Proceedings of the 18th International Conference on Computer Systems and Technologies最新文献

筛选
英文 中文
Intelligent Planting 智能种植
I. Ivanov, V. Tsvetkov
{"title":"Intelligent Planting","authors":"I. Ivanov, V. Tsvetkov","doi":"10.1145/3134302.3134328","DOIUrl":"https://doi.org/10.1145/3134302.3134328","url":null,"abstract":"Intelligent planting is a product which aims at facilitating the work of the people in the field of agriculture. The system provides monitoring and control of specific conditions surrounding gardens, greenhouses, etc. The devices planted in the cultivated area have three built-in sensors which monitor air temperature, soil humidity, and light intensity. The irrigation system connected to the hardware installation can be controlled both automatically and manually. If the automatic mode is on, the user does not need to manually track the soil's humidity. When the humidity is lower than the values requested, the watering pump turns on. It turns off when the sensors detect that the needed humidity has been reached.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124905101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Affective Distant Learning Model Using Avatars as User Stand-in 使用虚拟角色作为用户替身的情感远程学习模型
L. Rothkrantz
{"title":"An Affective Distant Learning Model Using Avatars as User Stand-in","authors":"L. Rothkrantz","doi":"10.1145/3134302.3134314","DOIUrl":"https://doi.org/10.1145/3134302.3134314","url":null,"abstract":"Emotions play an important role in distant learning. Negative emotions are one of the main reasons of high drop-off. Real time assessment of the emotional state of the learner is complex and that complicates real time adaptation of the learning context to boost the motivation of learners. In this paper we introduce the use of avatars with facial expressions corresponding with the emotional state of the learner. Facial expressions of learners are recorded and analysed. This enables the use of personalised Avatars and emotional facial expression. The system and results of experiments are described in this paper.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116142972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Text Mining Based Adaptive Case Management Automation in the Field of Forensic Medicine 基于文本挖掘的法医学领域自适应案例管理自动化
Borislav Banchev
{"title":"Text Mining Based Adaptive Case Management Automation in the Field of Forensic Medicine","authors":"Borislav Banchev","doi":"10.1145/3134302.3134344","DOIUrl":"https://doi.org/10.1145/3134302.3134344","url":null,"abstract":"In the paper is introduced an algorithm for automated processing of documents, managed in forensic medicine offices. The algorithm is based on series of steps that are executed in a sequence in which many aspects are controlled by the information extracted from the document itself. The resulted software solution is based on adaptive case management. Using text mining techniques and meta modelling, the incoming information is transformed into knowledge that is injected into the adaptive business processes. The proposed mechanism would reduce the total turnaround time, the needed manual work at each step and the confusion for the end user.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121664145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet-of-Things Communication Protocol for Low-Cost Devices in Heterogeneous Wireless Networks 异构无线网络中低成本设备的物联网通信协议
S. Ilchev, Z. Ilcheva
{"title":"Internet-of-Things Communication Protocol for Low-Cost Devices in Heterogeneous Wireless Networks","authors":"S. Ilchev, Z. Ilcheva","doi":"10.1145/3134302.3134329","DOIUrl":"https://doi.org/10.1145/3134302.3134329","url":null,"abstract":"In this paper, we present a new communication protocol for low-cost Internet-of-Things (IoT) devices that need to gather and transmit sensor data and receive remote commands. Taking into account that an IoT-network may employ different communication technologies, we define several important protocol features such as data encryption, integrity checking, sender authentication and data retransmission in case of packet delivery failures. We describe our approach to implementing each of the protocol features as part of our HybridNET system for industrial device control and communication. The hardware base includes cheap 32-bit microcontrollers, radio connectivity (SX1276 and others) and wired connectivity (mainly RS485 and Ethernet). We also describe the protocol packet structure in detail as well as our implementation for routing packets in larger IoT-networks. The experimental results are very promising and show that our protocol performs very well and delivers very good performance and reliability.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130028525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Ant Colony Optimization Algorithm for Traffic Flow Estimation 交通流估计的蚁群优化算法
M. Karova, N. Vasilev, I. Penev
{"title":"Ant Colony Optimization Algorithm for Traffic Flow Estimation","authors":"M. Karova, N. Vasilev, I. Penev","doi":"10.1145/3134302.3134317","DOIUrl":"https://doi.org/10.1145/3134302.3134317","url":null,"abstract":"The paper presents a study of the effectiveness of the multithreading implementation of an ant colony optimization algorithm for solving the traffic flow estimation problem. A model of the problem, using graph of the city map, and mathematical formulation of the algorithm, using simulated ants, are described. Experimental results from comparison of the sequential and the multithreading implementation of the algorithm with varying number of graph nodes and ants are summarized.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130228930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Limited Resources Platform Implementation of Complex Event Processing System 复杂事件处理系统的有限资源平台实现
J. Lang, Peter Gabas
{"title":"Limited Resources Platform Implementation of Complex Event Processing System","authors":"J. Lang, Peter Gabas","doi":"10.1145/3134302.3134331","DOIUrl":"https://doi.org/10.1145/3134302.3134331","url":null,"abstract":"Static although structured queries performed on data that is stored in relation databases or data warehouses are not sufficient enough for systems that are running in real-time, where the focus of monitoring is decided during the runtime of an application. Given that the cessation of activity of the core applications may not be admissible only compounded the problem. However, this solves complex event processing where time is perceived as more important than the actual parameter data persistence. There are currently a number of commercial and non-commercial CEP engines but most of them are very robust and non-optimized for use on platforms with limited resources. In this paper we propose modular and non-robust complex event processing solution for mobile devices with Android. This proposal is based on Publish Subscribe design pattern with a view to its possible further extension. Thus implemented prototype allows processing sensor data from various sources, both inside the device, as well as sensors from other connected devices. To demonstrate the usability of our approach, a mobile application for detection of potential threats to health was developed. This application, utilizing the CEP engine, can warn its users of any danger to their health, based on the predefined complex rules. We have analyzed several solutions and their application possibilities for use on platforms with limited resources. We have designed and implemented a prototype to support the development of complex events for the Android platform. Finally we have tested our approach with the existing solutions in comparable level.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131542648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real Time GPU Accelerated Radar Scan Conversion and Visualization 实时GPU加速雷达扫描转换和可视化
Vesselin Pezhgorski, M. Lazarova
{"title":"Real Time GPU Accelerated Radar Scan Conversion and Visualization","authors":"Vesselin Pezhgorski, M. Lazarova","doi":"10.1145/3134302.3134339","DOIUrl":"https://doi.org/10.1145/3134302.3134339","url":null,"abstract":"The paper presents an approach for real time acquisition and scan conversion of high resolution radar data on a modern computer system using GPU based acceleration. The suggested data processing for radar scan conversion and visualization is based on an OpenCL and OpenGL data sharing model, on asynchronous data acquisition and on texture based rendering. The experimental results show a stable number of frames per second being obtained using the proposed approach for GPU accelerated data acquisition and processing. This provides relevant performance and sufficient frame rate for real time radar data visualization.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131252468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing a Virtual Laboratory for Teaching Programming 面向编程教学的虚拟实验室设计
G. Shivacheva, V. Nedeva, S. Atanasov
{"title":"Designing a Virtual Laboratory for Teaching Programming","authors":"G. Shivacheva, V. Nedeva, S. Atanasov","doi":"10.1145/3134302.3134321","DOIUrl":"https://doi.org/10.1145/3134302.3134321","url":null,"abstract":"This article presents the process of designing a virtual laboratory for teaching C ++ programming. The technological requirements and those regarding the content and organization of the education are formulated based on preliminary research. The conceptual, functional and architectural models of the virtual laboratory are presented. The conceptual model defines three groups of resources: for studying; databases for consumers and means of communication. The contents of the interactive teaching units are discussed in detail. The functional model examines the role and functions of the three groups of users: administrators, teachers and students.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133757034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image Based Steganography Using Modified LSB Insertion Method with Contrast Stretching 基于图像的对比度拉伸改进LSB插入方法的隐写
Antoniya Tasheva, Zhaneta Tasheva, Plamen Nakov
{"title":"Image Based Steganography Using Modified LSB Insertion Method with Contrast Stretching","authors":"Antoniya Tasheva, Zhaneta Tasheva, Plamen Nakov","doi":"10.1145/3134302.3134325","DOIUrl":"https://doi.org/10.1145/3134302.3134325","url":null,"abstract":"The main objective of this research paper is to suggest a new steganography method based on a LSB insertion method and contrast stretching image histogram modification. The stego-images, obtained using the proposed data hiding method, are robust to RS steganalysis. The application of proposed method has comparatively higher secret data embedding capacity than classical LSB insertion method. The experimental results shows that the RS steganalysis fails to detect the presence of the secret message even its length is 50% of the maximum possible embedding length in the cover image.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122218811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
MATLAB-Based Software Tool for Implementation of Bifid Ciphers 基于matlab的Bifid密码实现软件工具
A. Borodzhieva
{"title":"MATLAB-Based Software Tool for Implementation of Bifid Ciphers","authors":"A. Borodzhieva","doi":"10.1145/3134302.3134333","DOIUrl":"https://doi.org/10.1145/3134302.3134333","url":null,"abstract":"The paper presents one of the classical ciphers in cryptography, the bifid cipher, a type of cipher that was used historically but now has fallen into disuse. Most classical ciphers can be practically computed and solved by hand. They are also usually very simple to break with modern technologies. In classical cryptography, the bifid cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion. It was invented around 1901 by Felix Delastelle. The paper presents MATLAB-based software tool implementing encryption and decryption of English texts using the bifid cipher and 3 options for creating the Polybius square: 5x5, 6x6 and 8x8. The tool will be used in the course \"Telecommunication Security\" by students of the specialty \"Telecommunication Systems\" for the Bachelor degree at the University of Ruse.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121058418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信