts to EUR 120.00; d) Fire alarm and defum- ees of the Ministry of the Interior in charge of fire
ing system, whose average price on the market protection contained 7 questions, and the structure
amounts to EUR 7,000.00; e) A document - Main and method of answering the questions represent
fire protection project, approved by the Ministry a combination of open-ended, dichotomous and
of the Interior, the price of its preparation amounts polytomous types of questions. Three questions
to EUR 600.000. The total costs of documentation of the Questionnaire are open-ended, i.e. the ex-
preparation and the implementation of previous- aminees had the opportunity to answer questions
ly mentioned systems and equipment amount to independently, provide their professional opinions
or attitudes. The questionnaire was completed by However, different methods, data and interviews
11 employees of the Ministry of the Interior hold- applied in this study pointed out to a significant
ing various positions in the field of fire protection. probability and intent of responsible natural entities
Out of 11 examinees, 8 answered that legal in commercial facilities to consciously avoid com-
regulations in the field of fire protection were pliance with the Law on Fire Prevention and the
„partially satisfactory“, whereas 3 examinees an- accompanying bylaws. Multi-method research in
swered with „unsatisfactory“. As many as 10 ex- this paper pointed out to the following reasons for
aminees consider that the Sector for Emergency noncompliance with the regulations: 1) Insufficient
Situations of the Ministry of the Interior has lim- manpower and material resources in inspection
ited manpower and material resources at its dis- bodies; 2) Insufficient coordination of the Ministry
posal for accomplishing all entrusted tasks. The of the Interior, the prosecution and the judiciary, as
question „Does the existing legislation in the field well as passing mild sentences for violators of the
of fire protection enable legal and natural entities Law; 3) Financial calculation (cost-benefit analy-
to avoid complying with all provisions of these sis) which motivates responsible persons in facili-
acts?“, 8 examinees answered „Yes“. ties not to comply with prescribed measures related
The results of the questions in which the exam- to fire protection completely or partially.
inees were requested to assess the performance of All of the above mentioned facts indicate that
the prosecution and the judiciary in the field of fire the competent bodies of the Republic of Serbia
protection show the following: 1) 9 examinees co- have professional staff who can countionuously
sider the performance of the prosecution patrially perfect legal regulations, but reducing the possi-
satisfactory, whereas 2 examinees consider the bility of noncompliance with the laws demands
performance partially unsatisfactory; 2) 8 examin- above all the increase in manpower in inspection
ees consider the performance of the judiciary par- services, stricter penal policy, quicker and stricter
tially satisfactory, wheras 3 examinees consider prosecution and judicial authorities. It is necessary
the performance partially unsatisfactory. to establish inspection and legal system which will
The question “What are the reasons behind the neutralize cost-benefit result currently in favour of
fact that the number of performed regular and ex- violating the Law.
traordinary inspections of facilities in 2012 (by
month) is lower by 6-30% in relation to 2010 and References
2011?“, the greatest number of answers, rephrased,
read that the increased workload, tasks and facili- 1. Yoder J., Playing with Fire: Endogenous Risk in Re-
source Management. American Journal of Agricul-
ties to be inspected are not accompanied by the in-
tural Economics 2004; 68: 933-948
crease in manpower and material resources.
2. Carle D., Burning Questions: America’s Fight with
Nature’s Fire. Westport CT: Praeger. 2002.
Conclusion
3. Cooper C. F., Changes in Vegetation, Structure, and
In the past five years, the Republic of Serbia Growth of Southwestern Pine Forests Since White
devoted considerable effort to create comprehen- Setlement. Ecological Monographs, 1960; 30:
sive and adequate legislation in the field of fire 129-163.
protection. Within that period, the processes of
reorganization of the existing sectors for protec- 4. Shpilberg D. C., The Probability Distribution of Fire
Loss Amount. The Journal of Risk and Insurance
tion, rescue and fire brigade were underway, as 1977; 44 :103-115.
well as the establishment of a unitary Sector for
Emergency Situations within the Ministry of the 5. McCarty T. A., and Yaisawarng S., Technical effi-
Interior. Legislation and the establishment of a ciency in New Jersey school districts. In H. O. Fried,
unitary subsystem within the Ministry of the In- C. A. K, Lovell, S. S. Schmidt (Eds.), The Measure-
ment of productive efficiency: Techniques and ap-
terior enabled defining duties, entities, prevention plications. New York: Oxford University Press 1993:
measures and passing recommended sentences on 271–287.
legal and natural entities.
Corresponding author
Boskovic Milica,
Faculty of Security Studies,
University of Serbia,
Belgrade,
Serbia,
E-mail: mboskovic@fb.bg.ac.rs
in 2002 and the revision of EU Directive 8 dur- IT management and set increased requirements of
ing the last years. Both regulations have the same the internal control, in particular of the IS control.
goal: to restore the trust of investors for corporate Successful business management practice is im-
accounting reports. Integration of information tech- possible without the existence of internal controls
nologies (IT) and business processes imposes the system, and the key part of the internal controls
necessity for assurance in the reliability of IS [3]. system are the IS controls that should be continu-
Increased requirements for control over informa- ously evaluated. Thus, IS internal control obtains
tion are understood as enterprise management key an important place in management structures, and
components. These results supplement the internal the corporate risk management becomes a priority
control framework which provides required infor- for modern business.
mation for the enterprise to achieve its goals. Ac- Risk management is the process that guarantees
cordingly, information system needs to be brought that the strategic objectives of the company are not
under control. It means that IS internal control endangered by the failures of IT in the organiza-
goal represents the reduction of operational errors. tion. The impact of an IT failure can be catastrophic
In such a way financial reports are more reliable, whether it results in an operational crash, a security
enterprise risk management is more likely, and the leak, a project collapse or other management issues.
enterprise equity is safer. This situation contributes Executives have to understand that IT risks are not
to the synergy of internal control and enterprise only a question of technology, but also a factor that
management places it under solid framework. They can endanger investments and projects. A common
contain strict regulations on responsibilities for mistake is to overestimate security risks and not to
audit reports, the personal involvement of stake- take effective measures against IT-related manage-
holders, the total independency of audits and other ment or project risks. It is important to understand
sensitive issues. Many of the companies’ processes that: Risk is as much about failing to grasp an op-
must be revised and the responsibilities for audits portunity as it is about doing something badly or in-
are more precisely defined [4]. These efforts show correctly [6] Although in some of the literature the
the growing need for reliable audit data; and the definitions are different – like in IRM’s model [7]
importance of auditing in general and especially IT most sources agree that the risk management pro-
auditing seems to be growing rapidly. cess is made up of three major steps: risk identifica-
tion, risk assessment and risk treatment.
2. The risk management process There are many methods to identify risks, e.g.
objective-based or scenario-based identification.
Internal control for the enterprise is same as By the use of these methods a more or less com-
self control for the individual. In contemporary prehensive catalogue of relevant risk factors can
business conditions, management agrees that each be obtained.
enterprise entails risks to be controlled through
policies, instruments, personal responsibilities. It
is necessary to establish IS internal control stan-
dards; define and develop detailed policies; estab-
lish levels of risk tolerance and ensure that enter-
prise has identification, measurement, monitoring
and reporting system for all types of exposure [5].
For many, enterprises, information and tech-
nology that support operation of the company rep-
resent the most valuable asset. Consequently, suc-
cessful enterprises recognize advantages of infor-
mation technology and understand its association Figure 1. The risk management process
with risks management as a critical dependence of
many business processes in relation to informa- During the assessment phase the previously
tion technologies. They understood the value of identified risks have to be assessed by their sever-
ity, impact, potential caused loss, probability etc. In To obtain these goals a proper measurement
most cases risk assessment is a great challenge as it system, metrics is needed. Establishing risk met-
has to be made depending on limited information. rics would help organizations by giving a basis for
These risks must be treated according to as- risk analysis and assessment that „...would enable
sessment. The treatment can be either transfer, them to make business decision about managing
avoidance, reduction or acceptance [8]. security risks“. [10]
In the research IS risk assessment has been in the
focal point as this is the most critical step in the pro- 3.1. Challenges of IT risk assessment
cess. Risk assessment has to deal with many uncer-
tainties and its final assumptions have an important The efforts of the past decades to create a stan-
role in making the decisions on risk treatment [9]. dard measurement system for information security
risk show that creating a risk assessment method-
3. The need for assessment metrics ology and metrics is a huge challenge [11].
Risk assessments can be qualitative or quanti-
Skepticism about the value of e-business and tative and both approaches have their advantages
information technology (IT) has been renewed re- and shortcomings. Naturally, the goal of risk assess-
cently, in part due to the gap between substantial ments is to provide a precise and reliable measure-
firm spending on IT-particularly on Internet-related ment of risks. Therefore the quantitative approach
technologies-and the widespread perception about would be ideal. On the other hand many of the
the lack of value of value from e-business [4]. methods presume that correct numerical representa-
There has always been a need from the man- tions of the measurements cannot be given, so they
agement of the companies that were investigated use subjective scales. Usually these are rankings of
that the results of the audits should be represented the extent of risks (e.g. low risk, medium risk, high
in numerical ways. The precise measurement of risk) based on subjective assumptions.
IT-related risk would have multiple benefits for The benefit of the quantitative methods is that
most companies. they naturally create numerical representations
IT-management decisions concerning the allo- of the risk assessment and therefore can be easily
cation of company assets and efforts can be put used to support IT-management decisions [12]. The
on a reliable basis. If the risk factors are identified main difficulty is to collect the necessary data. In
and their levels are precisely measured, it becomes many cases it is impossible to measure the level of
much easier to focus on the most important issues risks, the probability of occurrences or the potential
and to concentrate company spending on the se- impact of the threats. All that can result in forced
lected subjects. Company assets are always lim- numerical representations for the basic data and the
ited, and the amount of money that can be spent final outcome based on these data can be deceptive.
on risk defense is usually restricted. A method that Although the assessment report can contain detailed
could identify the main risk factors and measure numerical data on the level of risks the usability of
their possible impacts would allow the allocation assessment is questionable. It might be even worse
of these resources in the best possible way, and to have an assessment report with precise-looking
it would make the optimization of spending pos- numerical risk levels that are misleading than to
sible. Companies are always interested in compar- admit that some parts of the assessment cannot be
ing themselves to other organizations in the same characterized with numerical values.
industry. It is beneficial also from a promotional Even if the numbers are correct it is extremely
point of view to have certificates of the effective- difficult to compare the effects of a highly unlikely
ness of the company’s risk management. For this event with a great impact factor with a very likely
purpose benchmarking can be used. To establish a but not too serious event. Another problem is the
reliable benchmarking system, and unbiased risk comparison of data on different scales. Especial-
assessment method is needed to allow the inter- ly, it is extremely hard to compare management
change between different assessments, carried out risks with the risks of technical failures. Therefore
by different auditors in various circumstances. quantitative methods usually concentrate more on
the technical aspects that are more or less measur- mentation of audit procedures and results analysis
able and pay less attention to management issues. of the audit tests conducted. This way information
A further obstacle is that most assessment meth- system internal controls evaluation enables the ad-
ods do not cover every aspect of the IT-related con- justment of enterprise to risk environment. By us-
trol issues. To create a comprehensive assessment ing COBIT (The Control Objectives for Informa-
many methods have to be used and the comparison tion and Related Technology) framework the gap
of the results of different topics can be questionable. between business risks, control requirements and
Furthermore most of the assessment metrics do technical issues will be bridged.
not take into account the interactions of the different To make an assessment against control objec-
risk factors. Simply adding the different risk levels tives, the most comprehensive set of IT audit best
can be misleading even during a limited survey. practices, COBIT is a methodology that has be-
Due to the problems mentioned above a com- come a de facto standard covering all possible as-
bination of the qualitative and quantitative ap- pects of IT governance.
proaches is needed. According to the ITGI survey
the most popular risk assessment techniques are Aim of the research
still the business impact and vulnerability-based
approaches, but companies are beginning to real- During auditing projects users face the problems
ize the importance of a broader toolset. Assess- mentioned above. Although clients would expect a
ment against control objectives and best practices precise and well-interpretable result of the risk as-
is becoming more popular [6]. This Means that sessment process, it is extremely hard to create one.
management is beginning to realize that a com- Most of these problems are yet to be solved. There
prehensive risk assessment can only be carried out have been initiatives to unify the different approach-
if all the aspects of IT-related risks are taken into es to risk assessment [14] and hopefully the conver-
account. This goal can be obtained by combining gence of risk management methods has begun.
assessment against best practices and assessments The goal of the research is to diminish assess-
of business impact and likelihood [13]. ment errors in the calculation phase. Therefore
There is no unique way which defines infor- data collection or the method by which the input
mation systems control organizational structures. data are created has not been targeted. It has been
Each enterprise should use the most appropriate assumed that the necessary data for the assessment
components of these frameworks to categorize is available and had been created during an IS au-
and assess IS controls. In the modern environment dit process by the auditor. The goal is to create a
is not possible to imagine any audit form (financial tool for IT auditors that helps in making the as-
reports audit, internal audit and public sector au- sessment and enables better usability. The result
dit) without considering internal controls that are of the assessment method is a unified risk level in-
embedded in an information system which is au- dicator that is based on the results of the IT audit.
dited. Auditing procedures for the internal control The different risk issues are dealt with as additive
evaluation cannot be based on intuition, already or subtractive factors.
certain methodological rules must be followed. During the research COBIT control objectives
Therefore, there is a need to develop internal have been used as a basis to create the necessary risk
control audit methodologies that are performed factors. As COBIT covers all possible areas of IT
through the information system based on the level governance it is a sensible assumption that the risk
evaluation in which those internal controls meet factors identified using COBIT methodology are
predefined control objectives. Beside considering representing the most comprehensive set of aspects.
client’s information, methodology development COBIT offers a Maturity Model to assess the
itself includes audit content planning along with maturity or the level of development of each of
selection of processes that will be subject of audit. the control objectives. This is based on the com-
That represents input values for risk assessment, monly known CMMI (Capability Maturity Model
control objectives and existing controls whose Integration) method developed by the Carnegie
performance needs to be verified through imple- Mellon Software Engineering Institute. Although
domain id id PO PO PO PO PO PO PO PO PO PO PO AI
1 2 3 4 5 6 7 8 9 10 11 1
PO 1 + - + - + + + - + + + + + 0 + - + - + + + 0
+ - + - + - + - - - + - + - + - + - + - 0 -
PO 2 + + + 0 + + + - + - + 0 + - + + + - + +
- - 0 - - - - - 0 - - - 0 - - - 0 - 0 -
PO 3 + - + + + 0 + 0 + - + - + 0 + - + -
+ - - - 0 - 0 - + - + - 0 - 0 - + -
PO 4 + + + 0 + 0 + 0 + - + - + 0 + 0
- - - - - - - - + - 0 - 0 - + -
PO 5 + - + - + 0 + - + - + - + -
+ - 0 - 0 - + - + - + - 0 -
PO 6 + - + - + - + 0 + - + -
- - + - + - - - - - + -
PO 7 + 0 + - + 0 + 0 + -
- - + - - - 0 - 0 -
PO 8 + - + - + - + -
+ - 0 - + - + -
PO 9 + + + + + 0
- - - - - -
PO 10 + - + -
0 - 0 -
PO 11 + 0
-- - -
AI 1
creating a well-defined index of the overall risk to read the paper. Every column needs to have
level, it is possible to make comparison between title, every measuring unit (SI) has to be clearly
different companies or different functional territo- marked, preferably in footnotes below the table, in
ries within the organization. Arabian numbers or symbols.
Naturally, this method is not the ultimate solu-
tion to risk assessment. By taking into the account 5. Conclusion
the interactions of risk factors it is possible to make
more precise assessments and create metrics for A well-formed risk assessment technique can
comparable results. In this method only the first-or- have multiple benefits to many of the stakeholders
der correlations are taken into account. The effects of IT-related risk management. The metrics that re-
of multiple correlations on the result must not be sults in numerical representation of the risk levels
underestimated but the secondary, tertiary etc. cor- of company IT can serve as a basis for benchmark-
relations are expected to have less effect on overall ing. Therefore it is possible to make comparisons to
risk levels. other companies’ risk measurement can be used in
The method does not solve the problem of certifying the level of risk-readiness. The value of a
data collection. It is designed to rely on the matu- proper certification of the level of risk the company
rity levels defined by the auditor. The goal of this holds is very high. The certificate can be presented
method is to lessen the effects of errors made dur- to the clients as an instrument to assure confidence.
ing the aggregation process. A reliable assessment of the information risks
Tables have to be numbered and appear by is an especially powerful tool in the hand of the
order, so they can be understood without having IT-management to establish their decisions. The
assets of companies are always limited; therefore correlations have only been checked at a
a method that enables the best allocation of money higher level. The assumption has been made
and attention is always welcome. By identifying that the detailed control objectives inherit the
the most problematic areas and offering a precise correlations of their parent-objectives. This
measurement system of the level to which the area hypothesis has to be checked and the model
is exposed to threats it is possible to make well- has to be revised according to the results.
founded decisions on expenditure and risk-related Individual checking of control objectives
actions in the organization. would mean almost 100 000 relations which
Taken as a whole, risk assessment metrics can is an enormous task.
help in drawing the attention of the stakeholders to – Creating a software-framework to help the
the problematic areas and also to take countermea- actual usage of the method in real-life situa-
sures in the most effective and cost-efficient way. tions and help auditors apply the findings.
The research development aimed to create a
more reliable assessment method to process the Although the first steps to establish risk assess-
statements of the IT audit report. For this purpose ment metrics and create more reliable methods for
the effects of simultaneous existence of risk fac- IT risk assessment have been made there are still
tors have been taken into account. several difficult problems to be solved. Large effort
Several challenges still lie ahead in creating is needed to solve some of these, but the expected
a common method for IT audit risk assessment. results compensate for the endeavor: Reliable IT
A common approach is needed to assure that the risk assessment metrics would raise the precision
different organizations using different standards of the evaluation of IT risks, the reliability of IT
can cooperate and the results are interchangeable. audit findings, the validity of IT-management de-
The efforts of the main organizations undoubtedly cisions and the effectiveness of the allocation of
show the determination to create common meth- IT-related assets.
ods. The largest challenge is to collect the neces-
sary data for a reliable risk assessment. In most References
cases this appears to be beyond possibility. The
problems mentioned earlier – e.g. comparing dif- 1. Dorfman M.S. Introduction to Risk Management and
Insurance (6th ed.), Prentice Hall, 1997.
ferent scales and diverging events – might prove
to be overwhelming. Nevertheless efforts can be 2. ITGI: Information Risks – Whose Business Are
made to create a basis for assessments. They?, IT Governance Institute, Rolling Meadows,
Another type of challenge is the handling of the 2005.
assessment process itself. A common mistake is to
3. ISO IEC 17799-2000, International Organization for
add the different risk elements and calculate an over- Standardization (ISO), Code of Practice for Informa-
all risk level by simply totaling the individual rates. tion Security Management, Switzerland, 2000.
This results in misleading numerical representations
and unjustified outcomes. During the research this 4. Sedlak O, Grubor A, Ćirić Z, Cariša B. Measure-
kind of error has been targeted. The mapping of the ment Model for Assessing the Diffusion of e-Business
and e-Marketing, Technics Technologies Education
first-order correlations between control objectives Management,Vol. 6, No. 3, 2011; pp. 651-657.
has been done. The tasks lying ahead are:
– Mapping multiple correlations (co-existence 5. IRM A Risk Management Standard, AIR-MIC,
of several factors) and their effects on overall ALARM, IRM, 2002.
risk. The simultaneous effects of more than 6. IT Infrastructure Library (ITIL), British Office of
two factors have not been targeted yet. The Government Commerce (OCG), Central Computer
consequences can be significant but are and Telecommunications Agency (CCTA), London,
expected to add up to less than the first- 1989.
order correlations.
7. Haimes Y. Risk Modeling, Assessment and Manage-
– Discovering the correlations between detailed ment, Wiley & Sons, New York, 1998.
control objectives. During the research
16. Turley J.S. Get Ready for the EU’s 8th Directive in:
Directorship, 2004.
Corresponding author
Otilija Sedlak,
University of Novi Sad,
Faculty of Economics Subotica,
Serbia,
E-mail: otilijas@ef.uns.ac.rs
The concept of the economic state is going in panies in the field of armaments, military equip-
the direction that each country must be viewed ment and military hardware overhaul, which for
like any other company, i.e. every household, be- decades operated under the “veil of secrecy” and
cause it carried almost all the features found in was controlled by the state. Private companies in
any enterprise, namely, technical, economic, so- the field of defense are now internationalized to
cial, developmental, etc. The state has to satisfy such an extent that the production of some weap-
the citizenship through the provision of services ons works thousands of collaborators from differ-
and to charge for that, which is why it is necessary ent countries of the world.
to pre-define number, type and scope of services Detailed analyzes show that the state is now
that the state has to offer. In principle, these are considered a political rather than an economic sys-
unattractive and unprofitable activities for which tem. State and public administration is more con-
the private sector is not interested or are sectors cerned the political and legal rather than economic
that are sensitive and risky to life, health and gen- science, which except for macroeconomics, public
eral security of the country. Everything else can be finance, almost nothing else is researching in higher
privatized and separated from the jurisdiction of education institutions in the field of economy. This
the state and thus reduce the number of “leeches” is the result of stereotyping, which long existed in
who suck budgetary stance. other areas of life and work, i.e. the perception that
Of course, a state like any other company may the state formed a political party and it is natural
be in a position to go bankrupt, and it will happen, that political leaders who get the most votes are the
if the outputs are smaller than inputs. In this case, presidents and governments to lead the most impor-
provision shall be made as with any other compa- tant sectors of the state. It is forgotten that the end of
ny, but the state cannot be liquidated because there the political state is near, because information tech-
are common or general interest for which there nology marginalized the traditional political parties
must be a central authority to articulate them. In and their means of action. J. Trippie said, “Two oth-
other words, inefficient state must be restructured er reasons for the existence of political parties is to
by the depth and breadth of the society, dismissed support the candidates and donors to provide fund-
the government that has failed to meet the goals ing for the campaign are more questionable. Can-
and expectations of citizens, and so on. didates are now able to gather more volunteers and
If the state is viewed in this manner, i.e. as a organizers of the campaign using the Internet and
complex social and economic organism requiring social networks, rather than any political party can
high quality management, it may be concluded gather through its principal committees and party
that the state needs to work on economic princi- networks.” [4] Therefore, new technology and high
ples, i.e. those principles on which it operates any turbulence imposed the need to react quickly to
business organization. specific problems, but much more on removing the
This approach points to the need that the public causes that produce certain problems. This is even
sector in transition countries must be more exposed more as the state as an institution apparently is the
to market forces and the abolition of the classical largest generator of crisis. It turns out that in the
management that existed in the second half of the past period, business organizations largely assumed
last century, since those are outdated paradigms the governance principles in their strategies, and to-
that no longer works and are not able to respond to day many corporations have become economically
contemporary problems. [3] The practical opera- stronger than the individual states. Consequently, it
tionalization of this idea is in greater privatization is necessary to take effective principle of managing
of traditional government institutions, just like de- corporate organizations and apply them in the man-
veloped market countries in the West did, through agement of the state and its subsystems.
the liberalization of the energy sector, railways, The state in contemporary understanding has to
education, health, culture, defense, etc. Experi- be understood as any other organization i.e. com-
ence and research show that the private sector in pany. It has a goal, like any other company, and that
the developed countries took many activities of is creating a favorable business environment for
the public sector as well as traditional public com- the successful operation of business organizations
by providing services. This and other objectives, 2. The necessity of restoring traditional
the state must exercise with the smallest economic (host) economy
sacrifices, i.e. with the smallest expenditure of ma-
It is already known that the Americans are re-
terial, human, financial, information and other re-
turning to their traditional dishes and “grandma’s
sources. Thus, the state in carrying out its role must
cookies”, which are largely forgotten, and that to-
take into account the economic dimension, which
day is a special treat. They, like other developed
is the final and inevitable in every organization. It is
countries are returning to the suburbs and Mother
shown that any goal can be realized today and that
Nature. In numerous UN declarations, a request
this something like that is not a major problem, but
for further ruralization of the villages and de-
a problem arises when the goal must be achieved
urbanization of the cities is pointed out. Instead
with the highest level of business economics.
of mass, a rural tourism is developing, life on the
Of course, the state is anatomically identical
farm, and so on. Growing plants in the traditional
or similar to other interested organizations. It has
way is becoming a lucrative business. Alterna-
its inputs, transformation processes and outputs in
tive and traditional medicine is gaining the right
the end. Its resources are public property managed
of citizenship and it is in conjunction with official
by public enterprises; the budget is formed from
medicine. Many other areas are returning to tra-
taxes and other revenues (donations, extraordinary
ditional value systems. Of course, it is forgotten
gains, etc.). Each state, just like the companies,
that “the current model of capitalism is inefficient,
shall endeavor to “fertilize” the public property
they are now looking for a new one, but no one
as much as possible, and on the other side to take
yet knows to say what it should be, there is still no
minimal interventions in the economy in order to
solution. No new Keynes to find a new solution, as
achieve defined objectives.
it was after the great depression”. [5]
Through the transformation process, the state or
Detailed analyzes show that the host economic
government as its executive body should design the
is largely abandoned by the state and its institu-
best mix of business, in order to achieve the great-
tions. The host economy is largely abandoned
est impact. Poorly designed government or public
by modern economic science, although it is the
administration and public enterprises, increase the
healthiest basis for the management of state, and
entropy of its functioning, which multiplies the
even the global economy. The host economy is the
problems at the enterprise level organizations.
source of all kinds of economy and by restoring
Finally, the state has outputs that can be ex-
traditional values in
this economy, to a large extent
pressed by the quality of service and products
could provide the chance to avoid the problems of
i.e. the standard of citizens. In other words, if the
modern economy and the state. Great Greek phi-
general public does not have a satisfactory quality
losopher Socrates said, “We should not underesti-
of life, state does not do enough to provide it and
mate those who know how to manage the house-
must step up its activities, such as the introduc-
hold. Because, the one who knows how to manage
tion of management in improving the quality of
a household, knows how to lead a country. You
products and services, in order to obtain or retain
only should be a host.”
customers i.e. clients.
The host economy does not become obsolete.
In order to achieve this, it is necessary to bring
However, it may disappear if a man does not be-
more economic elements in political and legal
have as a host. This is what happened in the new
theory of the state, which is prerequisite for devel-
economy, i.e. in mod e rn terms characterized by
opment of political component. Therefore, this is
the crisis. It turns out that a man like plants and
not about the abolition of the political, legal and
animals are natural b eing, and nature can never
social role of the state, but the balance of these
become obsolete, because it is an objective source
roles with the economic, social and developmental
of life. The bee does not become obsolete, but for
functions, which is also a prerequisite for the real-
126 million years, t h ey are producing the same
ization of the traditional role of the state.
product, but create t he conditions for flowering
and fertilize the pl a nts. What do become obso-
lete those are the beehives, feeding and care tech- weak economy, fragile democracy, high levels of
niques, tools and honey processing techniques. A corruption, misuse or insufficient quality of priva-
man produces, spend, and tries to facilitate their tization, large debt, and so on. It turned out that a
own life and work using new techniques and tools. weak economy cannot have a strong currency and
What does change and become obsolete are tech- short-term mechanisms cannot ensure the mainte-
nologies, concepts and philosophy of life. [6] nance of monetary stability in the long run.
Exact figures show today there are a number These and other data and observations warn us
of world class statesmen, people who have com- to the need to return to the roots of the host or the
pleted an elite management school of business, traditional economy that was largely abandoned.
but there are few statesmen hosts, i.e. those who It seems that the only traditional economy is still
“take from barn as much as there is in a barn,” and relevant and that its fundamentals will never go
lead a country like they are running a household. away, because it is based on a sound and sustain-
To make matters worse, a large number of control able basis. This is significant, because it shows that
and statesmen in countries in transition and their traditional mechanisms, concepts and technolo-
ministries are not encountered problems with the gies in the implementation of the host economy
management of a household or small business, so today are unacceptable. Thus, traditional or home
it is often the state became the first place that were economy and its concept of realizing must be con-
taught management and dealing. temporary i.e. adjusted in any new time dimension
That also leads to many problems at the nation- to suit a specific situation and the country.
al or at the global level. Thus, during the economic Traditional or home economy is based on sev-
crisis in 2008, was stated that the American nation eral important features, including:
has suffered huge financial trauma of tens of tril- – That each generation leaves more wealth
lions of dollars. It will take many years to avert than what it does inherited from the previous
these consequences. Politicians and government, generation. With some exceptions, this
however, does not want to admit to the public this was practiced and thanks to this principle,
indisputable fact. According to the U.S. National humanity in every new time dimension
Bureau of Economic Research, about 8 million exercised greater success, better living
people in 2007-2008 lost their job. In the econ- standards, longer lives, and so on.
omy, so-called “speculative transactions” gained – The second principle is linked to the
importance, even though they are not supposed to first, and is based on the principle that
receive a legal form. Who needed production and each generation should live of their own
savings when the stock market could earn more labor, and that does not live on the burden
than 20% annually in the period 1982-2000, i.e. of future generations. The basis of this
when the interest on loans for real estate grew at principle is that borrowing goes to the limits
a double-digit number, and the cache could be of indebtedness. Therefore, host state, like
quickly and easily get by refinancing and putting common household will try not to borrow,
a second mortgage and thus get another loan. The especially not to leave the burden of debt
state is in an economic crisis in 2009 opt for print- repayment to future heirs. If that were to
ing the money in order to calm down the panic happen in the household, members would
just caused due to big disproportions between pro- oppose such system and management is
duction and consumption, while consumption was likely to be took some of the members who
several tens of times greater than the possibili- managed on a sustainable basis holdings.
ties. Many analysts pointed out that the crisis was That the practice of borrowing has taken
resolved, and the individuals said it is necessary hold at the end of the last century shows
to draw some benefits out of the crisis. All of the Manfred Perlick with his statement,
above is the result of the actions of classical states “America lives on credit.” [8]Today, the
and its effect on obsolete or inadequate way. [7] situation is much worse. Accordingly, the
The problems of transition countries are even debt is not only economic but also a moral
greater. There is a great discrepancy between the issue, because the assessment of such
behavior cannot and should not give those n which it is realistic to expect an even worse
who take, but those who repay loans, etc. state of the economy, because: [9]
In this context, it is necessary to take into ○ Owners of real estate and homes will
account debt of a country as a component of have less capital and fewer opportunities
the sustainability of a country, and evaluate for loans,
the social responsibility of the state. ○ Shareholders will have a lower dividend
– The fear regarding the transition is circulating and less confidence,
through developing countries; a key point of ○ The number of available jobs will
this transformation is the qualitative change decrease,
of state or public property into private or ○ Modern industry is dismissing rather
combined ownership. The number of sold than employ workers
enterprises and the amount of the gained
money usually measures the success of the From the above it can be concluded that any
transitional government, which is contrary indebtedness in the present, with the assumption
to the sound science of the host economy. there will be better times in the future is unreal-
Each host in the foreground will emphasize istic, especially when it comes to spending, i.e.
what he bought, i.e. with which he increased filling the budget deficit. In these circumstances,
his wealth, and will not brag with the sale, it is pointless to introduce rescheduling of loans
since real hosts do not do that, and when because in poor business conditions such as ex-
they do, it should serve to increase rather pected, it is difficult to maintain business and pay
than decrease assets or improvements of the out the old loans.
property.
– Each host during the sale first trying to get 3. The prime minister in each state should
rid of what it does not need more. Therefore, be the chief executive (CEO)
it clears the orchard that does not bring
satisfactory yield or crop, livestock that does If a state is understood as a company, then
not provide for breeding, etc. Therefore, many things from the public administration can
the real host will never sell what may be applied to business organizations, as well as
be a relatively easy sell, but what is most many good solutions for business organizations
difficult to sell. Practice in the management may apply to the state organization and manage-
of the state economy, especially in transition ment. This analogy in the past has gone from the
countries, including Serbia, shows that state toward the companies, where decisions were
here is first sold what is valuable, and then often taken over from the state administration and
what does not make a profit and thus a the management of large business systems. Under
great damage to the success of the national present conditions, the direction is reversed, and
economy is making. now the state administration often takes the ex-
– The households do not spend beyond its perience of transnational and multinational com-
possibilities. In this context, it is not possible panies and implements it in its organizational and
to use the credits and loans for tourist trips, management practices.
purchase of consumer goods, and so on. A In this context, it is evident that the need for
concept that has existed in the seventies and professional managers is top priority and that spe-
is still largely advocated that production can cialization, professionalism and high competence
be started by increased consumption, today never were needed in public sector than it is to-
crashed, especially when it comes to the day. This is a real statement, because we are in the
budget deficit i.e. the budget expenditures. turbulent conditions of life and work, where de-
Thus, no loan or loans, even if it is free is not cisions must be made quickly and efficiently. Of
justified if it is used for consumption. This is course, quick decisions are generally of poor qual-
true because we shouldn’t except even more ity, and good decisions are often delayed. To adopt
favorable conditions, but rather more brutal fast, but good decisions, we need a high level of
professionalism of all members of the manage- desires and interests should be met with the least
ment team, and all stakeholders involved in the expenditure and other economic sacrifices. If this
creation of joint effects. does not happen, the citizenry as a consumer of
However, research shows that up to the present public products will not provide satisfactory re-
days, the management science is not enough pro- sults for its stakeholders.
moted professionalism in public sector manage- Therefore, the government is a representative
ment. The reasons for the above should be sought of the public sector and is similar to the top man-
in the objective facts, because the public sector is agement of business organizations. It is like the top
complex, extensive and according to its anatomy management because the state has a responsibility
belongs to state, as a traditional institution that to create a favorable business environment in which
is slowly changing, especially in the economic “business will flourish.” The government should
sphere. Therefore, the greatest management gurus set an example in the introduction of efficient tech-
have failed to create new ideas and concepts aimed nologies and organizational management concepts
at increasing the efficiency of the public sector. A in their system or its parts. If the concept proved
renowned consultant T. Peters initially denied the successful, it would be endorsed by the business
importance and influence of management on the organizations, which, in turn, will be good for the
performance of the public sector, but after research- state, as the more successful economy will be filling
ing documents on the public sector changed its at- the budget faster, which could be used to improve
titude. In this way, he joined other famous names people’s welfare. In this way, the government will
who justified management in the public sector, so gain trust for leading the state, as it proved on the
today there is no significant management guru that parliamentary and local elections.
doesn’t realize management as a factor of business Accordingly, the prime minister of each state
and new production work force. must be the manager i.e. the person who has the
Porter’s colleague from Harvard, Rosabeth knowledge, skills and ability to organize the man-
Moss Kanter, recently examined the relationship agement process. Its main task is based on the
between public policy and “a business commu- electives they voted for to formulate a strategy to
nity” from the opposite perspective. Transnational transform the electoral promises into reality and to
and multinational corporations are globally orient- realize its promises.
ed, and provide their expansion through the strat- In Serbia, all the above facts are unreasonably
egy of internationalization, especially in countries neglected or not enough importance is given to
with cheaper labor. In this context, it is necessary them. Instead of professionalism and requires that
to consider the policy led by a country’s political the president be a government manager, i.e. a busi-
stability and acceptability of companies in a par- nessman that has proven its skills in managing its
ticular region. [10] She insists that the best way own business or as a manager in a large business
for a region to make progress and become an ex- systems, in recent electoral mandate as prime min-
cellent leader in one of three activities: thinking, ister political leaders were elected, as a rule, from
production or trade. According to Moss Kanter, it the party that had the best election result. This is
is pointless to fight against globalization in order undoubtedly a strategic mistake. In that way, from
to safeguard local or regional community. Nativ- good or successful political leaders typically cre-
ism, or the perception that natives have the advan- ate bad prime ministers or heads of certain gov-
tage of its territory is a stereotype, which if it is ernment departments. Appointment political fig-
accepted, leads to the disintegration of indigenous ures for prime minister, conditions are created
i.e. local populations, particularly when it comes that members of the government can be appointed
to their needs and interests. by the same criteria, and these elect people from
The above statements apply to public adminis- their political options for their structures, which
tration. The public administration, as any business are loyal to their political opinion, often without
organization must have in mind that the citizens the knowledge, skills and abilities in the sphere of
of a city, village, or other socio-political commu- management. In that way the governance in tran-
nity actually represents consumers whose needs, sition countries and Serbia politicize and idealize,
and thus prevents the professionalization of gover- present, even in the most developed countries. Tom
nance and public sector. Peters at first was for the introduction of manage-
Bearing this in mind, the ministers should be ment in the public sector, and later accepted it. The
functional managers, who manage specific depart- third management guru Mintzberg was against
ments, based on policies and strategies formulated the introduction of management in the public sec-
at the state level i.e. the government. They must tor, which by itself tells us there are disagreements
have the knowledge and experience to manage according to this issue, even between people who
functional sectors and to permanently improving dedicate their life to management issues.
them. Bearing this in mind, in the eighties and On the other hand, for the lack of application
nineties, a number of political leaders, i.e. the management in the public sector, the only respon-
Prime Ministers (Britain, the U.S. and other coun- sibility bears management, who weren’t debated
tries), demanded that government members attend their need for the introduction of the science and
courses or training at the prestigious management profession in the public sector in the best way. Ac-
schools, so the members of the government were countability bears political leaders and diplomats
able to manage their sectors. Therefore, govern- too who didn’t recognized concepts that could be
ment should first of all supposed to be profession- aimed at increasing national success in some coun-
als to manage their own functional areas. tries.
In Serbia, it is known that prime minister was Notwithstanding the foregoing, in the theory
not appointed the members of the government, and practice of public management, there are two
but the leaders of the ruling parties. In this way, opposing aspects regarding the place and the role
for members of government political incompetent of management in public administration. [11]
and mostly functional managers are elected. Be- The first aspect refers to the fact that the state
cause of this practice, members of the government is, according to Singler’s law, slow, inefficient and
works for the interest of the party that appointed generally bad host, i.e. it is not interested in increas-
them, rather than working as a team to achieve ing performance. On the other hand, the state has
as much success as possible at the national level. specific sectors such as education, health, cultural
Thus, partial i.e. partisan interests become prima- and other institutions, which by their nature do not
ry, and the interests of the state as a whole sec- correspond with the management, because the pres-
ondary, which leads to an increase in entropy at ence of the managerialism in them would question
the national level that produces inefficiency and the morality, the Hippocratic Oath, and so on.
stagnation of the economy and society. According to this view, there is no room for the
Presidents of local (self) government are low- economy, i.e. management, in the state, that is the
level managers that in scope of defined policy and public sector.
strategy of the government are working on the The second aspect is based on the fact that each
implementation. Moreover, this structure must organization has interest and that in the broader
have the knowledge, skills and operational man- context there are no organizations without inter-
agement capabilities to create high-quality opera- est. According to this opinion, educational, health
tional strategy, i.e. tactics for successful managing systems, and even the American Red Cross, which
local governments. This creates conditions for the is considered one of the largest humanitarian or-
introduction of competent governing elite, who ganization in the world, is the interest organiza-
will be able to respond to the increasing complex- tion. In other words, each of these and other or-
ity and uncertainty in the economy and society. ganizations is forced to achieve greater economic
effects with limited resources, which creates the
4. PROS and CONS of managerization of need for the introduction of management science
the state and the government and profession. Therefore, managerism needs to
manage scarce resources, which in the future will
P. Drucker more than half a century claimed that be smaller and smaller, and that with limited re-
management is most needed in the public sector, but sources (natural, financial, information and other)
that in this part of the national economy is weakly achieve better effects.
In order to remove any possible doubt about – Its legitimacy and legality the government
the need for management in the public sector, it is pulls out of the ruling party, which is why
useful to compare the functioning of management employed in the public administration are
in the public and private sectors. Comparing pub- by nature loyal to the party and its policies,
lic and private sector, may provide conclusions since the with the change of government
and arguments pros and cons of management in comes supporters of the party that won
the public sector in general and managerization of the election, and it uses the privileges in
the governments, both at the level of countries in changed circumstances, which previous
transition, and in the public sector in the EU. [12] government had.
Renowned authorities in the world of manage- – The government and its ministries i.e.
ment dealt with this problem during the eighties public corporations and government
and nineties, but prime ministers too, who were administration in general often live in “a
more or less successful in their attempt to imple- forest of regulations” which are often run
ment management in the public sector. by the people outside of the context, instead
Pros and cons of the government manageriza- people managing regulations.
tion could be summarized as follows: – Finally, the fundamentals of the functioning
– Between the public and private sectors there are of the public and private sectors are different.
fundamental differences, so that management The public sector often opts for linear steps
of one can never be applied to other sectors, in solving the problem, which is not the
as a governance rules apply to one, and other, case in the private sector. For example,
even completely, or in other sectors. governments often find that the dismissing
– Citizens are not customers of the Government, of public administration is costly due to
as is the case in the private sector. Citizens severance payments that need to be paid to
behave in one way when they use public older workers, or counterproductive, since in
services, which are often forced to (such the linear reduction of public administration
as military service), but in a different way often leave young and talented workers, as can
when it comes to the commercial sphere that be seen from the American practice. When
depends on their will. the U.S. Department of construction reduced
– Citizens in the use of public services often personnel from its computer department by
do not have a choice, as is the case with the 20%, it was forced to lay off their youngest
private sector, so the public sector is not and most promising workers, i.e. those who
interested to win the buyers of their services, know the most about computers.
because they haven’t the right to choose, as It is clear there are no such approaches to
a great democratic and market creation. solve problems in the private sector, because
– Government is responsible for all, which in they are not required to be precise and to
practical terms means that does not fit anyone. strictly abide laws and regulations, since in
In business organizations, management many cases they aren’t legally responsible
responds to the owners, which means the for their actions.
responsible subjects in either way known. – To negative attitudes on the application of
– The government is secured from bankruptcy management in the public sector some events
because in the case of bad decisions it has in developed countries also contributed,
on its disposal mechanism of coercion especially in G. Britain, where the number
such as increasing taxes for charging and of managers, during the nineties, in health
balancing the budget and expenditures or systems has increased drastically, and thus
raising taxes, customs duties, and in the end their payments. On the other hand, the number
printing money. The management is subject of nurses and their wages have declined in the
to permanent threat of bankruptcy that under overall cost structure. Namely, the “number
conditions of high competition is becoming of health managers in G. Britain in the period
more intense. 1989-1999 increased by 18,000 while the
number of nurses fell to 27,000. The average speed of small companies insert into the body of
annual salary of hospital manager was about the state, as a large company. This is the reality,
65,000 pounds and grew twice as fast as because in the future, there will be only two types
the average salary of nurses. The total wage of states and organizations such as quick and the
bill for the management in the period 1989- dead.” [13]
1994 was 160 million pounds, while the fund Although there are many pros and cons of the
during the period 1994-1999 was about 720 managerization of the state, the fact is that the
million pounds. complexity of the public sector and the new chal-
lenges it carries, show and prove the necessity of
Previous data show that managers in this im- the introduction of professionalism in public sector
portant sector were overpaid, and nurses were un- management. The privatization wave that swept
derpaid, which was not acceptable to the majority the country in transition favors this, so you will
of employees in the health system. Increasing the find many of the public sectors in private hands,
number of managers has led to inertia in respond- and thus the implementation of management phi-
ing to urgent and priority cases, which reduced the losophies and technologies in these industries will
quality of health services. be enabled. It is therefore logical to advocate for
Previous comparison of the data indicated that the introduction of managerism in all segments
there are differences between the public and pri- of the economy and society, including the public
vate sectors, so it is logical there are differences sector, because the management of the profession,
between philosophy and technology management which can best to economize and manage limited
and other part. However, this does not mean that in resources to achieve defined goals.
the government sector professionalism and mana- Introducing managerism in public administra-
gerialism should be eliminated, however, they tion, i.e. the public sector would restore confi-
need to be adjusted according to the principles of dence in government at the global level. On the
“creative imitation” in relation to specific activity, other hand, the rating of political parties and lead-
time and situation. This is all because of the exis- ers who will have the primary duty to define ob-
tence of worldwide fear of professionalism. Prac- jectives would raise, could pave roads that should
tice shows that individuals and organizations that be taken in creating a favorable business environ-
have professional knowledge, skills and abilities ment for the accomplishment of the mission that
have greater potential and opportunity to succeed resulted from application of election promises. |It
in a turbulent and uncertain business conditions. should be kept what it is not important the way we
In other words, educated managers in public sec- go, but what kind of shoes we wear. Many would
tor management, usually give better results than like to remove the obstacles on the road instead to
the politicians who do not have sufficient knowl- provide appropriate solutions to be ready for un-
edge in the field of management, but appear as a certainties in the modern business.
professional amateur.
This statement is valid for any organization, in- 5. The necessity of redesigning the state as
cluding the public sector. Therefore, even though an institution and managing the govern-
there are some differences between public and pri- ment and the public sector in Serbia
vate sectors, management as a universal science
has its general principles that are applicable to all Modern state institutions are outdated and as
organizations, and for their specificities special- such are not able to respond to contemporary chal-
ized management were formed, as well as public lenges. A. Toffler, one of the largest futurologists
and political management that needs to take care said, “Take two hundred geniuses and select them
of the problem of managing public sector. Ac- in the U.S. Senate, or any institution of govern-
cordingly, like all other, this sector must adapt to ment. Their decisions will be even more stupid,
the users of the public services and recognize the because their institutions are stupid. Many deci-
changes that occur in the market of these services. sions about many things must be made quickly.
The best solution would be “if the soul and the Political technologies, the process of decision-
making dates back to the industrial age, when economic and social life. A wave of professional-
the problems were simple and partial in time and ism did not pound the largest part of the Serbian
space. [14]The transition countries in particular, public sector, which encompass public enterprises
but also developed market countries are in big and public (non-profit) institutions, public ad-
trouble when it comes to their survival. Lack of ministration, public organizations, etc. Under this
financial resources measured by several hundred term, we should understood public sector manage-
billion Euros, prevents the functioning of the state ment by professional managers and experts who
and its institutions. It turns out that some vital have completed high business schools and who
functions, such as health, education and public ad- have the knowledge, skills and experience to deal
ministration are being questioned. Most countries with any management tasks.
fill “gaps” in the budget with the new borrowing Amateur caught the public sector by the depth
from the International Monetary Fund, the World and breadth of the organization i.e. governing
Bank and the governments, which are reportedly boards, top management, middle and lower lev-
ready to help. The reason for this is in non-host els of control. Party officials who are loyal to their
economy and neglecting or denial of the basic political opinion, as a rule, get top positions in the
principles of a healthy economy in the past. public sector. They need to provide the privileges to
The practice of host economies shows that host the party that appoints them as directors, executive
takes loans to build a house, start with a business directors, managers, chiefs, rather than fulfill their
or expands, existing one, and so on. Irresponsible primary goal of achieving certain economic effects.
hosts are arrogant, spend without taking into ac- On the contrary, in terms of monopolization of cer-
count their abilities and when desires overcome the tain sectors, most public companies loosed millions,
possibilities, seek credits and other types of loans. and the current political oligarchy tolerated that, hid
In these situations, the government was helpful, es- and waited for “the time to erase the damage”.
pecially through the concept that the crisis can be One more alpha plus should be add to this, and
eliminated by forcing spending and that saving is it’s low quality organizational structure, both the
unacceptable. When it is time to pay off old loans, state and the public sector. It turns out that this is so-
taking a new one, often under less favorable condi- called “deep” organizational structure, with many
tions, leads to a more difficult situation. levels of hierarchy in which each higher level has
Serbia shared the fate of other countries in tran- higher quantum of power as compared to the lower
sition. The money from the loan is wrong, i.e. it is levels and where there are interpersonal i.e. rigid
invested in personal consumption, a large portion and strictly controlled and formalized relations both
of borrowings and cash generated through privati- between individuals and between different organi-
zation has flowed into private hands. Loans have zational groups and teams. The above design of or-
come due; debts in the country are so vast and the ganization suits more to the organization from the
cash register is empty. The new responsibilities fifties i.e. industrial than modern organization based
follow, so in the next few years, instead of the cur- on the information technology and knowledge as
rent 3 billion, the amount coming due will double. the most valuable asset. In other words, while the
It is clear that the above situation touches, espe- modern states and the public sector leave the hi-
cially future generations, because they will have erarchy and introduce entrepreneurial philosophy,
to pay back what others spend. Therefore, the debt countries in transition and Serbia still foster a spirit
problem must be considered above all from the of deep hierarchies, which inevitably produces leth-
moral, then from a political and economic point of argy, sluggishness and inability to quickly and ef-
view. In this context, we need a radical change in ficiently respond to the new challenges posed to the
the design and management of the state and state modern world. [15]
institutions in Serbia. The recovery and strengthening of the Serbian
On the other hand, it shows that the managing economy, the transition process, privatization, mar-
public sector in Serbia is accompanied by a high ket linking and integration in the EU certainly indi-
degree of ideologization that goes up to politicking cate the need to define the most appropriate ways to
and the amateurism that is spread over all areas of respond to the challenges that these processes bring
along. [16] Therefore, the Serbian state, i.e. its local authorities. An example of the state organiza-
government and state institutions should be reorga- tion through cantons is Bosnia and Herzegovina,
nized according to the principle of re-engineering, and it is actually non-functional design in which
i.e. introducing radical and fundamental changes in the country has one more mini-governments,
all its institutions. Reorganization of government which are often independent and where there is
that took place in early 2011 was of poor quality be- no strong, central authority (the government) that
cause elementary criteria for structuring individual would act integrated and that will connect and ar-
state sector where not obey. Heterogeneous sectors ticulate the interests of all the cantons.
and activities were joined, such as agriculture and Professionalization of state i.e. public sector
trade, spatial planning and the ecology, culture and management, the hottest theme in Serbia, is not
information sector, while on the other side, merging going in the right direction. The election of direc-
some sectors too big and dysfunctional structures tors through an open competition for all public
were created. The reason for the reconstruction of companies was proposed, i.e. other parts of the
the Government was insufficient performance of public administration and here we can see the ba-
the government as a whole or of individual min- sic mechanism for eliminating ideologisation of
istries. Merging, i.e. redesign created even more management. This solution is necessary, but it is
dysfunction that will lead to bigger problems, than not enough, because the control over the choice
it was in earlier organizational setting. Negative re- of CEOs of public companies continue to be the
sults that were recorded over the last few months responsibility of the party committees, i.e. other
have been partly the result of inadequate organiza- authorities, directly or indirectly.
tional restructuring. On the other hand, this issue cannot be solved
A similar situation exists with the structuring partially, but systematically, so it would include re-
of the administration of state government in 2012. defining too, up to the abolition of the administra-
Excessive and dysfunctional ministries were cre- tive boards or other so-called management bodies,
ated, under the guise of saving and reducing the as the U.S. economy did as the most competent in
number of ministries, and has the number of em- the world. It turns out that professional manage-
ployees has not been reduced. It is clear this will ment in American corporations for more than 60
lead to new problems, especially in the administra- years marginalize the role of the board of directors,
tion of the state and its institutions. The outcome reducing their power and independence.[17]
of these solutions will be inefficiency, laziness, In this context, the organizational redesign of
and ultimately new problems in the functioning of the public sector in Serbia and its benchmarking
the economy and society. at internationally level is necessary. Thus, in the
It seems that salvation is in the abandonment growing complexity of business, in which it is
of centralism, which is more or less been practi- necessary to provide a high level of competitive-
cally implemented in the state organization, and ness and deliver high quality products, at a low
the acceptance of integrated decentralization, as price, it becomes important that the most important
the most efficient model of the modern organiza- functions and the roles of the traditional manag-
tion. This means it is necessary to retain the most ing boards in corporative organizations take over
vital functions of government at the level of the professional managers, and that boards become
Government, and other delegated to the local lev- professionalized experts from different fields who
el, which would be authorized, but also respon- have the knowledge, skills and experience to meet
sible for solving local problems. Regionalization the new challenges of the business world. [18]
that is advocated by some political leaders is not
a good solution, because it is only a dislocation or 6. Resume
duplication of authority to more regions. Instead
of a political and economic center that has existed Research has shown that managing the state and
and exists in Serbia, more centers with increased its institutions is the dark side of the modern world.
administration will be created, which will not be It turns out that in the world of high competence,
effective and will be a huge burden for individual the public sector management did not get the place
it deserves, even though the management as the of lower level of complexity, while at the top man-
profession provided the leading position in man- agement positions are political or people from the
agement of private business organization systems. political options to which they belong. This is one
It is evident that the professionalization of public of the main reasons for lack of the success of the
administration is not a need but a necessity. With public sector, which has a negative effect on the
its introduction, the traditional organizational struc- performance of other organizations, including the
ture of the state change and the classic concepts are state as a whole.
abandoned, especially those that were based on the Responsibility for the low quality design of
politicization, amateurism and inefficiency. Lack public sector, particularly in transition countries,
of competent management is best expressed in the bears the scientific establishment engaged in
famous dictum by “the father” of management P. management science and profession, which did
Drucker that the public sector is craving for the pro- not promote sufficiently the idea of introducing a
fessional management and developed infrastructure high quality organizational design and the need of
that could serve to increase the success of the state, training managers for professional management of
public companies, and all those things that carry the the state, its institutions and the public sector and
prefix “state”. The introduction of professionalism because they didn’t fight for the implementation
in the administration of the state and the public sec- of this idea into social and economic flows.
tor in countries in transition does not mean that all
problems will be solved, but no problem cannot be References
resolved without it.
In this context, legal and economic science 1. Obama B.: „Change we can Believe in“, Three Riv-
ers Press, New York, 2008; p. 2.
must restore some traditional business principles,
especially those relating to host economy, as the 2. Sloan A., Newmyer T.: Why cant washington magi-
source of all types of economies. The host or tra- cally fix the economy, Fortune, Novembar, 2010.
ditional economy is efficient and effective, be-
cause it is based on the natural and logical rules 3. Adižes I., Professional Business News, Hesperia-edu,
jun, 2012; p. 3.
that can hardly be questioned. The host thinks of
his generation and tends to increase the inheri- 4. Bakingem Dž., Vard T.: Whats next - The experts
tance. Thanks to this, civilization has survived and guide, Harper Collins, 2008; p. 251.
thrived. States, more or less has to take into ac-
5. Adižes I., intervju, Business magazin, 23. Marta
count the very principles of traditional econom-
2011.
ics, especially when it comes to attitude towards
sustainable economic development and the fate of 6. Bosanac K. I grupa autora: Domaćinsko staranje,
the generations to come. Istraživačka grupa Sinergon, Beograd, 2000; p. 17.
Transition countries, including Serbia regard-
7. Radosavljević M.: Management and Leadership
ing this are far behind. Here, the management as Government in times of Crisis“, International Con-
a science and profession has not received the im- ference, LEMIMA. Serbia, 2009; p. 52-53.
portance it deserves. The public sector in Serbia
is ideologically and politicized to such an extent 8. Perlic M.: Ekonomska politika, N0 2507. Maj, 2000.
that it is difficult for professional managers to be p. 29.
appointed to leading positions. It also has to have 9. Sloan A., Newmyer T.: Why cant washington magi-
all the characteristics of corporate management, cally fix the economy“, Fortune, Novembar, 2010;
whose results will be measured, the successes will p. 47.
be rewarded and failures sanctioned. Certainly,
10. Mos Kanter R.: World Class: Thriving Locally in
Serbia has trained business people in the spheres the Global Economy, 1995.
of business with management diplomas, and the
faculties engaged in public management. Analyses 11. Ozborn S. D., Gebler T.: Reinventing Government:
show that graduate managers and experts in public How the Entrepreneurial Spirit Transforming the
sector management perform other duties usually Public Sector, Boston, 1999.
Corresponding Author
Carisa Besic,
Faculty for strategic and operative management,
ALFA University
Belgrade,
Serbia,
E-mail: carisa.besic@sbb.rs
scientists from all over the world only in the last of a loss from a nonzero reference state because
two decades or less despite the fact that the risks in mining operations one normally starts from a
are as old as coal operations. zero reference state that is zero ore or metal. The
Tweedale and Joy’s Risk Management Hand- interesting question was: ”Under what conditions
book for the Mining Industry provides information will a decision maker in the mining industry take
which may help mine management, departmental risks?“. In that sense, the risk management is risk
personnel, and associated industries in the process seeking or, more properly, risk taking. The mining
of risk reduction and risk management. Because of industry (especially mining exploration) was gen-
the inherent hazards of mining as an activity and erally tolerant of financial risks (otherwise, very
the complexity of mining machinery and equip- little would be discovered) but essentially intoler-
ment and the associated systems, procedures, and ant of risks involving safety [4].
methods, it is not possible to be inherently safe. According to Grayson et al., during the period
Therefore, it is not possible for any external agency 1993-1999, no underground coal miners died from
to ensure the safety of an organization such as a fires and explosions in the USA. A record low
mining company, nor of the machinery or methods number of fatalities occurred in the coal industry
it uses. The principal responsibility for the safety of in 2005 and the industry was poised to continue
any particular mine and the manner in which it is to make significant improvements. However, in
operated rest with the management of that mine [2]. January 2006 and since then, three mine tragedies
Lind considered Analysis of Pillar Extraction rocked the industry and coal industry fatalities rose
Potential (A-PEP) as a user-friendly, intelligent to 37 through July of 2006 as compared to 22 in
tool which could be used as a preliminary output all 2005. As did many constituencies and Congress,
indicator in consideration of the secondary extrac- the National Mining Association called for closer,
tion support pillars in the Witbank and Highveld independent scrutiny of the causes behind the fatal-
coalfields of South Africa. Pillar extraction prac- ities and how the causes could be addressed and the
tices in South Africa have consumed a significant fatalities prevented. The Association established a
proportion of safety and fatality statistics in rela- multipartite commission to independently study the
tion to its relative output (i.e. less than 5% of the causes of events and fundamental issues that must
total South Africa coal production) and as a result be addressed in order to move the USA coal indus-
the research was undertaken in local pillar extrac- try back into a global mine safety leadership role.
tion operations and extended to similar operation Since its creation in March 2006, the Mine Safety
in New South Wales (Australia) to asses a way for- Technology and Training Commission has stud-
ward for pillar extraction in South Africa. The A- ied the important events and issues, while think-
PEP tool was based on certain physical, risk, and ing broadly and innovatively about what should be
economic factors that are combined to be indica- done to achieve the objective of zero fatalities and
tors of operational success in terms of economic, zero injuries in the USA underground coal industry.
health, and safety attributes [3]. The study rang a clarion call for a new paradigm
In 2007 Dunbar conducted a survey whose for ensuring safety in underground coal mines, one
main purpose was to review three concepts of the that focused on systematic and comprehensive risk
descriptive viewpoint that would appear important management as the foundation from which all life-
to, generally, decision-making under uncertainty, safety efforts emanate [5].
and, especially, risk assessment, management, and As far as safety and health in mining operations
communication in the mining industry (framing are concerned, Komljenovic and Kecojevic illus-
of decisions, ambiguity aversion/preference, and trated historical data on number of fatalities and
affect heuristic). In terms of those concepts, the injuries in surface coal, metal, and non-metal min-
scientist gave interpretations of four cases and ing operations in the USA and described a system-
other situations in mining and mineral process- atic risk analysis process for occupational safety
ing (Exploration decision case, Dig deeper case, and health in the field. Accordingly, a review of
Asian disease experiment, etc.). It was difficult published risk management and assessment appli-
to frame a problem in mining operations in terms cations for various industries (mining, petrochem-
ical, nuclear, etc.) was presented and a generalized when dealing with the typical engineering insur-
approach to risk management for occupational ance coverages for the mining industry. For in-
safety and health in surface mining was proposed. stance, excluding internal costs and cost of capital,
The approach consisted of six phases, as follows: the 10 year view (1997 to 2007) from the Swiss
(1) development of a systematic risk analysis pro- Re perspective revealed a technical loss ratio of
cess; (2) establishment of guidelines for selection above 100%. And in 2008 the market was shocked
and implementation of risk assessment methods, by initial reported losses of USD 3.5 billion and
and provision of models (templates) for selected only some USD 600 million in premium income,
methods; (3) characterization of hazards (e.g. fre- although some of these losses have settled at low-
quency, likelihood) and creation of a occupational er amounts. For that reason the question we ought
safety and health hazard database for surface min- to pose is whether insurance models used for the
ing; (4) creation of a generic risk matrix for oc- industry and the manner in which risk was shared
cupational safety and health; (5) development of a between insured and insurer have kept pace with
structured database for calculation of risk profiles the scale, complexity, and volatility of industry
and for facilitation of access and distribution of growth and the changing risk environment [7].
information, and (6) establishment of criteria for
determining the acceptability of residual risks and 2. Theoretical background
for identifying unacceptable risks [6].
Underground coal mining has continually 2.1 Risk management process, with focus on
posed significant risks to worker safety and health large companies
throughout history. Looking back at the coal min-
ing disasters across the world (collapses, explo- There are different views of certain authors in
sions, suffocations, fires, etc.), Mischner and Roth- respect of definition of risk management. Differ-
feld claimed it was clear that uniform global safety ences are mainly related to specification of risks
and health standards for coal mining are imperative. which are the subject of risk management. Vaughan
The coal mining was regulated regionally such as E. and T. emphasize that the risk management is “a
within the United States (The Federal Mine Safety scientific approach to problem of pure risks faced
and Health Act of 1977, ”MSHA“), the European by individuals and companies”. We will accept this
Union (The European Coal and Steel Community definition because on the one hand it emphasizes
of 1951/52, ”ECSC“ or “Community”), Australia ”scientific approach“, and on the other hand “pure
(The Coal Mining Safety and Health Act of 1999, risks faced by [large] companies ”, and this is ex-
“CMSHA”), and China (Labour Law of 1994/95). actly the subject of our interest [8].
However, these regional regulatory schemes are not A scientifically based approach sees the risk
equally effective or enforced and they have limited management as a process with several stages.
scope and numerous gaps. The authors asserted that As far as the number and content of the stages
the right of coal miners to safety and health protec- are concerned, there are different views. For in-
tion is universal. Accordingly, they concluded that stance, Tweedale and Joy suggest six stages of a
unless a coal mine safety and health international risk management process, as follows: (a) establish
agency is established, coal miners around the world the context (including defining the objectives and
(approximately 7 million people worldwide, 90% scope of the risk management task); (b) identify
of whom in developing countries) would continue the risks; (c) analyse the risks, so as to understand
to have their universal right to safety and health vio- their causes, likelihood, and possible consequenc-
lated [1]. es; (d) assess the risks, to determine the need and
Cazzaniga et al. described the various types priority for attention; (e) treat the risks by plan-
and activities of the mining industry and also the ning and undertaking the initiatives in operation,
main specialized machinery and equipment. They engineering or management, and (f) monitor and
suggested that the industry is exposed to specific review progress and performance [2]. Evans,
high hazards and risks and these were highlighted Brereton, and Joy recommend the same number
in detail for insurance underwriters’ appreciation of stages but with their slightly different contents,
as follows: (1) scoping, (2) information gather- and methods for risk financing. In the phase, it is
ing, (3) identify risks, (4) analyse and evaluate, (5) necessary to select one or combination of several
treat risks, and (6) reporting and review [9]. How- methods. Selection of the method depends on funds
ever, generally we can single out summarized key available for coverage of potential losses. Finally,
stages shown at Figure 1. we start with the implementation of program of
measures which need to be undertaken and evalua-
tion of results. With that goal, we first need to give
authority to the risk officers so they can implement
the program without being disturbed. Also, it is
important to inform all the company’s employees
Figure 1. The risk management process [10] who will participate in the program on their obliga-
tions as well as to conduct periodical controls and
Risk management process starts with identifica- evaluations of program results (due to changes of
tion of risks, i.e. potential losses. For that purpose circumstances taken into consideration in the prep-
it is necessary to research the exposure to property aration of the program, and possible mistakes in the
risks, liability risks, loss of income risks, loss of implementation of the program) [10].
work capability risks, etc. For the identification, risk Specially, large companies usually have within
officers have at their disposal several sources such the organizational structure specialized depart-
as various types of questionnaires for risk analysis, ments whose main task is to collect information
financial reports, conducted physical inspections, and make decisions in domain of risk manage-
etc. There is no single method which is the only ment. Managers of these departments, chief risk
correct one for any particular situation. There are, officers, are responsible to define risk management
however, a number of important principles which policy by means of preparation of rulebooks from
should be adopted, for example “don’t expect one this business field as well as for the making of risk
person to identify risks, use a team with a range of management information system. However, in
experience and expertise”, or ”use a systematic ap- order for them to successfully perform their duty,
proach in sufficient detail to match the objectives chief risk officers should not act alone, i.e. they
and scope of the study“ [2]. After identification of need to have full coordination with other business
risks, their evaluation is done. This stage implies the functions. In order for risk management depart-
establishing of loss occurrence frequency, i.e. prob- ments in the company to contribute to reaching the
ability of its occurrence in a specific time period. company goals, it is necessary to have full cooper-
Besides this, for each potential loss it is necessary ation with production, finance, and other business
to determine its severity, i.e. to estimate the possible functions. In doing so, chief risk officers have to
size of loss. On the basis of established frequency provide necessary information to other company
and severity of potential losses, they are ranked ac- departments, not just about pure, but also about
cording to the importance for the risk management other risks the company is exposed to. Existence
program. The biggest attention is given, of course, of specialized risk management departments cer-
to those risks where potential losses have the high- tainly contributes to a better negotiating position
est financial consequences and which can lead to of the company in the process of concluding con-
a financial disaster. In contrast, some losses occur tracts, for instance, with insurers.
regularly and they can be predicted quite accurately
so they can be covered from the current incomes. 2.2 Insurance as a risk management method
Moreover, a comprehensive risk management ap-
proach requires not only quantitative risk measures As the method of transferring risk on an insurer
but qualitative evaluation of risk as well. Further- for the purpose of financing potential losses of an
more, based on probability and level of identified insured, who has a duty to pay an insurance pre-
potential loses, selection of the method for risk mium, insurance is particularly applicable to risks
management is done. Methods for risk management with serious consequences and a low likelihood of
are basically divided into methods for risk control loss occurrence. There are many insurance prod-
ucts that guarantee hedging personal, property, 2.3 Risk taxonomy in coal mining industry
and liability risks. Throughout the transfer, the in-
surer usually provides the insured with consulting Considering risk and uncertainty in the min-
about risk management. ing industry, Rendu revealed several key fields of
Besides the function of economic protection, the mining business that generate risks (i.e. their
insurance contributes much to a greater use of re- sources), as follows:
sources as well as a greater investment activity via – management (i.e. operational, exploration,
its financial-accumulative function. By buying an financial, and management of public
insurance policy, risk is transferred on an insur- relations);
ance company that will be responsible to indemni- – geology and resource estimation (geological
fy the loss if the insured event occurs. On the other conditions under which a mine will operate);
hand, an insured avoids the need to hold reserve – engineering design (design of mine plans,
funds and, consequently, has an opportunity for mining and processing facilities, and
investing the available assets in other business ar- infrastructure);
eas. Insurers invest the reserves accumulated from – cost estimation;
collected insurance premiums and thus stimulate – environmental impact;
economic development. Therefore, in developed – revenue estimation and metal price (usually
countries insurance companies represent one of because of the lack of knowledge of the price
the most important sort of institutional investors. at which the product of mining operation
will be sold);
Table 1. The risk taxonomy in coal mining industry
Ord. no. Risk category Risk subcategories
- Risks related to the company’s mission, vision, and business goals
- Risks generated by the business lines selection
1. Strategic risks
- Risks streamed from the company’s capital investments
- Reputational (name) risks
- Risks linked with organizational structure, culture, and communication
within the company
2. Managerial risks - The leadership style risks
- Risks involving motivation and rewarding the company’s staff
- The control system risks
- Risks of the new value creation chains
- Risks involving safety of the work place
- Environmental protection and mining damages
3. Operational risks - The human resources selection risks
- IT risks
- Influences of weather and climate changes
- Risks generated by the strikes and working operations interruptions
- Risks related to real estates
- Risks related to different sorts of stocks
4. Financial risks - Risks related to other assets
- Risks related to revenues
- Risks related to investment and financing
- Technology development risks
- Risks linked with market position of the company
5. Market risks
- Risks generated by the demand
- Risks generated by the supply
Political, legal, and - Changes of political and legal environment
6.
social risks - Social trends
– exploration (i.e. exploration decisions), and ing companies within the research sample. All rel-
– political risk/factor (e.g. currency conver- evant employees within each mining organisation
sion, expropriation, political violence, and/or were invited to participate in the survey. Depend-
unilateral change of laws and regulations) [11]. ing on the size and organisational structure, the
list of surveyed employees included management,
In the mining industry there are many factors af- quality control, auditors, and supervision staff, en-
fecting the likelihood and the consequences which suring the overall quality of the research sample.
cannot be expressed by numbers, and which need
to be expressed by words. For instance, the conse- 3.2 Results and discussion
quences of risks can be estimated in terms as fol-
lows: (a) risks to people, i.e. the numbers of inju- There were 121 valid survey responses in total.
ries of different severities; (b) risks to property and The survey questions were sent to all mining com-
production, i.e. the monetary value of the damage panies but one smaller organisation decided not to
or production lost; and (c) risks to the environment, participate, which did not affect the quality of the
the extent of public reaction. Likelihood can be ex- data sample. The survey was analysed using sta-
pressed in terms of the frequency per year, or the ex- tistical methods and relied on respondents’ subjec-
pected time between occurrences, e.g. 10 years [2]. tive perception of the risk management processes.
Regarding detailed types of risks to which the Table 2 shows the summary of the analysis related
coal mining industry is exposed, we suggest the to questions that expected scaled answers. The an-
taxonomy which is contained in Table 1. swers to the remaining questions are not presented
The taxonomy above does not have an inten- in the Table 2 as they did not deviate from the re-
tion to summarize absolutely all sorts of coal sults derived through statistical analysis.
mining risks. On the contrary, it contains those The data reduction was conducted through the
we usually meet in the practice, especially within factor analysis (Principal component analysis),
large companies. It is very important to emphasize with the goal of establishing the key factors that in-
that existence of a set of risks requires a holistic fluence risk management development in mining
approach, which indicates that there is a need to companies. The analysis excluded the variables
take into consideration even correlations between that were related to questions that did not receive
different risk (sub)categories and their impacts. sufficient number of answers. Using the automat-
ed analytical tools for multivariate statistical anal-
3. Methodology and empirical analysis ysis, Kaiser-Meyer-Olkin Measure of Sampling
Adequacy of 0.893 (KMO>0.6) and Bartlett’s
3.1 Sample selection Test of Sphericity of 0.000 (p<0.05) were estab-
lished, confirming the sample correlation matrix
In order to perceive the accurate situation re- adequacy for the factorisation. Figure 2 shows the
lated to the risk management processes in ten coal scree plot where the first six factors, with the Ei-
mines in the Federation BiH, a primary research genvalue greater than one, were extracted. Results
was conducted. A combination of research meth- achieved through orthogonal factor rotation using
ods such as interview and survey was used, with a Varimax criteria are shown in Tables 3 and 4.
set of prepared questions.
The survey covered a series of questions related
to various aspects of risk management. Most of sur-
vey questions were structured so that the answers
are scaled from 1 (the worst) to 5 (the best world
practice). Also, some questions expected one or
more offered answers. Each question allowed for
additional comments, observations or suggestions.
The analysis of the strategic risk management Figure 2. The scree plot
documentation was conducted for each of the min-
Cumulative %
analysis highlighted six factors that explain 66.48%
of the overall variation that influences the current
16.642
32.397
45.785
54.303
61.778
66.477
Rotation sums of squared loadings
level of risk management development. They are:
1. strategic approach that includes all types of
risk;
2. resources and implementation of risk
% of variance
management processes, including education;
3. organisational solution;
16.642
15.755
13.388
8.518
7.475
4.699
4. application of various methods for risk
management;
5. information technology and systems, and
6. the overall culture of risk management.
6.657
6.302
5.355
3.407
2.990
1.879
Total
Based on the survey results and identified fac-
tors, the following actions can be outlined as the
Cumulative %
recommendation for improvement of the system-
Extraction sums of squared loadings
41.746
49.286
54.551
59.690
63.602
66.477
atic approach to risk management processes in
mining companies:
One of the key activities for the improvement
of risk management process is the development
of the appropriate strategy and its effective imple-
% of variance
Table 4. Rotated Component Matrix (absolute values less than 0.3 are not shown)
Component
Variable
1 2 3 4 5 6
VAR024 0.786
VAR025 0.782
VAR020 0.760
VAR022 0.676
VAR023 0.666 0.343
VAR026 0.633 0.408
VAR021 0.621 0.314 0.318
VAR028 0.614 0.314 0.388
VAR019 0.554 0.433
VAR029 0.517 0.333
VAR033 0.348 0.747
VAR035 0.734 0.344
VAR036 0.719
VAR037 0.690 0.357
VAR034 0.385 0.673
VAR038 0.664 0.353
VAR032 0.376 0.620 -0.399
VAR031 0.609 0.388
VAR039 0.563 0.404
VAR027 0.526 0.560
VAR040 0.314 0.502 0.350 0.313
VAR030 0.376 0.465 0.355 -0.349
VAR014 0.416 0.406 0.339
VAR012 0.809
VAR011 0.780
VAR010 0.727
VAR009 0.650 0.334
VAR006 0.309 0.615
VAR008 0.560 0.401
VAR007 0.537 0.367
VAR018 0.401 0.445
VAR017 0.382 0.435 0.301 -0.314
VAR013 0.322 0.405 0.318
VAR002 0.792
VAR003 0.774
VAR001 0.640
VAR005 0.323 0.330 0.481 0.430
VAR015 0.326 0.799
VAR016 0.315 0.729
VAR004 0.551
should be such that it supports and enables inter- velopment. One of the main obstacles is the lack
nal control in mines that are both regular and com- of insurance and risk management culture – both
prehensive. Additionally, it is necessary to prevent within business and private population. This is
internal irregularities through proper supervision. confirmed by the data from the mining companies
Conduct a comprehensive risk management that shows that the overall annual insurance pre-
process across mining sites, starting with identifi- mium over all mining companies does not exceed
cation of risk and application of appropriate meth- BAM 1 million, which is very poor in comparison
ods for control and financing of risk. For the risks to the overall value of the resources that would
where likelihood of loss is low and loss severity need to be insured. A half of the overall insur-
high – the use of insurance options and services ance premium covers individual accident insur-
should be maximised. ance, which shows that mining companies at least
All organisational components should be con- recognised some value of insurance in day-to-day
nected with an integrated computer system, to en- processes. In addition to accident insurance, as
sure proper communication and management of mandatory the motor third party liability insur-
data, as well as risk identification, evaluation, and ance covers about 20% of the overall premium,
management. with the remaining 30% covering property insur-
In order to maximise business efficiency, it is ance of equipment, mainly vehicles.
necessary to ensure quality of risk management There are many reasons for insufficient use of
process within mining organisation. This means insurance in risk management in mining compa-
that the formal risk management should become nies. First of all, the specific mining risk in these
an equal part of organisational culture. Responsi- companies makes them less attractive to insurance
bilities at every organizational level must be clearly companies. Out-dated and unreliable equipment
defined and appropriately delegated. Maintaining largely plays the role in the level of risk associ-
an open-end and straightforward communication ated with the mining business, making insurers
throughout the organization hierarchy is the prima- less comfortable to provide attractive product of-
ry prerequisite for risk officers to perceive the over- fers for this part of industry. Also, specific work-
all risk exposure profile of the company. It is neces- ing conditions and environment associated with
sary to conduct frequent data analysis and continu- mining activities limits the insurance products to
ous investigation of possible risk elements in order basic personal injury with low insurance sums, es-
to prevent problems where possible and prepare the pecially for miners. At the same time, the mining
coal mining companies for unexpected situations. company tends to avoid insurance of equipment
Before presenting the results of the survey re- they believe is relatively safe, as the insurance is
lated to the application of insurance as a method seen as unnecessary cost. The insurance of assets
for risk management, it is necessary to note that is limited to mortgaged components of the assets
the insurance industry within BiH faces a number that are used as guaranty for loans and credits, at
of challenges that limit its development. BiH in- the request of creditors.
surance industry is one of the least developed in Regardless of insurance challenges and the fact
Europe despite great potential for growth and de- that the paid indemnification hardly exceeds 1/3 of
Table 5. Basic statistics for the insurance questionnaire
Questions Mean Standard deviation
The insurance company presented the contract elements correctly 4.63 0.74
The insurance company supported the risk identification and evaluation 3.67 1.63
The insurance company suggested measures of prevention, reduction, and other
3.67 1.63
methods of risks physical control
The insurance premium is appropriate regarding the transfered risk 4.33 1.03
Terms of the insurance premium payments are favorable 5.00 0.00
Indemnification provided by the insurance company is correctly calculated 4.43 0.79
The claims are settled timely 4.43 0.79
the paid premiums, the overall assessment of satis- The level of importance of proper risk man-
faction with the insurance business is high, as shown agement procedures within mining companies is
in the analysis of the collected data in Table 5. evident through the fact that most of the surveyed
Therefore, the main recommendation for the companies did not even have a formal process or
utilisation of insurance as a risk management documentation related to risk management or risk
method is to raise the overall level of risk manage- strategy. In those companies that have a formal risk
ment activities and culture across mining organ- strategy document in existence, their quality and ef-
isations. This will provide conditions for higher fectiveness is highly questionable. The current struc-
utilisation of insurance method for risk transfer ture of mining organisations is not adapted to risk
that will raise more confidence among insurers management, which makes it harder to control and
and motivate them for development of attractive manage risks. This is especially evident in limited
mining insurance products. vertical communication within companies, where
control and quality of procedures and processes are
Conclusion not developed or communicated effectively.
The positive side of the current risk manage-
In general, the culture of risk management in ment within mining companies is that most efforts
BiH organisations is at a very low level. The key are focused on operational risks. Quality of pro-
reasons for this can be found in the overall devel- cedures related to occupational health and safety
opment level of industry as well as in practices of employees was rated as relatively high. These
inherited from the past centralised planning econ- procedures are usually related to training of rescue
omy, where responsibilities for loss were treated teams, prevention of accidents, identification and
differently than in market economic conditions. measure of associated risks, and exchange of rele-
Much is needed before BiH companies develop vant information. A slightly lower quality rate was
the necessary level of industrial and economic attributed to environmental procedures and infor-
consciousness and understand the climate of free mation systems, their security and effectiveness.
economy, competition, and conditions for success. Management of financial risk in mining companies
This is confirmed by the research data. is based on classical financial control techniques
Mining companies should lead by example in that are outdated and no longer reliable. Contem-
this process. Their size and risk profile provide porary tools and techniques are required in order
strong reasons and motivation for development and to provide fast reaction and full control over the
application of best methods for overall risk man- financial aspect of the organisation, but they are
agement. Surely, the mining companies do focus on not utilised due to limited understanding and lack
risk; however the current efforts are far away from of available information, and limited identification
systematic, planned, and organised risk manage- of financial risks (such as changes in interest rates,
ment. This is best observed in risk identification position of suppliers on the market, etc.).
and evaluation phases, which are largely based on Some level of financial analysis is conducted
analysis of financial reports, past experiences, etc. with new investment projects, but it is focused
The most prominent risk management techniques only on a small primary set of risks, as the min-
are related to prevention of accidents, which is ing companies do not consider the risks associ-
understandable based on the nature of the mining ated with sales of products on the market (due to
business. However, when it comes to risk financ- high demand for coal). However, risk of competi-
ing, the main downside of the currently utilised tion (especially utilisation of superior technology
techniques is excessive exposure to risk without by competitors) requires a more significant effort
preparation of reserve funds for this purpose. It is and focus on risk management and the methods to
evident that the insurance is seriously underutilised mitigate associated risk factors. This also relates
option. Specific problems are related to implemen- to political, legal, and social risks.
tation of risk management programs, as the profile The current management practices are the main
and organisations of such programs within mining obstacle in modernisation of overall risk manage-
companies are not at the desired levels. ment in mining companies and require significant
For each of the sub-problems, several RCs were Data sets we used in this paper represent data
isolated from original popular algorithms, which on on positions of accounts of the individual securi-
a specific way solve the specific sub-problem. The ties holders. Data are divided on natural personal
Table 1 shows isolated RCs for sub-problems which and legal persons as owners, because they have
we used for design of algorithms in this paper. different predictive attributes.
We have used symbols in brackets for marking Data set ind referring to natural persons has four
of algorithms composed of certain RCs. So, for categorical attributes, three classes, and number of
example, algorithm CART we present as !-B-G-!. records in the set is 64341. The class of owners with
This symbol means that the RIA was omitted, the „high“ total market value of securities includes nat-
split is bin, split evaluation is gin and PT is omitted. ural persons with amounts over 50000 Euros, „mid“
In all algorithms SC is mtd, so we omitted it from value is between 10000 and 50000 Euros, while
symbols. the values under 10000 Euros are „low“. CFI code
The advantages of designing algorithms with serves for classification of financial instruments ac-
help of such identified RCs are seen in the fact that cording to international standard ISO 10962, [9].
the method from one algorithm we can use within Dataset org has three categorical attributes, two
some other algorithm and test how it influences per- classes and 3538 records. In this data set, the class
formances of algorithm on specific set. Thanks to „low“ is consisted of owners whose total market
RC design we can make an optimal combination of value of securities is under one million Euros, and
RCs for specific data set, in respect of classification class „high“ includes all others.
accuracy and complexity of obtained DT. We have tested performances for 80 designed
DT algorithms over data sets ind and org. For test-
5. Design and testing of performances of ing of performances we have used 5X2-fold cross-
RC based DT algorithms on data sets of validation test with stratified sampling.
securities holders
6. Analysis of performances and selection
We have used WhiBo data mining platform [8], of best algorithms
for implementation of RC design of DT algorithms
in this paper. Out of components from Table 1 we In this paragraph we have analyzed perfor-
have created 80 different algorithms. These algo- mances of 80 algorithms obtained with RC design
rithms generate different DTs, even though they for both data sets.
are different in only one component.
For data set ind, the results of performance component in combination with GR and D, while
analysis have shown the following. Eighty de- all others have approximately same, better accura-
signed algorithms have manifested different per- cy. If neither chs nor pep components are included,
formances on this data set. The Table 2 shows the situation is very similar. If chs is not included
these differences. We have provided average, and pep is, worst accuracy is in algorithms with
maximal and minimal values as well as the dif- component GR and then with component D and C,
ference between maximal and minimal value for while all others have approximately the same, bet-
corresponding performance. ter accuracy. So, it can be concluded that in respect
If we observe the average values of perfor- of classification accuracy, algorithms C-M-I,G,D-
mances for all four CSC components (Figure 1), P,! , C,!-S-I,C-P,! and C,!-A-I,G,C-P are the best.
we can conclude that best accuracy in classifica- Algorithms which have chs component, in average
tion is with algorithms with mul split and worst have better accuracy. Out of popular algorithms
with bin split. Regarding the number of nodes ID3 (!-M-I-!), C4.5 (!-M-GR-P, !-M-GR-!), CART
and leaves in resulting DT model, we can see (!-B-G-!) i CHAID(!-S-C-!), only CHAID falls into
that the situation is opposite, algorithms with mul category of the best, in respect of accuracy.
split have highest complexity of generated model, If the chs component is included, number of
while bin have the lowest. Depth of DT is highest nodes and leaves of resulting DT models is lowest
for bin split, and execution time is best for mul for bin split, then for all in combination with GR or
split and worst for all component. D, and then for sig split. The situation is similar if
both chs and pep components are not included. In
case that chs is not included and that pep is, low-
est number of nodes and leaves is in algorithms
with components all with GR, then all with D, and
bin with GR and at the end sig with GR, G, and C.
These algorithms belong to the category of the best,
in sense of complexity of resulting DT model.
In purpose of analysis of complexity of the re-
sulting DT models, we have observed two more
measures, maximal tree depth (MTD) and weight-
ed average tree depth (WATD), which is calculat-
ed as average product of depth of leaves and num-
ber of cases corresponding to them. WATD in fact
represents average length of distance in the tree
Figure 1. Average performances of CSC compo- which is needed for classification of one sample.
nents for data set ind MTD was 5 for majority of algorithms, except
for algorithms without chs component and with
Accuracy of classification varies depending if bin component, as well as with sig component in
the components chs and pep are included. If the chs combination with I, for which it was around 10.
component is included, worst accuracy is in algo- WATD was the lowest (around 2,5) for algorithms
rithms with bin split, as well as algorithm with all with pep component, with the exception of algo-
rithms which have omitted chs component togeth- If on a certain data set we determine existence
er with bin component, whose WATD was around of statistically significant differences in predic-
6. For algorithms which do not have pep compo- tion accuracy between algorithms, this means that
nent, WATD was around 4. RC design can significantly increase the accuracy
If we intersect the set of algorithms determined of classification. This will also confirm statistical
with previous complexity criteria of resulting DT significance of optimal algorithms which we will
models, we get the best algorithms in respect of finally determine in this chapter.
complexity: C-B,S-GR,I,G,D,C-P , C-A-GR-P , The testing was done with help of WhiBo op-
!-S-GR,G,D,C-P and !-A-GR,I,G,D,C-P. Neither erators in Rapid Miner[12]. environment. For both
one of the popular algorithms is included in cat- data sets, we have done 3160 pair-wise compari-
egory of the best, in respect of complexity. sons, looking for pairs which are significantly sta-
Execution time is the best for algorithms with tistically different in prediction accuracy.
mul and then sig components : C,!-M-GR,I,G,D,C- For data set ind the results have shown the ex-
P,! and C,!-M-GR,I,G,D,C-P,!. Concerning the ex- istence of statistically significant differences in
ecution time, in category of best algorithms, only 42% of cases. Existence of statistically significant
CHAID(!-S-C-!) is included, out of the popular differences on this data set confirms that the used
ones. method of RC design can significantly increase
If we now intersect all above obtained sets the accuracy of classification in comparison to
of algorithms, we get the best algorithms for all popular data mining algorithms. Best algorithm in
reviewed performances, and those are: C-S-I-P, C- respect of performances C-S-C-P, which we have
S-C-P and !-S-C-P. In category of best algorithms found in previous chapter, showed statistically
in respect to all performances, neither one popular significant differences in relation to 44% of other
algorithm is included. algorithms. Figure 2 shows the part of results of
In respect of accuracy and execution time C-S- F-test for this algorithm.
I-P algorithm is the worst, and in respect of com- By observing the algorithms with lowest com-
plexity of DT it is !-S-C-P. For all performances plexity, we have determined that algorithms C-B-
algorithm C-S-C-P was in the middle, so it is the GR-P and C-A-GR-P have the lowest complexity
best algorithm in respect to all reviewed perfor- (11 nodes and 6 leaves). On the other side, F-test
mances, for data set ind. showed that in respect of accuracy these algorithms
Similar, the best algorithm, for dataset org, in are not significantly statistically different from best
respect of all six performances is !-S-I-P. In this algorithm C-S-C-P (Figure 2). However, complex-
data set, neither of the popular algorithms falls into ity of best algorithm is significantly higher (47,9
category of the best, in respect to all performances. nodes and 31,7 leaves). Execution time of the al-
gorithm C-B-GR-P is shorter (around 7 minutes)
7. Selection of optimal algorithms and form the execution time of the algorithm C-A-GR-
determining their statistical significance P (around 10 minutes). Taking into consideration
these facts, we can finally declare C-B-GR-P algo-
For determining of existence of statistically rithm as optimal algorithm, for data set ind.
significant differences in predictions accuracy, be- For data set org we have determined 31 % pairs
tween RC designed algorithms, we have used 5X2 of algorithms with statistically significant differ-
cv F-test. ences in prediction accuracy. This means that al-
Significance 5X2 F-test is the best significance gorithms obtained with RC design can provide
tester for classification algorithms, according to better prediction accuracy in comparison to popu-
[10]. This test for measuring significance of the lar algorithms. The best algorithm !-S-I-P, which
performance difference between two different was determined in previous chapter, is significant-
classifiers is proposed in [11]. It showed good ly statistically different in respect of prediction ac-
statistical power while keeping the first type error curacy, from 30,4 % of other algorithms.
low. We have used the probability threshold 5% We have determined that there are no algo-
and stratified sampling. rithms with lower complexity than !-S-I-P, and
that statistically they have the same accuracy as al- Classification rule for class „low“ of securities
gorithm !-S-I-P. On basis of this, we can conclude holders is: natural persons from Montenegro, Ex
that !-S-I-P algorithm is optimal algorithm, for YU region, Europe, Australia, Canada, New Zea-
data set org. land and China and they are owners of ESVUFR
and ESVTPR shares, DBZTFR bonds and ordi-
8. Analysis of classification results obtained nary shares with voting right, without restrictions
from optimal algorithms in ownership and transfer, partly paid and regis-
tered (ESVUPR).
For data set ind we have determined that opti-
mal algorithm is C-B-GR-P. From the DT model
obtained with this algorithm (Figure 3), it can be
determined that „high“ securities holders on the
Montenegrin capital market ( with high total mar-
ket value of securities), are natural persons from
U.S.A. and they are owners of ordinary shares
with voting right, with restriction in ownership
and transfer, which are partly paid, and registered
(CFI code-ESVTPR) or they are owners of zero-
coupon bonds with government guarantees and
fixed maturity date, registered (DBZTRF bonds)
and ordinary shares with voting right, without re-
strictions in ownership and transfer, fully paid and
registered (ESVUFR ), and their sex is female. Se-
curities holders of „mid“ class are natural persons
from Montenegro, Ex YU region, Europe, Austra-
Figure 3. DT model for classification of natural
lia, Canada, New Zealand and China, and they are
persons, securities holders, generated with opti-
owners of preferred shares, without voting right,
mal algorithm
extendible, cumulative and registered (EPNECR).
For data set org, optimal combination of RC is ecution time, tree depth, weighted average tree
algorithm !-S-I-P. From the DT model obtained depth (WATD), number of nodes and number of
with this algorithm, it can be determined that class leaves of resulting tree. With intersection of sets
of organizations with „high“ securities holders on of best algorithms for all 6 performances, we got
the Montenegrin capital market , is consisted of: optimal algorithms in respect of all performances.
financial organizations from central Montenegro Also, we have showed that there are statisti-
and custody registrants from central Montenegro, cally significant differences in prediction accuracy
who are owners of ESVUFR, ESVTPR, ESVUPR, between 80 RC designed algorithms. Optimal al-
EPNECR shares; state organizations from central gorithms have shown statistically significant dif-
region of Montenegro; joint stock companies and ferences in prediction accuracy in relation to sig-
partnerships from southern region of Montenegro, nificant number of the others.
who are owners of DBZTFR bonds; organiza- With help of optimal algorithms we have gen-
tions from Europe, owners of preferential shares erated DT models for classification of securities
EPNECR; investment funds from Ex Yu region holders. We have defined classification rules for
and central part of Montenegro, who are owners classes of natural persons with high, medium and
of ESVTPR shares and investment funds, limited low total market value of securities on the Monte-
partnerships from Japan and Cayman Islands. The negrin capital market. We have also defined clas-
class of „low“ securities holders includes the fol- sification rules for classes of organizations with
lowing organizations: joint stock companies and high and low total market value of securities on
partnerships form central part of Montenegro, who the same market.
are owners of ESVUFR, ESVTPR and ESVUPR Research conducted in this paper has shown
shares, as well as the variable coupon and guar- that with RC design we can get algorithms which
antee bonds, with fixed maturity date and which exceed the performances of existing DT algo-
are registered (DBVGFR); financial organizations rithms over given data sets.
and custody registrants from EX Yu regions and For data set ind it turned out that, out of the
southern Montenegro; limited liability companies popular DT algorithms, only CHAID is included
from central and northern region of Montenegro, in the best, in respect of accuracy and execution
owners of ESVUFR, ESVTPR and ESVUPR time. In respect of complexity of the generated
shares, as well as of DBZTFR bonds; public and tree, neither of the popular algorithms falls into
state owned companies and insurance companies; category of the best. For data set org, only C4.5
investment funds, limited partnerships or some algorithm is in category of the best, in respect of
other types of organizations (designated in data- accuracy and execution time. Regarding the com-
base as others) from southern and northern part of plexity of resulting tree, neither of the known algo-
Montenegro, U.S.A., Virgin Islands and Panama, rithms falls into category of the best. Optimal DT
and investment funds from Europe. algorithms which we have found are not among
popular ones, and this proves that RC design can
9. Conclusion and argument provide algorithms with better performances than
the popular ones, over certain data set.
In this paper, with method of RC design, we With analysis of performances of algorithms
have designed 80 different DT algorithms for data obtained with RC design, for both data sets, it can
sets ind and org, which represent natural persons be concluded that: „Remove insignificant attri-
and organizations who are securities holders. butes“ RC in average increases execution time;
Among them, we have found optimal DT algo- RCs mul and sig are best alternative in relation to
rithms for both data sets, and that was the goal of execution time; RCs mul and sig together with inf,
this paper. are best alternative in relation to accuracy and ex-
First, for each data set individually, we have ecution time; RCs bin and gai are best alternative
found sets of best algorithms. We have chosen in respect of number of nodes and leaves of result-
best algorithms in relation to six performances ing tree and RC „Prune tree“ reduces complexity
which we considered: classification accuracy, ex- of resulting tree.
Conclusions from research of RC design over 10. Salzberg S., On comparing classifiers: A critique
these two data sets can be entirely applied over of current research and methods, Data Mining and
Knowledge Discovery 1999; 1: 1-12.
some other data sets.
The question which remains open is why cer- 11. Alpaydin E., Combined 5X2 cv F test for comparing
tain RC provides better performances over one supervised classification learning algorithms, Neu-
data set, and bad over the other. For example, RC ral Computation 1999; 11: 1885-1892.
RIA with data set ind in average increases accu-
12. Rapid Miner User Manual, www.rapidminer.com
racy, while with data set org it reduces it. It would
be interesting to see which characteristics of data
set org caused that the removal of insignificant at- Corresponding author
tributes leads to decrease of accuracy, in average. Ljiljana Kascelan,
Since the RC design implies possibility of add- Faculty of Economics,
University of Montenegro,
ing of new RCs, number of possible algorithms Podgorica,
can become very high. Finding optimal algorithm, Montenegro,
in that case, would be very demanding job. Be- E-mail: ljiljak@ac.me
cause of that, future researches could be oriented
on determining on what way some specific data
set influences performances of certain RC, and if
on basis of those characteristics we can predict op-
timal combination of RCs, for that data set.
References
1. Quinlan J.R., Induction of decision trees, Machine
Learning (1986); 1: 81-106.
changeable and flexible organization of education system become more rational and economical,
that assumes different shapes with the changing since it does not allow the less capable ones to
demands of the socio-economic development. De- waste our time.
velopment that strides towards the present, which Modernization of society and state and focus
implies harmonization of economic and overall on the modern economic and technological devel-
social growth and development on one hand, and opment imply innovations in global goals of sci-
the quality of life, i.e. of the acceptable standard ence and education.
of living, on the other. Development that does not In order to set the development of society in
jeopardize the potentials of the future generations motion towards a learning society, in addition to
for satisfying their needs, i.e. the survival of the the formal education it is necessary to also develop
future generations. readiness and capacity for continuous profession-
Development implies innovation as a process al improvementand lifetime learning as a whole.
in which new technologies are to be generated, a In addition to a well structured formal system of
new way to do business, etc., and from the aspect education, it is also necessary to have an adequate
of sociology, it implies that the great social and system of institutions, organizational forms and
structural changes will additionally be created in programs that are not included in the formal sys-
the process of institutional transformation as well. tem of education, through which the capacity for
Successful development requires adequate continuous, lifetime learning will be realized and
knowledge, innovativeness, accountability, initia- nurtured, based on the premisethat:
tive and innovation, and a great deal of work. In – The manifestation of lifetime learning is an
addition to this, the new market reality demands integral part of holisticeducation;
flexibility and fast changes in education in compli- – A correctiveof the regular educational
ance with the developmental needs. system;
Education level of the general population is an – An innovative mechanism of the educational
indispensable indicator of the achieved level of system;
social development in each society. Higher level – A strong factor of economic development;
of education implies a higher level of ability to – It increases professional mobility.
perform complex tasks that involve responsibility
in a society and it also exert influence on all the This is based on facts that the mental abilities
areas of social life – economy, politics, culture, must be maintained, enriched and strengthened
health care culture and social security. Education through self-motivatedlearning and self-education.
provides for permanent development of values. Revealing ignorance is only a means for spread-
Economic crisis intensifies interest for the place ing knowledge.
and role of science and education that are a trea- Modern developmental tendencies in the coun-
suryof valuable experiences adaptable to the present tries with market economy have shown that sci-
stage of development in Serbia, through intensive ence and education are at the very top of priorities
research in different area of activities, generating of of the global national strategies and policies of so-
ideas, as well as through the development of meth- cio-economic and technological development and
ods and techniques for problem solving in practice, progress. It is about such social organizations that
which under the present conditions implies speed, are based on knowledge in which science and edu-
optimum costs and innovativeness. cation have the status of basic instruments of the
The necessary changes are primarilyrelated to entire socio-economic development, finding solu-
the changes in people’s attitudes (in their motiva- tions to the basic social problems and production
tion levels, knowledge, criteria, individual behav- of social, economic and technological changes.
iour and group behaviour, capabilities and other The best abstract of research into the scientific
personal characteristics. and educational benefits for socio-economic de-
The basic criterion for progress must be found- velopment lies in the change in individuals (char-
ed in the accumulation of acquired knowledge and acteristics and forms of behaviour of individuals)
education. Ability-based selection makes a social and in the changes in society. These changes can
produce far-reaching consequences for economy but also that the link between education, political
and society, and even for the course of history. By and economic development is dubious under ex-
summarizing the main findings about the influ- treme conditions (political instability, corruption,
ence of education to the socio-economic develop- violence, etc.).
ment and to the society as a whole, it has been In essence, relations among science, education,
concluded that the education: population growth and economic development are
– Significantly improves the knowledge levels, complex, and especially when directed towards
intellectual tendencies, and the similar; the socio-psychological research works through
– Helps people in finding their own identities transformation of values and attitudes that have
and in their individual choice of lifestyle; direct implications on development and economic
– To a great extent, education increases performances of the society.
people’s practical competencies, flexibility Science and education in socio-economic de-
and tolerance in their capacities of citizens, velopment contribute to the capacity to transform
workers, family members and consumers, individual attitudes and values from the “tradi-
and influences their choice of leisure-time tional” ones towards the “contemporary” ones,
activities, their health and their general and thus by strengthening the rate of structural
abilities for coping with the problems in life. modernism in a society, they increase the rates of
socio-economic development.
The main influence that the education exerts is Another contribution highlights the role of lit-
on the practical abilities, skills and generally ap- eracy and improvement of communication in de-
plicable characteristics, such as: the verbal skills, velopment. Many researchers have claimed that
essential knowledge, rational approach to prob- the written tradition is of essential importance for
lems, intellectual tolerance, future orientation, the origins of “formal rational thinking“ in every
adaptability, self-esteem, and so on. society. Others point out that if development de-
Changes in individuals that came as the result pends on efficacious dissemination of new infor-
of the influence of science and education are trans- mation, the role of science and educationin com-
ferred to their children and to future generations. plex social systems in particular lies in their influ-
It is indisputable that the educated people exert ence on costs of such information dissemination
influence on their social environments (on the pre- processes. This is above all manifested in facilita-
dominant interests, values, attitudes, behaviour, tion of communication processes that are of vital
etc.). These effects can be manifested in different importance for socio-economic development.
areas, including creativity, family planning, care Basically, the interactive relationship between
about children, quality of schools, appreciation the economic and educational dimensions is being
for arts, culture and learning, health care services, highlighted, since the opinion that the educational
political participation, understanding of social is- basis is the prerequisite for sustainable develop-
sues, acceptance of social changes, as well as the ment is broadlyaccepted throughout the world (the
sense of shared culture and social solidarity. Sci- developed countries suggest the threshold of 30 to
ence and education additionally serve to preserve 40 per cent).
cultural heritage and they enhance civilization. In this sense, an attempt was made through ap-
Despite the fact that a convincing argument propriate educational and socio-economic indica-
about the role and contribution of science and tors show the dependence of the interactive rela-
education to the socio-economic developmenthas tionship between education and socio-economic
been proposed in the economic texts, the reason development of countries in transition.
why education makes people become more pro- Investments in education, research, develop-
ductive remains relative, as well as the alleged ef- ment and innovation in the new European strategy.
fect of “spilling over” of education that can indi- Europe 2020has investment character and is the first
rectly contribute to development. priority. Special emphasis on establishing a system
It is obvious that the development process is of education that meets the needs and demands of
linked not only to the growing levels of education, a competitive economy, the establishment of strong
links between employers, institutions responsible Countries covered by the survey, ranged from
for education, scientific institutions in their respec- the lowest 14.3% in Macedonia to the highest
tive fields and the labor market. These links need to 32.8% in Poland.
be institutionalized at the national, and regional and
local level. They are necessary to ensure that edu-
cation meets the needs of employers for relevant
professional competencies that match the level of
technology development of the industry.
According to the Labour Force Survey, countries
in transition early indicator of completed education
and training is part of the population aged 18-24 years
who have completed lower education and training in
the total population aged 18-24 years. Under the less
educated to the International Classification of Edu-
cation (ISCED 1997 - 0, 1, 2 or 3c short, second)
means the uncompleted primary, primary and in-
complete secondary education. The survey covered Graph 2. The share of population with higher
countries, the data for the year 2010 ranged from education (30-34.godine)
Source: RZS (poll), Eurostat
the lowest 3.9% in Croatia to the highest 16.6% in
Romania, and 17.3% in Serbia (aged 15 - 24). The
Research and comparisons of functional liter-
average share of early completion of education and
acy (how much young people are “equipped” for
training is 14.4%. Lower rates of employment are:
life in modern society), quality and equity of edu-
Croatia 3.9%, Slovakia 4.9%, Slovenia and Poland
cation point out the factors associated with educa-
5.3%, Czech 5.4% and Hungary 11.2%. Above av-
tional attainment.
erage share: Bulgaria 14.7%, Macedonia 16.2%,
Romania 16.6%, and Serbia 17.3%.
Romania 50
Republic 28
Hungary 36
Bulgaria 58
Slovenia 29
Croatia 51
Norway 1
Serbia 60
Czech
State ranking, HDI
The average number of years of education25+ 12,6 12,3 9,0 11,7 10,6 9,0 9,9 9,5
Expected number of years of schooling 17,3 15,2 16,7 15,3 14,8 13,8 13,7 13,5
Source: UNDP, Human Development Report 2010
Graph 5. The employment rate for the countries Educational level of employees, their work
in transition (20 - 64) productivity and other factors reflect the average
Source: RZS (poll), Eurostat level of wages in the transition countries.
Table 2. Salaries in EUR will also point out the progress indicators of the
2008 2009 2010 process of transition countries.
Bulgaria 226 237 259 Note: The maximum possible score for prog-
Romania 373 349 334 ress in transition is 4.33, and minimum 1. The val-
Hungary 447 455 486 ue of 1 represents little or no change from a rigid
Croatia 738 737 720 centrally planned economy, while 4.3 represents
Czech Republic 944 960 953 the standards of market economies. Shaded cells
Poland 838 717 812 and indicators for 0.33, two scroll arrows to 0.66
Slovakia 697 730 744
Slovenia 900 930 967 Conclusion
Bosnia and Herzegovina 408 410 412
Macedonia 260 325 336 We have ventured in “an unforgivable age”.
Albania -- 294 314 Rules are constantly changing, and the economic
Serbia 400 338 331 and social environment is changing with them.
Source: National Statistics and National Bank of the mentioned Changes in reality are faster than the spontaneous,
countries reflexthought, and this can be specifically found in
The foregoing is the impact on GDP growth in the countries in transition.Countries in transition
transition countries. face the imperative of speedy processes and con-
In today’s transitional business productiv- tradictions between goals and means, which has
ity and allocative ability are determined by us- influenced the direction and the rate of the transi-
ing modern forms of knowledge, information and tion processes in specific countries.
communication technologies. Use of the Internet The main problem of the transition countries
and other modern forms of information and com- lies in the question of whether there is a politically
munication technologies have radically changed articulated, convincing alternative to something
the way people live and work and are the basis better compared to the existing state and whether
of development of the knowledge society and sus- there are socio-cultural and political subjects that
tainable development. are sufficiently strong to achieve it. This is even
At the end of the display indicators of socio- more so since all the paradoxes of our society re-
economic development of countries in transition sult from the antagonism of the real and promised
that significantly affect the level of educationwe socio-economic development.
Table 3. Real GDP growth in transition countries
GDP, interannual growth rate in%
The deviation in relation to the EBRD
Region - country The new forecast
forecast of October 2010.
2008 2009 2010 2011 2010 2011
Croatia 2,4 -5,8 -1,3 2,0 0,2 0,1
Hungary 0,8 -6,7 1,3 2,0 0,8 0,3
Poland 5,1 1,7 3,6 3,9 0,3 0,3
Slovakia 5,8 -4,8 4,0 3,7 0,0 0,3
Slovenia 3,7 -8,1 1,0 1,7 -0,1 -0,4
Albanija 7,8 3,3 3,8 2,6 0,7 0,4
Bosnia and Herzegovina 6,0 -2,8 0,8 2,2 0,0 0,0
Bulgaria 6,2 -4,9 0,4 2,6 0,0 0,3
Macedonia 4,8 -0,9 0,8 3,2 0,0 0,9
Crna Gora 6,9 -5,7 0,2 3,1 0,8 0,5
Romania 7,3 -7,1 -1,9 1,1 0,2 0,2
Serbia 5,5 -3,1 2,0 3,0 0,4 0,1
Source: EBRD Transition Report 2010.
Table 4. Using the Internet and connection types to access the Internet in 2010
Types of connections for Internet access (multiple answers, % )
Modems Other links Wireless
Using the Internet Broadband DSL
and ISDN (cable) mobile phone
Poj Dom* Pred** Dom Pred Dom Pred Dom Pred Dom Pred Dom Pred
EU 71 70 98 88 90 11 - 40 20 58 81 9 20
Bulgaria 46 33 95 79 71 16 - 61 32 19 47 1 10
Czech Republic 69 61 99 89 90 8 - 65 55 26 57 1 19
Hungary 65 60 98 89 87 9 - 46 35 43 68 6 24
Poland 62 63 99 90 69 10 - 55 20 40 59 10 22
Romania 40 42 96 54 62 48 - 50 34 5 30 7 10
Slovenia 70 68 99 91 88 9 - 59 25 49 73 31 32
Slovakia 79 67 100 73 73 23 - 52 27 26 54 17 36
Croatia 57 56 98 87 80 7 - 22 20 71 73 4 34
Macedonia - 42 - 81 - 29 - 33 - 50 - 2 -
Serbia 44 39 97 28 - 18 14 25 17 47 74 20 12
* percentage of households that have Internet access from home,
** percentage of enterprises with internet access
Source: Regional Economic Prospects in EBRD Countries of Operations, Januay 2011
Financial
Company Market and trade Infrastructure
institutions
Large private companies
Overall infrastructure
and liberalization of
Competition Policy
Price liberalization
Securities markets
Governance and
Country
interest rates
institutions
reform
The conflict and confusion among different oped, ready and qualifiedto face very rapid and
goals of changes and means of their realization is constant developmental changes.
very prominent and at the same time burdened with Education is expected to produce workforce
excess expectations for reduction of inequalities that will not simply be the people looking for a
under the present conditions of life and life chances job, but people who are capable of becoming suc-
of people [2]. cessful entrepreneurs and job creators.
There can be no socio-economic development Changes require activities within the educa-
or way out of the crisis without a road to economic tional process, that is, in everything that the edu-
freedoms (creation of new values, road to entre- cational system can make more efficient and ef-
preneurship, business, etc.) where science and fective, while at the same time liberating it from
education play a significant role. the unnecessary waste of energy.
Huge costs of inaction over a long term have Anyhow, this should be emphasized: “Big prob-
come as a result of many trends that are nowadays lems that we face cannot be solved on the level on
unsustainable, as well as of wrong choices and er- which we have created them“. (Albert Einstein)
roneous solutions in relation to production, tech-
nology, infrastructure, agriculture, use of natural References
resources etc.
Political elite and missionary intelligentsia that 1. Karavidic S., Management in Education – Socio-
economic Aspects of Development and Financing
are used to loans approved under favourable con-
Models in Education, Institute for Pedagogy and An-
ditions, donations, sponsorships, etc., and theyuse dragogy, Faculty of Philosophy, Belgrade, 2006, p. 8
the international economic crisis for their excuses.
2. Karavidić S., Management in Education – Socio-eco-
Commonsense and rationalityof comparative nomic Aspects of Development and Financing Models
experiences show that the international crisis can- in Education ,Institute for Pedagogy and Andragogy,
not be used as an excuse for new lags or failures Faculty of Philosophy, Belgrade, 2006, p. 286
in a single area, and thus in education either [3]. 3. Dušanić J., “The World Crisis is a Source of an
Trying to explain the reasons of economic Unsuccessful Politics”, an interview in the weekly
crises, John Stewart Mill states: “Panic does not magazine Pečat, January 2009, p. 22-23
destroy the capital, it actually discovers the level 4. Avramović Z. (2003), “State and Education”, ČPI,
of its previous destruction by its own deception Belgrade.
through unproductive ventures.” 5. Group of Authors (2006), “Education in Serbia To-
Aimlessness, lack of one’s own road of socio-eco- day”, Serbian Association of Pedagogues Unions.
nomic development, inability to bridge the transition 6. Karavidić S. (2010), “Education Management – Socio-
and socio-economic crisis have all been transformed economic Aspects of Development and Financing Mod-
into “the only way”, regardless of whether the road els in Education”, Faculty of Philosophy, Belgrade.
to the EU is called ‘reformist’ or somewhat else. 7. Karavidić S., Čukanović-KaravidićM. (2008), “Eco-
On that road, science and education could become nomics and Financial Management in Education”,
a bridge between the “outer world” and the “inner Faculty of Organizational Sciences, Belgrade.
world”, between the world “that is somewhere over 8. Koković D. (1994), “Sociology of Education “, Na-
there” and the world “that is here exactly”. In sci- tional book, Belgrade.
ence and education, questions are as important as the 9. Education – A Hidden Treasury (1996): UNESCO –
answers themselves. It is the place where generaliza- A Report by the International Group on Education in
tions must give way to concrete actions. the 21st Century, Belgrade.
Discussion about education is a movement on
a broader social level the end goal of which is an Corresponding Author
invitation to a new understanding of the mission, Slavko Karavidic,
role and function of education. High School for Business Economy and
Entrepreneurship,
General conclusion is as follows: it is neces- Belgrade,
sary to create a vital and creative society, which Serbia,
is versatile andharmoniously and integrallydevel- E-mail: skaravidic@gmail.com
2. The attitude of companies towards (c) WIPO, World Intellectual Property Indi-
innovation generated in Serbia cators 2010 Edition, Geneva: World Inte-
llectual Property organizations are given
Following methods are used for data collection
in the Appendix, item 2, Table 1 [11]
in this study:
c) Data on competitiveness of the economy,
a) The survey method was employed with aim
GDP, unemployment, inflation and avaraye
to gather the primary data
sallary are given in Appendix Item 3, Tables
b) descriptive research method was based on
1, 2, 3, 4, and 5.
the collected secondary data.
References
1. Drucker P.F. Management Challegens for the 21. ,
Harper Business, New York,1999.
8. Inić B., Milutinović M., R., Jergović A., Vucelja A., In-
novations of companies in Serbia, TTEM, 2010; 3(2).
Corresponding author
Branimir Inic,
Faculty for Union Beograd,
University “Nikola Tesla” Union,
Serbia,
E-mail: branimirinic@hotmail.com
China 57786 43.4 56.6 26292 18239667948 31945 36033 33410 271917 93706 46590 47116 48814 337215
Japan 141399 89.7 10.3 217364 1146871164954 145040 19914 232449 1206335 176950 151765 25185 239388 1270367
Germany 21034 73.5 26.5 56091 46065717739 12977 4762 51919 492604 17308 12639 4669 53752 509879
South Korea 120790 73.9 26.1 102633 465988123705 91645 32060 106611 566965 83523 61115 22408 79652 624419
technics technologies education management
France 13788 77.6 22.4 25688 377755 12112 9748 2364 24807 377761 10811 9236 1575 25535 439075
UK 7907 37.7 62.3 13183 383501 5930 2058 3872 12254 5360 2070 3290 12162
India 4320 32.3 67.7 2267 7539 1907 5632 2789 18230 1275
Canada 14972 10.6 89.4 7533 115639 18550 1809 16741 7754 122063 18703 1886 16817 8188 129347
Russia 23299 82.1 17.9 19641 123817 23028 18431 4597 19009 129910 28808 22260 6548 22870 147067
833
technics technologies education management
Table 4. GERD PPP (gross domestic expenditures on research and development purchasing power
parity) in Billions of US dollars and per capita
2007 (a) 2011 (Forecast) (b)
GERD in PPP$ thousands GERD per capita PPP$ GDP PPP Billions US$
Serbia 245276 33.3
Slovenia 935992 464.5 800000
Macedonia 32885 16.1
Croatia 703629 159.1
Bosnia 7086* 1.9*
Bulgaria 438976 57.8
Romniia 1711354 80.1 1300000
Greece 1801628** 162.1** 1700000
Hungary 1824527 181.9 90000
Czech Republic 3767938 202.5 380000
Slovakia 563470 104.4 40000
USA 398086000 1277.3 405300000
China 102428349 77.1 153700000
Japan 147938883 1161.3 144100000
Germany 72241917 877.3 69500000
South Korea 41339086 861.9 44800000
France 42892759 691.4 42200000
UK 41043072 670.3 38400000
India 24792412 21.3 36100000
Canada 23961471 720.4 24300000
Russia 23382745 165.4 23100000
* Undervalued or partial data ** Estimated data
UNESCO (2010), UNESCO Science Report 2010: The Current Status of Science around the World, Paris: United Nations Edu-
cational, Scientific and Cultural Organization
R&D Magazine (2010), 2011 Global R&D Funding Forecast, Rockaway: Advantage Business Media
Table 5. Gross domestic product (GDP) in 2010. Table 6. Uneployment rate in Serbia and countries
GDP * (Europe GDP ** (Europe in region
Country
avarage 100%) average 100%) Country 2010 2011
Luxemburg 271 - Serbia 20 22,2
Holand 133 - Turkey 9,8 8,7
Danmark 127 - Slovenia 7,8 7,9
Croatia 61 56 Croatia 13,3 17,9
Litva 57 61 Hungary 12,6 9,8
Litvania 51 - Bulgaria 10,2 7,3
Romania 46 - Greece 12,9 18,3
Bulgaria 44 - B&H 50 27,6
Turkey 49 53 Macedonia 33,2 30,9
Montenegro 41 51 Montenegro 19,5
Macedonia 36 41 Romania 7,3
Serbia 35 43
B&H 31 37
Albania 28 31
* purchasing power parity ** Actual individual consumption
Source: Eurostat 15/12/2011. (www.poslovnipuls.
com/2011/12/15)
other CAD applications using COLLADA convert- web applications. It is defined as an open standard
er, described in detail in the third section. for graphics data exchange between different soft-
ware applications based on XML schemas. COL-
2.2 3D web applications LADA files are text files, supported by a large
number of applications such as 3ds Max, Maya,
Today, 3D Web technology is increasingly LightWave 3D, SketchUp, Photoshop (versions
present on the Internet, since it allows very strong CS3 and above) and others. In order to simplify
and much more natural interaction between users the document’s importing and exporting proce-
and computers, with opportunities to display in- dures, there are several tools, namely the libraries
formation incomparably more efficiently than in based on open source. OpenCOLLADA project,
standard text format, or by using simple graphical used in this paper, provides a new generation of
elements. A virtual world is becoming more closer plug-ins for 3ds Max and Maya, as well as source
to the real world by using dynamic 3D objects code library developed for these additions.
which can be moved or modified in visual space. Since 3D models generate very large files, file
Geographic Information System is the most compression is accomplished in its conversion, for
well-known application of this kind. It provides the sake of faster loading to a web page. o3dCon-
navigation and display of three-dimensional ob- verter is used in this paper for the compression
jects in space, whether in terms of objects created of the COLLADA file to a file which JavaScript
using external 3D application and then exported Scene Loader can load and interpret. This convert-
(Google Maps application uses Google SketchUp ed 3D (scene) file, contains the complete geometry
to create 3D views of buildings), or it is a view of of three-dimensional models, including the views,
the buildings, based on rendering real objects to textures, and materials.
3D objects (for example, Microsoft’s Bing Maps Besides the exchange of files between 3D CAD
applications). By rendering real images into 3D and 3D web applications, it is equally important to
objects far more realistic pictures can be achieved. exchange files between different CAD applications.
Among other things, 3D Online shops have be- In this paper, the STL file format is used [8] for
come part of everyday life because they provide the exchange of information between professional
a realistic atmosphere of purchasing products and CAD applications. STL file format is the main for-
full interactivity inherent to the real world. De- mat for the stereo-lithographic CAD application of
pending on the type of item, the buyer can “walk” the 3D Systems company. STL file only describes
inside a virtual, three-dimensional space, which the surface geometry of three-dimensional model,
is in most cases identical to the actual department triangular surface with its normal and vertices. STL
store. This form of purchasing is primarily charac- file does not define colors, textures, or other charac-
teristically for the younger generation. teristics of three-dimensional object.
graphics card via the OpenGL or Direct3D library, that positions each shape in its coordinate system.
as well as solid documentation. In addition, O3D Effects that determine the color pixel of geometric
extends the capabilities of JavaScript applications, surfaces, as well as additional, optional conditions
by using standard JavaScript events, functions and such as diffusion and reflection, are added to ma-
methods, which is its main advantage. On the other terials. Figure 1 shows the mutual relationship of
hand, O3D requires the installation of the appropri- shapes, primitives, and effects.
ate plug-in, which can be, in a way, taken as a dis-
advantage. In this paper, O3D is used as the most
appropriate technology, taking into account its ad-
vantages and disadvantages.
coordinate system, while the matrix of projections necessary for such a scenario, fully define page
defines the transformation that converts the ob- layout, record data about the Website visitors and
ject’s points from the coordinate system of views their selection of the designer’s parameters. They
to the so-called clip space coordinates. This means are responsible for the design of the web applica-
that every three-dimensional object that is outside tion user’s interface, as well as for the verification
of the visible area of the screen is going to be cut what the visitor had previously voted for some of
off. DrawContex object is used by DrawPass and the available options. Within these files, the up-
TreeTraversal object. TreeTraversal object is used loading of the O3D API files is performed and ren-
for reduction in terms of ejection of objects from dering and transformation charts are created, in a
a scene that are not necessary to render, while the way described in Section 4.1. By applying the ap-
DrawPass object is used in the rendering phase. propriate function, rotation, zooming, and modi-
fication of the design parameters are performed.
4.2 Principles of interaction
Design changes of the offered 3D model are
achieved using one of three possible principles
of interaction. The principle of primitives means
that the object of interaction consists of primitives
whose dimensions can be changed using JavaScrip
functions. Calling some functions is associated with
interaction of website’s visitor. Due to the fact that
complicated 3D models can be very difficult when
using primitives, and that programming is extreme-
ly complicated in this case, the principle of primi-
tives was rejected as unpractical from the start.
The principle of animations comprises of mak-
ing the animations in one of the professional 3D
CAD programs. With the help of O3D API, it is
possible to make the transition from one to anoth-
er animation image, depending on the actions of Figure 3. Application window for the design
visitors. Since the principle of animation requires product modification
making additional animations, while not obtain-
ing savings of resources in comparison to the prin- The main part of the screen is used to display
ciple of imported models, this principle was also the rendering of 3D models. Rotation is provided
rejected from the start. by using the W, S, A, and D tasters or by click-
The third principle, used in this paper, is the ing the appropriate button on the right side of the
principle of imported models. Various designs of screen. Zooming is done by the using of Z and X
new products are constructed in one of the profes- keys, or again, by clicking the appropriate button
sional 3D CAD programs, and then imported into on the right. Only one design parameter can be
O3D application [6] by the use COLLADA file [7]. controlled within a web site, which is achieved by
Web application shows only one model at any mo- applying the keys B and C, or the corresponding
ment of time. The display can be changed by using button on the right side of the screen. The selected
of O3D API and it depends on web visitor’s action. design parameters are more easily and effectively
adjusted by using of slider. In this way, only one
of seven offered variants can be visible, while the
4.3 Structure of 3D web applications
other six remain invisible. During the rotation, and
3D web applications for product design mod- “in or out” zooming in the model, all seven exist-
ification are created in PHP language, using the ing models are simultaneously rotated, magnified
Smarty Template [9]. The most important files or diminished in the background, while the screen
sees only one, the chosen model. Figure 3 shows lem more difficult, since all visitors who come to
the appearance of 3D web applications in the In- the site and use a proxy share the same IP address.
ternet browser window. This paper uses a combined testing method, so
Choosing the aesthetically most appealing so- the identification is performed by simultaneously
lution is done by selecting “Accept and send!” tracking cookies, identification Internet browser
link. By clicking on this link, the appropriate and tracking IP addresses of users. Google Analyt-
script is loaded, while the relevant information ics is a well known Google service. This free ser-
about the user and the selected model are entered vice allows everyone to generate and display web
in the MySQL database tables. site traffic. Data are collected using JavaScript code
which is inserted at the start of each page of the site.
5. Tracking web site traffic It provides information about visitors, the number
of visits, number of page viewed, country or re-
In order to draw reliable conclusions based on gion from which visitors access the site’s content,
statistics obtained by detailed monitoring Internet and many other useful information. Diagram of the
site user’s actions, it is necessary to provide a robust number of visitors created by using of Google Ana-
and efficient model to collect information about vis- lytics application is shown on Figure 4.
itors. To ensure the relevance of results, it is neces-
sary to prevent the possibility of repeated voting by
one and the same person. Although this phenome-
non is certainly not possible to eliminate completely
using the method described in this article, the pos-
sibility of abuse prevention is minimized.
In this paper, three mutually independent
sources of information are used, whose results are
compared. First, statistics are monitored by us-
ing PHP built-in functions and constants, as well
as the MySQL database. User registration is the
safest, but also the most drastic measure of elimi-
nating abuse by internet site visitors. By applying Figure 4. Diagram of visitors number of Google
this method, much of the audience is lost, since Analytics service
the registration request specifying the basic per-
sonal information, including user’s name, e-mail The third method of monitoring statistics is by
address, then setting a password, confirming the directly monitoring the Web Server using applica-
registration process via the above e-mail, and the tions like Webalizer and a Modlogan. Both pro-
like, which many users avoid doing, and some do grams generate various statistics and traffic graphs
not even know how to do. For this reason, the reg- by monitoring the content of so-called log files
istration process is not used in this paper. created by the web server. Figure 5 shows detailed
The using of cookies provides an additional view of daily visits to the website created by the
opportunity to identify web site visitor, but this using Webalizer application.
method of testing is unreliable. Cookies can be
deleted; its storage prohibited; thus, the sole ap-
plication of this method cannot be reliable.
User identification and tracking IP addresses of
Internet search engines provide extra security, but
this method of identification is not absolutely reli-
able. Today, very few people use a static IP address,
and sometimes it even happens that two different
users in a short period of time have the same IP ad-
dress. The using of proxy servers makes the prob- Figure 5. Diagram of traffic using a Webalizer
6. Analysis of results
Data about aesthetically most appealing design
solution, along with data about the user, are logged
in the MySQL database. At any moment, it is possi-
ble to obtain comprehensive, accurate and effective
visual display about which product mostly satisfied
the wide customer base, what is the distribution of
users by region, whether differences related to the
region from where the visitors came from are nota-
ble, or whether an offered solution is universally ac-
ceptable. The system keeps track of the new product
and the choices of visitors. Results obtained by the
analysis of votes are shown in Figure 6. Of course,
it is not realistic to expect more users to submit data
without adequate compensation.
Large companies adapt their products to the
market taste. Advantages of this campaign type are
numerous. At any moment, it is possible to deter- Figure 6. View Poll Results
mine the taste of a particular region or country, and
therefore adapt product design to the desired taste. By using computers in every stage of the de-
The new product is attractive, and fully customized sign and production, costs are decreased, terms of
to user’s expectations. It starts on the market with a delivery are equalized making the actual design a
fantastic advantage over other products of the same crucial factor upon which the placement of a new
kind. Unlike traditional telephone campaigns, or per- product on the market depends. There should be a
sonal agents who visit households, online campaigns tendency to involve the customer into the produc-
are inexpensive, results are immediately available, tion process, using modern CAD tools and new
minor changes are possible during the procedure, 3D web technology.
since many people can participate in the campaign. In this paper, a completely new technology for
Given the value of the campaign, the product price is displaying and manipulating three-dimensional
lower, so its starting position is far better. objects created in any professional CAD program
is presented. The site Visitors, beside having the
possibility of combining existing solutions, also
7. Conclusion
have a crucial influence on the shape and design
Modern times require modern, cost-effective, of new products. By using substantially devel-
efficient, flexible, reliable and recognized meth- oped 3D web technologies and highly profes-
ods in the development and marketing of new sional CAD applications, the ability to view and
products to market. Creativity comes to a particu- manipulate 3D objects on the Internet increases,
lar expression in a very risky and challenging pro- extending the application field of 3D web applica-
cess of new product development. Subjectivity tions into industrial production and into the deci-
must be replaced by objectivity; the risk must be sion making process related to the strategic future
transformed into a win, and any applied changes of the company.
should be a way towards a better product.
Original design solutions are often rejected by
market because they are unusual, unconditional,
premature or poorly adapted. To reduce the eco-
nomic risk of the introduction of new and original
solutions, it is necessary to examine the market by
any means necessary.
References
1. Ortiz S. „Is 3D Finaly Ready for the WEB?“, Com-
puter, IEEE Computer Society, 2010; 43(1): pp.
14-16
Corresponding author
Ratko Obradovic,
University of Novi Sad,
Faculty of Technical Sciences,
Serbia,
E-mail: obrad_r@uns.ac.rs
niques were performed on the ski slopes of Kop- height, length of lower leg, arm length, upper arm
aonik realized after a seven-day program. Three skinfold, abdominal skinfold, back skinfold, knee
teachers with the identical program executed ski diameter, pelvic width, shoulder width.
teaching for seven days, a total of 42 hours. Dur- Criterion variable in this study was the V-turn.
ing the day, teaching was carried out with a fund
of 6 hours where the first three hours were applied 2.3 Methods of data processing
for learning the elements of ski technique and three
hours afternoon were applied for training purposes. In accordance with the research method, ap-
Assessors were teachers who have vast expe- propriate statistical analysis of data is chosen.
rience in this business. All three assessors from The first part presents the central and dispersion
different positions evaluated each subject. Three parameters, measures of asymmetry and flatten-
independent assessors gave an evaluation of each ing against the monitored parameters. The second
respondent for demonstration of selected elements part analyzes the differences between subjects for
of ski technique - V turn, and as the final score the the wedge turn technique in relation to anthropo-
average of the three grades was calculated. Assess- metric characteristics. Then the characteristics and
ment of acquired knowledge at the level of respon- homogeneity of each subsample in relation to the
dents was valued by the scale of 1 to 5, which re- performance technique of wedge turns were de-
lates to the conduct of a bow ski turns, speed control fined, in order to determine the distance between
based on the completion of turn, the proper attitude them. In the end, the results are shown graphically.
that ensures the focus in the middle of the foot, the To avoid losing information, finding the finest
ease and softness of demonstration. In the process- links and information on the nonparametric sizes,
ing of the data, based on the final (formed) score of scaling is performed on the data tables of contin-
performed wedge turn, the sample of respondents gency. Based on the above it can be seen that the
was divided into three subgroups named: poor, fair scaled data can be subjected to the application of
and good. The first sub-sample (poor) included multivariate analysis of variance (MANOVA),
the patients who got grade 1 for the techniques of and discriminant analysis (DISCRA).
wedge turns, the second sub-sample (fair) included By calculating the coefficient of discrimination
the patients who received grades 2 and 3 for pre- characteristics that determine the specificity and
sented method of V-turning and third subsample characteristics of the subsamples to be excluded
(good) included the patients who received grades 4 from further processing are distinguished, i.e. the
and 5 for presented method of V-turning. reduction of the observed space is performed. In
addition, the representation of the homogeneity
2.1 The sample of respondents of the subsamples, the distance between them and
Cluster analysis, is aimed to be the best possible
The sample of respondents included 30 stu- observed phenomena to be studied.
dents of the Faculty of Sports and Physical Edu- The purpose of the application of mathemati-
cation, ski beginner male, average age 22 years, cal and statistical analysis aims to determine the
divided into three subgroups with respect to the characteristics of each subsample, and homogene-
performance technique of wedge turns, as follows: ity of the distance between them in respect of de-
first sub-sample consists of 8 subjects classified as rivative features that could be performed reliably
(poor), the second consists of 14 respondents clas- and accurately predicting the prognosis of a given
sified as (fair) and the third sub-sample consists of reliability.
8 subjects classified as (good).
3. Results and discussion Reduced value Skewness (sk) indicate that the
distribution is asymmetric positive, it means that
3.1 The main parameters of the anthropo- the curve of the distribution tends to lower values,
metric characteristics of the subjects in that has smaller values than the normal distribution.
relation to the V-turn Kurtosis (ku) indicates that the curve is elon-
Central and dispersion parameters, measures of gated, in: back skinfold (AKNL) (2. 16), shoulder
asymmetry and tracked flattening features of an- width (ASIR) (.57). Negative values of Kurtosis
thropometric characteristics represent wedge turn (houses) indicate that the curve is flattened, with:
and they are focused on the possibility of using body weight (AMAST) (-.57), the average thorax
parametric procedures. (AOGK) (-.67), thigh circumference (AONDK)
Minimum (min) and maximum (max) values (-1.11), body height (Avista) (-1.18), lower leg
of anthropometric characteristics (poor) indicate length (ADUPK) (-1.70), arm length (ADRUK)
that the values are in the expected range. Increased (-.66), forearm skin folds (AKNNL) (-1.27), ab-
values Skewness (sk) indicate that the distribution dominal skinfold (AKNTR) (-.94), knee diameter
is asymmetric negative, this means that the distri- (ADKL) (-1.12), pelvic width (ASHIKA) (-1.43).
bution of the curve tends toward higher values, Value distributions are generally moving in the
and that there are more larger value presented in normal distribution (p).
relation to the normal distribution.
Table 1. The central and dispersion parameters and measures of asymmetry and flattening - poor (8)
M SD Min Max CV Range Sk Ku p
AMAST 78.38 19.74 61.0 114.0 25.19 61.87 94.88 1.07 -.57 .231
AOGK 98.25 10.24 89.0 117.0 10.42 89.69 106.81 .92 -.67 .293
AONDK 53.75 6.67 44.0 64.0 12.41 48.17 59.33 .09 -1.11 .987
AVIST 178.50 7.87 167.0 188.0 4.41 171.91 185.09 -.35 -1.18 .977
ADUPK 66.88 17.17 51.0 89.0 25.67 52.52 81.23 .45 -1.70 .554
ADRUK 77.88 3.98 71.0 83.0 5.11 74.55 81.20 -.66 -.66 .984
AKNNL 12.90 5.63 6.0 22.0 43.67 8.19 17.61 .28 -1.27 .586
AKNTR 19.56 11.06 7.0 39.0 56.55 10.31 28.81 .67 -.94 .428
AKNL 15.10 10.97 7.9 41.0 72.64 5.93 24.27 1.89 2.16 .306
ADKL 9.27 1.26 7.5 10.9 13.60 8.22 10.33 -.38 -1.12 .974
AŠIKA 30.13 2.17 27.0 33.0 7.19 28.31 31.94 -.08 -1.43 .912
AŠIRA 39.94 3.10 33.5 44.0 7.76 37.35 42.53 -1.02 .57 .954
Note: the value of skewness and flattening in the range of - .04 to .04 are not discussed.
Table 2. The central and dispersion parameters and measures of asymmetry and flattening anthropo-
metric characteristics of subsample - fair (14)
M SD Min Max CV Range Sk Ku p
AMAST 78.14 9.61 66.0 104.0 12.30 72.59 83.70 1.31 1.78 .776
AOGK 95.71 11.84 61.0 110.0 12.36 88.88 102.55 -1.80 3.41 .930
AONDK 54.93 3.15 50.0 62.0 5.73 53.11 56.75 .38 .23 .992
AVIST 178.50 6.94 170.0 191.0 3.89 174.49 182.51 .61 -.89 .570
ADUPK 60.79 11.36 53.0 89.0 18.68 54.23 67.34 1.90 1.93 .032
ADRUK 76.29 3.07 71.0 81.0 4.03 74.51 78.06 -.08 -1.02 .975
AKNNL 10.14 4.60 5.0 21.0 45.35 7.49 12.80 1.00 .24 .734
AKNTR 16.94 7.62 6.0 35.0 44.99 12.54 21.34 .89 .45 .879
AKNL 11.85 3.45 7.0 18.2 29.10 9.86 13.84 .47 -.61 .951
ADKL 9.71 .97 7.8 11.6 10.00 9.15 10.28 -.33 .38 .735
AŠIKA 29.89 1.51 27.5 32.0 5.05 29.02 30.76 .02 -1.07 .993
AŠIRA 41.18 2.68 36.0 46.0 6.51 39.63 42.73 -.33 -.25 .993
Minimum (min) and maximum (max) values the average thorax (AOGK) (.93), thigh circumfer-
of anthropometric characteristics (fair) indicate ence (AONDK) (.99), body height (Avista) (.57),
that the values are in the expected range. Increased arm length (ADRUK) (.98), forearm skin fold
values Skjunisa (sk) indicate that the distribution (AKNNL) (.73), abdominal skinfold (AKNTR)
is asymmetric negative, this means that the distri- (.88), skin fold back (AKNL) (.95), knee diam-
bution of the curve tends toward higher values, eter (ADKL) (.74), pelvic width (ASHIKA) (.99),
and that there are more larger value presented in shoulder width (ASIR) (.99). Value distributions
relation to the normal distribution. deviate from a normal distribution (p) in: lower
Reduced value of Skewness (sk) indicate that the leg length (ADUPK) (.03).
distribution is asymmetric positive, it means that Minimum (min) and maximum (max) values
the curve of the distribution tends to lower values, of anthropometric characteristics (good) indicate
that has smaller values than the normal distribution. that the values are in the expected range. Increased
Skewness values (sk) indicate that the distribu- values of Skewness (sk) indicate that the distribu-
tion is asymmetric with: pelvic width (ASHIKA) tion is asymmetric negative, this means that the
(. 02). Higher values of Kurtosis (houses) indicate distribution of the curve tends toward higher val-
the elongated curve, with: body weight (AMAST) ues, and that there are more larger value presented
(1.78), the average thorax (AOGK) (3.41), thigh in relation to the normal distribution.
circumference (AONDK) (.23), length of the lower Reduced value of Skewness (sk) indicate that the
leg (ADUPK) (1.93), forearm skin fold (AKNNL) distribution is asymmetric positive, it means that
(. 24), abdominal skinfold (AKNTR) (.45), knee the curve of the distribution tends to lower values,
diameter (ADKL) (.38). Negative values of Kur- that has smaller values than the normal distribution.
tosis (ku) indicate that the curve is flattened, with: Higher values of Kurtosis (ku) indicate the elongat-
body height (Avista) (-.89), arm length (ADRUK) ed curve, in: pelvic width (ASHIKA) (.75), shoul-
(-1.02), back skinfold (AKNL) (-.61), pelvic width der width (ASIR) (.23). Negative values of Kurtosis
(Asik) (-1.07), shoulder width (ASIR) (-.25). Value (houses) indicate that the curve is flattened, with:
distributions are generally moving in the normal body weight (AMAST) (-.84), the average thorax
distribution (p) in: body weight (AMAST) (.78), (AOGK) (-.86), thigh circumference (AONDK)
Table 3. The central and dispersion parameters and measures of asymmetry and flattening anthropo-
metric characteristics of subsample - good (8)
M SD Min Max CV Range Sk Ku p
AMAST 78.75 9.42 65.0 93.0 11.97 70.87 86.63 -.28 -.84 .832
AOGK 101.50 8.59 90.0 116.0 8.46 94.32 108.68 .38 -.86 .973
AONDK 56.50 5.34 48.0 64.0 9.46 52.03 60.97 -.17 -1.11 .958
AVIST 180.00 4.96 173.0 187.0 2.75 175.85 184.15 -.08 -1.32 .981
ADUPK 55.88 3.14 51.0 61.0 5.61 53.25 58.50 .00 -.71 .993
ADRUK 77.00 4.24 72.0 82.0 5.51 73.45 80.55 -.07 -1.57 .899
AKNNL 11.20 3.01 7.0 17.0 26.83 8.69 13.71 .68 -.02 .871
AKNTR 18.92 7.57 9.0 30.0 39.98 12.60 25.25 .03 -1.34 .900
AKNL 15.04 5.16 9.0 25.0 34.33 10.72 19.35 .66 -.21 .728
ADKL 10.19 .80 9.0 11.4 7.88 9.52 10.86 .05 -1.06 .977
AŠIKA 29.44 1.37 26.5 31.0 4.67 28.29 30.59 -1.19 .75 .999
AŠIRA 42.00 2.91 39.0 48.0 6.94 39.56 44.44 1.10 .23 .768
Table 4. Statistical analyses of the respondents in the performance of wedge turn technique in relation
to anthropometric characteristics
Analisys n F p
MANOVA 12 1.158 .343
DISKRA 12 45.556 .000
(-1.11), body height (AVIST) (-1.32), length of the With the application of discriminant analysis
lower leg (ADUPK) (-.71), arm length (ADRUK) (DISKRA), discrimination coefficient (k.dsk) re-
(-1.57), abdominal skinfold (AKNTR) (-1.34), skin fers to the observation that there is a difference
fold back (AKNL) (-.21), knee diameter (ADKL) between respondents in the wedge turn technique
(-1.06). Value distributions are generally moving in and that the greatest contribution to discrimination
the normal distribution (p). between subjects in the wedge turn technique in re-
lation to anthropometric characteristics that is the
3.2 Analysis of differences between respond- biggest difference is, with the following variables:
ents based on performance of V-turn in shoulder width (.430), average thorax (.381), thigh
relation to anthropometric characteristics circumference (.70), arm length (.240), body mass
(.209), lower leg length (.204), forearm skin fold
Table 4 shows the results of multivariate analysis (.160), pelvic width (.157), skin fold back (.139),
of variance (MANOVA) and discriminant analysis body height (.101), abdominal skinfold (.099),
(DISKRA) to determine the significance of differ- knee diameter (.066).
ences between subjects in the wedge turn technique It should be noted that the latent characteris-
in relation to anthropometric characteristics. tic, the hallmark of which did not determined the
When looking at individual anthropometric difference between the respondents in the wedge
characteristics using multivariate analysis of vari- turn technique based on multivariate analysis of
ance (MANOVA), one can see from the values of variance (MANOVA), and discriminant analysis
p =.343 that there is no difference between respon- (DISCRA) included it in the structure at which
dents in the wedge turn technique. there is a significant difference between patients
However, when considering the anthropomet- in the wedge turn technique. Latent feature is the
ric characteristics of a system using discrimi- body mass (.994), average thorax (.480), thigh cir-
nant analysis (DISCRA), based on the value of p cumference (.533), body height (.866), lower leg
=.000, it is clearly shown that there is a difference length (.197), arm length (.620), forearm skin fold
between respondents in the technique wedge turn (.406), abdominal skinfold (.761), skin fold back
that manifests latent. (.425), knee diameter (.218), pelvic width (.705),
A review of Table 5, using multivariate analy- shoulder width (.359).
sis of variance (MANOVA), the resulting value of
p>.1 means that no significant differences between
subjects in the wedge turn technique in relation to
anthropometric characteristics of all 12 variables.
Table 5. Significance of differences between subjects in the wedge turn technique in relation to anthro-
pometric characteristics
F p k.dsk
AMAST .006 .994 .209
AOGK .754 .480 .381
AONDK .644 .533 .370
AVIST .145 .866 .101
ADUPK 1.725 .197 .204
ADRUK .487 .620 .240
AKNNL .933 .406 .160
AKNTR .276 .761 .099
AKNL .883 .425 .139
ADKL 1.611 .218 .066
AŠIKA .354 .705 .157
AŠIRA 1.064 .359 .430
Legend: k.dsk is the coefficient of discrimination.
3.3 Characteristics and homogeneity of the sub- and that means that 1 respondent has other fea-
samples based on performance of V-turn in tures but not the features of their group, homoge-
relation to anthropometric characteristics neity of subsamples is large, 87.5%.
Characteristics of subsamples - fair have 12 of
Patients, in accordance with the methodology 14 subjects and that means that 2 respondent has
applied, the logical sequence of the research was other features but not the features of their group,
to determine the characteristics and homogeneity homogeneity of subsamples is large, 85.7%, and
of each subsample based on technique of the V- also, characteristics of subsamples - good has 6
turn and a distance between them. of 8 subjects and that means that2 respondent has
The fact that p =.000, discriminant analysis other features but not the features of their group,
(DISKRA), means that there is a clearly defined homogeneity of subsamples is large, 75.0%.
border between subsamples on the basis of a This means that patients whose characteristics
wedge turns technique, and it is possible to de- are similar to the characteristics of sub-samples -
termine the feature of each sub-samples based on poor, but their affiliation is unknown on the basis
performance of V-turn in relation to anthropomet- of performing V-turn techniques, can be expected
ric characteristics. to belong with the reliability of 87.5% to just sub-
The status of each subsample of a technique samples - poor, it is possible to forecast with cer-
based on a wedge turn defines shoulder width be- tainty that a particular subject with such features is
cause the contribution marks 16 .82% followed to be included in subsample - poor.
by: average thorax (14.91%), thigh circumfer- Based on the anthropometric characteristics of
ence (14.48%), arm length (9.39%), body weight the respondents, it can be said that the subsamples
(8.18%), length of the lower leg (7.98%), upper have the following properties:
arm skin fold (6.26%), pelvic width (6.14%), skin Subsample - poor has less pronounced shoul-
fold back (5.44%), body height (3. 95%), abdomi- der width, thigh circumference and the knee di-
nal skinfold (3.87%) and knee diameter (2.58%). ameter. There is moderate average thorax, body
Homogeneity sub-sample - poor, 87.50% sub- weight and body height.
sample - fair, 85.71% and subsample - good is Has a more pronounced length, arm length,
75.00%. calves, the width of the pelvis, upper arm skinfold,
Based on the above it can be said that the char- skinfold back and abdominal skinfold.
acteristics of subsamples - poor has 7 of 8 subjects
Table 6. Characteristics and homogeneity of the subsamples based on performance of wedge turn in
relation to anthropometric characteristics
Poor Fair Good dpr %
AŠIRA less moderate higher 16.823
AOGK moderate less higher 14.906
AONDK less moderate higher 14.476
ADRUK higher less moderate 9.390
AMAST moderate less higher 8.177
ADUPK higher* 1 moderate less 7.981
AKNNL higher less moderate 6.260
AŠIKA higher moderate less 6.142
AKNL higher less moderate * 1 5.438
AVIST moderate less higher 3.951
AKNTR higher less moderate 3.873
ADKL less moderate higher 2.582
n/m 7/8 12/14 6/8
hmg % 87.50 85.71 75.00
Legend: hmg - homogeneity; dpr% - contributing feature characteristics.
4. Conclusion References
A sample of 30 subjects, divided into 3 sub- 1. Hirano Y. & Tada N. “Numerical simulation of a
groups was analyzed based on the score obtained turning alpine ski during recreational skiing. Med
Sci Sports Exerc,” 2005; 28(9): 1209-13.
for the displayed wedge turn techniques.
In accordance with pre-determined objectives 2. Horter H.” Carving skiing. Orthopade,” 2005;
of the research, methodological approach, this re- 34(5): 426-32.
search analyzed the differences between the sub-
3. Lešnik B., Murovec S., & Gashpershic B.” Identify-
jects in the wedge turn technique in relation to the ing the types of skating and skiing. In: A. Guchek,
anthropometric characteristics. D. Videmshek, et al. Skiing Nowadays. Ljubljana:
Based on the results and their interpretation ZUTS,” 2002; 28-90.
following conclusions can be drawn:
In the anthropometric characteristics of re- 4. Cigovski V. & Matković B. “Is more effective way of
teaching alpine skiing without the use of pulmonary ski
spondents using multivariate analysis of variance technique? (In Serbian). Sportology, “ 2010; 2: 41-48.
(MANOVA. 343) and discriminant analysis (DIS-
KRA. 000), the results show that there is only 5. Murovec S. “On the edge! UPS - learning with lon-
synthesized difference between a 3 subsamples in ger skis (In Slovenian). Kranj: Format Kranj.” 2006.
the technique wedge turning with the coefficient
6. Joksimović S., Joksimović A, “Hadžić RThe load of
of discrimination: Shoulder width (.430), aver- musculature in ski carving and relaxation technique
age thorax (.381), thigh circumference (.370), arm (In Serbian). Physical culture,” 2009; 276-278.
length (.240), body mass (.209), lower leg length
(.204), forearm skin fold (.160), pelvic width 7. Kuna D. & Franjko I. “The influence of some motor
skills in the implementation of a ski slalom (In Croa-
(.157), skin fold back (.139), body height (.101), tian). Contemporary Kinesiologijy,” 2008 ; 147 -152.
abdominal skinfold (.099), knee diameter (.066).
After the differences were established and bound- 8. Hadžić R. “Techniques and methodologies of alpine
aries were clearly defined, the characteristics and skiing (In Montenegrin). Rožaje: Copyright Edition.”
homogeneity of each subsample were determined. 2008.
Based on the anthropometric characteristics of
respondents it can be concluded that: Corresponding Author
Subsample defined as - poor has less pronounced Rasid Hadzic,
shoulder width, thigh circumference and the knee Faculty for Sport and Physical Education,
diameter. There is moderate average thorax, body University of Montenegro,
Niksic,
weight and body height. Has a more pronounced Montenegro,
length, arm length, calves, the width of the pelvis, E-mail: rera@t-com.me
upper arm skinfold, skinfold back and abdominal
skinfold and homogeneity is 87.50% (7/8).
Subsample defined as - fair has moderately pro-
nounced shoulder width, thigh circumference, low-
er leg length, knee diameter and width of the pelvis.
Less pronounced middle chest, arm length, body
mass, skinfold, skinfold back, body height and ab-
dominal skinfold. Homogeneity is 85.71% (12/14).
Subsample defined as - good has more pro-
nounced, shoulder width, middle chest, thigh circum-
ference, and body mass, body height and diameter
of the knee. Has moderate pronouncement of length
arms, upper arm skinfold, skinfold back, abdominal
skinfold. Has a less pronounced calf’s length and
width of the pelvis. Homogeneity is 75.00% (6/8).
them to heat, which, in conditions of constant of an arbitrary meshing point from pitch point
load, after a certain time, i.e., number of revo- along the pressure line can be expressed as:
lutions, ends by reaching an equilibrium state.
Change of the temperature field of the teeth dur- s = r p1 sin j ± (r p1⋅ s i n j ) 2− r 2
p1 + r2
ing an equilibrium state are negligible because the
heat generated by friction is mainly taken away ......................................... (3)
by cooling lubricant. Since each gear tooth dur-
ing operation passes through the same cycle that is where r is radius of meshing point on the pin-
consisted of frictional heat, then convective cool- ion, j is pressure angle, rp1 and rp2 are pitch radii
ing and conduction, transient heat conduction of of the pinion and gear. The upper sign in the previ-
the gear can be analysed by a single-tooth model ous equation refers to the meshing points on the
shown in figure 1. addendum flank of the pinion or the dedendum
flank of the gear, while the lower sign refers to
the meshing points on the dedendum flank of the
pinion or the addendum flank of the gear. Along
the pressure line, the curvature of the meshed teeth
keeps changing at the meshing point. The radii of
curvature of the pinion and gear tooth profiles at
an arbitrary meshing point are determined by the
following equations:
R 1 = r p 1 ⋅ s i n j ± s and R 2 = r p 2 ⋅ s i n j s
......................................... (4)
0.2
2 ⋅ FN 2.3 Heat transfer coefficient
m W M = 0. 0 0 2 ⋅
b ⋅ c o s j ⋅ (vt 1 + v t 2 ) ⋅ R ..... (8)
Lubrication and cooling of the pinion and
⋅h − 0.0 5
⋅XR gear in this research is realized by jet lubrication.
DeWinter and Blok [9] have developed a model to
where vs = vt1 − vt 2 is sliding velocity, h is dy- estimate the heat transfer coefficient on the flank
namic viscosity and XR is roughness factor that can of the gear tooth for this lubricating and cooling
be determined by the following equation: method:
0. 2 5
S 0. 2 5
X R = 3. 8 ⋅ R ..................... (9) n n ⋅ H
2⋅r h= ⋅ k ⋅ r ⋅ c ⋅ o ⋅ q n ........ (13)
p1 2 ⋅π j ⋅r
where SR is surface roughness.
where w is angular speed, k is lubricant conduc- where Nj(x,y) are shape functions and Tj are
tivity, c is lubricant specific heat, no is lubricant ki- nodal temperature values. Then, the regions of
nematic viscosity, H is height of meshing point on support and control volumes attached to each
the tooth and qn is normalized cooling capacity. node i are identified. The domains of the integral
in (14) are associated with the regions of support.
2.4. Control volume finite element method For each node i in the mesh the region of sup-
port, shown in figure 3, is identified by counting
The governing equation of transient heat con- and listing all the neighboring nodes j that share a
duction (1) could be alternatively expressed in the common element side with node i. Using numeri-
integral form: cal integration and shape function aproximations
of temperature (15) in each element of ith support,
d
d t ∫A
T ⋅ d A = ∫ a ⋅ ∇T ⋅ n ⋅ d S, x ∈W .... (14) equation (14) is expanded in terms of nodal values
S of temperature in the region of support. On gether-
where W is arbitrary two dimensional domain. ing terms, the resulting equation for node i can be
In this research domain W is gear tooth geometry written in the discrete form:
shown in figure 3.
Nsi
a i ⋅ Ti = ∑a
j =1
i ,j ⋅ Ti , j + b i ................. (16)
(Vi + B C i ) ⋅ Ti t + D t = V i ⋅ T ti +
Figure 3. Gear tooth geometry with mesh of Nsi ...... (17)
triangular elements Dt ⋅ ∑ a i , j ⋅ T t + Dt
i,j − a i ⋅T t +Dt
i
+B
Bi
j =1
The key objective of CVFEM is to reduce the
integral form of equation (14) to set of discrete al- where Vi is control volume of node i, BBi and BCi
gebraic equations in the unknown nodal values of are coefficients of CVFEM boundary conditions,
temperature. First step of this procedure is mesh- Dt is time step. Determination of coefficients ai,
ing two dimensional domain into mesh of linear ai,j, bi, BBi i BCi is fully explained in [10]. Gauss-
triangular elements shown in figure 3. The contin- Seidel iterative solver has been used to find solu-
uous unknown field of temperature over triangular tion of CVFEM equations.
elements, can be expressed as the linear combina-
tion of the temperature values at nodes placed at 3. Results and discussion
the vertices of triangular elements:
3 In order to verify CVFEM model of spur gear
T ( x , y ) = ∑ N j ( x , y ) ⋅ T j ................. (15) frictional heat results of numerical simulations are
j =1
compared to results of experimental measurements
of spur gear tooth temperatures conducted by Long pitch circle, which was expected according to ob-
et al. [4]. The measurements are realized for rota- tained distribution of heat flux.
tional speeds of 2000, 4000 and 6000 r/min and the
load cases A, B, C, D, E, F and G given respectivel-
ly by values of torque 17.4 Nm, 26.0 Nm, 35.0 Nm,
43.0 Nm, 52.0 Nm, 61.0 Nm and 73.0 Nm.
Geometric properties of investigated spur gear
set are as follows: number of teeth z1=15 and
z2=16, module m=15 mm, pressure angle j=26o
and width b=4.775 mm. The material of the pi-
nion and gear is 665M17 (EN-34) steel with the
following mechanical and thermal properties: Figure 4. Temperature distribution along the
Young's modulus E=185.42 GPa, Poisson's ratio tooth meshing flank
n=0.3, thermal conductivity k=41.8 Wm-1K-1 and
thermal diffusivity a=1.077∙10-5 m2s-1. Gear set is
case-hardened and ground to a surface finish of
0.6 mm Ra. The lubricant oil, applied via spray
system, is Mobile Jet II with the following pro-
perties: density r=998 kgm-3, kinematic viscosity
no=27.6∙10-6 m2s (40 oC), no=5.1∙10-6 m2s (100 oC),
thermal conductivity k=0.1337 Wm-1K-1 (37.8 oC),
k=0.1278 Wm-1K-1 (93.3 oC), specific heat c=2000
Jkg-1K-1 (90 oC) and oil temperature TOil=90 oC.
According to given geometric properties of
spure gear set the geometry of pinion tooth and
triangular finite element mesh, shown in figure 3,
is generated. The generated finite element mesh
is consisted of 1284 triangular elements and 733
nodes. The positions of all nodes that are on each
tooth boundaries are identified. Then normal load,
contact pressure, sliding velocity, friction coeffi-
cient, heat flux and heat transfer coefficient in all
nodes that are located along meshing flank of the
pinion tooth for different combinations of rotatio-
nal speeds and load cases are determined.
Normal load distribution along meshing flank
of the pinion was slightly modified in order to avo-
id sudden changes of normal load in points C and
D along pressure line by proposal of Long et al.
[4]. Then transient heat analysis of the frictional
heating of the pinion was carried out. Obtained di-
stributions of temperature along the tooth meshing
flank and tooth temperature for Benedict-Kelley
and Winter-Michaelis models of friction coeffici-
ent, rotational speed of 6000 r/min and load case
D are shown in figure 4 and figure 5 respectivelly. Figure 5. Distributions of tooth temperature
Obtained temperature distributions show that
the maximum temperature occurs on the mesh- Figure 6 show comparative diagrams of the
ing flank of the pinion tooth in the zone below the maximum temperature obtained by transient heat
analysis using both models of friction coefficient, gear tooth which presents the confirmation of their
and the maximum temperature which Long et al. [4] practical value in studies of temperature distribution
have experimentally determined for different load caused by frictional heating of spur gears. The ob-
cases and rotational speeds. Comparative diagrams tained results of numerical simulation of frictional
in figure 6 show that results obtained for lower ro- heating of gears also show that for lower rotational
tational speed agree better with the experimental speed a better agreement of numerical and experi-
results when the friction coefficient is determined mental results is obtained if the friction coefficient
by the model of Winter-Michaelis (8). The average is determined according to the model of Winter-Mi-
deviation of numerical and experimental results for chaelis (8), while for higher rotational speed, the bet-
rotational speed of 2000 r/min is 2.5%. ter agreement of numerical and experimental results
is obtained if the friction coefficient is determined
according to the model of Benedict-Kelley (7).
References
1. Terrauchi Y., Mori H. Comparison of theories and ex-
perimental results for surface temperature of spur gear
teeth, Journal of engineering for industry, 1974; 96.
2. Wang K.L, Cheng H.S. , A numerical solution to
the dynamic load, film thickness and surface tem-
peratures in spur gears, Part I:Analysis, Journal of
mechanical design, 1981;103.
3. Wang K.L, Cheng H.S., A numerical solution
to the dynamic load, film thickness and surface
temperatures in spur gears, Part II:Results, Journal
of mechanical design, 1981; 103.
4. Long H., Lord A.A., Gethlin D.T., Roylance B.J. , Op-
erating temperatures of oil-lubricated medium-speed
gears: Numerical models and experimental results,
Proceedings of institution of mechanical engineers,
Part G: Journal of aerospace engineering, 2003; 217.
5. Koshigoe S., Murdock J.W., Akin L.S., Townsend
Figure 6. Variation of maximal temperature for D.P., A computer program for the computation of
rotational speeds of 2000/4000/6000 r/min running gear temperatures using Green's function,
NASA technical report ARL-TR-1117, USA.1996.
Comparative diagrams in figure 6 show that re- 6. Benedict G.H., Kelley B.W. , Instantaneous coefficient
of gears tooth friction, Tribology transactions, 1961; 4.
sults obtained for higher rotational speed agree bet- 7. Winter H, Michaelis K., Scored load capacity of
ter with the experimental results when the friction gears lubricated with EP-oils, AGMA technical meet-
coefficient is determined by the model of Benedict- ing, Montreal, Canada. 1983.
Kelley (7). The average deviation of numerical and 8. Garcia A.H. , Thermal effects in high speed gear
experimental results for rotational speed of 4000 r/ transmissions, MSc degree thesis, University of
Wales, Swansea, UK. 1999.
min and 6000 r/min is respectivelly 1.0% and 3.5%. 9. DeWinter A., Block H. , Fling-off cooling of gear
teeth, Journal of engineering for industry, 1974; 96.
4. Conclusion 10. Voller V.R. Basic control volume finite element
method in fluids and solids, World scientific pub-
The CVFEM models with different combina- lishing Ltd., Singapore. 2009.
tions of operating conditions are established for
evaluating the influences of load and speed on tooth Corresponding author
temperature variations. Results obtained by using Janko Jovanovic,
these models show a very high degree of agreement University of Montenegro,
Faculty of Mechanical Engineering in Podgorica,
with the results of experimental measurements of Montenegro,
the maximum temperature of meshing flank of the E-mail: janko@ac.me
2. Types of Electronic Payments safety protocols like SET (Secure Electronic Trans-
action) and SSL (Secure Sockets Layer) are used to
The methods that have been developed for
provide safer communications through the Internet.
making payments on the Internet represent an
The use of servers and browsers that support SSL
electronic version of the traditional payment sys-
protocol only protects the data from web supervi-
tems – checks, cash and credit cards. The basic
sion and spying, but it cannot guarantee data pro-
difference between electronic and traditional pay-
tection on the merchant side.
ment systems lies in the fact that electronic pay-
SSL (Secure Sockets Layer) is, unlike the SET
ment systems are completely digital [7]- [10].
protocol which was abandoned by its creators,
The electronic check represents the equivalent
still successfully used, because all participants in
of the paper check and it virtually has all the char-
transactions generate benefits greater than their
acteristics of the paper check, which essentially
expenses. SET protocol requires extra expenses
is a message to the purchaser’s bank to transfer a
from consumers to obtain a digital certificate with
funds from the purchaser’s to the merchant’s ac-
a public key, which is probably the main reason
count. The purchaser paying by means of an elec-
for the failure of this protocol. SET was an ideal
tronic check digitally signs a form that contains
solution for encryption, performing authentication
the description of the transaction, information on
of all participants and ensuring data confidentiali-
the payer and the payee, the amount and the time
ty and message integrity checking. Although it has
stamp (a combination of date and time transac-
satisfied all technical requirements in terms of in-
tion taken from the system) and sends the check
creasing the safety of all participants in electronic
directly through the net or by e-mail. The remitter
transactions, yet it failed to establish itself as the
may protect himself from trickery by encoding his
standard and to replace the SSL / TLS protocol.
account number by the bank’s public key, which
The process of its implementation is too compli-
makes the electronic check superior to the paper
cated, because it demanded the installation of digi-
check, since the account number remains undis-
tal certificate and the corresponding software on
closed to the merchant.
the customer side, as well as significant financial
Digital cash (or electronic cash) is a system best
investments on the merchant and the bank side
suited for making transactions that include small
during the SET software installation.
amounts of money. Digital cash may be issued in
As a result, Visa and MasterCard, five years af-
very small denominations (the so-called micro-
ter the publication of SET specification, tried to
cash) which can be used for paying small trans-
come up with a new solution on the basis of pre-
actions (the so-called microtransactions), e.g. for
viously acquired experience, in order to increase
software rental, on-line games, etc. Digital cash,
the security of online payments. Visa developed a
in the form of validated tokens essentially repre-
system called 3-D Secure and MasterCard devel-
sents a string of digits both issued and repurchased
oped a system called Secure Payment Application
by the bank. The bank validates each token with a
(SPA). 3-D Secure (Three-Domain Secure) model
digital stamp before issuing it to the user whose
should enable the issuer of credit cards to perform
account is then indebted by the value of the tokens
card user authentication when ordering over the
issued. When the purchaser pays in digital cash, it
Internet, reducing the possibility of fraud, and
is enough to transfer the corresponding amount of
improving the performance of the entire transac-
tokens to the shop, which then forwards them to
tion process. 3-D Secure is therefore a protocol
the bank for verification and repurchase.
for electronic commerce which is to enable se-
To enable using credit cards through the Internet
cure payment transactions over the Internet. Visa
various systems have been developed, which dif-
licensed this protocol offering it to other brands of
fer in the level of safety provided by these systems.
payment cards as a standard for global interoper-
In order to process information from credit cards,
ability in the process of authentication during the
a merchant needs to have at least the CGI script on
payment.
his server that is mostly used for information ex-
change between the server and database. However,
is overlapping because one firm can be represented (association between entity VERIFIED CARD
in one or more subentities. For example, software and entity BANK).
and hardware producer can be Internet service pro- With the subentity ELECTRONIC CHECK,
vider, manufacturer, store, and distributor at the the merchant sends the electronic check that he
same time. got from the purchaser to the bank making the
This diagram shows the connection between payment, which is represented by the association
stores and banks, and the connection that de- between this subentity and entity BANK.
scribes implementation of settlements and clear- If payment is made in digital cash, depend-
ing between banks and authorizations of partici- ing on the place where it is stored, the DIGITAL
pants in electronic trade via central institution for CASH subentity gets specialized as COMPUTER
authorization, settlement and clearing (e.g. AU- AMOUNT or SMART CARD AMOUNT. Like
TOMATED CLEARING HOUSE). in the case of the PAYMENTS specialization, this
The diagrams in Figures 2, 3, 4 show semantic generalization of the subentity DIGITAL CASH is
relationships between firms from the previous dia- incomplete. This was done because of the open-
gram, goods and customers involved in electronic ness of the model, i.e. so that there would be a
trade. GOODS as a entity are shown in two emerg- possibility of including new payment methods
ing ways. This generalization is disjoint and com- into the model proposed.
plete. Particularly, there are goods that do not need
distributor as intermediary in the classic sense, and 4. Conclusion
can be downloaded from the Internet directly, e.g.
electronic books, electronic newspapers, software, The paper describes the basic terms that appear
etc. This type of goods is represented by subentity in electronic trade:
ELECTRONIC, and virtual distributor in this case – the medium in which transactions are made,
is Internet service provider. Another subentity of – participants in the transactions,
entity GOODS is MATERIAL. This commodity – goods and the services, as the object of
needs a few intermediaries for storing, packaging, transactions.
transport, delivery, etc., which are represented by
subentity DISTRIBUTOR. A special emphasis in the paper has been laid on
We also introduce categorization of goods, and description of the payment systems through the In-
implement this with dependant entity SUBCATE- ternet. Three payment systems have been described:
GORY, that is connected with entity CATEGORY. credit cards, electronic checks, and digital cash.
Entity BASKET represents virtual consumer’s bas- Apart from descriptive listing of these terms and
ket, and is made of items, expressed by type and payment systems, their static characteristics have
amount of goods that buyer orders. This entity is been presented in forms of IDEF1X, so presenting
composition of entities CUSTOMER and STORE. formal specification of static characteristics of elec-
The preparation of the conditions to perform tronic store. In addition to the formal specification,
the payment procedure itself is necessary so that the diagrams represent a description of the database
the buyer could pay for electronic expenses. In through which it is possible to put into effect a ge-
the figure, this is represented as an entity named neric application for electronic store.
PAYMENTS. Depending on the chosen way of
payment, the entity PAYMENTS is specialized
into the entities CREDIT CARD, ELECTRONIC
CHECK, or DIGITAL CASH.
If payment is carried out by means of a credit
card, it is necessary to make verification through a
credit card processor, which is represented by the
entity VERIFIED CARD. Only after that does the
bank make authorization and funds transfer from
the purchaser’s account to the merchant account
platforms but they can still communicate uniform- tained within several business processes. But be-
ly with each other as long as they use Web service fore starting with analysis of business processes
standards. With all these possibilities, integration and generation of business steps, it is important to
and optimal reuse can be fulfilled easily [2]. define a criterion upon which a level of functional-
ity inside of each step will be determined.
3. Development methodologies Analysis phase
Methodologies, aimed for the development of Analysis phase transforms output of the pre-
information systems built on Web services, should vious phase, i.e. steps of business processes and
extend existing development methodologies with their relationships, into standardized form which
elements specific for work with Web services. Ac- will be understood by developers and other tech-
cording to [1], a complete development methodol- nical personnel of the project team. Based on this
ogy should be based on agile methodologies and generated standardized view, Web services and
should have all standard development phases: re- messages they exchange are defined. Granularity
quirements phase, analysis phase, design phase, of each Web service is defined first. After gran-
coding phase, test phase and deployment phase. ularities are defined, their public interfaces are
Each of these phases should be iterative in order modelled and afterwards the same procedure is
to accommodate changes if they occur during any done with messages.
of them. Following analysis passes through each As already stated, potential Web services and
enumerated phase and identifies specificities re- their granularities are determined first. Granularity
lated to Web service technologies. of a Web service presents a quantity of function-
It is important to note that proposed develop- ality it encapsulates. It is important to define an
ment methodology is applied to systems that which algorithm or at least some rule upon which it is
exploit WSDL and SOAP Web service standards determined how to make mappings from defined
and WS-BPEL standard for orchestrations. UDDI business steps into Web services. If there are exist-
standard for service dynamic discovery is not used ing legacy systems that are going to be reused, it
because this approach does not use dynamic dis- is important to capture functionalities they already
covery of Web services, i.e. they are hard coded in implement in order not to make redundant ones.
WS-BPEL code. Identifying granularities of Web services is a basis
for defining their interfaces. Interfaces consist of
Requirement phase public methods exposed by Web services. Thus,
Requirement phase is pretty much the same as defining interfaces consists of defining those
with standard methodologies. Besides defining a methods and their signatures.
scope of the project, which is a standard task, it is After granularities and interfaces are complete-
important to define functional and non-functional ly identified, messages are next to be defined. As
requirements of Web services that are going to be already stated, an output of the previous require-
designed or included into the project as the exist- ment phase is a matrix of business process steps
ing resources. A matrix containing all those re- and their relationships. Those relationships, in
quirements should be an output of this task. The combination with defined Web service interfaces,
task is iteratively repeated as long as all functions represent a basis upon which messages are identi-
are not defined properly. fied. According to [3], the best practice to define
Defining functional requirements of Web ser- messages is to define their XML schemas. Con-
vices in a proposed methodology is implemented structs defined in these XML schemas must con-
by breaking business processes into smaller sets form to list of input parameters and output values
of functionalities, called business steps, with of methods defined in interfaces.
specified relationships and exchanged messages Web services offer full interoperability among
between those steps. Resulting outcomes or their different platforms. The main reasons for using
synthesis represent potential Web services. It Web services are actually to gain interoperability
should be noticed that certain steps will be con- among distributed applications that span diverse ap-
plication servers [4]. But, in order to simulate busi- usually shipped with its predefined tools, e.g., if
ness processes using information systems, there are Microsoft’s .NET framework is chosen as an archi-
standards that use Web services, compose them and tecture which is going to be used for the develop-
create business processes. That is the biggest con- ment, then Visual Studio is a tool that must be used.
tribution of Web services after their interoperability. After architecture issues are solved, design phase
Orchestration is a common standard used for Web moves its focus back to the Web services, more pre-
service compositions. After both atomic Web ser- cisely to the definition of their WSDL interfaces. In
vices and messages between them are identified, a the previous phase their granularities are defined, as
model of orchestration is specified in detail in order well as a list of their public methods and messages
to designate business processes. According to [5], they exchange. Those are sufficient prerequisites
there are three levels when modelling compositions needed to develop WSDL interfaces [6]. Accord-
of Web services: code-oriented, process-oriented ing to [3], the best way to define these interfaces
and formal-oriented. Code-oriented model of an or- manually is to use empty predefined WSDL tem-
chestration is a final goal that must be produced in plates and populate them. A sequence where XSD
order to deploy an orchestration. But, the best prac- schemas of the messages are defined first, followed
tice is to start with formal modelling and translate by WSDL interfaces and finalized with the code, is
it to code-oriented one. WS-BPEL language, which a correct and transparent way to develop Web ser-
became de-facto standard for describing orchestra- vices because no details should be overlooked [3].
tions, uses standard operators like sequence, choice However, writing WSDL interfaces manually
and parallel which are all used in formal modelling is not the only possibility. There are tools that of-
techniques. Thus formal approach is the best can- fer functionalities to generate WSDL documents
didate to describe orchestrations and to translate dynamically from code. But, when using auto-
them into WS-BPEL [4]. WS-BPEL is a low level matic generation, lots of specific details correlated
language and it is quite difficult to pick up even us- to transformation must be known if all mistakes
ing graphical editors and that is the biggest reason want to be bypassed. E.g., when using Microsoft
why use high level formal languages [4]. Formal technologies to create Web services and XML se-
languages allow verification of business steps and rialization is used to transform to XML, it is use-
detecting bottlenecks and other anomalies. Formal ful to know that only public fields are going to be
representations of orchestrations are thus defined in transformed into WSDL so a client would not see
this phase. According to [4], formal representations those private fields. This is just a simple example
allow declaring service compositions without tech- of the problems caused by using automatic gen-
nical details but with business logic. eration if this property of XML serialization is not
known in advance.
Design phase After design of WSDL interfaces is completed,
Analyses phase did lots of work, but design the end of this phase is concerned with enrichment
phase translates that work into form that can be used of Web service descriptions with details needed
as a direct input to the coding phase. The first part for writing code.
of this phase is focused on the analyses of candidate If there are reusable Web services, it is im-
architectures that satisfy all requirements identified portant to define procedures for data mappings
in previous phases. Before deciding which archi- if needed. Data mappings must be performed if
tecture is the most convenient, it is important to chosen architecture does not support data types
specify all Web service standards that are going to offered by existing reusable Web services.
be used. Candidate architectures must support all
those standards. For example, if choreography is Coding phase
going to be deployed, chosen architecture have to Coding phase is the first phase where develop-
possess choreography interpreter engine. ers do their actual work. Tasks associated to writ-
After all details about architecture are defined, ing code are done in this phase. The first task of
tools, that are going to be used for the development, this phase is related to coding internal structure
are specified. Every programming framework is of Web services. This work is done in accordance
using [Webmethod] directive. Only those methods One of them is Microsoft’s wsdl.exe tool, able to
that have applied [Webmethod] directive are visible generate proxy classes from WSDL descriptions
to the outer world. of ASP.NET Web services. Resulting generated
There is also a possibility to define an interface proxy classes are generated in one of .NET avail-
with [Webservice] and [Webmethod] directives able languages and afterwards they are included
applied to it and its methods. A class implement- and used in client applications. Proxy classes gen-
ing a Web service is later derived from that inter- erated using either Add Web reference or wsdl.exe
face. This second approach is better because it al- tool use XML serialization.
lows multiple classes to implement one interface Proxy classes for ASP.NET Web services can
in different ways. Web services developed using be generated using svcutil.exe tool also. This tool is
ASP.NET technology will be referenced as ASP. primarily designed to generate proxies out of WCF
NET Web services in further text. Web services, which represent a new generation of
Deploying .asmx file is as simple as it can be. Microsoft’s Web service technology. They are de-
The only step needed to be performed is copying scribed later in the paper. If svcutil.exe tool is used
.asmx and other necessary files to virtual directory against ASP.NET Web services, generated proxy
of a Web server, configured as IIS Web applica- classes use XML serialization that is commonly
tion. If there is a need to apply changes to Web used in proxy classes of ASP.NET Web services.
service class, .asmx file must be reedited and then
copied to virtual folder again. Windows Communication Foundation
Standard description WSDL document is auto- Windows Communication Foundation is a new
matically generated when services are created us- part of .NET framework, aimed for developing,
ing ASP.NET technology, which is obtained add- building and deploying of Web services. The first
ing ‘?WSDL’ syntax to the URL of a Web service step of Web service development is creating new
in the browser. WCF service library project. Inside of it, there are
certain files that must be created in order to create
Development of clients using ASP.NET complete Web service. The first one is a contract
technology file, which is created using desired .NET program-
Client applications that call deployed ASP. ming language. It is declared as a public interface
NET Web services can be developed using any with [ServiceContract] directive. Inside of that in-
technology that can communicate with Web ser- terface, there is a list of public method signatures
vices technology. When ASP.NET 2.0 technology that are going to be exposed by a Web service. For
is used, communication with deployed Web ser- each method signature, there is a [OperationCon-
vices is created using Add Web reference wizard tract] directive applied to it. Each element of a
which is delivered with Visual Studio. This wizard contract file is mapped to WSDL matching dec-
creates a proxy class that provides access to func- larations by WCF runtime engine when needed.
tionalities of deployed ASP.NET Web services, The second file, that is created when develop-
accessible at specific URL via SOAP over HTTP. ing WCF Web service, is a data contract document
A proxy class of a Web service negotiates all com- which is created when complex data types are
munication between a Web service and its client, used as input parameters or output values of Web
i.e. it accepts inputs from a client and forwards methods defined in a contract file.
them to a Web service and backwards. Proxy After a contract file is written, an implementa-
classes perform also all necessary transformations tion of contract interface is made on a regular class
of data from XML representation to object repre- using any of .NET languages. [ServiceBehavior]
sentation in .NET and backward. This transforma- and [OperationBehavior] attributes are added in
tion is known as serialization/deserialization [7]. front of the implementation class and its methods
An alternative way of generating proxy classes if there is a need for a special behaviour to be add-
out of deployed ASP.NET Web services is by using ed to an instance of a Web service class at runtime.
tools for generation of proxy class from Web ser- One of the differences between WCF and ASP.
vice metadata, i.e. from their WSDL documents. NET Web services is that WCF Web services need
to be hosted inside of an application that man- The second way to create WCF Web service cli-
ages their instances since WCF is not able to do ents is to use Service reference tool. When using
it itself, unlike ASP.NET Web services which are this tool, proxy classes are added automatically to
standalone. Microsoft proposes ASP.NET applica- the project with all necessary bindings automati-
tions as the simplest way to host WCF Web ser- cally added to the Web.config file. Using Service
vices. The procedure of hosting is analogous to reference tool is more elegant since proxy classes
one when creating ASP.NET Web services with a are automatically added to the project and configu-
difference that implementation class is not placed ration files are automatically updated with all nec-
into .asmx file, but into .svc file. It can be placed essary binding client information. When using this
into assembly also and referenced in .svc file using tool, Visual Studio internally inputs svcutil.exe tool
proper syntax. Hosting WCF Web services inside to generate proxy class and emits output to the proj-
of ASP.NET application is not an only possibility. ect automatically as well as configuration entries
They can be also hosted inside of some other pro- that are automatically updated. But, in some certain
cess using ServiceHost class. situations there is no need to be dependent on Vi-
Binding is the second step that has to be done sual Studio in order to be sure that it will not include
after hosting. There is a prescribed syntax that any unnecessary entries. Option of updating service
must be added in the code or in the configuration references is also dangerous when Service refer-
file in order to bind contract and its implementa- ence tool is used because it updates the proxy class
tion to address where a Web service will be ac- contents to the latest version downloaded from the
cessed. Binding defines various communication service URI which might break the code if any cus-
details that Web service will use, such as commu- tomization was made to the proxy class.
nication protocol, message encoding and other de-
tails. WCF offers predefined bindings that can be ASP.NET versus WCF Web services
used, although custom ones can be made as well. ASP.NET Web services use XML serialization
Just like any other project in Visual Studio, while WCF Web services use data contract seri-
WCF Web services can be tested inside of Visual alization. The role of serialization is to convert
Studio development server. When WCF Web ser- data from object representation to XML represen-
vice is hosted inside of ASP.NET application, de- tation and vice versa. There are several differenc-
ployment is easy. .svc file is compiled and copied es between these two types of serializations even
to the Web server virtual directory as well as con- though their semantic is identical. Some of their
figuration files and compiled file that implements differences are described in further text.
a Web service. This compiled file is placed inside When using XML serialization, not all .NET
of /bin subfolder. data types can be serialized into an XML form.
Types that can be serialized must be public fields.
Consuming WCF Web Services XML serialization offers a possibility to control
Microsoft technologies are also able to create how instances of the class are represented in XML.
clients, i.e. to use deployed WCF Web services. As opposed, data contract serialization offers
These clients communicate with Web services us- very low control how the data types are going to
ing proxy classes. There are two ways to create be presented in XML. Another difference is that,
these classes. One of them is based on using previ- not just public, but all fields can be serialized into
ously mentioned Svcutil.exe tool. This tool gener- XML. There is also a support for a versioning
ates proxy classes in specified .NET language as of data contracts. It is achieved using isRequired
well as configuration file that contains binding cli- property which can be applied to new input pa-
ent information that must be added to Web.config rameters of Web methods. Object data types that
file if a client is, for example, ASP.NET applica- were not able to be serialized into XML using
tion or other WCF Web service itself. Addition- XML serialization are able to be serialized using
ally, an appropriate namespace must be added to data contract serialization. Data contract serial-
the proxy class in order to be visible in the WCF ization offers a little bit better performance over
Web service class. XML one.
Besides serialization methods, steps of Web Framework 3.0 and its newer versions. With WWF,
service development in ASP.NET versus WCF are workflow based application are easily developed
different, as shown in previous paragraphs where and they are very flexible to changes. Another ad-
they are described in detail. vantage of WWF is that asynchronous communi-
Development of client applications that use cation, which is usually used to communicate with
deployed Web services starts with proxy classes Web services, is developed easily. WWF provides
that are generated using specific tools. ASP.NET not only framework for development of workflow
and WCF technologies use different tools for gen- based applications, but it is used for their execution
eration of those proxy classes, which are wsdl.exe also. Development of WWF workflows is done in-
and svcutil.exe respectively, as shown in previous side of workflow designer, which can be hosted in-
paragraphs. Differences between these tools are side of different applications. By default, it is hosted
described in further text. inside of Visual Studio.
Wsdl.exe is primarily used to generate proxy Creation of workflows is done by arranging
code from wsdl files of ASP.NET services and it its activities. Workflows can be defined graphi-
cannot be run against WCF services. Generated cally with code added where needed, or they can
code uses XML serialization and both synchro- be completely written using code. There is also a
nous and asynchronous methods for communica- possibility to write them using WS-BPEL 2.0 lan-
tion are generated. guage because Microsoft provides a technology
Svcutil.exe can be used against ASP.NET as well called BPEL for Windows Workflow Foundation.
as against WCF services. When it is used against It allows export of XAML format (language for de-
WCF services, generated code uses data contract scribing WWF workflows) into WS-BPEL format
serialization, while it uses XML serialization when and vice versa. This paragraph used terminology
it is used using against ASP.NET services. “workflow application” because Microsoft used it
in its white papers when talked about WWF. But
Tools for Web services integration workflow application is a kind of an orchestration.
Previous subparagraphs described technolo-
gies offered by different versions of .NET frame- Base activities of WWF
work and Visual Studio and aimed for the devel- As already stated, workflow applications are
opment of atomic Web services. This subpara- made of activities. There are base activities, de-
graph explores tools used to create more complex veloped for general purposes. Those base activi-
entities that represent business processes and are ties are delivered with .NET framework as well
composed of Web services. Web services are in- as their graphical representations which are devel-
teroperable and that is a main reason why they can oped with workflow designer. Custom activities,
be composed. Interoperability enables them to be that perform specific tasks, can be developed if
exploited as loosely-coupled resources that act as there is a need for them.
a part of a global workflow process they are in- The first group of base activities is the one
volved in. In this scenario, Web services behave consisted of activities that control direction of
as atomic chunks of code which are called and workflow execution. Those are loop and condition
executed when needed. Different combinations of activities which have already been met in general
existing Web services can lead to different work- purpose programming languages, and such ac-
flow processes. tivities would be while, sequence, parallel, if-else.
Code base activities execute a piece of a code. The
Windows Workflow Foundation code is added explicitly to these activities. There is
This subparagraph is focused on the introduc- also a support for communication with ASP.NET
tion of Microsoft’s technology for creating work- as well as with WCF Web services so they can be
flow processes composed of Web services - Win- called inside of workflow when needed using base
dows Workflow Foundation (WWF in further text). activities developed just for this purpose. Anoth-
WWF is a framework for building workflow based er group of base activities are used for catching
applications on Windows. It is a component of requests from Web services. A group of base ac-
tivities control the execution of a workflow, while gine class is created, it is initialized using proper
they are listening events to happen. Terminate ac- syntax. Different hosts provide different possibili-
tivity terminates the execution of a workflow. A ties upon which it is decided which one to choose.
special base activity executes compensation logic, Decision which host should be chosen is not in the
which is executed when error occurs. scope of this paper.
All messages are received or sent from Biz- 5. Conclusion and future work
Talk orchestrations using ports. Ports consist of
This paper presented a brief overview of a
an adapter, a pipeline and a data mapping which
methodology that can be used to develop business
transform messages from its native form into de-
information systems that are based on Web servic-
sired XML form and vice versa. When orchestra-
es. Segmentation of code into autonomous soft-
tions receive messages, they are processed and
ware entities (Web services) enables better code
if there are produced outgoing messages, those
reuse. Web services can be combined in different
messages are placed in the message box and after-
ways and thus they can produce different work-
wards picked up and sent by send ports.
flows, i.e. different business processes.
Adapters as a part of ports transform mes-
Existing methodologies that were used for the
sages from its native form into XML. There are
development of more traditional software systems
predefined adapters, shipped with BizTalk server,
must be enriched with activities that are specific
that serve for transformation of a variety of mes-
explicitly for the development of Web services.
sage forms. One of them is for example a WCF
Requirement phase thus includes analyses con-
adapter which transforms SOAP messages into
cerned with definition of all functional and non-
XML and vice versa. All adapters are developed
functional requirements of Web services. Based
using SDK just for this purpose Custom adapters
on functional requirements, analyses phase de-
can be also developed so there is no need to use
fines granularities of potential Web services and
only predefined ones. Developed adapters can be
messages they exchange. Formal descriptions of
used in any .NET application not just in BizTalk
orchestrations are also developed in this phase.
orchestrations.
Design phase answers all architecture questions.
WWF versus BizTalk server It also designs WSDL interfaces of previously de-
It is important to point out that WWF and Biz- fined Web services. Code phase constructs code
Talk server are not concurrent but complementary of Web services as well as WS-BPEL form of or-
technologies. They provide some identical possi- chestrations.
bilities, but some of them are different. Following This summary explained a brief overview of
analyses summarizes similarities and differences each development phase with activities that are
between WWF and BizTalk server. According to associated to Web services and that were not pres-
[8], WWF is a framework for defining workflows ent in the development of non Web service based
within applications while BizTalk server defines systems. Future work associated to development
workflows that span application boundaries, i.e. will be focused on more detailed analyses of each
it defines workflows across applications. WWF phase and its comparison with existing develop-
is used to build workflow based applications, i.e. ment methodologies.
applications that implement one business pro- This paper also introduced Microsoft tools
cesses, while BizTalk is used for integration of that are used for the development of Web ser-
different applications into one business process. vices and their compositions. Appliance of these
These technologies can be combined since they tools will be elaborated in more detail and they
are complementary. WWF workflow can call Bi- will be compared will equivalent ones offered by
zTalk workflow if it is exposed as a Web service other vendors.
and BizTalk workflow can call WWF workflow
via Web service call. Table I summarizes differ-
ences between WWF and BizTalk server.
References
1. Haines M., Chan L. P., Web Service Implementa-
tion Methodology, OASIS Public Review Draft, July
2005., Available at: http://www.oasis-open.org/com-
mittees/download.php/13420/fwsi-im-1.0-guidlines-
doc-wd-publicReviewDraft.htm#_Toc105485358J.
Clerk Maxwell, A Treatise on Electricity and Mag-
netism, 3rd ed., vol. 2. Oxford: Clarendon, 1892;
pp.68–73.
Corresponding Author
Jelena Matkovic,
Elektroprivreda HZ-HB d.d. Mostar,
Mostar,
Bosnia and Herzegovina,
E-mail: matkovic.jelena@gmail.com
of the target company’s industry, the higher is the with the dominant firm in their industries [2]. The
probability of more successful target company’s second wave accompanied economic growth and
performance after the takeover. stock market boom. An estimated 12.000 firms dis-
appeared during this period, although the impact
2. Mergers and acquisition waves on the market structure of industries was much less
dramatic than the first wave mostly due to antimo-
Researches regarding M&A are present in nopoly legislation acts. This wave ended in 1929
economic literature for a long time period start- with the stock market crash of that year. In the fol-
ing form 1890s. It is a well-known fact that merg- lowing four years, due to the global economic de-
ers and acquisitions come in waves when firms pression, many corporations formed during second
in industries react to shocks in their operating wave collapsed into bankruptcy [3].
environments. Shocks could reflect such events After the Second World War which followed
as deregulation; the emergence of new technolo- after the worldwide economic depression, M&A
gies, distribution channels, or substitute products; activities decreased significantly. The third M&A
or a sustained rise in commodity prices [1]. Thus wave took off only in the 1950s and lasted for
far, six completed waves have been examined in nearly two decades. The beginning of this wave
the academic literature: those of the early 1900s, in the US coincided with a tightening of the anti-
the 1920s, the 1960s, the 1980s, the 1990s and trust regime in 1950. The main feature of this wave
the 2000s. Of these, the most recent waves were was a very high number of diversifying takeovers
particularly remarkable in terms of size and geo- that led to the development of large conglomerates.
graphical dispersion [2]. Compared to first and second wave, mergers in this
Beginning of the first wave at the end of 19th wave where not large and did not involve large ac-
century in the United States of America was char- quirers and their motive was growth trough unre-
acterized with huge technological changes, eco- lated diversification. The main feature of this wave
nomic expansion and innovation in industrial pro- was a very high number of diversifying takeovers
cesses. An important attribute of this wave was the that led to the development of large conglomerates.
simultaneous consolidation of producers within By building conglomerates, companies intended to
industries, thus qualifying the description “hori- benefit from growth opportunities in new product
zontal consolidation”. Nobel Prize winner George markets unrelated to their primary business. This
Stigler described the first wave as merging for mo- allowed them to enhance value, reduce their earn-
nopoly. In that time period more than 1800 firms ings volatility, and to overcome imperfections in
disappeared due to consolidation, and many of external capital markets. The third wave peaked
the US corporate giants such as General Electric, in 1968 and collapsed in 1973, when the oil crisis
Eastman Kodak, American Tobacco and DuPont pushed the world economy into a recession.
during the first wave trough such consolidation. Recovery of the stock markets in the USA at
The wave came to an end around 1903–1904 due the middle of the 1980s indicated the revival of
to the stock market crash. takeover activity and start of the fourth wave. The
M&A activity remained at a modest level until start of the fourth wave coincided with changes in
the late 1910s as a consequence of the First World anti-trust policy, the deregulation of the financial
War. The second takeover wave emerged in the late services sector, the creation of new financial instru-
1910s and continued through the 1920s. The second ments and markets (e.g. the junk bond market), as
wave was considered as a move towards oligopolies well as technological progress in the electronics in-
because, by the end of the wave, industries were dustry. Many transactions were financed with large
no longer dominated by one giant firm but by two amounts of debt, and takeovers were often conduct-
or more corporations. Most of the mergers of the ed by company’s management trough management
1920s were between small companies left outside buyouts [4]. Except of management buyouts, this
the monopolies created during the previous wave. wave was characterized the activity of private eq-
By merging, these companies intended to achieve uity funds which conducted takeovers trough lever-
economies of scale and build strength to compete age buyouts. As the main motive for this wave, the
academic literature suggests that the conglomerate 3. Integration process as a change process
structures created during the 1960s had become
Despite the increasing popularity of mergers and
inefficient by the 1980s such that companies were
acquisitions, it has been reported that, more than
forced to reorganize their businesses. The merger
two-thirds of large merger deals fail to create value
wave of the 1980s includes a number of mergers
for shareholders. Ravenshaft and Scherer found
designed either to downsize or to specialize opera-
that profitability of target companies, on average
tions. Some of these corrected excessive conglom-
declines after an acquisition [7]. Mergers and acqui-
eration, others responded to excess capacity created
sitions process should be seen as a series of largely
by the 1970s recession (following the creation of
independent events, culminating in the transfer of
the OPEC oil cartel), while yet others responded to
ownership from the seller to the buyer rather than
the important advances in information and commu-
just an independent event. In theory, thinking of a
nication technologies. The 1980s also experienced
process as discrete events facilitates the commu-
the largest number of hostile bids in U.S. history
nication and understanding of numerous activities
[5]. Like all earlier waves, the fourth one declined
required to complete the transaction. Thinking of
after the stock market crash of 1987 [2].
M&As in the context of transaction-tested process,
The fifth takeover wave started in 1993 along
while not ensuring success, increases the probabil-
with the increasing economic globalization, tech-
ity of meeting or exceeding expectations [1].
nological innovation, deregulation and privatiza-
Mergers and acquisitions are major change in
tion, as well as the economic and financial mar-
lives of corporations and those employed by them.
kets boom. This wave is important because of its
The changes occasioned by acquisitions are often
size and geographical dispersion emphasizing its
wide ranging. They may change strategies, opera-
international nature. Remarkably, the European
tions, cultures, the relationship between staff and
takeover market was about as large as its US coun-
managers, team relationships, power structures,
terpart in the 1990s, and an Asian takeover market
incentive structures and job prospects. M&A may
also emerged. Second, a substantial proportion of
require individuals to change their life styles, be-
M&As was cross-border transactions. Previously
havior, personal beliefs and value systems. Acqui-
domestically-oriented companies resorted to take-
sitions create anxiety, fear and often are traumat-
overs abroad as a means to survive the tough in-
ic events for those who might lose their jobs [8].
ternational competition created by global markets.
However, it is not just the merger that makes em-
The dominance of industry-related (both horizontal
ployees anxious, it is the perceived decline in the
and vertical) takeovers and the steady decline in the
organization before the merger takes place, the lack
relative number of divestitures during the fifth wave
of other jobs elsewhere, or other constraints that
suggests that the main takeover motive was growth
do not allow the employee to leave that create ex-
to participate in globalized markets. Compared to
cessive stress [9]. The turbulence associated with
the takeover wave of the 1980s, the 1990s wave
acquisitions may impact on career loyalty, organi-
counted fewer hostile bids in the UK and US. How-
zational loyalty, job involvement and satisfaction
ever, an unprecedented number of hostile takeovers
with job security. Employees have been known to
were launched in Continental Europe [2]. The fifth
experience the merger as a loss of a loved one, or
wave ended after the burst of the dot-com bubble
may vicariously live the situation as a personal cri-
and the consequent stock market collapse in 2000.
sis and panic. When an organization merges with
It is important to point out that terrorist attacks on
another, employees feel as though they have lost
September 11th 2001 had a significant impact on the
control over important aspects of their lives. That
decrease of the M&A activity in the world. After
creates heightened stress within the individual,
the fifth wave and subsequent terrorist attacks on
which usually leads to lower productivity and re-
USA M&A activities picked up in 2003. The sixth
duced job satisfaction. In case of underperforming
wave lasted until 2008 due to subprime mortgage
target companies, there may be dissatisfaction with
crisis in the United States of America [6]. The glob-
present and therefore greater readiness to accept the
al financial and economic crises had and still have a
imperative of change. Change is always opportuni-
major influence on integration processes.
ty for someone and threat for other. Managers may son why financial benefits anticipated from mergers
see change as an opportunity to profit out of their are often unrealized. Weber emphasizes that magni-
stock options while lower level managers may see tude of cultural differences can effectively impede
change as a threat [3]. successful integration during M&A resulting in
Given the scale of change that an acquisition poor performance [13]. It is widely acknowledged
can cause in both firms that are part of the trans- that cultural compatibility alone is not guarantee to
action, change management concepts may be M&A success, but is not wrong to say that cultural
applied to improve post-acquisition integration. heterogeneity creates tensions and affects financial
These concepts include assessing speed of change, and managerial performance [14].
establishing clear leadership, clarity of communi- Human resources tend to react negatively af-
cation, maintaining costumer focus, making tough ter being acquired. However, the strength dura-
decisions and dealing with resistance, and are tion and dysfunctional effects of such reaction
crucial for M&A success from organizational per- vary between different M&As [15]. This negative
spective [10]. The pace of implementing the post- employee reaction is often referred as a “cultur-
acquisition changes is a conflicting issue in the al clash” [16]. Cultural clash has been shown to
literature, with some researchers arguing that im- have dysfunctional consequences such as lower
mediately after the deal is closed there is a period commitment and cooperation between acquired
when employees at the acquired company expect employees, greater turnover among acquired
and even welcome change, while other research- employees, a decline in shareholder value of the
ers argue that firms should go slow and prepare buying firm, and deterioration of operating per-
employees for change and reorganization. Propo- formance of the acquired firm [17]. According to
nents of quick change, argue that since employees Carwright and Cooper, certain culture types can
anticipate reorganization in the acquired company, be disastrous and can lead to cultural ambiguity,
quick-change implementation helps reduce uncer- confusion and hopelessness [18]. Therefore, the
tainty. Some researchers argue that slow-change management of the human factor in M&A has
implementation is not a result of strategic plan- been recognized as an important source of success
ning, but a sign of ineffective management [11]. by number of researchers. Lodorfos and Boateng
However, there is an argument that employees in a conducted a research in chemical industry in pe-
state of shock after an acquisition can only accom- riod 1999-2004, and had 32 interviews with senior
modate a limited amount of change initially, and managers of 16 M&A deals. Their study identi-
therefore, are in favor of step by step approach. fies culture differences between merging firms as
The “2 + 2 = 5’’ effect between two business the key element affecting M&A success. Almost
units that will increase competitive advantage by all interviewers agreed that M&As often failed to
achieving synergies and improving overall perfor- achieve expected outcomes of the merger because
mance is usually primary purpose of merging and of lack of cultural fit or incompatible cultures [19].
acquiring new firms. Since synergies are rarely re- Mergers and acquisitions may often result in
alized M&A literature indicates that there has been the breach of implicit employee contracts such
intense interest in examining human and cultural as expectations of future benefits or benign work
aspects of M&As as traditional explanations have conditions. They consist of ‘personal compacts’,
not adequately explained the high rate of M&A fail- the mutual obligations and commitments that ex-
ures. The literature drawn on cultural differences is ist between employees and the company. Such
derived from the organizational behavior school of compacts include formal, psychological and social
thought. The effects of culture can take place in the components. Breaches of these contracts or fear of
early stages of the acquisition process but are es- such breaches may intensify hostility to change. In
pecially crucial in the post-acquisition management order to make change acceptable the acquirer must
period [12]. Systematic research indicates that the offer, to those affected, payoffs that are demonstra-
greatest danger for value creation that should come bly superior to their existing payoffs. Change must
out M&A comes after two companies try to inte- be seen to be in the interests of the affected. Such
grate operations. Incompatible culture is major rea- perception is a much a matter of substance as of
the transparency of the process delivering change. average after the takeover. Acquisitions within the
In case of underperforming target companies, there high-tech industry are motivated by the increase of
may be dissatisfaction with present and therefore the product supply rather than by product develop-
greater readiness to accept the imperative of change ment, which can be explained by the requirement
[3]. for decreasing time needed to penetrate new mar-
Considering the research evidence about the im- kets. Explicit knowledge of the target company is
portance of corporate culture and human factors in relevant for the transfer of knowledge needed to
M&A success it is crucial to assess culture compat- educate acquirers’ employees and, to efficiently use
ibility before the deal. While strategic change and the acquired products [22]. Acquisitions in high-
the consequent change in the architecture of the technology industries are often motivated by the
merging firms my result in culture change, culture expansion of the existing investment activities in
change my often be precondition for both organiza- the field of R&D in order to develop new patents
tion structure change and strategic change [6]. [23]. Ranft and Lord state that for 35% of acquirers
Behavior of acquirer is extremely important the primary motive for a merger or an acquisition
for successful acquisition. Honesty, sensitivity, lies in the specific technology of the target compa-
competence and willingness to share with target ny, while 32% of acquiring companies emphasize
employees the benefits of the acquisition are im- innovation and engineering capabilities of the tar-
portant variables for success. No matter what kind get as the main motive for the transaction [24]. Vast
of change should take place in target company its majority of research on mergers and acquisitions in
influence on employees has to be taken into con- high-technology industries is focused on increasing
sideration. Honest dealing and care for employees activities in research and development of new tech-
are indispensable to ensure a willing cooperation nologies. Some of them point out that technology
and commitment to change. related motives for mergers and acquisitions are
moderately important for all industries while the
4. Role of technological intensity in results of other studies emphasize the importance
integration processes of technology related motives for mergers and ac-
quisitions, especially in the high-tech industry [25].
Companies that have high technologies in many In the context of the companies operating in
ways differ from other competitors. Such enterpris- high-technology industries and in industries that
es are characterized by a specific mode of organi- are characterized by high investments in research
zation and management, and they usually represent and development, better business results after the
leading companies in the economy of the country in takeover imply the fact that the company’s inte-
which they operate. Companies that develop high gration process after the transaction has to support
technologies invest significantly more in research the continuous development of new technological
and development than companies operating in low- capabilities. It is expected that successful merg-
tech industries [20]. Technology mergers and acqui- ers and acquisitions will enable further develop-
sitions include transactions in which the acquiring ment of new skills, and that their use will result
company and the target company operate in indus- in better company’s performance [26]. The results
tries such as Internet equipment, software, medical of previous studies that were focused on the im-
devices, pharmaceuticals, conductors and semicon- pact of mergers and acquisitions on investments in
ductors, biotechnology, etc. [21]. research and development diverge. Part of the re-
Mergers and acquisitions between high-tech- search indicates that mergers and acquisitions have
nology companies are usually aimed to increase a negative impact on investment within the com-
the supply of products, open new markets and cre- panies engaged in a merger or a takeover, whereas
ate new capabilities. Some studies indicate that the a part of the research highlights how mergers and
acquiring company, whose goal is to take over the acquisitions, between companies that have similar
target company only to increase their customer technologies and are complementary in terms of
base and not because of the adoption of new tech- technological knowledge and skills have a posi-
nologies, usually operates worse than the industry tive impact on investments in research and de-
Finland. Their results suggest that it is more likely high technological intensity, in contrast to indus-
for companies that operate in high-tech industries tries of medium and low technological intensity.
to decide for a merger or acquisition in contrast to Specifically, mergers and acquisitions in the indus-
the companies operating in industries of middle or tries of high technological intensity often result in
lower technological intensity due to insecurity and the development of new technologies that enable
the large number of fast and frequent changes that companies to create competitive advantage, and
characterize the industry [33]. Blonigen and Tay- therefore operate with greater success than the
lor conducted a study on the relationship between companies that operate in industries of medium
the level of investment in research and develop- and low technological intensity.
ment and mergers and acquisitions in the industry
of electronic equipment. Their results highlight a 5. Methodology and research results
strong negative correlation. In other words, in the
electronic equipment industry companies with a Measuring instrument (questionnaire) for testing
relatively low investment in R&D are more likely the hypotheses of this research consisted of a set of
to engage in M&A activities [34]. questions that the respondents (board members and
During a research of 112 biotechnology com- company managers) answered and expressed their
panies in the USA Zahra found that acquiring tar- agreement/disagreement with proposed statements
get company’s technology is positively correlated whereat a Likert measurement scale of five degrees
with the performance of the acquirer, particularly was used. Propositions used in different measure-
relating to the increase of sales and market share ment scales are either originally developed for re-
[35]. Tsai and Wang conducted a research on a search purposes, or processed and adapted from
sample of 341 high-tech mergers and acquisitions existing measurement scales that can be found in
in the period from 1998 to 2002, and the results in- the relevant scientific literature.
dicate that introduction of new technologies per se Empirical research was conducted in Croatian
does not affect the operations of the acquirer after companies, which have been taken over or ac-
the transaction [36]. According to these authors, quired. In Bloomberg and Mergermarket databases
the positive effect of new technologies can be ex- 233 transactions in the period 1998. - 2010. were
pected if the acquirer internally invests substantial recorded. With the detailed investigation of the in-
amounts in research and development. Research formation library of the Croatian Agency for Super-
by Yan and Zhang included 500 mergers and ac- vision of Financial Services another 401 transaction
quisitions of high-tech companies, and focused during this period was recorded, which combined
on the business performance of companies after with the transactions from Bloomberg and Merger-
the acquisition. Research results show a statisti- market databases comes to a total of 634 transac-
cally significant association between the resource tions. Since this paper analyses transactions in non-
utilization and business performance of high-tech financial sector, the sample on which the empirical
companies measured through an increase in mar- research was conducted comprised of 598 compa-
ket share, profitability, and growth rates [37]. nies. In order to analyze the impact of the company
Considering previous research on mergers and size on takeover success, it was important that at
acquisitions of high-tech companies, this paper least three years have passed since the takeover. For
tests the impact of the technological intensity on this reason, the acquired companies were analyzed
the business performance of the target company in the period from 1998. – 2006.
after the acquisition. Given the fact that it was In the period of sixty days after the beginning of
found that mergers and acquisitions affect the lev- the primary research 43 completed questionnaires
el of investment in research and development after were returned representing a return rate of 7.19%.
the takeover, and that there is a positive relation- Considering the sensitivity of the analyzed phenom-
ship between the level of investment in research ena and complexity of analysis, the rate of return of
and development and corporate performance, it questionnaires was acceptable. The complexity of
can be assumed that mergers and acquisitions are the analysis is reflected in the fact that the study in-
more successful in industries characterized with cluded only companies in which at last three years
Table 1. Target company’s technological characteristics and performance after the takeover
Table 2. Chi-Square test of target company’s technological intensity and its performance after the takeover
passed after the takeover. Additional criteria were companies were performing more successfully af-
related to the fact that the respondent (the president ter the takeover, while 50% of the companies op-
or board member or senior manager) should be in- erated worse than before. Of the 17 acquired com-
cluded in the acquisition process and familiar with panies operating in low-tech industry, all com-
the acquisition activities, and also working in the panies were more successful after the takeover.
company that was acquired at least 5 years in order Chi-square test was used to test the connection
to identify and assess the changes that have occurred between the technological intensity of industries
after acquisition. Out of the total number of received and business performance after the acquisition.
questionnaires, 30 companies that performed better Table 3. Chi-square test symmetric measures
after the takeover were identified (69.8%) and 13
that performed worse after the transaction (30.2%).
In the analysis of empirical data collected in
this study large number of statistical techniques
was used. Overall data analysis was conducted us- Source: Author’s research
ing statistical software package SPSS 17.0.
Empirical research begins by testing the hy- By this hypothesis it was assumed that the prob-
pothesis: The higher the technological intensity ability of a company’s successful performance af-
of the target company’s industry, the higher is the ter the takeover is higher, if the target company
probability of more successful target company’s operates in the high-tech industry.
performance after the takeover. Chi-square test showed that there is a statisti-
In order to test the proposed hypothesis re- cally significant correlation between the techno-
search participants were asked about the techno- logical intensity and the overall business success
logical intensity in their industries and their per- (p <0.001), but in the opposite sense. Specifically,
formance after the takeover. Results of descriptive after the takeover all the companies that were a part
statistics are presented in Table 1. of the low-tech industry operated better, whereas
From the total number of analyzed companies, in the group of the high-tech industries 50% of the
26 operate in high-tech industries, whereas 17 ac- companies operated better after the transaction.
quired companies operate in a low-tech industry. Furthermore, variance analysis tested differ-
Table 1 shows that 50% of analyzed high-tech ences in the correlation between the technological
Table 4. Variance analysis of the correlation between target company’s technological intensity and its
performance after the takeover
technological intensity strongly affects the busi- 12. Quah P., Young S. Post-acquisition Management:
ness performance after the acquisition. Consider- A Phases Approach for Cross-border M&As, Euro-
pean Management Journal, 2005; 23(1): 65-75.
ing the results of the conducted empirical research
developed hypothesis was rejected. However, 13. Weber Y. Corporate culture fit and performance in
main limitations of this research emerge from the mergers and acquisitions, Human Relations, 1996;
sample on which empirical research was conduct- 49(9): 1181-202.
ed. Structure of Croatian high-tech industry and its
14. Brock D. M. Multinational acquisition integration:
market are different compared to developed coun- the role of national culture in creating synergies, In-
tries, so if this research was conducted in country ternational Business Review, 2005; 14(3): 269-288.
with larger and more developed high-tech industry
the results might be different as well. 15. Larsson R., Brousseau K. R., Driver M. J., Sweet
P. L. The secrets of merger and acquisition suc-
cess: a co-competence and motivational approach
References to synergy realization, in Pablo, A. L., Javidan, M.,
ed.: Mergers and Acquisitions, Creating Integrative
1. DePamphilis, D. M. Mergers, Acquisitions, and Oth- Knowledge Blackwell Publishing, 2002.
er Restructuring Activities, Academic Press, 2010.
16. Buono A. F., Bowditch J. L. The Human side of
2. Marynova M., Renneboog L. A century of corporate Mergers and Acquisitions: Managing Collisions Be-
takeovers: What have we learned and where do we tween People and Organizations, Josey-Bass, 1989.
stand?, Journal of Banking and Finance, 2008;
32(10): 2148-2177. 17. Buono A. F., Bowditch J. L., Lewis J. W. When
cultures collide: the anatomy of a merger, Human
3. Sudarsanam S. Creating Value from Mergers and Relations, 1985; 38(5): 477-500.
Acquisitions, Prentice Hall International Limited,
2005. 18. Cartwright S., Cooper L. C. Organizational mar-
riage: “hard” versus “soft” issues?, Personnel
4. Damodaran, A. Investment Valuation: Acquisitions Review, 1995; 24(3): 32-42.
and Takeovers, John Wiley & Sons Inc., 2002.
19. Lodorfos G., Boateng A. The role of culture in the
5. Betton S., Eckbo E. B., Thorburn K. S. Corporate merger and acquisition process: Evidence from Eu-
Takeovers, Tuck School of Business Working Paper ropean chemical industry, Management Decision,
No. 2008-47, 2008. 2006; 44(10): 1405-1421.
6. Filipović D. Izazovi integracijskih procesa: Rast 20. Alzzawi S. Knowledge Flows and Knowledge As-
poduzeća putem spajanja, preuzimanja i strateških sets in High-Technology Mergers and Acquisitions,
saveza, Sinergija, 2012. International Research Journal of Finance and
Economics, 2008; 21: 48-67.
7. Ravenscraft D. J., Scherer F. M. The profitability of
mergers, International Journal of Industrial Organi- 21. Graebner M. E., Eisenhardt K. M., Roundy, P. T.
zation, 1989; 7: 117-131. Success and Failure in Technology Acquisitions:
Lessons for Buyers and Sellers, Academy of Man-
8. Reilly A. H., Brett J. M., Stroh L. K. The impact of agement Perspectives, 2010; 24(3): 75.
corporate turbulence on managers’ attitudes, Strate-
gic Management Journal, 1993; 14:167-179. 22. Lemieux O. P., Banks J. C. High tech M&A – strate-
gic valuation, Management Decision, 2007; 45(9):
9. Marks M. L. Surviving a merger, Electric Perspec- 1412-1425.
tive, 1999; 24(6): 26-35.
23. Higgins M. J., Rodriguez D. The Outsourcing of
10. Galpin T. J., Robinson D. E. Merger integration: R&D through Acquisitions in the Pharmaceutical
The ultimate change management challenge, Merg- Industry, Journal of Financial Economics, 2006;
ers and Acquisitions, 1997; 13(4): 24-28. 80(2): 351-383.
11. Haspeslagh P. C., Jemison D. B. Managing Acqui- 24. Rantf A. L., Lord M. D. Acquiring new knowledge:
sitions: Creating Value Through Corporate Renew- The role of retaining human capital in acquisitions
al, The Free Press, 1991. of high-tech firms, The Journal of high Technology
Management Research, 2000; 11(2): 295-319.
25. Grandstrand O., Bohlin E., Oskarsson, C., Sjoberg, 37. Yan Y., Zhang J. A. Performance of high-tech firms’
N. External Technology Acquisition in Large Multi- resource and capability-based development: knowl-
technology Corporations, R&D Management, edge acquisition, organizational utilization and
1992; 22(2): 111-134. management involvement, International Journal of
Business Studies, 2003; 11(1): 45-68.
26. Barkema H. G., Vermeulen F. International Expan-
sion Through Start-up or Acquisition: A Learning
Perspective, Academy of Management Journal, Corresponding Author
1998; 41(1): 7-26. Davor Filipovic,
Faculty of Economics and Business Zagreb,
27. Grimpe C. Successful Product Development after University of Zagreb,
Firm Acquisition: The Role of Research and Devel- Zagreb,
opment, The Journal of Product Innovation Man- Croatia,
agement, 2007; 24(6): 614-628. E-mail: dfilipovic@efzg.hr
29. Guo R. J., Lev B., Shi C. Explaining the Short and
long term IPO Anomalies in the US R&D, Journal
of Business Finance & Accounting, 2006; 33(3):
550-579.
Abstract 1. Introduction
Goal of this paper is to point out the gravity of Great technological improvement in the field
social dangerousness of the cyber crime, which of information and communication technologies
represents the union of computer, digital, e-crim- led to the occurance of the new types of criminal
inal, web criminal, criminal that involves the at- acts that could not be followed and considered as
tacks on computer networks, data theft, system computer related criminal, which points out that
attacts, copyright ainfrigement, etc. It is a kind of the cyber crime is the notion that follows the tech-
criminal where the usage of computer technologu nological decelopment and it is derived from so-
and information and communication systems and cial, ethical, legal, political and other frameworks
networks is presented as a manner of commiting that exist in a social community.
a legal offence, or where the computer is used as Cyber crime represents a totality of computer
the means or as a target performance, which causes criminal, internet criminal,e-criminal, network
some sort of relevant consequences in the criminal criminal, as a form of behavios which is against
context. Unlike the classical criminal types, cyber the law, or it will be criminalized in the near future.
crime is characterized by highly expanded area od Acts of cyber crime are always differentiated from
criminal activities that does not demand the pres- so called classical criminal acts, out of several rea-
ence of commiters at the places of criminal activi- sons. Firstly, in each case they innevitably possess
ties. In most cases, the offender is located in one the element of internationality. Then, the act of
country, the place of activity is in another country, cyber crime often incorporates other criminal acts
whereas the consequences of the criminal activ- which can be done in conventional manner, for
ity are notable in third country. Suitable area for instance fraud, forgery and similar. Finally, these
performing the criminal activities of cyber crime acts assume the use of new, electronic technolo-
are the countries where there is no, or there are a gies for their implementation, therefore, the acts
partial legal regulations regarding the fight against of cyber crime are extremely hard to define, inves-
the cyber crime. Out of this reason, the main focus tigate and prosecute [1,2,3]. It is a criminal which
of this paper will be the countries of the Western is developed within the electronic surroundings,
Balcans. Following the conceptual definition of i.e. it regards any form of criminal that can be per-
this negative notion, an overview of cyber crime in formed with computer systems and networks, in
Republic of Serbia, Bosnia and Herzegovina, Re- computer systems and networks or against com-
public of Slovenia and Republic of Croatia is given. puter systems and networks. If the computer sys-
After a comparative analysis of cyber crime in the tem means any device or group of interconnected
countries of the Western Balcans, this paper points devices, thich are used for automatic data process-
out the necessity of their organized, systematisized ing or any other function, then it is certain that
and conctinuous cooperation, and unification and without them and the computer networks, there is
charmonization of the legal regulations in order to no cyber crime too [3,4,5]. It is complex, and it
fight more effectively against this type of criminal is even considered as umbrela term that covers a
which, as the years pass, with the development of variety of criminal activities, including computer
the new information and communication technolo- data and system attacs, attacs related to compu-
gies takes new forms and appearances. ters, contents or intellectual property.The compu-
Key words: cyber crime, cyber space, legal regu- ter networks or information and communication
lation, the fight against the cyber crime, cooperation. technologies appear in multiple roles, as: goal of
attack, tool, surrounding and evidence on proved individual to whom it is hard to oppose, and it is
procedures [5,6,7,8]. more harder to stop it. He more frequently does not
Perpetrators of the criminal act of cyber crime want to be alone, but needs company, as well as the
are usually members of international network of audience. The ease of movement through the cyber
this criminal type. Considering that cyber crime space provides the sense of power and elusiveness.
originates from the western European countries, These sentiments are not without reason, because it
people from the Western Balkan states that are is extremely difficult to detect it at the moment of
involved, must be connected with the criminals performance, which is mainly the right moment for
from Western Europe. The reason for this is stated his identification and capturing. On the other hand,
in the fact that the criminal acts of cybercrime can- internet, which is so vulnerable and unsafe due to a
not be performed without enrollment of the entire large number of its users, its openness and its being
system [9]. This is the reason why it is difficult unregulated, is the ideal hideout of various types of
from cyber crime. criminals. In such environment and with such indi-
A protection from the aforementioned is harder viduals, not only attempts of various national rights,
by the fact that the criminal acts of syber crime are international organizations and associations are be-
performed in the area of interdependent network ing increasingly performed, but also the private sec-
of information and technologicas infrastructures tor and the users are also being involved, in order to
(which includes the internet, telecommunication mitigate the negative consequences and reduce the
networks, computer systems and implanted pro- losses which occur in cases of undisturbed criminal
cessors and regulators in a variety of activities), or activities. Owners and users are becoming especial-
the co called cyber space. The cyber space means ly significant group in creating the conditions for
either the types of communities made up from com- the protection of the private computer networks and
puter networks, in which the elements of traditional their connection with the public, or global networks.
society are in the form of bits and bytes, or as the The development of secure internet infrastructure
space which is created by the computer networks. cannot be imagined without joing activities of each
The term cyber space was first used by William of the mentioned acters, particularly because the
Gibson in science fiction novel Neuromancer in cyber crime is becoming a global issue [5].
1984. Cyber space is an artificial creation which The most comprehensive attempt to legally re-
demands high level of technical equipment, food gulate the fight against cyber crime at the interna-
informational infrastructure and it is nobody’s and tional level, which has an effect on the states of the
everybody’s property, where real and virtual coeg- Western Balkans, is represented by the Convention
sist on the paralel basis, and where the communica- on Cyber crime of European Council, which was
tion is collective. In such surroundings it is extre- signed by 47 countries, out of which there are some
menly difficult to talk about national scales of crime that are not the member states (4 countries, among
and social danger, at least not in the conventional which USA), it has been ratified by only 26 states.
sense. For this reason, cyber crime is classifiedin The fact that the Convention was signed by indi-
the most prominent form of transnational criminal, vidual countries that are not members of the Euro-
against which not even the fight can be conven- pean Council indicates the importance of this legal
tional, especially because the societal, social and act and the level of the expectations of making a
economic context of this criminal is not the same major breakthrough against this criminal type [8].
as the conventional transnational criminal, because
for the cyber space there are different rules, which 2. Cyber crime in Serbia
is shown in the Global studies on organized crime,
Center for Prevention of the International crime and The reaction of the Republic of Serbia on cy-
United Nations Institute for Inter-regional Crime ber crime is the introduction od new measures in
Investigation [1,4,10]. the criminal law, not only for detecting, but also
Perpetrator of the criminal act of cyber crime is proving the same, because the legal regulations
special, sophisticated, with high technical backgro- are not in compliance with contemporary forms
und, uncrupulous, obsessed, sometimes revengefull of commiting the criminal acts in the field of cy-
ber crime. Current legislative solutions should be In terms of classifications given in this defi-
aligned with the legal regulations that follow the nition, it can be noted that this type of criminal-
changes in the technical structure and in the devel- ity also involves the classical criminal activities,
opment of the informational society. and recently introduced criminal acts of computer
Until the introduction of criminal acts against criminal in the legislation of the Republic of Ser-
computer criminal in the Book od Law, the crimi- bia. Moreover, both of these groups of activities
nal legislation of the Repubic of Serbia most of are not mutually exclusive, so that the combination
the time was not able to respond to the increasing of these is also possible, similarly to the criminal
number of revealed computer abuse in Serbia. activities of identity theft, where there are fraud
To be more specific, these are criminal activi- and computer fraud.
ties against the security of computer data, com- The first category in the definition includes the
prising Chapter 27 of the Criminal Code of the newly proclaimed activities in criminal legislation
Republic of Serbia. These are [11]: of the Republic of Serbia, as computer sabotage,
– Damaging the computer data and programs; computer fraud, computer data and programs dam-
– Computer sabotage; aging, making and installing the computer viruses,
– Creation and import of computer viruses; etc. This category includes the classic criminal ac-
– Computer fraud; tivities a more severe form of which is created us-
– Unauthorized access to the protected ing the computers or sophisticated technological
computer, computer network and electronic equipment.
data processing; The second category includes the offenses such
– Prevention and limitation of the access to as unauthorized access to the protected computer,
the public computer network; computer network and electronic data processing,
– Unauthorized usage of computer or or prevention and limitation of the access to the
computer network; public computer network, hacking or cracking, at-
– Creation, procurement and sharing the tools tacks of refusal or denial of services.
for commiting the criminal acts against the The third category includes the acts that are
security of computer data; called the acts performed with computer support.
This category includes the stenography and in-
For detection, legal prosecution and trial for cryption, where the first term stands for translat-
the mentioned criminal acts, the Law on organiza- ing data into secret encripted material (it can be
tion and jurisdiction of state authorities for fight determined as the data encryption), and the second
against cyber crime special state authorities have term represents a procedure where the information
been created. is hidden and it is associated with other, seemingly
According to the forementioned law, cyber innocent data, such as photography.
crime is performance of criminal activities where Also it may be recognized that the typologies
the computers, computer networks,computer data, of criminal are in the matter, because the described
as well as their products in material and electronic categories are not mutually exclusive and the
forms occur as the goal or as a means of enforce- combination of different categories can occur in
ment of criminal acts. one activity.
Cyber crime has its own concept that implies a
certain behavior defined by the law as illegal: 3. Cyber crime in Bosnia &Herzegovina
– Which includes the usage of digital
technological achivement and technologies The presence of this notion is has increased
for performing a criminal activity; in Bosnia and Herzegovina lately. In compliance
– Which is directed to the computers and with the development of the infrastructure of in-
technological tools; formatics in Bosnia and Herzegovina, then the
– Which is incidental in performing other increase in the number of internet consumers, the
types of criminal. growth of criminal activities in the field of cyber
crime is evident.
During the past two years more than 50 reports the Criminal Police Department on the date 1.1.2010
on performed criminal activities in the field of cy- formed the special Department for prevention of cy-
ber crime is submitted to the prosecuting authori- ber crime. The Department was formed in the aim
ties. The most frequent are the acts of forgery of of efficient discovering and legal prosecuting the
credit cards and other cash cards. The people deal- perpetrators of cyber crime activities, i.e. offences
ing with illegal money transactions via internet, against citizen rights and freedom, and gender integ-
identity theft, child pornography and other illegal rity as well as the crimes against property, industry
activities are registered almost on the daily basis. and payment transactions. For each case that con-
The police undertake all necessary measures and tains the elements of criminal act this department
actions in order to prevent, i.e. identity the offend- submits a report to the prosecutors. The mentioned
ers, through regular checks of the forms of this department has successful methods of locating and
criminal in Bosnia and Herzegovina, as well as discovering the creators of offensive contents, and
through discovering the new levels of accessing to the visitors as well. In case somebody accidentally
discovering the offenders, with permanent train- accesses the server with the child pornography, he
ings in the field of informational technologies. will not be prosecuted, but if he logs in on that server
Serious threats to destroy the computer sys- for 600 times and records the content of it, there are
tems of the government institutions of Bosnia and all prerequisites that he will be legally prosecuted.
Herzegovina, a few months ago, were sent by a It is undisputable that the police may identify each
hacking group named Anonymous, which has a individual malusing the internet, cyber crime who
branch in Bosnia and Herzegovina. Openly and steals the identities to attack the bank accounts, pe-
publicly announced attacks on the informational dophiles as well as the commentators on the forums
systems of various state departments and agencies who post the threatening messages. However, in or-
lead by the examples of acts of their sympathizers der to trace each criminal, the police finds it very
over the world. The aim of such attacks may be to important that the cyber crime or hackers attack is
unable the access to those pages. Another type of reported in the shortest time possible.
attack may be that the offenders attempt to change Department for cyber crime within the Ministry
some of the data on the pages, to publish what of Internal Affairs of the Republic of Srpska, be-
they want. The third attack, which is potentially sides all forms of crime on the so called cyber space,
the most dangerous, is to reach some information or internet, covers the misuse of in the field of tele-
which is not public and to distribute such informa- communications, and deals with digital forensics.
tion further, or to do something else with it. The mentioned department is the first department
On the territory of Sarajevo in 2010, an orga- of this kind in the whole Bosnia and Herzegovina.
nized group which dealt with all forms of informa- It is an interesting fact that the Republic of Srp-
tional technology abuse was broken. They found ska and the Republic of Serbia, in their criminal
several people who were involved in credit cards laws sanctioned the crimes of cyber crime within
and other paying cards forgery, which resulted in the Chapter named The Criminal Activities aga-
finding tens of thousands of data from the bank inst the Security of Computer Data, as follows
cards of the foreign citizens. [12]: Damaging the computer data and programs;
Bosnia and Herzegovina annually loses be- computer sabotage; development and installation
tween 11 and 14 million dollars of direct taxes of computer viruses, computer fraud, unauthori-
due to software piracy, which is estimated to be 66 zed access to the protected computer, computer
percent of the total software market. Bosnia and network, communication network and electronic
Herzegovina still has neither agency nor sector for data processing, prevention and limitation of ac-
fight against cyber crime. At the State Investiga- cess to the public computer network, unauthorized
tion and Protection Agency – SIPA, a Center for usage of computers or computer network. Howe-
the fight against cyber crime was supposed to be ver, unlike the Republic of Srpska, the Republic
formed. However, this has not yet been done. of Serbia has introduced another crime – creation,
The first steps were made by the MUP RS, within procurement and providing other tools for com-
the Unit for operational and technical support within miting offences against security of computer data.
The criminal code of Bosnia and Herzegovina criminal activities regarding unauthorized use of
[13], in Chapter thirty to, the Criminal activities copyright works, infringement of copyright and
against electronic data processing are presented, as other related rights (Art. 158-160 of Criminal
follows: damage to computer data and programs, Code) [14]. It is interesting that already then in the
computer forgery, computer fraud, obstruction of Art. 309 the creation and usage of malicious pro-
the system operation and of the networ of electro- grams that can be used for unauthorized access or
nic data processing, computer sabotage. any other criminal activity related to the computer
The mechanism of defense against cyber crime use were sanctioned.
in Bosnia and Herzegovina is still at its beginning. According to some data published in the jour-
The problem in Bosnia and Herzegovina on the nal of the Association Business Software Alliance
one hand is the lack of money invested in secu- (BSA) and the Economist magazine, Slovenia, like
rity systems, and on the other hand there is a small most of the former communist countries in the early
number of educated people who can successfully nineties had a high level of piracy, about 90%. It is
fight against the cyber crime. obvious that the regulations achieved their purpose,
Regulatory agency for communications of Bos- considering that according to the report of BSA
nia and Herzegovina tried to warn about the risks for 2001 year, Slovenia has less than 60% of ille-
and threats of each network connection, through gal software’s, while the great part of this number
the public campaign. They started the promotion goes to the so called soft piracy, i.e. use of official
of media literacy and protection of children from licenses on more computers than allowed.
the potentially harmful contents on the internet in
2010. Within this campaign, on over 100 radio and 5. Cyber criminal in Croatia
TV stations the videos that point out at the pos-
sible threats, such as violence and pornographic According to most experts, the changes in legal
contents, and contacts with pedophiles and radi- system should be evolutionary, not revolutionary.
cal groups in the society were broadcasted. On The internet in technical sense is definitely a revo-
that occasion they pointed out to the necessity of lution, and in the legal, especially regarding the
higher involvement and cooperation between the cyber crime, it is still evolutional change.
relevant ministries and every other segment of For this reason it is not surprising that when it
the society, which should be actively involved in is being discussed about the responsibility of inter-
creating the legal regulations aiming to combat all net providers in Croatia, it is considered within the
the negative notions evident in the so called cyber regulations of general nature, such as the criminal
space of Bosnia and Herzegovina. code of 1998 with the changes and amendments,
so leges speciales, depending on which offence
4. Cyber criminal in Slovenia is considered, Law on Copyright and the Law in
Obligatory Relations.
The process of adopting the legal standards of The members of the Criminal Code incriminate
punishing the forms of cyber crime was passed the behaviors qualified as the criminal activities
in the first reforms in 1995, when the new Law in the Articles 2 to 6. of the Convention on cyber
on Copyright was adopted. In 1999 with the new crime. The criminal activity named damage, use
reform of the system in Slovenian criminal Law- of data belonging to others (Art. 223 [15] ) covers
book a criminal act of unauthorized acces to the the criminal acts of unauthorized access and Dam-
computer system as well as the criminal act of age, alterations and destructions of data contained
unauthorized changing in content, distruction or in Art. 2 and 4 of the Convention.
harming the data was entered. Regarding the Article 3 of the Convention on
In the same year the Law on Copyright is cyber crime and criminal activity Unauthorized
changed, and then the criminal law with the crimi- interception of data (Illegal interception), in the-
nal acts regarding the violations of Copyright and ory it is considered that although the Art. 223 of
similar rights are included. After the mentioned the Criminal Code does not contain the determi-
changes, in the criminal-legislative system the nations on computer espionage there is enough
of existing incriminations which may be used to years. In case of disabling or hinder the operation
sanction such behavior in all forms, as for instance or use of computer systems, computer data or pro-
the incriminations on publication and unauthor- grams or computer communication, he will be pun-
ized acquiring of business secrets (Art. 295 CC), ished by fine or imprizonment up to three years.
disclosure of company secrets (Art.132 CC), or If the mentioned crimes are commited in rela-
state secret disclosure (Art. 144 CC). Following tion to the computer system, data or program of
this, the offence of the unauthorized use of per- government bodies, public institution or a com-
sonal data (Art 133 CC) covers only collection, pany of special public interest, or has caused
processing and use of personal data of the citizens, substantial damage, the perperator shall be pun-
as well as their use opposing the legally prescribed ished by imprisonment from three months to five
purposes of their collection. years. A fine or imprisonment that does not exceed
Following this, the chapter on criminal activi- three years will be imposed in cases the offender
ties against the property is complemented by in- manufactures, procures, sells, possesses or makes
criminations which may also serve for sanctioning the special devices, tools, computer programs or
some misuses of the internet. Thus the following computer data created and adjusted to making
activities are: such criminal activities, to the other unauthorized
– Violation of Copyright of authors or performers peope, whereas those special devices, tools, com-
– Unauthorized use od the copyrighted work puter programs and data created, used or adjusted
or performance; for commiting the criminal activities will be taken.
– Damage and use of other’s data; The Croatian criminal law incriminates the
offence of child pornography.The example of the
The latter offense is particulary interesting be- Republic of Croatia in terms of legal regulation of
cause it is a completely new criminal act which en- the offence of child pornography on a computer
ables the protection of the automatically processed system or network, should be followed by all the
data or computer programs, and incriminates the other countries of the Western Balkans. The law
very own access to them under the condition that on amendments to the criminal law (NN 71/06)
they are protected by special measures or codes. which regards the Criminal Law of the Repub-
Considering that the mentioned incriminations lic of Croatia (NN 110/97), as well as the law on
cover a great number of abuses of the internet and Amendments of the Criminal Law (NN 129/00)
computer, the legislative authorities could and define a new form of criminal activity – child por-
should have found the space for sanctioning the nography on the computer system or network.
activities of malicious programs, which could di- Articles 196 and 197a of the Criminal Law re-
rectly assist the formation of legal framework for gard this criminal activity.
investigation of producers’ responsibilities. According to the Art. 197a, those who use the
At the beginning of July 2003, the Criminal computer system or network to produce, offer, dis-
Code was amended and this has been applied tribute, obtain for himself or another, or who in
since December 2003. their computer system or storage media possesses
With the mentioned change the Art. 223 under- pornographic content showing children or minors
went a big change, and now it is called the name in sexually explicity conduct, or who are focused
Violation of confidentiality, integrity and avail- on their sexual organs, will be punished by impris-
ability of computer data, programs and systems, in onment from one to ten years. According to the
other words it covers all sections of the Convention point 2 of the same article, who, through a com-
on confidentiality, integrity and availability of data puter system, netwok or storage media for com-
stored on computers and the computers themselves. puter data makes the images or audiovisuel con-
Every attempt of these criminal acts is punishable. tent or other items of pornographic content more
According to the Article 223, the offender who accessible, he shall be punished by fine or impris-
despite the protective measures attempts the unau- onment up to three years. Special devices, means,
thorized access to computer data or programs, will computer programs or the data used or adapted for
be punished by fine or imprisonment up to three performing such criminal act will be taken away.
It is necessary to point out that the art. 197a is cializes authorities, as well as the adoption of ap-
connected with Art. 196, which is essentially the propriate legislation, primarily of material nature,
basis of the criminal activity described in Art. 197a. which are the basis for the effective prosecution of
According to the Art. 197 the one who records a offenders in the area of cyber crime.
child or minor for production of pictures, audiovi- The forms of cyber crime in the legislation of
sual material or other items of pornographic con- the Republic of Slovenia are concentrated in the
tent, or sells or distributes, or shows such material, Slovenian criminal code (Kazenski code). This
or makes a child to partivipate in pornographic apparently accieves its purpose, considering that
performance, shall be punished from one to five the number of the criminal acts of cyber criminal
years of imprisonment. The objects and tools of (in percentage) is decreasing. Republic of Slove-
criminal act are taken away. nia fulfills almost all requirements of the Conven-
While the Art. 197 of preventive nature, the tion on cyber crime. What is left is to meet the
Art. 196 is repressive, and according to this, the criminal-legal sanctioning of the criminal acts
punishment is higher. aimed at obstructing the normal operation of com-
Only one thing is more dangerous than child puter systems and authorized interception of data.
pornography, and this is the unawareness of its In the Republic of Croatia the forms of cyber
availabilty and hense it dangerousness. The most crime are contained in the Criminal code. It should
of the people still think that the child pornography be noted that the Croatian legal system continu-
on the internet is hard to find, and that it is availa- ously monitors and analyzes the changes in the
ble to a small circle of people and costly. The truth legal systems in the countries of the same type of
is, unfortunately completely opposite, and it is in- legal framework.
evitable to point oit to the need of incrimination of As for Bosnia and Herzegovina it is signatory
this criminal activity and in the criminal law of the to the International Convention on Cyber Crime.
Republic of Serbia, Bosnia and Herzegovina and However, until now the criminal code did not in-
Republic of Slovenia. corporate certain criminal activities regarding cy-
ber crime, and which are defined in the Conven-
6. Comparative overview and proposal of tion, which indicates the necessity of the Criminal
fight against cyber criminal in the states Code amending related to the cyber crime.
of Western Balcans All the mentioned Western Balcan countries
belong to the group of countries which, in the ab-
Based on the analysis of cyber criminal in the sence of specific solution, rely on their general
areas of Republic of Serbia, Bosnia and Herzegov- criminal standards. Considering that in the field of
ina, Republic of Slovenia and Republic of Croatia, cyber criminal it is the matter of legally technical
brings to the conclusion that there is no harmonized problems of high complexity, it is better to define
legislation on the issue of this type of crime. if firmly by the law, than to leave it to the court and
In the Republic of Serbia the rapid develop- general regulations to do so. After all, the principle
ment on the fight against cyber crime began with of legal certainty requires it.
the adoption of amendments to the Criminal Code On the other hand, in all the states of the West-
of the Republic of Serbia, and the Lae on organiza- ern Balkans it is necessary to analyze the the com-
tion and jurisdiction of the Government authorities ments and recommendations from the officials
in the fight against cyber crime. This law for the engaged on the businesses of discovering and
first time in the criminal legislation of the Republic prosecuting the cyber criminal, and to bring or
of Serbia defines the notion of cyber criminal as the perform the correction and amendment of mate-
performance of criminal activities where the means rial and processing legislation, that could enable
or goal of performing the criminal act are comput- the aquiring the optimal results in the fight against
ers, computer networks, computer data, as well as increased presence of cyber crime.
their products in material and electronic form. It is concerning that the fact that the perpetra-
The Republic of Serbia has taken a significant tors of cyber crime in our countries in the region
and decisive step towards the constitution of spe- are not limited by the state borders, but use them
as a protection. There are the situations in which Ministries of internal affairs and justice of
many of the perpetrators are the citizens of two, the states of the Western Balkans have already
three or four states of the former Jugoslavia at achieved significant results in establishing mu-
the same time, and therefore illegally pass the tual cooperation. In order to fight against cyber
state border and illegaly stay on a certain teritory criminal more effectively, it would be logical to
in unregistered homes. Out of those reasons and form new common force which could be effec-
adequate cooperation between the states of the tive in opposing the cyber criminals in this area.
Western Balkans is necessary inorder to prevent Theregore we suggest the creation of the new au-
such situations. Having in mind the aforemen- thorities, as follows:
tioned it can be concluded that, regardless of po- 1. Special, highly specialized police units
litical differences that burden the relation between which could closely cooperate:
the countries of Western Balkans, it is necessary ○ In collection, creation and analytical
to establish an organized, systematized and con- processing of information on cyber;
tinuous cooperation of the competent services of ○ In operative support to the operations
the Western Balkans countries, i.e. removal of the that are implemented;
borders in the fight against cyber criminal. This is ○ In forming, maintaining and
primarily because the important characteristic of development of informational system
the cyber space is global and transnational scope, which would enable the import, use
beyonf the teritorial control of national states. and analysis of the data on the people
The first tep towards the more successful fight convicted or suspected as perpetrators
agains the undesirable notion in the form of cy- of criminal activities of cyber criminal,
ber criminal is the adoption of the Declaration on as well as on the deeds;
enhancing the cooperation in the fight against the ○ In securing the technical support to the
cyber crime.Then it is necessary to implement the criminalistics investigations of the police
European normative standards in the national laws and the aid in highly specialized experts
of the states of the Western Balkans in the unique in other countries, the contractors
manner, so that they will be able to effectively op- ○ In planning the mutual actions at the
pose this type of criminal. Further on, the coopera- operating level
tion of the all levels of the police services in the re- ○ In establishing close cooperation with
gion is necessary.This would mean that the police EUROPOL through the states that are
departments from the region should intensify, to already the members of EUROPOL.
strengthen and enhanse their further cooperation
in the different areas of cyber criminal, taking into In order to achieve its goals, such police
consiferation the state legislation and international units could collect, modify and use the data
legal instruments, but also to proceed with their from other files that are intended for special
communication through regular consultations analyses, which relate to:
(e.g. on the monthly basis). ○ Persons convicted for cyber crime, as
In the further development the moduls of com- well as the persons who are reasonably
mon trainings for the members of the judicary and suspected to have committed the crimes.
representatives of the law enforcement agencies in ○ Persons who could be invited to testify
the area of cyber criminal. These should be held in investigations of cyber crime offenses.
on the regular basis. ○ Persons who have been the victim of an
Having in mind the positive experience of the act that is subject to processing or those
Europol’s activities in the fight against organized that are trustworthy based on the facts to
crime and terrorism,which is the dominant form be the victims of such criminal act.
of cooperation of national police services of the ○ Informers, collaborators and persons
Member States of the European Union, we pro- who can provide the information on
pose the similar forms of the joint fight against cy- cyber crime offenses that are subjects of
ber criminal in the Western Balkan states. criminalistics processing.
the consewuences of unsynchronization and non- 10. Spalevic Z, Bjelajac Z, Pocuca M. „Terrorist Ac-
compliances of the regulations. tivities and Internet Government with Focus on
Importance of Prevention within a Family”, TTEM
Unification and harmonizatin, as well as the ef-
journal, ISSN 1840-1503, 2013; Vol.8. No.1: pp.
fective international cooperation is the direction in 50-62.
which it has to go in combating the cyber crime,
because if the crime crosses all the boundaries, 11. Criminal Code of The Republic Serbia, Official
this must be done by the law and order, according Gazette of The Republic of Serbia, No. 58/4, 85/05,
115/05, 46/06, 49/07, 85/ 2005, 88/2005 - ch.,
to the Kofi Atta Annann, former secretary general 72/2009 and 111/2009.
of the United Nations, as the only effective way of
fighting against this negative phenomenon. 12. Criminal Code of The Republic Srpska, Official
Gazette of The Republic Srpska, No. 49/03, 108/04,
37/06,70/06, 73/10.
References
13. Criminal Code of The Federation Bosnia and Her-
1. Jaishankar K. “The Future of Cyber Criminology: zegovina, Official Gazette of The Federation Bosnia
Challenges and Opportunities”, International Jour- and Herzegovina, No. 36/03, 37/03, 21/04, 69/04,
nal of Cyber Criminology, ISSN: 0974-2891, 2010; 18/05, 42/10, 42/11.
Vol. 4, Issue 1&2(Combinated Issue): pp. 26-31.
14. Criminal Code of The Republic Slovenia, Official
2. Besic C, Sedlak O, Grubor A, Ciric Z. “Measurement Gazette of The Republic Slovenia, No. 95/2004,
model for assessing the diffusion of e-business and 55/2008, 66/2008,39/2009.
e-marketing”, TTEM journal, ISSN 1840-1503, 2011;
Vol.6. No.3: pp. 651-656. 15. Criminal Code of Republic Croatia, National News-
papers of The Republic Croatia, No. 110/97, 27/98,
3. Morion NE. “The Council of Europe’s Cyber Crime 50/00, 129/00, 51/01, 111/03, 190/03, 105/04,
Treaty: An Exercise Symbolic Legislation”, ISSN: 84/05, 71/06, 110/07, 152/08, 57/11.
0974-2891, 2010; Vol. 4, Issue 1&2 (Combinated
Issue): pp. 699-712.
Corresponding Author
4. Swire P, “Elephants and Mice Revisited : Law and
Zaklina Spalevic,
Choise of Law on the Internet”, University of Penn-
Faculty of Law for Economy and Justice,
sylvania Law Review, ISSN: 0041-9907, 2005; Vol.
University Business Academy,
153, Issue 6: pp. 1975-2011.
Novi Sad,
Serbia,
5. Smith GR, Grabosky NP, Urban FG. “Cyber crimi-
E-mail: zaklinaspalevic@ymail.com
nals on trial, defining and mesuring cyber crime”,
ISBN: 9780521840477, New York: Cambridge Uni-
versity Press, 2004.
investigated area in Serbia. Due to a lack of raw portion of the catchment area (Figure 2). Links
materials and the inability to import them, the ap- between these swallow holes and the spring have
plication of agricultural fertilizer was reduced, been identified and confirmed on several occa-
several industries all but ceased to operate, and sions (Figure 2) [5].
there was a considerable decrease in the use of all
types of vehicles due to a shortage of motor fuel.
The maximum, minimum and average annual The number of rainy days during the year (N),
NO3- concentrations in the springflow, recorded the total annual precipitation (P), and the mean
from 1991 to 2002, are shown in Table 1. Aver- and maximum NO3- concentrations in precipita-
age annual NO3- concentrations are also shown by tion by year are shown in Table 2. Mean annual
means of histograms in Figure 4. NO3- concentrations are also shown by means of a
histogram in Figure 5.
are roughly 67% of the nitrate concentrations of where: x1 is the average value of Sample 1, and
the first sample, or 1/3 lower, while the standard
deviation of the second sample is approximately x2 is the average value of Sample 2
1/3 lower than that of the first sample. There was
also a considerable decline in NO3- concentrations s x2 s x2
sx −x = 1
+ 2
...................... (2)
after 8 August 1992 (second sample). Addition- 1 2
n1 n2
ally, the longer the rain-free period between two
rainfall events (looking at t ³ 5 relative to t ³ 1), the s x 1 is the standard deviation of Sample 1; s x 2
more likely the NO3- concentration in precipitation is the standard deviation of Sample 2; n1 is the to-
on the first rainy day is to grow - by 20% (first tal number of data points for Sample 1; and n2 is
sample) and 16% (second sample). The variation the total number of data points for Sample 2.
in standard deviation is similar. The standardized variable z has a normal dis-
tribution N(0.1). With the zero hypothesis H0 we
assume that the average values of the selected
samples are approximately equal:
H 0 : x 1 ≈ x 2 .............................. (3)
Figure 6. Bar graph of nitrate concentrations in where z is the standardized variable and a is
precipitation (average values) the significance threshold.
Where a = 5% , it follows that the zero hypoth-
esis H0 is acceptable if
Table 5. Statistical parameters of average preci- Table 7. Statistical parameters and results of ni-
pitation levels trate ion concentration homogeneity tests for the
First period Second period first rainy day, where the rain-free interval betwe-
en two rainfall events was one or more days
P = 6.4 mm P = 7.0 mm First period Second period
s = 8.2 mm s = 7.7 mm
Cv = 1.271 Cv = 1.242 N O 3 = 1 0 . 315 N O 3 = 6 .9 2 9
mg/dm3 mg/dm3
C s = 2.848 C s = 3.253 s = 7.430 mg/dm3
s = 1 1. 5 31 mg/dm3
n = 572 n = 647
n = 294 n = 325
s x −x = 0.513
1 2 s x −x = 0.789
1 2
Table 6. Statistical parameters of average nitrate Table 8. Statistical parameters and results of ni-
concentrations in precipitation trate ion concentration homogeneity tests for the
First period Second period first rainy day, where the rain-free interval betwe-
en two rainfall events was two or more days
N O 3 = 8 .9 8 3 mg/dm3 N O 3 = 6 .4 9 8 mg/dm3 First period Second period
s = 1 0 . 2 7 4 mg/dm3 s = 6.772 mg/dm3
Cv = 1.144 Cv = 1.042 N O 3 = 1 0 .4 0 7 mg/dm3 N O 3 = 7 .1 4 8 mg/dm3
C s = 2.243 C s = 2.512 s = 1 1.800 mg/dm3 s = 7.806 mg/dm3
n = 572 n = 647 n = 249 n = 271
s x −x = 0.505 s x −x = 0.885
1 2
1 2
Analyses of average precipitation levels Table 9. Statistical parameters and results of ni-
showed that the population is the same, while trate ion concentration homogeneity tests for the
Fisher’s test was on the borderline of unacceptable first rainy day, where the rain-free interval betwe-
variance uniformity. en two rainfall events was three or more days
The test of average nitrate ion concentrations First period Second period
in precipitation indicated a high variance non-uni-
formity. N O 3 = 1 1.19 5 mg/dm3 N O 3 = 7 . 3 6 3 mg/dm3
The homogeneity of the time periods was also
s = 1 2 . 5 8 7 mg/dm3 s = 8.137 mg/dm3
analyzed, using samples with marked nitrate ion
concentrations on the first day of rainfall, where n = 211 n = 231
the rain-free interval between two rainfall events
s x −x = 1.019
was 1 day or more, 2 days or more, and 3, 4 and 1 2
5 days or more. The results of these analyses are − 1.9 6 < z = 3 7 6 2 < 1.9 6 (not acceptable)
shown in Tables 7, 8, 9, 10 and 11.
F = 2.393 < F1−a = 1.100 (not acceptable)
Table 10. Statistical parameters and results of ni- absorb airborne nitrogen oxides originating from
trate ion concentration homogeneity tests for the nearby agricultural and industrial centers. When
first rainy day, where the rain-free interval betwe- infiltrated into the ground, they additionally dis-
en two rainfall events was four days or more solve nitrate ions from the ground.
First period Second period The statistical evaluation of a database gener-
ated over one decade of observations and measure-
ments conducted at Petnica (western Serbia) clearly
N O 3 = 1 1. 5 31 mg/dm3 N O 3 = 7 . 7 7 7 mg/dm3
shows that there was a significant decline in nitrate
s = 13. 013 mg/dm3 s = 8.660 mg/dm3 ion concentrations in groundwater and atmospheric
n = 159 n = 184 precipitation in mid-1992. This was certainly the
result of an unintended environmental experiment,
s x −x = 1.214
1 2 occasioned by a trade embargo imposed against a
portion of the former Yugoslavia which included
− 1. 9 6 < z = 2 . 9 8 5 < 1. 9 6 (unacceptable)
the investigated area in Serbia. The period of time
F = 2.258 < F1−a = 1.100 (unacceptable) during which lower nitrate ion concentrations were
recorded lasted until the end of 1997.
Table 11. Statistical parameters and results of ni- The homogeneity and uniformity analyses of
trate ion concentration homogeneity tests for the karst springflow and precipitation series indicated
first rainy day, where the rain-free interval betwe- that they belong to the same population, and that
en two rainfall events was five days or more the series of nitrate ion concentrations in precipi-
First period Second period tation and groundwater do not belong to the same
population.
N O 3 = 1 2 . 4 6 3 mg/dm3 N O 3 = 8 .0 6 7 mg/dm3 The homogeneity of the time periods was also
analyzed, using samples with marked nitrate ion
s = 13.793 mg/dm3 s = 8.851 mg/dm3
concentrations on the first day of rainfall, where
n = 126 n = 145 the rain-free interval between two rainfall events
was 1 day or more, 2 days or more, and 3, 4 and
s x −x = 1.432
1 2 5 days or more. The results of these analyses are
− 1. 9 6 < z = 3. 0 7 0 < 1. 9 6 (unacceptable) shown in Tables 7, 8, 9, 10 and 11.
Corresponding author
Petar Papic,
University of Belgrade,
Faculty of Mining and Geology,
Belgrade,
Serbia,
E-mail: ppapic@rgf.bg.ac.rs
periodic financial statement perspective [13]. This visibility within the organization to ensure coordi-
role of short-term financial performance measure- nation, inspire action and enhance communication
ment became inadequate for the new reality of considered essential to learning [15]. By providing
companies. Kaplan [14] stressed the crucial impor- and measuring information on critical uncertainties,
tance of non- financial indicators, which are based top managers help focus attention and efforts to-
on organizational strategy, include key measures ward those uncertainties. The discussions, debates,
of success, and are perceived as immune from the action plans, ideas and tests throughout the organi-
various shortcomings of financial measures. zation foster learning that encourages the gradual
From a cybernetic perspective, the use of MCS emergence of new strategies and tactics. More than
is associated mainly with control of accomplish- just being a diagnostic system, performance mea-
ment of objectives and strategy implementation. surement also represents an interactive device [6].
The application of cybernetic concepts to control Performance measurement contributes to strat-
processes is coherent with Anthony’s [7], i.e. clas- egy formulation and implementation by reveal-
sical, approach to management control. Tradition- ing the links between goals, strategy, lag and lead
ally, control systems have emphasized objective- indicators [16] and subsequently communicates
oriented measures, and performance measurement and operationalizes strategic priorities [17]. Per-
has become associated with a negative feedback formance indicators and their creation comprise
model relying on detection of variances when the the core of debates over performance measure-
planned objectives and the measured actual results ment. Today, the perceived limitations of tradi-
are compared. The concept of MCS in cybernetic tional accounting-based measures are numerous
view is thus implicitly linked to the notion of di- and well-known [18], [19]: they are too historical
agnostic control systems [6] described as formal and “backward-looking”; they lack the predictive
feedback systems used to monitor organizational ability to explain future performance; they reward
outcomes and correct deviations from preset stan- short-term behavior; they lack timely signals;
dards of performance. Within traditional MCS, the they are too aggregated and summarized to guide
focus and resources are fully devoted to managing managerial action; they reflect functions instead
the external financial accounting information [13]. of cross-functional processes; they give inade-
The holistic view of MCS follows the exten- quate guidance to evaluate intangible assets. The
sion of the cybernetic model. Specifically, perfor- emphasis of the cybernetic view on the financial
mance measurement is seen as fostering learning. information has led to distortion in product cost-
Otley [12] introduces a performance management ing, inadequacy of control information and the
framework that is designed to go beyond the mea- absence of long-term performance measures [13].
surement of performance and clearly represents the The information developed for external users is
essence of the holistic view. The framework is basi- inadequate and insufficient for internal users.
cally grounded in a cybernetic approach where the Nonetheless, non-financial measures are also
following apply: stakeholder interests determine problematic. Ittner and Larcker [20] have identi-
the organizational key objectives; strategies and fied five primary limitations. First, time and cost
plans are adopted, and the processes and activities has been a problem for some companies. They
required are identified; performance is measured have found out that the costs of a system tracking
and rewarded; feedback is provided. However, the a large number of financial and non-financial mea-
latter step gives precedence to the learning process sures can be greater than the benefits. The second
that is enhanced by the opportunity to revise inef- drawback is that non-financial data are measured
fective strategies and foster the emergence of new in many ways, and there is no common denomina-
ones. Thus, obsolete paradigms and organizational tor. The third downside refers to the lack of causal
attempts can be uncoupled (i.e. unlearning) and links. Many companies adopt non-financial mea-
coupled in a different way (i.e. learning). sures without articulating the relations between
In order to stimulate learning and contribute to the measures. Fourth problem related to non-fi-
strategy formulation, performance measurement nancial measures is the lack of statistical reliabil-
systems focus attention on strategic priorities, create ity - whether a measure actually represents what
it purports to represent, rather than random mea- company Trimo was chosen as the subject of this
surement error (e.g., many non-financial data such research study. This company was often targeted as
as satisfaction measures are based on surveys with an excellent prospect for its manufacturing excel-
a small number of respondents and questions). lence, MCS, performance measurement, customer
Finally, although financial measures are unlikely relations, and organization of work in several pro-
to capture fully the many dimensions of perfor- fessional literatures. Further, the company and its
mance, implementing an evaluation system with Managing Director (MD) have received a lot of rec-
too many measures can lead to measurement dis- ognized awards for excellence. Trimo, as the case
integration, i.e. managers may follow a variety of study company, was drawn from Slovenia’s metal
measures simultaneously, but fail to monitor the processing industry. Trimo’s products and services
main drivers of success. are used mainly in the construction industry.
To summarize, the holistic view considers the Trimo provides a valuable research site for the
importance of both financial and non-financial following reasons. First, it is a leading player in an
measures as well as several factors and contexts industry which is highly competitive and increas-
that may affect their use and mix. Grounded in ingly globalized. Second, Trimo seeks to maintain
a contingency approach, the group of studies re- this leading position by drawing on the creativity
veals different factors or contexts that may affect and innovations of its employees. Third, initial in-
the mix and use of financial and non-financial vestigations confirmed that Trimo’s top manage-
measures (for a detailed discussion of contingency ment seeks to control strategic activity within the
factors see [1]). This paper focuses on the interac- company through a range of MCS.
tive use of MCS as defined by Simons [6] in his Data were collected through direct observation,
levers of control framework that corresponds to semi-structured and informal interviews with key
the holistic view of MCS. players (informants), and a review of internal and
external documents and articles (as suggested by
3. Methodology [23], [24]). This enabled us a systematic and com-
prehensive analysis. An initial interview protocol
We conducted a case study to investigate im- was developed to ensure that evidence would be
plications of MCS for performance management. collected on participants’ views related to their
We decided to use a case study as the strength of experiences and opinions on the MCS. Interview-
this method is the likelihood of it resulting in a ees were allowed to freely explore issues that they
new or upgraded theory [21]. In Otley’s [22] view, believed were important. Interviews were tape-re-
intensive, field-based methods are much more corded and transcribed to ensure accuracy. Where
likely to pick up on the wide variety of control this was not permitted we took detailed notes dur-
mechanisms deployed by organizations in practice ing the interview which we wrote up on the same
and to ground theoretical development firmly in day. In a number of cases, we did follow-up inter-
empirically observed practice. Ittner and Larcker views with managers to develop further insights
[20] argue that field-based research may be the into how employees and the organization respond-
only way to truly understand the antecedents and ed to the changes that were occurring in the period
consequences of management accounting practic- from 1992 to 2004. We supplemented data from
es. What practice-oriented research can contribute these interviews with informal conversations,
is the ability to refine the theories and empirical e-mail correspondence, and extensive archival
tests based on acquired knowledge. records (including access to internal MCS docu-
The criteria for selection of the industry and ments covering budgets, performance measure-
the research site included a dynamic competitive ment documents, reports related to performance
environment, an advanced technology base, the evaluation, Trimo’s code of conduct and mission
adoption of a TQM philosophy and its operation- statements, and publicity material). Additionally
alization through continuous improvement process we examined publicly-available data including in-
(CIP), strategy and MCS change, and management formation from the organization’s web site, other
commitment for an in-depth field study. Slovenian promotional material and evidence from second-
ary sources including newspaper articles and oth- multiple sources of evidence were used, establish-
er media information. During visits to the organi- ing a chain of evidence. Also, the draft case study
zation we were able to directly observe facilities, report was reviewed by key informants to increase
working conditions and to some extent the way in construct validity [27]. The use of multiple sources
which interviewees conducted their work. It was of evidence enabled verification through triangula-
mutually agreed upon with the MD and other top tion, which is the strength of case research [28]. A
managers which detailed company information is major concern of the present study was to triangu-
allowed to be included in the research results. Top late managers’ views and opinions with “harder”
managers as key respondents agreed to assume re- evidence, such as that obtained from documents
sponsibility for the review of the final draft of the and archival records. An interview protocol ensured
research results for accuracy and completeness. that the same themes were covered with each inter-
Consistent with Ahrens and Chapman [3] and viewee. Interview data were continually cross-ref-
Free [25], we employed Eisenhardt’s [21] methods erenced with other data sources and cross-checked
to conduct case research. This involved arranging with the chronology of activities and events that
the data chronologically and identifying common took place during the course of the study. This form
themes and unique insights and also areas of dis- of triangulation enhanced the internal validity and
agreement or conflict. We also used archival re- reliability of the case study material.
cords, particularly mission statements, program The notion of external validity for case method-
documentation and internal MCS documents, to ology relates to the generalizability of the results to
elaborate and refine our understanding of impor- the underlying theory. Case studies are generaliz-
tant issues that arose in interview discussions. We able to theoretical propositions and not to popula-
then re-organized the original transcripts around tions. Therefore, this paper’s goal is to expand and
key events and issues; and compared emerging generalize theories (i.e. analytical generalization)
findings from our study with existing research. and not to enumerate frequencies (i.e. statistical
Emerging findings and themes were noted, par- generalization). The generalization in this study
ticularly for further discussion and clarification is to the underlying theory of MCS implications
as part of our follow-up interviews with managers for performance management. Therefore, the in-
and a number of operational employees. depth explanatory case study method enables gen-
The quality of this research is established using eration of exhaustive data on the use of MCS to
four tests common to all social science methods yield much more insightful theories to be further
[26]: construct validity, internal validity, external the basis for the learning of other companies. The
validity, and reliability. Construct validity refers goal is to build a new theory or to upgrade the ex-
to establishing correct operational measures for isting one based on the empirical findings.
the concepts being studied. The major threats to With reliability of this study it is demonstrated
construct validity are those created by bias either that the operations of a study (e.g. data collection
through the process of observing itself or bias in- procedures) can be repeated, with the same results.
troduced by the observation method. The ques- We recorded accurately what interviewees said as
tionnaire used and the semi-structured interviews the interviews were recorded when allowed and
were carefully constructed and contained ques- then transcribed before being finally reviewed
tions to elicit information required to investigate again using both digital records and transcripts.
research question and as such, it is assumed that
construct validity is high. 4. Results
To avoid possible misunderstandings, respon-
dents were provided with descriptions of four le- Trimo’s history begun in 1961 when the com-
vers of control from Simons’ [6] definitions, trans- pany “Kovinsko podjetje Trebnje” was founded, as
lated into Slovene. A particular control system was socially-owned enterprise. The next year saw the
deemed to exert a particular influence only if this beginning of another new company, this one called
effect could be traced to at least three-quarters of “Kovinooprema”. In 1971, both companies and
respondents. When undertaking our case study, some smaller companies merged to form “Trimo
Trebnje”. The main activity of the new company Trimo builds its strategy of long-term growth of the
was production of metal elements and equipment company on internationalization [31]. As a result of
made of stainless steel. In the following years, the a successfully implemented turnaround, Trimo has
former Yugoslavia and third world countries had made significant improvements in the way it runs
many infrastructure and other projects, creating its business that results in the performance increas-
a high demand for Trimo’s products. The 1980s, ing year by year. In the period from 1992 to 2004
however, brought crises in the export markets and revenues and value added per employee grew seven
the company faced its first major challenge. It re- times, export grew eight times and the number of
sponded with the modernization of the production employees decreased by 21 per cent [32].
line and the introduction of new fireproof products. There was a huge effect of strategic change from
Before modernization, Trimo used polyurethane as defender to prospector [33] on the decision con-
the filling for the building panels. After modern- text in Trimo. The change process created a con-
ization, they have used environmentally friendlier text where decision-making by top management
fireproof mineral wool that enables them to pen- became increasingly complex and unpredictable
etrate to more demanding markets. For a short time as new opportunities altered strategic objectives.
it seemed that the company overcame its problems This created a level of uncertainty for subordinates
but in 1991 Slovenia became independent and the as to the priorities on which to focus their atten-
former multiethnic state of Yugoslavia fell apart. As tion. In addition, the technological and production
Trimo lost the majority of its domestic (former fed- changes associated with changes in product mix
eral) market it had to suddenly re-orientate towards and with new product development, required that
more competitive foreign markets, especially in new routines be learnt. The basic business concepts
the European Union, and the emerging Central and of continuous improvement, quality, and customer
Eastern European markets. satisfaction were the key strategies’ components for
As Trimo encountered many problems at the be- the company’s turnaround. The drivers of change
ginning of the 1990s, a true company turnaround for renewal from 1992 on were manufacturing
was needed and that also meant the need for a new excellence, responsive product development, and
vision and a different approach to developing and extensive “building” of sales network. Trimo’s
implementing business strategy. The major turn- turnaround is a result of the following [31], [34]:
around of the company was achieved in 1992 when dedication of each employee to the continuous
new top management was appointed. Today, Trimo improvement of the business; development of the
is a joint-stock company with € 42,222 value added highest quality product possible; the improvement
per employee, internationally-oriented with almost of both internal and external relationships to main-
65 per cent of exports, mainly in Europe, operating in tain customer satisfaction.
48 countries [29]. Their main products include pre- In Table 1 we show the chronological devel-
fabricated steel buildings, steel structures, façades, opment of elements that have influenced MCS in
roofs, containers and sound-isolating systems. Tri- Trimo. Key elements of the transformation pro-
mo’s main product is called “complete solutions” cess from 1992 on were the clear vision and busi-
and includes a mix of all the products and services ness strategy set at the beginning. This vision and
Trimo offers, from an idea and draft to the finished strategy have been successfully communicated to
building. When looking into Trimo’s production all employees. Cleary defined values and norms as
program, there is no similar company in Slovenia. building blocks of Trimo’s culture helped to shape
Trimo is the market leader in the area of roofs and employee behaviour to fit the new business phi-
façades from mineral wool panels in west and cen- losophy of customer orientation, continuous im-
tral Europe and in the area of steel constructions in provements and TQM. The formalised processes
Slovenia. With its business orientation towards of- of continuous improvements, TQM key files, and
fering complete solutions and with a broad produc- care for company property gave employees clear
tion program, Trimo cannot be directly compared tasks and responsibilities. Top management has
to any of its competitors that are all manufacturers managed to spread the need to change through
with relatively focused production programs [30]. constant communication and employee training.
Table 1. The chronological development of elements that have influenced MCS in Trimo in the resear-
ched period (1992 – 2004)
Year / Period Description of the particular element influencing the development of MCS in Trimo
Trimo pursued a defender strategy. It was a company with a relatively narrow production-oriented
business scope. They paid primary attention to improving the efficiency of their existing operations
and offered more limited products than competitors, and competed especially through costs. They
Early 1990s
engaged in little product and market development. At the beginning of the turnaround, the company
looked at the fundamental question: “What are we really about? – the essence of Trimo”, as they
strived to set up their vision, mission and strategy in 1993.
Trimo has begun to pursue a prospector strategy, continually searching for market opportunities,
and regularly experimenting with potential responses to emerging environmental trends. They
have become strongly focused on product and market development, but still considering costs as
prices of their inputs, especially raw materials, vary a lot. Trimo’s strategy can be characterized as
Since 1998
differentiation strategy focusing on creating a product or service that is perceived by customers as
something unique. When Trimo was in defender stage, it used control systems less intensively than
in prospector stage, when they attach a great deal of importance to forecast data in control systems,
setting tight budget goals, and monitoring outputs carefully.
Trimo achieved the breakthrough in its internationalization causing the business to expand. They
1998 stated a new vision in 1998 very ambitiously: “To become the leading producer of pre-fabricated
buildings in Europe by 2010”.
Trimo redefined its vision even more ambitiously to “…become the leading European company
offering complete solutions in the area of steel buildings”. From 2001, the product that differentiates
2001 Trimo from its competitors has been called “complete solutions” that Trimo provides to its customers.
Although Trimo is a manufacturing company, services (design, projecting, technical service) play
very important part in providing the complete solution to their customers.
Trimo’s decision to transform itself from a simple (production) company to the highly technological
and engineering company began to show results. The share of low-educated employees has been
falling, while the share of the highly educated people has been rising. In 2002, each employee had
around 50 hours of education and training.
2002
Trimo started to implement Balanced Scorecard (BSC) and upgraded Total Quality Management
(TQM) program, which has been the important part of strategic directions of the company from
1992 on. The main novelty was introduction of “Key Files”* as the tool they use for facilitating
process improvements.
Trimo launched a new production line for fireproof façade panels to expand the existing selection
2003
of façade panels with a new environmentally-friendly product.
European Foundation for Quality Management (EFQM) recognized Trimo for excellence.
2004 Production capacities were increased and production flexibility improved to accommodate the
enormous product range, which prompted the construction of a new warehouse for raw materials.
The emphasis is on the learning organization. Mission of the company is to facilitate original
and complete solutions in the area of steel buildings. The mission reflects itself in the following
stakeholder approach directions: To assure customers an increase in effectiveness by successful
From 2004
accomplishment of solutions; To develop the potentials of each individual within the company;
on
To build a financially strong company that delivers adequate ROE growth of the company to the
shareholders; To be sensitive to the environment and aware of the need to protect it for future
generations and to support different social and environmental activities.
Notes: * TQM program has been the important part of strategic directions of the company from 1992 on. “Key Files” is the tool
they use for facilitating process improvements. They are facilitated by 28 TQM promoters, who are usually prospective young
employees. Promoter motivates other employees in improving the processes. Each process improvement is monitored and eva-
luated through a “key file” with preset targets and savings estimations. The achieved results with regard to key files are monito-
red monthly by TQM promoters team and are presented quarterly at the Management board meeting.
Sources: [30], [35].
In Trimo, they monitor the achievement of stra- heading. They use BSC from 2002, although they
tegic goals every six months, while the implementa- have measured their performance from financial
tion of annual plans is controlled weekly. Corrective and non-financial perspective before. At the mo-
measures are taken as soon as negative deviations are ment, they are striving to form efficient functional
reported. Employees are informed about the com- BSCs. They want to focus especially on reducing
pany’s results in weekly or bi-weekly departmental the number of measures they are currently using.
meetings, in weekly newsletter (on one page), in Although the system is well organized, it hasn’t
quarterly company’s magazine, and at annual edu- yet received the full “buy-in” of some managers as
cation days where the MD presents last years’ re- they are still using parallel systems designed in the
sults and future plans. Trimo modifies its strategy past. As this is maybe allowed in “transition” pe-
according to the changes in its environment. They riod of applying new performance measurement
have very good experience with flexible actions as systems, it must not be tolerated when new ERP
they managed to continually reach or even exceed system will be completely implemented.
short- and long-term goals in the last decade. They One of the major conclusions with regard to
remain focused on their customers’ needs. Critical Trimo’s strategy is that MD’s leadership style is
success factors that have to be addressed for achiev- a very important determinant of Trimo’s success-
ing competitive advantage are people, customers, ful implementation of the strategy. She is very
value added, and environment [36]. charismatic and capable of mobilizing employees
Trimo began implementing strategic perfor- towards achieving common goals. When looking
mance management in the prospector period when into the classification that distinguishes transac-
it realized the importance of aligning all levers tional and transformational leadership styles [38],
of control [6] in the company, so what is critical we conclude that she is a true transformational
to the company’s success is regularly evaluated leader with the following characteristics:
and rewarded by using key performance indica- – She is a leader of innovation.
tors (KPIs). KPIs are used by top management – She motivates people to create change.
to monitor performance in key strategic areas, as She uses authority and power to inspire
defined by key processes in the company. There and motivate people to trust and follow her
are 62 KPIs [35]. 28 of them are included in BSC. example.
In Trimo, managers consider KPIs once a week at – She formulates an inspiring vision,
the Management board meeting.In diagnostic con- facilitates the vision, encourages short-term
trol, managers use management-by-exception ap- sacrifices, and makes pursuing the vision a
proach when discussing the reports at the weekly fulfilling venture.
Management board meetings. As Quality Assur-
ance Director [37] says: “Reports contain explana- MD’s characteristics of transformational leader
tions for KPIs variances and whether they present were essential in the period of strategic change
problems or not”. Only problems (i.e. deviations) from defender to prospector strategy. She as a
are discussed and appropriate actions taken. That transformational leader (and of course by the help
the changes trigger revised action plans is reflected of whole top management team) managed to alter
in the following Quality Assurance Director state- the existing structure of early 1990s and influenced
ment [37]: “In the weekly meetings in which we people to buy into a new vision and new possibili-
discuss KPI for each organizational unit (sector) ties. Based on observations it is concluded that her
specific decisions are made about what actions we primary focus since 1992, when she took a manag-
have to take in case of deviations”. Trimo’s main ing director position, has been to create a change
performance indicator is value added per employ- process continually causing people within the or-
ee. This clearly shows that Trimo is focused on its ganization to learn and grow. She builds shared
future development and growth. vision and goals and implements them through
Trimo uses balanced measurement systems teamwork and high commitment. Trimo’s man-
as a means of communicating to their employ- agement believes that fast and open flow of infor-
ees what is important and where the business is mation, ideas and efficient problem-solving are of
key importance to follow new trends in business by upgrading it to ERP system enabling them to
and for implementing all the necessary changes. monitor key performance information in real time.
Most of the Trimo’s practices are congruent Performance measurement systems assist manag-
with those usually described at prevailing best ers in tracking the implementation of business
practices: extensive training and communication, strategy by comparing actual results against stra-
decentralized decision making, teamwork and tegic goals and objectives [40].
employee involvement in problem-solving. These In the following paragraphs, the basic compo-
practices help Trimo to build their competitiveness nents of the refinement of the existing theory on
through people which is also the underlying prin- implications of MCS for performance manage-
ciple of Trimo’s culture. As such, their approach is ment are presented (see: Figure 2). Considering
difficult to imitate and thus presents a true sustain- the diffusion of the use of MCS in Trimo, the con-
able source of competitive advantage. clusion is drawn that this company does not fit in
the frames of recent research results in Slovenian
5. Discussion companies that traditional management tools are
dominating the more recently developed and more
When looking the whole 1992-2004 period, strategic-oriented practices [41]. Also, when con-
the study’s results suggest that Trimo’s change sidering the 1992-2004 period, the trend seems to
from the cybernetic to holistic view of MCS (see: be towards increasing use of the latter type. The
Figure 1) resulted in improved outcomes, as they findings of the study indicate that Trimo system-
responded to changed business conditions by al- atically uses comprehensive MCS information
tering structural arrangements within the organi- and practices. Trimo began implementing strate-
zation. The change from the cybernetic to holistic gic performance management in the prospector
view of MCS corresponds to the strategic change period when it realized the importance of align-
as Trimo moved from the defender to become the ing all levers of control in the company, so what
prospector [39]. Strategy change had a positive is critical to the company’s success is regularly
relation to Trimo’s performance. and also to the evaluated and rewarded by using KPIs. Hence, in
increasing use of comprehensive MCS. the discussion of theory refinement proposals we
focus on companies pursuing prospector strategy
orientation, operating in uncertain environment,
producing innovative customized products with
advanced technologies; all these characterize to-
day’s complex business environment.
First, this study upgrades the existing theory in
that it not just establishes a relationship between
contextual and MCS variables, but also consid-
ers how this relationship impacts on performance.
It is argued that managers and other employees
need to display performance-driven behavior for
efficient and effective management control to be
achieved. This research shows that the combina-
Figure 1. Change from cybernetic to holistic tion of performance-driven behavior and regular
view of MCS in Trimo use of MCS leads to improved results. We identi-
fied the following factors that positively influence
Trimo measures its performance with respect performance-driven behavior and can be used by
to the key elements of its strategy. Therefore, it other companies:
uses strategic performance management system – Employees understand the performance
[40]. They have been using such a system quite management and the meaning of KPIs.
systematically from 2002 on. Furthermore, they – Employees have a positive attitude towards
have enhanced the capabilities of their system performance management: they recognize
mal controls (e.g. accounting systems, BSC, profit 6. Simons R. “Levers of Control: How Managers Use
plans, internal controls), to provide a more com- Innovative Control Systems to Drive Strategic Re-
newal”, Boston: Harvard Business School Press.
prehensive analysis, as opposed to the majority of
1995b.
prior studies focusing on a more limited range of
controls. In this way, this paper contributes to the 7. Anthony R.N. “Planning and Control Systems: A
literature in terms of examination of the broader Framework for Analysis”, Boston: Graduate School
components of MCS than was previously done. of Business Administration. 1965.
The scope of this research is limited in the 8. Henri J. “Management control systems and strat-
following respects. First, only one company was egy: A resource-based perspective”, Accounting, Or-
studied due to depth and breadth of the research ganizations and Society, 2006a; 31(6): pp. 529-558.
project. Second, both the industry and site were
9. Merchant K.A. “Modern Management Control Sys-
selected based on the preset criteria for selection.
tems:” Text and Cases, Upper Saddle River: Prentice
Directions for future research stem from the Hall. 1998.
paper’s findings as well as from missed opportuni-
ties that indicate opportunities for future research. 10. Ittner C.D., Larcker D.F. “Assessing empirical
It would be worthwhile to conduct a longitudinal research in managerial accounting: A value-based
management perspective”, Journal of Accounting
study on a wider sample of companies to study and Economics, 2001;32(1-3): pp. 349-410.
how they use MCS and how this has impacted
their decision-making, actions and performance 11. Langfield-Smith K. “Management control systems
management. This study can combine case-study and strategy: a critical review”, Accounting, Orga-
as well as survey methods. The role of the present nizations and Society, 1997; 22(2): pp. 207-232.
study is that it provides an impetus for future re- 12. Otley D.T. “Performance management: A frame-
searchers to address these issues and to move be- work for management control systems research”,
yond existing models of control. Implications of Management Accounting Research, 1999; 10: pp.
MCS for performance management can be prop- 363-382.
erly explored and explained only when paying re-
13. Johnson H.T., Kaplan, R.S. “Relevance Lost: The
gard to both, formal and informal controls. Rise and Fall of Management Accounting”, Boston:
Harvard Business School Press. 1987.
References 14. Kaplan R.S. “Measuring Manufacturing Per-
1. Chenhall R.H. “Management control systems de- formance: A New Challenge for Management
sign within its organizational context: findings from Accounting Research”, The Accounting Review,
contingency-based research and directions for the 1983;58(4): pp. 686-705.
future”, Accounting, Organizations and Society,
2003;28(2-3): pp. 127-168. 15. Vitale M.R., and Mavrinac S. C. “How Effective Is
Your Performance Measurement System?”, Man-
2. Anthony R.N., Govindarajan V. Management Control agement Accounting, 1995; 77(2): pp. 43-47.
Systems, 12th ed., New York: McGraw-Hill Irwin. 2007.
16. Kaplan R.S., Norton D.P. “The Balanced Scorecard
3. Ahrens T., Chapman C. “Accounting for flexibility - Translating Strategy into Action”, Boston: Har-
and efficiency: A field tudy of management control vard Business School Press. 1996.
systems in a restaurant chain”, Contemporary Ac-
counting Research, 2004; 21(2): pp. 1-28. 17. Nanni A.J., Dixon J.R., Vollmann, T.E. “Integrated
Performance Measurement: Management Account-
4. Sandelin M. “Operation of management control sys- ing to Support the New Manufacturing Realities”,
tem variety in a growth firm context”, Management Journal of Management Accounting Research,
Accounting Research, 2008; 19: pp. 324-343. 1992; 4: pp. 1-19.
5. Merchant K.A., Otley D. “A review of the literature 18. Bourne M. et al. “Designing, implementing and
on control and accountability”, in: C.S. Chapman, updating performance measurement systems”,
A.G. Hopwood, M.D. Shields (eds), Handbook of International Journal of Operations & Production
Management Accounting Research, Oxford: Elsevier, Management, 2000;20 (7): pp. 754-771.
2007; 1: pp. 785-802.
19. Henri J. “Organizational culture and performance 34. Trimo “Business manual, 9th ed.” 2005c.
measurement systems”, Accounting, Organizations
and Society, 2006b; 31(1): pp. 77-103. 35. Peljhan D. “Management Control Systems for Or-
ganisational Performance Management: A Case of
20. Ittner C.D., Larcker D.F. “Empirical managerial a Slovenian Company”, Ph.D. thesis, University of
accounting research: are we just describing man- Ljubljana, Faculty of Economics. 2005.
agement consulting practice”, The European Ac-
counting Review, 2002; 11: pp. 787-794. 36. Trimo “Business Excellence Report.” 2002.
21. Eisenhardt K.M. “Building Theories from Case 37. Trimo “Interview with Quality Assurance Direc-
Study Research”, The Academy of Management tor”, 7 June. 2005d.
Review, 1989; 14: pp. 532-550.
38. Tucker B.A., Russell R.F. “The Influence of the
22. Otley D.T. “Extending The Boundaries Of Manage- Transformational Leader”, Journal of Leadership
ment Accounting Research: Developing Systems and Organizational Studies, 2004; 10(4): pp. 103-
For Performance Management”, British Account- 111
ing Review, 2001; 33, pp. 243-261.
39. Fleming D.M., Chow C.W., Chen G. “Strategy, per-
23. Marshall C., Rossman G. Designing Qualitative formance-measurement systems, and performance:
Research, 3rd ed., Thousand Oaks: Sage Publica- A study of Chinese firms”, The International Jour-
tions. 1999. nal of Accounting, 2009; 44(3): pp. 256-278.
24. Silverman D. “Interpreting Qualitative Data: Meth- 40. Simons R. “Performance Measurement and Control
ods for Analysing Talk, Text and Interaction”, Lon- Systems for Implementing Strategy”, Upper Saddle
don: Sage Publications. 1993. River: Prentice Hall. 2000.
25. Free C. “Supply chain accounting practices in the 41. Peljhan D., Tekavčič M., Kosi U. “Advances in per-
UK retail sector: Enabling or coercing co-opera- formance measurement: evidence from Slovenian
tion?”, Contemporary Accounting Research, 2007; companies”, in: Ž. Šević (ed), Accounting and fi-
24(3): pp. 1-24. nance in transition, London: Greenwich University
Press, 2006; 3: pp. 139-162.
26. Kidder L.H., Judd C. “Research methods in social
relations, 5th ed.”, New York: Holt, Rinehart and
Winston. 1986. Corresponding Author
Darja Peljhan,
27. Yin R.K. “Case study Research: Design and Meth- University of Ljubljana,
ods, Thousand Oaks”: Sage Publications. 2003. Faculty of Economics,
Ljubljana,
28. Noda T., Bower J.L. “Strategy making as iterated Slovenia,
processes of resource allocation”, Strategic Man- E-mail: darja.peljhan@ef.uni-lj.si
agement Journal, 1996;17(7): pp. 159-192.
References
Quoting references must be in a scale in which they
are really used. Quoting most recent literature is recom-