Iva Bojic
University of Zagreb
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Iva Bojic.
Information Sciences | 2012
Iva Bojic; Vedran Podobnik; Igor Ljubi; Gordan Jezic; Mario Kusek
The reduction of cost and complexity is a key driver in the evolution of mobile networks. This reduction not only applies to the pre-operational state (e.g. the deployment phase of a new network), but to the operational state as well. During the operational state, self-optimization processes can be performed to reduce the operating expenses (OPEX) of telecommunications operators. In this paper, we propose an agent-based mechanism for auto-tuning mobile networks with the aim of achieving energy savings in access networks. Firefly-based synchronization is used for the coordination of mutually dependent software agents located at the operators base stations. Once synchronized, agents can act together to obtain a global goal - i.e. the reduction of the telecommunications operators costs without reducing the quality of the provided services for mobile users. These agents build a self-organized overlay network where neither centralized nor decentralized control is needed and, therefore, is more robust.
Archive | 2012
Iva Bojic; Tomislav Lipic; Vedran Podobnik
At the end of 2010, we are at the effective end of the second phase of research in the field of Social Networks (SNs) and aspects such as Human-to-Human (H2H) interactions have pretty much had their day due to advances in Machine-to-Machine (M2M) interactions. This chapter will provide a useful insight into the differences between those two types of SNs: the human SNs (hSNs) based on H2H interactions and the machine SNs (mSNs) based on M2M interactions. During the last two decades rapid improvements in computing and communication technologies have enabled a proliferation of hSNs and we believe they will induce the formation of mSNs in the next decades. To this end, we will show how to carry out successful SN analyses (e.g. clustering and data diffusion) by connecting ethological approaches to social behaviour in animals (e.g. the study of firefly synchronization) and M2M interactions.
balkan conference in informatics | 2012
Iva Bojic; Gordan Jezic; Damjan Katusic; Saša Dešić; Mario Kusek; Darko Huljenic
It has been estimated that by the end of 2020 there will be 50 billion connected devices in Machine-to-Machine (M2M) networks. Such projections should encourage us to deal with the corresponding problems in heterogeneous M2M systems. First of all, devices can communicate through different access technologies (e.g. wireline, 2G/3G, WiFi, Bluetooth) and their communication can be classified as direct or indirect, internal or external. In this paper we explain differences between those types of communication and propose a new identification scheme that allows M2M devices to establish communication in every possible way. Secondly, there is a problem of device hardware and software diversity. To over-come this problem, we propose the usage of the Open Service Gateway Initiative (OSGi) framework.
Cybernetics and Systems | 2011
Iva Bojic; Vedran Podobnik; Mario Kusek; Gordan Jezic
Recent technical advancements in computing devices and communication networks, combined with changes in the way people use information and communication technology (ICT) systems, have transformed the ICT industry. In this article, we present the collaborative urban computing (CUC) paradigm, which supports serendipitous cooperation between a set of users physically located in an urban environment and all sharing a common goal. Advantages and disadvantages of the CUC paradigm are elaborated on a proof-of-concept CUC service, which we call collaborative downloading.
agent and multi agent systems technologies and applications | 2011
Iva Bojic; Tomislav Lipic; Mario Kusek; Gordan Jezic
Creating modular behaviours in JADE using a traditional method such as the FSM (Finite State Machine) can be a difficult task to achieve. The first issue with FSMs is that they do not allow reusability of logic in different contexts. Secondly, the FSMs do not lend themselves well to concurrency within the execution thread and thus eliminating the possibility for parallel behaviours. Lastly, as the number of states in FSMs becomes increasing large, it becomes difficult to manage them. In this paper we introduce our JBehaviourTrees Framework that extends JADE Behaviours with BTs (Behaviour Trees) model. BTs are built via the composition of basic tasks increasing the possibility for modularity and code reuse. The proposed approach is verified through a case study concerning a FIPA-Request Interaction Protocol.
self-adaptive and self-organizing systems | 2014
Iva Bojic; Tomislav Lipic; Mario Kusek
In this paper we investigate scalability issues of self-synchronization emergent properties, described with the pulse coupled oscillator model. As in the pulse coupled oscillator model the information propagation process is a gossip-like process, huge amounts of network traffic can be generated, causing thus scalability issues of the whole collective adaptive systems. These issues are even more emphasized in collective adaptive heterogeneous systems called Machine-to-Machine (M2M) systems. Namely, these systems consist not only from one large complex network, but also from a larger number of different interconnected complex networks. The easiest way to reduce network traffic in large networks is to use different overlay network topologies. An overlay network topology can be seen as a layer of a virtual network topology on top of a physical network, enabling significantly less messages to be exchanged during a synchronization process. However, the implementation process of overlay network topologies is not very efficient in real-world environments, as will be discussed in the paper. Therefore, we propose a mechanism for selective coupling implemented on the sender side that can be used to reduce both network traffic and time to synchronization without negatively affecting the entire synchronization process. Moreover, in some cases the rate of successful synchronization outcomes can be also increased when using the proposed mechanism.
international conference on software, telecommunications and computer networks | 2013
Stjepko Zrncic; Iva Bojic; Damjan Katusic; Pavle Skocir; Mario Kusek; Gordan Jezic
This paper tackles the problem of Quality-of-Service (QoS) in heterogeneous Machine-to-Machine (M2M) systems. The concern for QoS guaranties has been widely expressed in the past for both wired and wireless networks. However, only recently when these two types of networks have converged into one, thus making one huge heterogeneous system called M2M, new concerns have emerged. In this paper we measured energy consumption for different communication technologies and proposed an energy consumption model for iOS devices that can be used in future QoS specifications. Finally, we defined a QoS metric that includes both energy and time consumption aspects of one simple M2M service.
trans. computational collective intelligence | 2010
Luka Vrdoljak; Iva Bojic; Vedran Podobnik; Gordan Jezic; Mario Kusek
Today, telecom operators face a threefold challenge: a social challenge dealing with the evolution of the consumer lifestyle, a technological challenge dealing with ever changing ICT trends and a business challenge dealing with the need for innovative business models. This paper introduces an idea of group-oriented services, a special type of personalized telecom services, as a possible solution for all three of these challenges. A proof-of-concept service, called Agent-Based Mobile Content Brokerage, is presented and elaborated with the aim to demonstrate a shift towards consumer-managed relationships, a novel provisioning paradigm within the telecom industry.
international conference on software, telecommunications and computer networks | 2014
Pavle Skocir; Damjan Katusic; Ivan Novotni; Iva Bojic; Gordan Jezic
Approximately two thirds of users worldwide use mobile (i.e. cellular) network for Internet access. Downlink and uplink data rates are important factors for enabling certain level of QoS (Quality of Service) and QoE (Quality of Experience). In this paper the aforementioned data rates were measured using only equipment available to an ordinary subscriber. For Internet access, we used a mobile network technology that currently enables highest data rates - LTE (Long Term Evolution). Two different tools were used for determining the data rates - HAKOMetar and Speedtest. The measurements were carried out on four distinct locations in the city of Zagreb, Croatia and aggregated results are presented separately for weekdays and for weekends. The contribution of our paper is twofold. Firstly, we show how much the data rates fluctuate during the weekdays and weekends, and when maximum uplink and downlink data rates are achieved. Secondly, we compare the measured data rates with those advertised by mobile network operators, and propose the changes they should enforce to better inform mobile network subscribers about the achievable data rates at a certain location.
Wireless Networking for Moving Objects | 2014
Iva Bojic; Jorge Granjal; Edmundo Monteiro; Damjan Katusic; Pavle Skocir; Mario Kusek; Gordan Jezic
Machine-to-Machine (M2M) systems and technologies currently constitute a hot topic in the field of Information and Communication Technology (ICT), and reflect an increasing need for technologies enabling applications in diverse areas, as well as interactions between continuously increasing numbers of connected devices. Important participants in making M2M systems widely used and applicable in numerous real-life scenarios are standardization organizations. They try to develop technical specifications that address the need for a common M2M service layer, which can be realized through various hardware and software implementations. This chapter presents current standards and architecture of M2M systems with the focus on communication and security issues, while also discussing current and future research efforts addressing important open issues. One of the main problems in the area is correlated with heterogeneous devices, which are using different technologies for communication. Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely. To tackle the former, previously proposed, a unique identifying scheme that enables device identification regardless of used technology is explained. Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects not covered by current standards and in relation to research proposals which may integrate with M2M systems in future versions of the standards.