Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987648
Adnan Hota
There are a number of methods for image recognition and they are mainly based on Bag-of-Words (BoW) model. These models can be divided into two categories: generative and discriminative models. Some of the generative models are Naïve Bayes, latent Dirichlet allocation and Probabilistic Latent Semantic Analysis. Discriminative methods are Nearest neighbor classification, Support Vector Machines and Pyramid match kernel. Goal of this paper is to compare two implementations of Support vector machines model: linear SVM and Hellinger classifier. These two models are compared in simulated environment. Comparison is made by analysing accuracy, speed and processor power consumption measured in simulation.
{"title":"Comparison of some Bag-of-Words models for image recognition","authors":"Adnan Hota","doi":"10.1109/BIHTEL.2014.6987648","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987648","url":null,"abstract":"There are a number of methods for image recognition and they are mainly based on Bag-of-Words (BoW) model. These models can be divided into two categories: generative and discriminative models. Some of the generative models are Naïve Bayes, latent Dirichlet allocation and Probabilistic Latent Semantic Analysis. Discriminative methods are Nearest neighbor classification, Support Vector Machines and Pyramid match kernel. Goal of this paper is to compare two implementations of Support vector machines model: linear SVM and Hellinger classifier. These two models are compared in simulated environment. Comparison is made by analysing accuracy, speed and processor power consumption measured in simulation.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132427100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987654
N. Goran, M. Hadzialic, M. Skrbic
This paper considers estimation of QoE (Quality of experience), which depends on QoS (Quality of Service) and correlates with it, as well as monitors QoS parameters in lower OSI layers. It also suggests a model that evaluates QoE in different time intervals during consuming of IPTV service under strong influence of non-stationary noise in OFDM (Orthogonal Frequency-Division Multiplexing) modulation scheme.
{"title":"Analysis of QoE level during delivering of IPTV service under influence of non-stationary noise","authors":"N. Goran, M. Hadzialic, M. Skrbic","doi":"10.1109/BIHTEL.2014.6987654","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987654","url":null,"abstract":"This paper considers estimation of QoE (Quality of experience), which depends on QoS (Quality of Service) and correlates with it, as well as monitors QoS parameters in lower OSI layers. It also suggests a model that evaluates QoE in different time intervals during consuming of IPTV service under strong influence of non-stationary noise in OFDM (Orthogonal Frequency-Division Multiplexing) modulation scheme.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125801302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987633
S. Rizvić, V. Okanović, Aida Sadzak, D. Mongus, Luka Pavlič
Virtual presentation of cultural heritage has shown a great potential in preservation of collective memory. The level of immersion that the visitor feels in a virtual environment is one of the key factors for the quality of his experience. Terrains are the most authentic elements of cultural heritage sites, as they rarely have been significantly changed through time. In this paper we explore the use of LiDAR based terrains in interactive virtual cultural heritage applications, considering the advantages and drawbacks of this approach. Our case study is the virtual presentation of the Early Christian Basilica in Cim near Mostar, created for the interactive exhibition “Keys to Rome”.
{"title":"LiDAR based terrains for virtual cultural heritage applications","authors":"S. Rizvić, V. Okanović, Aida Sadzak, D. Mongus, Luka Pavlič","doi":"10.1109/BIHTEL.2014.6987633","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987633","url":null,"abstract":"Virtual presentation of cultural heritage has shown a great potential in preservation of collective memory. The level of immersion that the visitor feels in a virtual environment is one of the key factors for the quality of his experience. Terrains are the most authentic elements of cultural heritage sites, as they rarely have been significantly changed through time. In this paper we explore the use of LiDAR based terrains in interactive virtual cultural heritage applications, considering the advantages and drawbacks of this approach. Our case study is the virtual presentation of the Early Christian Basilica in Cim near Mostar, created for the interactive exhibition “Keys to Rome”.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116156545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987628
Haris Dzananovic, N. Behlilovic
In spite of all efforts within the IPTV system to implement robust protection mechanisms, attackers manage to find a way to retransmit content to users who do not have right on it so they damage service providers for certain part of the their legal incomes. This paper presents practical examples of abuse of IPTV content. Several scenarios are created, which are based on the fact that subscribers of IPTV service perform abuse of content in a way that they illegally retransmit content which they have paid for or that they illegally record some content. Examples are derived from the author's experience of working on a real IPTV system, security threats and abuse that he is encountered by. Some recommendations are also given, that should be followed by administrators during the establishment of the IPTV system, which decrease potential risks of abuse.
{"title":"IPTV content abuse and measures for improving delivery of IPTV content","authors":"Haris Dzananovic, N. Behlilovic","doi":"10.1109/BIHTEL.2014.6987628","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987628","url":null,"abstract":"In spite of all efforts within the IPTV system to implement robust protection mechanisms, attackers manage to find a way to retransmit content to users who do not have right on it so they damage service providers for certain part of the their legal incomes. This paper presents practical examples of abuse of IPTV content. Several scenarios are created, which are based on the fact that subscribers of IPTV service perform abuse of content in a way that they illegally retransmit content which they have paid for or that they illegally record some content. Examples are derived from the author's experience of working on a real IPTV system, security threats and abuse that he is encountered by. Some recommendations are also given, that should be followed by administrators during the establishment of the IPTV system, which decrease potential risks of abuse.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987656
Nadir Kapetanović, N. Osmic, S. Konjicija
It is well known that the process of tuning a fuzzy logic controller is almost always a very complex task, which is time consuming, very laborious and often requires expert knowledge of the controlled system. Mapping of fuzzy logic controller's parameters (rule base and membership functions of input(s) and output(s)) into a performance measure in a closed analytical form is near impossible to get, and thus the use of any classical optimization method is automatically ruled out. Knowing this, genetic algorithms with a fitness function in a form of cumulative response error represent a good choice of the optimization method. This approach enables the use of offline optimization of membership functions' parameters (which are being coded into chromosomes). Sugeno-Takagi fuzzy logic controllers with a proportional and a derivative component, and also with a fixed rule base are used in this approach. Experimental results of both simulations and validations on real systems are given in this paper and they show the good performance of this approach.
{"title":"Optimization of membership functions of Sugeno-Takagi fuzzy logic controllers with two inputs and one output using genetic algorithms","authors":"Nadir Kapetanović, N. Osmic, S. Konjicija","doi":"10.1109/BIHTEL.2014.6987656","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987656","url":null,"abstract":"It is well known that the process of tuning a fuzzy logic controller is almost always a very complex task, which is time consuming, very laborious and often requires expert knowledge of the controlled system. Mapping of fuzzy logic controller's parameters (rule base and membership functions of input(s) and output(s)) into a performance measure in a closed analytical form is near impossible to get, and thus the use of any classical optimization method is automatically ruled out. Knowing this, genetic algorithms with a fitness function in a form of cumulative response error represent a good choice of the optimization method. This approach enables the use of offline optimization of membership functions' parameters (which are being coded into chromosomes). Sugeno-Takagi fuzzy logic controllers with a proportional and a derivative component, and also with a fixed rule base are used in this approach. Experimental results of both simulations and validations on real systems are given in this paper and they show the good performance of this approach.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987635
Enio Kaljic, A. Akšamović
In the design of MAC protocols for wireless sensor networks (WSN) it is necessary to fulfill some requirements such as low energy consumption, scalability, simplicity, etc. These requirements are not easy to fulfill from the viewpoint of implementation on FPGA or ASIC technologies. Therefore, in this paper we identify some challenges encountered during the design of MAC protocol for WSN. For some of these challenges, potential solutions are discussed. To illustrate the proposed solutions SMAC protocol is chosen. VHDL design of the S-MAC protocols is experimentally verified on the Altera EP2C5 FPGA development system.
{"title":"Challenges in the design of the MAC protocols for wireless sensor networks using VHDL","authors":"Enio Kaljic, A. Akšamović","doi":"10.1109/BIHTEL.2014.6987635","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987635","url":null,"abstract":"In the design of MAC protocols for wireless sensor networks (WSN) it is necessary to fulfill some requirements such as low energy consumption, scalability, simplicity, etc. These requirements are not easy to fulfill from the viewpoint of implementation on FPGA or ASIC technologies. Therefore, in this paper we identify some challenges encountered during the design of MAC protocol for WSN. For some of these challenges, potential solutions are discussed. To illustrate the proposed solutions SMAC protocol is chosen. VHDL design of the S-MAC protocols is experimentally verified on the Altera EP2C5 FPGA development system.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987650
M. Mustra, M. Grgic, B. Zovko-Cihlar
Switching to digital technology from analog brought many changes, especially in storage of digital X-ray images. In cases of multiple fractures or need for imaging of a large area it is necessary to make more than one X-ray image for the observed part of body. This is often the case with spine, legs and arms. Radiologists use dedicated workstations to view X-ray results and need to manually switch between different images to be able to complete the examination of longer bone segments. Dedicated software gives some possibility of automatic or semiautomatic image stitching which allows combining of multiple images into one. In this paper we propose a method for automatic detection of bone position in X-ray images of arms and legs and their automatic alignment with one of image's borders.
{"title":"Alignment of X-ray bone images","authors":"M. Mustra, M. Grgic, B. Zovko-Cihlar","doi":"10.1109/BIHTEL.2014.6987650","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987650","url":null,"abstract":"Switching to digital technology from analog brought many changes, especially in storage of digital X-ray images. In cases of multiple fractures or need for imaging of a large area it is necessary to make more than one X-ray image for the observed part of body. This is often the case with spine, legs and arms. Radiologists use dedicated workstations to view X-ray results and need to manually switch between different images to be able to complete the examination of longer bone segments. Dedicated software gives some possibility of automatic or semiautomatic image stitching which allows combining of multiple images into one. In this paper we propose a method for automatic detection of bone position in X-ray images of arms and legs and their automatic alignment with one of image's borders.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122215913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987647
Kemal Hajdarevic, S. Konjicija, A. Subasi
Radio amateurism is a hobby, which helped in pioneering many innovations that we are using today. Hobbyists, which use radio communication to communicate, are called Hams. Radio communications has great history and Hams are part of it. Radio amateurism is a hobby which plays great part in emergency and disaster relief situations when conventional communications became unavailable. Technology built around radio communication is suitable in education to test study cases, and gain knowledge in wireless and computer communications. Purpose of this paper is to experiment with open source VOIP software (svxlink) using, cheap microcomputer hardware, one of available Linux distributions, radio amateur frequencies, radio amateur transceivers and antennas. Different technological issues brought together in this paper such as wired and wireless communication, VOIP over Internet with voice coming from radio amateur equipment and vice versa. We also tested integrated automatic position reporting system (APRS) because svxlink has capability to dynamically update data on APRS server what is capability with potential many applications such as active and passive measuring activities of VOIP users, users' mobility, and other applicable APRS functionalities as well. In this paper are published experiences from real disaster situation during floods and mudslides which hits Bosnia and Herzegovina in May 2014.
{"title":"Svxlink VOIP implementation using raspberry Pi in education and disaster relief situations","authors":"Kemal Hajdarevic, S. Konjicija, A. Subasi","doi":"10.1109/BIHTEL.2014.6987647","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987647","url":null,"abstract":"Radio amateurism is a hobby, which helped in pioneering many innovations that we are using today. Hobbyists, which use radio communication to communicate, are called Hams. Radio communications has great history and Hams are part of it. Radio amateurism is a hobby which plays great part in emergency and disaster relief situations when conventional communications became unavailable. Technology built around radio communication is suitable in education to test study cases, and gain knowledge in wireless and computer communications. Purpose of this paper is to experiment with open source VOIP software (svxlink) using, cheap microcomputer hardware, one of available Linux distributions, radio amateur frequencies, radio amateur transceivers and antennas. Different technological issues brought together in this paper such as wired and wireless communication, VOIP over Internet with voice coming from radio amateur equipment and vice versa. We also tested integrated automatic position reporting system (APRS) because svxlink has capability to dynamically update data on APRS server what is capability with potential many applications such as active and passive measuring activities of VOIP users, users' mobility, and other applicable APRS functionalities as well. In this paper are published experiences from real disaster situation during floods and mudslides which hits Bosnia and Herzegovina in May 2014.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123487851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987638
N. Skaljo, A. Begovic, N. Behlilovic
This paper examines the actual usefulness and importance of longitudinal balance as one of many electrical parameters of symmetrical copper pairs. Through the results of several experiments on copper pairs with different types of significant faults, but also by measuring longitudinal balance on the real system in practice, this paper attempts to show the actual usefulness and importance of this parameter. In this manner, this paper intends to make the process of measuring the electrical parameters of symmetrical copper pairs more reliable and usable for reliable detection of various types of faults.
{"title":"A possibility of using longitudinal balance for qualification and troubleshooting of DSL lines","authors":"N. Skaljo, A. Begovic, N. Behlilovic","doi":"10.1109/BIHTEL.2014.6987638","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987638","url":null,"abstract":"This paper examines the actual usefulness and importance of longitudinal balance as one of many electrical parameters of symmetrical copper pairs. Through the results of several experiments on copper pairs with different types of significant faults, but also by measuring longitudinal balance on the real system in practice, this paper attempts to show the actual usefulness and importance of this parameter. In this manner, this paper intends to make the process of measuring the electrical parameters of symmetrical copper pairs more reliable and usable for reliable detection of various types of faults.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116806576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987630
D. Donko
This paper presents one of the approaches to improve quality of communication technology service using different techniques available today in the contest of Six Sigma and five steps of its cycle. In the scenario given in this paper telecommunication operator in its wide service portfolio is gathering a lot of information that is available through the reporting, but facing issue of defining areas of the improvement and selecting right projects and priorities for implementation. Operators today applied most of ITIL processes, but it is necessary to perform Continual Service Improvement in order to create and maintain value for customers through better service delivery. Application of Six Sigma as the complementary discipline to ITIL becomes well chosen tool to define problem, measure and analyze data, improve the process and control it after implementation. In the given example, data from many support activities are collected through longer period of time and analyzed using different statistics tool. The root cause has been identified and concrete project is recommended and implemented for improvement.
{"title":"Improvement of the process quality in the service provider organization","authors":"D. Donko","doi":"10.1109/BIHTEL.2014.6987630","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987630","url":null,"abstract":"This paper presents one of the approaches to improve quality of communication technology service using different techniques available today in the contest of Six Sigma and five steps of its cycle. In the scenario given in this paper telecommunication operator in its wide service portfolio is gathering a lot of information that is available through the reporting, but facing issue of defining areas of the improvement and selecting right projects and priorities for implementation. Operators today applied most of ITIL processes, but it is necessary to perform Continual Service Improvement in order to create and maintain value for customers through better service delivery. Application of Six Sigma as the complementary discipline to ITIL becomes well chosen tool to define problem, measure and analyze data, improve the process and control it after implementation. In the given example, data from many support activities are collected through longer period of time and analyzed using different statistics tool. The root cause has been identified and concrete project is recommended and implemented for improvement.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114929558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}