Search  English (United States) Hrvatski (Hrvatska)

innovative promotional partnership
New: Application for workshops!

The IEEE reserves the right to exclude a paper from distribution after the conference (including its removal from IEEE Explore) if the paper is not presented at the conference.

Event program
Wednesday, 5/23/2018 3:00 PM - 6:30 PM,
Leut A, Hotel Admiral, Opatija
3:00 PM - 3:15 PMOpening
Chair: Tihana Galinac Grbac  
3:15 PM - 4:15 PMInvited Lectures
Chair: Ignac Lovrek
1.M. Kušek (Faculty of Electrical Engineering and Computing, Zagreb, Croatia)
Internet of Things: Today and Tomorow 
2.D. Lučić (Zagreb, Croatia)
Regulatory Challenges Due to Implementation of Internet of Things Based on 5G Technology 
4:15 PM - 4:30 PMBreak 
4:30 PM - 5:45 PMInternet of Things and Cloud Technology
Chair: Dragan Jevtić  
1.R. Andrew (University of Johannesburg, Johannesburg, South Africa), R. Malekian (University of Pretoria, Pretoria, South Africa), D. Capeska Bogatinoska (University of Information Science and Technology “St. Paul the Apostle”, Ohrid, Macedonia)
IoT Solutions for Precision Agriculture 
In this paper, precision agriculture is set to provide higher productivity and a better use of resources when compared to traditional methods and this will result in lower costs with higher yields. A crucial activity for crop farming is water irrigation while for livestock farming it is the monitoring of animal health. This paper presents two feasibility on IoT solutions for automated irrigation and one study for automated animal monitoring. In each, the proof of concept is verified to operate under normal field conditions.
2.W. Bziuk, C. Phung, J. Dizdarević, A. Jukan (Technische Universität Braunschweig, Braunschweig, Germany)
Modelling HTTP for IoT Applications: An Analysis of Latency and Throughput 
In recent years, Internet of Things (IoT) industry has developed rapidly thanks to the rise of the smart objects and devices with processing, sensing and actuating capabilities. In order to satisfy a broad range of applications, a variety of application layer protocols has been taken into consideration, since IoT still does not have widely accepted standard protocol. One of prime candidate solutions is HTTP, as a well-known, fundamental client-server protocol and the protocol that is the most compatible with existing network infrastructure. Due to strict IoT specific requirements, however, a detailed characterization of the performance of HTTP for IoT applications is required. This paper presents a detailed analysis of throughput and latency for HTTP/1:1 with pipelining, by evaluating the impact that pipelining factor has on the latency. Based on these performance results, we analyze whether this HTTP/1:1 model should be implemented in IoT systems with significant latency constraints.
3.A. Koren, D. Šimunić (Fakultet elektrotehnike i računarstva, Sveučilište u Zagrebu, Zagreb, Croatia)
Modelling an Energy-Efficient ZigBee (IEE 802.15.4) Body Area Network in IoT-Based Smart Homes 
The rapid growth of Wireless Sensor Networks and embedded devices as well as their implementation in the context of Smart Homes opens up many possibilities for development of new solutions. However, finding a quality, energy efficient solution can be a very challenging task. In this paper, the proposed model of an energy efficient ZigBee Body Area Network is presented and tested through various simulaitons to explore and evaluate its performance in the context of IoT-based Smart Homes with the goal of providing quality solutions in the fields of both BAN and eHealth.
4.M. Pavelić, V. Bajt, M. Kušek (Faculty of Electrical Engineering and Computing, Zagreb, Croatia)
Energy Efficiency of Machine-to-Machine Protocols 
The paper provides a comparison of energy consumption for a few commonly used M2M protocols, used on energy constrained devices in M2M communication systems. It was implemented on Arduino hardware platform. Energy consumption for each protocol is measured on boards with both Ethernet and WiFi communication modules. Servers with which Arduino is communicating are all implemented on a Raspberry Pi, which also serves as an M2M gateway. Traffic is captured for each protocol on both wired and wireless interface and compared to energy consumption.
5.J. Park, B. Lee (Kyungpook National University, Daegu, South Korea)
Mobility Management for Internet of Things Environments  
Most standard mobility management protocols such as IETF Mobile IP and its variants are not suitable for Internet of Things (IoT) environments with constrained device and network characteristics. This article presents a reliable mobility management mechanism for IoT environments, called CoMP, which is based on IETF CoAP. More specifically, it extends the CON message of the CoAP protocol to reliably transmit the signaling message under unreliable IoT network environment. In addition, CoMP utilizes a separate location management server for keeping track of the changing IP addresses of the mobile sensor nodes, without using tunneling scheme. The architecture and algorithm to achieve both reliability and simplicity for IoT mobility management are proposed. Finally, performance has been evaluated by both mathematical analysis and simulation.
5:45 PM - 6:30 PMCloud Technology
Chair: Tihana Galinac Grbac 
1.O. Jukić, I. Špeh, I. Heđi (Virovitica College, Virovitica, Croatia)
Cloud based services for Internet of Things 
In this paper, a cloud-based services aimed for the connectivity, monitoring and management of the IoT devices are presented. To set up a network with a large number of devices in the constrained environment can be a challenge. Also, collecting, storing and analyzing data generated from sensors attached to the devices most often requires developing custom-made applications which imply time and cost consumption. There are several cloud providers offering IoT services that unites needed features into full solution offering connectivity between devices and the cloud, processing of data sent from devices and interaction with connected devices through the application. One of them is AWS IoT (Amazon Internet of Things) which is fully scalable, reliable and simple to use. This platform can collect data from a large number of different devices and connect them to endpoints for other tools, allowing a developer to tie received data into the independent application. Other aspects, like security, resource management, integration and centralized management are also covered. In this paper, we will evaluate the performance of the AWS IoT web services by connecting small, single-board computers, like Raspberry Pi through different scenarios.
2.R. Tanash (School of Engineering, Amman, Jordan), A. Khalifeh (German Jordanian University, Amman, Jordan), K. Darabkh (School of Engineering, Amman, Jordan)
Communication over Cloud Computing: A Security Survey 
Cloud computing is a new model that gives appropriate, on-demand access to a shared pool configurable computing resources. In cloud computing, IT-related abilities are given as a service available without requiring a deep knowledge of the underlying technologies, also, with insignificant administration exertion. The security issue turns out to be more complex under the cloud model as new measurements have gone into the issue scope related to the model architecture, multi-tenancy, elasticity, and layers dependency stack. In this paper, a survey on communication security issues over cloud computing is presented along with their proposed solutions.
3.B. Mikavica, A. Kostić-Ljubisavljević (University of Belgrade - Faculty of Transport and Traffic Engineering, Belgrade, Serbia, Belgrade, Serbia)
Pricing and Bidding Strategies for Cloud Spot Block Instances 
Cloud providers offer idle resources - Spot instances, in an auction-like mechanism. Spot instances provide a dynamic and efficient manner for renting cloud resources. However, failures are often due to Spot price fluctuations. Recently introduced variety of Spot instances - Spot Block instances, run uninterrupted for a predefined duration. In this paper, we propose a model for Spot Block prices determination. Analysis of different bidding strategies in creating Spot Blocks requests is provided. Two auction-based pricing mechanisms are analyzed: Uniform price auction and Generalized Second-price auction. Cloud provider's revenue under these pricing mechanisms is also addressed.
4.D. Lučić ( , ZAGREB, Croatia), M. Boban (Faculty of Law, University of Split, SPLIT, Croatia), D. Mileta (Polytechnic of Split, ŠIBENIK, Croatia)
An Impact of General Data Protection Regulation on a Smart City Concept 
The paper deals with a possible impact of implementation of General Data Protection Regulation on a Smart City concept in the area of electronic communications. The stake holders at electronic communications market will need to ensure full compliance with the General Data Protection Regulation. E-Privacy regulation and the directive on security of network and information systems. Rigid application of data protection and e-Privacy rules may slow down or even jeopardize roll out of the solutions for Internet of Things. The roles of national regulatory authorities have been described in the case of Republic of Croatia.
Thursday, 5/24/2018 9:00 AM - 1:30 PM,
Leut A, Hotel Admiral, Opatija
9:00 AM - 9:30 AMInvited Presentation
Chair: Željka Car 
D. Uljarević (M SAN, Zagreb, Croatia), J. Polić (King ICT, Zagreb, Croatia)
Masovno prikupljanje prostornih podataka i primjeri uporabe u poljoprivredi 
9:30 AM - 9:45 AMBreak  
9:45 AM - 11:30 AMDigital Transformation and Open Society
Chair: Branko Mikac  
1.P. Moletsane, T. Motlhamme, R. Malekian (University of Pretoria, Pretoria, South Africa), D. Bogatinoska (University for Information Science and Technology “St. Paul the Apostle”, Ohrid, Macedonia)
Linear Regression Analysis of Energy Consumption Data for Smart Homes 
Due to the population and economic growth, global demand for energy is expected to increase considerably in the coming years. A large part of the energy demand comes from energy use in buildings. Consequently, energy efficiency requirement in buildings is considered to be one of the most important goals to promote global energy sustainability. This challenge has motivated recent research in the design of smart home energy management systems based on a set of sensors that analyse how energy is consumed in buildings. In this paper, linear regression model is used to analyse energy consumption data from two real smart homes. The datasets include operational data in two homes and were collected as part of the Smart* project.
2.N. Banović-Ćurguz, D. Ilišević (MTEL a.d. Banja Luka, Banja Luka, Bosnia and Herzegovina)
Customer-Centric Culture as Enabler of Digital Transformation  
The telecommunications industry is characterized by digital transformation. In an environment of technological changes and innovative and dynamic business, becoming more customer-centric is a core business requirement for today’s customer service providers (CSPs). Improving the customer experience starts with organizational culture. Customer-centric culture can help grow revenues, improve efficiency, productivity and quality of service. This paper explores what organizational culture is, why it is important and why customer-centric internal culture is a key factor in providing quality customer service. Also, it is given a use case with directions of change from current established internal culture towards desired customer-centric focus for telecommunication market in B&H.
3.T. Dhope (Department of E&TC, G.H.Raisoni College of Engineering and Management, Pune, India), D. Simunic (Faculty of Electrical Engineering and Computing University of Zagreb, Zagreb, Croatia)
Spectrum Sensing from Smart City Perceptive  
Frequency availability while developing a city as smart city is a crucial task as the spectrum is scarce resource. We propose the use of cognitive radio for checking spectrum availability via spectrum sensing technique. We propose the use of multiple antenna technique for improving detection probability of the primary users. The detection performance is evaluated using different techniques based on energy detection method. This paper shows the unique way to detect the license user in spite of its fast moving . For performance comparison various parameters like number of sample, signal- to- noise ratio, probability of detection and multipath fading are taken into considerations.
4.A. Fahmy, R. AbdelRassoul, M. Zaghloul (Arab Academy for science and technology and maritime transport, Alexandria, Egypt)
Artificial Intelligence Application to Design Smart Portable Intensive Care Unit 
Controlling of vital signs is crucial for patients in an intensive care unit (ICU) who need safe diagnostic and restorative intrusion. The goal of personalized medicine in the ICU is to predict which diagnostic tests, monitoring interventions and treatments are necessary. The devices used in ICU should ensure accuracy, reliability and safety of needed alarms. In this study, we propose an intelligent approach based on fuzzy logic able to automatically learn the features of a patient and consequently send the required alarms. Vital Signs in ICU Patients (Blood Pressure systolic/ diastolic), Heart Rate, Respiration Rate, and Body Temperature are considered in this research work. Multisensor data synthesis (MSDS) is used to collect patient vital signs data. A Fuzzy approach is to used to process the read data and give results in sending alarm about the case, or not to send depending on the processed readings of patient vital signs. The new addressed issue in this research is considering parameters of: Patient age, gender, and previous medical status that could affect the range of normal or accepted readings. This alarm is to be sent and broadcasting, together with patient' readings in case of jeopardy, using wireless communication to neighborhood medical centers or hospitals for back response or sending ambulance. These in turn should broadcast an acknowledgment to others that it got the case.
5.M. Kuzelj, T. Dokman, J. Katalinić (Filozofski fakultet, Zagreb, Croatia)
Kibernetički napadi i krizno komuniciranje - izvještavanje novinskih portala 
Otkad su mediji proširili svoj informacijski doseg, tj. od stapanja s online platformom, sve postaje javno dostupno, a najveći publicitet odnose afere i krize. Pojava novih društvenih mreža povećava rizik od kibernetičkog kriminala, lako se dolazi do podataka i kreira kibernetički napad. Treba spomenuti i krađu identiteta, dječju pornografiju, trgovinu drogom i druge nelegalne trgovine na mreži. Informacijska je tehnologija omogućila mrežno ratovanje, a samim time i kibernetički terorizam. Medijsko izvještavanje oblikuje društvenu misao, odnosno javno mnijenje i stvara određene stereotipe. Nepotpuno i neprofesionalno prenošenje vijesti dovodi u pitanje kvalitetu informiranja javnosti. Zato je cilj istraživanja bio utvrditi na koji način hrvatski mediji izvještavaju o kibernetičkim napadima. Analiza sadržaja članaka na trima najčitanijim hrvatskim novinskim portalima, i od 1. svibnja do 31. listopada 2017. godine pokazala je da se o opasnostima unutar kibernetičkog prostora premalo piše. Nisu zadovoljeni glavni kriteriji vijesti. Rijetko se navodi koje su informacije obuhvaćene kibernetičkim napadom. Također, nedovoljno se piše o preventivnim mjerama zaštite. Što se tiče razdoblja kriznog komuniciranja, članci se najčešće odnose na razdoblje poslije same krize. Ustanovljeno je da informacijskim prazninama mediji daju nedovoljno prostora veponizaciji kibernetičkog prostora i obavještavanju javnosti.
6.I. Stupar (Ericsson Nikola Tesla, Zagreb, Croatia), P. Martinjak (Faculty of Science, Zagreb, Croatia), V. Turk (Faculty of Engineering, Rijeka, Croatia), R. Filjar (Ericsson Nikola Tesla d.d., Zagreb, Croatia)
Socio-Economic Origin-Destination Matrix Derivation through Contextualization of Material World 
An origin-destination matrix contains data about individual and group mobility in a certain spatial area. As such, an origin-destination matrix represents a great indicator of socio-economic activity and can be used in strategic planning of the observed area. In this paper we present an approach of expanding the origin-destination matrix data with the spatial data attributes hence providing a context of socio-economic activity’s source and target derived from the material world. Origin-destination matrix enriched with such context can be used to gain a better understanding of socio-economic activities in an observed area, providing an insight to their nature and cause. We deploy the proposed concept and present the graphical representation of the contextualized origin-destination matrix.
11:30 AM - 11:45 AMBreak 
11:45 AM - 1:30 PMDevelopment of ICT Systems
Chair: Stjepan Golubić 
1.M. Márton, Ľ. Ovseník, J. Turán, M. Špes (University of Technology Košice, Košice, Slovakia)
Design of Helix Antenna for 2.4GHz Applicable in FSO/RF Hybrid System 
Nowadays reached demand on communication between people in private life, work or industry area to incredible size. All of us need communicate and share information with other. Number of information grow day to day and we have to secure transmission of these informations between nodes (people, companies, devices ...) in real time. Requirements on connection are high speed of transmission, stability, availability, security and last but not least price. On the base of these requirements were designed many communication systems which used to communication through different methods of transmission. One of these systems is FSO (Free Space Optics) system. FSO system is based on principle of standard optical fibers. Atmospheric channel is used in FSO system as transmission channel. Inhomogenities in atmosphere depends on type of weather because inhomogenities represents water particles in atmosphere. Optical beam spreaded through atmosphere react with water particles. This process creates attenuation of received optical power. Implementation of RF(Radio Frequency) backup line which will be used when weather conditions are bad increase availability of FSO system. The point of this paper is design and analyse of helix antenna working in non-licensed frequency range about 2.46GHz as potential candidate for our backup RF line.
2.D. Samociuk, A. Chydzinski (Silesian University of Technology, Gliwice, Poland)
On the Impact of the Dropping Function on the Packet Queueing Performance 
To eliminate the bufferbloat phenomenon from the Internet, it is recommended to apply the active queue management in the network nodes -- for instance, by dropping packets with a probability that is a function of the queue size (dropping function). The positive effects of such mechanism on queue sizes, queueing delays, TCP flow desynchronization and inter-flow fairness have been studied in many papers. Non of them, however, dealt with the statistical structure of packet losses caused by the application of the dropping function. This structure is important especially when real-time time multimedia transmissions are considered -- such transmissions are very sensitive to consecutive packet losses. In this paper we study the impact of the dropping function on the burst ratio, a formally-defined measure of the tendency of packet losses to occur in long series. We also check the tradeoff between the burst ratio and the overall packet loss ratio, using the cost function proposed for voice transmissions. Finally, taking this tradeoff into account, we draw conclusions about best shapes of dropping functions.
3.Ž. Stepančič (Jožef Stefan Institut, Ljubljana, Slovenia), A. Krpič (Smart Com, Ljubljana, Slovenia), A. Kos, K. Koželj, D. Bobek (Elektro Celje, Celje, Slovenia), A. Savanović (Smart Com, Ljubljana, Slovenia), D. Gabrijelčič (Jožef Stefan Institut, Ljubljana, Slovenia)
Prosumer Flexibility Management in Smart Grids 
Diverse electricity consumption and distributed production present serious challenges in future smart grids. Smart grid end users can have a role of a consumer and producer at the same time. So-called prosumers are considered to play a major role in the future grid operation, management and maintenance. One of main concepts supporting this novel role is prosumer flexibility, namely an ability of the prosumers to adapt their consumption or production according to the smart grid needs. Understanding, managing and utilizing the prosumers flexibility remains a serious research challenge that needs to be evaluated and proved in practice. In this paper we will present a synergy of two research projects addressing the area of prosumer flexibility management. The horizon project Flex4Grid aims at prosumer flexibility management provisioning by using advanced information technology solutions. The national Critical Peak Tariff project enables distribution system operators to test novel prosumer flexibility management incentives in real life operation. The projects' cooperation allows to utilize modern smart grid infrastructure, boost its usage with advanced IT and evaluate prosumer flexibility management in practice. We introduce the solution conceptual model, implementation, deployment and preliminary evaluation results of a large scale pilot.
4.S. Lepaja, A. Maraj, S. Berzati (AAB College, Prishtina, Kosovo)
WLAN Planning and Performance Evaluation 
In the past, WLAN planning was coverage driven to ensure that the signal quality is satisfied in all covered areas. As the number of users with more high-throughput applications, supported by sophisticated mobile computing devices, continues to grow rapidly on the one hand and on the other hand the new high-speed IEEE802.11 based WLANs continue to have a significant wireless communication market spread, it has been recognized that capacity is equally important as coverage for the WLAN planning. In this paper WLANs capacity based planning and performance evaluation focusing on the impact of the applications throughput requirements, high-speed IEEE802.11 WLAN standards and user terminal capabilities are discussed. Performance evaluation is carried out by means of measurements, using IEEE 802.11ac and IEEE 802.11n standards.
5.T. Iliev, G. Mihaylov, T. Bikov, E. Ivanova, I. Stoyanov, A. Dinov (University of Ruse, Ruse, Bulgaria)
An Approach for More Effective Use of the Radio-Frequency Spectrum in DVB-T Single Frequency Networks 
In this paper we investigate the DVB-T SFN networks in Bulgaria. In digital terrestrial television broadcasting, the effects of multipath reception were largely suppressed by choosing of sophisticated modulation methods. In a single frequency network (SFN), multiple transmitters share one frequency, and therefore, the service coverage is determined based on those transmitters. Currently, two types of SFN are available: 1) the single-input single-output SFN (SISO-SFN); 2) the multiple-input single-output SFN (MISO-SFN) based on the modified Alamouti code. Finally an approach for upgrade to second generation DVB-T (DVB-T2) in Bulgaria is offered.
6.G. Mihaylov, T. Iliev, T. Bikov, E. Ivanova, I. Stoyanov, V. Keseev, A. Dinov (University of Ruse, Ruse, Bulgaria)
Test Cases and Challenges for Mobile Network Evolution from LTE to 5G 
According to latest researches the number of mobile users will grow more than 21% in the next five years. With this enormous growth in mobile connectivity and yet the still rapidly increasing demand for data, there is a need to accommodate such a large data communication. In this paper are presented test cases and approaches for migrating from 4G to upcoming next mobile network in Bulgaria.
7.J. Mušović (Communications Regulatory Agency, Sarajevo, Bosnia and Herzegovina), N. Slamnik, M. Hadžialić (Faculty of Electrical Engineering, Sarajevo, Bosnia and Herzegovina), F. Tanković (BS Telecom Solutions, Sarajevo, Bosnia and Herzegovina), I. Kriještorac (Faculty of Electrical Engineering, Sarajevo, Bosnia and Herzegovina)
The Analysis of Geometry, Coverage and Capacity of Heterogeneous Networks 
Mobile operators are confronted with the fact that a large portion of the calls and data transfer take place indoors. The aim of this paper is to present an analytical model for the planning and use of network resources in the heterogeneous networks (multitier, multistandard) whose topology will enable network enhancements of indoor and outdoor coverage, capacities and reliability of communication, reduction of investment costs and maintenance of the network, as well as reduction of electricity consumption. This model should set the theoretical framework in which it is possible to upgrade efficiently the existing network with the least costs of network deployment, while at the same time providing the capacity to meet user requirements in the necessary places and at the required time. Accordingly, a set of values of network resource parameters is presented as one of the main results achieved by this model. Hence, this set grasps parameters' values which enable increased energy and spectral efficiency, as well as required capacities, the satisfactory level of quality of service, and rational energy consumption within the real network in the time domain. In addition, the results include the establishment of a connection with the necessary limit values of the radio signal parameters at the cell boundaries, considering all cell tiers.
Thursday, 5/24/2018 3:00 PM - 5:15 PM,
Leut A, Hotel Admiral, Opatija
3:00 PM - 5:15 PMServices and Applications
Chair: Renato Filjar  
1.M. Filić (Faculty of Engineering, University of Rijeka, Rijeka, Croatia), R. Filjar (Ericsson Nikola Tesla d.d., Zagreb, Croatia)
Smartphone GNSS Positioning Performance Improvements through Utilisation of Google Location API 
A wide-range utilisation of Global Navigation Satellite Systems (GNSS) accross technology and socio-economic domains renders the satellite navigation one of the pillars of the modern civilisation. Tackling and mitigation of the inherent shortcomings and emerging threats to provision of robust and resilient GNSS Positioning, Navigation and Timing (PNT) services have become a research subject of the utmost importance. An open access to the GNSS positioning estimation process is fundamental for development of advanced methods for robust and resilient GNSS position estimation. Recent introduction of Google Android 7.0 revision allows for direct access to raw GNSS pseudoranges observed by smartphones. Here we address the opportunities for GNSS positioning estimation improvements, given through exploitation of Google Android Location API, in creation of bespoke GNSS position estimation process in navigation application domain of a GNSS Software-Defined Radio (SDR) receivers in smartphones. We present and validate opportunities for improvement of GNSS position estimation process through utilisation of distributed computing architectures, trusted sources of GNSS augmentation data and utilisation of GNSS positioning methods suitable for targeted classes of GNSS applications Authors are members of European GNSS Agency's GNSS Raw Measurements Task Force, and co-authored the white-paper on GNSS-related Google Android Location API applications.
2.A. Aleksić, M. Ivanović (University of Novi Sad, Novi Sad, Serbia), M. Hölbl, T. Welzer (University of Maribor, Maribor, Slovenia), M. Vidaković (University of Novi Sad, Novi Sad, Serbia)
Adding Security to the JavaScript-Based Agent Middleware SiebogJS 
JavaScript-based agent middleware frameworks are rare and the security handling of these is uncommon, since JavaScript does not have built-in security mechanisms and due to the lack of external security libraries. This paper gives possible solutions for including security in the SiebogJS, an agent middleware developed using NodeJS and thus implemented in JavaScript. It gives the end user the ability to upload agent files and execute them on the server. However, such actions can cause security problems. In order to prevent security issues, two security mechanisms were implemented and integrated into the SiebogJS: the ESLint library for the static code analysis and the Nodesentry library for securing external libraries that are required by an agent. The ESLint library is used to detect problematic code and the Nodesentry library is used for preventing an agent to execute malicious code during the runtime. In this way, malicious code execution can be prevented within an agent, both before and during the execution. This approach represents a good starting point for implementing security standards for the SiebogJS agent middleware, and therefore it is planned to use these security measures as standard security representation in SiebogJS.
3.D. Jovičić (BCC Services d.o.o., Zagreb, Croatia), R. Barišić (University College Algebra, Zagreb, Croatia)
Enterprise Architecture for Public Administration 
Informatization of public administration is a complex and long-term process that needs systematic ap-proach. The aim is to reduce the costs and increase the quality of services to citizens and the economy. The current status of public administration information systems is intertwined ar-chitecture with many isolated parts that are not intercon-nected. Strategic guidelines at the state level are the basis for achieving the goals for all public administration bodies to work on a common IT platform, along with the linked busi-ness processes and services. The concept of enterprise archi-tecture for public administration bodies can serve as a vision of the desired state and as an impulse for launching activities aimed at consolidating and modernizing the system. Since en-terprise architecture serves as a link between business and technology, it can be the basis for linking separate business units of public administration bodies into a single system, while accelerating information sharing and raising the level of availability of the required data.
4.L. Batistić, M. Tomić (Sveučilište u Rijeci - Tehnički fakultet, Rijeka, Croatia)
Overview of Indoor Positioning System Technologies 
Constant changes in the field of indoor positioning systems (IPS) dictate that we keep up with new and developing trends and technologies. With improving accuracy, IPS found widespread application in commercial environments, such as asset or personnel tracking. However, it is yet to be established in the everyday personal usage applications. In this paper, we present a technological overview and classification of the most relevant IPS technologies. We compare technologies based on their cost, accuracy, precision, performance and complexity. Hybrid approaches are also investigated as a way to overcome limitations of specific IPS technologies. The paper is mostly focused on IPS technologies that can be used in personal applications, using pocket-sized devices (e.g. smartphone).
5.N. Ilievska (Faculty of Computer Science and Engineering, "Ss.Cyril and Methodius" University, Skopje, Macedonia)
Simulating the Error-Detecting Capability of the Error-Detecting Code 
Using simulations, we analyze an error-detecting code from the aspect of the number of errors that the code surely detects. In order to conclude whether and how the order of the quasigroup used for coding affects the number of errors that the code surely detects, we use quasigroups of different orders for coding. Also, we code input blocks of different lengths in order to conclude whether the number of errors that the code surely detects depends on the length of the input block, i.e., the length of the code word.
6.F. Ismaili (South East European University, Tetove, Macedonia), A. Bulku (Canadian Institute of Technology, Tirana, Albania), B. Abazi Caushi (South East European University, Tetove, Macedonia)
Analysis, Design and Implementation of a Helpdesk Management System - Case Study “Albanian Radio Television” 
As companies grow, so do the complex demands placed on the IT Department. Without a good Help Desk Software, IT Departments can begin losing the ability to effectively provide employees with the technical support they need to do their jobs. Many enterprises rely on IT Ticketing Systems to deliver fast, reliable internal customer service, resulting in improved IT department operations and satisfied employees. This paper describes the process of creating an IT Ticketing System from scratch for the IT Sector of a well-known organization in Albania - Albanian Radio Television, the public broadcaster of the country. The new way of collecting information about IT problems in the institution and also a new way of distributing work to the IT Staff members will bring benefits not only to the IT Sector but also to the employees which this sector supports. The system is developed using JavaFX a software platform for creating and delivering desktop applications, as well as rich internet applications from Oracle.
7.B. Anđelić, K. Slišković, Ž. Car, I. Rašan, M. Žilak (Sveučilište u Zagrebu Fakultet elektrotehnike i računarstva, Zagreb, Croatia)
Aplikacija za podizanje razine svijesti o potpomognutoj komunikaciji 
Telekomunikacijski proizvodi i usluge sve se više koriste u svrhu pozitivnog utjecaja na društvo. U ovom znanstvenom radu predstavljena je aplikacija za podizanje razine svijesti o potpomognutoj komunikaciji Pričajmo slikama koja informiranjem javnosti o problemu potpomognute komunikacije pokušava pozitivno utjecati na društvo kako bi se kroz edukaciju društva poboljšao položaj osoba s teškoćama koje komuniciraju isključivo pomoću potpomognute komunikacije. Aplikacija je osmišljena i razvijena u sklopu kolegija Diplomski projekt na Fakultetu elektrotehnike i računarstva. Rezultat projekta je 2D igra razvijena pomoću programa Unity, a elementi igre dizajnirani su i nacrtani pomoću programa Adobe Illustrator i Inkscape. Igra se sastoji od tri razine koje prikazuju različite scenarije i predstavljaju različite izazove za korisnike kako bi se on što duže animirao te tako zapamtio što više informacija, koje mu se osim kroz samu igru prikazuju na zanimljiv način i između razina. Cilj aplikacije je tako kroz interaktivni i zanimljiv sadržaj igre korisnika zabaviti te ga u kratkom vremenu educirati o osnovama potpomognute komunikacije kako bi se kroz minimalni napor članova društva ono osvijestilo o ovom problemu te tako uvelike pomoglo poboljšati položaj osoba s teškoćama u društvu i tako povećao i njihov osjećaj pripadnosti.
8.I. Kalinić, M. Bellina (Ericsson Nikola Tesla Servisi d.o.o., Zagreb, Croatia)
Unapređenje poslovnih procesa kompanije kroz OHS aplikaciju 
PQM team u Ericsson Nikola Tesla Servisima d.o.o. izradio je i implementirao novu web aplikaciju radi unapređenja poslovanja i poboljšanja postojećih procesa praćenja rada vanjskih izvođača. Kroz OHS Aplikaciju prati se primjena na terenu određenih standarda zaštite na radu i sigurnosti radnika (OHS) tijekom obavljanja građevinskih i drugih radova vezanih za gradnju, korištenje, održavanje i razvoj elektroničke komunikacijske infrastrukture i elektroničkih komunikacijskih mreža te geodetskih poslova snimanja infrastrukture (vodova). U radu bi se opisalo značenje i važnost primjene OHS-a u modernim organizacijama kao sastavnog dijela sustava upravljanja kvalitetom organizacije, razlog odluke o razvoju aplikacije unutar organizacije (paperless poslovanje i skladištenje podataka sukladno propisanim normama). Kratko bi se osvrnulo na Security i Hardware (opis i tehničke specifikacije), tehnologije korištene za razvoj aplikacije bazirane na open source tehnologiji zbog optimizacije troškova (Apache HTTP serveri, MySQL baza, PHP, JS, Laravel Eloquent ORM). Detaljnije bi se pokrila prezentacija same aplikacije – od opisa zahtjeva, dostupnost podataka i korisničkih računa, te kreiranih modula: administracije korisnika, vendora, upravljenje upitnikom (ažuriranje pitanja, odgovora), izvještajnog modula i izvoza podataka.
9.D. Markulin, K. Musa, A. Mršić (HT-Hrvatske telekomunikacije d.d., Zagreb, Croatia)
Važnost analitičkog pristupa poslovnim procesima u telekomunikacijama 
Poslovni procesi koji se koriste na području telekomunikacijama vrlo su složeni procesi u kojima se, osim slijeda različitih procesnih koraka (akcija), u značajnoj mjeri koristi automatska konfiguracija mrežnih elemenata. Kako se radi o vrlo dinamičnom i konkurentnom tržištu, važnost primjene dobro definiranih i optimalnih poslovnih procesa vrlo je velika. S obzirom da zahtjevi korisnika obuhvaćaju velik spektar različitih usluga i njihovih kombinacija te da se radi o velikom broju korisničkih zahtjeva vrlo je teško pratiti odvijaju li se poslovni procesi na ispravan i optimalan način, kako u dijelu upravljanja, tako i u operativnom dijelu. Pogled i praćenje procesa kroz ova dva aspekta razlikuju se u detaljima i aktivnostima koje se pokreću nakon uočavanja određenih prostora za poboljšanjima ili promjenama unutar poslovanja. Osiguranje izvještaja i dostup do podataka vrlo je bitan i treba se jednoznačno definirati unutar procesa. Zbog toga je, osim efikasnosti u odvijanju procesa i načina dizajna, potrebno voditi računa o fiksnim točkama u procesu na osnovu koji će se raditi buduća analitika i analiza na svim nivoima upravljanja. Analitički pristup omogućava sustavno praćenje poslovnih procesa te otkrivanje točaka u procesu u kojima se oni ne odvijaju na ispravan način. Jedna od tehnika koja omogućava takav pristup je model procesa u kojem su definirane točke kroz koje je moguće uz određenu metodologiju pratiti ponašanje poslovnog procesa. Na taj se način može pratiti odvijanje poslovnih proces kroz njihove faze. Druga je tehnika praćenje poslovnih procesa čije se odvijanje može dovesti u međusobnu povezanost, a time i uspješnost u njihovom odvijanju. Kod poslovnih procesa gdje je visok stupanj automatizacije potrebno je posebnu važnost, kroz analitički pristup, posvetiti stupnju uspješnosti automatske konfiguracije mrežnih elemenata.

Basic information:

Tihana Galinac Grbac (Croatia), Branko Mikac (Croatia), Stjepan Golubić (Croatia), Dragan Jevtić (Croatia), Renato Filjar (Croatia), Tomislav Kosanović (Croatia)

Steering Committee:

Slaviša Aleksić (Austria), Željka Car (Croatia), Saša Dešić (Croatia), Vlasta Hudek (Croatia), Darko Huljenić (Croatia), Robert Inkret (Croatia), Admela Jukan (Germany), Marko Lacković (Croatia), Erich Leitgeb (Austria), Dražen Lučić (Croatia), Davor Šarić (Croatia), Dina Šimunić (Croatia), Velimir Švedek (Croatia), Antonio Teixeira (Portugal), Mario Weber (Croatia)

Registration / Fees:
Price in EUR
Up to 7 May 2018
After 7 May 2018
Members of MIPRO and IEEE
Students (undergraduate and graduate), primary and secondary school teachers

The discount doesn't apply to PhD students.


Tihana Galinac Grbac
University of Rijeka
Faculty of Engineering
Department of Computer Engineering
Vukovarska 58
HR-51000 Rijeka, Croatia

Phone: +385 51 651 596
GSM: +385 99 3820 750

The best papers will get a special award.
Accepted papers will be published in the ISBN registered conference proceedings. Papers written in English and presented at the Conference will be submitted for posting to IEEE Xplore.
There is a possibility that the selected scientific papers with some further modification and refinement are being published in the Journal of Computing and Information Technology (CIT).

International Program Committee General Chair:

Karolj Skala (Croatia)

International Program Committee:

Enis Afgan (Croatia), Slaviša Aleksić (Austria), Slavko Amon (Slovenia), Lene Andersen (Denmark), Vesna Anđelić (Croatia), Michael E. Auer (Austria), Dubravko Babić (Croatia), Snježana Babić (Croatia), Almir Badnjevic (Bosnia and Herzegovina), Marko Banek (Croatia), Mirta Baranović (Croatia), Bartosz Bebel (Poland), Ladjel Bellatreche (France), Petar Biljanović (Croatia), Eugen Brenner (Austria), Ljiljana Brkić (Croatia), Gianpiero Brunetti (Italy), Marian Bubak (Poland), Andrea Budin (Croatia), Željko Butković (Croatia), Željka Car (Croatia), Jesús Carretero Pérez (Spain), Matjaž Colnarič (Slovenia), Alfredo Cuzzocrea (Italy), Marina Čičin-Šain (Croatia), Marko Čupić (Croatia), Davor Davidović (Croatia), Marko Delimar (Croatia), Saša Dešić (Croatia), Todd Eavis (Canada), Maurizio Ferrari (Italy), Tiziana Ferrari (Netherlands), Bekim Fetaji (Macedonia), Nikola  Fijan (Croatia), Renato Filjar (Croatia), Tihana Galinac Grbac (Croatia), Enrico Gallinucci (Italy), Dragan Gamberger (Croatia), Paolo Garza (Italy), Liljana Gavrilovska (Macedonia), Ivan Gerlič (Slovenia), Matteo Golfarelli (Italy), Stjepan Golubić (Croatia), Montserrat Gonzales (United Kingdom), Francesco Gregoretti (Italy), Stjepan Groš (Croatia), Niko Guid (Slovenia), Jaak Henno (Estonia), Ladislav Hluchy (Slovakia), Željko Hocenski (Croatia), Vlasta Hudek (Croatia), Darko Huljenic (Croatia), Željko Hutinski (Croatia), Robert Inkret (Croatia), Mile Ivanda (Croatia), Hannu Jaakkola (Finland), Matej Janjić (Croatia), Leonardo Jelenković (Croatia), Rene Jerončić (Croatia), Dragan Jevtić (Croatia), Admela Jukan (Germany), Robert Jones (Switzerland), Peter Kacsuk (Hungary), Aneta Karaivanova (Bulgaria), Tonimir Kišasondi (Croatia), Marko Koričić (Croatia), Tomislav Kosanović (Croatia), Dieter Kranzlmüller (Austria), Marko Lacković (Croatia), Erich Leitgeb (Austria), Maria Lindén (), Dražen Lučić (Croatia), Marija Marinović (Croatia), Ludek Matyska (Czech Republic), Mladen Mauher (Croatia), Igor Mekjavic (Slovenia), Igor Mekterović (Croatia), Branko Mikac (Croatia), Veljko Milutinović (Serbia), Nikola Mišković (Croatia), Vladimir Mrvoš (Croatia), Jadranko F. Novak (Croatia), Predrag Pale (Croatia), Jesus Pardillo (Spain), Nikola Pavešić (Slovenia), Branimir Pejčinović (United States), Dana Petcu (Romania), Juraj Petrović (Croatia), Damir Pintar (Croatia), Željka Požgaj (Croatia), Slobodan Ribarić (Croatia), Janez Rozman (Slovenia), Rok Rupnik (Slovenia), Dubravko Sabolić (Croatia), Zoran Skočir (Croatia), Ivanka Sluganović (Croatia), Mario Spremić (Croatia), Vlado Sruk (Croatia), Stefano Stafisso (Italy), Uroš Stanič (Slovenia), Ninoslav Stojadinović (Serbia), Jadranka Šunde (Australia), Aleksandar Szabo (Croatia), Laszlo Szirmay-Kalos (Hungary), Davor Šarić (Croatia), Dina Šimunić (Croatia), Zoran Šimunić (Croatia), Dejan Škvorc (Croatia), Velimir Švedek (Croatia), Antonio Teixeira (Portugal), Edvard Tijan (Croatia), A. Min Tjoa (Austria), Roman Trobec (Slovenia), Sergio Uran (Croatia), Tibor Vámos (Hungary), Mladen Varga (Croatia), Marijana Vidas-Bubanja (Serbia), Mihaela Vranić (Croatia), Boris Vrdoljak (Croatia), Slavomir Vukmirović (Croatia), Yingwei Wang (Canada), Mario Weber (Croatia), Roman Wyrzykowski (Poland), Damjan Zazula (Slovenia)


Opatija, with its 170 years long tourist tradition, is the leading seaside resort of the Eastern Adriatic and one of the most famous tourist destinations on the Mediterranean. With its aristocratic architecture and style Opatija has been attracting renowned artists, politicians, kings, scientists, sportsmen as well as business people, bankers, managers for more than 170 years.

The tourist offering of Opatija includes a vast number of hotels, excellent restaurants, entertainment venues, art festivals, superb modern and classical music concerts, beaches and swimming pools and is able to provide the perfect response to all demands.

Opatija, the Queen of the Adriatic, is also one of the most prominent congress cities on the Mediterranean, particularly important for its international ICT conventions MIPRO that have been held in Opatija since 1979 gathering more than a thousand participants from more than forty countries. These conventions promote Opatija as the most desirable technological, business, educational and scientific center in Southeast Europe and the European Union in general.

For more details please look at and

News about event
Currently there are no news
Patrons - random
Sveučilište u RijeciFER ZagrebPomorski fakultet RijekaTehnički fakultet RijekaFOI Varaždin