Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3136273acmotherconferencesBook PagePublication PagesbciConference Proceedingsconference-collections
BCI '17: Proceedings of the 8th Balkan Conference in Informatics
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
BCI '17: 8th Balkan Conference in Informatics Skopje Macedonia September 20 - 23, 2017
ISBN:
978-1-4503-5285-7
Published:
20 September 2017

Bibliometrics
Skip Abstract Section
Abstract

It is a great pleasure to welcome you to the Eight Balkan Conference in Informatics (BCI2017). Since 2003, this conference has become an excellent gathering of the researchers from the Balkan countries and wider, and an opportunity to exchange experiences, opinions and research results related to various areas of computer science and technology.

The main objective of the BCI series of conferences is to provide a forum for discussions and dissemination of research accomplishments in Computer Science and Information Technology and to promote interaction and collaboration among scientists from the Balkan countries and the rest of the world, and to encourage involvement of young researchers from the region.

The Eight Balkan Conference in Informatics (BCI 2017) continues the tradition of BCI conferences held in: Craiova (2015), Thessaloniki (2013), Novi Sad (2012), Thessaloniki (2009), Sofia (2007), Ohrid (2005), and Thessaloniki (2003).

Skip Table Of Content Section
SESSION: Invited talk papers
research-article
On the Complexity of Smart Buildings Occupant Behavior: Risks and Opportunities
Article No.: 1, Pages 1–4https://doi.org/10.1145/3136273.3136274

Smart buildings are run by Cyber-Physical Systems (CPS), termed as Building Management Systems (BMS). Typical goals for the operation of BMS are increasing occupant comfort and decreasing buildings energy consumption. The central and critical figure, ...

research-article
The new era of AI will revolutionize our wellness
Article No.: 2, Pages 1–4https://doi.org/10.1145/3136273.3136622

The resurgence of AI is changing every aspect of our lives. Many new kinds of data are becoming available in every field, making possible new insights and approaches that were unthinkable a few years ago. In this paper, we provide a broad overview of ...

SESSION: Software and its Engineering
short-paper
A Time-Critical Mobile Application based on ECG Medical Monitoring
Article No.: 3, Pages 1–4https://doi.org/10.1145/3136273.3136281

Recent statistics indicate that at least one in every three deaths in the world occurs due to a heart attack. Scientific studies show that certain types of such attacks can be detected before their occurrence. This makes the real-time processing of ...

short-paper
Structured Component and Connector Communication
Article No.: 4, Pages 1–4https://doi.org/10.1145/3136273.3136291

In this paper we present a new software architecture communication element, called communication trait. Communication trait allows the grouping declarations of complex architectural ports/roles of components/connectors communication mechanisms in ...

short-paper
A Novel Model for Measuring Component-Based System Agility
Article No.: 5, Pages 1–4https://doi.org/10.1145/3136273.3136295

This paper proposes a novel model for measuring component based system agility. The idea of this model is to provide a quantitative measurement of the agility metric by measuring attributes which affect the component agility. The model provides an ...

short-paper
Towards Dynamic Cross-platform Component-driven Applications with Girders Elements Framework
Article No.: 6, Pages 1–4https://doi.org/10.1145/3136273.3136300

Content management system is often a choice for companies that tend to create a system that simplifies the process of web content creation and management. Component-driven architectures also appear as an option for creating modern web and mobile ...

SESSION: Theory of Computation and Computer Methodologies
research-article
Albanian Dynamic Dactyls Recognition using Kinect Technology and DTW
Article No.: 7, Pages 1–7https://doi.org/10.1145/3136273.3136276

Sign language is the primary way of communication for the people with hearing impairment. Every region and country has its own sign language. Albanian finger-spelling gestures for expressing the alphabet letters are composed of static and dynamic ...

research-article
The Invalidity of Validating Emotional Multi-Agent Systems Simulations
Article No.: 8, Pages 1–8https://doi.org/10.1145/3136273.3136290

This paper discusses the issue of validating simulations that involve emotional agents. In disaster management scenaria, such as emergency evacuations, simulations are developed to demonstrate the behaviour of people acting under emotional pressure. It ...

research-article
Extended Tuple Constraint Type in Relational and XML Data Model: Definition and Enforcement
Article No.: 9, Pages 1–8https://doi.org/10.1145/3136273.3136294

A database management system (DBMS) should provide capabilities for defining and enforcing certain integrity constraints that must hold for the data recorded in the database. These constraints are derived from the semantics of the data and from the ...

research-article
A Systematic Mapping Study of Computer Vision Approaches based on Deep Learning and Neural Network
Article No.: 10, Pages 1–8https://doi.org/10.1145/3136273.3136301

Deep architectures with convolution structure have been found highly effective and been commonly used in computer vision and image recognition. With the introduction of Graphics Processing Unit (GPU) for general purpose issues, there has been an ...

SESSION: Natural Language Processing
research-article
Machine Learning-based approach to automatic POS tagging of Macedonian language
Article No.: 11, Pages 1–8https://doi.org/10.1145/3136273.3136275

This paper presents the research that has contributed to the creation of an automatic part-of-speech (POS) tagger of Macedonian, a Slavic language that has a rich morphology, but limited language resources and contributions towards establishing of ...

research-article
Information Retrieval with Reinforced Word Classes
Article No.: 12, Pages 1–8https://doi.org/10.1145/3136273.3136292

NLP technology becomes dominant in the field of Information Retrieval (IR) because it facilitates the retrieval of relevant information from different resources in particular natural language. Traditional IR systems treat each document as a bag-of-words ...

research-article
Using Lexical Resources for Irony and Sarcasm Classification
Article No.: 13, Pages 1–8https://doi.org/10.1145/3136273.3136298

The paper presents a language dependent model for classification of statements into ironic and non-ironic. The model uses various language resources: morphological dictionaries, sentiment lexicon, lexicon of markers and a WordNet based ontology. This ...

short-paper
Extracting text keywords using WordNet
Article No.: 14, Pages 1–4https://doi.org/10.1145/3136273.3136280

Summarizing, extracting keywords, sorting and filtering large quantities of texts were subject of various algorithms based on lexical databases because this was a difficult and time consuming task for a human operator. Our proposed algorithm is based on ...

SESSION: Social and Professional Topics
research-article
Reasons for and benefits of teaching Internet of Things basics in the eve of the 4th industrial revolution
Article No.: 15, Pages 1–7https://doi.org/10.1145/3136273.3136285

The recent automation trend across all production industry branches looks threatening to a lot of jobs, especially the mostly repetitive ones. To achieve a significant level of automation, and implicitly to stay competitive in tomorrow's market, every ...

research-article
A Survey on Access Control Mechanisms in E-commerce Environments
Article No.: 16, Pages 1–6https://doi.org/10.1145/3136273.3136288

With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. Access Control (AC) represents the process of mediating every request to services and data, ...

short-paper
Proposed Architecture to manage critical states predictions in IoT applications
Article No.: 17, Pages 1–4https://doi.org/10.1145/3136273.3136279

In IoT applications, data from various sensors are processed and delivered in different structures and formats (JSON, XML, CSV etc) so a noSQL database is a good approach for a persistence layer. Analyzing sensors data evolutions could predict critical ...

short-paper
Stimulating Intellectual Activity with Adaptive Environment (SMILE)
Article No.: 18, Pages 1–4https://doi.org/10.1145/3136273.3136283

As of 2016, 47.5 million people have dementia worldwide according to the World Health Organization, and it is expected that this number will nearly double every 20 years, reaching 100 million sooner than 2030. The goal of the SMILE concept is to help ...

SESSION: Education
research-article
Lifelong learning in Virtual education space with intelligent assistants
Article No.: 19, Pages 1–6https://doi.org/10.1145/3136273.3136287

Learning is a highly complex process that has many different aspects of goals, flows, content and knowledge management, sharing, enhancement and provisioning. In order to serve a real education process, a Virtual Education Space (VES) specified as an ...

short-paper
Students' Satisfaction and Expectations in Higher Education: a Survey
Article No.: 20, Pages 1–5https://doi.org/10.1145/3136273.3136277

This paper presents a research on the criteria of students' satisfaction and their study expectations in the field of informatics. First year students' expectations from the study were measured using a survey. It was focused on eleven criteria: study ...

short-paper
Hands-on exercises as a boost for the students in a robotic course
Article No.: 21, Pages 1–4https://doi.org/10.1145/3136273.3136293

Courses that are supported by hardware components and courses that evolve rapidly face many challenges. They are challenging both to the teachers and to the students. One such course is the course entitled Robotics, taught in the first cycle of studies ...

research-article
QoS Supportive MAC Protocols for WSNs: Review and Evaluation
Article No.: 22, Pages 1–7https://doi.org/10.1145/3136273.3136282

The use of wireless sensor networks technology is growing in different applications of monitoring. Since it is a relatively new technology, the interest of researchers to improve the network performance and behaviour has been enormous. In this context, ...

SESSION: Various areas
research-article
Ontological Framework for Ensuring Correctness of Security Policies in Cloud Environments
Article No.: 23, Pages 1–8https://doi.org/10.1145/3136273.3136289

By embracing the cloud computing paradigm enterprises are able to boost their agility and productivity whilst realising significant cost savings. However, many enterprises are reluctant to adopt cloud services for supporting their critical operations ...

research-article
Agent-based system for highway gasoline price negotiations
Article No.: 24, Pages 1–8https://doi.org/10.1145/3136273.3136296

Modern cars are getting intelligent, including ability to contact each-other and various entities in the "the outside world". At the same time, group purchases gain popularity (e.g. Groupon). Furthermore, agent-based autonomous price negotiations have ...

research-article
Worst-case test network optimization for community detection method
Article No.: 25, Pages 1–6https://doi.org/10.1145/3136273.3136297

Network community detection finds communities/clusters of densely connected nodes with few edges outside the cluster. It is applied in a variety of domains, from e-commerce in social networks or web graphs, up to analysis of biochemical networks or ...

WORKSHOP SESSION: Workshop of Technology Enhanced Learning (WoTEL)
research-article
Using Screencasts to Enhance Logic Programming Skills
Article No.: 26, Pages 1–8https://doi.org/10.1145/3136273.3136286

Screencasts have lately become a pedagogical tool used to create videos to be distributed to students. The plethora of tools make it easier for the teachers to produce high-quality, low-cost screencasts for a number of reasons outlined in the paper. ...

research-article
Evaluating the Use of an Interactive Software Tool for Learning BCNF Normalization
Article No.: 27, Pages 1–8https://doi.org/10.1145/3136273.3136284

Normalization is a required task to ensure a relational database schema with no data repetition and anomalies. However, most students of database courses find it too theoretical and difficult to understand. In this paper, we present a study of an ...

research-article
A Review of Gamification Platforms for Higher Education
Article No.: 28, Pages 1–6https://doi.org/10.1145/3136273.3136299

Providing an engaging yet meaningful learning experience for higher education students can be proven challenging. Teachers constantly try to find ways to strengthen the students' cognitive, emotional and behavioral engagement but often encounter ...

short-paper
Integration of Eye Tracking Technologies and Methods in an E-learning System
Article No.: 29, Pages 1–4https://doi.org/10.1145/3136273.3136278

Eye tracking technologies can support several types of perception processes and verbal/visual user performances. Eye tracking methods have opened many new possibilities in examining cognitive processing and providing a comprehension of reasoning and ...

Contributors
  • Ss. Cyril and Methodius University in Skopje
  • Pennsylvania State University
  • CITY College, Thessaloniki

Index Terms

  1. Proceedings of the 8th Balkan Conference in Informatics
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate 97 of 250 submissions, 39%
      YearSubmittedAcceptedRate
      BCI'19732433%
      BCI '15743243%
      BCI '131034140%
      Overall2509739%