{"title":"Intelligent Planting","authors":"I. Ivanov, V. Tsvetkov","doi":"10.1145/3134302.3134328","DOIUrl":"https://doi.org/10.1145/3134302.3134328","url":null,"abstract":"Intelligent planting is a product which aims at facilitating the work of the people in the field of agriculture. The system provides monitoring and control of specific conditions surrounding gardens, greenhouses, etc. The devices planted in the cultivated area have three built-in sensors which monitor air temperature, soil humidity, and light intensity. The irrigation system connected to the hardware installation can be controlled both automatically and manually. If the automatic mode is on, the user does not need to manually track the soil's humidity. When the humidity is lower than the values requested, the watering pump turns on. It turns off when the sensors detect that the needed humidity has been reached.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124905101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Affective Distant Learning Model Using Avatars as User Stand-in","authors":"L. Rothkrantz","doi":"10.1145/3134302.3134314","DOIUrl":"https://doi.org/10.1145/3134302.3134314","url":null,"abstract":"Emotions play an important role in distant learning. Negative emotions are one of the main reasons of high drop-off. Real time assessment of the emotional state of the learner is complex and that complicates real time adaptation of the learning context to boost the motivation of learners. In this paper we introduce the use of avatars with facial expressions corresponding with the emotional state of the learner. Facial expressions of learners are recorded and analysed. This enables the use of personalised Avatars and emotional facial expression. The system and results of experiments are described in this paper.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116142972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text Mining Based Adaptive Case Management Automation in the Field of Forensic Medicine","authors":"Borislav Banchev","doi":"10.1145/3134302.3134344","DOIUrl":"https://doi.org/10.1145/3134302.3134344","url":null,"abstract":"In the paper is introduced an algorithm for automated processing of documents, managed in forensic medicine offices. The algorithm is based on series of steps that are executed in a sequence in which many aspects are controlled by the information extracted from the document itself. The resulted software solution is based on adaptive case management. Using text mining techniques and meta modelling, the incoming information is transformed into knowledge that is injected into the adaptive business processes. The proposed mechanism would reduce the total turnaround time, the needed manual work at each step and the confusion for the end user.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121664145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet-of-Things Communication Protocol for Low-Cost Devices in Heterogeneous Wireless Networks","authors":"S. Ilchev, Z. Ilcheva","doi":"10.1145/3134302.3134329","DOIUrl":"https://doi.org/10.1145/3134302.3134329","url":null,"abstract":"In this paper, we present a new communication protocol for low-cost Internet-of-Things (IoT) devices that need to gather and transmit sensor data and receive remote commands. Taking into account that an IoT-network may employ different communication technologies, we define several important protocol features such as data encryption, integrity checking, sender authentication and data retransmission in case of packet delivery failures. We describe our approach to implementing each of the protocol features as part of our HybridNET system for industrial device control and communication. The hardware base includes cheap 32-bit microcontrollers, radio connectivity (SX1276 and others) and wired connectivity (mainly RS485 and Ethernet). We also describe the protocol packet structure in detail as well as our implementation for routing packets in larger IoT-networks. The experimental results are very promising and show that our protocol performs very well and delivers very good performance and reliability.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130028525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant Colony Optimization Algorithm for Traffic Flow Estimation","authors":"M. Karova, N. Vasilev, I. Penev","doi":"10.1145/3134302.3134317","DOIUrl":"https://doi.org/10.1145/3134302.3134317","url":null,"abstract":"The paper presents a study of the effectiveness of the multithreading implementation of an ant colony optimization algorithm for solving the traffic flow estimation problem. A model of the problem, using graph of the city map, and mathematical formulation of the algorithm, using simulated ants, are described. Experimental results from comparison of the sequential and the multithreading implementation of the algorithm with varying number of graph nodes and ants are summarized.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130228930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limited Resources Platform Implementation of Complex Event Processing System","authors":"J. Lang, Peter Gabas","doi":"10.1145/3134302.3134331","DOIUrl":"https://doi.org/10.1145/3134302.3134331","url":null,"abstract":"Static although structured queries performed on data that is stored in relation databases or data warehouses are not sufficient enough for systems that are running in real-time, where the focus of monitoring is decided during the runtime of an application. Given that the cessation of activity of the core applications may not be admissible only compounded the problem. However, this solves complex event processing where time is perceived as more important than the actual parameter data persistence. There are currently a number of commercial and non-commercial CEP engines but most of them are very robust and non-optimized for use on platforms with limited resources. In this paper we propose modular and non-robust complex event processing solution for mobile devices with Android. This proposal is based on Publish Subscribe design pattern with a view to its possible further extension. Thus implemented prototype allows processing sensor data from various sources, both inside the device, as well as sensors from other connected devices. To demonstrate the usability of our approach, a mobile application for detection of potential threats to health was developed. This application, utilizing the CEP engine, can warn its users of any danger to their health, based on the predefined complex rules. We have analyzed several solutions and their application possibilities for use on platforms with limited resources. We have designed and implemented a prototype to support the development of complex events for the Android platform. Finally we have tested our approach with the existing solutions in comparable level.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131542648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real Time GPU Accelerated Radar Scan Conversion and Visualization","authors":"Vesselin Pezhgorski, M. Lazarova","doi":"10.1145/3134302.3134339","DOIUrl":"https://doi.org/10.1145/3134302.3134339","url":null,"abstract":"The paper presents an approach for real time acquisition and scan conversion of high resolution radar data on a modern computer system using GPU based acceleration. The suggested data processing for radar scan conversion and visualization is based on an OpenCL and OpenGL data sharing model, on asynchronous data acquisition and on texture based rendering. The experimental results show a stable number of frames per second being obtained using the proposed approach for GPU accelerated data acquisition and processing. This provides relevant performance and sufficient frame rate for real time radar data visualization.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131252468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing a Virtual Laboratory for Teaching Programming","authors":"G. Shivacheva, V. Nedeva, S. Atanasov","doi":"10.1145/3134302.3134321","DOIUrl":"https://doi.org/10.1145/3134302.3134321","url":null,"abstract":"This article presents the process of designing a virtual laboratory for teaching C ++ programming. The technological requirements and those regarding the content and organization of the education are formulated based on preliminary research. The conceptual, functional and architectural models of the virtual laboratory are presented. The conceptual model defines three groups of resources: for studying; databases for consumers and means of communication. The contents of the interactive teaching units are discussed in detail. The functional model examines the role and functions of the three groups of users: administrators, teachers and students.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133757034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Based Steganography Using Modified LSB Insertion Method with Contrast Stretching","authors":"Antoniya Tasheva, Zhaneta Tasheva, Plamen Nakov","doi":"10.1145/3134302.3134325","DOIUrl":"https://doi.org/10.1145/3134302.3134325","url":null,"abstract":"The main objective of this research paper is to suggest a new steganography method based on a LSB insertion method and contrast stretching image histogram modification. The stego-images, obtained using the proposed data hiding method, are robust to RS steganalysis. The application of proposed method has comparatively higher secret data embedding capacity than classical LSB insertion method. The experimental results shows that the RS steganalysis fails to detect the presence of the secret message even its length is 50% of the maximum possible embedding length in the cover image.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122218811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MATLAB-Based Software Tool for Implementation of Bifid Ciphers","authors":"A. Borodzhieva","doi":"10.1145/3134302.3134333","DOIUrl":"https://doi.org/10.1145/3134302.3134333","url":null,"abstract":"The paper presents one of the classical ciphers in cryptography, the bifid cipher, a type of cipher that was used historically but now has fallen into disuse. Most classical ciphers can be practically computed and solved by hand. They are also usually very simple to break with modern technologies. In classical cryptography, the bifid cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion. It was invented around 1901 by Felix Delastelle. The paper presents MATLAB-based software tool implementing encryption and decryption of English texts using the bifid cipher and 3 options for creating the Polybius square: 5x5, 6x6 and 8x8. The tool will be used in the course \"Telecommunication Security\" by students of the specialty \"Telecommunication Systems\" for the Bachelor degree at the University of Ruse.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121058418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}