It is a great pleasure to welcome you to the Eight Balkan Conference in Informatics (BCI2017). Since 2003, this conference has become an excellent gathering of the researchers from the Balkan countries and wider, and an opportunity to exchange experiences, opinions and research results related to various areas of computer science and technology.
The main objective of the BCI series of conferences is to provide a forum for discussions and dissemination of research accomplishments in Computer Science and Information Technology and to promote interaction and collaboration among scientists from the Balkan countries and the rest of the world, and to encourage involvement of young researchers from the region.
The Eight Balkan Conference in Informatics (BCI 2017) continues the tradition of BCI conferences held in: Craiova (2015), Thessaloniki (2013), Novi Sad (2012), Thessaloniki (2009), Sofia (2007), Ohrid (2005), and Thessaloniki (2003).
Proceeding Downloads
On the Complexity of Smart Buildings Occupant Behavior: Risks and Opportunities
Smart buildings are run by Cyber-Physical Systems (CPS), termed as Building Management Systems (BMS). Typical goals for the operation of BMS are increasing occupant comfort and decreasing buildings energy consumption. The central and critical figure, ...
The new era of AI will revolutionize our wellness
The resurgence of AI is changing every aspect of our lives. Many new kinds of data are becoming available in every field, making possible new insights and approaches that were unthinkable a few years ago. In this paper, we provide a broad overview of ...
A Time-Critical Mobile Application based on ECG Medical Monitoring
Recent statistics indicate that at least one in every three deaths in the world occurs due to a heart attack. Scientific studies show that certain types of such attacks can be detected before their occurrence. This makes the real-time processing of ...
Structured Component and Connector Communication
In this paper we present a new software architecture communication element, called communication trait. Communication trait allows the grouping declarations of complex architectural ports/roles of components/connectors communication mechanisms in ...
A Novel Model for Measuring Component-Based System Agility
This paper proposes a novel model for measuring component based system agility. The idea of this model is to provide a quantitative measurement of the agility metric by measuring attributes which affect the component agility. The model provides an ...
Towards Dynamic Cross-platform Component-driven Applications with Girders Elements Framework
Content management system is often a choice for companies that tend to create a system that simplifies the process of web content creation and management. Component-driven architectures also appear as an option for creating modern web and mobile ...
Albanian Dynamic Dactyls Recognition using Kinect Technology and DTW
Sign language is the primary way of communication for the people with hearing impairment. Every region and country has its own sign language. Albanian finger-spelling gestures for expressing the alphabet letters are composed of static and dynamic ...
The Invalidity of Validating Emotional Multi-Agent Systems Simulations
This paper discusses the issue of validating simulations that involve emotional agents. In disaster management scenaria, such as emergency evacuations, simulations are developed to demonstrate the behaviour of people acting under emotional pressure. It ...
Extended Tuple Constraint Type in Relational and XML Data Model: Definition and Enforcement
A database management system (DBMS) should provide capabilities for defining and enforcing certain integrity constraints that must hold for the data recorded in the database. These constraints are derived from the semantics of the data and from the ...
A Systematic Mapping Study of Computer Vision Approaches based on Deep Learning and Neural Network
Deep architectures with convolution structure have been found highly effective and been commonly used in computer vision and image recognition. With the introduction of Graphics Processing Unit (GPU) for general purpose issues, there has been an ...
Machine Learning-based approach to automatic POS tagging of Macedonian language
This paper presents the research that has contributed to the creation of an automatic part-of-speech (POS) tagger of Macedonian, a Slavic language that has a rich morphology, but limited language resources and contributions towards establishing of ...
Information Retrieval with Reinforced Word Classes
NLP technology becomes dominant in the field of Information Retrieval (IR) because it facilitates the retrieval of relevant information from different resources in particular natural language. Traditional IR systems treat each document as a bag-of-words ...
Using Lexical Resources for Irony and Sarcasm Classification
The paper presents a language dependent model for classification of statements into ironic and non-ironic. The model uses various language resources: morphological dictionaries, sentiment lexicon, lexicon of markers and a WordNet based ontology. This ...
Extracting text keywords using WordNet
Summarizing, extracting keywords, sorting and filtering large quantities of texts were subject of various algorithms based on lexical databases because this was a difficult and time consuming task for a human operator. Our proposed algorithm is based on ...
Reasons for and benefits of teaching Internet of Things basics in the eve of the 4th industrial revolution
The recent automation trend across all production industry branches looks threatening to a lot of jobs, especially the mostly repetitive ones. To achieve a significant level of automation, and implicitly to stay competitive in tomorrow's market, every ...
A Survey on Access Control Mechanisms in E-commerce Environments
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. Access Control (AC) represents the process of mediating every request to services and data, ...
Proposed Architecture to manage critical states predictions in IoT applications
In IoT applications, data from various sensors are processed and delivered in different structures and formats (JSON, XML, CSV etc) so a noSQL database is a good approach for a persistence layer. Analyzing sensors data evolutions could predict critical ...
Stimulating Intellectual Activity with Adaptive Environment (SMILE)
As of 2016, 47.5 million people have dementia worldwide according to the World Health Organization, and it is expected that this number will nearly double every 20 years, reaching 100 million sooner than 2030. The goal of the SMILE concept is to help ...
Lifelong learning in Virtual education space with intelligent assistants
Learning is a highly complex process that has many different aspects of goals, flows, content and knowledge management, sharing, enhancement and provisioning. In order to serve a real education process, a Virtual Education Space (VES) specified as an ...
Students' Satisfaction and Expectations in Higher Education: a Survey
This paper presents a research on the criteria of students' satisfaction and their study expectations in the field of informatics. First year students' expectations from the study were measured using a survey. It was focused on eleven criteria: study ...
Hands-on exercises as a boost for the students in a robotic course
Courses that are supported by hardware components and courses that evolve rapidly face many challenges. They are challenging both to the teachers and to the students. One such course is the course entitled Robotics, taught in the first cycle of studies ...
QoS Supportive MAC Protocols for WSNs: Review and Evaluation
The use of wireless sensor networks technology is growing in different applications of monitoring. Since it is a relatively new technology, the interest of researchers to improve the network performance and behaviour has been enormous. In this context, ...
Ontological Framework for Ensuring Correctness of Security Policies in Cloud Environments
By embracing the cloud computing paradigm enterprises are able to boost their agility and productivity whilst realising significant cost savings. However, many enterprises are reluctant to adopt cloud services for supporting their critical operations ...
Agent-based system for highway gasoline price negotiations
Modern cars are getting intelligent, including ability to contact each-other and various entities in the "the outside world". At the same time, group purchases gain popularity (e.g. Groupon). Furthermore, agent-based autonomous price negotiations have ...
Worst-case test network optimization for community detection method
Network community detection finds communities/clusters of densely connected nodes with few edges outside the cluster. It is applied in a variety of domains, from e-commerce in social networks or web graphs, up to analysis of biochemical networks or ...
Using Screencasts to Enhance Logic Programming Skills
Screencasts have lately become a pedagogical tool used to create videos to be distributed to students. The plethora of tools make it easier for the teachers to produce high-quality, low-cost screencasts for a number of reasons outlined in the paper. ...
Evaluating the Use of an Interactive Software Tool for Learning BCNF Normalization
Normalization is a required task to ensure a relational database schema with no data repetition and anomalies. However, most students of database courses find it too theoretical and difficult to understand. In this paper, we present a study of an ...
A Review of Gamification Platforms for Higher Education
Providing an engaging yet meaningful learning experience for higher education students can be proven challenging. Teachers constantly try to find ways to strengthen the students' cognitive, emotional and behavioral engagement but often encounter ...
Integration of Eye Tracking Technologies and Methods in an E-learning System
Eye tracking technologies can support several types of perception processes and verbal/visual user performances. Eye tracking methods have opened many new possibilities in examining cognitive processing and providing a comprehension of reasoning and ...
Index Terms
- Proceedings of the 8th Balkan Conference in Informatics