Proceedings IDS 2019
Proceedings IDS 2019
Proceedings of the
11th International Doctoral Seminar
Organizers:
University of Zagreb
Faculty of Organization and Informatics
Program Committee:
Nina Begičević Ređep, University of Zagreb, Croatia
Miloš Čambál, UPIM, Slovakia
Zdenka Gyurák Babeľová, UPIM, Slovakia
Radovan Holubek, UVTE, Slovakia
Dragutin Kermek, University of Zagreb, Croatia
Marina Klačmer Čalopa, University of Zagreb, Croatia
Alen Lovrenčić, University of Zagreb, Croatia
Ladislav Morovič, UVTE, Slovakia
Jaromíra Vaňová, MTF, Slovakia
Vjeran Strahonja, University of Zagreb, Croatia
Maximilian Stremy, ATRI, Slovakia
Diana Šimić, University of Zagreb, Croatia
Organizing Committee:
Nikolina Žajdela Hrustek, University of Zagreb, Croatia
Diana Šimić, University of Zagreb, Croatia
Neven Vrček, University of Zagreb, Croatia
Katarína Kosecká, Slovak University of Technology in Bratislava, Slovakia
The CIP record is available in the computer catalog of the National and University
Library in Zagreb under number 001042643.
ISBN: 978-953-6071-67-8
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. The authors
are responsible for the linguistic and technical accuracy of their contributions. All papers were double-reviewed.
Welcome to the Proceedings of the IDS 2019, 11th International Doctoral Seminar. The Seminar offers
doctoral students in the fields of Computer/Information and Material Sciences an opportunity to present
their ideas, research proposals, preliminary results, problems and challenges and receive feedback and
guidance from a panel of experts in their fields. It is co-organized by the Faculty of Organization and
Informatics, University of Zagreb and Faculty of Materials Science and Technology in Trnava, Slovak
University of Technology in Bratislava, as a special Doctoral Student Section within the 30 th Central
European Conference on Information and Intelligent Systems CECIIS 2019.
You will notice that contributions in these Proceedings are not uniformly formatted. In order to
accommodate for different stages of doctoral study and research, we have three types of contributions –
full research papers, short doctoral research papers, and research posters. Full research papers were
presented both in an appropriate CECIIS section, and at the IDS. They are published in the CECIIS
proceedings, and we reproduce here only their abstracts. Short doctoral research papers and posters were
reviewed by the members of the international Program Committee, and their full contents are included
in these Proceedings. The order of contributions in the Proceedings follows the order of presentations
in the IDS 2019 Program to facilitate tracking of presentations.
We are grateful to all those who have supported the Seminar, and especially to our young authors. We
hope that IDS will provide an encouraging and supportive setting for learning, exchanging ideas, and
developing research and professional networks.
1. WONDERWARE PRODUCTION LINE MODEL AND MES SYSTEM CREATION FOR DATA
ANALYZATION
Andrea Václavová, Martin Batroň…………………………………………………………………..………1
Abstract
Keywords: wonderware, integration, big data, data
The aim of this poster is to present the current status of storage
research and to declare the further steps in working Acknowledgments
with Wonderware software, various products which it This publication was created thanks to the support of
provides, and a fully automated production line. We the Ministry of Education, Science, Research and Sport
have a production line model that consists of five of the Slovak Republic in the framework of the call for
stations. The production line is used for filling bottles subsidy for the development project No. 002STU-2-
with continuous (with the ability to mix accurate ratios) 1/2018 with the title „ STU as the Leader of the Digital
or discrete (with the ability to sort raw granulate) Coalition
material according to the specified requirements. Next
step in the production process is either storage or direct References
distribution of already filled bottles and possible re- [1] Stenerson J, Deeg D: Programing Siemens Step
emptying and prepare bottles for further reuse. To 7 (TIA Portal) Programing, a Practical
avoid losing data every time we shut down and restart Approach, CreateSpace Independent Publishing
production line, we had to create a communication and Platform, 2015
start saving the data. Currently, the signals from the
PLC of the production line are linked and a [2] Tempest, Production line description, User
communication between Wonderware the System manual, Tempest, 2014
Management Connsole (SMC) and ArchestrA
Application production line is established. With this
communications link, we have been able to create a [3] Wonderware, Application Server, Training
complete production line model that includes all of the manual, Achneider Electric Software, 2015
individual zones and their objects and its attributes in
the ArchestrA IDE, and we are able to use this model [4] Wonderware, Wonderware Historian Industrial
to control the physical line while tracking the current Data Management, available at
values of each attribute. After deploying this model, we https://www.wonderware.com/industrial
are storing all of this data with the Wonderware -information-management/historian/,
Historian Client, which offers various options for Accessed 29th April 2019
working with big data such as creating trends.
Furthermore, it will be necessary to create a virtual [5] Wonderware, Wonderware InTouch, available at
production line model using the Wonderware HMI tool https://www.wonderware.com/hmi-
InTouch that will allow us to directly control and scada/intouch/, Accessed 2nd May 2019
observe the individual signals of production line. Using
all three Wonderware components (ArchestrA IDE, [6] Wonderware, Wonderware Software, available
InTouch and Historian) we want to create a MES at https://www.wonderware.com, Accessed
system, which can store data to database and later on 29th April 2019
we use this system to analyze data from production
line.
1
Optimization of Laser Welding Parameters of
Copper to Austenitic Stainless Steel
Ema Tomčíková
Faculty of Materials Science and Technology in Trnava
Slovak University of Technology in Bratislava
J. Bottu 25, Trnava, 917 01 Slovakia
ematomcikova@gmail.com
2
Diagnostics of the Machines and Devices Based on
the SIMATIC ProDiag
3
Hungary, Budapest, 15-18 June 2014. 1. ed. Alarm Systems, Momentum press, ISBN-13: 978-
Amsterdam: Elsevier, p. 1597-1602. ISBN 978-0- 1-60650-003-3
444-63456-6
[7] Siemens, (2018). Machine and Plant Diagnostics
[4] Kopček, M., (2019). Standard programming with ProDiag V4.1, © Siemens AG 2019 [cit.
guide v1.1., in Slovak, (Štandard programovania 2019‐06‐16], available at
v1.1., internal documentation), Trnava: Skartek https://support.industry.siemens.com/
cs/ww/en/viev/109740151
4
Implementation of Digital Technologies in
Smart Factory Processes
5
factories. Automatisierungstechnik 2016, 64(9), [18] Pei, F., Tong, Y., He, F., Li, D. Research on
2016, pp. 750-757. design of the smart factory for forging
enterprise in the industry 4.0 environment.
[10] Lederer, M., Betz, S., & Schmidt, W. Digital Mechanika, Vol. 23(1), 2017, pp. 146-152.
transformation, smart factories, and virtual
design - contributions of subject orientation. [19] Ren, G., Hua, Q., Deng, P., Yang, C., & Zhang, J.
ACM International Conference Proceeding Series, A Multi-Perspective Method for Analysis of
2018, pp. 1-10. Cooperative Behaviors among Industrial
Devices of Smart Factory. IEEE Access, 2017,
[11] Lima-Monteiro, P., Parreira-Rocha, M., Rocha, pp. 1-10.
AD., Barata Oliveira, J. Big Data Analysis to
Ease Interconnectivity in Industry 4.0-A Smart [20] Suginouchi, S., Kokuryo, D., & Kaihara, T.
Factory Perspective. Service Orientation in (2017). Value Co-creative Manufacturing
Holonic and Multi-Agent Manufacturing: System for Mass Customization: Concept of
Proceedings of SOHOMA 2016, 2017, pp. 237- Smart Factory and Operation Method Using
245. Autonomous Negotiation Mechanism. The 50th
CIRP Conference on Manufacturing Systems 63,
[12] Longo, F., Nicoletti, L., & Padovano, A. Smart 2017, pp. 727-732.
operators in industry 4.0: A human-centered
approach to enhance operators' capabilities [21] Schwab, K. The fourth industrial revolution.
and competencies within the new smart factory Portfolio penguin, United Kingdom, 2017.
context. Computer & Industrian Engineering, Vol.
113, 2017, pp. 144 -159. [22] Trinks, S., and Felden, C. Edge Computing
architecture to support Real Time Analytic
[13] Loucks, J., Macaulay, J., Noronha, A., & Wade, applications A State-of-the-art within the
M. Digital Vortex – How todays market leaders application area of Smart Factory and Industry
can beat disruptive competitors at their own 4.0. IEEE International Conference on Big Data
game. International Institute for Management (Big Data), 2018, pp. 2930-2939.
Development, Switzerland, 2016
[23] Wan, J., Tang, S., Li, D., Imran, M., Zhang, C.,
[14] Paelke, V. Augmented Reality in the Smart Liu, C., Pang, Z. Reconfigurable Smart Factory
Factory Supporting Workers in an Industry for Drug Packing in Healthcare Industry 4.0.
4.0. Environment. 19th IEEE International Transactions on Industrial Informatics, 2019, pp.
Conference on Emerging Technologies and 1-9.
Factory Automation, ETFA, 2016.
[24] Wan, J., Xia, M., Hong, J., Pang, Z., Jayaraman,
[15] Park, J. A Smart Factory Operation Method for B., & Shen, F. IEEE ACCESS Special section
a Smart Grid. International Conference on editorial: Key technologies for smart factory of
Computers and Industrial Engineering: Soft Industry 4.0. IEEE-INST electrical electronics
Computing Techniques for Advanced engineers, Vol. 7, 2019, pp. 17969-17974.
Manufacturing and Service Systems, 2010.
[25] Wang, S., Wan, J., Zhang, D., Li, D., & Zhang, C.
[16] Park, D-J., Lee, J-H., Park, J-A., & Bae, H-S. The Towards smart factory for industry 4.0: a self-
method of structuring production logistics organized multi-agent system with big data
systems in smart factories of SMEs. based feedback and coordination. Computer
International Journal of Advanced Science and Networks 101, 2016, pp. 158–168.
Technology, Vol. 118, 2018, pp. 119-130.
[26] Zhang, Z., Li, X., Wang X., & Cheng H.
[17] Park, S. and Lee, SJ. A Study on Worker's Decentralized Cyber-Physical Systems: A
Positional Management and Security Paradigm for Cloud-Based Smart Factory of
Reinforcement Scheme in Smart Factory Using Industry 4.0. Springer International Publishing,
Industry 4.0-Based Bluetooth Beacons. 2017, pp. 127-171.
Advances in Computer Science and Ubiquitous
Computing, Lecture Notes in Electrical
Engineering 421, 2017, pp. 1059-1066.
6
Challenges, Issues, Barriers and Problems in Digital
Transformation – Systematic Literature Review
[2] Afonasova, M.A: Digital Transformation of the [9] Henriette, E, Feki, M, Boughzala, I: Digital
Entrepreneurship: Challenges and Prospects, transformation challenges, Proceedings of Tenth
available at: https://www.abacademies.org/ Mediterranean Conference on Information System
articles/digital-transformation-of-the- (MCIS), Association for Information Systems,
entrepreneurship-challenges-and-prospects- 2016, pp. 1-7.
7646.html, Accessed: 28th July 2019.
[10] Horlacher A, Hess, T: What Does a Chief Digital
[3] Al-Ruithe, M, Benkhelifa, E, Hameed, K: Key Officer Do? Managerial Tasks and Roles of a
Issues for Embracing the Cloud Computing to New C-level Position in the Context of Digital
Transformatio, Proceedings of 49th Hawaii
7
International Conference on System Sciences, and International Stability TECIS, 2018, pp. 186-
IEEE Computer Society, 2016, pp. 5126-5135. 191.
[15] Khitskov, E, Veretekhina, S, Medvedeva, A, [24] Pereira, J.L, Belo, O, Ravesteijn, P: Special Issue
Mnatsakanyan, O, Shmakova, E, Kotenev, A: on Big Data and Digital Transformation,
Digital Transformation of Society: Problems Journal of Grid Computing, 2018, pp. 531-533.
Entering in the Digital Economy, Eurasian
Journal of Analytical Chemistry, 2017, pp. 855- [25] PhraseMix: What's the difference between
873. "problem", "trouble", and "issue"? available at
https://www.phrasemix.com/answers/whats-the-
[16] Knop, J: Chemistry 4.0 Challenges and difference-between-problem-trouble-and-issue,
Solutions for the Digital Transformation, Accessed: 28th July 2019.
Croatica Chemica Acta, 2016, pp. 397-402.
[26] Rodrigues, L.S: Challenges of Digital
[17] Kutnjak, A, Pihir, I, Tomičić Furjan, M: Digital Transformation in Higher Education
Transformation Case Studies Across Industries Institutions: A brief discussion, 32th IBIMA
– Literature Review, Proceedings of the 42nd Conference, 2017, pp. 1-4.
International Convention on Information and
Communication Technology, Electronics and [27] Salem, F: Building a Smart City: Overcoming
Microelectronics 2019, pp. 1498-1503. the Challenges of DT – The Case of „Smart
Dubai“, available at:
[18] Kutnjak, A, Križanić, S, Pihir, I: Educational and https://books.google.hr/books?id=J7IpDwAAQB
practical view of knowledge, skills and AJ&pg=PA139&lpg=PA139&dq=10.1108/S204
experience needed by a Chief Digital Officer, 8-
Proceedings of the 11th International Conference 757620170000006006&source=bl&ots=PqmlZB
on Education and New Learning Technologies PvCx&sig=ACfU3U14YkdApD3U8qsxIlwb2KT
(EDULEARN 2019), pp. 5711-5718. 1ahDI7w&hl=hr&sa=X&ved=2ahUKEwjMrvvM
t6fjAhVN3KQKHTYzCgIQ6AEwAHoECAAQ
[19] Limani, Y, Stapleton, L, Groumpos, P.P: The AQ#v=onepage&q=10.1108%2FS2048-
Challenges of Digital Transformation in Post- 757620170000006006&f=false, Accessed: 28th
Conflict Transition Regions: Digital July 2019.
Technology Adoption in Kosovo, Proceedings of
18th IFAC Conference on Technology, Culture
8
[28] Schwanholz, J, Graham, T: Digital challenges-to-digital-transformation-in-the-
Transformation: New Opportunities and enterprise.html, Accessed: 28th July 2019.
Challenges for Democracy? Managing
Democracy in the Digital Age: Internet [32] Tumbas, S, Berente, N, von Brocke, J: Three
Regulation, Social Media Use and Online Civic Types of Chief Digital Officers and the Reasons
Engagement, 2018, pp. 1-7. Organizations Adopt the Role, MIS Quarterly
Executive, 2017, pp. 121-134.
[29] Shafiee Nahrkhalaji, S, Shafiee, S, Shafiee, M,
Hvam, L: Challenges of Digital [33] Vasiljeva, T, Lukanova, K: Commercial banks
Transformation: The Case of the Non-profit and Fintech companies in the digital
Sector, Proceedings of 2018 IEEE International transformation: challenges for the future,
Conference on Industrial Engineering and Journal of Business Management, 2016, pp. 25-33.
Engineering Management (IEEM), 2018, pp.
1245-1249.
[34] Yli-Huumo, J, Smolander, K: Changes and
challenges of technical debt and its
[30] Stark, R, Damerau, T, Lindow, K: Industrie management during ongoing digital
4.0—Digital Redesign of Product Creation and transformation, Ninth International Workshop
Production in Berlin as an Industrial Location, on Managing Technical Debt, 2017, pp. 1-4.
The Internet of Things, 2018, pp. 171-186.
[35] Zahariaa, S.E, Pietreanub, C.V: Challenges in
[31] Tiersky, H: Navigating digital transformation, airport digital transformation, Transportation
available at Research Procedia, 2018, pp. 90-99.
https://www.cio.com/article/3179607/5-top-
9
A Public Policy Readiness for e-Inclusion of 54+
Robertina Zdjelar
PhD Student on Faculty of Organization and Informatics
University of Zagreb
Pavlinska 2, 42000 Varaždin, Croatia
rzdjelar@foi.hr
1. Introduction
The area of research is the readiness of public policy for e-inclusion of 54+. Generally, the rate of e-inclusion of
54+ is low, especially for the population 60+ globally and in the European Union as it is documented by
EUROSTAT [6]. The motivation for this research lays on low rate of e-Inclusion of 54+ in the last decade and on
many scientific and professional articles and books that relates with adult’s behaviour, quality of life, e-inclusion,
psychology, social psychology and public policies. The Croatian National statistics about digital literacy research
conducted by Census 2011 presents also the low level of digital literacy rate of 54+ in Croatia [9]. Review of
previous relevant research of e-inclusion of elderly have been presented in articles [15], [16], [17]. The quality of
life is wide term in general [11], [12], [13]. Considering the elderly everyday life, many problems caused by
physical barriers can be avoided if individuals get and use appropriate digital literacy skills [11], [12], [13], [17].
According to the [14] "E-inclusion or digital divide: an integrated model of digital inequality" public policy [7] is
one of the forces of the macro causes that determines the resources, as meso causes to assure access as a micro
cause. Considering presented arguments the research problem is how the public policies have influence to digital
literacy and e-inclusion of 54+ rate. Methodology of creating public national policies and regional policies in
Croatia are regulated by law [8] and it is justified with EU law. This research is oriented to readiness of public
policies for e-inclusion of 54+ based on referenced models: 1) Proposed General Theoretical Conceptual Model
of e-Inclusion [18] and 2) An Integrated model of digital inequality [14].
2. Research Methods
The shortcomings from previous research e-Inclusion of 54+ and facts that present the actual rate of e-Inclusion
of 54+, public policy documents and attitudes of policy makers will be used as a source for core data to set a new
theory by using Grouded Theory method.
10
Define the How to determine the To determine the readiness Grounded Theory [1], [2]
relationships relationship between the assessment model for public applied on:
between categories and policies e-Inclusion of 54+ and - public policy strategic
categories and subcategories based on to create recommendations for documents;
subcategories of previous step of the improving strategic planning of - data collected from Focus
the model research e-inclusion of 54+ for policy Group and Expert Judgment
makers (interview)
Evaluation of the How to evaluate the To evaluate the results of a Expert evaluation with Card
results results of readiness created readiness assessment sorting method
assessment model for model for public policies e-
public policies e- Inclusion of 54+
Inclusion of 54+?
4. Conclusion
The importance of the research is to detect the readiness of public policy for e-Inclusion of 54+ and to formulate
the recommendations for the actions that need to be taken in further strategic planning measures for raising the
rate of e-Inclusion of 54+. The Value of proposed research is in creating the new active environmental
opportunities to input e-inclusion of 54+ in strategy document for further 6 years period by using suggested
recommendations.
5. References
[1] Charmaz, K., Constructing Grounded Theory A Practical Guide through Qualitative Analysis, SAGE, 2006.
[2] Creswell, J.W. Research design Qualitative, Quantitative and Mixed Methods Approaches, London, 2009.
[3] Dzhusupova, Z., Shareef, M., Ojo, A., Janowski, T. Methodology for e-Government Readiness Assessment
– Model, Instruments, Implementation, Centre for Electronic Governance, United Nation University,
International Conference on Society and Information Technologies (ICSIT 2010), Florida, USA, January
2010
[4] European Commission, Digital Agenda 2020, The Digital Skills and Jobs Coalition,
(https://ec.europa.eu/digital-single-market/en/digital-skills-jobs-coalition, accessed December 1st 2016)
[5] European Commission, MIREIA - Measuring the Impact of eInclusion Actors, Measuring the Impact of
eInclusion Actors, Exploratory Study on Methods used to measure the ICT-mediatied Social Impact of
Grassroots Organizations, JCR Technical Report EUR 25494EN, EU 2012. European Commission, The
11
Digital Economy and Soceiety Index (DESI) 2019. How digital is your country? Europe improves but still
needs to close digital gap https://ec.europa.eu/digital-single-market/desi, accessed July 25th 2019.)
[6] EUROSTAT, Digital economy and society, http://ec.europa.eu/eurostat/data/database, accessed February 4th
2018.
[7] Mukosa, F., Mweemba, B., Katebe, M. What is Public Policy? How is it related to the law?, Imperial Journal
of Interdisciplinary Research (IJIR), Vol-3, Issue-9, 2017 (IJIR), ISSN: 2454-1362,
http://www.onlinejournal.in
[8] Narodne novine, Zakon o sustavu strateškog planiranja i upravljanja razvojem Republike Hrvatske, broj
123/17
[9] Popis stanovništva 2011. u Republici Hrvatskoj,(http://www.dzs.hr/, accessed January 10th 2017)
[10] Tierney, W.G., Clemens, R.F., Qualitative Research and Public Policy: The Challenges of Relevance and
Trustworthiness, Center for Higher Education Policy Analysis, University of Southern California, 3470
Trousdale Parkway, WPH 701D, Los Angeles, CA 90089
[11] United Nations. (2015). Transforming our World: The 2030 Agenda for Sustainable Development. accessed
August 1st 2018 from https://sustainabledevelopment.un.org/post2015/transformingourworld
[12] United Nations. (2017). Population facts: Population ageing and sustainable development. Department of
Economic and Social Affairs, Population Division, No. 2017/1, accessed 20.01.2019 from
http://www.un.org/en/development/desa/population/publications/pdf/popfacts/PopFacts_2017-1.pdf
[13] Vincent, J.A. Older People and Sustainable Development. Department of Sociology, University of Exeter,
UK, accessed January 15th 2019 from https://www.eolss.net/Sample-Chapters/C13/E1-20-04-01.pdf
[14] Yu, B., Ndumu, A., Mon, L.M., Fan, Z. (2018) "E-inclusion or digital divide: an integrated model of digital
inequality", Journal of Documentation, Vol. 74 Issue: 3, pp.552-574
[15] Zdjelar R. (2019.) "WHO CARES ABOUT DIGITAL LITERACY OF 54+ CITIZENS?!", CEE e| DEM and
e|GOV Days 2019, Budapest, May, 2019.
[16] Zdjelar, R., Kelemen, R. (2018). The Smart Cities are implemented – Are Citizens "Smart" Also. 6th Smart
Cities Conference, 2018 Bucharest, Romania
[17] Zdjelar, R., Žajdela Hrustek, N., Sumpor, M. (2019) Sustaintable development and active ageing in EU
countries – bridges and gaps, ESD-Conference, Rabat, 2019
[18] Žajdela Hrustek, N. Multidimensional and multiperspective approach for monitoring e-inclusion, Doctoral
thesis, Faculty of Organization and Informatics, Varaždin, 2015
12
Implementation of the Cybersecurity for Medical
Devices through the Healthcare Enterprise
Reference Architecture (HERA) Framework
Nadica Hrgarek Lechner
Faculty of Organization and Informatics
Pavlinska 2, 42 000 Varaždin, Croatia
nhrgarek@foi.hr
1. Introduction
The ability of information and communications technology to improve patient care and experience, and to provide
patients and medical professionals with valuable health information is leading to its increasing use in the healthcare
industry. Medical devices are systems consisting of many components (e.g., hardware, firmware, software) that
build complex architectures. Such systems are becoming increasingly connected using wired or wireless network
capabilities. Connected (implantable) medical devices that have a direct impact on patients' health and well-being
pose a higher security risk and have increased need for cybersecurity. The next decade is likely to witness a
considerable rise in connectivity of medical devices as well as increase in security breaches and cybersecurity
threats. From a security point of view, another challenge in healthcare are older medical devices that are still in
use. Such devices were very often designed without or with minimum security controls.
Design and development of medical devices involves a significant number of regulations and standards to
demonstrate that they meet legal requirements in order to ensure they are safe, secure, and effective throughout
the entire life cycle. Legal requirements include quality management system, risk management system, usability
engineering, biocompatibility, sterility, medical testing, cybersecurity, privacy, etc. Hrgarek Lechner (2017)
provides a brief overview of cybersecurity regulations and standards for medical devices. The increasing amount
of guidance documents, national laws and regulations, and standards in different countries to strengthen
cybersecurity requirements is a challenging area in the field of medical devices.
Poor cybersecurity implementation can affect patient health, unintentionally expose patient data, and lead to a
significant adverse impact on the business. Medical device manufacturers operating in global context need a
solution to implement a cybersecurity risk management program that fulfils cybersecurity requirements throughout
the design and development process of medical devices that are subject to cybersecurity. Implementing such a
program must address patient’s safety and privacy, and product security. Typically, the applicable guidance
documents (FDA, 2014; FDA, 2016; Health Canada, 2019; TGA, 2019) recommend the use and adoption of the
voluntary NIST Cybersecurity Framework (NIST, 2018), diverse security standards and privacy regulations. In
addition, the guidance documents provide examples of security risk controls that should be considered for medical
devices. Currently there is no international cybersecurity standard that is solely focused on the medical device
industry. For example, the payment card industry uses a set of security standards to protect cardholder payment
data (PCI Security Standards Council, 2018). Another regulated industry like automotive is developing a new
international standard for automotive cybersecurity engineering (ISO/SAE, 2019). In analogy to other regulated
industries, International Electrotechnical Commission (IEC) is developing a new technical report IEC TR 60601-
4-5 and a new standard IEC WD 80001-5-1 to support medical device manufacturers. However, adding more
guidance documents and standards increases the complexity of the evolving medical device cybersecurity
ecosystem.
Our ongoing research is guided by the following preliminary research questions:
1. Is there a need to develop a new approach/solution to address the identified research problem?
2. What methodologies and standards exist to solve the research problem?
3. What industrial solutions exist to solve the research problem in the medical device domain?
4. What solutions from other industries may be used to solve the research problem?
5. What is missing in existing methodology during design and development of medical devices?
6. Is the solution going to be developed from scratch or extend/enrich an existing solution?
7. If the solution is going to or extend/enrich an existing solution, what needs to be enriched?
The purpose of this paper is to explore and briefly describe ideas through which the Healthcare Enterprise
Reference Architecture (HERA) framework could be used/adapted to address challenges and for successful
13
implementation of a cybersecurity risk management program that is an integral part of design and development
processes of medical devices.
We expect that the research is going to lead to many small contributions. The research will contribute to the
existing literature by creating new knowledge and may improve research and practice. Our research has a great
potential to classify many regulations and standards to overcome complexity and to define a secure development
life cycle for the medical device domain. In addition, by performing a literature review of previous research we
will identify papers where other researchers see solutions to solve the research problem.
2. Research methods
After defining the research problem and preliminary research questions in section 1, we started by performing a
literature review of previous research to identify papers that could be relevant to solve the research problem. While
there are many papers about enterprise architecture frameworks listed in section 3, to the authors' knowledge, no
publications are available in the literature that investigate the applicability of the HERA framework in the medical
device domain for cybersecurity purposes. To address the preliminary research questions, we are going to develop
a questionnaire with different categories of questions related to cybersecurity of medical devices (e.g., device type,
network capability, risk type, etc.). The questionnaire will be used over a six months period to collect qualitative
and quantitative data during security risk assessment meetings at one medical device manufacturer that has legacy
devices and devices at different development stages which are subject to cybersecurity. Collected research data
will be anonymized, analysed, and interpreted. The research will be limited to the premarket life cycle phase of a
medical device and future research should concentrate on the postmarket phase.
4. Conclusion
This is an original research work and the paper has not been submitted to other journal for review and possible
publication. The originality of our approach is that we are going to address cybersecurity in a model through
14
processes (e.g., planning, requirements, design, development, production), activities (e.g., security risk assessment,
threat modelling, security testing, etc.), tool support during the activities, and roles (e.g., security architect, security
tester, external security consultant, etc.) during the premarket life cycle phase of medical devices that are subject
to cybersecurity. We expect that the defined model could be used in practice by medical device manufacturers.
5. References
[1] Bass, L., Clements, P., & Kazman, R. Software Architecture in Practice. Addison-Wesley, Boston,
2003.
[2] FDA, Content of Premarket Submissions for Management of Cybersecurity in Medical Devices –
Guidance for Industry and Food and Drug Administration Staff, Food and Drug Administration,
2014. (https://www.fda.gov/media/86174/download accessed 01.09.2019.)
[3] FDA, Postmarket Management of Cybersecurity in Medical Devices – Guidance for Industry and
Food and Drug Administration Staff, Food and Drug Administration, 2016.
(https://www.fda.gov/media/95862/download accessed 01.09.2019.)
[5] Health Canada, Guidance Document: Pre‐market Requirements for Medical Device Cybersecurity,
Ottawa, 2019. (https://www.canada.ca/content/dam/hc-sc/documents/services/drugs-health-
products/medical-devices/application-information/guidance-documents/cybersecurity-
guidance.pdf accessed 01.09.2019.)
[6] Hrgarek Lechner, N. An Overview of Cybersecurity Regulations and Standards for Medical Device
Software. In Proceedings of the Central European Conference on Information and Intelligent
Systems, pages 237-249, Varaždin, 2017.
[7] Hrgarek Lechner, N. Developing a Compliant Cybersecurity Process for Medical Devices. In
Proceedings of the Central European Conference on Information and Intelligent Systems, pages
197-204, Varaždin, 2018.
[8] International Electrotechnical Commission, IEC TR 60601-4-5, Medical electrical equipment – Part
4-5 Guidance and interpretation – Safety related technical security specifications for medical
devices (https://www.iec.ch/dyn/www/f?p=103:14:13410394850840::::FSP_ORG_ID,
FSP_LANG_ID:22678,25 accessed 07.09.2019)
15
[12] PCI Security Standards Council, Payment Card Industry (PCI) Data Security Standard, 2018.
(https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf accessed 01.09.2019.)
[13] Sajid, M., & Ahsan, K. Enterprise Architecture for Healthcare Organizations. World Applied
Sciences Journal, 30(10):1330-1333, 2014.
[14] TGA, Medical device cyber security guidance for industry, Therapeutic Goods Administration,
2019. (https://www.tga.gov.au/sites/default/files/medical-device-cyber-security-guidance-
industry.pdf accessed 01.09.2019.)
[15] The Open Group, Healthcare Enterprise Reference Architecture (HERA), Berkshire, 2018a.
(https://publications.opengroup.org/s182 accessed 01.09.2019.)
[16] The Open Group, The TOGAF® Standard, Version 9.2 (Evaluation Copy), 2018b.
(https://publications.opengroup.org/i182 accessed 08.09.2019.)
[17] Zachman, J. A. A Framework for Information Systems Architecture. IBM Systems Journal,
26(3):276-292, 198
16
Environmental Sustainability in Digital Marketing
of Automotive Industry
17
sustainable-household- Accessed: 15th September 2019.:
consumption_9789264175068-en#page3,
Accessed: 15th September 2019. [12] PSA Group. (2016). The PSA Group is included in
the NYSE Dow Jones Sustainability Index for the
[9] PSA Group. (2019). Press Releases, available at first time, available at https://media.
https://media.groupe-psa.com/en/psa- groupe-psa.com/en/press-
peugeot-citro%C3%ABn/press- releases/group/psa-group-included-
releases/group/function.include?page= nyse-dow-jones-sustainability-
35, Accessed: 15th September 2019: index?fbclid=IwAR1vl5wdhxb1X7bU4kHHbQ
ww70GsW9BUrlQwv3_1-
[10] PSA Group. (2019). Pacific Strategies a71NV7uilJiKDyVrgk, Accessed: 15th
Assessments, available at https://media. September 2019.:
groupe-psa.com/en, Accessed: 15th
September 2019.: [13] World Commission on Environment and
Development (WCED) (1987). Our Common
Future: Brundtland Report, available at
[11] Sustainable Development goals. (2015). About http://mom.gov.af/Content/files/Brunt
Sustainable development goals, available at
land_Report.pdf, Accessed: 15th September
https://www.un.org/sustainabledevelop
2019.:
ment/sustainable-development-goals,
18
Framework for Quality Assessment of Open
Datasets
Barbara Šlibar
Faculty of Organization and Informatics
University of Zagreb
Pavlinska 2, 42 000 Varaždin, Croatia
bslibar@foi.hr
1. Introduction
The value which can be gained from open data represents an innovation potential for individuals as well as for
private or public organizations. Although, open data enables a vast innovation potential for those subjects, there is
uncertainty about their quality. Hence, the questionable quality is a threat of value that can be generated from such
data.
Initial literature review reveals that there is a lot of researches which investigate data quality, but only few of them
are focused on the open data. Even in those researches which are concerned with quality of open data and in which
the quality frameworks for open data are proposed, are mostly directed to quality assessment of open data portals
and not to quality assessment of datasets published on them [1]–[3]. Equal quality dimensions are variously called
in different studies which directly affects the understanding and solving quality problems. Thus, Neumaier,
Umbrich and Polleres (2016) included dimension existence into their quality framework, while Vetrò et al. (2016)
used the same dimension, but they called it completeness [3], [4]. In addition, some authors use the term quality
dimension, some quality characteristic, and some even use the term quality metrics. Sadiq and Indulska (2017)
pointed out insufficient examination of open data quality and have adduced that attention should be focused on
three research areas in order to bring value to open information society: a shared, generally accepted understanding
of the quality dimensions; the existence of awareness about the inherent quality of the data itself which means that
collected data may be of sufficient quality for some purpose but not of sufficient quality for some other;
examination of the relationship between data quality, intention to use such data and effective use of data in
academic literature [5]. Open data portals should be observed independently of the software framework (e.g.
CKAN, Socrata, OpenDataSoft etc.) in order to develop a quality assessment framework that can be applied to a
number of portals rather than a few. This would provide a more complete picture of the current state of open data
quality. By initial literature review another drawback in several researches was noted and it is about objectivity of
developed quality frameworks. The objectivity of quality assessment frameworks is questionable since
questionnaires were used for development as well as for evaluation of the same frameworks [1], [4]. Also, only
the results of the surveys or evaluation of experts were used in a several phases during the development of the
framework [1], [4].
The proposed research is motivated by existing frameworks in which the evaluation of open data quality is done.
Even if results of the quality assessment in existing frameworks show a satisfactory level of portal quality, the
quality of datasets published on them remains questionable. Therefore, open data portals that are rated as portals
of good quality or which are ranked as the best can comprise datasets of poor quality.
Since further growth and development of open data is not possible assuming their questionable quality, the
objective of the proposed research is to develop a framework for automatic evaluation of the quality of open
datasets.
2. Research Methods
Considering the identified shortcomings in previous researches, the research questions and objectives are
formulated. Combining quantitative and qualitative research approaches in social sciences is increasingly
commonplace [6], [7]. Therefore, the research approach of proposed research is mixed methods because it consists
of elements of qualitative and quantitative approaches [8]. The epistemological approach of the proposed research
is pragmatism because it involves quantitative and qualitative methods, objective and subjective point of view,
and acceptations of explanation that leads to the best outcomes [6], [9]. A method framework for design science
research is used within proposed research along with modification in number of main activities [8].
19
Table 1. Plan of the proposed research
Artefact
Develop
method
Demonstrat
Dimension represents an aspect of the data quality which should be observed during the evaluation of open data
[2], [4], [10].
Metrics represents the way of measuring open data quality and it partially or completely describes the quality of a
dimension [2]–[4].
20
certain assumptions. Estimation of composite index robustness by combining uncertainty analysis and sensitivity
analysis proved to be useful in practice [13], [16].
4. Conclusion
Initial literature review on open data quality has revealed shortcomings in existing researches. Therefore, the
framework for automatic evaluation of the quality of open datasets that is primarily based on metadata will be
developed. For the development of the framework itself, it is necessary to identify key quality dimensions as well
as the corresponding metrics.
The following 4 scientific contributions of the proposed research are: 1) systematization and synthesis of existing
knowledge in the domain of the open datasets quality and dimensions identified for the purpose of measuring
them; 2) the developed framework based on the quality metrics of open datasets solves the explained problem
considering the specified requirements; 3) the developed framework shows that there is a difference in the quality
of open datasets; 4) the developed framework is robust.
5. References
[1] S. Kubler, J. Robert, S. Neumaier, J. Umbrich, and Y. Le Traon, ‘Comparison of metadata quality in open
data portals using the Analytic Hierarchy Process’, Government Information Quarterly, vol. 35, no. 1, pp.
13–29, Jan. 2018.
[2] J. Umbrich, S. Neumaier, and A. Polleres, ‘Quality Assessment and Evolution of Open Data Portals’, in 2015
3rd International Conference on Future Internet of Things and Cloud, 2015, pp. 404–411.
[3] S. Neumaier, J. Umbrich, and A. Polleres, ‘Automated Quality Assessment of Metadata Across Open Data
Portals’, J. Data and Information Quality, vol. 8, no. 1, pp. 2:1–2:29, Oct. 2016.
[4] A. Vetrò, L. Canova, M. Torchiano, C. O. Minotas, R. Iemma, and F. Morando, ‘Open data quality
measurement framework: Definition and application to Open Government Data’, Government Information
Quarterly, vol. 33, no. 2, pp. 325 – 337, Apr. 2016.
[5] S. Sadiq and M. Indulska, ‘Open data: Quality over quantity’, International Journal of Information
Management, vol. 37, no. 3, pp. 150–154, Jun. 2017.
[6] I. Sekol and I. Maurović, ‘MIJEŠANJE KVANTITATIVNOG I KVALITATIVNOG ISTRAŽIVAČKOG
PRISTUPA U DRUŠTVENIM ZNANOSTIMA – MIJEŠANJE METODA ILI METODOLOGIJA?’,
Ljetopis socijalnog rada, vol. 24, no. 1, pp. 7–32, Jul. 2017.
[7] J. W. Creswell, Research Design: Qualitative, Quantitative and Mixed Methods Approaches, 4th edition.
Thousand Oaks: SAGE Publications, Inc, 2014.
[8] P. Johannesson and E. Perjons, An Introduction to Design Science. Springer International Publishing, 2014.
[9] R. B. Johnson and A. J. Onwuegbuzie, ‘Mixed methods research: A research paradigm whose time has come’,
Educational Researcher, vol. 33, no. 7, pp. 14–26, 2004.
[10] N. Veljković, S. Bogdanović-Dinić, and L. Stoimenov, ‘Benchmarking open government: An open data
perspective’, Government Information Quarterly, vol. 31, no. 2, pp. 278–290, Apr. 2014.
[11] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, and S. Linkman, ‘Systematic Literature
Reviews in Software Engineering - A Systematic Literature Review’, Inf. Softw. Technol., vol. 51, no. 1, pp.
7–15, Jan. 2009.
[12] M. A. Meyer and J. M. Booker, Eliciting and Analyzing Expert Judgment: A Practical Guide. Philadelphia,
PA, USA: Society for Industrial and Applied Mathematics, 2001.
[13] M. Nardo, M. Saisana, A. Saltelli, S. Tarantola, A. Hoffman, and E. Giovannini, Handbook on Constructing
Composite Indicators. OECD Publishing, 2005.
[14] W. K. Härdle and L. Simar, Applied Multivariate Statistical Analysis, 4th ed. Berlin Heidelberg: Springer-
Verlag, 2015.
[15] R. K. Singh, H. R. Murty, S. K. Gupta, and A. K. Dikshit, ‘An overview of sustainability assessment
methodologies’, Ecological Indicators, vol. 15, no. 1, pp. 281–299, Apr. 2012.
[16] M. Saisana, A. Saltelli, and S. Tarantola, ‘Uncertainty and sensitivity analysis techniques as tools for the
quality assessment of composite indicators’, Journal of the Royal Statistical Society: Series A (Statistics in
Society), vol. 168, no. 2, pp. 307–323, 2005.
21
Internet of Things – The Next Industrial Revolution
Mihael Radovan
Faculty of Organization and Informatics
University of Zagreb
Pavlinska 2, 42000 Varaždin, Croatia
mradovan@foi.hr
1. Introduction
With the 21-th century, The Internet of Things came as a new industrial revolution – sometime referred to as
Industry 4.0. All kinds of electronic devices and other non-electronic items and equipment (buildings, homes, cars,
clothes and medicaments) can be equipped with sensors and actuators, which can then be connected to the Internet
and exchange data. And data is the new commodity of the 21-st century, a new generator of values in the economy.
This paper will try to give a review of possible use of IoT in most important industries – energy industry,
automotive and smart communities (cities, buildings, homes).
2. Research Methods
22
than in 2015. Most of these data will be ephemeral and will be neither saved nor stored. Approximately 10 percent
of so generated data is useful and will be transmitted. Big Data will reach about 250 ZB, up about 10-fold from
2015, and global consumer cloud storage traffic from 8 EB in 2015 grows up to 50 EB in 2020, what is 6-fold
growth [2].
How important IoT became, proves the fact that the biggest IT players offer IoT services and platforms to use:
Microsoft, Oracle, Amazon, Cisco, Intel, Hitachi, Samsung, SAP, Google, Autodesk, IBM, Bosch, Siemens,
Deutsche Telecom, AT&T, General Electric, Salesforce, but there are also many open source services.
The cloud has changed the way of software architecture and development of software for mobile platforms, which
started to exchange petabytes of data, and finally parse, combine and analyse these data in the cloud, producing a
new values and powerful insights to business. The amount of data generated by IoT continues to grow at an
exponential rate. IoT is much more than technology, much more than devices connected to the cloud. IoT is a new
techno-philosophy, it is a way of thinking. It is a fantastic opportunity for industry to enter new markets and
develop new business models and new industrial standards. Creating new business opportunities is enough big
reason companies are looking to the IoT today. In most cases, the purpose of business is to increase profit.
Every new technology always and absolutely meets a child diseases and many treatment. By IoT, this are
inappropriate existing industrial network protocols, as well as security models. Security is the most important part
of such a system, from physical protecting of devices at the edge to protecting customer’s data and privacy in the
cloud. IoT security is as strong as the weakest node. Therefore is by IoT used a new technology, approved by
Bitcoin – Blockchain. “Blockchain has relevance to IoT in establishing the provenance of devices in a specific
network; in particular where long running but infrequently connected remote devices can report in”, says Ian
Hughes, IoT analyst at 4511 Research in London.
1
Ian Hughes, 451 Research, London, UK: https://451research.com/analyst-team/analyst/Ian+Hughes
23
One of biggest challenges for IoT, outside of industry, and big business opportunity are smart cities. IoT slowly
and quietly enters in our homes [4] – we already have smartphones, smart lightning, smart TVs, smart heating and
cooling devices, connected security systems, smart locks, WLAN routers with support for smart home devices.
Next step are smart buildings [5] and finally smart cities [3], where is almost every connected to the internet –
smart buildings, connected cars, smart parking lots, connected public traffic and transportation, security personal
etc. One big problem and challenge in this case is how to handle with such a big amount of data. Just one smart
city with the population of one million residents will by 2020 generate 200 PB (200 million GB) of data per day
(see Table 1.)
Despite security threats and problems with infrastructure and communication, IoT is a solution for traffic problems
of megacities. According Inrix Research [7], car drivers spent 9% their time sitting in traffic last year. For this
study, Inrix Research covered 100.000 locations across 8700 cities in more than 100 countries, and about 18.000
drivers. To reduce enormous costs for the parking overpaid and time spent for search for parking, it is necessary
to interconnect cars with the city infrastructure, using IoT technology – connected cars and smart parking solutions
can be leveraged to reduce searching for parking, and save time and fuel.
5. Conclusion
About half of the world’s population lives in cities. There are more than 20 megacities of 10 million or even more
people, and in next 10 years this amount will be doubled. Technological development must be used to manage
with resources on optimal way. Smart cities and smart industry solutions are keys to have a sustainable
development in this important environments.
6. References
[1] Statista, "Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025," 2017.
Available: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/.
[2] Cisco, "Cisco Global Cloud Index: Forecast and Methodology, 2015 - 2020," 2016. Available:
https://www.cisco.com/c/dam/en/us/solutions/collateral/service-provider/global-cloud-index-gci/white-
paper-c11738085.pdf.
[3] Gartner, "2017 Planning Guide for the Internet of Things," 2017. Available: http://images.gartnerfor
marketers.com/Web/Gartner/%7B0a313d84-f153-42fe-a6319d4860eea824%7D2017_planning_guide
_for_the__IoT.pdf
[4] D. Geneiatakis, I. Kounelis, R. Neisse, I. Nai-Fovino, G. Steri i G. Baldini, »Security and Privacy Issues for
an IoT based Smart Home,« u Mipro, Opatija, Croatia, 2017.
[5] S. H. Maciel, I. Cardoso, H. S. Ramos, J. P. C. Rodrigues and A. L. L. Aquino, "An integrated access control
and lighting configuration system for smart buildings," Journal of communications software and systems, vol.
13, pp. 101-108, 06/2017.
[6] Inmarsat, "The Future of IoT in Enterprise - 2017," 2017. [Online]. Available: https://www.inmarsat.com/
wpcontent/uploads/2017/06/IRP The_Future_of_IoT_in_Enterprise_2017.pdf.
[7] G. P. B. Cookson, »The Impact of Parking Pain in the US, UK and Germany,« Inrix Research, 2017.
24
Process Parameters Discovery Based on Application
of k-Means Algorithm -
A Real Case Experimental Study
Snježana Križanić, Katarina Tomičić-Pupek
Faculty of Organization and Informatics
University of Zagreb
Pavlinska 2, 42000 Varaždin, Croatia
{skrizanic, katarina.tomicic}@foi.hr
25
Classification of Motor Imagery Tasks for Brain-
Computer Interface with SVM Classifiers
1. Introduction
Brain - computer interface is created to control devices without physical movement. This type of interfaces works on
the principle of acquisition of information from the user's brain by measuring brain activity. To measure brain activity
is used EEG method, which captures the electric potentials between the neurons using non-invasive electrodes located
on the user's skull. Our ongoing research is focused on looking for thought patterns that will be used to drive machines
or equipment, which routine control is not possible with physical movement, mainly because of the user's inability to
perform physical movement that may be caused by a nervous system disease or injury. For this purpose is used motor
imagery, that research suggests, that thought movement is very similar to real move EEG data. [1] The aim of the
research is to find thought patterns that can be detect during execution, not just when it is activated, as is the case with
P300 waves, which are generated 300ms after stimulus or after real/imagery movement is intended. In this paper, we
focus on the classification of ongoing movement in 3 categories, using the SVM machine learning methods with
various parameters provided by Matlab.[2]
2. Research Methods
The aim of the research is to find a thought pattern that can be captured throughout its execution and can be safely
distinguished from other thoughts that are natural to the human brain, such as breathing, blinking, swallowing, etc. At
the same time, such an thought cannot be hard to focus for the user, as he would be mentally very exhausted in long-
term handling of BCI. For our purposes, we have collected data for only a small time period in order to train classifier
in a relatively short period of time. The results of this research will tend as benchmarks for the future design of a neural
network designed for the same purpose.
3. Data acquisition
We use the data acquired by the EEG headset Emotiv Epoc+ to input SVM classifiers. This device is capable of
recording 16-bit electrical potentials up to 8400 µV with 128Hz. The location of the electrodes is in the standard
international 10-20 system. The recorded bandwidth is 0.16Hz - 43Hz. Data is recorded using OpenVibe software,
which is OpenSource licensed. [3]
4. Data processing
After we have acquired raw EEG data, we created an application that processes this data. This application speededup
the data editing and thus the whole training process. Processing is carried out in several steps. The first step is to create
a label for each data category. In our case, they are 3 states: neutral/calm, imagery left hand movement, and imagery
right hand movement. From these data, we cut 500ms at the beginning and end of each recorded data class to avoid
detecting the P300 waves that arise at the beginning of the intended movement.
26
5. Data filtering
Data is filtered using bandpass filter in the following ranges. Alpha - 7Hz-13Hz, Beta 14Hz-30Hz and Epoc device
range 0.16Hz-43Hz. From each frequency band, we created one training dataset. For our purposes, we have also created
one combined dataset, which contain Alpha + beta waves in the range of 7-30.
6. FFT filtering
Next we applied fast fourier transform to data processed by bandpass filter. This transformation changed the data from
the time domain to the frequency domain and then we tried training on the data processed in this way. Since FFT
requires 2^N processing mask, we had to choose the appropriate mask size to be applied to the data. We chose 128,
that is 2^7, that represent data for 1 second. This can be relatively fast response to the classification of the thought
pattern. If we chose a larger mask, the classifier responses would be slow, so the control signal could be executed after
more than 1 second. This is no longer considered to be quick enough for real time applications.
7. Classifiers
As mentioned above, we use support vector machine classifiers for classification. Specifically, they were SVM
quadtratic, SVM cubic and SVM fine gaussian. The training dataset was created for 3 classes: lefthand imagery
movement, right hand imagery movement and neutral state. We used cross validation method with 5 crossfolds for
data validation. This protects classifier against overfitting by partitioning the dataset into folds and estimating accuracy
on each fold. [4]
Changing the kernel scale training parameter to the automatic mode provided by the Matlab software when training
SVM gaussian type has shown us very nice results, see Table 1. Classification accuracy. Detection accuracy increased
to more than 93%. Best classification accuracy was in Beta waves trained by SVM fine gaussian method. That is shown
in Figure 2. Confusion matrix shows that the highest error rate was in neutral state class and the most successful
classification was in motor imagery classes. This is because the motor imagery tasks is similar to each other and very
different from the neutral state.
27
Figure 2. Confusion matrix
9. Conclusion
Research has shown that classifier parameters such as kernel scale are very important to the classifier accuracy. We
proved that linear, quadratic and cubic SVM are not suitable for EEG data and that beta waves have the most significant
results. These results were trained on small data sets. The next step that will be used to verify the use of such an SVM
classifier in the real world will be to record new data with the intention of verifying the accuracy of the classification
under real conditions. If the success of the classification proves to be sufficient, then we will record the data under
difficult conditions such as noise, changing light conditions and other disturbing elements from the environment. If we
found out that the classification is also highly successful, the implementation of the classifier into the real machine
control algorithm would follow. This BCI could actually serve physically challenged people. This research originally
served as a starting point for creating a BCI based on neural networks but shows that SVM methods can also be used
on the motor imagery tasks classification.
10. Acknowledgments
This publication was created thanks to the support of the Ministry of Education, Science, Research and Sport of the
Slovak Republic in the framework of the call for subsidy for the development project No. 002STU-2-1/2018 with the
title „ STU as the Leader of the Digital Coalition“.
11. References
[1] Toderean Aldea, Roxana & Fira, Monica. (2014). Classification of motor imagery task in Brain computer interface
using linear discriminant analysis. Internal Journal of Avanced Research in Artificial intelligence.
[2] Malihe S., Reza B., Separation of P300 event-related potential using time varying time-lag blind source separation
algorithm. Computer Methods and Programs in Biomedicine 145 (2017) pages 95-102.
[3] Emotiv Epoc Specification, (acessed 1.6.2019 https://www.emotiv.com/product/emotiv-epoc-14-channel-
mobile-eeg/#tab-description)
[4] Raju, Srujan & Murty, M. (2018). Support Vector Machine with K-fold Cross validation model for software fault
prediction. International journal of Pure and Applied Mathematics. 118. 321-334.
28
Combining Sentiment Analysis with Linguistics:
Figurative Speech Detection in Croatian Online Text
Martina Ptiček
Faculty of Organization and Informatics
University of Zagreb
Pavlinska 2, 42000 Varaždin, Croatia
marpticek@foi.hr
29
Impact of Sarcasm on Sentiment Analysis, https://web.stanford.edu/~jurafsky/sl
Proceedings of the Ninth International Conference p3/ed3book.pdf, Accessed: 14th July 2019.
on Language Resources and Evaluation, May,
Reykjavik, Iceland, 2014, pp. 4238–4243 [27] Eugene Charniak: Introduction to deep learning,
The MIT Press, Cambridge, Massachusetts, 2018.
[23] Bing Liu: Sentiment Analysis, Cambridge
University Press, New York, NY, USA, 2015. [28] Thorsten Joachims: Text Categorization with
Suport Vector Machines: Learning with Many
[24] Bo Pang, Lillian Lee: Opinion mining and Relevant Features, Machine Learning: ECML-
sentiment analysis, Foundations and trends in 98. ECML 1998. Lecture Notes in Computer
Information retrival, Hanover, USA, 2008, pp. 1- Science (Lecture Notes in Artificial Intelligence),
135 vol 1398. Springer, Berlin, Heidelberg, pp. 137-
142
[25] Maite Taboada, Julian Brooke, Milan Tafiloski,
Kimberly Voll, Manfred Stede: Lexicon-Based [29] Saif Mohammad, Peter D. Turney:
Methods for Sentiment Analysis, Computational Crowdsourcing the Creation of a Word-
Linguistics, Cambridge, Massachusetts, 2013., pp. Emotion Association Lexicon, Computational
267 - 307 Intelligence, New Jersey, 2013, pp. 436-465
[26] Daniel Jurafsky, James H. Martin: Speech and [30] William L. Hamilton, Kevin Clark, Jure Leskovac,
Language Processing: An Introduction to Dan Jurafsky: Inducing Domain-Specific
Natural Language Processing, Computational Sentiment Lexicons from Unlabeled Corpora,
Linguistics, and Speech Recognition, available Proceedings of the 2016 Conference on Empirical
at Methods in Natural Language Processing, Austin,
Texas, 2016, pp. 595 – 605
30
Sentiment Analysis of Text Documents
Dalibor Bužić
College for Information Technologies
Klaićeva 7, Zagreb, Croatia
dalibor.buzic@vsite.hr
31
Proceedings of the Second International [17] Martins, R. et al.: Predicting Performance
Workshop on Issues of Sentiment Discovery and Problems Through Emotional Analysis (Short
Opinion Mining (p. 2), ACM, 2013. Paper), 7th Symposium on Languages,
Applications and Technologies (SLATE 2018),
[6] Chang, M.W. et al.: Importance of Semantic Schloss Dagstuhl-Leibniz-Zentrum fuer
Representation: Dataless Classification, Informatik, 2018.
Proceedings of the 23rd AAAI conference on
Artificial intelligence, Vol. 2, 2008, pp. 830-835. [18] Maynard, D., Greenwood, M.A.: Who cares
about Sarcastic Tweets? Investigating the
[7] Chapman, L. et al.: Investigating the emotional Impact of Sarcasm on Sentiment Analysis, Lrec,
responses of individuals to urban green space 2014, pp. 4238-4243.
using twitter data: A critical comparison of
three different methods of sentiment analysis, [19] Medhat, W., Hassan, A., Korashy: Sentiment
Urban Planning, 3(1), 2018, pp. 21-33. analysis algorithms and applications: A survey,
Ain Shams Engineering Journal, 5.4, 2014, pp.
[8] Chaturvedi, I. et al.: Distinguishing between 1093-1113.
facts and opinions for sentiment analysis:
Survey and challenges, Information Fusion, 44, [20] Mikolov, T. et al.: Efficient estimation of word
2018, pp. 65-77. representations in vector space, arXiv preprint
arXiv:1301.3781, 2013.
[9] Chen, X. et al.: Dataless text classification with
descriptive LDA, Proceedings of the 29th AAAI [21] Mohammad, S. M.: Sentiment analysis:
conference on Artificial intelligence, 2015, pp. Detecting valence, emotions, and other
2224-2231. affectual states from text, Emotion
measurement, 2016, pp. 201-237.
[10] Choo, E., Yu, T., Chi, M.: Detecting opinion
spammer groups and spam targets through [22] Mohammad, S. M., Kiritchenko, S.: Using
community discovery and sentiment analysis, nuances of emotion to identify personality,
Journal of Computer Security, 25.3, 2017, pp. 283- Proceedings of ICWSM, 2013, pp. 27-30.
318.
[23] Paltoglou, G., Thelwall, M.: More than bag-of-
[11] Esuli, A., Sebastiani, F.: SENTIWORDNET: A words: Sentence-based document
Publicly Available Lexical Resource for representation for sentiment analysis,
Opinion Mining, 5th Conference on Language Proceedings of the International Conference
Resources and Evaluation, 2006, pp. 417-422. Recent Advances in Natural Language Processing
RANLP 2013, 2013, pp. 546-552.
[12] Goldberg, Y.: A primer on neural network
models for natural language processing, Journal [24] Pang, B., Lee, L.: Opinion mining and sentiment
of Artificial Intelligence Research, 57, 2016, pp. analysis, Foundations and Trends® in
345-420. Information Retrieval, 2(1–2), 2008, pp. 1-135.
[13] Jindal, N., Liu, B.: Opinion spam and analysis, [25] Pennington, J., Socher, R., Manning, C.: Glove:
Proceedings of the 2008 international conference Global vectors for word representation,
on web search and data mining, ACM, 2008, pp. Proceedings of the 2014 conference on empirical
219-230. methods in natural language processing
(EMNLP), 2014, pp. 1532-1543.
[14] Liu, B.: Sentiment Analysis and Subjectivity,
Handbook of natural language processing, 2, [26] Plaza-del-Arco, F. M. et al.: Lexicon Adaptation
2010, pp. 627-666. for Spanish Emotion Mining, Procesamiento del
Lenguaje Natural, 61, 2018, pp. 117-124.
[15] Liu, B.: Sentiment analysis: Mining opinions,
sentiments, and emotions, Cambridge University [27] Ravi, K., Ravi, V.: A survey on opinion mining
Press, New York, 2015. and sentiment analysis: tasks, approaches and
applications, Knowledge-Based Systems, 89,
[16] Madhoushi, Z., Hamdan, A.R., Zainudin, S.: 2015, pp. 14-46.
Sentiment analysis techniques in recent works,
Science and Information Conference (SAI), IEEE, [28] Singh, T., Kumari, M.: Role of text pre-
2015. processing in twitter sentiment analysis,
32
Procedia Computer Science, 89, 2016, pp. 549- [32] Xu, C. et al.: Visual sentiment prediction with
554. deep convolutional neural networks, arXiv
preprint, arXiv:1411.5731, 2014.
[29] Smailović, J. et al.: Predictive sentiment analysis
of tweets: A stock market application, Human- [33] Zhang, L., Wang, S., Liu, B.: Deep learning for
computer interaction and knowledge discovery in sentiment analysis: A survey, Wiley
complex, unstructured, Big Data, Springer, Berlin, Interdisciplinary Reviews: Data Mining and
Heidelberg, 2013, pp. 77-88. Knowledge Discovery, 8(4), e1253, 2018.
[30] Song, Y., Roth, D.: On Dataless Hierarchical Text [34] Zhang, Y. et al.: iDoctor: Personalized and
Classification, Proceedings of the 28th AAAI professionalized medical recommendations
conference on Artificial intelligence, Vol. 7, 2014, based on hybrid matrix factorization, Future
pp. 1579-1585. Generation Computer Systems, 66, 2017, pp. 30-
35.
[31] Vadicamo, L. et al.: Cross-Media Learning for
Image Sentiment Analysis in the Wild, ICCV
Workshops, 2017, pp. 308-317.
33
Evaluation of the Voice to Text Transfer in
Augmented Conditions
References
[1] Windmann, S., & Haeb-Umbach, R. (2009).
Approaches to Iterative Speech Feature
Enhancement and Recognition, IEEE
Transactions On Audio, Speech, And Language
Processing, Vol. 17, No. 5.
34
Methodological framework for efficient prediction of
carbon dioxide emissions in building sector by
intelligent data analytics as fundamental module of
an integrated energy management information
system
Saša Mitrović
PhD student at Faculty of Organization and Informatics
University of Zagreb
Pavlinska 2, 42000 Varazdin, Croatia
smitrovic@foi.hr
1. Introduction
The importance of increasing energy efficiency in building sector was emphasized by the European Council
in Decisions: 2010/31/EU and 2012/27/EU, which stated that buildings account for 40% of total energy
consumption in the European Union, and that the building sector is expanding, which will increase energy
consumption in the future. Thus, due to the need to increase energy efficiency and reduce greenhouse gas
emissions, European Union has, through the aforementioned decisions, set a target of 20% reduction in energy
consumption by 2020. [1, 2] In December 2018, the revised Energy Efficiency Decision 2018/2002 enters into
force, which sets a new EU energy efficiency target - to reduce energy consumption by at least 32.5% by 2030.
[3]. In addition to the aforementioned decisions, Decision 406/2009/EC established binding targets for State
Members to reduce carbon dioxide (hereinafter referred to as: CO2) by year 2020 by 20% and by year 2030 by
40%. Energy efficiency in the building sector is crucial to meeting the binding targets, and in order to achieve
efficiency it is necessary to reduce the energy consumption of buildings in the total energy consumption of all
sectors [4].
Tommerup, et al. [5] states that the building sector with 40% of total energy consumption compared to the
sectors of industry and transport is the largest single energy consumer in the European Union [5], while the building
sector in Croatia accounts for 30% of total energy consumption [6]. Aforementioned percentages are an indicator
that energy efficiency in buildings should also be establish in Croatia in order to reduce CO2 emissions. Croatia,
in order to ensure energy efficiency, followed guidelines of the European Union decisions and passed the Energy
Efficiency Act in the Croatian Parliament [7]. In addition, representatives of all institutions are invited to apply
the ISO 50001 standard, which sets out the requirements for establishing an energy management system in the
building sector [8].
The energy management information system in the building sector should ensure energy efficiency to reduce
CO2 emissions. Such an information system should predict CO2 emissions in the future based on past data.
Machine learning methods and models or mathematical methods and models can be used for such forecast. Authors
Wang and Tao [9] indicate the following conclusions „The two fundamental problems in machine learning (ML)
are statistical analysis and algorithm design. The former tells us the principles of the mathematical models that we
establish from the observation data. The latter defines the conditions on which implementation of data models and
data sets rely.“[9] According to the author's Wang and Tao [9] it can be concluded that mathematical models only
describe observed data without the ability to learn on past data, whereas machine learning models provide the
ability to learn from observed data [9] so the author of this paper presume that it is better to apply machine learning
models over only mathematical models, hence, only machine learning will be presented down from point of paper.
Burkov [10] defined machine learning as „the process of solving a practical problem by 1) gathering a dataset, and
2) algorithmically building a statistical model based on that dataset“[10]. One of the essential methods of machine
learning according to Jain [11] is cluster analysis, which is defined as „formal study of methods and algorithms
for grouping, or clustering, objects according to measured or perceived intrinsic characteristics or similarity“[11]
and for which he emphasized the following advantage: „Organizing data into sensible groupings is one of the most
fundamental modes of understanding and learning“[11]. For author's Jordan and Mitchell [12] machine learning
„addresses the question of how to build computers that improve automatically through experience.“[12] Jordan
and Mitchell [12] for the limitations and challenges of machine learning stated the following: „most machine
35
learning algorithms are targeted to learn one specific function or data model from one single data source, humans
clearly learn many different skills and types of knowledge, from years of diverse training experience, supervised
and unsupervised, in a simple-to-more-difficult sequence (e.g., learning to crawl, then walk, then run). “[12]
Authors Jordan and Mitchell [12] identified in their research paper of machine learning methods that lately
supervised learning machine learning methods have been used mostly with application in spam detection, facial
recognition of images and in diagnostic systems in medicine where they have achieved higher rates of accurate
prediction with respect to other machine learning methods [12]. Supervised learning, defined by Shobha and
Rangaswamy [13], is „a learning model built to make prediction, given an unforeseen input instance. A supervised
learning algorithm takes a known set of input dataset and its known responses to the data (output) to learn the
regression/classification model. A learning algorithm then trains a model to generate a prediction for the response
to new data or the test dataset.“[13] Shobha and Rangaswamy [13] stated that „Classification task predicts discrete
responses. It is recommended if the data can be categorized, tagged, or separated into specific groups or
classes.“[13] According to Talabis, et al. [14] supervised learning methods are „focused on the prediction of
qualitative responses by analysing the input dataset and identifying patterns.“ [14] McCue [15] stated that the aim
of supervised learning methods are to „develop a set of decision rules used to determine outcomes.“[15] Due to
the explanations and reasons stated by author's Jain [11], Jordan and Mitchell [12], Shobha and Rangaswamy [13],
Talabis, et al. [14] and McCue [15], author of this research paper presume that it is worthy to use machine learning
methods, in particular clustering and supervised learning methods, to create a methodological framework for
reliable prediction of CO2 emissions in building sector. According to the aforementioned authors, clustering
parameters needs to be well prepared in advance, also the number of clusters should be determined in advance,
which is a disadvantage of this method, but when the data is well prepared for processing and a good number of
clusters are identified, the clustering algorithm produces valuable results. For the supervised learning methods,
aforementioned authors stated that the models should be well adjusted before training on the data and that larger
amounts of training data are needed, which is a disadvantage, but not in the data of this paper as it covers a 10-
year period, while supervised learning methods are good at creating rules and nonlinear decision boundaries if the
models are well adjusted.[11-15]
Thus, the aim of this research paper is to develop a methodological framework using intelligent data analytics
with a cluster procedure and an optimal architecture of machine, supervised, learning methods that can process
large amounts of data to predict CO2 emissions in buildings on an annual basis in Croatia as an integral part of the
information system for energy management with the aim of reducing CO2 emissions and meeting the binding
targets of the Republic of Croatia as a State Member of the European Union for the reduction of CO2 emissions.
According to the Dresner Advisory Services [16] study from 2019 data analytics, machine learning and other
advanced algorithms are ranked as the eighth priority among the 37 technologies used by companies to develop
and achieve business plans and goals [16]. Given that the eighth place of priorities for the development of artificial
intelligence and machine learning models in companies shows, according to the aforementioned research, the
importance of using data analytics in achieving business plans, therefore, the use of artificial intelligence and
machine learning models in developing a methodological framework for predicting CO2 emissions should be
amidst the top priorities among the various CO2 emission monitoring technologies.
Numerous studies have been carried out to predict CO2 emissions and energy consumption using different
machine learning methods and algorithms. Hong, et al. [17] developed a model for predicting national CO2
emissions in buildings for 2030 using evolutionary algorithms: gene expression programming - harmony search
algorithm and the developed model had mean absolute percentage error (hereinafter referred to as: MAPE) 2.06%
[17]. Sun and Liu [18] used a support-vector machines method to predict CO2 emissions which resulted in a high
rate of accurate prediction - 0.160% (residential buildings) and 0.328% (three major industries and residential
buildings) MAPE [18]. Kankal, et al. [19] have proposed artificial neural networks to predict energy consumption
in the Turkish building sector [19]. Jeong, et al. [20] used data mining methods (correlation analysis, decision
trees, Analysis of variance (ANOVA)) and Monte Carlo simulations to predict energy use and CO2 emissions to
build energy efficient model of residential buildings. Kontokosta and Tull [21], Melo, et al. [22], Son, et al. [23],
Farzana, et al. [24] and Chou and Bui [25] also, among various methods, used machine learning methods: artificial
neural networks, support-vector machines, support-vector regression to predict energy consumption in residential,
commercial and other public sector owned buildings [21-25]. Naji, et al. [26] in Naji, et al. [27] used support-
vector regression method and adaptive network-based fuzzy inference system (ANFIS) to predict the energy
consumption of buildings made in the Energy Plus building energy simulation program [26, 27]. Wang and Ding
[28] used the Markov Monte Carlo Chain (MCMC) and polynomial simulation models to predict the consumption
of office equipment in office buildings [28]. Author's Sun, et al. [29], Liang, et al. [30], Chung and Park [31],
Mangold, et al. [32] and Williams and Gomez [33] used only statistical methods to predict energy consumption
and energy efficiency in buildings: linear regression, probability density function (PDF) and similar other methods.
[29-33] Zekić-Sušac, et al. [34] and Tonković, et al. [35] used four decision tree methods: classification tree
(CART), conditional inference trees (CTREE), random forest (RF) and gradient boosted trees (GBT) in predicting
electricity and natural gas in Croatia 's public building sector. Tonković, et al. [35] in addition to using machine
36
learning methods, have proposed an information system module for efficient natural gas management as a tool to
assist decision makers in the Republic of Croatia in reducing natural gas consumption. [34, 35] Aside from machine
learning methods, author's Mitrović and Zekić-Sušac [36] made an overview of the algorithms within machine
learning methods used to reduce error where machine learning algorithms that integrated clustering algorithm were
found to perform better [36]. Research papers from author’s Kontokosta [37], Papadopoulos, et al. [38] and Zekić-
Sušac, et al. [39] used a clustering method combined with other machine learning methods, which is also the aim
of this research paper: to determine the optimal cluster procedure with the optimal architecture of the investigated
machine learning methods with the least error to obtain models with high rate of accurate CO2 emissions prediction
on an annual basis that should make possible to achieve greater energy efficiency in the public building sector and
reduction of national CO2 emissions.
Following on from the above authors and their contributions using the methods of intelligent data analytics in
the efficient management of energy and CO2 emissions in buildings, this research paper pursues to test the
fundamental hypothesis and ancillary hypotheses:
1. Automated machine learning methods with minimal or no human intelligence can support decision-
making through the information system to efficiently manage carbon dioxide emissions for public
building managers.
a. It is possible to develop machine learning models to predict carbon dioxide emissions in
buildings that exclude or reduce human activity in the decision-making process of energy
efficiency management in buildings,
b. It is possible to incorporate Big Data technology and machine learning methods as part of an
information system for efficient energy management in buildings.
The aim of this research is to analyse collected data and to propose solutions by testing hypotheses in a way
by examining whether automated machine learning methods with minimal or no influence of human intelligence
through the information system can support decision making for efficient management of carbon dioxide emissions
for public building managers.
The scientific and social argument for further researching the topic of this paper is verified by authors Kim,
et al. [40], Wang, et al. [41], Zuraimi, et al. [42] and D'Amico, et al. [43] who stated that their research had some
limitations because they were making predictions in small and continuous spaces, so it „need to be validated under
various building types, room arrangements, and occupants compositions to achieve a generic acceptance“[41] and
that a research should have „large and reliable dataset of real and accurate designs of building structures“[43]. [40-
43] In large and reliable dataset, author of this paper sees progress given that in this research there is large dataset
with different types of buildings and different room layouts. Authors Hong, et al. [17] singled out as a limitation
of their research failure in „presenting a regionally unified calculation model for forecasting CO2 emissions by
region“ [17], while the author of this paper finds it challenging to prove through methodological framework how
it is possible to develop a unified calculation model for predicting CO2 emissions by region that excludes or
reduces human action in the decision-making process. Authors Singh and Rao [44] propose for further
development of their models to endeavour their applicability in a network and cloud environment.[44]
Contributing to previous research, author of this research paper considers a necessity to integrate machine learning
models for forecasting into the information system where the information system in cloud environment in its
business logic would efficiently manage CO2 emissions from collected data and process to the interpretation of
forecasted results. Finally the authors Kim, et al. [45] suggest that researchers in the future should consider „the
four objective functions of thermal comfort, energy consumption, and economic and environmental effect at the
same time“[45]. To simultaneously consider the four objective functions mentioned above is a challenging
problem, therefore, the author of this paper wants to develop an improved machine learning model that would
allow reliable prediction of CO2 emissions based on aforementioned objective functions.
2. Research Methods
The following scientific methods will be used to carry out the research in order to achieve the its objectives:
analysis method, synthesis method, abstraction method, generalization method, analogy method, historical
method, experimental method, descriptive and genetic method, statistical methods and others. The results of testing
the hypotheses in previous chapter will be a synthesis of the tested fundamental and ancillary hypotheses and the
development of experiment as a method.
37
gas and water) and meteorological data (temperature, pressure and wind) as input variables and CO2 emissions as
output variable, to determine the optimal cluster procedure and building groups. On, by common characteristics,
grouped buildings to develop models of optimal architecture of methods and algorithms, which in previous studies
had low MAPE - regardless of CO2 emission or energy consumption prediction [9-31] and experiment with other
methods and algorithms, such as enhanced convolutional neural networks over a ten-year time span.
4. Conclusion
Based on the results of the research, a scientific contribution is anticipated in the form of a methodological
framework for predicting CO2 emissions in building sector on an annual basis integrated into an information
system that by using methods and algorithms for machine learning in business logic, determines efficient
management of CO2 emissions based on the characteristics of buildings, their energy consumption and
meteorological data. The methodological framework itself should give the concept of CO2 emission prediction,
but it should also determine the optimal architecture of the machine learning method and define the machine
learning model and algorithm that will deliver the finest results. The research will be conducted on Croatia's
building sector data, but its results, as well as the results of research by various authors, are generally of worldwide
practicability, since from a problematic and practical point of view they should, in the near future, help achieve
binding targets for CO2 reduction in the world. Attributable to the foregoing, the methodological framework for
predicting CO2 emissions in building sector should be an integral part of a complete energy management
information system architecture consisting of the following modules: (1) data collection, (2) data irregularity
search, (3) intelligent data analytics and (4) interpretation and visualization of results.
5. References
[1] E. P. a. t. Council, "Directive 2010/31/EU of the European Parliament and of the Council of 19 May 2010 on
the energy performance of buildings," OJ L 153, 18.6.2010, p. 13–35 (BG, ES, CS, DA, DE, ET, EL, EN, FR,
IT, LV, LT, HU, MT, NL, PL, PT, RO, SK, SL, FI, SV) Special edition in Croatian: Chapter 12 Volume 003
P. 124 - 146, 2010.
[2] E. P. a. t. Council, "Directive 2012/27/EU of the European Parliament and of the Council of 25 October 2012
on energy efficiency, amending Directives 2009/125/EC and 2010/30/EU and repealing Directives 2004/8/EC
and 2006/32/EC Text with EEA relevance," OJ L 315, 14.11.2012, p. 1–56 (BG, ES, CS, DA, DE, ET, EL,
EN, FR, IT, LV, LT, HU, MT, NL, PL, PT, RO, SK, SL, FI, SV) Special edition in Croatian: Chapter 12
Volume 004 P. 202 - 257, 2012.
[3] E. P. a. t. Council, "Directive (EU) 2018/2002 of the European Parliament and of the Council of 11 December
2018 amending Directive 2012/27/EU on energy efficiency (Text with EEA relevance.)," PE/54/2018/REV/1
OJ L 328, 21.12.2018, p. 210–230 (BG, ES, CS, DA, DE, ET, EL, EN, FR, GA, HR, IT, LV, LT, HU, MT, NL,
PL, PT, RO, SK, SL, FI, SV), 2018.
[4] E. P. a. t. Council, "Decision No 406/2009/EC of the European Parliament and of the Council of 23 April
2009 on the effort of Member States to reduce their greenhouse gas emissions to meet the Community’s
greenhouse gas emission reduction commitments up to 2020," OJ L 140, 5.6.2009, p. 136–148 (BG, ES, CS,
DA, DE, ET, EL, EN, FR, IT, LV, LT, HU, MT, NL, PL, PT, RO, SK, SL, FI, SV) Special edition in Croatian:
Chapter 15 Volume 017 P. 126 - 138, 2009.
[5] H. Tommerup, J. Rose, and S. Svendsen, "Energy-efficient houses built according to the energy performance
requirements introduced in Denmark in 2006," (in English), Energy and Buildings, Article vol. 39, no. 10,
pp. 1123-1130, 2007.
[6] K. Čulo and H. Krstić, "Cost benefit analysis of energy efficient family houses," in Second International
Conference on Harmonisation Between Architecture and Nature, Algarve, Portugal, 2008: Eco-Architecture.
[7] N. novine, "Zakon o energetskoj učinkovitosti," Narodne novine vol. 2399, no. 127/2014 2014.
[8] ISO 50001:2011 – Energy Management System, I. O. f. Standardization, 2011.
[9] J. Wang and Q. Tao, "Machine Learning: The State of the Art," IEEE Intelligent Systems, vol. 23, no. 6, pp.
49-55, 2008.
[10] A. Burkov, The Hundred-Page Machine Learning Book, 1 ed. Kindle Direct Publishing, 2019.
[11] A. K. Jain, "Data clustering: 50 years beyond K-means," (in English), Pattern Recognition Letters, Article
vol. 31, no. 8, pp. 651-666, 2010.
[12] M. I. Jordan and T. M. Mitchell, "Machine learning: Trends, perspectives, and prospects," (in English),
Science, Review vol. 349, no. 6245, pp. 255-260, 2015.
38
[13] G. Shobha and S. Rangaswamy, "Chapter 8 - Machine Learning," in Handbook of Statistics, vol. 38, V. N.
Gudivada and C. R. Rao, Eds.: Elsevier, 2018, pp. 197-228.
[14] M. R. M. Talabis, R. McPherson, I. Miyamoto, J. L. Martin, and D. Kaye, "Chapter 1 - Analytics Defined,"
in Information Security Analytics, M. R. M. Talabis, R. McPherson, I. Miyamoto, J. L. Martin, and D. Kaye,
Eds. Boston: Syngress, 2015, pp. 1-12.
[15] C. McCue, "Chapter 7 - Identification, Characterization, and Modeling," in Data Mining and Predictive
Analysis (Second Edition), C. McCue, Ed. Boston: Butterworth-Heinemann, 2015, pp. 137-155.
[16] L. Dresner Advisory Services, "Data Science and Machine Learning Market Study " Dresner Advisory
Services, LLCAugust 29, 2019 2019, Available: https://gumroad.com/l/dTfno.
[17] T. Hong, K. Jeong, and C. Koo, "An optimized gene expression programming model for forecasting the
national CO2 emissions in 2030 using the metaheuristic algorithms," (in English), Applied Energy, Article
vol. 228, pp. 808-820, Oct 2018.
[18] W. Sun and M. H. Liu, "Prediction and analysis of the three major industries and residential consumption
CO2 emissions based on least squares support vector machine in China," (in English), Journal of Cleaner
Production, Article vol. 122, pp. 144-153, May 2016.
[19] M. Kankal, A. Akpinar, M. I. Komurcu, and T. S. Ozsahin, "Modeling and forecasting of Turkey's energy
consumption using socio-economic and demographic variables," (in English), Applied Energy, Article vol.
88, no. 5, pp. 1927-1939, May 2011.
[20] J. Jeong et al., "Development of a prediction model for the cost saving potentials in implementing the building
energy efficiency rating certification," (in English), Applied Energy, Article vol. 189, pp. 257-270, 2017.
[21] C. E. Kontokosta and C. Tull, "A data-driven predictive model of city-scale energy use in buildings," (in
English), Applied Energy, Article vol. 197, pp. 303-317, 2017.
[22] A. P. Melo, M. Fossati, R. S. Versage, M. J. Sorgato, V. A. Scalco, and R. Lamberts, "Development and
analysis of a metamodel to represent the thermal behavior of naturally ventilated and artificially air-
conditioned residential buildings," (in English), Energy and Buildings, Article vol. 112, pp. 209-221, 2016.
[23] H. Son, C. Kim, C. Kim, and Y. Kang, "Prediction of government-owned building energy consumption based
on an RReliefF and support vector machine model," (in English), Journal of Civil Engineering and
Management, Article vol. 21, no. 6, pp. 748-760, 2015.
[24] S. Farzana, M. Liu, A. Baldwin, and M. U. Hossain, "Multi-model prediction and simulation of residential
building energy in urban areas of Chongqing, South West China," (in English), Energy and Buildings, Article
vol. 81, pp. 161-169, 2014.
[25] J. S. Chou and D. K. Bui, "Modeling heating and cooling loads by artificial intelligence for energy-efficient
building design," (in English), Energy and Buildings, Article vol. 82, pp. 437-446, 2014.
[26] S. Naji, S. Shamshirband, H. Basser, U. J. Alengaram, M. Z. Jumaat, and M. Amirmojahedi, "Soft computing
methodologies for estimation of energy consumption in buildings with different envelope parameters," (in
English), Energy Efficiency, Article vol. 9, no. 2, pp. 435-453, 2016.
[27] S. Naji et al., "Application of adaptive neuro-fuzzy methodology for estimating building energy
consumption," (in English), Renewable and Sustainable Energy Reviews, Review vol. 53, pp. 1520-1528,
2016.
[28] Z. Wang and Y. Ding, "An occupant-based energy consumption prediction model for office equipment," (in
English), Energy and Buildings, Article vol. 109, pp. 12-22, 2015.
[29] S. Sun, K. Kensek, D. Noble, and M. Schiler, "A method of probabilistic risk assessment for energy
performance and cost using building energy simulation," (in English), Energy and Buildings, Article vol. 110,
pp. 1-12, 2016.
[30] X. Liang, T. Hong, and G. Q. Shen, "Improving the accuracy of energy baseline models for commercial
buildings with occupancy data," (in English), Applied Energy, Article vol. 179, pp. 247-260, 2016.
[31] M. Chung and H. C. Park, "Comparison of building energy demand for hotels, hospitals, and offices in
Korea," (in English), Energy, Article vol. 92, pp. 383-393, 2015.
[32] M. Mangold, M. Österbring, and H. Wallbaum, "Handling data uncertainties when using Swedish energy
performance certificate data to describe energy usage in the building stock," (in English), Energy and
Buildings, Article vol. 102, pp. 328-336, 2015, Art. no. 5893.
[33] K. T. Williams and J. D. Gomez, "Predicting future monthly residential energy consumption using building
characteristics and climate data: A statistical learning approach," (in English), Energy and Buildings, Article
vol. 128, pp. 1-11, 2016.
39
[34] M. Zekić-Sušac, A. Has, and S. Mitrović, "Recursive Partitioning in Predicting Energy Consumption of
Public Buildings," in Proceedings of the 29th Central European Conference on Information and Intelligent
Systems, Varaždin, Croatia, 2018, pp. 179-186: Faculty of Organization and Informatics, University of
Zagreb.
[35] Z. Tonković, S. Mitrović, and M. Zekić-Sušac, "Business intelligence system for managing natural gas
consumption of public buildings," in 36th International Scientific Conference on Economic and Social
Development – “Building Resilient Society” – EBS 2018, Zagreb, Croatia, 2018, pp. 769-778.
[36] S. Mitrović and M. Zekić-Sušac, "A systematic literature review of machine learning algorithms in modeling
buildings energy efficiency," in International Conference on Energy, Environment and Economics,,
Edinburgh, United Kingdom, 2017, vol. 5, pp. 191-196., Coventry, United Kingdom: WEENTECH
Proceedings in Energy.
[37] C. E. Kontokosta, "A Market-Specific Methodology for a Commercial Building Energy Performance Index,"
(in English), Journal of Real Estate Finance and Economics, Article vol. 51, no. 2, pp. 288-316, 2015.
[38] S. Papadopoulos, B. Bonczak, and C. E. Kontokosta, "Pattern recognition in building energy performance
over time using energy benchmarking data," (in English), Applied Energy, Article vol. 221, pp. 576-586, Jul
2018.
[39] M. Zekić-Sušac, R. Scitovski, and A. Has, "Cluster analysis and artificial neural networks in predicting energy
efficiency of public buildings as a cost-saving approach," Croatian Review of Economic, Business and Social
Statistics (CREBSS), vol. 4, no. 2, pp. 57-66, 2018.
[40] S. Kim, Y. Song, Y. Sung, and D. Seo, "Development of a Consecutive Occupancy Estimation Framework
for Improving the Energy Demand Prediction Performance of Building Energy Modeling Tools," (in English),
Energies, Article vol. 12, no. 3, p. 21, Feb 2019, Art. no. 433.
[41] W. Wang, J. Y. Chen, T. Z. Hong, and N. Zhu, "Occupancy prediction through Markov based feedback
recurrent neural network (M-FRNN) algorithm with WiFi probe technology," (in English), Building and
Environment, Article vol. 138, pp. 160-170, Jun 2018.
[42] M. S. Zuraimi, A. Pantazaras, K. A. Chaturvedi, J. J. Yang, K. W. Tham, and S. E. Lee, "Predicting occupancy
counts using physical and statistical Co2-based modeling methodologies," (in English), Building and
Environment, Article vol. 123, pp. 517-528, 2017.
[43] B. D'Amico et al., "Machine Learning for Sustainable Structures: A Call for Data," (in English), Structures,
Article vol. 19, pp. 1-4, Jun 2019.
[44] N. Singh and S. Rao, "Ensemble Learning for Large-Scale Workload Prediction," IEEE Transactions on
Emerging Topics in Computing, vol. 2, no. 2, pp. 149-165, 2014.
[45] J. Kim, T. Hong, J. Jeong, C. Koo, and K. Jeong, "An optimization model for selecting the optimal green
systems by considering the thermal comfort and energy consumption," (in English), Applied Energy, Article
vol. 169, pp. 682-695, May 2016.
40
ISBN 978-953-6071-67-8