|
|
Hybrid Event
|
Opening
Chair: Željka Car |
Invited Lecture
Chair: Stjepan Golubić |
Hrvoje Hadžić (Ericsson Nikola Tesla, Zagreb)
New Telecom Momentum |
New Telecom Solutions
Chair: Stjepan Golubić |
C. Phung, A. Drummond, A. Jukan (Technische Universität Braunschweig, Braunschweig, Germany) Maximizing Throughput with Routing Interference Avoidance in RIS-Assisted Relay Mesh Networks
In the modern landscape of wireless communications, multihop, high bandwidth, indoor Terahertz (THz) wireless communications are gaining significant attention. These systems couple Reconfigurable Intelligent Surface (RIS) and relay devices within the emerging 6G network framework, offering promising solutions for creating cell-less, indoor, and on-demand mesh networks. This paper presents an in-depth, analytical examination of how path allocation impacts interference within such networks. We develop the first model which analyzes interference based on the geometric parameters of beams (conic, cylindrical) as they interact with RIS, User Equipment (UE), and relay devices. We introduce a transmission scheduling heuristic designed to mitigate interference, alongside an efficient routing optimization method to maximize throughput. Our performance results elucidate the interference's effect on communication path quality and highlight effective path selection strategies with throughput maximization.
|
I. Begić (JP ELEKTROPRIVREDA HZ HB d.d. Mostar, Mostar, Bosnia and Herzegovina), A. Kurdija, J. Matuško (University of Zagreb Faculty of Electrical Engineering and Computing, Zagreb, Croatia) A Framework for 5G Network Slicing Optimization with Path Protection
Emerging telecommunications technologies require robust frameworks for efficient network slicing. We propose a network slicing model that aims to optimize the deployment of virtual networks on a physical network topology. Our model ensures compliance with 5G requirements, incorporating latency and capacity constraints on virtual links. Selecting slices with cost and resource requirements on the compute nodes is optimized using a Knapsack problem with revenue maximization. To deal with link failures, we propose a dedicated path protection algorithm by constructing two link-disjoint Steiner trees for each slice: one for primary paths, and one for backup paths. Simulation results include metrics such as cost, latency, accepted slices and resource utilization, providing valuable insights for network planners operating in diverse and dynamic environments.
|
B. Jelić (TTTech Auto Osijek, Osijek, Croatia), M. Gluhakovic (dSPACE engineering d.o.o., Zagreb, Croatia), D. Mijic (TTTech Auto Osijek, Osijek, Croatia), T. Ivešić, J. Balen (Faculty of Electrical Engineering, Computer Science and Information Technology, Osijek, Croatia) VeFog - Efficient Message Dissemination in VANETs based on Edge, Fog and Cloud Computing
Technological progress has had a dramatic impact on the automotive industry and the concept of intelligent and connected vehicles is developing rapidly. Vehicles are being equipped with various in-vehicle and environmental sensors that generate huge amounts of data, as well as onboard units that can calculate, store and communicate data with other vehicles, infrastructure and the environment. This has led to the development of Vehicular Ad-hoc Networks (VANETs), which face various challenges due to a heterogeneous and highly dynamic environment, where traditional solutions need to be improved and adapted to meet the networking and processing requirements. The integration of edge and fog computing in VANETs reduces the overhead by placing the necessary resources at the edge of the network closer to the information source. In this paper, we propose VeFog - the new architecture based on edge and fog computing for efficient data processing and dissemination in VANETs. The performance evaluation and simulation results show that the VeFog architecture is efficient, reduces processing time and saves resources with minimal infrastructure utilization.
|
Z. Limani Fazliu, J. Dobruna, F. Bruqi (University of Prishtina, Prishtina, Kosovo) ML-supported Spectrum Sensing for Underlay Vehicular D2D Communications in Urban Environments
Device-to-device communications (D2D) have been an important feature of cellular networks since they were first introduced in LTE Release 12. D2D enables more efficient use of spectrum resources and better data rates through offloading of cellular traffic onto short-range D2D links. Notably, D2D has been key in supporting vehicle-to-vehicle (V2V) and vehicle-to-everything (V2X) cellular communication in vehicular networks. Underlay D2D communications in which devices access cellular spectrum in an opportunistic manner, face several challenges such as efficient spectrum sensing access and interference. In this paper we address the problem of identifying potential cellular spectrum resources which can be used opportunistically to conduct D2D communications between vehicles in an urban vehicular network. To achieve this, we adopt a machine-learning approach to cooperatively sense the spectrum by using the observations of a cluster of vehicles to identify which spectrum resources can be used to establish V2V links. The performance of the solution is evaluated in a single cell network operating in an urban environment, with realistic modeling of vehicular mobility, using numerical simulations. The performance of our approach is evaluated in terms of spectrum efficiency and network throughput.
|
P. Kudela, J. Tothova, M. Jakubec, E. Lieskovská, B. Luhová (University Science Park, Zilina, Slovakia) Intelligent Solution for Monitoring Free Parking Places for Trucks in the Slovak Republic
The monitoring of available truck parking places is a growing issue and an important aspect of logistics and transport. The application of appropriate and innovative solutions for monitoring free parking places has the potential to improve the efficiency of route planning, the effective use of downtime, the conditions of truck and commercial vehicle drivers and, above all, to improve road safety and traffic flow. The paper highlights the possibilities of implementing intelligent solutions and technologies in the form of advanced sensor technologies and tailored applied software solutions in monitoring free parking places. The aim of the pilot project is to create an intelligent monitoring and management of parking places for freight vehicles.
|
S. Orasch, H. Flühr (FH JOANNEUM, Graz, Austria), C. Rihacek, B. Haindl (Frequentis AG, Vienna, Austria) Development of a L-Band Digital Aeronautical Communications System (LDACS) Framework
LDACS (L-Band Digital Aeronautical Communications System) is a novel designed aeronautical data link to achieve the requirements of the proposed Future Communication Infrastructure (FCI). Advanced coding, modulation, and multi-carrier transmission schemes are required to achieve the proposed secure and spectrum-efficient link while increasing the data throughput capacity at the same time. Due to the properties of the communication channel and the presence of spectrum interference the implementation of the physical layer protocols and services becomes challenging. According to the official planned technical validation exercises a LDACS conformance testing shall be performed to validate the physical layer. Therefore a simulation framework for the physical layer is required to estimate and confirm the actual system boundaries. A new LDACS framework is proposed that simulates and models the physical layer in accordance with the existing LDACS specifications. The framework is implemented in MATLAB using the Communications Toolbox and provides an end-to-end simulation of the communication link. To enhance the functionality and validity the framework introduces a hardware-in-the-loop interface to study the impact on the data link. The status and structure of the implementation will be disclosed as the framework is still under development.
|
Application of Immersive Techologies (AR/VR)
Chair: Željka Car |
Z. Bosić, V. Čačković, T. Marušić, R. Radović, P. Gusić, T. Žitnik (Ericsson Nikola Tesla, Zagreb, Croatia) Augmented Reality Modeling Support Using a Digital Twin
Augmented Reality Modeling Support (ARMS) is a Unity engine-based solution that enables physical data center (DC) planning, installation engineering, and maintenance. It has been developed at Ericsson Nikola Tesla. The basis for virtual objects created by augmented reality on top of the real data center infrastructure is a digital twin (DT) - a dynamic virtual copy of physical assets in a data center. The ARMS solution comprises Unity designed augmented reality functionalities, such as: visualize hardware product, real time status of key performance indicators (KPIs) and run simulations of different scenarios without disrupting the data center infrastructure. Augmented reality is primarily experienced via Microsoft Hololens headset bringing immersive experience to end users during daily work.
Every data center is running multiple monitoring tools and collecting different logs and performance parameters, which are the main inputs for a digital twin to be used to replicate the behavior of the data center infrastructure components. The traditional data center infrastructure maintenance refers to event-based monitoring. It primarily relies on detecting and reacting to specific events, which results in an incident driven process. ARMS solution based on digital twin provides holistic monitoring of a data center. Here a digital twin operates as a platform to gather and correlate data from different sources, model standard behaviors, run predictions and simulations. Resting on this approach, a digital twin can be used for proactive maintenance, to optimize current energy and capacity utilization, and predict future behaviors or failures of a data center infrastructure components, as well as system bottlenecks.
|
C. Phung, Z. Ennaceur, A. Drummond, A. Jukan (Technische Universität Braunschweig, Braunschweig, Germany) On the Adaptive THz System for Mobile VR Users in Smart Factories
Dynamic virtual reality (VR) applications with high-speed Terahertz (THz) channels are emerging and being deployed in future smart factories. However, the disadvantage of THz channels is that they are susceptible to changed transmission states due to mobility, leading to low fault tolerance and throughput. To this end, we propose an adaptive algorithm operated under the control plane for configuring THz systems with a dynamic VR user adaptively by choosing the best coding and modulation schemes with the best code rate and throughput based on the THz transmission positions of the VR user. Our adaptive algorithm can generate the adaptive system configurations when a VR user moves or stops at any position to satisfy the quality of THz service. The results show that our algorithm can achieve maximum throughput and fault tolerance with theoretically zeroed BER when the VR user stops moving and even always satisfy the threshold of BER allowed when the VR user moves in analyzed network scenarios.
|
E. Turajlic (Faculty of Electrical Engineering, University of Sarajevo, Sarajevo, Bosnia and Herzegovina) Multilevel Thresholding for Image Segmentation using Particle Swarm Optimization with Chaotic Inertia Weight
In this paper, the multilevel image thresholding methods based on the particle swarm optimization algorithm and different chaotic inertia weight strategies are considered. The performance of each chaotic inertia weight strategy is evaluated using a set of standard test images. Different numbers of image classes are considered. In addition, the paper also considers the multilevel thresholding performance based on commonly employed linear decreasing inertia weight and random inertia weight. All considered multilevel thresholding methods are based on Kapur’s entropy. The experimental results demonstrate that the particle swarm optimization with chaotic inertia weight can be successfully used for multilevel image thresholding.
|
Network Communications & Performance
Chair: Branko Mikac |
S. Papić, K. Josić (Algebra University, Zagreb, Croatia) Adaptive Routing in Disrupted Environments: A Study on OSPFv3's Recovery Time in Ad Hoc Wireless Networks
This paper investigates the application of the OSPFv3 routing protocol within a wireless ad hoc network environment, focusing on its performance metrics under specific failure scenarios. Specifically, we examine the network's resilience and recovery time in two critical situations: main route path failures and main node failures. Through rigorous testing and analysis, we quantify the time required for routing recovery in each scenario, shedding light on OSPFv3's effectiveness and adaptability in ensuring seamless communication amidst potential disruptions. The findings from this study provide valuable insights into optimizing OSPFv3 deployments in dynamic ad hoc wireless networks, enhancing their reliability and responsiveness under adverse conditions.
|
N. Kasunic, O. Mitrovic, V. Tadic (Zagreb University of Applied Sciences, Zagreb, Croatia) Empirical Analysis of IPv4 and IPv6 Protocol Performance in End User Environment
Over the last couple of years deployment rate of the IPv6 protocol has rapidly accelerated. Five years ago, the worldwide adoption rate was around 20% while nowadays is around 45%. Given the increasing share of IPv6-enabled devices, it is important to test and analyze end-user IPv6 performance and compare it to IPv4 performance. Such a comparison will give us insight into IPv6 behavior in the end-user environment. Simultaneous IPv4 and IPv6 testing was done in an end-user environment in Croatia, targeting 3.000 top-visited IPv4 and IPv6-enabled domains. Testing results were used to compare reachability, packet loss, round trip times, and throughput of IPv4 and IPv6 traffic.
|
N. Ilievska (Faculty of Computer Science and Engineering, "Ss.Cyril and Methodius" University, Skopje, Macedonia) Towards the Best Choice of Quasigroups for Error Detection with an Error-Detecting Code
This paper refers to an error-detecting code that we previously defined and analyzed from several aspects. The goal of the paper is to answer whether the quasigroups of order 4 for which the code achieves largest probability of error detection also provide largest number of surely detected faulty bits (FBD). For this reason, we run simulations over the set of quasigroups of order 4 that we have previously determined as suitable for coding with the considered code. While theoretical analysis of the code concerns only the cases when for coding are used linear quasigroups, in this paper we obtained experimental results not only when linear, but also when nonlinear quasigroups are used for coding, too. Using this simulation, we give answer whether the quasigroups that provide maximal probability of error detection are overall best for coding with this code. Additionally, from the results from the simulations, we obtain some additional properties of the code.
|
K. Radoš, M. Brkić, D. Begušić ( Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Split, Croatia) GNSS Signal Classification based on Machine Learning Methods
Nowadays, spoofing attacks are increasing due to the widespread usage of navigation and positioning systems. Another reason for increasing these attacks is the appearance and easy accessibility of low-cost software-defined radios (SDR). Such attacks need to be properly detected and, if possible, mitigated in time. Therefore, it is necessary to develop efficient systems for spoofing detection. There are many different spoofing detection methods which include hardware or software even machine learning methods. In this paper, detection and classification of spoofed Global navigation satellite system (GNSS) signals is performed by using different supervised machine learning methods and specific features. Two different datasets are used, including publicly available SatGrid dataset, which is not used in the examined and available articles as far to authors’ knowledge, and our adapted and modified dataset. Verification of our dataset, tested in the controlled indoor environment, is performed. Obtained results show that all used ML models classify signals with high accuracy. Two methods Support Vector Machine (SVM) and Neural Networks (NN) exhibit slightly better accuracy compared to other methods.
|
K. Radoš, M. Brkić, D. Begušić ( Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Split, Croatia) Vulnerability of Smartphones on GNSS Simplistic Spoofing Attack
With the development of new operating systems’ versions, smartphones are becoming more and more resistant to simplistic Global Navigation Satellite System (GNSS) spoofing attacks. However, the assessment of the resistance of the devices to the spoofing attacks is actual research topic. In this paper, the impact of a simplistic spoofing attack on a GPS unit, which provides location and navigation services, integrated into smartphones is investigated. Furthermore, simple and portable GPS spoofer is designed by using lowcost software-defined radio HackRF One and GPS-SDRSIM simulator. This paper contributes in range analysis of spoofer depending on different power levels and distances to smartphones. All experiments are successfully conducted on different smartphones whose location, date and time are spoofed in indoor environment. Results show the assessment of the resistance on simplistic spoofing attacks for different mobile operation systems considering different distances and transmitter power levels.
|
Optimization of Mobile Network EMF Exposure
Chair: Branko Mikac |
H. Maloku, M. Ibrani, D. Berisha, V. Laniku (University of Prishtina, Prishtina, Kosovo) Trade-off between Data Rate and EMF Exposure Level for 5G Non-Standalone Networks in Urban Areas
Daily increase in the number of mobile users and the demand for better services on the rise have obliged network and service operators to implement 5G networks. However, concerns have been raised regarding the exposure to electromagnetic field radiated by advanced communication technology. This issue is especially evident in countries where 5G will operate simultaneously with previous technologies, for a considerable time period. Because of this, network operators must carefully plan the implementation of such networks under EMF constrains while still satisfying users demands in terms of quality-of-service. In this work we have presented the trade-off analysis between EMF values and user data rate from 5G non-stand alone networks, by analysing more than 1 million real-world samples, measured for a period of one month. Our analysis shows that most cellular users achieve satisfactory data rate under acceptable EMF levels below 1V/m, however there are situations in which we observe spikes of EMF values. Our analysis show that a trade-off between EMF levels and data rates of individual users can be achieved with careful planning of future 5G infrastructure.
|
M. Ibrani, H. Maloku, A. Kastrati, K. Mustafa (University of Prishtina, Prishtina, Kosovo) In-Situ Measurement of 5G Electromagnetic Exposure Level in Urban Environments
Characterization of 5G electromagnetic levels in crowded environments is considered crucial for network planning under quality of service and human exposure constraints. In this work we present the results of an experimental measurement campaign conducted in dense urban areas where the 5G commercial network was recently deployed. The measurement setup consists of a sub-6GHz electric field probe connected to the spectrum-analyzer. Measurement samples are taken at different times of day within a month. The maximum captured value in a dense urban spot for a pilot 5G network under a realistic traffic scenario is below 4 V/m, while 80 % of measured samples are less than 0.5 V/m. The results of the in-situ measurement campaign are post-processed and compared with pre-5G technologies (2G, 3G and 4G) exposure data. All 5G captured electric field levels in this pilot study are below the reference safety levels given by the International Commission on Non-Ionizing Radiation Protection.
|
Data Management
Chair: Branko Mikac |
I. Plazibat ( Faculty of Electrical Engineering and Computing, Zagreb, Croatia), S. Dešić (Ericsson Nikola Tesla , Zagreb, Croatia) Tool Chain for Anomaly Detection in Telecommunications
In telecommunication industry, every day, more and more data has been generated. Efficient handling of huge amount of data has become very important. Anomaly detection is one of the data science methods which is used for patterns detection and deviations from the patterns. In this paper a tool chain for anomaly detection in telecommunications has been proposed and verified through a prototype. Typical daily/weekly workload for the telecommunicating network has been taken as baseline and anomaly detection was used for detection of changes to the expected behavior.
|
M. Hajnić, N. Modrušan, B. Gršić (Središnji državni ured za razvoj digitalnog društva, Zagreb, Croatia) Challenges of Implementing Interoperability Frameworks and Secure Data Exchange
The concept of interoperability has been significantly used in business processes and information systems by which authorities, businesses, and citizens participate in the secure exchange of data. Achieving secure data exchange, identifying authentic data sources, coordinating all stakeholders, and prescribing rules and standards, is not easy. No cookbook will sequentially describe the procedures and list the ingredients for success. For the continuous development of the subject, whether economic or state, continuous improvement is one of the mandatory elements of quality management. Nowadays, it is no longer enough to ensure a safe and unhindered flow of goods, capital, and people as preconditions for successful development. It is necessary to incorporate data in a secure and unobstructed exchange. Legal and technological tools ensure the security of data exchange. Still, to prevent obstruction there is a key element, a professional that manages data protection while considering the GDPR. In Croatia, the Central State Office for the Development of the Digital Society is a government body, established by law, responsible for secure data exchange which has established the Central Interoperability System for the public sector. This paper, based on this experience, presents the pitfalls, challenges, and conclusions from the practical implementation of interoperability in Croatia.
|
J. Redžepagić, D. Regvart, Z. Morić, V. Dakić (Visoko učilište Algebra, Zagreb, Croatia) Leveraging Petabytes of Data / Have We Reached Limits of Conventional Backup?
Through a comprehensive analysis, we investigate how traditional backup systems, designed for smaller-scale data storage, are becoming increasingly inadequate for handling petabytes of information. These systems struggle with extended backup windows, high costs, and ensuring of data integrity and security. The paper also highlights innovative approaches and technologies emerging in the data backup landscape, such as cloud-based solutions, deduplication techniques, and advanced encryption methods, which are attempting to address these challenges.
Furthermore, we delve into case studies and real-world examples where conventional backup methods have either succeeded or faltered under the pressure of managing petabytes of data. These examples provide valuable insights into the practical implications of current backup strategies and the necessity for evolution in this field.
In conclusion, the paper underscores the urgent need for rethinking and redesigning backup systems to cope with the demands of petabyte-scale data management. It calls for a paradigm shift towards more robust, scalable, and efficient backup solutions that can accommodate the burgeoning data landscape while ensuring reliability, accessibility, and security.
|
J. Redžepagić, V. Dakić, L. Žgrablić, M. Bašić (Visoko učilište Algebra, Zagreb, Croatia) Backing Up Object Storages, Challenges and Solutions
Object storage, known for its scalability and flexibility, has become a fundamental component in handling large volumes of unstructured data, particularly in cloud environments. However, the backup of such systems poses unique challenges that differ significantly from traditional file and block storage methods.
The first part of the paper explores the distinct characteristics of object storage, including its architecture, metadata richness, and the inherent scalability that supports vast data volumes. We then identify the key challenges in backing up object storage systems, such as data consistency, version control, and the efficient handling of metadata. The complexities in ensuring the integrity of data during transfer and storage, given the eventual consistency model of many object storage systems, are also examined.
Following the identification of these challenges, the paper presents an in-depth analysis of various solutions and best practices currently being implemented to address these issues. These include advancements in snapshot technologies, replication strategies, and the integration of cloud-native features for data protection. Additionally, we explore the role of emerging technologies such as AI and machine learning in automating and optimizing backup processes, enhancing data deduplication, and anomaly detection to prevent data loss.
The paper concludes with a discussion on the future outlook of object storage backup, emphasizing the need for continuous innovation in backup strategies to keep pace with the evolving nature of data storage technologies. The goal is to provide a comprehensive understanding of the current landscape of backing up object storage systems, along with actionable insights for organizations to manage and protect their valuable data assets effectively.
|
D. Crnarić, S. Sučić (Končar Digital, Zagreb, Croatia), I. Rosandić, G. Milaković (Hrvatske Vode, Zagreb, Croatia) Nadzor i upravljanje modernih sustava obrana od poplave u Republici Hrvatskoj
Quality flood protection demands the gathering of a large number of relevant hydrological real-time measurements that also provide irreplaceable insight into the historical data of water resources of each country. Efficient data gathering and intelligently directed processing of data enables early identification of flood risks and increases the effectiveness of preventive and executive anti-flood actions. As part of the Project for the Improvement of Non-Building Flood Risk Management Measured in the Republic of Croatia (VEPAR), a Supervisory and control system is established through the implementation of control devices and by raising the level of security access to pumping station facilities, which consists of three program modules which are integrated into the central application for incident management: pump station module, hydrological station module and technical protection and environmental monitoring system module.
|
|
Basic information:
Chairs:
Željka Car (Croatia), Stjepan Golubić (Croatia), Dragan Jevtić (Croatia), Branko Mikac (Croatia)
Steering Committee:
Slaviša Aleksić (Germany), Krešo Antonović (Croatia), Gordan Gledec (Croatia), Miran Gosta (Croatia), Darko Huljenić (Croatia), Oliver Jukić (Croatia), Erich Leitgeb (Austria), Velimir Švedek (Croatia)
Program Committee:
Željka Car (Croatia), Vlado Delić (Serbia), Saša Dešić (Croatia), Renato Filjar (Croatia), Tihana Galinac Grbac (Croatia), Stjepan Golubić (Croatia), Vlasta Hudek (Croatia), Robert Inkret (Croatia), Dragan Jevtić (Croatia), Admela Jukan (Germany), Ozren Jureković (Croatia), Marko Lacković (Croatia), Dražen Lučić (Croatia), Branko Mikac (Croatia), Mladen Sokele (Croatia), Dina Šimunić (Croatia), Darko Švelec (Croatia), Miroslav Vrankić (Croatia), Antonio Teixeira (Portugal), Mario Weber (Croatia)
Registration / Fees:
REGISTRATION / FEES
|
Price in EUR
|
EARLY BIRD
Up to 6 May 2024 |
REGULAR
From 7 May 2024 |
Members of MIPRO and IEEE |
243 |
270 |
Students (undergraduate and graduate), primary and secondary school teachers |
130 |
150 |
Others |
270 |
300 |
The discount doesn't apply to PhD students.
NOTE FOR AUTHORS: In order to have your paper published, it is required that you pay at least one registration fee for each paper. Authors of 2 or more papers are entitled to a 10% discount.
Contact:
Zeljka Car
University of Zagreb
Faculty of Electrical Engineering and Computing
Unska 3
HR-10000 Zagreb, Croatia
Phone: +385 1 6129 787
Mobile: +385 91 507 3452
E-mail: zeljka.car@fer.hr
The best papers will get a special award.
Accepted papers will be published in the ISSN registered conference proceedings. Papers in English presented at the conference will be submitted for inclusion in the IEEE Xplore Digital Library.
.............
There is a possibility that the selected scientific papers with some further modification and refinement are being published in the following journals: Journal of Computing and Information Technology (CIT), MDPI Applied Science, MDPI Information Journal, Frontiers and EAI Endorsed Transaction on Scalable Information Systems.
Location:
Opatija, with its 170-year-old tourism tradition, is the leading seaside resort of the Eastern Adriatic and one of the most famous tourist destinations on the Mediterranean. With its aristocratic architecture and style, Opatija has been attracting artists, kings, politicians, scientists, sportsmen, as well as business people, bankers and managers for more than 170 years.
The tourist offer in Opatija includes a vast number of hotels, excellent restaurants, entertainment venues, art festivals, superb modern and classical music concerts, beaches and swimming pools – this city satisfies all wishes and demands.
Opatija, the Queen of the Adriatic, is also one of the most prominent congress cities in the Mediterranean, particularly important for its ICT conventions, one of which is MIPRO, which has been held in Opatija since 1979, and attracts more than a thousand participants from over forty countries. These conventions promote Opatija as one of the most desirable technological, business, educational and scientific centers in South-eastern Europe and the European Union in general.
For more details, please visit www.opatija.hr and visitopatija.com.
|
|
|
Currently there are no news |
|
|
|
|