Faculty of Computer Science and Engineering

Permanent URI for this communityhttps://repository.ukim.mk/handle/20.500.12188/5

The Faculty of Computer Science and Engineering (FCSE) within UKIM is the largest and most prestigious faculty in the field of computer science and technologies in Macedonia, and among the largest faculties in that field in the region. The FCSE teaching staff consists of 50 professors and 30 associates. These include many “best in field” personnel, such as the most referenced scientists in Macedonia and the most influential professors in the ICT industry in the Republic of Macedonia.

Browse

Search Results

Now showing 1 - 10 of 13
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Zero-Shot Social Media Crisis Classification: A Training-Free Multimodal Approach
    (MDPI AG, 2026-02-25)
    Schwarz, Franziska
    ;
    Schwarz, Klaus Dieter
    ;
    Aranda, Daniel Arias
    ;
    Bollens, Kendrick
    ;
    Shivananjappa, Navaneeth
    Rapid classification of social media content during humanitarian crises is essential for effective disaster relief; however, traditional approaches require extensive annotated training data, which are often unavailable during new disasters. This paper presents a training-free, multimodal classification framework that leverages zero-shot vision-language models to analyze disaster-related social media content without task-specific training. The framework employs a two-stage prompt-engineered pipeline using the locally deployable Mistral-Small-3.1-24B-Instruct model, performing binary informativeness detection followed by multiclass categorization into eight humanitarian categories through structured JSON output generation. Evaluation on the CrisisMMD dataset of 18,082 multimodal samples from seven natural disasters demonstrated binary F1 scores above 0.84 for both text and image informativeness detection and weighted F1 scores of 0.61 (text) and 0.72 (image) for humanitarian categorization. The framework generalizes consistently across all disaster types with minimal performance variance (standard deviation below 0.031) and operates entirely on local infrastructure without cloud dependencies, requiring only moderate GPU resources. By eliminating training data requirements, this approach enables immediate deployment during new disasters, demonstrating that zero-shot multimodal classification achieves practically relevant performance for real-time crisis response.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    North Macedonia interprofessional dementia care (NOMAD) – personalized care plans for people with dementia and caregiver psychoeducation delivered at home by interprofessional teams
    (Frontiers Media SA, 2024-04-10)
    Novotni, Gabriela
    ;
    Taneska, Marija
    ;
    ;
    Fischer, Julia
    ;
    Iloski, Svetlana
    Introduction The increasing number of people living with dementia and its burden on families and systems particularly in low- and middle-income countries require comprehensive and efficient post-diagnostic management. This study aimed to explore the acceptability and efficacy of a multi-professional case management and psychoeducation model (North Macedonia Interprofessional Dementia Care, or NOMAD) delivered by mobile teams for people with dementia and their caregivers in North Macedonia. Method We conducted a two-arm randomized controlled trial comparing the intervention with treatment as usual. Participants were recruited from 12 general practitioner (GP) offices in the Skopje region. The NOMAD intervention included the delivery of a personalized care plan over four home visits to dyads of people with dementia and their caregivers by a team including a dementia nurse and a social worker, in collaboration with GPs and dementia experts, and the introduction of a caregiver manual. We assessed caregivers' depressive symptoms, burden, and quality of life and the neuropsychiatric symptoms, daily living activities, and service utilization of people with dementia at baseline and follow-up; we also assessed the acceptability of the intervention by analyzing case notes and attendance rates. Results One hundred and twenty dyads were recruited and randomized to either the control (n = 60) or the intervention group (n = 60). At follow-up, caregivers in the intervention group had, on average, scores that were 2.69 lower for depressive symptoms (95% CI [−4.75, −0.62], p = 0.012), and people with dementia had, on average, 11.32 fewer neuropsychiatric symptoms (95% CI [−19.74, −2.90], p = 0.009) and used, on average, 1.81 fewer healthcare services (95% CI [−2.61, −1.00], p < 0.001) compared to the control group. The completion of the home visits was 100%, but the intervention's acceptability was underpinned by relationship building, GP competencies, and resources to support families with dementia. There were no differences in the caregivers' quality of life and burden levels or daily living activities in people with dementia. NOMAD is the first case management, non-pharmacological, and multi-professional intervention tested in North Macedonia. Discussion The trial showed that it is effective in reducing caregivers' depressive symptoms and neuropsychiatric symptoms in people with dementia and the burden on health and social care services, and it is acceptable for families. Implementing NOMAD in practice will require building primary care capacity and recognizing dementia as a national priority.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    On dementia, duties, and daughters. An ethical analysis of healthcare professionals being confronted with conflicts regarding filial duties in informal dementia care
    (Frontiers Media SA, 2024-10-01)
    Dogan, Vildan
    ;
    Taneska, Marija
    ;
    Novotni, Gabriela
    ;
    Iloski, Svetlana
    ;
    Background Existing literature on moral conflicts that healthcare professionals encounter in dementia care has explored, amongst others, issues related to autonomy, decision-making capacity, privacy, and more. Notably, conflicts related to healthcare professionals who support informal dementia caregiving and who are confronted with family members being overburdened with their care responsibly remains an underexplored topic in the current literature, particularly in the context of Low-and Middle-Income Countries. The present paper introduces such an encounter, presenting an ethical case analysis of a conflict that occurred during a larger research project conducted in North Macedonia. Case to be studied Due to the absence of formal care services that could have relieved an overburdened family caregiver, healthcare professionals felt compelled to reach out to the uninvolved adult daughters, requesting them to participate in their parents’ care. Wondering about whether their reaching out to the daughters might count as an attempt of pressure and undue interference, professionals conflicted over the appropriateness of their action. This paper follows up on their concern, ethically assessing the professionals’ action. To answer the question on whether the healthcare professionals acted appropriately or not, and to what extent, theories of filial duties are applied, embedding their action in the larger context of dementia care in North Macedonia. Results and conclusion It is argued that the lack of formal care services in North Macedonia is of utmost relevance to the conflict. Thus, the conclusion is that the ethical inappropriateness of the case is to be located not so much with the action of the healthcare professionals but with the state because of its failure to provide professional care services that allow healthcare professionals to take ethically sound actions to counteract overarching burdens that family members face when providing informal dementia care
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Cross‐cultural Adaptation and Psychometric Evaluation of the Macedonian C‐DEMQOL: A Carer Quality of Life Measure using data from the NOMAD Trial
    (Wiley, 2025-12)
    Ivanovska, Andrea
    ;
    Taneska, Marija
    ;
    Farina, Nicolas
    ;
    ;
    Iloski, Svetlana
    Background Caregivers of people with dementia face reduced quality of life, especially in Low‐ and Middle‐Income Countries, due to various systemic, social, and cultural challenges. Accurate measurement of their quality of life is essential for shaping policies and evaluating interventions. In North Macedonia, over 30,000 people with dementia rely mainly on family caregivers, who receive little to no support, resulting in significant stress and burden. However, no validated tools currently exist to measure caregivers’ quality of life. This study aimed to assess the psychometric properties of C‐DEMQOL, a reliable and valid tool for evaluating caregiver quality of life, in a North Macedonian context. Method The C‐DEMQOL was back‐translated, and three cognitive interviews with caregivers were conducted to confirm cultural relevance and face validity. Then it was administered to 120 dyads of individuals with dementia and their caregivers as part of the NOMAD (North Macedonia Interprofessional Dementia Care) trial. The internal consistency (Omega) was reported for the entire C‐DEMQOL measure and each subscale. Data were limited to baseline responses. Intraclass correlation was used to estimate the test‐retest reliability of control data by comparing baseline and follow‐up measurements. Convergent validity was assessed through correlations with the Patient Health Questionnaire (PHQ) and the Zarit Burden Inventory (ZBI), while discriminant validity was evaluated by examining correlations with the age and gender of the person with dementia. Result C‐DEMQOL demonstrated excellent internal consistency, with four of the five subdomains showing acceptable to excellent internal consistency. The total C‐DEMQOL score also demonstrated good test‐retest reliability, and most subdomains reached acceptable levels. Only the “Feeling supported” subdomain showed weaker internal consistency and test‐retest reliability. Convergent validity was indicated by moderate to large negative correlations with the PHQ and ZBI, while near‐zero correlations with the person with dementia's age and gender supported discriminant validity. Conclusion The Macedonian C‐DEMQOL is the first caregiver quality‐of‐life measure in Macedonian to demonstrate satisfactory validity and reliability. Further qualitative and quantitative analyses could help enhance the psychometric properties and optimize the final measure. Validating the C‐DEMQOL paves the way for accurately assessing the effectiveness of initiatives aimed at improving caregivers' quality of life.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Advancing Image Spam Detection: Evaluating Machine Learning Models Through Comparative Analysis
    (MDPI AG, 2025-05-30)
    Jamil, Mahnoor
    ;
    ;
    ;
    Creutzburg, Reiner
    ;
  • Some of the metrics are blocked by your 
    Item type:Publication,
    INTERNATIONAL CYBERSECURITY COOPERATION: THE CYBERMACS ERASMUS MUNDUS INITIATIVE FOR A SECURE GLOBAL DIGITAL FUTURE
    (IATED, 2025-03-03)
    Creutzburg, Reiner
    ;
    ;
    Dilan, Ebru
    ;
    ;
    Gücüyener, Ayhan
    In an increasingly interconnected world, the need for robust cybersecurity practices transcends national borders, making international collaboration essential. The CyberMACS ERASMUS Mundus initiative (http://cybermacs.eu) represents a groundbreaking effort to foster global partnerships and address the complexities of modern cyber threats. Launched as part of the ERASMUS Mundus program, this initiative brings together a consortium of leading universities, research institutions, and cybersecurity experts across Europe. It offers a multidisciplinary, highly internationalized approach to cybersecurity education and research, addressing current and future challenges in the rapidly evolving digital landscape. CyberMACS equips the next generation of cybersecurity professionals with the skills needed to combat emerging digital threats through the joint development of academic curricula, cross-border knowledge exchange, and hands-on training. A key feature of this initiative is the integration of COIL (Cooperative Online International Learning), which enables students to collaborate with peers and experts from different cultural and technical backgrounds across the globe. This approach enhances the learning experience and builds a strong network of international professionals dedicated to addressing global cybersecurity challenges. Using COIL methods, CyberMACS bridges geographical distances and cultural divides, fostering real-time collaboration and allowing students to engage in projects that reflect the interconnectedness of today’s digital world. In alignment with the Sustainable Development Goals (SDGs) the CyberMACS initiative promotes the development of resilient cybersecurity infrastructures and the creation of inclusive, fair, and transparent digital policies. Through its global approach to education, research, and policy development, CyberMACS addresses the pressing need for diverse and sustainable cybersecurity solutions that consider economic, social, and ethical impacts. The program emphasizes the importance of understanding the broader societal implications of cybersecurity, including its role in promoting global peace, security, and the responsible use of technology. This presentation will explore the goals, structure, and outcomes of the CyberMACS initiative, emphasizing its impact on strengthening international cooperation and advancing cybersecurity research, education, and policy on a global scale. Key areas of focus will include the role of international partnerships, the integration of diverse cultural and technical perspectives, and the contribution of the CyberMACS program to the global cybersecurity workforce. CyberMACS provides students a unique opportunity to pursue a Master’s degree in cybersecurity, incorporating diverse academic and practical perspectives through collaborative learning, cross-border exchanges, and COIL-based projects. The program equips students with advanced technical skills and fosters global critical thinking about cybersecurity's ethical, political, and social dimensions. Ultimately, this initiative is a model for strengthening international cooperation, advancing cybersecurity research, and cultivating a highly skilled, globally minded cybersecurity workforce. By promoting a deeper understanding of cybersecurity’s role in achieving the SDGs, the CyberMACS program helps prepare the next generation of leaders to face the challenges of a secure, sustainable digital future.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Mathematical Foundations and Implementation of CONIKS Key Transparency
    (MDPI, 2024-10-24)
    Mollakuqe, Elissa
    ;
    Dag, Hasan
    ;
    This research paper explores the CONIKS key management system’s security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. We conducted a comprehensive analysis of the underlying mathematical principles, focusing on cryptographic hash functions and digital signature schemes, and their implementation in the CONIKS model. Through the use of Merkle trees, we verified the integrity of the system, while zero-knowledge proofs were utilized to ensure the confidentiality of key bindings. We conducted experimental evaluations to measure the performance of cryptographic operations like key generation, signing, and verification with varying key sizes and compared the results against theoretical expectations. Our findings demonstrate that the system performs as predicted by cryptographic theory, with only minor deviations in computational time complexities. The analysis also reveals significant trade-offs between security and efficiency, particularly when larger key sizes are used. These results confirm that the CONIKS system offers a robust framework for secure and efficient key management, highlighting its potential for real-world applications in secure communication systems.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    On dementia, duties, and daughters. An ethical analysis of healthcare professionals being confronted with conflicts regarding filial duties in informal dementia care
    (Frontiers Media SA, 2024-10-01)
    Dogan, Vildan
    ;
    Taneska, Marija
    ;
    Novotni, Gabriela
    ;
    Iloski, Svetlana
    ;
    Background: Existing literature on moral conflicts that healthcare professionals encounter in dementia care has explored, amongst others, issues related to autonomy, decision-making capacity, privacy, and more. Notably, conflicts related to healthcare professionals who support informal dementia caregiving and who are confronted with family members being overburdened with their care responsibly remains an underexplored topic in the current literature, particularly in the context of Low-and Middle-Income Countries. The present paper introduces such an encounter, presenting an ethical case analysis of a conflict that occurred during a larger research project conducted in North Macedonia. Case to be studied: Due to the absence of formal care services that could have relieved an overburdened family caregiver, healthcare professionals felt compelled to reach out to the uninvolved adult daughters, requesting them to participate in their parents’ care. Wondering about whether their reaching out to the daughters might count as an attempt of pressure and undue interference, professionals conflicted over the appropriateness of their action. This paper follows up on their concern, ethically assessing the professionals’ action. To answer the question on whether the healthcare professionals acted appropriately or not, and to what extent, theories of filial duties are applied, embedding their action in the larger context of dementia care in North Macedonia. Results and conclusion: It is argued that the lack of formal care services in North Macedonia is of utmost relevance to the conflict. Thus, the conclusion is that the ethical inappropriateness of the case is to be located not so much with the action of the healthcare professionals but with the state because of its failure to provide professional care services that allow healthcare professionals to take ethically sound actions to counteract overarching burdens that family members face when providing informal dementia care.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Applications of homomorphic encryption in secure computation
    (F1000 Research Limited, 2024-07-29)
    Mollakuqe, Elissa
    ;
    Parduzi, Arber
    ;
    Rexhepi, Shasivar
    ;
    ;
    Jakupi, Samir
    Background Homomorphic encryption (HE) represents a pivotal innovation in modern cryptography, offering a pathway to secure computation on encrypted data. This paper embarks on a comprehensive exploration of HE's applications, elucidating its transformative potential in bolstering data security and privacy across various domains. Methods The research employs a mixed-methods approach to evaluate HE technologies. Quantitatively, it develops realistic datasets simulating healthcare and financial data, assessing HE's performance in encrypted computations. Various encryption schemes are rigorously tested for efficiency and accuracy under different conditions. Qualitatively, insights from expert interviews and case studies of HE implementations provide additional context on practical challenges and strategic benefits. Results The simulations and analyses showcase the efficiency, scalability, and security of HE techniques in diverse scenarios. The empirical evidence validates the real-world applicability of HE, demonstrating its versatility and efficacy in secure computation outsourcing, privacy-preserving data analysis, and secure multi-party computation. Conclusions This research paper highlights the transformative power of homomorphic encryption, advocating for its widespread adoption and integration. By bridging the gap between theoretical understanding and practical implementation, the paper contributes to advancing secure computation practices, addressing contemporary challenges in data security and privacy amidst evolving cybersecurity threats and the increasing ubiquity of sensitive data. In essence, this research serves as a beacon of insight into the future of data confidentiality and integrity, promoting HE as a crucial tool for revolutionizing the landscape of data security and privacy in an interconnected world.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Comparative analysis of identity management, access control, and authorization practices in public and private universities
    (2024-07-29)
    Mollakuqe, Elissa
    ;
    Background This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities. Identity management involves the meticulous management and control of user identities, encompassing the establishment and maintenance of user profiles, role assignments, and access privileges. Access control is the practice of defining and enforcing policies that govern who can access an IT system or application and which resources they can interact with. Authorization, meanwhile, determines the specific actions and privileges granted to users based on their roles and permissions. Methods To understand the variances in identity management and access control approaches, we conducted a comparative analysis between public and private universities. Our investigation scrutinized the user populations with access to university systems, the enforcement of access limitations, authentication methods, and password policies. Additionally, we examined the nuances of authorization processes, levels of authorization, access approval authorities, user status and role changes, unique user account management, account deletion procedures, user authentication methods, password complexity and expiration policies, password storage methods, and session termination policies. Results This study revealed that both public and private universities prioritize these security measures, with a common categorization of these processes. Nevertheless, there exist disparities, such as the inclusion of contractors and vendors in the user population at private universities, the manual deletion of user accounts in private institutions, and variations in password policies and storage methods. Private universities tend to enforce stricter password policies, employ more secure password storage methods, and implement automatic session termination features. Conclusions This research provides valuable insights into the practices and approaches adopted by public and private universities to safeguard their digital environments. The findings serve as a valuable resource for enhancing identity management, access control, and authorization protocols, enabling institutions to fortify their cybersecurity defenses in an ever-evolving threat landscape.