|
IEEE zadržava pravo neobjavljivanja radova u bazi IEEE Xplore ukoliko radovi nisu prezentirani na skupu (odnosi se samo na radove na engleskom jeziku).
Otvaranje
Predsjedateljica: Tihana Galinac Grbac |
Pozvana predavanja
Predsjedatelj: Branko Mikac |
E. Leitgeb (TU Graz, Austria)
Future Applications of Optical Wireless and Combination Scenarios with RF Technology |
D. Kragić (KTH Stockholm, Sweden)
Modelling Action, Interaction and Collaboration for Robot Systems |
Stefano Stafisso (Danieli Automation, Buttrio)
Human Resources in ICT Industry: an Everyday Challenge |
Odmor |
Informacijsko-komunikacijski izazovi
Presjedatelj: Renato Filjar |
Y. Doychinov, I. Stoyanov, T. Iliev (University of Ruse, Ruse, Bulgaria) The Golden Ratio in the Age of Communication and Information Technology
This paper is based on two main theses.
The first is, that according to a research of Gustav Fechner, people have sustainable preferences to forms with proportions, close to Golden ratio.
The second these is, that human perception and aesthetical criteria can be developed and trained.
Having mind the fact, that in this moment the lifestyle and especially dynamic presentation and perception of the information (television, monitors, mobile devices) by people are absolutely different from the moment when the Fechner’s experiment is made (before more than 100 years) it is possible to be expected also a change in the human’s preferences.In the context of the subject matter may be noted the fact, that in March 2011 the 16:9 resolution 1920×1080 became the most common used resolution among Steam's users.
In the present paper are shown the results from repeating of Fechner’s experiment, made between 65 persons at the age of 18-20.According to the data obtained, respondents indicated the most harmonious and preferred proportions are 1:1, 2:1 and 1,78:1 (which in practice is well known aspect ratio 16: 9). Golden ratio takes the fourth position.
|
N. Moloisane, R. Malekian (University of Pretoria, Pretoria, South Africa), D. Bogatinoska (University for Information Science and Technology “St. Paul the Apostle”, Ohrid, Macedonia) Wireless Machine-to-Machine Communication for Intelligent Transportation Systems: Internet of Vehicles and Vehicle to Grid
Machine to machine communication in intelligent transportation is a technology that aims to interconnect various components such as sensors, vehicles, road infrastructures and wireless networks. The significance thereof is to solve problems such as road congestion, road accidents and high vehicle fuel consumption. This paper gives an overview of how Machine-to-machine (M2M) communication can be used in intelligent transportation systems (ITS) to improve road safety and efficiency, where Vehicular ad-hoc networks (VANETs) play a major role. These applications include traffic light control, fleet management and smart grid systems. Some of M2M architectures that have been devised are also discussed.
|
T. Iliev, G. Mihaylov, E. Ivanova, I. Stoyanov (University of Ruse, Ruse, Bulgaria) Power Control Schemes for Device-to-Device Communications in 5G Mobile network
Device-to-device (D2D) communications integrated into cellular networks is a means to take advantage of the proximity of devices and thereby to increase the user bitrates and system capacity. D2D communications has recently been proposed for the 3GPP Long Term Evolution (LTE) system as a method to increase the spectrum- and energy-efficiency. Device-to-device (D2D) communication has the potential of increasing the system capacity, energy efficiency and achievable peak rates while reducing the end-to-end latency. To realize these gains, are proposed resource allocation (RA) and power control (PC) approaches that show near optimal performance in terms of spectral or energy efficiency.
|
G. Madhale Jadav, L. Batistić, S. Vlahinić, M. Vrankić (Tehnički Fakultet Sveučilište u Rijeci, Rijeka, Croatia) Brain Computer Interface Communicator : A Response to Auditory Stimuli Experiment
This paper describes a communication system, designed to help people with disabilities to communicate with others. In this case, it is built on Event Related Potentials (ERP) which occur as a response to stimuli. The stimuli are auditory answers to the asked questions, where one of the stimulus is the correct answer. The stimulus which is the possible correct answer is the target stimulus and other stimuli are considered as non-targets. The only reliable information available is the onset of the stimuli, based on this information the spatio-temporal pattern for the target and non-targets is expected to be uncorrelated to the ongoing brain activity and with each other. This allows us to train the spatial filter coefficients for the know targets, so that it can use this trained dataset to correctly classify targets. Results are obtained by optimizing the spatial filter parameters prior to classification, and the classification results are analyzed for several healthy participants.
|
J. Bajt (Ericsson Nikola Tesla Servisi d.o.o., Zagreb, Croatia) Uspostava jedinstvene informacijske točke o fizičkoj infrastrukturi
Direktiva 2014/61/EU o mjerama za smanjenje troškova postavljanja elektroničkih komunikacijskih mreža velikih brzina prenesena je krajem 2016. godine u nacionalno zakonodavstvo Republika Hrvatska. Jedan od ključnih zahtjeva Direktive je uspostava jedinstvene informacijske točke o fizičkoj infrastrukturi te o tekućim i planiranim građevinskim radovima vezanim za infrastrukturu. Svrha je ovoga rada ukazati na pravni okvir za uspostavu jedinstvene informacijske točke i omogućenje pristupa podacima o infrastrukturi i građevinskim radovima te na moguće zapreke u uspostavi cjelovitog, transparentnog i učinkovitog sustava pristupa navedenim podacima.
|
S. Dešić (Ericsson Nikola Tesla d. d. , Zagreb, Croatia), M. Filić (Department for Mathematics, Faculty of Science, University of Zagreb, Zagreb, Croatia), R. Filjar (Ericsson Nikola Tesla d.d., Zagreb, Croatia) Determination of Origins and Destinations for an O-D Matrix Based on Telecommunication Activity Record
The origin-destination (O-D) matrix is a known indicator of individual and group mobility in transport science, an invaluable input for socio-economic activity assessment of the community, and a tool for strategic planning and policy developments. The abundance of mobility-related data allows for expansion of the ODM towards the description of the over-all socio-economic activity, of which the transport is just a component, thus rendering policy development and strategic planning more efficient. Determination of the sources (origins) and targets (destinations) of the socio-economic activities remains an unresolved point in the ODM estimation process. Here we present a novel method for activity spot (origins and destinations) identification from the anonymised records of telecommunications activity, and publicly available data on telecommunication network access points. Using the algorithm developed by our team, the origins and destinations can be effectively identified as the focal points of socio-economic activity, thus establishing the foundation for more efficient urban policy development and strategic planning.
|
Pozvana prezentacija
Predsjedatelj:Stjepan Golubić |
H. Pezer, D. Boto (King ICT Ltd., Zagreb, Croatia)
Trendovi u digitalizaciji prostora |
Odmor |
Upravljanje kvalitetom
Predsjedatelj Stjepan Golubić |
J. Baraković Husić (Faculty of Electrical Engineering, University of Sarajevo, Sarajevo, Bosnia and Herzegovina), S. Baraković (Faculty of Traffic and Communications, University of Sarajevo; American University in Bosnia and Her, Sarajevo, Bosnia and Herzegovina), A. Veispahić (Anovis IT Services and Trading GmbH, Vienna, Austria) What Factors Influence the Quality of Experience for WebRTC Video Calls?
Web real-time communication (WebRTC) based services introduce the new way of communication and collaboration. These types of services allow real-time communication with voice, video, messaging, and data sharing via browser. Their success and adoption depend on a number of different factors that influence user’s experience and its quality. As WebRTC based services are growing, it is important to identify these influence factors (IFs) and investigate their impact on quality of experience (QoE). In this paper, the focus is on users’ experience with WebRTC video calling. The objective is to determine the most and least influential factors in general according to examined users’ opinions in the context of WebRTC video calling, and all for the successful management of QoE. With this in focus, this paper may serve as a basis for further research in the field in order to increase the utilization and adoption of WebRTC technology.
|
J. Baraković Husić (Faculty of Electrical Engineering, University of Sarajevo, Sarajevo, Bosnia and Herzegovina), S. Baraković (Faculty of Traffic and Communications, University of Sarajevo; American University in Bosnia and Her, Sarajevo, Bosnia and Herzegovina), S. Muminović (East Codes and Tours d.o.o., Sarajevo, Bosnia and Herzegovina) Is There Any Impact of Human Influence Factors on Quality of Experience?
The increasing popularity of real-time communication services has driven a rising interest in understanding the factors influencing the quality of experience (QoE). Many research activities aiming to accomplish this goal have addressed different influence factors (IFs), which may be classified into three categories, i.e., human IFs, context IFs, and system IFs. Although the importance of human IFs (HIFs) has been already emphasized, these factors have been considered in limited extent, and due to lack of empirical evidence, they still remain not well understood. Therefore, this research has been motivated by the challenge to provide a deeper understanding of HIF’s impact on QoE in the context of the real-time communication services. In order to accomplish this and verify the conclusions derived from related work, we have conducted two experimental studies which consider voice over internet protocol (VoIP) and unified communication (UC) services. Experimental results show no existence of impacts of selected HIFs on the user's overall QoE while using either VoIP or UC services. However, this highlights the need for further research on this topic due its importance for satisfying end user needs and expectations in the context of real-time communication services.
|
V. Prčić (Infoart d.o.o., Zagreb, Croatia), D. Kalpić, D. Šimunić (Fakultet elektrotehnike i računarstva, Zagreb, Croatia) Extended AODV Routing Protocol Based on Route Quality Approximation via Bijective Link-Quality Aggregation
Currently used routing protocols in mobile ad-hoc networks, such as those based on the ZigBee protocol, usually do not incorporate any notion of link-quality while searching for routes. While extensions to the AODV routing protocol with this in mind have been proposed, they usually use a single measure, such as SNR or RSSI to approximate the link-quality. Also, it is not common that the process for determining the route between two nodes makes future route searches easier nor quicker. In this work an extension to the standard AODV routing protocol in proposed, one that works with any well-defined link-to-link-quality assignment function and defines a route quality approximation approach that enables the maintenance of correct local measures needed for future route searches.
|
N. Banovic-Curguz, D. Ilisevic (Telekomunikacije RS A.D. Banja Luka, Banja Luka, Bosnia and Herzegovina) Development Trends of Telecommunications Metrics
The transition from voice to data services has led to new trends in telecommunication business, and therefore the need to adjust legacy metrics and KPIs (Key Performance Indicators) that aims to point out the effects of these changes. In this paper, we give the review of development trends of new KPIs that provide greater insight into the use of data based services, as well as estimating the share of revenue that is obtained from these services. The importance of customer segmentation and correlation with KBOs (Key Business Objectives) is discussed. Special attention was paid to the situation of the market in Bosnia and Herzegovina and the need for trends monitoring in this area.
|
J. Horalek (University of Hradec Kralove, Hradec Kralove, Czech Republic), F. Holik, V. Hurtova (University of Pardubice, Pardubice, Czech Republic) Implementation and Testing of Cisco IP SLA in Smart Grid Network Environments
Smart grid networks are becoming more and more commonly deployed due to their undisputed benefits. On the other hand, there is a high demand for reliability and functionality of these networks. This paper is analysing usage of the IP SLA for monitoring network state and collecting important information for potential problem detection and solving. The practical part of the paper presents implementation of the IP SLA into the smart grid network environment and its testing. The results from several simulated scenarios with different QoS classes, used within the smart grid networks, are discussed.
|
O. Jukić, I. Heđi, I. Špeh (Visoka škola Virovitica, Virovitica, Croatia) Fault Management and Management Information Base (MIB)
Fault management function mostly rely on SNMP protocol and SNMP agent capabilities, where SNMP agents are implemented over different network elements. Management information is described in Management Information Base (MIB) for every single SNMP agent class. Hence, integrated management systems needs to implement different SNMP managers capable to communicate with number of different SNMP agents, obtaining management information from real telecommunication network. Those managers are often called access modules.
In order to decrease time to delivery for SNMP management solutions, and to decrease time to delivery of specific access modules, number of generic fault management oriented MIBs are designed (e.g. Alarm Management Information Base). Theoretically, if different SNMP agents rely on the same management information base, only one SNMP manager (access module) is enough to manage different network elements. It is very logical way of thinking, if we consider that in real life different network elements share the same alarm structure (e.g. start time, probable cause, additional information, affected network element). However, state of the art is not so idyllic, from the integrator’s point of view. Number of MIBs exist in real telecommunications network. In this paper we will make short research on MIBs implemented on different network elements, in order to detect real integrator position in network management solution’s development.
|
D. Samociuk, A. Chydzinski (Silesian University of Technology, Gliwice, Poland) Distributed Threat Removal in Software-Defined Networks
We propose an architecture for distributed threat removal in software-defined networks. This is a novel design of a large network, in which security analysis must be performed. In the classic paradigm, the security analyzer is an entry device, connected serially with the rest of the topology. Obviously, this device may suffer from a high processing load. Therefore, it may create a bottleneck, when the arriving traffic is waiting for the security verification, before being forwarded to next devices in the network. In the proposed architecture, traffic is immediately forwarded towards all destinations, while the security analysis is carried out in parallel, resulting in offloading the entry security device. We show that the proposed solution reduces the bottleneck in the topology and increases the rate of the carried traffic, while ensuring the same, as in the classic approach, security level.
|
D. Lacković, M. Tomic (University of Rijeka Faculty of Engineering, Rijeka, Croatia) Performance Analysis of Virtualized VPN Endpoints
Virtual Private Network (VPN) is an established technology that provides users a way to achieve secure communication over an insecure communication channel, such as the public Internet. It has been widely accepted due to its flexibility and availability on many platforms. It is also often used as an alternative to expensive leased lines. In traditional setups, VPN endpoints are setup in hardware appliances, such as firewalls or routers. In modern networks which utilize Network Functions Virtualization (NFV), VPN endpoints can be virtualized on common servers. Because data encryption and decryption are CPU intensive operations, it is important to investigate limits of such setups so that feasibility of endpoint virtualization can be evaluated. In this paper, we analyze performance of two industry standard VPN implementations - IPSec and OpenVPN. We examine CPU usage, throughput, latency and jitter in relation to encryption algorithm used, packet size and round trip time. Our experiments suggest that moving VPN endpoints from a specialized hardware appliance to a virtualized environment can be a viable and simple solution if traffic throughput requirements are not too demanding. However, it is still difficult to replace high-end appliances with large throughput capabilities.
|
K. Skračić, I. Bodrušić (Ericsson Nikola Tesla, Zagreb, Croatia) A Big Data Solution for Troubleshooting Mobile Network Performance Problems
Big Data has become a major competitive advantage for many organizations. The analytical capabilities made possible by Big Data analytics platforms are a key stepping stone for advancing the business of every organization. This paper illustrates the development of a big data analytics system for mobile telecommunication systems. The authors developed a solution for analyzing data produced by mobile network nodes which contain data relevant for predictive maintenance and troubleshooting purposes. The solution is built around the problem of working with small files in the Hadoop environment. The logs collected from mobile network nodes are small binary files between 5 and 15MB in size. These binary log files need to be decoded to a readable format, and then analyzed to extract useful information. In this paper, the authors provided a benchmark of various scenarios for collecting and decoding the binary log files in a Hadoop cluster. As a result, the scenario with the highest performance has been used in the implementation of our solution. The developed solution has been built and tested on a live Hadoop cluster using real-world data obtained from several telecom operators around the world.
|
Odmor |
Obrada signala
Predsjedatelj: Oliver Jukić |
I. Stanković, M. Daković, I. Orović (University of Montenegro, Podgorica, Montenegro) Overlapping Blocks in Reconstruction of Sparse Images
Images are commonly analysed by the discrete cosine transform (DCT) on a number of blocks of smaller size. The blocks are then combined back to the original size image. Since the DCT of blocks have a few nonzero coefficients, the images can be considered as sparse in this transformation domain. The theory of compressive sensing states that some corrupted pixels within blocks can be reconstructed by minimising the blocks sparsity in the DCT domain. Block edges can affect the quality of the reconstruction. In some blocks, a few pixels from an object which mostly belongs to the neighbouring blocks may appear at the edges. Compressive sensing reconstruction algorithm can recognise these pixels as disturbance and perform their false reconstruction in order to minimise the sparsity of the considered block. To overcome this problem, a method with overlapping blocks is proposed. Images are analysed with partially overlapping blocks and then reconstructed using their non-overlapped parts. We have demonstrated the improvements of overlapping blocks on images corrupted with combined noise. A comparison between the reconstructions with non-overlapping and overlapping blocks is presented using the structural similarity index.
|
M. Daković, I. Stanković, M. Brajović, L. Stanković (University of Montenegro, Podgorica, Montenegro) Sparse Signal Reconstruction Based on Random Search Procedure
A method for reconstruction of sparse signals is presented in this paper. It is an improved version of the direct-search method for finding the set of non-zero coefficients representing the solution in sparsity domain. The proposed random search procedure is performed assuming the largest possible number of non-zero coefficients still satisfying the available measurements system. In the sparse signal processing and compressive sensing theory, this number should be smaller than or equal to the number of measurements. For each possible arrangement of the examined non-zero coefficients, the reconstruction is done by solving the system of equations in the least square sense, until the solution is found. Benefits of the proposed method are discussed. The calculation complexity improvement of the proposed method, compared to the direct-search, is analytically expressed. It depends on the total number of signal samples, number of measurements and the signal sparsity. The presented theory is confirmed with numerical examples.
|
E. Turajlic (Faculty of Electrical Engineering University of Sarajevo , Sarajevo, Bosnia and Herzegovina) A Fast Noise Level Estimation Algorithm Based on Adaptive Image Segmentation and Laplacian Convolution
This paper proposes a fast algorithm for additive white Gaussian noise level estimation from still digital images. The proposed algorithm uses a Laplacian operator to suppress the underlying image signal. In addition, the algorithm performs a non-overlapping block segmentation of images in conjunction with the local averaging to obtain the local noise level estimates. These local noise level estimates facilitate a variable block size image tessellation and adaptive estimation of homogenous image patches. Thus, the proposed algorithm can be described as a hybrid method as it adopts some principal characteristics of both filter-based and block-based methods. The performance of the proposed noise estimation algorithm is evaluated on a dataset of natural images. The results show that the proposed algorithm is able to provide a consistent performance across different image types and noise levels. In addition, it has been demonstrated that the adaptive nature of homogenous block estimation improves the computational efficiency of the algorithm.
|
Informacijsko-komunikacijske mreže
Predsjedatelj: Branko Mikac |
D. Ilisevic, N. Banovic-Curguz (Mtel, Banja Luka, Bosnia and Herzegovina) Advanced Regulation Approach: Dynamic Rules for Capturing the Full Potential of Future ICT Networks
Software Defined Networks (SDN) and Network Function Virtualization (NFV) could be taken as a different expression of the overall transformation trend toward network softwarization which is deeply impacting and bringing Telecom and ICT Industry. These changes will have a broader impact on society, including aspects of regulation, policy, social impacts and new business model. A number of new stakeholders are involved in the realization of SDN/NFV driven architecture. Telecom companies are often regulated more than internet players and this asymmetry represent a problem in terms of competitiveness and capability to deliver innovative services. In this article we have provides short overview of the most relevant stakeholder roles in future ICT industry. Afterwards, we have presented importance of regulation in future ICT environment which place huge impact on foster innovation and service delivery.
|
T. Iliev, G. Mihaylov, T. Bikov, E. Ivanova, I. Stoyanov (University of Ruse, Ruse, Bulgaria), D. Radev (University of Telecommunications and Posts, Sofia, Bulgaria) LTE eNB Traffic Analysis and Key Techniques Towards 5G Mobile Networks
With the fast growth of mobile data services, rich services deliver a brand new experience to end users, and also bring about new opportunities for operators. Several research projects involving key international mobile network operators, infrastructure and other manufacturers, and academic institutions, have been launched recently to set the foundations and principals of the next generation mobile networks. In this paper, we will partially compare the fourth and future fifth generations of mobile networks and their applicability.
|
I. Heđi, I. Špeh, A. Šarabok (Virovitica College, Virovitica, Croatia) IoT Network Protocols Comparison for the Purpose of IoT Constrained Networks
Abstract -In this paper, a comparison of Internet of Things protocols used for data transfer in Internet of Things constrained networks is presented. Setting up such a network with a large number of physical interconnected IoT devices can be a challenge. In the IoT world, one of the key challenges is to efficiently support M2M communication in constrained networks. This can be achieved using MQTT (Message Queuing Telemetry Transport) and CoAP (Constrained Application Protocol) protocols. Choosing the appropriate protocol can be difficult while developing IoT application. There are several conditions that needs to be considered while determining which protocol should be used. In this paper, we will evaluate performance and compare these protocols through different scenarios.
|
A. Akbal, E. Akbal (Fırat University, Elazig, Turkey) Digital Forensic Analysis through Firewall For Detection Of Information Crimes in Hospital Networks
Abstract
In recent years, rapid developments in information technologies have been used rapidly in the healthcare sector. Depending on the developments in technology, the health sector has also started to carry all patients' data electronically. In many hospitals currently carrying digital systems, it is very important for patients to keep their personal health data in order to have fast and timely medical intervention. The ability to control devices on the network, especially those used in intensive care units, which are of vital importance for the patient, also brings data security and the forensic information problems in these systems to the hospitals where the personal data are concentrated.
In this study, digital forensics analysis was done by taking a view of Firewall on the Firewall used in the hospitals, and the data that could create a criminal element were determined. As is known, all network traffic on the networks is over the firewall. For this reason, the traffic on the entire network is recorded on the firewall. When these records need to be analyzed in terms of forensic information and criminal elements should be detected, the records on the firewall should be analyzed without deterioration. For this purpose, the image of the firewall needs to be taken. However, in order to obtain images, it is necessary to calculate MD5 and SHA-1 HASH values with international validity, which confirm the integrity of the image. For this purpose, the Juniper SSG 550 firewall device used in Fırat University Hospital will be analyzed. For analysis, FTK Imager program which is developed by AccessData firm and offered for free use will be used. This image will be analyzed with forensic tools such as forensics explorer.
|
A. Koren, D. Šimunić (Fakultet elektrotehnike i računarstva, Sveučilište u Zagrebu, Zagreb, Croatia) Topology Analysis for Energy-Aware Node Placement in Wireless Sensor Networks of Home Sensing Environments
The goal of the paper is to assess the impact of network topology on its performance and throughput capacity. Furthermore, it explores optimal network topology for wireless sensor networks (WSNs) with and without obstacles in a building monitoring WSN (Home Sensing Environment). Influence of nodes’ spatial distributions on the network performance is explored and the optimal nodes distribution on given conditions is given for three typical network spatial topology (no obstacles, minor obstacles and major obstacles). Then, the network performance is analyzed for each topology and results are compared.
|
V. Henriques, R. Malekian (University of Pretoria, Pretoria, South Africa), D. Capeska Bogatinoska (University for Information Science and Technology “St. Paul the Apostle”, Ohrid, Macedonia) Mine Safety System Using Wireless Sensor Networks
The activity of mining always had an element of risk associated with it. Miners often had to encounter challenging underground environment which sometimes result in injuries and fatalities. Some portion of them can be attributed to error caused by human carelessness. More often the cause of these accidents can be attributed to the ambient conditions. In this paper, we design a mine safety system using wireless sensor networks with measurement of parameters such as temperature, air-flow, humidity, noise, dust, and gas concentration. These six ambient characteristics have been identified as hazardous to the health and safety of the mine worker. From the experimental results obtained, an accurate mine safety system is achieved by design of various sensors. The temperature sensors, humidity sensor, airflow sensor, and noise sensor achieved an accuracy of 94.45%, 98.55%, 85.4%, 99.14% alternatively. Besides, the dust sensor has a resolution of 0.003mg/m3 and the gas sensor show a resolution of 0.9ppm which is close to the required resolution of 1 ppm.
|
Poslovni procesi i ekonomičnost poslovanja
Predsjedatelj: Renato Filjar |
F. Carpio, W. Bziuk, A. Jukan (Institut für Datentechnik und Kommunikationsnetze, Braunschweig, Germany) Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs
Network Function Virtualization (NFV) is enabling the softwarization of traditional network services, commonly deployed in dedicated hardware, into generic hardware in form of Virtual Network Functions (VNFs), which can be located flexibly in the network. However, network load balancing can be critical for an ordered sequence of VNFs, also known as Service Function Chains, a common cloud and network service approach today. The placement of these chained functions increases the cross-traffic between VNFs, directly affecting to the efficiency of bandwidth utilization. The optimization of the placement of these VNFs is a challenge as also other factors need to be considered, such as the required amount of physical resources and their utilization. To address this issue, we study the problem of VNF placement with replications, and especially the potential of VNFs replications to help load balance the network, while the amount of resources is minimized. In this paper we present a Linear Programming model for the optimum placement of functions finding a trade-off between the minimization of two objectives: the link utilization and the amount of resources in terms of nodes. The results show how the model load balances the utilization of all links in the network using minimum resources.
|
D. Alić, A. Djedović, S. Omanović, A. Tanović (University of Sarajevo/Faculty of Electrical Engineering, Sarajevo, Bosnia and Herzegovina) Impact of Human Resources Changes on Performance and Productivity of Scrum Teams
This paper presents results of an analysis of the impact of the human resources changes in Scrum teams. Four Scrum teams were tracked (two developments and two quality assurance) along with their productivity and performance. Analysis showed that human resources changes have a significant impact on the entire team and its behavior. Their effort is increased by adding overtime hours. In the same time, their performance and effective work is decreased, which is reflected in the quantity of work that can be billed to the client. The analysis shows that it takes, in average, three sprints lasting for fourteen days for the new team members to fully adjust to team process and acquire a business knowledge needed for maximum productivity. Teams that have been working together for more time and have more senior members can adjust to team shifts more quickly. Also, a correlation between quality assurance and development team has been established – when development team had extra utilization due to overtime, quality assurance team had an increase in overtime hours almost proportionately.
|
N. Pivačić Kusić, N. Kusić (Ericsson Nikola Tesla d.d., Split, Croatia) Povezanost društveno odgovornog poslovanja i konkurentske sposobnosti poduzeća
U radu su predloženi model i instrumenti mjerenja pojedinih elemenata/komponenti društveno odgovornog poslovanja kao i konkurentske sposobnosti poduzeća. Na temelju toga dan je model povezanosti stupnja razvijenosti društveno odgovornog poslovanja i stupnja razvijenosti konkurentske sposobnosti poduzeća. Uz pomoć modela analiziralo se utječu li i kako utječu ekonomske, društvene i ekološke komponente na razvijanje ključnih kompetencija (opipljivi resursi, neopipljivi resursi i organizacijske sposobnosti) koji su izvor konkurentske prednosti, odnosno sposobnosti poduzeća. Istraživanjem se želi povećati razumijevanje važnosti društveno odgovornog poslovanja i opseg znanja o njemu u kontekstu povećanja konkurentnosti poduzeća.
Empirijska istraživanja provedena su formuliranim anketnim upitnikom na uzorku od 76 velikih hrvatskih poduzeća. Rezultati istraživanja su ukazali na pozitivnu međuovisnost ovih dvaju pokazatelja.
|
D. Markulin, K. Musa, L. Pisačić, A. Mršić (HT d.d., Zagreb, Croatia) Uloga standarda u postupku redizajna poslovnih procesa telekom operatora
U radu je naglašen značaj modeliranja poslovnih procesa kao preduvjeta za efikasne sustave podrške kojima se upravalja realizacijom telekomunikacijskih usluga. Kako bi se osigurali okviri za uspješno modeliranje poslovnih procesa potrebno je razmotriti i odabrati jedno od postojećih standarda kao što je eTOM (Enhanced Telecom Operations Map) definiran od strane TM Foruma (Tele Management Foruma). eTOM standard propisuje sedam kategorija korisnički orijentiranih procesa kojima se modeliraju poslovni procesi u telekomunikacijama. U radu je opisan primjer modeliranja poslovnog procesa koji pripada jednoj od tih kategorija.
|
D. Glamočanin (Mtel Banja Luka, Banja Luka, Bosnia and Herzegovina) Sporazum o razini usluga i upravljanje razinom usluga u informacionim tehnologijama uz podršku mehanizma CobiT
U današnje vrijeme razvoj ekonomije je najčešće diktiran uslugama koje se traže i isporučuju korisnicima. Organizacije sve više zavise od direktnih isporučioca usluga, ali i trećih strana za različite usluge u informacionim tehnologijama. Međutim, organizacije često nisu zadovoljne uslugama koje dobijaju. Ponekad su zavisne od trećih strana čija budućnost je neizvjesna, posebno u ovom periodu koji karakterišu velike ekonomske promjene. U ovom radu biće prikazano kako organizacije mogu parirati takvom problemu koristeći Sporazume o razini usluga – Service level agreements SLAs i Upravljanje razinom usluga – Service level management SLM, uz podršku mehanizma CobiT (Control Objectives for Information and related Technology).
|
I. Ivosić (Hep d.d., Zagreb, Croatia) Synergy of ITIL Methodology and Help Users Systems
Abstract - Information and communication technology, services and corporate security shape modern working places creating new added values. The development of technology markets and new innovations impose phrase how to lead IT and thereby be successful. The article describes and develops pragmatism and interdisciplinary of information systems of companies with the help of ITIL methodology. The construction of the help users system can improve business, but it is not easy to provide safety and legal economic regulator. Social and political system defines a new user and its function and role and the challenge is to balance customer needs and IT engineering support in a globalized world where is the thin dividing line between work and private.
|
K. Cazin, T. Pušec (HŽ Infrastruktura, Zgreb, Croatia) Sinkronizacija SDH mreže HŽ Infrastrukture
Za multipleksiranje i prijenos digitalnih signala u transportnoj mreži HŽ Infrastrukture koristi se tehnologija sinkrone digitalne hijerarhije (SDH). SDH kao transparentna i krajnje pouzdana komunikacijska infrastruktura nadograđivala se usporedo s razvojem optičke okosnice telekomunikacijske mreže HŽ Infrastrukture.
Sinkronizacija SDH mreže HŽ Infrastrukture također je imala svoj razvojni ciklus: od početne faze praktički bez sinkronizacije, preko sinkronizacije E1 signalom iz SDH mreže mađarskih željeznica pa do sadašnjeg stanja gdje sinkronizaciju osiguravaju tri jedinice za distribuciju sinkronizacijskog signala (SSU, Synchronisation Supply Unit) s prijamnicima signala sustava globalnog pozicioniranja (GPS, Global Positioning System).
Višegodišnjim praćenjem rada SDH mreže HŽ Infrastrukture uočeni su određeni propusti u konfiguraciji mrežnih entiteta vezani uz sinkronizaciju mreže o kojima će se detaljno govoriti u ovom radu. Prikazat će se promjene postavki sinkronizacije SDH mreže do kojih se došlo dubinskom analizom kompleksnog problema sinkronizacije, a koje su već implementirane u SDH mreži HŽ Infrastrukture, dakle testirane su u realnim uvjetima rada SDH mreže. Također će se govoriti, u teoretskom smislu, o smjernicama razvoja SDH mreže HŽ Infrastrukture i sinkronizaciji iste u budućnosti, imajući u vidu planove proširenja SDH mreže HŽ Infrastrukture.
|
Odmor |
Modeliranje i simulacije Predsjedatelj: Renato Filjar |
M. Márton, Ľ. Ovseník, J. Turán, M. Špes (TUKE, Faculty of Electrical Engineering and Informatics, Košice, Slovakia) Design of Optical Fiber Gyroscope System in Program Environment OptSim
Optical fiber technologies gradually expanded into areas, which enabled creation of new hybrid applications. These applications show special features, which predetermine the success. Special category of optical interferometric systems with possibilities of many applications in these areas. Combination of gyroscope with optical fiber interferometer based on principle of Sagnac interferometer is able to create optical fiber gyroscope system. The basic criterion for this activity is creation of Sagnac effect in optical fiber. This phenomenon is needed for detection of direction and speed of rotation. The point of this article is design and testing optical fiber gyroscope system in program environment OptSim.
|
D. Ramljak (IBM Hrvatska, Zagreb, Croatia) Value Based Service Design Elements in Business Ecosystem Architecture
Enterprises are increasingly being exposed to a number of changes steming from the overall business environment and ther collaborative networkl of users and partners. Current techniques and models created by using standard frameworks such as Enteprise Architecture are not able to cover relevant design aspects required for service interactions, thus new design elements and aspects steming from new concepts such as Ecosystem Architectures are being introduced.
This paper focuses on introduction of innovative method and models for service design and selection in complex ecosystem environments by focusing on value oriented aspects used in service composition.
|
S. Sadinov (Technical University of Gabrovo, Gabrovo, Bulgaria) Simulation Study of M-ARY QAM Modulation Techniques using Matlab/Simulink
Recent theoretical studies of communication systems show much interest on high-level modulation, such as M-ary quadrature amplitude modulation (M-QAM), and most related works are based on the simulations. In this paper, a simulation model to study various M-ary QAM modulation techniques is proposed. The simulation model is implemented in Matlab/Simulink environment and BERTool in conjunction with the model is also used. Simulation for 64-QAM and 256-QAM modulation techniques is done. The effect of the phase noise on the constellation diagram for both M-QAMs is examined. The impact of changing the power of the input signal, phase noise and frequency offset on Bit Error Rate (BER) performance of 64-QAM and 256-QAM is also studied. The simulation results in terms of the constellation diagram and the BER curve under various conditions are presented and analyzed.
|
Zatvaranje |
|
Osnovni podaci:
Voditelji:
Tihana Galinac Grbac (Croatia), Branko Mikac (Croatia), Stjepan Golubić (Croatia), Dragan Jevtić (Croatia), Renato Filjar (Croatia), Tomislav Kosanović (Croatia)
Voditeljstvo:
Slaviša Aleksić (Germany), Željka Car (Croatia), Saša Dešić (Croatia), Vlasta Hudek (Croatia), Darko Huljenić (Croatia), Robert Inkret (Croatia), Admela Jukan (Germany), Zdravko Jukić (Croatia), Marko Lacković (Croatia), Erich Leitgeb (Austria), Dražen Lučić (Croatia), Davor Šarić (Croatia), Dina Šimunić (Croatia), Velimir Švedek (Croatia), Antonio Teixeira (Portugal)
Prijava/Kotizacija:
PRIJAVA / KOTIZACIJE
|
CIJENA U EUR-ima
|
Prije 8.5.2017.
|
Poslije 8.5.2017.
|
Članovi MIPRO i IEEE |
180
|
200
|
Studenti (preddiplomski i diplomski studij) te nastavnici osnovnih i srednjih škola |
100
|
110
|
Ostali |
200
|
220
|
Popust se ne odnosi na studente doktorskog studija.
Kontakt:
Tihana Galinac Grbac
Tehnički fakultet
Zavod za računarstvo
Vukovarska 58
51000 Rijeka, Hrvatska
Tel.: +385 51 651 596
GSM: +385 99 3820 750
E-mail: tihana.galinac@riteh.hr
Najbolji radovi bit će nagrađeni.
Prihvaćeni radovi bit će objavljeni u zborniku radova s ISBN brojem. Radovi napisani na engleskom jeziku i prezentirani na skupu bit će poslani za objavljivanje u bazi IEEE Xplore.
Postoji mogućnost da se odabrani znanstveni radovi uz određenu doradu objave u međunarodnom časopisu Journal of Computing and Information Technology (CIT).
Predsjednik Međunarodnog programskog odbora:
Petar Biljanović (Croatia)
Međunarodni programski odbor:
Slavko Amon (Slovenia), Vesna Anđelić (Croatia), Michael E. Auer (Austria), Dubravko Babić (Croatia), Snježana Babić (Croatia), Almir Badnjevic (Bosnia and Herzegovina), Mirta Baranović (Croatia), Bartosz Bebel (Poland), Ladjel Bellatreche (France), Eugen Brenner (Austria), Gianpiero Brunetti (Italy), Andrea Budin (Croatia), Željko Butković (Croatia), Željka Car (Croatia), Matjaž Colnarič (Slovenia), Alfredo Cuzzocrea (Italy), Marina Čičin-Šain (Croatia), Marko Čupić (Croatia), Marko Delimar (Croatia), Todd Eavis (Canada), Maurizio Ferrari (Italy), Bekim Fetaji (Macedonia), Renato Filjar (Croatia), Tihana Galinac Grbac (Croatia), Paolo Garza (Italy), Liljana Gavrilovska (Macedonia), Matteo Golfarelli (Italy), Stjepan Golubić (Croatia), Francesco Gregoretti (Italy), Stjepan Groš (Croatia), Niko Guid (Slovenia), Jaak Henno (Estonia), Ladislav Hluchy (Slovakia), Vlasta Hudek (Croatia), Željko Hutinski (Croatia), Mile Ivanda (Croatia), Hannu Jaakkola (Finland), Leonardo Jelenković (Croatia), Dragan Jevtić (Croatia), Robert Jones (Switzerland), Peter Kacsuk (Hungary), Aneta Karaivanova (Bulgaria), Marko Koričić (Croatia), Tomislav Kosanović (Croatia), Mladen Mauher (Croatia), Igor Mekjavic (Slovenia), Branko Mikac (Croatia), Veljko Milutinović (Serbia), Nikola Mišković (Croatia), Vladimir Mrvoš (Croatia), Jadranko F. Novak (Croatia), Jesus Pardillo (Spain), Nikola Pavešić (Slovenia), Vladimir Peršić (Croatia), Slobodan Ribarić (Croatia), Janez Rozman (Slovenia), Karolj Skala (Croatia), Ivanka Sluganović (Croatia), Mario Spremić (Croatia), Vlado Sruk (Croatia), Stefano Stafisso (Italy), Uroš Stanič (Slovenia), Ninoslav Stojadinović (Serbia), Mateo Stupičić (Croatia), Jadranka Šunde (Australia), Aleksandar Szabo (Croatia), Laszlo Szirmay-Kalos (Hungary), Dina Šimunić (Croatia), Zoran Šimunić (Croatia), Dejan Škvorc (Croatia), Antonio Teixeira (Portugal), Edvard Tijan (Croatia), A Min Tjoa (Austria), Roman Trobec (Slovenia), Sergio Uran (Croatia), Tibor Vámos (Hungary), Mladen Varga (Croatia), Marijana Vidas-Bubanja (Serbia), Mihaela Vranić (Croatia), Boris Vrdoljak (Croatia), Damjan Zazula (Slovenia)
Mjesto održavanja:
Opatija, sa 170 godina dugom turističkom tradicijom, vodeće je ljetovalište na istočnoj strani Jadrana i jedno od najpoznatijih na Mediteranu. Ovaj grad aristokratske arhitekture i stila već 170 godina privlači svjetski poznate umjetnike, političare, kraljeve, znanstvenike, sportaše, ali i poslovne ljude, bankare, menadžere i sve kojima Opatija nudi svoje brojne sadržaje.
Opatija svojim gostima nudi brojne komforne hotele, odlične restorane, zabavne sadržaje, umjetničke festivale, vrhunske koncerte ozbiljne i zabavne glazbe, uređene plaže i brojne bazene i sve što je potrebno za ugodan boravak gostiju različitih afiniteta.
U novije doba Opatija je jedan od najpoznatijih kongresnih gradova na Mediteranu, posebno prepoznatljiva po međunarodnim ICT skupovima MIPRO koji se u njoj održavaju od 1979. godine i koji redovito okupljaju preko tisuću sudionika iz četrdesetak zemalja. Ovi skupovi Opatiju promoviraju u nezaobilazan tehnološki, poslovni, obrazovni i znanstveni centar jugoistočne Europe i Europske unije općenito.
Detaljnije informacije se mogu potražiti na www.opatija.hr i www.visitopatija.com.
|
|