The stream cipher research field is very significant as contemporary communication channels need fast and secure encryption. To ensure unconditional security in stream ciphers the used keystream must be nonlinear and with good pseudo noise properties. By this motivation, in this paper a keystream produced by Generalized Shrinking Multiplexing Generator controlled by Ternary m-sequences (GSMG-3m) is analyzed. Statistical, spectral and approximate entropy tests are done to ensure the randomness properties of keystream sequences produced by the GSMG-3m. Some cryptanalysis of GSMG-3m are done and it is proven that GSMG-3m is more secure than Shrinking Generator (SG) to attacks through its control ternary m-sequence and linear complexity.
{"title":"Analysis of Keystream Produced by Generalized Shrinking Multiplexing Generator Controlled by Ternary m-sequence","authors":"Zhaneta Savova-Tasheva, Antoniya Tasheva","doi":"10.1145/3351556.3351577","DOIUrl":"https://doi.org/10.1145/3351556.3351577","url":null,"abstract":"The stream cipher research field is very significant as contemporary communication channels need fast and secure encryption. To ensure unconditional security in stream ciphers the used keystream must be nonlinear and with good pseudo noise properties. By this motivation, in this paper a keystream produced by Generalized Shrinking Multiplexing Generator controlled by Ternary m-sequences (GSMG-3m) is analyzed. Statistical, spectral and approximate entropy tests are done to ensure the randomness properties of keystream sequences produced by the GSMG-3m. Some cryptanalysis of GSMG-3m are done and it is proven that GSMG-3m is more secure than Shrinking Generator (SG) to attacks through its control ternary m-sequence and linear complexity.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"40 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124386086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a continuous health-check approach for detecting Silent Data Corruption (SCD) in High Performance Computing (HPC) environments. The goal is to minimize the effect of hardware errors in the overall reliability and accuracy of the system by overseeing and validating the accuracy of data. Our work focuses on comparing and presenting the advantages and shortcomings of two approaches to overcoming SDC. Our research shows that from the two proposed methods - threshold triggered and continuous verification - the latter is superior in terms of latency.
{"title":"Bi-Source Verification Against Silent Data Corruption in High Performance Computing","authors":"Era Ajdaraga Krluku, M. Gusev, Vladimir Zdraveski","doi":"10.1145/3351556.3351567","DOIUrl":"https://doi.org/10.1145/3351556.3351567","url":null,"abstract":"This paper proposes a continuous health-check approach for detecting Silent Data Corruption (SCD) in High Performance Computing (HPC) environments. The goal is to minimize the effect of hardware errors in the overall reliability and accuracy of the system by overseeing and validating the accuracy of data. Our work focuses on comparing and presenting the advantages and shortcomings of two approaches to overcoming SDC. Our research shows that from the two proposed methods - threshold triggered and continuous verification - the latter is superior in terms of latency.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128594426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Temenuzhka Zafirova-Malcheva, P. Boytchev, E. Stefanova, Pencho Mihnev, K. Stefanov
This paper proposes an application model of the "Flipped classroom" approach in the undergraduate course "Inclusive Education". The course is for students from the Bachelor's programme "Mathematics and Informatics" of the Faculty of Mathematics and Informatics at Sofia University, who are trained for teachers of mathematics, informatics and information technologies following a new national curriculum. The paper reviews the current educational trends leading to the need of "Inclusive Education". It takes into account the constraints of the traditional lecture approach and the duration limits set in the curriculum. The paper proposes a solution to these problems by applying the flipped classroom approach. A specific model that includes active use of e-learning environment is presented as the focus is on the application of inclusive education knowledge in mathematics, informatics and information technologies. The advantages of this model application are also shown.
{"title":"Inclusive Education Course Design for Informatics Teachers","authors":"Temenuzhka Zafirova-Malcheva, P. Boytchev, E. Stefanova, Pencho Mihnev, K. Stefanov","doi":"10.1145/3351556.3351591","DOIUrl":"https://doi.org/10.1145/3351556.3351591","url":null,"abstract":"This paper proposes an application model of the \"Flipped classroom\" approach in the undergraduate course \"Inclusive Education\". The course is for students from the Bachelor's programme \"Mathematics and Informatics\" of the Faculty of Mathematics and Informatics at Sofia University, who are trained for teachers of mathematics, informatics and information technologies following a new national curriculum. The paper reviews the current educational trends leading to the need of \"Inclusive Education\". It takes into account the constraints of the traditional lecture approach and the duration limits set in the curriculum. The paper proposes a solution to these problems by applying the flipped classroom approach. A specific model that includes active use of e-learning environment is presented as the focus is on the application of inclusive education knowledge in mathematics, informatics and information technologies. The advantages of this model application are also shown.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130178479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Ranković, Elinda Kajo, M. Ivanović, Asya Stojanova-Doycheva, M. Savić, Dragica Ranković
This paper presents the results of research on female students at three different faculties of informatics: Novi Sad in Serbia, Plovdiv in Bulgaria and Tirana in Albania. The idea of this paper is to analyze and compare female students' attitudes towards studying informatics (Computer Science - CS or Information Communication Technologies -- ICT and their expectations for future career. Therefore, we have collected female students' opinions, experiences, attitudes, and perspectives, on current studies, employment opportunities and expectations of future professional careers. Reliable statistical tests were used for a detailed analysis of student responses. The obtained results indicate that the opinions of female students vary, depending on the place where they study.
{"title":"Female Students' Attitude Towards Studying Informatics and Expectations for Future Career - Balkan Case","authors":"N. Ranković, Elinda Kajo, M. Ivanović, Asya Stojanova-Doycheva, M. Savić, Dragica Ranković","doi":"10.1145/3351556.3351571","DOIUrl":"https://doi.org/10.1145/3351556.3351571","url":null,"abstract":"This paper presents the results of research on female students at three different faculties of informatics: Novi Sad in Serbia, Plovdiv in Bulgaria and Tirana in Albania. The idea of this paper is to analyze and compare female students' attitudes towards studying informatics (Computer Science - CS or Information Communication Technologies -- ICT and their expectations for future career. Therefore, we have collected female students' opinions, experiences, attitudes, and perspectives, on current studies, employment opportunities and expectations of future professional careers. Reliable statistical tests were used for a detailed analysis of student responses. The obtained results indicate that the opinions of female students vary, depending on the place where they study.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121085498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saša Pesic, M. Tosic, Miloš Radovanović, Ognjen Ikovic, M. Ivanović, D. Boskovic
A geofence is a virtual perimeter for a real-world positioning area. Geo-fencing involves a location-aware device of a location-based service user or asset entering or exiting a virtual area. Rather than geofences being static, in indoor positioning systems they need to be dynamically updated, frequently, efficiently and on-demand. Furthermore, the underlying geofencing framework must work to incorporate the changes in the systemŠs operational context (signal obstruction, static and dynamic obstacles, etc.) and compensate for their influence on the location calculations. In this paper, we propose the Geofencing Micro-location Asset Tracking (GEMAT) framework for dynamic security geofencing management and notification/actuation based on the Bluetooth Low Energy Micro-location Asset Tracking (BLEMAT) IoT system. We show how an indoor geofencing framework that includes and compensates for contextual updates provides more functional geofencing capabilities, both in terms of precision and sophisticated use cases. We present the main functionalities of the geofencing framework and test them in a real-world IoT environment. Furthermore, we elaborate on a performance analysis model for geofencing frameworks with ten criteria defined. Conducted experiments and performance analysis show that the proposed GEMAT framework is a good candidate for solving problems in a wide range of indoor geofencing use cases.
{"title":"GEMAT - Internet of Things Solution for Indoor Security Geofencing","authors":"Saša Pesic, M. Tosic, Miloš Radovanović, Ognjen Ikovic, M. Ivanović, D. Boskovic","doi":"10.1145/3351556.3351558","DOIUrl":"https://doi.org/10.1145/3351556.3351558","url":null,"abstract":"A geofence is a virtual perimeter for a real-world positioning area. Geo-fencing involves a location-aware device of a location-based service user or asset entering or exiting a virtual area. Rather than geofences being static, in indoor positioning systems they need to be dynamically updated, frequently, efficiently and on-demand. Furthermore, the underlying geofencing framework must work to incorporate the changes in the systemŠs operational context (signal obstruction, static and dynamic obstacles, etc.) and compensate for their influence on the location calculations. In this paper, we propose the Geofencing Micro-location Asset Tracking (GEMAT) framework for dynamic security geofencing management and notification/actuation based on the Bluetooth Low Energy Micro-location Asset Tracking (BLEMAT) IoT system. We show how an indoor geofencing framework that includes and compensates for contextual updates provides more functional geofencing capabilities, both in terms of precision and sophisticated use cases. We present the main functionalities of the geofencing framework and test them in a real-world IoT environment. Furthermore, we elaborate on a performance analysis model for geofencing frameworks with ten criteria defined. Conducted experiments and performance analysis show that the proposed GEMAT framework is a good candidate for solving problems in a wide range of indoor geofencing use cases.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129501740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software applications that are used in the Bulgarian healthcare area generate a lot of data, describing the medical state of the patients. At the moment this data is mostly used for financial reports for the Bulgarian National Health Insurance Fund, based on which the medical entities (general practitioners, hospitals, healthcare centers, etc.) are paid. In case the data coming from different systems is constantly analyzed it can be used for other purposes -- statistics, analysis, and analytics. In this article, we analyze the information coming from XML reports generated from general practitioners' applications and propose an approach to transform it to comply with the standard ISO/EN 13606, which is approved in EU.
{"title":"Extracting Data from General Practitioners' XML Reports in Bulgarian Healthcare to Comply with ISO/EN 13606","authors":"K. Kaloyanova, E. Krastev, Emanuela Mitreva","doi":"10.1145/3351556.3351578","DOIUrl":"https://doi.org/10.1145/3351556.3351578","url":null,"abstract":"Software applications that are used in the Bulgarian healthcare area generate a lot of data, describing the medical state of the patients. At the moment this data is mostly used for financial reports for the Bulgarian National Health Insurance Fund, based on which the medical entities (general practitioners, hospitals, healthcare centers, etc.) are paid. In case the data coming from different systems is constantly analyzed it can be used for other purposes -- statistics, analysis, and analytics. In this article, we analyze the information coming from XML reports generated from general practitioners' applications and propose an approach to transform it to comply with the standard ISO/EN 13606, which is approved in EU.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131226323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We describe the design and evaluation of a web-based tool to help students learn database normalization, which is an important topic in relational database design. Compared with existing systems, our tool has the advantage of allowing a user to practice with as many examples as he/she likes, at all possible levels of difficulty, showing the detailed steps for each solution, and allowing users to upload existing examples and saving their own examples for later reference. Our user survey and observation indicate that the tool is well liked by those who used it, and the tool has impacted them positively in their learning.
{"title":"Facilitating Learning by Practice and Examples: a Tool for Learning Table Normalization","authors":"Junhu Wang, Bela Stantic","doi":"10.1145/3351556.3351589","DOIUrl":"https://doi.org/10.1145/3351556.3351589","url":null,"abstract":"We describe the design and evaluation of a web-based tool to help students learn database normalization, which is an important topic in relational database design. Compared with existing systems, our tool has the advantage of allowing a user to practice with as many examples as he/she likes, at all possible levels of difficulty, showing the detailed steps for each solution, and allowing users to upload existing examples and saving their own examples for later reference. Our user survey and observation indicate that the tool is well liked by those who used it, and the tool has impacted them positively in their learning.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123418061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper gives a further look into the process of ontology engineering for the needs of the Bulgarian museums' digital collections. The representation of the data model and a skeleton for a digital library offers a universal solution that can be used for the digitalization of movable cultural heritage ensuring its compatibility with the existing legislation in the domain. The main purpose of the base ontology is to unify and extend the usability of accumulated knowledge stored in the museum collection as well as information retrieval and query processing. The development of its structure has been proceeded following the bottom-up model due to the requirements of the front and backend users forming an important step for the standardization of I.T. solutions in the work of Bulgarian museums.
{"title":"Development of base ontology for a digital library of the Bulgarian museums' collections","authors":"Radovesta Stewart, S. Simeonov, R. Pavlov","doi":"10.1145/3351556.3351581","DOIUrl":"https://doi.org/10.1145/3351556.3351581","url":null,"abstract":"This paper gives a further look into the process of ontology engineering for the needs of the Bulgarian museums' digital collections. The representation of the data model and a skeleton for a digital library offers a universal solution that can be used for the digitalization of movable cultural heritage ensuring its compatibility with the existing legislation in the domain. The main purpose of the base ontology is to unify and extend the usability of accumulated knowledge stored in the museum collection as well as information retrieval and query processing. The development of its structure has been proceeded following the bottom-up model due to the requirements of the front and backend users forming an important step for the standardization of I.T. solutions in the work of Bulgarian museums.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121912453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
At present, the technique of coordinating a team of robots in a manner that is responsive to communication failures, presents itself as an actual challenge. In swarm scenarios where the concept for the teams of robots requires performing cooperative tasks, robots need to be enforced to communicate with each other in the background while executing specific collaborative missions. In order to achieve complex tasks in real-time beyond their individual capability, multi-robot systems (MRS) require a stable, sustained and secure stream of data exchange. Typically, this technique also requires an approach of communication and synchronization among the robots known as swarm R2R (robot to robot) communication in real time [1]. This paper presents a theoretical concept for a wireless mesh robot network that can be protected against electromagnetic interference (EMI), electromagnetic jamming, RF denial-of-service (DoS) attacks, and eavesdropping. The team behind this paper aims to present and propose a conceptual model for a hybrid short-range modular wireless transceiver (HSMWT) used in a distributed network environment. Specific issues on designing HSMWT based on the light and sound mediums for this environment will be explored.
{"title":"Emerging and secured mobile ad-hoc wireless network (MANET) for swarm applications","authors":"A. Anguelov, R. Trifonov, Ognian Nakov","doi":"10.1145/3351556.3351557","DOIUrl":"https://doi.org/10.1145/3351556.3351557","url":null,"abstract":"At present, the technique of coordinating a team of robots in a manner that is responsive to communication failures, presents itself as an actual challenge. In swarm scenarios where the concept for the teams of robots requires performing cooperative tasks, robots need to be enforced to communicate with each other in the background while executing specific collaborative missions. In order to achieve complex tasks in real-time beyond their individual capability, multi-robot systems (MRS) require a stable, sustained and secure stream of data exchange. Typically, this technique also requires an approach of communication and synchronization among the robots known as swarm R2R (robot to robot) communication in real time [1]. This paper presents a theoretical concept for a wireless mesh robot network that can be protected against electromagnetic interference (EMI), electromagnetic jamming, RF denial-of-service (DoS) attacks, and eavesdropping. The team behind this paper aims to present and propose a conceptual model for a hybrid short-range modular wireless transceiver (HSMWT) used in a distributed network environment. Specific issues on designing HSMWT based on the light and sound mediums for this environment will be explored.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Two of the very well-known hash algorithms from SHA2 (SHA-2) family include SHA-256 and SHA-512. Nowadays, there exists another hash algorithms family -- SHA3(SHA-3), which includes SHA3-256 and SHA3-512 algorithms, also known as Keccak algorithms. This paper provides a comparison of the empirical performance calculations with these 4 algorithms with different input volumes of sequential data (where every next slice of information is dependent of previous one) to make it impossible for parallel computation. For the purpose of calculations, 4 totally different environments are used but with exact number of CPUs and approximately similar amount of memory (using only standard instances types) -- one personal computer from one side and 3 of the biggest public cloud providers from another -- Amazon AWS (t2.medium), Microsoft Azure (Standard D2s v3) and Google Cloud (n1-standard-2). The purpose of the research is to compare these environments in terms of additional compute calculations and additional storage space (volumes and prices) for the presented new security improvement of the Merkle-root calculation. The Merkle-root is an integral part of the blockchain and therefore, security improvement of this component is a security improvement of the whole blockchain structure.
{"title":"Security Improvement in a Modified Merkle-tree: Computation and Storage Comparison Between Different Cloud Providers","authors":"I. Chenchev","doi":"10.1145/3351556.3351569","DOIUrl":"https://doi.org/10.1145/3351556.3351569","url":null,"abstract":"Two of the very well-known hash algorithms from SHA2 (SHA-2) family include SHA-256 and SHA-512. Nowadays, there exists another hash algorithms family -- SHA3(SHA-3), which includes SHA3-256 and SHA3-512 algorithms, also known as Keccak algorithms. This paper provides a comparison of the empirical performance calculations with these 4 algorithms with different input volumes of sequential data (where every next slice of information is dependent of previous one) to make it impossible for parallel computation. For the purpose of calculations, 4 totally different environments are used but with exact number of CPUs and approximately similar amount of memory (using only standard instances types) -- one personal computer from one side and 3 of the biggest public cloud providers from another -- Amazon AWS (t2.medium), Microsoft Azure (Standard D2s v3) and Google Cloud (n1-standard-2). The purpose of the research is to compare these environments in terms of additional compute calculations and additional storage space (volumes and prices) for the presented new security improvement of the Merkle-root calculation. The Merkle-root is an integral part of the blockchain and therefore, security improvement of this component is a security improvement of the whole blockchain structure.","PeriodicalId":126836,"journal":{"name":"Proceedings of the 9th Balkan Conference on Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126953873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}