Search  English (United States) Hrvatski (Hrvatska)

innovative promotional partnershipICT in renewable energy technologies

MIPRO 2021 - 44th International Convention

SSE - Software and Systems Engineering

Wednesday, 9/29/2021 2:30 PM - 7:00 PM, Online

Virtual Event

Event program
Wednesday, 9/29/2021 2:30 PM - 7:00 PM,
2:30 PM - 4:00 PM Engineering Software Tools and Processes

Chair: Tihana Galinac Grbac (Juraj Dobrila University of Pula, Croatia) 

1.S. Prokić, K. Grujić, N. Luburić, J. Slivka, A. Kovačević, D. Vidaković, G. Sladić (Faculty of Technical Sciences, University of Novi Sad, Novi Sad, Serbia)
Clean Code and Design Educational Tool 
Many different code snippets can implement the same software feature. However, a significant subset of these possible solutions contains difficult-to-understand code that harms the software’s maintainability and evolution. Such low-quality code snippets directly harm profit, as frequent and fast code change enables businesses to seize new opportunities. Unfortunately, they are also prevalent in an industry that consists mostly of junior programmers. We developed a platform called Clean CaDET to tackle the prevalence of low-quality code from two angles. The Smell Detector module presents a framework for integrating AI-based code quality assessment algorithms to identify low-quality code as the programmer is writing it. The Smart Tutor module hosts a catalog of educational content that helps the programmer understand the identified issue and suggests possible solutions. By combining the quality assessment with the educational aspect, our integrated solution presents a novel approach for increasing the quality of code produced by our industry.
2.A. Fekete, M. Cserép, Z. Porkoláb (Eötvös Loránd University, Budapest, Hungary)
Measuring Developers' Expertise Based on Version Control Data 
Developers' fluctuation in the lifetime of a software product might deteriorate the understanding of the source code to a level where developer expertise of some modules drops to a dangerously low point. It is important for the project management to identify such critical modules to avoid complete knowledge loss. This paper presents a developer-centered static analysis tool that is intended to show individual expertise in large software projects. The expertise value is computed for each file through repository mining of the version control system of the project. The calculated value is based on the quality of commits per developer. The results of the proposed method have been validated on the CodeChecker open-source project, comparing against the findings of a user questionnaire filled by developers of the project on their expertise.
3.J. Saari, T. Hynninen (South-Eastern Finland University of Applied Sciences, Mikkeli, Finland)
Game Development for the Elderly: Experiences from Usability Tests in the Wild 
Playing video games can be beneficial for cognitive skills and mental wellbeing, especially for the elderly. Game design and user testing for the elderly is, therefore, an important consideration. In this paper, we present experiences from usability tests of a touchscreen puzzle game with elderly users. As a result of the user tests, we observed some common behaviors. In general, the elderly testers found it difficult to approach the game without instructions and were not able to get the game going using only trial and error. To get started with the game, the testers preferred animated tutorials over detailed written instructions. Additionally, the testers praised pop-up warning messages that appeared when they made mistakes. We also noted that within our test group individuals had somewhat different mental models about the game and its mechanics, which made improving the game design difficult.
4.F. Huber, G. Hagel (Kempten University of Applied Sciences, Kempten, Germany)
The application of continuous practices in higher computer science education - A systematic literature review 
In the field of computer science, Continuous Practices enable companies to frequently and instantly provide new software and products to customers and stakeholders. With a growing interest in these practices, some secondary literature has been published within this research area. However, there are still open questions when it comes to teaching such practices to computer science students. With more and more companies demanding these skills from graduated students, educating them the required knowledge and skills is necessary. This systematic literature review follows the methodology of Kitchenham and analyzes which of these practices are taught in higher computer science education. Along with the kind of courses that use them, it is reviewed how they are taught in higher computer science education and how these approaches defer from each other. The systematic literature review points out, that there are currently different teaching approaches described in literature. The review might help educators to gain new ideas of how to develop an own course or how to implement such contents into existing courses. The educational approaches can teach students to implement Continuous Practices by themselves or to use them in specific contexts.
5.D. Čeke, S. Kunosić (University of Tuzla, Tuzla, Bosnia and Herzegovina)
Accessibility Analysis of the Bosnia and Herzegovina Universities' Websites in the Relation to Their Position on the Webometrics Ranking List 
In today’s digital age, presence on the Internet and the Web mean presence in general life. This is generally more pronounced in the context of higher education because these institutions are the primary drivers of overall social development. The quality and highly accessible website of each university is a must as these websites are generally the first contact and first impression for new potential students and also the first step for establishing cooperation with the social economy and society. For this reason, websites need to meet some of the basic standards when it comes to accessibility of the content they provide and it is essential to ensure that content on the websites can be accessed by people with disabilities. This paper deals with the analysis of websites of universities in Bosnia and Herzegovina in the context of their accessibility, from one side, and their position on the international scene in the context of the Webometrics list of universities, on the other side. Based on the obtained results and conducted analysis, recommendations were given on how to improve some of the elements on websites in order to make these websites more accessible in accordance with the standards related to this topic.
4:00 PM - 4:15 PM Break 
4:15 PM - 6:00 PM Engineering System Properties and Data Systems

Chair: Darko Huljenić (Ericsson Nikola Tesla, Zagreb, Croatia) 

6.M. Šverko, T. Galinac Grbac (Juraj Dobrila University of Pula, Pula, Croatia)
Complex Systems - Network Component Security of SCADA Systems 
Over the past decade the complexity of industrial control systems (ICS) has been increasing rapidly. There are many reasons for this trend in new technologies that offer a higher level of control and integration. In addition to that, the amount of data generated during the control of the industrial process is growing rapidly, which further generates a huge amount of internet traffic Consequently, the resulting industrial control systems get more difficult to maintain, more exposed and more vulnerable to internal and external threats. These issues affect almost every component and ensuring adequate level of reliability and security of industrial control systems network components presents the biggest challenge. This paper addresses security issues of the supervisory control and data acquisition system (SCADA) network component as a complex system and some of the best practices in the application of security guidelines of relevant institutions. In order to provide a basic understanding of the industry specific environment from a security point of view, we will first give a brief overview of the ICS system as the closest SCADA system working environment, with a focus on core functions and quality requirements. We will further address SCADA system vulnerabilities, threats and protection methods. Finally, we will provide recommended protection and prevention strategies with an example of implementation.
7.T. Rogošić, B. Juričić, B. Antulov-Fantulin, T. Radišić (Fakultet prometnih znanosti, Zagreb, Croatia)
Review of Automation Problems in Air Traffic Control 
Automation of an air traffic control system is expected as a solution for handling high traffic demand in the future. Focus on using automation is mostly on its benefits, but automation could bring problems regarding human performance, which should not be neglected. Air traffic controllers’ role and tasks are changing with system automation and their mutual cooperation should be carefully observed. In this paper, performance of air traffic controllers within automated systems is presented. At any time, automation system could fail, and human should be able to take over and perform additional tasks that the system performed before failure. Therefore, it is essential to observe human reaction and recovery response time. The work presents problems that occur during system usage, explains models of automation system and human performance as well as models of individual and team performance. Humans individual differences, such as mental model or trust in automation, are of great importance for predicting human behavior when using automated system. Researchers have tried to solve or prevent problems caused by automation through different projects. This review paper should enable better understanding of automation problems in air traffic control thus encouraging the development of automated systems in a way to solve or prevent automation problems.
8.B. Bašić, P. Udovičić, O. Orel (University of Zagreb, University Computing Center, Zagreb, Croatia)
In-database Auditing Subsystem for Security Enhancement 
Many information systems have been around for several decades, and most of them have their underlying databases. The data accumulated in those databases over the years could be a very valuable asset, which must be protected. The first role of database auditing is to ensure and confirm that security measures are set correctly. However, tracing user behavior and collecting a rich audit trail enables us to use that trail in more proactive ways. As an example, audit trail could be analyzed ad hoc and used to prevent intrusion, or analyzed afterwards, to detect user behavior patterns, forecast workloads, etc. In this paper, we present a simple, secure, configurable, role-separated, and effective in-database auditing subsystem, which can be used as a base for access control, intrusion detection, fraud detection and other security-related analyses and procedures. It consists of a management console, code and data object generators and several administrative tools. This auditing subsystem, implemented in several information systems, is capable of keeping the entire audit trail (data history) of a database, as well as the executed SQL statements, which enables different security applications, from ad hoc intrusion prevention to complex a posteriori security analyses.
9.I. Grgurina, D. Škvorc (FER, Zagreb, Croatia)
Simplified Evaluation Framework for Query Extraction Techniques 
The growing number of database management systems and applications that use them directly or through some form of proxy has led to the problems when trying to understand the queries sent from the application to the database. There are multiple ways to extract queries from the application, network or database management systems and the way to extract largely depends on the format of the application, technology used and the security concerns. Given these non-functional requirements, we generalize the possible functional features that can be used for evaluation: query extraction and subsequent query modification. The results are then presented using three dimensions: technique (approach), requirement (non-functional criterion), and feature (functional criterion) where applicable. Each combination is analyzed and given the possible use case. Developers can then use this to make an informed decision for their applications.
10.T. Adamović, I. Sekovanić, I. Kranjec (Veleučilište u Bjelovaru, Bjelovar, Croatia)
Realizacija sučelja u Oracle PL/SQL-u koristeći JSON format 
PL/SQL (eng. Procedural Language SQL) je proceduralni jezik za rad sa SQL-om na Oracle bazi. Od verzije 12c, Oracle je uveo JSON format kao tip podatka i ponudio velik broj funkcija za podršku radu SQL-u i JSON-u. Koristeći JSON (engl. JavaScript Object Notation) objekt za komunikaciju između procedura unutar baze i između poslužitelja, mogu se simulirati ponašanja slična onima u objektno orijentiranom pristupu. U radu se govori o primjeni objektno orijentiranog koncepta sučelja u komunikaciji između dva poslužitelja.
11.D. Ružak, A. Lacković (Visoko učilište Algebra, Zagreb, Croatia)
Programsko rješenje problema lijepljenja raspona podataka u filtrirani raspon u MS Excelu 
Microsoft Excel jedna je od najkorištenijih uredskih aplikacija na svijetu, a proces kopiranja i lijepljenja podataka zasigurno aktivnost koju svi korisnici računala rade svakodnevno. Međutim, kada se u Excelu pokuša zalijepiti raspon kopiranih podataka u tablicu ili raspon koji su prethodno filtrirani po nekom stupcu, događa se pogreška – Excel podatke lijepi i u ćelije koje se trenutno ne vide, čak i ako u tim ćelijama već postoje drugi podaci, uništavajući pritom postojeće podatke. Ovaj problem rješiv je na dva načina – korištenjem sortiranja umjesto filtriranja podataka, tamo gdje je to moguće, odnosno, u situacijama kada to nije moguće, korištenjem posebno isprogramiranih makronaredbi koje se mogu koristiti umjesto ugrađenih naredbi za kopiranje i lijepljenje. U članku se detaljno objašnjavaju oba rješenja te donosi originalni programski kod spomenutih makronaredbi, kao i postupak koji je potrebno provesti kako bi ih svaki korisnik koji to želi mogao koristiti.
6:00 PM - 6:15 PM Break 
6:15 PM - 7:00 PM Applications of Software Systems


12.D. Fonović, Z. Sirotić, N. Tanković, S. Sovilj ( Juraj Dobrila University of Pula, Faculty of Informatics, Pula, Croatia)
Low-Power Wireless IoT System for Indoor Environment Real-Time Monitoring and Alerting 
As the Internet of Things (IoT) continues to evolve, IoT device sensors today have reduced in size and cost and are now easily available. Modern IoT device sensors are also able to give accurate remote real-time data measurement. Some of IoT technologies are optimized for low power use, making them ideal for IoT and sensor applications with requirements on low system energy usage. Example is a wireless sensor node that is required to do its job for an extended period (in some cases, years) while powered by a battery. Connecting the device to a IoT cloud network can create a system for collecting and storing data measurements. The collected data could then be used for more complex application scenarios like data visualization, alerting and machine learning tasks. This paper demonstrates an open source based real-time indoor environment monitoring system for collecting, storing and visualization of data with a simple alert notification system. The results show that proposed low-cost, low-power, open-source based systems can provide high reliability while ensuring low energy consumption.
13.M. Fandáková, P. Kudela, M. Palčák (University Science Park of the University of Žilina, Žilina, Slovakia)
Retention of cultural heritage with the help of innovative technologies. 
"The heritage of our fathers preserve to us, oh Lord", are the words of one prayer in Slovakia. However, this is not always possible, especially with cultural monuments that have already been stricken by the ravages of time or natural disasters. Current advanced technologies such as photogrammetry, laser scanning, reverse engineering and visualization applications allow us to monitor the current state of monuments, their intermediate steps of possible reconstruction and the final state. In this way, the cultural heritage will be preserved for future generations. This paper presents usage of progressive technologies as o tool for retention and digitization of cultural heritage.
14.B. Brumen (University of Maribor, Maribor, Slovenia), M. Franjić (University of Maribor, Faculty of Tourism, Brežice, Slovenia)
The Use of Intranet in Croatian National Parks 
Tourism has an extremely important position among business activities of state economies, due to several benefits arising from its development and success. Behind all this are underlying technologies, organizational solutions, and professional skills to make possible the handling of the information flows in tourism sector. In the globally competitive tourism sector, it is necessary to adapt the old-fashioned data sharing within public or private organizations to a new level. The Intranet, as a special form of an information system, has its many benefits for the tourism sector enabling a more efficient way of distributing data and perform everyday tasks. In the present work we analyze how the intranets are being implemented and used within Croatian National Parks. We conducted a survey among park’s intranet users and the results show that the intranets are indeed being used for simple tasks and on a daily basis, however, there is a large room for improvements to harvest the full potential of intranets in Croatian National Parks. We conclude the paper with recommendations for IT professionals, park management and policy makers.
15.B. Bučko, K. Zábovská (University Science Park of the University of Žilina, Faculty of Management Science and Informatics, , Žilina, Slovakia), J. Ristvej (Faculty of Security Engineering, Department of Crisis Management, University of Žilina, Žilina, Slovakia), M. Jánošíková (University Science Park of the University of Žilina, Žilina, Slovakia)
HD Maps and Usage of Laser Scanned Data as a Potential Map Layer 
Intelligent mobility around us evolves every day. But this evolution can be only as progressive as the data it is based on. First part of this paper is focused on an overview of high-definition (HD) maps and their adoption for use in various sectors of society. The HD maps consist of separate geospatial representations, for instance - road networks, buildings, technical infrastructure, soil structures or landscape profile. To be more specific HD maps are maps which are overlaid with additional information - in a form of description or graphic representation in 2D or 3D space. Unlike conventional maps, accuracy of HD maps ranges from centimeters to millimeters, and this is a fundamental difference between conventional maps. We present the scope of usage of HD maps and known limits. Practical part of this paper focuses on usage of laser scanning technology to create detailed scan of potholes. This type of data could serve as a potential HD maps layer.

Basic information:

Tihana Galinac Grbac (Croatia), Darko Huljenić (Croatia)

Program Committee:

Stipo Čelar (Croatia), Andrej Grgurić (Croatia), Igor Ljubi (Croatia), Mladen Sokele (Croatia), Nikola Tanković (Croatia), Linda Vicković (Croatia)

Registration / Fees:
Price in EUR
Up to 13 September 2021
From 14 September 2021
Members of MIPRO and IEEE
Students (undergraduate and graduate), primary and secondary school teachers

The discount doesn't apply to PhD students.


Tihana Galinac Grbac
Juraj Dobrila University of Pula
Department of Engineering
Zagrebacka 30
HR-52100 Pula, Croatia

GSM: +385 99 3820 750

The best papers will get a special award.
Accepted papers will be published in the ISSN registered conference proceedings. Presented papers in English will be submitted for inclusion in the IEEE Xplore Digital Library.
There is a possibility that the selected scientific papers with some further modification and refinement are being published in the Journal of Computing and Information Technology (CIT).



Opatija, with its 170-year-old tourism tradition, is the leading seaside resort of the Eastern Adriatic and one of the most famous tourist destinations on the Mediterranean. With its aristocratic architecture and style, Opatija has been attracting artists, kings, politicians, scientists, sportsmen, as well as business people, bankers and managers for more than 170 years.

The tourist offer in Opatija includes a vast number of hotels, excellent restaurants, entertainment venues, art festivals, superb modern and classical music concerts, beaches and swimming pools – this city satisfies all wishes and demands.

Opatija, the Queen of the Adriatic, is also one of the most prominent congress cities in the Mediterranean, particularly important for its ICT conventions, one of which is MIPRO, which has been held in Opatija since 1979, and has attracted more than a thousand participants from over forty countries. These conventions promote Opatija as one of the most desirable technological, business, educational and scientific centers in South-eastern Europe and the European Union in general.

For more details, please visit and


News about event
Currently there are no news
Patrons - random
IRB ZagrebHAKOMKončar Elektroindustrija ZagrebENT ZagrebA1 Hrvatska