{"title":"Remote Access and Management of Linux-based Sensor Nodes","authors":"Milen Todorov","doi":"10.1109/TELECOM50385.2020.9299544","DOIUrl":"https://doi.org/10.1109/TELECOM50385.2020.9299544","url":null,"abstract":"The development of cloud services and Internet of Things increased the number of interconnected devices that generate and exchange data. Such rapid growth of the number of devices in sensor networks requires effective methods for remote access for management of sensor nodes in different networks. Moreover, the remote access must be platform-independent. This paper presents approach for effective remote access and management of Linux-based sensor nodes.","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125382947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/telecom50385.2020.9299560","DOIUrl":"https://doi.org/10.1109/telecom50385.2020.9299560","url":null,"abstract":"","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114938623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Measurements for Investigating Amplitude Modulation Using Interactive Methods","authors":"Ivanka D. Tsvetkova, A. Borodzhieva","doi":"10.1109/TELECOM50385.2020.9299533","DOIUrl":"https://doi.org/10.1109/TELECOM50385.2020.9299533","url":null,"abstract":"Teachers use different approaches to engage students with the learning process and make the material more interesting. Interactive tools and augmented reality (AR) applications are a great way to increase the students’ participation. The paper demonstrates the use of AR and the interactive approach in the discipline “Radio Communication Technologies”. It describes what students need to do in the laboratory exercises on the topic of Amplitude Modulation.","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"412 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122460946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Loop Prevention Protocols at the Data Link Layer in LAN","authors":"V. Dimitrov","doi":"10.1109/TELECOM50385.2020.9299530","DOIUrl":"https://doi.org/10.1109/TELECOM50385.2020.9299530","url":null,"abstract":"In LANs, it is common for the network devices to be interconnected with more than a single connection. This way, even if a device or a connection fails, the network will continue to function and user’s traffic will not be dropped, despite the minimal packet losses that would occur. However, another problem arises – loops. Protocols such as STP and ITU-T G.8032 are used to prevent loops in such networks. This paper examines the implementation and compression of the two protocols in different network topologies.","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130360900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EEG Classification for Motor Imagery Mental Tasks Using Wavelet Signal Denoising","authors":"Ivaylo Ivaylov, Milena Lazarova, A. Manolova","doi":"10.1109/TELECOM50385.2020.9299532","DOIUrl":"https://doi.org/10.1109/TELECOM50385.2020.9299532","url":null,"abstract":"Brain-Computer Interfaces (BCIs) are an approach that enables humans to interact with their surroundings by brain generated control signals. Electroencephalographic (EEG) signals that records electrical activity through the scalp might contain superfluous artifacts suppressing some valuable information. Thus the EEG signal denoising is an important stage of the EEG data analyses. The paper presents an experimental comparison of several classification approaches for 2-class motor imagery EEG data classification and explores the influence of wavelet signal denoising on the classification accuracy.","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126682046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of Queueing Systems with a Polya Arrival Process","authors":"Seferin Mirtchev","doi":"10.1109/TELECOM50385.2020.9299550","DOIUrl":"https://doi.org/10.1109/TELECOM50385.2020.9299550","url":null,"abstract":"The random processes in the telecommunications networks are intensively studied for many decades. In this paper for different teletraffic systems with peaked arrival flow described by the Polya distribution - multi-server queueing system with an infinite number of servers and single-server queue with infinite waiting position at constant service time and at general distributed service time are investigated. Results for the state probabilities and for the mean waiting time are presented, and new formulas for the busy period are derived.","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114075371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strengthen the Security of SCADA Systems Through Polling","authors":"Georgi Tsochev","doi":"10.1109/TELECOM50385.2020.9299571","DOIUrl":"https://doi.org/10.1109/TELECOM50385.2020.9299571","url":null,"abstract":"The critical information infrastructure is a system of facilities, services, rules and ways of information processing, the suspension or disruption of the functionality of which can lead to a serious negative impact. In addition to this concept, a new area in the military and economic space is emerging - the Cyber Space Domain. The security of SCADA systems is of particular importance in strategically important for the economy industrial and infrastructure sites. The article presents a theoretical model for protection of devices operating in SCADA systems, which can directly communicate and interact with various field devices such as sensors, valves, pumps, motors, drives, etc., through a human-machine interface.","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130836090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Opportunity for Both Distance and Face-to-Face Learning","authors":"I. Dochev, StoychoVelizarov Manev, L. Docheva","doi":"10.1109/TELECOM50385.2020.9299570","DOIUrl":"https://doi.org/10.1109/TELECOM50385.2020.9299570","url":null,"abstract":"There is no single opinion about the organization of the learning process in emergency and epidemic situations. Even more face-to-face learning, blended learning and distance learning have own advantages. The goal of each teaching team is a realization of learning combining the advantages of all three types of learning processes. For learning choosing, the wishes and possibilities of the students must be taken into account. Very often, for reasons beyond their control, they are not able to attend classes in person. The reasons may be their health condition, country borders closing, transport blockage, etc. This is another reason to develop different learning models that best meet the needs of individual groups of students. If it is necessary and if it is possible, these models can be combined. This will make the learning process more flexible and adaptable. As more flexible the learning process is, as more students will be able to benefit from it.Engineering training has its own specific requirements due to the practical orientation of the knowledge to be acquired. These requirements must also be taken into account when choosing a learning method.This paper proposes an opportunity for combined learning both face-to-face and distance learning. On this way theirs advantages are saved.","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lookback Period, Epochs and Hidden States Effect on Time Series Prediction Using a LSTM based Neural Network","authors":"K. Koparanov, K. Georgiev, Vasil A. Shterev","doi":"10.1109/TELECOM50385.2020.9299551","DOIUrl":"https://doi.org/10.1109/TELECOM50385.2020.9299551","url":null,"abstract":"Forecasting time series problem occurs in various subject areas. Recently neural network techniques have been used for solving such tasks. However, they have not been sufficiently studied. The article explores the influence of the lookback period, the training epochs, and hidden state dimensionality in forecasting time series using long short-term memory. Numerical experiments with example financial data show that using more lags does not improve the results. Such a study of model parameters is important for their proper selection.","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128817533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Battery Free Wireless LoRaWAN End Sensor Node for IoT Applications","authors":"Stanislav Asenov, D. Tokmakov","doi":"10.1109/TELECOM50385.2020.9299539","DOIUrl":"https://doi.org/10.1109/TELECOM50385.2020.9299539","url":null,"abstract":"As a major source of energy, wireless Internet of Things (IoT) endpoints rely on batteries. The batteries are short-lived, large in size, and bulky. But the most important thing is that batteries are extremely harmful to the environment. This necessitates the use of battery-free devices, which provide a promising alternative to a sustainable and stable IoT, where the energy collected from the environment is stored in systems of supercapacitors or ultracapacitors. Limited storage of collected energy and the unpredictability of collected energy lead to periodic behavior when the device is turned on and off. Measuring and understanding the current consumption and execution time of various tasks of IoT applications is crucial for the proper operation of these devices without batteries. In this article, we report a successfully designed and tested wireless LoRaWAN end sensor node without battery for IoT applications. The fundamental feature is the realized extremely low value of energy consumption that allows using supercapacitor and solar harvesting energy to power the microcontroller and sensors. We use a LTC3588 nano power energy harvester IC, solar panel and supercapacitor to power the wireless sensor node.","PeriodicalId":300010,"journal":{"name":"2020 28th National Conference with International Participation (TELECOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124455826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}