T. Iliev, G. Mihaylov, Tsviatko D. Bikov, E. Ivanova, I. Stoyanov, D. Radev
{"title":"LTE eNB traffic analysis and key techniques towards 5G mobile networks","authors":"T. Iliev, G. Mihaylov, Tsviatko D. Bikov, E. Ivanova, I. Stoyanov, D. Radev","doi":"10.23919/MIPRO.2017.7973476","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973476","url":null,"abstract":"With the fast growth of mobile data services, rich services deliver a brand new experience to end users, and also bring about new opportunities for operators. Some applications, such as vehicular and industrial applications, demand a level of reliability that wireless communication systems typically are not able to guarantee. This paper provides a framework that enables these applications to make use of wireless connectivity only if the transmission conditions are favorable enough. In this paper, we will partially compare the fourth and future fifth generations of mobile networks and their applicability and were carried out measurements of data traffic amount and quality characteristics.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"8 44","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120924564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Bosilj-Vuksic, M. P. Bach, Tanja Grubljesic, J. Jaklič, Ana-Marija Stjepić
{"title":"The role of alignment for the impact of business intelligence maturity on business process performance in Croatian and Slovenian companies","authors":"V. Bosilj-Vuksic, M. P. Bach, Tanja Grubljesic, J. Jaklič, Ana-Marija Stjepić","doi":"10.23919/MIPRO.2017.7973633","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973633","url":null,"abstract":"Business intelligence (BI) allows companies to analyze business information in order to support successful decision making. Currently, the research on the level of BI maturity in Croatian and Slovenian companies is limited. In addition, several BI maturity models have been developed, but most of them are not comprehensive. In order to shed some light to this issue, this paper is focused on two goals: (1) to investigate the impact of BI maturity on business process performance and (2) to explore the requirements for the alignment of two concepts, BI and business process management (BPM) within the organization. Paper presents the following: (i) investigation of BI and BI systems in general, (ii) adaption of the BI maturity model (called biMM) for the purpose of this research, (iii) results of the primary research on the sample of Croatian and Slovenian companies which has been conducted as one of the activities of the project financed by the Croatian Science Foundation: IP-2014-09-3729 Process and Business Intelligence for Business Excellence, (iv) level of BI maturity and the role of BI and business process alignment for the impact of BI maturity on business process performance in investigated companies.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128859263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-learning on Polytechnic Nikola Tesla — Analysis and comparison","authors":"Bozidar Kovacic, A. Skendzic, Devcic Kristina","doi":"10.23919/MIPRO.2017.7973551","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973551","url":null,"abstract":"E-learning System has become a common constituent unit of web page of any higher education institution. At the Polytechnic Nikola Tesla in Gospic Loomen is established since 2010, a system that is designed in a role of teaching repository for students and for preparation of e-courses for the teachers and students. The aim of this paper is by using descriptive and inferential statistics, and based on a survey conducted among students, examine how, and to what purpose and how often students used Loomen E-learning System.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"232 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132915110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interoperability and lightweight security for simple IoT devices","authors":"Darko Androcec, Boris Tomas, T. Kisasondi","doi":"10.23919/MIPRO.2017.7973621","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973621","url":null,"abstract":"The Semantic Web can be used to enable the interoperability of IoT devices and to annotate their functional and nonfunctional properties, including security and privacy. In this paper, we will show how to use the ontology and JSON-LD to annotate connectivity, security and privacy properties of IoT devices. Out of that, we will present our prototype for a lightweight, secure application level protocol wrapper that ensures communication consistency, secrecy and integrity for low cost IoT devices like the ESP8266 and Photon particle.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123797790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A textured scale-based approach to melanocytic skin lesions in dermoscopy","authors":"R. Fonseca-Pinto, Marlene Machado","doi":"10.23919/MIPRO.2017.7973434","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973434","url":null,"abstract":"Melanoma is the most dangerous and lethal form of human skin cancer and the early detection is a fundamental key for its successful management. In recent years the use of automatic classification algorithms in the context of Computer Aided Diagnosis (CAD) systems have been an important tool, by improving quantification metrics and also assisting in the decision regarding lesion management. This paper presents a novel and robust textured-based approach to detect melanomas among melanocytic images obtained by dermoscopy, using Local Binary Pattern Variance (LBPV) histograms after the Bidimensional Empirical Mode Decomposition (BEMD) scale-based decomposition methodology. The results show that it is possible to develop a robust CAD system for the classification of dermoscopy images obtained from different databases and acquired in diverse conditions. After the initial texture-scale based classification a post-processing refinement is proposed using reticular pattern and color achieving to 97.83, 94.44 and 96.00 for Sensitivity, Specificity and Accuracy.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125445571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data warehouse architecture classification","authors":"G. Blazic, P. Poščić, Danijela Jakšić","doi":"10.23919/MIPRO.2017.7973657","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973657","url":null,"abstract":"The purpose of this study is to give an overlook and comparison of best known data warehouse architectures. Single-layer, two-layer, and three-layer architectures are structure-oriented one that are depending on the number of layers used by the architecture. In independent data marts architecture, bus, hub-and-spoke, centralized and distributed architectures, the main layers are differently combined. Listed data warehouse architectures are compared based on organizational structures, with its similarities and differences. The second comparison gives a look into information quality (consistency, completeness, accuracy) and system quality (integration, flexibility, scalability). Bus, hub-and-spoke and centralized data warehouse architectures got the highest scores in information and system quality assessment.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126472204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Making a smart city even more intelligent using emergent property methodology","authors":"A. Saric, B. Mihaljević, K. Marasovic","doi":"10.23919/MIPRO.2017.7973571","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973571","url":null,"abstract":"With the emergence of IoT (Internet of Things) smart cities have assumed a crucial role in providing intelligent services in real time to residents and visitors, by integrating services such as smart transportation, smart parking and smart people management. By introducing emergent properties as the system's new behaviors or new structures, the system gains another higher level of intelligence that cannot be derived from its underlying substructures individually. In this paper we propose a new model for introducing emergent properties by integrating existing smart city subsystems which are already in use in the city of Dubrovnik, Croatia. The article starts with an overview of the smart city technologies and emerging property methodology. The existing smart city subsystems are explained along with their integration within emergent properties model. The paper concludes with our findings and recommendations, open issues and future research possibilities.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128108684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An experiment in using IMUNES and Conpot to emulate honeypot control networks","authors":"Stipe Kuman, S. Groš, M. Mikuc","doi":"10.23919/MIPRO.2017.7973617","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973617","url":null,"abstract":"Honeypots are used as a security measure both to divert the attention of a potential attackers intentions and to reveal the attacker since the only reason someone would interact with honeypots is if they are looking for a vulnerable target. Honeypots emulate only a part of the machine they are supposed to represent and contain no valuable data. ICS (Industrial Control System) is a term that is used for a system that monitors industrial plants, distributed control systems or other systems that mostly contain PLCs (Programmable Logic Controllers). Conpot is an open source honeypot that emulates PLC devices so it can be used in ICSs. However, Conpot can not emulate complex honeypot networks. The aim of this project is to make a tool that can be used to design a honeypot network which emulates an ICS. A network designed with that tool will be simulated as a part of this project and the data collected during the simulation will be analyzed.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power control schemes for device-to-device communications in 5G mobile network","authors":"T. Iliev, G. Mihaylov, E. Ivanova, I. Stoyanov","doi":"10.23919/MIPRO.2017.7973460","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973460","url":null,"abstract":"Device-to-device (D2D) communications integrated into cellular networks is a means to take advantage of the proximity of devices and thereby to increase the user bitrates and system capacity. D2D communications has recently been proposed for the 3GPP Long Term Evolution (LTE) system as a method to increase the spectrum- and energy-efficiency. Device-to-device communication has the potential of increasing the system capacity, energy efficiency and achievable peak rates while reducing the end-to-end latency. To realize these gains, are proposed resource allocation (RA) and power control (PC) approaches that show near optimal performance in terms of spectral or energy efficiency.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115811560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Procedure for modelling of soft tissues behavior","authors":"M. Franulović, K. Marković, S. Pilicic","doi":"10.23919/MIPRO.2017.7973497","DOIUrl":"https://doi.org/10.23919/MIPRO.2017.7973497","url":null,"abstract":"The procedural steps for the efficient modelling and simulation of material behavior of human cervical spine ligaments have been presented in the paper. They are based on the mechanical principles incorporated in the material model, suitable for the description of soft tissues behavior. The material parameters set which have to be identified for the presented model has been additionally expanded here to make possible better calibration of the model by the application of genetic algorithm. The genetic algorithm has been recognized in this investigation as an efficient tool to overlap the bridge among the non-linearity of material behavior and material parameters of the chosen model and thus make possible material behavior modelling which follows materials response as accurately as possible. The basic process steps have been developed here for the efficient optimization of soft tissues behavior modelling.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126258896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}