Nowadays, the learning process is supported by different Information and Communication Technology... more Nowadays, the learning process is supported by different Information and Communication Technology (ICT) tools which provide more flexible methods of delivery of learning content and students' evaluation. The Learning Management Systems (LMS) are used to integrate a wide range of pedagogical and course administration tools. The most widely used LMS system is Moodle. Its integration with different tools improves and supports the learning process. Key component of the system is the course, which can be organized in different formats and can include different activities and resources. Students are being enrolled to a specific course. After a successful course delivery, there exist well-defined assessment methods, which give a lot of opportunities. One of the faced challenges is to apply different learning analytics methods in order to take decisions and conclusions for course content from one side and students results, and motivation from another. For that purpose, personal information is stored and processed. The main goal of the paper is to review the GDPR regulation and to apply it to a life LMS system (Moodle). There exist some plug-ins for managing and processing personal data within Moodle system. The research here focuses on life Moodle system and possible places (outside of the system itself), where personal information can be stored. A chapter five describes the authors approach for data processing with two processes-for data anonymization and a for data sharing with external systems.
ARCADE е платформа за дистанционно обучение, разработена от екип инженери, специалисти и студенти... more ARCADE е платформа за дистанционно обучение, разработена от екип инженери, специалисти и студенти към катедра Информационни технологии - ФМИ към СУ “Св. Климент Охридски”. За разработването и са следвани най-новите тенденции за организиране и провеждане на дистанционно обучение, като e взето под внимание и традиционното обучение (в класна стая). Основната цел на доклада е да се представят възможните области на приложение на системата при различни форми на обучение: индивидуални квалификационни курсове, бакалавърски и магистърски програми във висшите учебни заведения и администриране на учебния процес в училищата от сферата на средното образование
The paper gives insight on how the text document categorization problem can be solved and impleme... more The paper gives insight on how the text document categorization problem can be solved and implemented in a software product. On that score, it specifies how input data are provided, processed and transformed into output data. The goal of the paper is not only to suggest a simple theoretical solution to the text document categorization problem but to provide a real-life implementation as part of a software system. ACM Computing Classication System (1998): H.3.3, H.3.5, I.7.5.*The research presented in this paper was partially supported by the project FNI-SU- 2017/80 10-128 (St. Kliment Ohridski University of Sofia, Bulgaria) Secure and re-usable software architectures for Technology-enhanced learning
Enormous efforts are put in both directions of the area of e-learning technologies – information ... more Enormous efforts are put in both directions of the area of e-learning technologies – information and learning aspects. On one hand, there are new challenges in learning technologies, which tends to be in focus of research of the community of practise. On the other hand, there are learning specifications developments, which are technology oriented. And last, but not least new exciting technologies appear on the web. In order to achieve the primary goal in technology-enhanced learning – better learning- we need to take in account these changes. Development of new models, frameworks, systems and tools in order to satisfy these needs is required. The proposed event-driven interoperability framework is an attempt to fill up the gap between different aspects behind the rationale of learning systems evolution. The presented framework takes advantages of the eventdriven paradigm, applying it on loosely coupled or completely decoupled technology standards and specification used in learning s...
Brouns, F., Van Rosmalen, P., Berlanga, A., Fetter, S., Nadeem, D., Bitter-Rijpkema, M., Sloep, P... more Brouns, F., Van Rosmalen, P., Berlanga, A., Fetter, S., Nadeem, D., Bitter-Rijpkema, M., Sloep, P., Kester, L., Aleksieva-Petrova, A., Petrov, M., Teodor, S., Stefanov, K., Lemmers, R., & Maxwell, K. (2009). D8.3 - Report with overall WP8 results during months 37-42. Aggregates internal deliverables ID8.16, ID8.18 and ID 8.19. TENCompetence.
This software is the LearnWeb tool for Pilots starting in february 2009. It includes KRService as... more This software is the LearnWeb tool for Pilots starting in february 2009. It includes KRService as a basis. Available under the three clause BSD licence, Copyright TENCompetence Foundation.
The Security must be considered from the need of two nodes to communicate with each other, throug... more The Security must be considered from the need of two nodes to communicate with each other, through the moment of confirmed authentication to the secured establishment. It is an essential component of each authentication. In general, nodes communicate over different communication channels, which can be in private or in public networks. The methods and complexity of authentication vary depending on the parties involved in communication. In this paper, we are surveying the various methods for authentication, based on particular criteria, like the possibility to remember passwords; different graphical ways; body specifics (fingerprints, face); combining various techniques (certificates, PINs, digital signatures, one-time passwords, hash-chains, blockchains); QR codes (also with the involvement of augmented reality) for transmitting long passwords, etc. We aim to do as detailed as possible a survey over the literature, and to classify the ways for authentication, and different authentica...
This delivery includes: software sources, software executables, technical documenation, user guid... more This delivery includes: software sources, software executables, technical documenation, user guide and a describing document (WP5_ID5_19_V1.0.pdf). The latter describes the software delivery for Pilots of January 2009 of the tools LearnWeb and KRService. It explains the ...
Cybersecurity Framework has been developed by NIST as a framework for improving cybersecurity in ... more Cybersecurity Framework has been developed by NIST as a framework for improving cybersecurity in critical infrastructures, but soon it has been found out that it is applicable for any organizational type. The Framework Core defi nes a set of fi ve activities (functions) for cybersecurity achievements. The functions are subdivided into categories and the last ones in subcategories. Finally, informative references are supplied as examples of applicable standards and specifi cations. The framework can be used to plan cybersecurity activities in the organization: Current Profi le of the organization has to be developed and then Target Profi le as a plan to achieve a particular cybersecurity level. The problem with the NIST Cybersecurity Framework adoption in non-English speaking countries like Bulgaria is the informative references. They are in English and are appropriate for staff with technical background. On the other hand, plans (Target Profi le) have to be approved by the senior ma...
Assessment of students’ knowledge and instructors’ feedback are among the most important elements... more Assessment of students’ knowledge and instructors’ feedback are among the most important elements of education. This paper describes the Arcade Test System that is used to check and assess students’ knowledge. The Arcade Test System is a dual-purpose online testing environment that gives the instructor an opportunity to control the level of knowledge the students have acquired during taking a particular course delivered by the system. On the one hand, it gives students a way to check their knowledge. On the other hand, it gives the instructor a feedback on how well he/she has managed to teach the learning material. The second purpose of the Arcade Test System is to enable instructors to prepare the final grades on the basis of evaluating students’ knowledge. The paper considers two aspects of students’ knowledge control: remote and close.
Facilitation of new methods for delivery of learning materials and adoption of new ways and pract... more Facilitation of new methods for delivery of learning materials and adoption of new ways and practices in eLearning is always a challenge. Using digital audio in learning as one of main sources for conducting learning is not new, but research on using audio lectures or combined audio with presentation lecture is far not well investigated and adopted. Aim of current paper is to discuss and present software architecture for production and delivery of learning resources with audio elements in university programming courses.
Nowadays, the learning process is supported by different Information and Communication Technology... more Nowadays, the learning process is supported by different Information and Communication Technology (ICT) tools which provide more flexible methods of delivery of learning content and students' evaluation. The Learning Management Systems (LMS) are used to integrate a wide range of pedagogical and course administration tools. The most widely used LMS system is Moodle. Its integration with different tools improves and supports the learning process. Key component of the system is the course, which can be organized in different formats and can include different activities and resources. Students are being enrolled to a specific course. After a successful course delivery, there exist well-defined assessment methods, which give a lot of opportunities. One of the faced challenges is to apply different learning analytics methods in order to take decisions and conclusions for course content from one side and students results, and motivation from another. For that purpose, personal information is stored and processed. The main goal of the paper is to review the GDPR regulation and to apply it to a life LMS system (Moodle). There exist some plug-ins for managing and processing personal data within Moodle system. The research here focuses on life Moodle system and possible places (outside of the system itself), where personal information can be stored. A chapter five describes the authors approach for data processing with two processes-for data anonymization and a for data sharing with external systems.
ARCADE е платформа за дистанционно обучение, разработена от екип инженери, специалисти и студенти... more ARCADE е платформа за дистанционно обучение, разработена от екип инженери, специалисти и студенти към катедра Информационни технологии - ФМИ към СУ “Св. Климент Охридски”. За разработването и са следвани най-новите тенденции за организиране и провеждане на дистанционно обучение, като e взето под внимание и традиционното обучение (в класна стая). Основната цел на доклада е да се представят възможните области на приложение на системата при различни форми на обучение: индивидуални квалификационни курсове, бакалавърски и магистърски програми във висшите учебни заведения и администриране на учебния процес в училищата от сферата на средното образование
The paper gives insight on how the text document categorization problem can be solved and impleme... more The paper gives insight on how the text document categorization problem can be solved and implemented in a software product. On that score, it specifies how input data are provided, processed and transformed into output data. The goal of the paper is not only to suggest a simple theoretical solution to the text document categorization problem but to provide a real-life implementation as part of a software system. ACM Computing Classication System (1998): H.3.3, H.3.5, I.7.5.*The research presented in this paper was partially supported by the project FNI-SU- 2017/80 10-128 (St. Kliment Ohridski University of Sofia, Bulgaria) Secure and re-usable software architectures for Technology-enhanced learning
Enormous efforts are put in both directions of the area of e-learning technologies – information ... more Enormous efforts are put in both directions of the area of e-learning technologies – information and learning aspects. On one hand, there are new challenges in learning technologies, which tends to be in focus of research of the community of practise. On the other hand, there are learning specifications developments, which are technology oriented. And last, but not least new exciting technologies appear on the web. In order to achieve the primary goal in technology-enhanced learning – better learning- we need to take in account these changes. Development of new models, frameworks, systems and tools in order to satisfy these needs is required. The proposed event-driven interoperability framework is an attempt to fill up the gap between different aspects behind the rationale of learning systems evolution. The presented framework takes advantages of the eventdriven paradigm, applying it on loosely coupled or completely decoupled technology standards and specification used in learning s...
Brouns, F., Van Rosmalen, P., Berlanga, A., Fetter, S., Nadeem, D., Bitter-Rijpkema, M., Sloep, P... more Brouns, F., Van Rosmalen, P., Berlanga, A., Fetter, S., Nadeem, D., Bitter-Rijpkema, M., Sloep, P., Kester, L., Aleksieva-Petrova, A., Petrov, M., Teodor, S., Stefanov, K., Lemmers, R., & Maxwell, K. (2009). D8.3 - Report with overall WP8 results during months 37-42. Aggregates internal deliverables ID8.16, ID8.18 and ID 8.19. TENCompetence.
This software is the LearnWeb tool for Pilots starting in february 2009. It includes KRService as... more This software is the LearnWeb tool for Pilots starting in february 2009. It includes KRService as a basis. Available under the three clause BSD licence, Copyright TENCompetence Foundation.
The Security must be considered from the need of two nodes to communicate with each other, throug... more The Security must be considered from the need of two nodes to communicate with each other, through the moment of confirmed authentication to the secured establishment. It is an essential component of each authentication. In general, nodes communicate over different communication channels, which can be in private or in public networks. The methods and complexity of authentication vary depending on the parties involved in communication. In this paper, we are surveying the various methods for authentication, based on particular criteria, like the possibility to remember passwords; different graphical ways; body specifics (fingerprints, face); combining various techniques (certificates, PINs, digital signatures, one-time passwords, hash-chains, blockchains); QR codes (also with the involvement of augmented reality) for transmitting long passwords, etc. We aim to do as detailed as possible a survey over the literature, and to classify the ways for authentication, and different authentica...
This delivery includes: software sources, software executables, technical documenation, user guid... more This delivery includes: software sources, software executables, technical documenation, user guide and a describing document (WP5_ID5_19_V1.0.pdf). The latter describes the software delivery for Pilots of January 2009 of the tools LearnWeb and KRService. It explains the ...
Cybersecurity Framework has been developed by NIST as a framework for improving cybersecurity in ... more Cybersecurity Framework has been developed by NIST as a framework for improving cybersecurity in critical infrastructures, but soon it has been found out that it is applicable for any organizational type. The Framework Core defi nes a set of fi ve activities (functions) for cybersecurity achievements. The functions are subdivided into categories and the last ones in subcategories. Finally, informative references are supplied as examples of applicable standards and specifi cations. The framework can be used to plan cybersecurity activities in the organization: Current Profi le of the organization has to be developed and then Target Profi le as a plan to achieve a particular cybersecurity level. The problem with the NIST Cybersecurity Framework adoption in non-English speaking countries like Bulgaria is the informative references. They are in English and are appropriate for staff with technical background. On the other hand, plans (Target Profi le) have to be approved by the senior ma...
Assessment of students’ knowledge and instructors’ feedback are among the most important elements... more Assessment of students’ knowledge and instructors’ feedback are among the most important elements of education. This paper describes the Arcade Test System that is used to check and assess students’ knowledge. The Arcade Test System is a dual-purpose online testing environment that gives the instructor an opportunity to control the level of knowledge the students have acquired during taking a particular course delivered by the system. On the one hand, it gives students a way to check their knowledge. On the other hand, it gives the instructor a feedback on how well he/she has managed to teach the learning material. The second purpose of the Arcade Test System is to enable instructors to prepare the final grades on the basis of evaluating students’ knowledge. The paper considers two aspects of students’ knowledge control: remote and close.
Facilitation of new methods for delivery of learning materials and adoption of new ways and pract... more Facilitation of new methods for delivery of learning materials and adoption of new ways and practices in eLearning is always a challenge. Using digital audio in learning as one of main sources for conducting learning is not new, but research on using audio lectures or combined audio with presentation lecture is far not well investigated and adopted. Aim of current paper is to discuss and present software architecture for production and delivery of learning resources with audio elements in university programming courses.
Uploads
Papers by Milen Petrov