{"title":"Virtual Machine Introspection based Cloud Monitoring Platform","authors":"S. Laurén, V. Leppänen","doi":"10.1145/3274005.3274030","DOIUrl":"https://doi.org/10.1145/3274005.3274030","url":null,"abstract":"Virtual Machine Introspection (VMI) is an emerging family of techniques for extracting data from virtual machines without the use of active monitoring probes within the target machines themselves. In VMI based systems, the data is collected at the hypervisor-level by analyzing the state of virtual machines. This has the benefit of making collection harder to detect and block by malware as there is nothing in the machine indicating that monitoring is taking place. In this paper we present Nitro Web, a web-based monitoring system for virtual machines that uses virtual machine introspection for data collection. The platform is capable of detecting and visualizing system call activity taking place within virtual machines in real-time. The secondary purpose of this paper is to offer an introduction to Nitro virtual machine introspection framework that we have been involved in developing. In this paper, we reflect on how Nitro Framework can be used for building applications making use of VMI data.","PeriodicalId":152033,"journal":{"name":"Proceedings of the 19th International Conference on Computer Systems and Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121503935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm for Histogram Median Thresholding","authors":"A. Bosakova-Ardenska, A. Danev","doi":"10.1145/3274005.3274019","DOIUrl":"https://doi.org/10.1145/3274005.3274019","url":null,"abstract":"One algorithm for thresholding using a histogram median is presented in this paper. The algorithm is named HisMedian and it is implemented on Java. It is also proposed a taxonomy of thresholding algorithms based on a method for defining threshold value as a real color of image or calculated color's value. According to the proposed taxonomy a set of popular thresholding algorithms (including HisMedian) is experimentally evaluated using three test images. The experimental results show that if a histogram is bimodal then the algorithms which use real color(s) from the image as a threshold(s) achieve better results than algorithms which use calculated value(s) as a threshold(s).","PeriodicalId":152033,"journal":{"name":"Proceedings of the 19th International Conference on Computer Systems and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blerta Abazi Chaushi, Agron Chaushi, Z. Dika, F. Ismaili
{"title":"Investigation of Higher Education ERP implementation factors","authors":"Blerta Abazi Chaushi, Agron Chaushi, Z. Dika, F. Ismaili","doi":"10.1145/3274005.3274008","DOIUrl":"https://doi.org/10.1145/3274005.3274008","url":null,"abstract":"The increasing use of technology in educational systems has made a large amount of data available. As result, different studies are focused in using data mining techniques to resolve educational issues based on data analysis. In contrast, in this paper the focus is in important IT issues related to HEIs (higher education institution s) such as information systems and the use of enterprise resource planning systems in enhancing university operations and performance. This study provides a compelling evidence of the market analysis of 20 identified information systems by type, vendor, and level of implementation in more than 700 universities worldwide. Using the data, a framework for ERP System analysis in HEIs is proposed. The framework is composed of four layers: University data aggregation, University data analysis, University ERP system exploratory analysis/ investigation and Decision-making. The usage of framework will improve the process of decision making concerning the factors that influence the implementation approach for Student Information System (SIS) and identifying the relationships between university characteristics and systems modules implementation.","PeriodicalId":152033,"journal":{"name":"Proceedings of the 19th International Conference on Computer Systems and Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122827553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bosakova-Ardenska, A. Danev, H. Andreeva, T. Gogova
{"title":"Bread porosity evaluation by histogram analysis","authors":"A. Bosakova-Ardenska, A. Danev, H. Andreeva, T. Gogova","doi":"10.1145/3274005.3274020","DOIUrl":"https://doi.org/10.1145/3274005.3274020","url":null,"abstract":"An algorithm for automatic image thresholding with application in bread porosity evaluation is presented in this paper. The algorithm is named HisAnalysis and it is implemented on C#. It is made an assessment of accuracy between physicochemical method for bread porosity evaluation and two methods for automatic determination of porosity using Tsai algorithm for binarization and HisAnalysis algorithm. Two different types of ROI (Region of Interest) - rectangular and elliptical are used with these algorithms and the results are compared to each other. The experimental results show that the proposed algorithm with elliptical ROI has strong correlation coefficient with physicochemical method for bread porosity evaluation.","PeriodicalId":152033,"journal":{"name":"Proceedings of the 19th International Conference on Computer Systems and Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134105072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Chavdarov, R. Trifonov, G. Pavlova, D. Budakova
{"title":"Manipulability and Kinematic Dependences of a Leg of the Six-Legged Robot","authors":"I. Chavdarov, R. Trifonov, G. Pavlova, D. Budakova","doi":"10.1145/3274005.3274010","DOIUrl":"https://doi.org/10.1145/3274005.3274010","url":null,"abstract":"Kinematic capabilities of the legs are a determinant in overcoming and avoiding different types of obstacles by walking robots. The kinematics of a leg of the Six-Legged Robot is considered. The Jacobian matrix and the coefficients of manipulability in working space are used in the analysis. A model of the leg is developed and numerical experiments are conducted. The results for movement of the leg on a typical trajectory are presented graphically. The trajectory is studied as consisting of two components - weight-bearing and free, which require different kinematic properties. The methods for increasing manipulability and its application as means of intelligent movement in avoiding obstacles are discussed.","PeriodicalId":152033,"journal":{"name":"Proceedings of the 19th International Conference on Computer Systems and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Big Data Value Chain to Create Government Education Policies","authors":"D. Petrova-Antonova, S. Ilieva","doi":"10.1145/3274005.3274015","DOIUrl":"https://doi.org/10.1145/3274005.3274015","url":null,"abstract":"The Big Data Value Chain aims to discover patterns, correlations, and pattern deviations hidden in a dataset. This paper investigates (1) the possible approaches to applying Big Data Value Chain to decision making in the Public sector, specifically in Education; and (2) the ways in which such activities can be automated. The models created can be customized depending on a school's dropout rate and number of students with learning difficulties. This research is part of a current project at the Ministry of Education and Science (MES) of Bulgaria, funded by the Operational Programme Science and Education for Smart Growth which aims to increase student engagement.","PeriodicalId":152033,"journal":{"name":"Proceedings of the 19th International Conference on Computer Systems and Technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127726792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Processing of Two-Dimensional Signals in the Basis of Haar Wavelets","authors":"Hakimjon Zaynidinov, M. Zaynutdinova, E. Nazirova","doi":"10.1145/3274005.3274023","DOIUrl":"https://doi.org/10.1145/3274005.3274023","url":null,"abstract":"This article discusses the use of local systems of basic functions defined on compact carriers. Their effectiveness is shown when solving the problems of discretization of finite signals. Signals can be not only time functions defined at finite intervals, but also functions of arguments of another physical nature, for example, distances along surfaces.","PeriodicalId":152033,"journal":{"name":"Proceedings of the 19th International Conference on Computer Systems and Technologies","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124457533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Divider","authors":"Dimitar Tyanev, Yulka Petkova","doi":"10.1145/3274005.3274009","DOIUrl":"https://doi.org/10.1145/3274005.3274009","url":null,"abstract":"Operation division is the slowest of the four basic arithmetic operations performed in arithmetic-logic devices. In this paper we offer a proposal to speed up computations based on non-restoring division algorithm by the use of the radix-2 two's complement signed numbers. Fast computation is achieved by the early termination of the algorithm when the relevant condition is in place. A hardware implementation of the solution is proposed.","PeriodicalId":152033,"journal":{"name":"Proceedings of the 19th International Conference on Computer Systems and Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124463802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of MOOCs in Regular Courses","authors":"L. Rothkrantz","doi":"10.1145/3274005.3274013","DOIUrl":"https://doi.org/10.1145/3274005.3274013","url":null,"abstract":"At this moment many universities have developed their own MOOCs, open for students all over the world. This new way of distant learning stimulated the development of innovative teaching/learning models and new learning materials. In recent years at some universities, experiments were running focused on the integration of MOOCs material in regular courses. The shortcomings of regular MOOCs as high dropout rates, incomplete assignments and missing cooperation between students have been solved by a new didactic model, hybrid course and mandatory presence. The role of teachers has been changed from massive oral presentation to course manager. The integration of MOOCs has been tested in several courses at TUDelft and a controlled experiment at Czech Technical University in Prague","PeriodicalId":152033,"journal":{"name":"Proceedings of the 19th International Conference on Computer Systems and Technologies","volume":"79 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126050095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Source code authorship approaches natural language processing","authors":"Juraj Petrík, D. Chudá","doi":"10.1145/3274005.3274031","DOIUrl":"https://doi.org/10.1145/3274005.3274031","url":null,"abstract":"This paper proposed method for source code authorship attribution using modern natural language processing methods. Our method based on text embedding with convolutional recurrent neural network reaches 94.5% accuracy within 500 authors in one dataset, which outperformed many state of the art models for authorship attribution. Our approach is dealing with source code as with natural language texts, so it is potentially programming language independent with more potential of future improving.","PeriodicalId":152033,"journal":{"name":"Proceedings of the 19th International Conference on Computer Systems and Technologies","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127102673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}