Proceedings of the 9th Balkan Conference on Informatics最新文献

筛选
英文 中文
Security Improvement in a Modified Merkle-tree: Computation and Storage Comparison Between Different Cloud Providers 改进的默克尔树的安全性改进:不同云提供商之间的计算和存储比较
Proceedings of the 9th Balkan Conference on Informatics Pub Date : 2019-09-26 DOI: 10.1145/3351556.3351569
I. Chenchev
{"title":"Security Improvement in a Modified Merkle-tree: Computation and Storage Comparison Between Different Cloud Providers","authors":"I. Chenchev","doi":"10.1145/3351556.3351569","DOIUrl":"https://doi.org/10.1145/3351556.3351569","url":null,"abstract":"Two of the very well-known hash algorithms from SHA2 (SHA-2) family include SHA-256 and SHA-512. Nowadays, there exists another hash algorithms family -- SHA3(SHA-3), which includes SHA3-256 and SHA3-512 algorithms, also known as Keccak algorithms. This paper provides a comparison of the empirical performance calculations with these 4 algorithms with different input volumes of sequential data (where every next slice of information is dependent of previous one) to make it impossible for parallel computation. For the purpose of calculations, 4 totally different environments are used but with exact number of CPUs and approximately similar amount of memory (using only standard instances types) -- one personal computer from one side and 3 of the biggest public cloud providers from another -- Amazon AWS (t2.medium), Microsoft Azure (Standard D2s v3) and Google Cloud (n1-standard-2). The purpose of the research is to compare these environments in terms of additional compute calculations and additional storage space (volumes and prices) for the presented new security improvement of the Merkle-root calculation. The Merkle-root is an integral part of the blockchain and therefore, security improvement of this component is a security improvement of the whole blockchain structure.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126953873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Emerging and secured mobile ad-hoc wireless network (MANET) for swarm applications 新兴的、安全的移动自组织无线网络(MANET)用于群应用
Proceedings of the 9th Balkan Conference on Informatics Pub Date : 2019-09-26 DOI: 10.1145/3351556.3351557
A. Anguelov, R. Trifonov, Ognian Nakov
{"title":"Emerging and secured mobile ad-hoc wireless network (MANET) for swarm applications","authors":"A. Anguelov, R. Trifonov, Ognian Nakov","doi":"10.1145/3351556.3351557","DOIUrl":"https://doi.org/10.1145/3351556.3351557","url":null,"abstract":"At present, the technique of coordinating a team of robots in a manner that is responsive to communication failures, presents itself as an actual challenge. In swarm scenarios where the concept for the teams of robots requires performing cooperative tasks, robots need to be enforced to communicate with each other in the background while executing specific collaborative missions. In order to achieve complex tasks in real-time beyond their individual capability, multi-robot systems (MRS) require a stable, sustained and secure stream of data exchange. Typically, this technique also requires an approach of communication and synchronization among the robots known as swarm R2R (robot to robot) communication in real time [1]. This paper presents a theoretical concept for a wireless mesh robot network that can be protected against electromagnetic interference (EMI), electromagnetic jamming, RF denial-of-service (DoS) attacks, and eavesdropping. The team behind this paper aims to present and propose a conceptual model for a hybrid short-range modular wireless transceiver (HSMWT) used in a distributed network environment. Specific issues on designing HSMWT based on the light and sound mediums for this environment will be explored.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Software technologies skills: A graph-based study to capture their associations and dynamics 软件技术技能:基于图形的研究,以捕获它们的关联和动态
Proceedings of the 9th Balkan Conference on Informatics Pub Date : 2019-09-26 DOI: 10.1145/3351556.3351565
Konstantinos Georgiou, M. Papoutsoglou, A. Vakali, L. Angelis
{"title":"Software technologies skills: A graph-based study to capture their associations and dynamics","authors":"Konstantinos Georgiou, M. Papoutsoglou, A. Vakali, L. Angelis","doi":"10.1145/3351556.3351565","DOIUrl":"https://doi.org/10.1145/3351556.3351565","url":null,"abstract":"Software design and development technologies evolve very fast and in unpredicted rates, posing many challenges for programmers who strive to use them properly and to be up-to-date, especially since software development demands teamwork and collaboration. As a result, Question and Answer (Q&A) sites, like Stack Overflow, have seen large growth. The questions are characterized by tags, which support developers to easily trace their topic of interest. Very often, these tags refer to technologies that are connected or serve the same purpose. This work is motivated by the fact that despite the volume of questions and technologies change over time, tags inter-connections carry insightful information since they can be utilized to monitor the technology trends and their dynamics given technologies fast simultaneous evolution over time. This work recognizes the value of such connections, to reveal associations of technologies and to support the scientific community, which can be highly inspired by this study, using advanced data analysis tools. Benefits of the present study include early notification of the labor market needs, competency discovery and directions for educational planning. In the present study, graph theory principles and tools were employed to profile chronologically the evolution and the associations of technologies related to tags, and the experimentation carried out has involved the entire set of Stack Overflow questions posted during a decade, between 2008 and 2018. Very interesting conclusions are summarized based on the tags related to Computer Science Technologies (Hard Skills) analysis, revealing non-evident software technologies skills, associations and dynamics.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129327037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proportionate (m,k)-firm Scheduling for Multiprocessor Systems 多处理器系统的比例(m,k)稳定调度
Proceedings of the 9th Balkan Conference on Informatics Pub Date : 2019-09-26 DOI: 10.1145/3351556.3351579
Ivaylo Atanassov
{"title":"Proportionate (m,k)-firm Scheduling for Multiprocessor Systems","authors":"Ivaylo Atanassov","doi":"10.1145/3351556.3351579","DOIUrl":"https://doi.org/10.1145/3351556.3351579","url":null,"abstract":"This paper introduces a multiprocessor scheduling algorithm for (m,k)-firm tasks. Firm task sets allow limited deadline misses and therefore the load factor of the task set can be greater than one. Many algorithms exist but most of them concern uniprocessor scheduling. The current paper blends the classical Distance Based Priority (DBP) scheduling algorithm and multiprocessor PFair into pfair-based multiprocessor (m,k)-firm scheduling algorithm.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127768950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arduino and Numerical Mathematics Arduino与数值数学
Proceedings of the 9th Balkan Conference on Informatics Pub Date : 2019-09-26 DOI: 10.1145/3351556.3351590
D. Herceg, D. Herceg
{"title":"Arduino and Numerical Mathematics","authors":"D. Herceg, D. Herceg","doi":"10.1145/3351556.3351590","DOIUrl":"https://doi.org/10.1145/3351556.3351590","url":null,"abstract":"Connecting theory and practice in teaching is sometimes difficult as it requires expensive or delicate equipment, thus limiting the teacher to giving demonstrations in which students are passive participants. Numerical mathematics, as an applied discipline, should be taught on real world examples. By using inexpensive Arduino hardware, we can create simple experiments that are easily reproduced by students. Furthermore, the experiments generate tangible data which can be processed numerically. We present several exercises in numerical mathematics which are based on experiments in electrical engineering with Arduino, and show how to turn them into motivational examples.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127803135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Experimental Comparative Performance Study of Demosaicing Algorithms on General-purpose GPUs 通用gpu上去马赛克算法性能的实验比较研究
Proceedings of the 9th Balkan Conference on Informatics Pub Date : 2019-09-26 DOI: 10.1145/3351556.3351561
G. Zapryanov, I. Nikolova
{"title":"An Experimental Comparative Performance Study of Demosaicing Algorithms on General-purpose GPUs","authors":"G. Zapryanov, I. Nikolova","doi":"10.1145/3351556.3351561","DOIUrl":"https://doi.org/10.1145/3351556.3351561","url":null,"abstract":"The image registration by digital still cameras and video cameras requires color filters to be posed onto the photosensitive sensors (CCD or CMOS). The filters are arranged in patterns across the face of the image sensing array. The conventional color filter array (CFA) capture only one color component at each image pixel. The missing colors in the raw sensor data are interpolated by a process called CFA interpolation or demosaicing. Quality of the full-color reconstruction process is mostly relied on demosaicing method applied. Most of the current demosaicing methods are computationally expensive and often too slow for real-time scenarios. Many industrial applications require real-time and high quality demosaicing solutions, and quite often slow image reconstruction process is a real bottleneck. The purpose of this research is to present a comparative performance study of demosaicing algorithms on general-purpose GPUs. The experimental results of CUDA-based implementations of two state-of-the-art and widely applied in practice CFA algorithms are presented. The performance efficiency is assessed and analyzed by experimental studies on a set of real photographic test images on two general-purpose graphic cards. The obtained results demonstrated the benefit of exploiting the contemporary GPUs in speeding up the demosaicing process, especially for practical applications that need to meet real-time and high-speed video processing requirements combined with high quality of the full-color image reconstruction.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131802425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying a quantum amplification over a system for image feature matching and image recommendation 应用量子放大系统进行图像特征匹配和图像推荐
Proceedings of the 9th Balkan Conference on Informatics Pub Date : 2019-09-26 DOI: 10.1145/3351556.3351564
D. Andreev, M. Lazarova
{"title":"Applying a quantum amplification over a system for image feature matching and image recommendation","authors":"D. Andreev, M. Lazarova","doi":"10.1145/3351556.3351564","DOIUrl":"https://doi.org/10.1145/3351556.3351564","url":null,"abstract":"A novel approach for improving the performance of a image feature matching and recommendation system is proposed that is a major continuation of the previous work in [3]. An advanced clustering method is suggested in order to deal with the binary image feature descriptors: a quantum variant of the k-majority algorithm over ORB descriptors. Jaccard-Needham dissimilarity measure is used as a distance measure step of the algorithm. Finally, the Grover's algorithm is used, providing the opportunity for a specific feature search in the database. The paper also provides the main steps in constructing a similar fast search system. The transformation from a classical to a quantum representation algorithm is described. Such approach can be applied in other applications. Both the computational complexity and the verification correctness are also indicated in the paper.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128394637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning in Brain Computer Interfaces 脑机接口中的深度学习
Proceedings of the 9th Balkan Conference on Informatics Pub Date : 2019-09-26 DOI: 10.1145/3351556.3351594
P. Georgieva
{"title":"Deep Learning in Brain Computer Interfaces","authors":"P. Georgieva","doi":"10.1145/3351556.3351594","DOIUrl":"https://doi.org/10.1145/3351556.3351594","url":null,"abstract":"","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129618939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proceedings of the 9th Balkan Conference on Informatics 第九届巴尔干信息学会议论文集
Proceedings of the 9th Balkan Conference on Informatics Pub Date : 2013-09-19 DOI: 10.1145/3351556
K. Diamantaras, Georgios Evangelidis, Y. Manolopoulos, C. Georgiadis, P. Kefalas, D. Stamatis
{"title":"Proceedings of the 9th Balkan Conference on Informatics","authors":"K. Diamantaras, Georgios Evangelidis, Y. Manolopoulos, C. Georgiadis, P. Kefalas, D. Stamatis","doi":"10.1145/3351556","DOIUrl":"https://doi.org/10.1145/3351556","url":null,"abstract":"This volume contains papers presented at the 6th Balkan Conference in Informatics (BCI'13), which was held during September 19--21, 2013, in Thessaloniki, Greece. \u0000 \u0000BCI'13 continued the tradition of the successful BCI series of conferences previously held in Thessaloniki (2003), Ohrid (2005), Sofia (2007), Thessaloniki (2009) and Novi Sad (2012). \u0000 \u0000The main objective of the BCI series of conferences is to provide a forum for dissemination of research accomplishments and to promote interaction, discussions and collaboration among scientists from South-East European countries and the rest of the world. Special emphasis is given to encourage involvement of young researchers from the region to present their work, as well as experts in the field to present current developments in South-East Europe, in the areas of Governance, Education and ICT Professional Issues & Priorities.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123474968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信