View: session overviewtalk overview
Online presentations will be held. Microsoft Teams will be used for online presentations and session streaming.
Microsoft Teams meeting
Join: https://teams.microsoft.com/meet/387680670389969?p=0CHswzY6m01a93RjnR
Meeting ID: 387 680 670 389 969
Passcode: Lj3Pi6kA
| 09:30 | Low-cost automation system for sorting parts of type “Connector” PRESENTER: Velizar Zaharinov ABSTRACT. The application of low-cost automation is a permanent trend in modern production. It is especially promising in control and sorting operations, characterized by labor-intensiveness and low productivity. The paper presents methods and approaches for implementing a system for sorting parts of the type "Connector" by size. The suitability of the parts for automated sorting is assessed, a method for control and sorting is selected, an original passive contact system for automatic orienting is described, the main functional parameters of the system are determined. By unifying the transporting, control and sorting device, a simplified structure, increased reliability and low cost of the system are achieved. The main technical characteristics of the proposed system are indicated. |
| 09:45 | Integrating the Approach of Adjustable Reliability into the System Development Life Cycle ABSTRACT. Fault-tolerant distributed systems are implemented in safety-critical applications where a system failure could cause severe damage and threaten human lives. To guarantee their flawless operation, their dependability attributes must be embedded early and continuously throughout system design, rather than treating them as an afterthought. This paper presents a conceptual framework for integrating the approach of adjustable reliability into the System Development Life Cycle (SDLC). The approach of adjustable reliability provides a way to distribute structural hardware redundancy and achieve the system reliability required by the application. The proposed framework shifts reliability from a design add-on to a core architectural decision variable in the design of dependable distributed systems. Opportunities and challenges involved are discussed, and some future research directions are outlined. |
| 10:00 | Design and development of a microcontroller board for environmental control and device management ABSTRACT. The paper discusses some important microcontroller board features in the application context of laser projection systems, which include measuring temperature and humidity by analog and digital sensors, controlling internal and external devices according to sensor values and time schedules, as well as communicating the system state to remote computers. Accordingly, the hardware architecture of the microcontroller board is designed, specific implementation details are illustrated and experimental results are discussed showcasing a custom desktop application for monitoring and control. Future development will build on the flexibility and extensibility of the board to include additional digital sensors and connectivity options |
| 10:15 | Microcontroller firmware for embedded systems in industrial applications ABSTRACT. This paper discusses the creation of a microcontroller firmware that focuses on the control of lighting, temperature and external devices and enables sensor data acquisition and transmission to remote systems in industrial applications. Relevant economic and technological aspects are outlined, a suitable firmware architecture is proposed, related implementation details are presented and experimental results are summarized after gathering practical experience with three microcontroller boards developed for real-world application. The proposed firmware achieves a good balance between development cost, usability and reliability and provides enough room for future integration in new application scenarios and configuration adjustments requested by clients. |
| 10:30 | A Classification of Sensor Data Fusion Methods: Concepts and Recent Advances ABSTRACT. A Data fusion methods play a key role in modern multisensor systems, yet their selection remains largely heuristic due to the absence of a unified classification framework. This paper reviews existing classification approaches based on the level of data abstraction, system architecture, information interaction and mathematical foundations, taking into account their conceptual features and practical limitations. It also proposes a new classification approach based on partial information decomposition. This approach enables the objective categorisation of sensor systems and fusion methods according to the dominance of unique, redundant, and synergistic information in the acquired data. |
| 10:45 | Architecture and performance evaluation of real-time facial recognition for access control ABSTRACT. The current study presents the design, implementation, and evaluation of a real-time face recognition system for automated access control. The system uses Python libraries to build an accurate and secure identification platform that incorporates dedicated stages for facial data processing and recognition. During data preparation, 128-dimensional facial embedding vectors are generated for authorized users through a command-line interface and protected using authenticated encryption. In real-time operation, the system captures video frames, detects faces, and verifies identities by matching them against the encrypted database. Experimental results demonstrate high recognition accuracy, real-time throughput and robust performance, highlighting the system’s suitability for GDPR-oriented deployment in small institutional environ-ments. |
Hybrid form of presentations will be held. Microsoft Teams will be used for online presentations and session streaming.
Microsoft Teams meeting
Join: https://teams.microsoft.com/meet/368716487625471?p=jh7HhvsmlWbISkKf7c
Meeting ID: 368 716 487 625 471
Passcode: 7g6nr7Mj
| 09:30 | Implementing SLI/SLA/SLO Metrics in an ASP.NET 8 Microservices Architecture Using OpenTelemetry and Prometheus ABSTRACT. This article presents the results of a study on implementing a service level metrics system (SLI/SLA/SLO) in a high-load web application on the ASP.NET 8 platform. A practical implementation of a monitoring system using OpenTelemetry Metrics and a Prometheus endpoint is considered. A comparative analysis of system performance and reliability indicators before and after implementing the metrics is conducted. The mechanisms by which metrics influence operational indicators are described in detail: identifying hidden performance issues, transforming the alerting system, prioritizing engineering efforts, managing the balance between development speed and reliability through an error budget, and automating response processes. The study results showed an improvement in the average time to detect incidents by 73%, a reduction in service restoration time by 58%, and an increase in overall system availability from 98.2% to 99.7%. A methodology for determining target SLO values based on business requirements and architectural constraints is presented. |
| 09:45 | Time series analysis of the behavior of wild animals using camera traps ABSTRACT. During the last 50 years, average wild animal populations have decreased by 73%. The present article is part of a scientific project for tracking wild animal habitats in the Bulgarian mountains. Based on the PlantNet base model, a model based on the YOLOv8n architecture has been created through transfer learning on local data to recognize animal species specific to Bulgarian geographical latitudes. In this paper, a system for assessing population dynamics and animal movement through the analysis of time series of images is proposed. The effectiveness of the proposed methodology is illustrated using a database of images from Ukraine, as it provides a sufficient number of images needed to train and test the model, monitoring changes in the behavior of wild animals over time. This will enable the detection of migration patterns, preferred habitats, and potential threats to populations. |
| 10:00 | A Portable IoT-Enabled System for Georeferenced Soil Nutrient Screening in Agricultural Fields PRESENTER: Omar Otoniel Flores Cortez ABSTRACT. This paper presents the design and preliminary field validation of a portable, low-cost Internet of Things (IoT) station for georeferenced soil nutrient profiling in agricultural environments. The proposed system integrates a digital RS-485 NPK soil sensor, an ESP32 microcontroller, and a SIM7000G GSM/GPS module to enable on-site acquisition and real-time transmission of nitrogen (N), phosphorus (P), and potassium (K) measurements using the MQTT protocol. Data are serialized in JSON format and transmitted to a ThingsBoard cloud platform for remote storage and visualization. The portable architecture supports manual spatial sampling across multiple locations without reliance on fixed infrastructure, making it suitable for small- and medium-scale agricultural contexts with limited connectivity. Preliminary testing in a controlled lemon plantation demonstrated stable GSM connectivity, successful geotagging, and consistent cloud-based visualization, with an average acquisition-transmission cycle of 30–45 s per measurement. Spatial heat maps generated from collected data illustrate the system’s capability for indicative nutrient mapping. Although laboratory-grade validation is ongoing, the results confirm the technical feasibility of integrating low-cost sensing, cellular communication, and georeferenced data acquisition into a compact IoT unit. The system establishes a foundation for future calibration, large-scale field validation, and decision-support applications in precision agriculture. |
| 10:15 | SQL Database Optimization as a Driver for SME Digital Transformation: A Case Study in the PV Sector ABSTRACT. Small and Medium-sized Enterprises (SMEs) in the photovoltaic sector face significant challenges in managing and leveraging data for strategic decision-making. This case study examines a comprehensive database optimization initiative within a European PV company, focusing on the digitalization of sales processes through Databricks and Power BI integration. The research documents a practical methodology for data consolidation, cleaning, semantic layer design, and installer segmentation that enabled real-time an-alytics and evidence-based decision-making. Results demonstrate improvements in data quality (67% to 94% completeness), reporting efficiency (days to real-time), and meas-urable business outcomes including resource reallocation and customer win-back cam-paigns. |
| 10:30 | The Invisible Guardian: Big Data, Behavioral Biometrics, and the Era of Continuous Authentication ABSTRACT. Traditional authentication systems rely mainly on static login checkpoints such as passwords or one-time verification. However, the expansion of cloud services, mobile devices, and distributed digital platforms has exposed significant limitations in these approaches. Modern cyberattacks increasingly exploit credential theft, phishing, and session hijacking in order to bypass login-based security mechanisms. This study examines the use of behavioral biometrics and data-driven analytics in continuous authentication systems that verify user identity throughout an active session. Behavioral interaction signals such as keystroke dynamics, cursor movement patterns, touchscreen gestures, and device usage characteristics can form distinctive behavioral profiles for individual users. Machine-learning models can analyze these signals to detect deviations from established behavioral patterns that may indicate unauthorized access. The paper develops a conceptual framework for continuous behavioral authentication that integrates behavioral monitoring, anomaly detection, and scalable data-processing infrastructures. The analysis highlights both the cybersecurity benefits of behavioral authentication and the challenges related to large-scale behavioral data collection, including privacy protection and responsible data governance. |
| 10:45 | AutoSignal: A Dart-based Programming Paradigm for Automatic Component Connection via Signal-Slot Architecture ABSTRACT. Managing event-driven communication in large reactive codebases remains a persistent pain point: developers routinely write repetitive wiring code that quickly becomes difficult to trace and maintain. We present AutoSignal, a programming paradigm for the Dart ecosystem that automates component interconnection through a signal-slot architecture built on name and data-type matching. To ensure scalability and prevent unintended side effects in large-scale applications, the framework implements a hierarchical namespace isolation model and guarantees deterministic reactivity via topological sorting of dependency graphs. Empirical evaluations demonstrate that the AutoSignal framework reduces manual connection code by approximately 47% and decreases unintended signal propagation by 32% compared to standard manual implementation schemes. Furthermore, the framework integrates seamlessly with the Flutter ecosystem, providing high-performance reactive primitives such as specialized hooks and builders. Overall, AutoSignal proves to be a practical, type-safe option for teams building maintainable event-driven applications in the Dart/Flutter ecosystem. |
| 11:00 | Constructive approach to the design of data protection systems. Models and transformation ABSTRACT. In this article, we present a constructive method for designing an information security system (ISS). The method is based on the IEEE 1471 and IEEE 42010 standards. They provide an architectural framework for describing the system through conceptual mod-eling from different perspectives. The perspectives reflect the requirements of stake-holders - regulatory, normative, technological or budgetary. As result of analysis of the problem area, conceptual models are constructed. The resulting models are combined into generalized multi-layer model. The transformation of the conceptual model into a technology-independent object-oriented (OO) design model follows. Next stage is selec-tion of an appropriate technological platform and subsequent transformation of the design model into an implementation model. An essential part of the method is the creation of agent-based simulation model. It allows simulation of the ISS in different environments, with changing the input conditions. The method ensures technological independence of the ISS, due to the fact that the resulting conceptual model reflects the requirements of the system and the methods for implementing the tasks of the ISS without using a specific technological solution. The method also ensures universal communication between the individual stakeholders and unification of the used terminology. |
| 11:15 | Electric Power Consumption Forecasting In Bulgaria PRESENTER: Hristo Grigorov ABSTRACT. The primary goal of this project is to develop a robust model for forecasting electric power consumption in Bulgaria. Leveraging historical forecast data from Open-Meteo for weather-related features and Entsoe data, our objective is to create an accurate prediction tool that can assist in optimizing energy management within the country. By achieving this goal, we aim to improve energy reliability, support data-driven decision-making in energy policy, and promote sustainable energy practices in Bulgaria. This predictive model will empower us to proactively address fluctuations in energy demand, particularly during extreme weather conditions, and will contribute to the efficient allocation of electrical resources. |
| 11:30 | A Governance-Aware, Privacy-Preserving, Event-Driven Conceptual Model for Supply Chain Traceability PRESENTER: Aleksandar Panayotov ABSTRACT. Supply chain traceability often fails in practice because relevant records are scattered across production, warehouse, transport, laboratory, and document systems. When a recall or audit is needed, firms must manually collect and reconcile evidence from many sources. Existing standards and blockchain platforms address parts of this problem, but prior work still reports recurring weaknesses in governance, confidentiality management, interoperability, and performance measurement. This paper presents a governance-aware, privacy-preserving, event-driven conceptual model for supply chain traceability. The model uses five event types—Create, Transform, Transfer, Verify, and Recall—linked through explicit lineage. It stores compact signed event headers on-ledger and anchors detailed off-ledger payloads and governance policy text through hashes. It also links data-sharing choices to consortium governance, defines validation invariants, embeds key performance indicators, and produces two regulator-ready outputs: a product passport and an audit pack. The contribution is a standards-informed conceptual artifact that integrates event semantics, provenance reconstruction, selective disclosure, governance, validation, performance measurement, and regulator-ready outputs in one cross-sector traceability model. |
| 11:45 | Blockchain for EUPHEMIA Market Transparency ABSTRACT. EUPHEMIA, the Pan-European day-ahead electricity market coupling algorithm, operates in a centralised manner that limits independent auditability and has been characterised as exhibiting pseudo-transparency. This paper proposes a blockchain-based architecture that enhances the transparency and verifiability of the market-coupling process without compromising participant confidentiality. The architecture introduces an off-chain computation model with selective on-chain publication, applied separately to the three principal data categories of the EUPHEMIA pipeline: order books, network constraints, and clearing outputs. Zero-knowledge proofs based on zk-STARKs verify the integrity of the order book aggregation process and targeted network constraint sub-processes, while Merkle commitments provide tamper-evident anchoring of publicly disclosed data. zk-STARKs are selected over CRS-based alternatives to eliminate the trusted setup governance overhead inherent to EUPHEMIA's multi-jurisdictional structure. Circuit complexity is estimated at approximately 2,225,000 arithmetic constraints in the worst-case NEMO (EPEX SPOT) scenario. A targeted capacity reduction proof requires 391 constraints when a Transmission System Operator (TSO) challenges the capacity constraints calculated by the Regional Coordination Centre (RCC). The computational effort of the prover and verifier follows established theoretical bounds. Welfare maximisation cannot be verified end-to-end due to the absence of a full public algorithm specification. Empirical benchmarking of proof generation times remains for future work. |
| 12:00 | Quantum Machine Learning for Enhanced Cardiovascular Disease Risk Prediction ABSTRACT. Quantum computing has emerged as a powerful tool for solving complex problems in various fields. Personalized medicine, tailoring medical treatment to patients based on their genetic and health data, is one area where predictive analytics can be useful. This work explores the application of quantum algorithms for predictive analytics, specifically in the context of predicting outcomes of cardio-vascular disease based on patient data. The research is focused on the quantum-based predictive models for the case study of cardiovascular disease. The models are based on Quantum Support Vector Machines, Quantum Neural Networks, and Variational Quantum Eigensolver algorithms. The software implementation is based on the Python programming language, including an integrated quantum algorithms. A dataset of cardiovascular disease from an online platform is used to train and evaluate the models. |
| 12:15 | Implementation and evaluation of the shortest-path algorithm for GIS Network Routing ABSTRACT. This work examines the implementation and evaluation of shortest path algorithm in a Geographic Information System environment integrating QGIS with a Post-greSQL/PostGIS spatial database. Spatial edge and junction layers stored in the Post-greSQL/PostGIS define a directed weighted network in which edge costs are derived from spatial distance and modified through a gradient-based cost function. The rout-ing algorithm is implemented in Python using the PyQGIS library and a binary heap priority queue. Network data are loaded from the geodatabase and processed in memory to compute the optimal route between selected nodes. The resulting path is reconstructed as a dissolved polyline feature stored in the geodatabase and visualized within the GIS environment. The study also includes a theoretical comparison of sev-eral classical shortest-path algorithms—Dijkstra, A*, Bellman–Ford, and Floyd–Warshall—with respect to their applicability to sparse spatial graphs typical of trans-portation networks. The analysis confirms the suitability of Dijkstra’s algorithm for such networks and demonstrates that routing outcomes depend directly on the defini-tion of the edge cost function. The proposed workflow relies exclusively on open-source GIS and database technologies. |
| 12:30 | A Hybrid Synthetic Dataset Generation for Robust Document Recognition Using Image Rendering and Domain Randomization ABSTRACT. Automated recognition of identity documents has become a critical component in digital identity verification systems, including banking, e-government services, border control, and security applications. Despite their importance, the development of reliable ID card recognition systems faces several challenges. The development of robust recognition models is often constrained due to ID card recognition systems rely heavily on the limited availability of large, diverse, high-quality, and publicly accessible ID card datasets. Collecting and annotating real-world ID card images is costly, time-consuming, and often restricted due to privacy, legal, and security concerns. Additionally, real-world images suffer from variations in lighting, background, wear-and-tear, and capture conditions, which degrade recognition performance. This paper proposes a novel approach for generating a large-scale synthetic dataset for ID card recognition by merging real ID card images with a texture dataset through a structured data fusion pipeline. The proposed method introduces realistic visual variations by integrating background textures, illumination effects, geometric distortions, and noise patterns while preserving the semantic integrity of the original ID card content. Experimental evaluations using a deep learning-based recognition model demonstrate that training with a synthetic dataset generated utilizing the suggested approach significantly improves model generalization, robustness, and accuracy. |
| 12:45 | Machine Learning-Based Heart Disease Prediction: A Comparative Analysis with Feature Importance Evaluation ABSTRACT. Heart disease continues to rank as the foremost contributor to premature death across the globe, and developing reliable automated screening tools has become a pressing priority in clinical informatics. This study presents a comparative analysis of three machine learning classifiers — Logistic Regression (LR), Random Forest (RF), and Gradient Boosting (GB) — for binary heart disease prediction using the UCI Cleveland Heart Disease dataset. The dataset comprises 297 patient records with 13 clinical features following removal of missing values. Models were evaluated using an 80/20 stratified train-test split with Min-Max normalisation. Logistic Regression achieved the highest AUC-ROC of 0.9554 and accuracy of 83.33%, followed by Random Forest (AUC-ROC = 0.9375, accuracy = 85.00%) and Gradient Boosting (AUC-ROC = 0.8828, accuracy = 76.67%). Feature importance analysis identified chest pain type (cp), thalassemia (thal), and maximum heart rate (thalach) as the most influential predictors. Results indicate that well-calibrated linear classifiers can match or exceed ensemble methods in structured clinical settings, a practically significant finding for risk-stratification tools where probability estimates must be trusted. |
| 13:00 | Bidirectional Transformer Representations for Transferable Statistical Language Models ABSTRACT. This paper studies a deep probabilistic modeling framework that learns bidirectional sequence representations from large unlabeled text and then reuses them across multiple supervised tasks. The approach trains a multi-layer Transformer encoder with masked token prediction and sentence-level discrimination objectives, yielding context-sensitive embeddings that integrate information from both left and right contexts. These pretrained representations are then fine-tuned with minimal task-specific modifications to optimize standard classification and span-prediction losses on a variety of benchmarks. Experiments show that scaling the model and training corpus leads to substantial gains over prior transfer-learning methods in natural language processing, illustrating the effectiveness of bidirectional attention-based encoders as general-purpose statistical machine learning models. |
| 13:15 | Adversarial Robustness and Explainability in AI-Generated Face Detection ABSTRACT. The increasing sophistication of generative artificial intelligence (AI) has led to an exponential rise in highly realistic synthetic facial media. As detection models evolve, so do adversarial techniques designed to bypass them, creating an arms race between deepfake creators and defenders. This paper investigates adversarial robustness and explainability in the detection of AI-generated faces, proposing the Robust and Explainable Detection (RED) framework that combines adversarial training with explainable AI (XAI) tools such as Gradient-weighted Class Activation Mapping (Grad-CAM). We evaluate how convolutional neural networks (CNNs), Vision Transformers (ViTs), and hybrid multi-stream detectors perform under adversarial perturbations. RED integrates multi-stream feature extraction, adversarial defense layers, and Grad-CAM-based interpretability. The methodology is formalized with FGSM and PGD adversarial training, with loss formulation and configuration options; the implementation is released for reproducibility. Experiments use the Kaggle faces dataset (real/fake structure) with stratified 70/15/15 train/validation/test splits. Metrics include accuracy, F1, AUC-ROC, Adversarial Robustness Index (ARI), and Explainability Fidelity (EF). The framework contributes toward trustworthy, transparent, and robust AI systems for detecting synthetic facial media and supports forensic and legal applications where both accuracy and interpretability are required. |
Online presentations will be held. Microsoft Teams will be used for online presentations and session streaming.
Microsoft Teams meeting
Join: https://teams.microsoft.com/meet/319798185513721?p=E64ToRg1fwlcvgzCtK
Meeting ID: 319 798 185 513 721
Passcode: Jk7xH6mz
Online presentations will be held. Microsoft Teams will be used for online presentations and session streaming.
Microsoft Teams meeting
Join: https://teams.microsoft.com/meet/358298402979813?p=1VVi1INUuYwZocXstW
Meeting ID: 358 298 402 979 813
Passcode: ee7R2Cu7