Search  English (United States) Hrvatski (Hrvatska)

innovative promotional partnership

Presented papers in English will be submitted for inclusion in the IEEE Xplore Digital Library.

Event program
Tuesday, 5/21/2019 2:00 PM - 6:45 PM,
Galija, Hotel Admiral, Opatija
2:00 PM - 2:15 PM
Opening

Chair: Branko Mikac

 
2:15 PM - 2:45 PM
Presentation

P. Novakova (IBM, Valbonne, France)
IBM ASPERA, Accelerating Data Transfer over Commodity Internet

 
2:45 PM - 3:00 PMBreak 
3:00 PM - 4:15 PM
New Applications and Services

Chair: Tihana Galinac Grbac

 
1.A. Prašljivić, A. Ramić (BH Telecom, Sarajevo, Bosnia and Herzegovina)
Targeted Multichannel Marketing Campaign in Telecommunications 
As mass media is overwhelmed with promotional content, regardless of campaign budget and media channels used, mass communication with customers brings less effective sales results than direct marketing. This study is made to present the effects of multichannel campaign throughout integrated direct communication with customers. Since new tariff plan campaign needed to be promoted, integration of several different direct communication channels is performed in order to reach target customer groups. Customer base was segmented by usage of tariff plans as well as by amount spent monthly within different tariff groups. Therefore, customer base was divided into groups that differed by usage characteristics. Marketing campaign was implemented throughout following direct communication channels: SMS with web link, web opinion poll form, call center and sales points. Customers received SMS with information about new campaign offer predefined for their usage level, with call to action by clicking on web link in SMS. When transferred to web form, customer were informed about special offer details and could leave their contact information in order to receive a call from call center and get even more information or activate new special offer. Form inputs were listed in file forms and transferred to a call center. Each customer was contacted and after offer acceptance, purchase ID was opened in sales application. When contract is signed on actual sale point, sales ID used in marketing campaign were matched with contract and marketing campaign effects were counted. 682 734 SMS were sent and 881 customers replied to a web form and left their contact information. After contacted from a call center, 315 customers signed a long term contracts, which represents 35.75% of contacted customer base or 0.046% of target customer base. Since customers who did not have long term contracts were targeted, and they were offered to accept a higher value offer for next 24 months, this percentage is found significant.
2.N. Bjelčić (Hrvatski Telekom d.d., Zagreb, Croatia), D. Švelec (Hrvatski Telekom d.d., Osijek, Croatia)
New Perspectives for People with Special Needs According the Development of New Generation ICT Technologies 
The paper considers the new possibilities that IV. industrial revolution brings to everyday life and inclusion in the world of work for people with disabilities and the elderly (persons with special needs). Technological responses to the challenges of this involvement have been in the market for some time now. However, they are currently very limited to mostly static functions, so their application, though useful and necessary, is relatively limited. Cloud, M2M, IoT and especially 5G networks bring a new dimension and open new perspectives for developing applications tailored to the needs of such people. The paper provides an analysis of linkages between applications for people with special needs with upcoming technological possibilities and the perspective of such applications in the new ICT environment.
3.M. Kocan (SilverEngine GmbH, Munich, Germany)
Self-learning Prioritization of End-User Services to Eliminate Overload Situations 
Telecommunication network providers employ various strategies to protect from and to mitigate overload situations caused by signaling storms to minimize end-user service loss. The common approach is the deployment of additional hardware above the engineered capacity combined with resource intensive operational recovery procedures. While signaling storms are relatively rare in its occurrence, they usually have serious consequences – loss of end-user service resulting in negative publicity and business damage. Adaptive overload management emphasizes end-user service as its primary goal in addition to the protection of a network function. The communication dialogs necessary to establish the end-user service are automatically detected and the involved requests are appropriately prioritized. Combining these two processes, the probability of service establishment and its eventual restoration is increased, which contributes to the reduction of overload situation as more end-users can receive its service. Self-learning request prioritization can reduce the time and complexity needed to restore service for all end-users during signaling storms. Through its automatic and self-learning operation it is suited for current and upcoming cloudified and 5G core networks.
4.N. Banović-Ćurguz, D. Ilišević (Mtel a. d., Banja Luka, Bosnia and Herzegovina)
Mapping of QoS/QoE in 5G Networks 
5G technology will dramatically change the way of living. With a flexible combination of developing existing technology solutions and new radio concepts, and meeting the requirements for efficiency and scalability, the 5G network can respond to new user scenarios followed by a large increase in traffic and number of connected devices. This coming era of 5G network is demanding dynamic resource sharing and context sharing with seamless high speed connectivity everywhere. The challenge for operators is to understand and manage both the quality and performance of the services to fulfill on the technical quality of service (QoS) as well as on the quality of experience (QoE) level. Quality of experience (QoE) is the subjective acceptability of the quality of a telecommunication service perceived by the user. This contrasts with Quality of Service (QoS), which concerns objective and technical metrics at network and application level. The identification of service-relevant QoE metrics and modeling of how these are affected by the different 5G QoS metrics is discussed in this paper. The impact of QoS parameters on QoE and the possible scenario of QoS/QoE mapping process are presented.
5.D. Markulin, K. Musa, A. Mršić (HT d.d., Zagreb, Croatia)
Primjena agilnog pristupa u implementaciji promjena u procesima telekomunikacijskih usluga 
Implementacija promjena u procesima i funkcionalnostima u sustavima programske podrške za provisioning telekomunikacijskih usluga složeni je postupak koji zahtjeva uključenost velikog broja sudionika, preciznost i disciplinu u procesu pripreme zahtjeva, pripreme procesne i funkcionalne specifikacije, razvoja, testiranja i ažurnog dokumentiranja. Kod većine telekomunikacijskih operatora koristi se model vodopada koji uključuje više slijednih faza u razvoju programske podrške. Ovo je kruti model gdje je završetak svake faze uvjet za početak faze koja slijedi u ovom modelu. Ukoliko neka od faza razvoja nije dobro realizirana to ima direktni utjecaj na uspješnost faza koje slijede, a i na realizaciju kompletne promjene. To često donosi visoke troškove i značajna kašnjenja u razvoju. Agilni pristup, za razliku od modela vodopada, uključuje rad malih timova koji u iterativnim postupcima rade na definiranju zahtjeva i razvoju softveru dio po dio i u svakoj iteraciji radi se nadogradnja rješenja dobivenog u prethodnoj iteraciji. Korištenjem agilnog pristupa dobiva se na fleksibilnosti i brzini razvoja te lakša prilagodba promjenjivim rješenjima i zahtjevima. Agilnim pristupom omogućava se i brža isporuka zahtjeva u manjim intervalima i omogućava se nadogradnja zahtjeva ili promjena u odnosu na rješenja prethodnih faza. Korištenje agilnog pristupa u razvoju sistemske programske podrške velik je izazov jer je potrebno pristup, čija je najveća snaga fleksibilnost i postepeni razvoj rješenja kroz iteracije, prilagoditi razvoju složene programske podrške gdje se zahtjeva velika preciznost i disciplina u razvoju rješenja te dobra dokumentiranost.
4:15 PM - 4:30 PMBreak 
4:30 PM - 5:45 PM
Networks Management

Chair: Branko Mikac

 
6.S. Čaušević, M. Begović (Faculty of Traffic and Communications, Sarajevo, Bosnia and Herzegovina)
Optimizing Traffic Routing in Different Network Environments Using the Concept of Software-Defined Networks 
Routing process should encompass finding the best route through the network according to different criteria, with respect to the principle of load balancing, dynamic adaptation to current network conditions, special treatment of traffic based on QoS levels, as well as minimum energy consumption through energy-aware routing. The emergence of the IoT paradigm, 5G networks, increased number of real-time and mobile applications, as well as the increasingly complex requirements in terms of QoS, have put a grave task ahead of the researchers and the industry. Adaptive and efficient management of current network and traffic, and basis for making the networks resistant and ready for the inevitable changes in the foreseeable future, must be ensured. The idea of software-defined networks has offered a new architecture that seeks to overcome the disadvantages of classical network architectures. This approach has enabled direct programmability of the network, faster and simpler introduction of innovations, greater granularity of routing criteria, implementation of consistent and comprehensive policies, real-time response to changes, etc. This paper is a state-of-the-art overview of SDN traffic routing benefits in different network environments, as well as open issues and challenges to be addressed in future research.
7.I. Šeremet (Bh Telecom, Sarajevo, Bosnia and Herzegovina), S. Čaušević (Fakultet za saobraćaj i komunikacije, Sarajevo, Bosnia and Herzegovina)
An Analysis of Reconvergence Delay when Using BGP-LS/PCEP as Southbound Protocols 
Aim of this paper is to explore latency in reconvergence after link failure when using BGP-LS/PCEP as southbound protocols in IP/MPLS network with centralized controller. Controller in network is PCE element in charge of Traffic Engineering management. Scenario in this paper describes an IP/MPLS network with four routers, fours links and four tunnels passing through multiple links. In case of a link failure, affected tunnels must be rerouted to alternative links evenly distributing traffic across the links. Therefore, it is necessary to have a central controller that will have a complete knowledge of the network in order to evenly and efficiently redistribute traffic. Our IP/MPLS network contains multi-vendor devices and do not support OpenFlow protocol hence as a southbound protocols standardized BGP-LS and PCEP are used. BGP in general is designed as a very slow protocol. Additional, BGP-LS has to wait for the internal routing protocol on the routers to update the Traffic Engineering Database before the BGP-LS signals change event to its peers. Therefore, we will explore some possibilities of reducing the latency in reconvergence after link failure.
8.D. Valenčić (Veleučilište Velika Gorica, Velika Gorica, Croatia), V. Mateljan (Filozoski fakultet , Zagreb, Croatia)
Implementation of NETCONF Protocol 
The first version of SNMP (Simple Network Management Protocol) was created in 1988 by (Internet Engineering Task Force) as a standard for network management. Anyway SNMPv1 (and its newer versions 2, 2c and 3) from the beginning until today has been used mainly only for the network monitoring and very rarely for configuring of network devices (routers and switches) with its SET commands. Since the beginning of computer networking the configuration of network devices (routers and switches) have been usually performed by using the vendors’ operating systems and their non-standard user CLI (Command Line Interface). This has proven to be a very complex and ineffective solution, especially with fast development and more complexity in the computer networking area. To solve these issues, IETF standard organization created in 2006 the NETCONF protocol in order to define the standard solution for command-oriented CLI user interface for the configuration of network devices of different vendors. Apart from classical computer networks, the importance of NETCONF standard occurs also in the application of new upcoming network architectures, such as Software Defined Networking (SDN) and Internet of Things (IoT), and especially in systems requiring high availability (e.g. hospitals, airports and Data Centers). Today, more than ten years after the creation of the NETCONF standard there is the question about the actual acceptance of NETCONF protocol in current networks and about the actual maturity of NETCONF standard. The scope of this paper is to compare three ways of configuring the network devices: non standard CLI, standards SNMP and NETCONF. Also it will be proposed what should be considered in order to improve the implementation of NETCONF protocol.
9.O. Jukić, I. Heđi, A. Šarabok (Visoka škola Virovitica, Virovitica, Croatia)
Fault Management API for SNMP Agents 
In previous works we have concluded that fault management SNMP integration state of the art is not idyllic from the integrator’s point of view. Every umbrella fault management system has to implement number of different SNMP manager modules capable to communicate with different SNMP agents, irrespective of the fact that management information structure is almost the same among those agents (e.g. alarm message always consists of start time, perceived severity, probable cause, additional information, affected network element info and other attributes). In this paper, we are going to present Fault management API (Application Programming Interface) for SNMP agents (FM SNMP API). This API is aimed to be used during SNMP agent software development process. Using this API, software developers will focus on fault management data handling while SNMP support for fault management will be covered by FM SNMP API. That approach should decrease SNMP agent software development time, but also it should simplify SNMP management process and new equipment integration into umbrella fault management systems. This paper is structured as follows: first, API architecture will be described. After that, functions to be used by developers are described briefly. Finally, FM API pilot use case will be presented.
10.C. Phung, J. Dizdarevic, F. Carpio, A. Jukan (Technische Universität Braunschweig, Braunschweig, Germany)
Enhancing REST HTTP with Random Linear Network Coding in Dynamic Edge Computing Environments  
The rising number of IoT devices is accelerating the research on new solutions that will be able to efficiently deal with unreliable connectivity in highly dynamic edge computing applications. To improve the overall performance in IoT applications there are multiple communication solutions available, both proprietary and open source, all of which satisfy different communication requirements. Most commonly, for this kind of communication, developers choose REST HTTP protocol as a result of its compatibility with the existing computing infrastructure. In the applications where mobility and unreliable connectivity play a significant role ensuring communication reliability with stateless REST HTTP completely depends on developer itself. This often means that since some of the REST HTTP methods assume re-sending of request messages multiple times it will cause redundant updates and therefore decrease bandwidth utilization. In order to solve this problem, in this paper, we combine REST HTTP with random linear network coding (RLNC) to reduce the number of additional retransmissions. We show how using RLNC in REST HTTP based communication can decrease delays in some specific applications and reduce additional packet retransmissions in all unreliable highly dynamic scenarios.
5:45 PM - 6:00 PMBreak 
6:00 PM - 6:45 PM
Cybersecurity Challenges

Chair: Stjepan Golubić

 
11.S. Sokolov (University of Telecommunications and Posts, Sofia, Bulgaria), T. Iliev, I. Stoyanov (University of Ruse, Ruse, Bulgaria)
Analysis of Cybersecurity Threats in Cloud Applications Using Deep Learning Techniques 
In this paper we present techniques based on machine learning techniques on monitoring data for analysis of cybersecurity threats in cloud environments that incorporate enterprise applications from the fields of telecommunications and IoT. Cybersecurity is a term describing techniques for protecting computers, telecommunications equipment, applications, environments and data. In modern networks enormous volume of generated traffic can be observed. We propose several techniques such as Support Vector Machines, Neural networks and Deep Neural Networks in combination for analysis of monitoring data. An approach for combining classifier results based on performance weights is proposed. The proposed approach delivers promising results comparable to existing algorithms and is suitable for enterprise grade security applications.
12.T. Bikov, T. Iliev (University of Ruse, Ruse, Bulgaria), G. Mihaylov (University of Telecommunications and Posts, Sofia, Bulgaria), I. Stoyanov (University of Ruse, Ruse, Bulgaria)
Phishing in Depth – Modern Methods of Detection and Risk Mitigation  
Nowadays, everyone is living in a digital world with various of virtual experiences and realities, but all of them may eventually cause real threats in our real world. Some of these threats have been born together with the first electronic mail service. Some of them might be considered as really basic and simple, compared to others that were developed and advanced in time to adapt themselves for the security defense mechanisms of the modern digital world. On a daily basis, more than 238.4 billion emails are sent worldwide, which makes more than 2.7 million emails per second, and these statistics are only from the publicly visible networks. Having that information and considering around 60% and above of all emails as threatening or not legitimate, is more than concerning. Unfortunately, even the modern security measures and systems are not capable to identify and prevent all the fraudulent content that is created and distributed every day. In this paper we will cover the most common attack vectors, involving the already mass email infrastructures, the required contra measures to minimize the impact over the corporate environments and what else should be developed to mitigate the modern sophisticated email attacks.
13.M. Nižetić (Sveučilište Split, SPLIT, Croatia)
Sklopovska i programska provjera primitivnosti binarnih polinoma 
U ovome radu opisujem metodu određivanja m-nizova posmičnim registrom s povratnim vezama za registre do 31 stanja, paralelno koristeći Galois načelo, C++ programe i simulacijski alat Logisim 2.7.1. Tablično prikazani rezultati istraživanja, upućuju na mogućnost smanjenja vremena obrade i programske pristupe računanju primitivnih polinoma. Za navedene obrade, napravio sam programe primjenjujući permutacije odnosno varijacije s ponavljanjem od 2 elementa pripadnoga razreda. Grafičkim programskim alatom, potvrdio sam programski ostvarene rezultate (brojevni razredi do 31 bita). Zbog povećanja brzine obrade m-nizova, primijenio sam C++ programske strukture na razini bitova. Na istim sustavnim načelima mogu se obrađivati polinomi s više od 31 stanja koristeći duže vrste podataka. Zbog bolje razumljivosti, predlažem nove načine označavanja binarnih polinoma i algoritme obrade podataka posmičnim registrom (Galois/Fibonacci). U obradu podataka, osim obrade m-nizova, uključio sam množenje i diobu binarnih polinoma te izračun FCS na prije naznačenim programskim i sklopovskim (simulacijskim) načelima. Za tu namjenu, simulacijski alat Logisim nadopunio sam novim vrstama pod sklopova. Preinačio sam i automatizirao LFSR sklopove za istovremen rad multiplikacijskoga i adicijskoga sklopa LFSR što dodatno potvrđuje točnost dobivenih rezultata.
Wednesday, 5/22/2019 3:00 PM - 6:15 PM,
Galija, Hotel Admiral, Opatija
3:00 PM - 3:30 PM
Invited Lecture

Chair: Dragan Jevtić
 

Ž. Car (Faculty of Electrical Engineering and Computing, Zagreb, Croatia), I. Majerski (Croatian Regulatory Autority for Network Industries, Zagreb, Croatia)
The Challenges of Digital Accessibility

 
3:30 PM - 3:45 PMBreak 
3:45 PM - 4:45 PM
New ICT Infrastructure

Chair: Željka Car

 
1.A. Jakovčić, V. Barać, B. Blažević (Vertiv Croatia d.o.o, Zagreb, Croatia)
Critical Infrastructure Solutions for Upcoming Developments in Telecom and Data Industries 
Upcoming changes in data industry as well as telecommunications, with focus on EDGE computing and 5G, put new requirements on critical infrastructure. Higher density in ensuring more space for servers or 5G equipment, longer autonomy due to larger number of remote sites, small footprint as result of site planning and state permits, energy saving due to expansion of load would be the main points to be addressed during critical infrastructure design and planning. Key factors to fulfil and satisfy main requirements are critical infrastructure solutions designed to meet high performances, meaning high efficiency, modularity and scalability. Biggest volumes are to be expected in combinations of nodes in telecom and EDGE as well as in adaptations of 2G, 3G, LTE to 5G. In terms of critical infrastructure, this means a smart combination of AC power and thermal management units for EDGE computing (servers) should be combined with DC power and thermal management for upgrades to 5G. Article provides short summary of most expected combinations of critical infrastructure solutions, covering power management and thermal management, to achieve best performance in upcoming data and telecom innovations.
2.M. Žilak (University of Zagreb Faculty of Electrical Engineering and Computing, Zagreb, Croatia), A. Kešelj, T. Besjedica (University of Dubrovnik, Dubrovnik, Croatia)
Accessible Web Prototype Features from Technological Point of View 
Nowadays, the Internet is widely used among people of all age groups and it has an impact on different aspects of people lives. For all people to be able to access web content, it is necessary to ensure accessibility of the websites. Although many guidelines for ensuring web accessibility can be found, analysis of many websites showed that many accessibility issues are not addressed enough. An accessible website prototype with information about special offers from different telecom operators is developed and described within this paper. Evaluation with web accessibility checking tools and user evaluation were conducted to analyze accessibility and user’s satisfaction with the website prototype. Also, some technical instructions for web developers and designers are provided in order to raise awareness about how to develop accessible website using available technology, such as WordPress.
3.L. Incipini, A. Belli, L. Palma, R. Concetti, P. Pierleoni (Università Politecnica delle Marche, Ancona, Italy)
Databases Performance Evaluation for IoT Systems: The Scrovegni Chapel Use Case 
Internet of things devices are used to collect data from the physical world, and to present the results in a way well usable to the end user. Therefore, an accurate choice of the most appropriate technology for storing data collected from the network is relevant. In this paper we focus the attention on the selection of the best database management system for cultural heritage applications, in particular referring to the use case of light monitoring at the Scrovegni Chapel (Padua, Italy), to emphasize the Giotto's frescoes. For doing so, SQL and No-SQL solutions are compared, and the obtained results are used to find the best solution for this application. Moreover these results can be used as a practical reference for the more appropriate selection of the right database for real use cases.
4.L. Incipini, A. Belli, L. Palma, R. Concetti, P. Pierleoni (Università Politecnica delle Marche, Ancona, Italy)
MIMIC: a Cybersecurity Threat Turns into a Fog Computing Agent for IoT Systems 
Fog and cloud computing are very attractive enabling technologies for Internet of Things applications. The virtualization of smart devices which compose the Internet of Things network is a promising field of research, leading to the design and development of new services and uses. To the best of our knowledge, this paper presents the first attempt to use a cybersecurity attack to realize a fog computing agent for Internet of Things systems. In particular the Man-In-the-Middle attack will be use to show the foundation of the proposed tool, namely MIMIC, and through the examples and tests performed we will show its potentialities.
4:45 PM - 5:00 PMBreak 
5:00 PM - 6:15 PM
Frequency Spectrum and Antennas

Chair: Stjepan Golubić

 
5.D. Budić, K. Skračić, I. Bodrušić (Ericsson Nikola Tesla d.d., Zagreb, Croatia)
Optimizing Mobile Radio Access Network Spectrum Refarming Using Community Detection Algorithms 
Radio spectrum refarming is a cost-effective way to increase capacity for UMTS/LTE without the need to acquire new spectrum. Therefore, it is an important process for today’s mobile operators. As radio access networks (RAN) became more complex, the process of choosing which radio sites to refarm has become complex and time-consuming if done manually. This paper proposes the use of community detection algorithms for automating the process of RAN refarming. The problem of RAN refarming can be modeled as a graph in which one needs to isolate nodes which are densely connected. In RAN refarming it is crucial to keep the interference between sites and technologies at a minimum. Several community detection algorithms were tested for RAN refarming. Girvan-Newman algorithm showed most accurate results and was used for implementation of optimization solution. In this paper, the authors provided a benchmark of various network and cluster sizes. Result showed that RAN refarming can be optimized from one to several weeks to roughly few hours per cluster.
6.H. Maloku (University of Prishtina, Prishtina, Kosovo), Z. Limani Fazliu, E. Sela, M. Ibrani (University of Prishtina, Pristina, Kosovo)
Path Loss Model Fitting for TV Bands Based on Experimental Measurements for Urban Environments in Kosovo  
Signal attenuation due to path loss can significantly affect the quality of a wireless communication link. This makes path loss measurement and estimation an important aspect when designing wireless communication systems. However, accurate values for path loss are rarely readily available, as they heavily depend on a range of factors such as line-of-sight conditions, terrain, environment and transmitter and receiver positions and height. To this end, it is much more practical to use path loss models to estimate the expected value of path loss in a certain environment, instead of actual measured values. In this paper, we use experimental data of received power levels emitted by TV broadcasters in the UHF and VHF bands, and compare them to known and widely used path loss models such as Hata, Ericsson, COST and Egli, in order to identify which propagation models best fit our urban environment. Measurement locations were selected to represent various environments within the urban area of Prishtina, the capital of Kosovo. Our results show that for short distances (up to ~20 km), Hata model exhibits lower values of RMSE compared to measured values, while for longer distances (above ~20 km), Ericsson model is the better fit.
7.M. Ibrani, A. Mekuli (University of Prishtina/Faculty of Electrical and Computer Engineering, Pristina, Kosovo)
Experimental Assessment of Electric Field Levels Emitted by UHF TV Broadcasters 
Operation of high power broadcast transmitters in populated areas is accompanied with concerns regarding human exposure to emitted electromagnetic fields and related safety issues. In this paper we present the results of in situ measurements of electric field levels emitted by TV broadcasters operating in UHF frequency band. Measurements are conducted in far field zone, with calibrated spectrum analyzer NARDA SRM 3006, capable of capturing separately contribution of each transmitter/channel. Measurement locations are selected to include urban (mostly) and rural environments, indoor and outdoor spots, LOS and NLOS positions, and also different heights from the ground level. Software post processing of measured TV transmitter electric field samples in typical environments, reveal that highest value of electric field is 102.73 dBmV/m, captured in outdoor environment - LOS position. This corresponds to channel 31 transmitter, with EIRP 15 kW, broadcasting in frequency 551.250 MHz. Most of measured electric field values for outdoor environments are in the range 70-80 dBmV/m, while for indoor environments they range in 70-75 dBmV/m. All measured samples of electric fields emitted by TV broadcasters are below the reference levels given by ICNIRP. The results of our measurement campaign are compared with results of similar studies conducted in different countries and results of comparative analysis are given in paper.
8.M. Márton, Ľ. Ovseník, J. Turán, M. Špes, J. Urbanský (University of Technology Košice, Košice, Slovakia)
Analysis of Helix Turns Impact on Design of Helix Antenna Operated on 2.46GHz Proposed for FSO/RF Hybrid System 
Motivation on the research in this area is still growing with regards on expanding demands on communication networks. We live in ages of communication technologies. Users’ demands are still growing. We need to develop new solutions to resolve the growing demand on multimedia streams in metropolitan. Current high speed communication systems are based on an optical fiber transmission. However, in densely populated areas an optical fiber cannot always be embedded. In these areas free space optics (FSO) is a perfect solution. With FSO system optical beams can be transmitted through free space. In the case when the primary optical link has the radio-frequency backup link, the system is named FSO/RF hybrid system. The RF backup link is used in outages case. This paper is focused on improving availability of FSO system using RF link with appropriate type of antenna. In this research we consider helix antenna. Design is realized using professional designing tool FEKO. In the optimization process of the RF link we focused on the analysis of antenna properties depending on the number of helix turns. The operating frequency was chosen from non-licensed frequency range free available in Slovak republic. It is 2.46GHz. The main point of this paper is to find appropriate candidate for RF backup link which will be implemented in our experimental FSO/RF system.
9.B. Ivšić, F. Friščić, M. Dadić, D. Muha (University of Zagreb, Faculty of electrical engineering and computing, Zagreb, Croatia)
Design and Analysis of Vivaldi Antenna for Measuring Electromagnetic Compatibility 
The paper presents design and characterization of Vivaldi antenna with operation frequencies from 1 to 6 GHz. The design procedure is described in details together with analysis of the antenna current density distribution and the operating mechanism. Simulated and measured relevant results are compared and discussed. The measured results are additionally post-processed with the developed time-gating algorithm. The antenna is intended to be used for electromagnetic field measurements over wide frequency range (by which several narrow-band antennas can be replaced). In the next part of the paper the environmental electric field is measured with the proposed antenna and the commercial EM sensor, by which the antenna calibration factor is calculated. It is shown that antenna exhibits stable characteristics and is relatively low-cost, so it can be considered as a suitable solution for high frequency component of the EMC measurement system currently being developed within Department of Electrical Engineering Fundamentals and Measurements at University of Zagreb, FER.

Basic information:
Chairs:

Željka Car (Croatia), Tihana Galinac Grbac (Croatia), Stjepan Golubić (Croatia), Dragan Jevtić (Croatia), Branko Mikac (Croatia)

Steering Committee:

Slaviša Aleksić (Austria), Željka Car (Croatia), Saša Dešić (Croatia), Renato Filjar (Croatia), Tihana Galinac Grbac (Croatia), Stjepan Golubić (Croatia), Vlasta Hudek (Croatia), Darko Huljenić (Croatia), Robert Inkret (Croatia), Dragan Jevtić (Croatia), Admela Jukan (Germany), Oliver Jukić (Croatia), Marko Lacković (Croatia), Erich Leitgeb (Austria), Dražen Lučić (Croatia), Branko Mikac (Croatia), Mladen Sokele (Croatia), Davor Šarić (Croatia), Dina Šimunić (Croatia), Velimir Švedek (Croatia), Antonio Teixeira (Portugal), Mario Weber (Croatia)

Registration / Fees:
REGISTRATION / FEES
Price in EUR
EARLY BIRD
Up to 6 May 2019
REGULAR
From 7 May 2019
Members of MIPRO and IEEE
200
230
Students (undergraduate and graduate), primary and secondary school teachers
120
140
Others
220
250

The discount doesn't apply to PhD students.

Contact:

Zeljka Car
University of Zagreb
Faculty of Electrical Engineering and Computing
Unska 3
HR-10000 Zagreb, Croatia

GSM: +385 91 507 3452
E-mail: zeljka.car@fer.hr

Tihana Galinac Grbac
Juraj Dobrila University of Pula
Department of Engineering
Zagrebacka 30
HR-52100 Pula, Croatia

GSM: +385 99 3820 750
E-mail: tihana.galinac@unipu.hr

The best papers will get a special award.
Accepted papers will be published in the ISSN registered conference proceedings. Presented papers in English will be submitted for inclusion in the IEEE Xplore Digital Library.
.............
There is a possibility that the selected scientific papers with some further modification and refinement are being published in the Journal of Computing and Information Technology (CIT).


Location:
Opatija, with its 170-year-old tourism tradition, is the leading seaside resort of the Eastern Adriatic and one of the most famous tourist destinations on the Mediterranean. With its aristocratic architecture and style, Opatija has been attracting artists, kings, politicians, scientists, sportsmen, as well as business people, bankers and managers for more than 170 years.

The tourist offer in Opatija includes a vast number of hotels, excellent restaurants, entertainment venues, art festivals, superb modern and classical music concerts, beaches and swimming pools – this city satisfies all wishes and demands.

Opatija, the Queen of the Adriatic, is also one of the most prominent congress cities in the Mediterranean, particularly important for its ICT conventions, one of which is MIPRO, which has been held in Opatija since 1979, and has attracted more than a thousand participants from over forty countries. These conventions promote Opatija as one of the most desirable technological, business, educational and scientific centers in South-eastern Europe and the European Union in general.

For more details, please visit www.opatija.hr and visitopatija.com.

 

Download
 
News about event
Currently there are no news
 
Patrons - random
HAKOMKončar Elektroindustrija ZagrebENT ZagrebA1 HrvatskaEkonomski fakultet Rijeka