The stream cipher research field is very significant as contemporary communication channels need fast and secure encryption. To ensure unconditional security in stream ciphers the used keystream must be nonlinear and with good pseudo noise properties. By this motivation, in this paper a keystream produced by Generalized Shrinking Multiplexing Generator controlled by Ternary m-sequences (GSMG-3m) is analyzed. Statistical, spectral and approximate entropy tests are done to ensure the randomness properties of keystream sequences produced by the GSMG-3m. Some cryptanalysis of GSMG-3m are done and it is proven that GSMG-3m is more secure than Shrinking Generator (SG) to attacks through its control ternary m-sequence and linear complexity.
{"title":"Analysis of Keystream Produced by Generalized Shrinking Multiplexing Generator Controlled by Ternary m-sequence","authors":"Zhaneta Savova-Tasheva, Antoniya Tasheva","doi":"10.1145/3351556.3351577","DOIUrl":"https://doi.org/10.1145/3351556.3351577","url":null,"abstract":"The stream cipher research field is very significant as contemporary communication channels need fast and secure encryption. To ensure unconditional security in stream ciphers the used keystream must be nonlinear and with good pseudo noise properties. By this motivation, in this paper a keystream produced by Generalized Shrinking Multiplexing Generator controlled by Ternary m-sequences (GSMG-3m) is analyzed. Statistical, spectral and approximate entropy tests are done to ensure the randomness properties of keystream sequences produced by the GSMG-3m. Some cryptanalysis of GSMG-3m are done and it is proven that GSMG-3m is more secure than Shrinking Generator (SG) to attacks through its control ternary m-sequence and linear complexity.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"40 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124386086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a continuous health-check approach for detecting Silent Data Corruption (SCD) in High Performance Computing (HPC) environments. The goal is to minimize the effect of hardware errors in the overall reliability and accuracy of the system by overseeing and validating the accuracy of data. Our work focuses on comparing and presenting the advantages and shortcomings of two approaches to overcoming SDC. Our research shows that from the two proposed methods - threshold triggered and continuous verification - the latter is superior in terms of latency.
{"title":"Bi-Source Verification Against Silent Data Corruption in High Performance Computing","authors":"Era Ajdaraga Krluku, M. Gusev, Vladimir Zdraveski","doi":"10.1145/3351556.3351567","DOIUrl":"https://doi.org/10.1145/3351556.3351567","url":null,"abstract":"This paper proposes a continuous health-check approach for detecting Silent Data Corruption (SCD) in High Performance Computing (HPC) environments. The goal is to minimize the effect of hardware errors in the overall reliability and accuracy of the system by overseeing and validating the accuracy of data. Our work focuses on comparing and presenting the advantages and shortcomings of two approaches to overcoming SDC. Our research shows that from the two proposed methods - threshold triggered and continuous verification - the latter is superior in terms of latency.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128594426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Temenuzhka Zafirova-Malcheva, P. Boytchev, E. Stefanova, Pencho Mihnev, K. Stefanov
This paper proposes an application model of the "Flipped classroom" approach in the undergraduate course "Inclusive Education". The course is for students from the Bachelor's programme "Mathematics and Informatics" of the Faculty of Mathematics and Informatics at Sofia University, who are trained for teachers of mathematics, informatics and information technologies following a new national curriculum. The paper reviews the current educational trends leading to the need of "Inclusive Education". It takes into account the constraints of the traditional lecture approach and the duration limits set in the curriculum. The paper proposes a solution to these problems by applying the flipped classroom approach. A specific model that includes active use of e-learning environment is presented as the focus is on the application of inclusive education knowledge in mathematics, informatics and information technologies. The advantages of this model application are also shown.
{"title":"Inclusive Education Course Design for Informatics Teachers","authors":"Temenuzhka Zafirova-Malcheva, P. Boytchev, E. Stefanova, Pencho Mihnev, K. Stefanov","doi":"10.1145/3351556.3351591","DOIUrl":"https://doi.org/10.1145/3351556.3351591","url":null,"abstract":"This paper proposes an application model of the \"Flipped classroom\" approach in the undergraduate course \"Inclusive Education\". The course is for students from the Bachelor's programme \"Mathematics and Informatics\" of the Faculty of Mathematics and Informatics at Sofia University, who are trained for teachers of mathematics, informatics and information technologies following a new national curriculum. The paper reviews the current educational trends leading to the need of \"Inclusive Education\". It takes into account the constraints of the traditional lecture approach and the duration limits set in the curriculum. The paper proposes a solution to these problems by applying the flipped classroom approach. A specific model that includes active use of e-learning environment is presented as the focus is on the application of inclusive education knowledge in mathematics, informatics and information technologies. The advantages of this model application are also shown.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130178479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Ranković, Elinda Kajo, M. Ivanović, Asya Stojanova-Doycheva, M. Savić, Dragica Ranković
This paper presents the results of research on female students at three different faculties of informatics: Novi Sad in Serbia, Plovdiv in Bulgaria and Tirana in Albania. The idea of this paper is to analyze and compare female students' attitudes towards studying informatics (Computer Science - CS or Information Communication Technologies -- ICT and their expectations for future career. Therefore, we have collected female students' opinions, experiences, attitudes, and perspectives, on current studies, employment opportunities and expectations of future professional careers. Reliable statistical tests were used for a detailed analysis of student responses. The obtained results indicate that the opinions of female students vary, depending on the place where they study.
{"title":"Female Students' Attitude Towards Studying Informatics and Expectations for Future Career - Balkan Case","authors":"N. Ranković, Elinda Kajo, M. Ivanović, Asya Stojanova-Doycheva, M. Savić, Dragica Ranković","doi":"10.1145/3351556.3351571","DOIUrl":"https://doi.org/10.1145/3351556.3351571","url":null,"abstract":"This paper presents the results of research on female students at three different faculties of informatics: Novi Sad in Serbia, Plovdiv in Bulgaria and Tirana in Albania. The idea of this paper is to analyze and compare female students' attitudes towards studying informatics (Computer Science - CS or Information Communication Technologies -- ICT and their expectations for future career. Therefore, we have collected female students' opinions, experiences, attitudes, and perspectives, on current studies, employment opportunities and expectations of future professional careers. Reliable statistical tests were used for a detailed analysis of student responses. The obtained results indicate that the opinions of female students vary, depending on the place where they study.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121085498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saša Pesic, M. Tosic, Miloš Radovanović, Ognjen Ikovic, M. Ivanović, D. Boskovic
A geofence is a virtual perimeter for a real-world positioning area. Geo-fencing involves a location-aware device of a location-based service user or asset entering or exiting a virtual area. Rather than geofences being static, in indoor positioning systems they need to be dynamically updated, frequently, efficiently and on-demand. Furthermore, the underlying geofencing framework must work to incorporate the changes in the systemŠs operational context (signal obstruction, static and dynamic obstacles, etc.) and compensate for their influence on the location calculations. In this paper, we propose the Geofencing Micro-location Asset Tracking (GEMAT) framework for dynamic security geofencing management and notification/actuation based on the Bluetooth Low Energy Micro-location Asset Tracking (BLEMAT) IoT system. We show how an indoor geofencing framework that includes and compensates for contextual updates provides more functional geofencing capabilities, both in terms of precision and sophisticated use cases. We present the main functionalities of the geofencing framework and test them in a real-world IoT environment. Furthermore, we elaborate on a performance analysis model for geofencing frameworks with ten criteria defined. Conducted experiments and performance analysis show that the proposed GEMAT framework is a good candidate for solving problems in a wide range of indoor geofencing use cases.
{"title":"GEMAT - Internet of Things Solution for Indoor Security Geofencing","authors":"Saša Pesic, M. Tosic, Miloš Radovanović, Ognjen Ikovic, M. Ivanović, D. Boskovic","doi":"10.1145/3351556.3351558","DOIUrl":"https://doi.org/10.1145/3351556.3351558","url":null,"abstract":"A geofence is a virtual perimeter for a real-world positioning area. Geo-fencing involves a location-aware device of a location-based service user or asset entering or exiting a virtual area. Rather than geofences being static, in indoor positioning systems they need to be dynamically updated, frequently, efficiently and on-demand. Furthermore, the underlying geofencing framework must work to incorporate the changes in the systemŠs operational context (signal obstruction, static and dynamic obstacles, etc.) and compensate for their influence on the location calculations. In this paper, we propose the Geofencing Micro-location Asset Tracking (GEMAT) framework for dynamic security geofencing management and notification/actuation based on the Bluetooth Low Energy Micro-location Asset Tracking (BLEMAT) IoT system. We show how an indoor geofencing framework that includes and compensates for contextual updates provides more functional geofencing capabilities, both in terms of precision and sophisticated use cases. We present the main functionalities of the geofencing framework and test them in a real-world IoT environment. Furthermore, we elaborate on a performance analysis model for geofencing frameworks with ten criteria defined. Conducted experiments and performance analysis show that the proposed GEMAT framework is a good candidate for solving problems in a wide range of indoor geofencing use cases.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129501740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software applications that are used in the Bulgarian healthcare area generate a lot of data, describing the medical state of the patients. At the moment this data is mostly used for financial reports for the Bulgarian National Health Insurance Fund, based on which the medical entities (general practitioners, hospitals, healthcare centers, etc.) are paid. In case the data coming from different systems is constantly analyzed it can be used for other purposes -- statistics, analysis, and analytics. In this article, we analyze the information coming from XML reports generated from general practitioners' applications and propose an approach to transform it to comply with the standard ISO/EN 13606, which is approved in EU.
{"title":"Extracting Data from General Practitioners' XML Reports in Bulgarian Healthcare to Comply with ISO/EN 13606","authors":"K. Kaloyanova, E. Krastev, Emanuela Mitreva","doi":"10.1145/3351556.3351578","DOIUrl":"https://doi.org/10.1145/3351556.3351578","url":null,"abstract":"Software applications that are used in the Bulgarian healthcare area generate a lot of data, describing the medical state of the patients. At the moment this data is mostly used for financial reports for the Bulgarian National Health Insurance Fund, based on which the medical entities (general practitioners, hospitals, healthcare centers, etc.) are paid. In case the data coming from different systems is constantly analyzed it can be used for other purposes -- statistics, analysis, and analytics. In this article, we analyze the information coming from XML reports generated from general practitioners' applications and propose an approach to transform it to comply with the standard ISO/EN 13606, which is approved in EU.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131226323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We describe the design and evaluation of a web-based tool to help students learn database normalization, which is an important topic in relational database design. Compared with existing systems, our tool has the advantage of allowing a user to practice with as many examples as he/she likes, at all possible levels of difficulty, showing the detailed steps for each solution, and allowing users to upload existing examples and saving their own examples for later reference. Our user survey and observation indicate that the tool is well liked by those who used it, and the tool has impacted them positively in their learning.
{"title":"Facilitating Learning by Practice and Examples: a Tool for Learning Table Normalization","authors":"Junhu Wang, Bela Stantic","doi":"10.1145/3351556.3351589","DOIUrl":"https://doi.org/10.1145/3351556.3351589","url":null,"abstract":"We describe the design and evaluation of a web-based tool to help students learn database normalization, which is an important topic in relational database design. Compared with existing systems, our tool has the advantage of allowing a user to practice with as many examples as he/she likes, at all possible levels of difficulty, showing the detailed steps for each solution, and allowing users to upload existing examples and saving their own examples for later reference. Our user survey and observation indicate that the tool is well liked by those who used it, and the tool has impacted them positively in their learning.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123418061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An efficient scheme to increase the performance of polar codes at short and moderate block lengths is a concatenation of CRC code and a polar code. In order to obtain better result of the concatenation, a CRC code with best error control performance among all CRC codes with a fixed number of check bits has to be used. In this work we investigate CRC codes of 11 to 19 parity bits and determine those of them which have maximum minimum distance at any length it can be used. For CRC codes of 24 parity bits we were not able to perform complete search and we present the best obtained results. The investigation shows that there are better CRC polynomials of degrees 11, 16 and 24 than those suggested by the 3rd Generation Partnership Project (3GPP).
{"title":"CRC selection for decoding of CRC-polar concatenated codes","authors":"T. Baicheva, P. Kazakov","doi":"10.1145/3351556.3351573","DOIUrl":"https://doi.org/10.1145/3351556.3351573","url":null,"abstract":"An efficient scheme to increase the performance of polar codes at short and moderate block lengths is a concatenation of CRC code and a polar code. In order to obtain better result of the concatenation, a CRC code with best error control performance among all CRC codes with a fixed number of check bits has to be used. In this work we investigate CRC codes of 11 to 19 parity bits and determine those of them which have maximum minimum distance at any length it can be used. For CRC codes of 24 parity bits we were not able to perform complete search and we present the best obtained results. The investigation shows that there are better CRC polynomials of degrees 11, 16 and 24 than those suggested by the 3rd Generation Partnership Project (3GPP).","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128766903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper gives a further look into the process of ontology engineering for the needs of the Bulgarian museums' digital collections. The representation of the data model and a skeleton for a digital library offers a universal solution that can be used for the digitalization of movable cultural heritage ensuring its compatibility with the existing legislation in the domain. The main purpose of the base ontology is to unify and extend the usability of accumulated knowledge stored in the museum collection as well as information retrieval and query processing. The development of its structure has been proceeded following the bottom-up model due to the requirements of the front and backend users forming an important step for the standardization of I.T. solutions in the work of Bulgarian museums.
{"title":"Development of base ontology for a digital library of the Bulgarian museums' collections","authors":"Radovesta Stewart, S. Simeonov, R. Pavlov","doi":"10.1145/3351556.3351581","DOIUrl":"https://doi.org/10.1145/3351556.3351581","url":null,"abstract":"This paper gives a further look into the process of ontology engineering for the needs of the Bulgarian museums' digital collections. The representation of the data model and a skeleton for a digital library offers a universal solution that can be used for the digitalization of movable cultural heritage ensuring its compatibility with the existing legislation in the domain. The main purpose of the base ontology is to unify and extend the usability of accumulated knowledge stored in the museum collection as well as information retrieval and query processing. The development of its structure has been proceeded following the bottom-up model due to the requirements of the front and backend users forming an important step for the standardization of I.T. solutions in the work of Bulgarian museums.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121912453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Development of cloud applications directly on the cloud infrastructure has become a common approach. Reliability concerns have also become more of a challenge during the last years. Our goal is to assert the potentials deriving from an integrated development environment, adopting software reliability concepts and fault tolerant techniques, as part of the cloud core services. As a methodology, we propose the implementation of a new cloud service Reliable Integrated Development Environment as a Service to become part of the existing core services. Our objectives are to 1) fulfill the need of having a development environment independent from personal desktop environments; 2) code development environment should be offered directly from the cloud service providers. With fault tolerant technique integration, we also suggest that the reliability of the cloud system should be handled from the cloud developers at software level when cloud quality assurance services fail to do so at their different levels. We also propose potential business models to become part of this core service for the major cloud providers. We introduce a new High Availability Coding model providing a roadmap for the future.
{"title":"Reliable Cloud Software Development Architectures and Business Models Case Study: RIDEaaS and GAE Launcher","authors":"Orges Cico, B. Çiço","doi":"10.1145/3351556.3351586","DOIUrl":"https://doi.org/10.1145/3351556.3351586","url":null,"abstract":"Development of cloud applications directly on the cloud infrastructure has become a common approach. Reliability concerns have also become more of a challenge during the last years. Our goal is to assert the potentials deriving from an integrated development environment, adopting software reliability concepts and fault tolerant techniques, as part of the cloud core services. As a methodology, we propose the implementation of a new cloud service Reliable Integrated Development Environment as a Service to become part of the existing core services. Our objectives are to 1) fulfill the need of having a development environment independent from personal desktop environments; 2) code development environment should be offered directly from the cloud service providers. With fault tolerant technique integration, we also suggest that the reliability of the cloud system should be handled from the cloud developers at software level when cloud quality assurance services fail to do so at their different levels. We also propose potential business models to become part of this core service for the major cloud providers. We introduce a new High Availability Coding model providing a roadmap for the future.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}