View: session overviewtalk overview
10:00 | Structuring Ethical and Scalable Data Systems: Operational Models from Telecom, Healthcare, and Supply Chain (Invited paper) ABSTRACT. Telecommunications, healthcare, and global supply chains operate under constant pressure to process vast amounts of data while maintaining reliability, security, and regulatory compliance. When scalability is pursued without parallel ethical safeguards, the risk of privacy breaches, biased outcomes, and opaque automation increases. To address this, we propose a six- pillar framework that places human oversight, explainability, privacy-by-design, modularity, interoperability, and accessibility at the core of data system design. The framework draws on more than 17 years of practical experience across multinational pro- grams and a self-funded research initiative in digital health. Its applicability is demonstrated through three operational contexts: the shift to paperless workflows and automated Key Performance Indicator (KPI) pipelines in telecom networks, the harmonization of performance models in supply chains, and a confidential decision-support assistant for Type 1 Diabetes (T1D). A conceptual simulation of the latter indicated a 15–20% reduction in insulin dosing errors when human oversight was preserved, with response times under two seconds. The findings show that embedding ethical design principles into system architecture strengthens transparency, trust, and adoption, and provides a transferable blueprint for responsible Artificial Intelligence (AI) deployment across regulated, data-intensive domains. |
10:30 | Unsupervised Detection of Lifestyle-Linked Anomalies in Continuous Glucose Data ABSTRACT. Continuous Glucose Monitoring (CGM) provides detailed, minute-level insights into metabolic processes and holds significant promise for supporting overall well-being beyond traditional diabetes management. Despite its potential, CGM remains underused in detecting subtle physiological and lifestyle-related changes, such as variations in diet, physical activity, or hormonal cycles. To address this gap, an unsupervised anomaly detection framework is introduced to identify atypical daily glucose patterns without the need for labeled data. The approach encodes each day’s CGM profile as a high-dimensional vector, applies UMAP for dimensionality reduction, and uses DBSCAN to detect outliers. Applied to a two-month dataset from a single individual, the method revealed anomalies aligned with unlogged lifestyle changes. One event was independently confirmed through clinical records, underscoring the potential of CGM for passive, personalized monitoring and broader health tracking. |
10:45 | An Approach to the Lifecycle Management of Virtualized FRMCS Applications as a Service PRESENTER: Evelina Pencheva ABSTRACT. Future Railway Mobile Communication System (FRMCS) is a successor of the legacy railway communication system. Based on fifth generation mobile communication system, it enables automated and more efficient railway operation and enhances passenger services. The FRMCS critical and performance applications could be isolated from its underlying operating system and hardware using the technology of Network Function Virtualization (NFV). The paper presents an approach to the centralized management of virtualized FRMCS applications which simplifies deployment, improve security, and flexibility to access the FRMCS applications from different devices and locations. Basic management functionality related to FRMCS application lifecycle is identified and designed as a RESTful service. |
11:00 | Multicast Broadcast Services in Railway Communication Applications PRESENTER: Ivaylo Atanasov ABSTRACT. Multicast broadcast solution can improve communication efficiency and provide the required reliability, coverage, latency, mobility, and scalability in the railway transport. The paper presents a method for the design of information recording and broadcasting as services for railway applications. The method feasibility is proved by modeling the state of a multicast broadcast session. |
11:15 | Path Percolation with Link Recycling and Fidelity Based Routing in Quantum Networks PRESENTER: Botond László Márton ABSTRACT. Quantum communication brings novel ideas and protocols to the field of infocommunications and networks, which imposes new challenges for various networking tasks such routing and link management. In our work we extend a previous model on the behavior of quantum networks and show that this modification reduces the necessary resources for managing a network of this kind. |
Room 154 (Restaurant)
Two-bit Side Channel Attack Resistant Register in 350nm CMOS Technology PRESENTER: Dejan Mirković ABSTRACT. This paper describes top down design of a two-bit encrypted register that exhibits high immunity to Side Channel Attack (SCA). The schematic level and post-layout simulation results show the validity of cryptographic shift register design by observing a Normalized Standard Deviation (NSD) of the consumed energy. This encrypted block is designed for CMOS TSMC 035 um technology. |
Examination of TinyML approach in ESP32-Based NFC applications ABSTRACT. This paper presents a comparison between the efficiency of non-learning and machine learning approaches on edge devices, using a typical NFC system centred around commercial ESP32 microcontroller as an example. NFC tag data is read by the NFC reader and forwarded to two ESP32 modules, one using rule-based non-learning approach, and the other one using pre-trained model for text correction. Read success rate as well as internal and external heating are analyzed on the basis of 100 data processing attempts. Machine learning method shows 4 % better read success rate, but also suffers from more self-heating. |
A Cost-Effective EOG Acquisition Front-End for Laboratory Exercises ABSTRACT. Electrooculography (EOG) is a non-invasive technique used to measure eye movements by detecting corneo-retinal potential differences. In addition to its wide application in medicine, EOG is increasingly used for practical applications such as assistive device control (artificial arms, wheelchairs, virtual keyboards, etc), driver monitoring (fatigue and sleepiness detection, pilot training, etc), and gaze-based human–computer interaction (HCI) systems. A cost-effective acquisition front-end incorporating lightweight hardware has been developed. The proposed system is suitable for use in student laboratory exercises for educational and training purposes, as well as for further research and development. A model of such an acquisition front-end that fulfills the requirements is proposed in this paper. The results obtained so far are presented, and directions for further research are proposed. |
Frost Filtering of SAR Images – Objective and Subjective Study PRESENTER: Boban Bondžulić ABSTRACT. This paper deals with subjective assessment of visual quality of synthetic aperture radar (SAR) images despeckled using two conventional filters. Depending on image properties, different filters or filters with different parameters occur to be the best. We show that the results of subjective assessment are in good agreement with visual quality metrics that can be employed in objective characterization whilst analysis of traditional metrics might lead to partly erroneous conclusions. The tests are carried out for three images of different complexity, whereas 15 observers participated in quality assessment. |
Irregularities of the JPEG Compression Rate Distortion Curves for Grayscale Images PRESENTER: Dimitrije Bujaković ABSTRACT. Rate-distortion curves are a fundamental tool in image compression for evaluating the trade-off between the compressed file size and the resulting image quality. However, these curves can exhibit unexpected irregularities, such as non-monotonic behavior or “wiggles”, which challenge the conventional rate-distortion theory. In JPEG compression, these irregularities are primarily a consequence of the quantization process and are particularly pronounced in images containing large uniform regions. So, this paper investigates these irregularities firstly for uniform colorless blocks by analyzing the JPEG quantization error, and then for grayscale JPEG compressed images employing a range of objective image quality assessment measures. Our experimental results demonstrate that for such irregular images, selecting a lower quality factor that controls JPEG compression can paradoxically yield better visual quality than a higher quality factor, as the latter can introduce more noticeable blocking artifacts. This finding highlights the critical importance of quality factor selection in JPEG compression for images with uniform areas. |
Prediction of EV Charging Stations Congestion using XGBoost Approach ABSTRACT. This paper presents a data-driven approach for predicting congestion at electric vehicle charging stations using XGBoost. By combining real-world usage data with synthetically generated sessions and modeling personalized, time-based usage patterns, our method improves accuracy and interpretability. Cross-validation and residual analysis confirm strong performance comparing to similar models. This approach led to useful predictions that are practical and user-centered, and extends the possibilities for forecasting within emerging forms of mobility and energy systems. |
Predicting Magnetic Field Distribution Near Trapezoidal Permanent Ring Magnet Using Machine Learning PRESENTER: Natalija Ivković ABSTRACT. Kernel ridge regression is applied to predict normalized magnetic field values around a ring-shaped permanent magnet with a trapezoidal cross-section. Results are compared with a semi-numerical method based on fictitious magnetic charges. The close agreement between methods confirms the accuracy and potential of machine learning for magnetic field prediction. |
ChatGPT for Computational Electrostatics: Case Study of Axisymmetric Conductors and Dielectrics ABSTRACT. We discuss how ChatGPT can be utilized to iteratively generate computational electrostatics code and visualizations. Specifically, we consider axisymmetric conductors and dielectrics and calculate and visualize charge densities, potential and electrostatic fields. |
Effect of Titanium Mesh Cranioplasty on Magnetic Field Distribution from Mobile Phone within the User’s Head ABSTRACT. The aim of this study is to determine the impact of titanium mesh used in cranial reconstruction, on the magnetic field distribution from a mobile phone within the biological tissues and organs of the user's head. This assessment requires creating realistic three-dimensional models of the user’s head, titanium mesh implant and a cellphone followed by the numerical solution of the electromagnetic propagation equation. Numerical calculations were carried out for the mobile network frequency of 1800 MHz. Finally, a comparative evaluation was performed for both models, with and without a titanium mesh |
Impact of Training Data Selection on Accuracy of Clear-Sky Solar Power Prediction Model ABSTRACT. This study investigates the extent to which the size of the dataset used for training may affect neural network model accuracy. An experiment was performed on models predicting solar plant production during clear summer days based on numerical weather data, specifically the estimated amount of global horizontal irradiance and surrounding air temperature. Results show that model accuracy does not change significantly with decreasing training set size, which suggests that strategic data selection may be more critical than dataset size for optimal model performance. |
Multi-Agent Data Fusion: Methods, Challenges and Trends ABSTRACT. The study reviews data fusion methods in multi-agent systems (MAS), categorised into low-, mid, and high-level fusion. Using the PRISMA methodology, we analyse recent literature, highlighting trends such as probabilistic filters, deep learning, and federated decision-making. Challenges remain in scalability, interoperability, and privacy, warranting future research into adaptive, secure fusion models. |
Cybersecurity in Smart Cities: A Review of Theoretical Models, Emerging Threats, and Defense Strategies PRESENTER: Genadiy Gospodinov ABSTRACT. This paper reviews theoretical cybersecurity approaches in smart cities, categorizing classical, system-oriented, and innovative models. It highlights current gaps, such as limited Al integration and regulatory fragmentation, and proposes a novel framework combining Game Theory, Complex Systems Theory, and Blockchain to enhance resilience and adaptive security in smart city infrastructures. |
Network Management Leveraging Agentic AI: Case of Outage Probability in Selection Combining Systems under Hoyt Fading and Interference ABSTRACT. This paper analyzes the outage probability (Pout) as a key reliability metric for wireless systems under Hoyt fading and co-channel interference (CCI). A receiver with Selection Combining (SC) selects the best of L independent branches based on signal quality. The Hoyt fading model, as a generalization of Rayleigh fading, enables accurate modeling of non-line-of-sight (NLoS) environments. Closed-form expressions for Pout are derived to evaluate the effects of channel parameters, number of branches, and interference. In the second part, we propose an agentic AI-based workflow for network management, leveraging the previously derived outage probability expression and associated channel parameters for the presented case study. |
An Intelligent Information System for Semantic Analysis of Social Network Discussions ABSTRACT. This paper presents a methodology for topic -specific analyzing of discussions on the decentralized, federated and open-sourced social network. The methodology integrates NLP, sentiment analysis, rule-based NER, semantic enrichment via DBpedia, RDF modeling, and SPARQL querying to enable structured, machine-interpretable analysis. Results of experiments focused on AI topic show that semantic enrichment improves understanding compared to basic methods while supporting knowledge extraction in intelligent systems. |
A Review of AI in Cybersecurity: Ethical Challenges and Regulatory Frameworks ABSTRACT. This study examines global ethical guidelines for AI and cybersecurity, highlighting key principles like fairness, transparency, privacy, and accountability. It identifies inconsistencies across sectors and emphasizes the need for harmonized standards. The study stresses balancing innovation with public trust, focusing on responsible practices in AI decision-making and cybersecurity protocols. |
Design and Analysis of Harmonic Tag with RF Energy Harvesting Circuit PRESENTER: Aleksandra Đorić ABSTRACT. In this paper, the design and analysis of a harmonic tag with an RF energy harvesting circuit is performed. In the first research stage, a low power passive harmonic tag has been designed at 2.45/4.9 GHz whose main function is to receive the fundamental signal and transmit harmonics. In the second stage, an RF energy harvesting circuit is designed at 2.45 GHz by using voltage doubler RF rectifier. Additionally, a diplexer was inserted between the harmonic tag and the RF energy harvesting circuit to separate the fundamental signal from the second harmonic. Impedance matching is performed between the antennas and the harmonic tag, as well as between the harmonic tag and the RF rectifier, with aim to obtain maximum power transfer. Results accomplished by ADS simulations for different input power levels provide a performance evaluation of the harmonic tag and the RF energy harvesting circuit in terms of RF-DC conversion efficiency, DC power, and second harmonic power. For the observed input power levels (-20 dBm to 10 dBm), the gained RF-DC conversion efficiency varies between 7 % and 17 %, the output DC voltage varies between 0.1 V and 3.6 V, while the second harmonic power goes from -61 dBm to -3 dBm. |
Post-Quantum Cryptography Performance - Overview Comparison of Lattice-Based Algorithms and Potential Concerns PRESENTER: Tijana Dimitrijević ABSTRACT. The rise of quantum computers threatens classical cryptosystems through Shor’s and Grover’s algorithms. Post-quantum cryptography (PQC) addresses this challenge, with lattice-based schemes emerging as leading candidates. This paper presents an overview in this emerging field with main focus on Kyber method for key exchange and Dilithium method for digital signatures. the paper show why these method are good candidates for future implementation in real-world protocols. However, the paper also presents concerns regarding different types of applications of such a methodology, especially because of the attacks in IoT systems. |
Room 154 (Restaurant)