Faculty of Computer Science and Engineering

Permanent URI for this communityhttps://repository.ukim.mk/handle/20.500.12188/5

The Faculty of Computer Science and Engineering (FCSE) within UKIM is the largest and most prestigious faculty in the field of computer science and technologies in Macedonia, and among the largest faculties in that field in the region. The FCSE teaching staff consists of 50 professors and 30 associates. These include many “best in field” personnel, such as the most referenced scientists in Macedonia and the most influential professors in the ICT industry in the Republic of Macedonia.

Browse

Search Results

Now showing 1 - 10 of 74
  • Some of the metrics are blocked by your 
    Item type:Publication,
  • Some of the metrics are blocked by your 
    Item type:Publication,
    ACADEMIC STAFF AND STUDENT MOBILITY BENEFITS AND PROBLEMS, EXPERIENCES FROM TEMPUS SoCD PROJECT
    (2010-03)
    ;
    ;
    Grnarov, Aksenti
    Within the Tempus SoCD project, we conducted several academic staff and students mobility. In this paper, we present our experiences, benefits and problems that we have with mobility and its impact on Bologna process. We provide a comparison of learning opportunities in European countries in contrast to Macedonia as a partner country. We give mainly the students' perspective of mobility and their experience how mobility influenced their knowledge. This tempus project had a great impact on enhancing and synchronizing SoCD master program with its European partner universities through the study programs' improvement and especially with the establishment of new advanced SoCD laboratory.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Comparison Of Rectangular Matrix Multiplication With And Without Border Conditions
    (Faculty of Computer Science and Engineering, Ss. Cyril and Methodius University in Skopje, Macedonia, 2013-04)
    ;
    ;
    ;
    Djinevski, Leonid
    ;
    Matrix multiplication algorithms are very common and widely used for computation in almost any field. There are many implementations for matrix multiplication on different platforms and programming models. GPU devices in the recent years have become powerful computational units that have entered the segment of high performance computing. In this paper we are analysing two approaches for the matrix multiplication algorithm with and without border conditions for parallel GPU execution.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Wireless Ad Hoc Network Simulation in Cloud Environment
    (2014-02-12)
    Djinevski, Leonid
    ;
    ;
    ;
    In this paper we present the utilization of cloud computing environment for fast network simulation of wireless ad hoc networks in 3D terrains. Considering 3D terrains involves larger amounts of data, thus the network simulation requires more compute intensive calculations. In this paper we evaluate the usage of cloud computing environment for network terrain aware simulation in order to optimally utilize the available hardware resources. Our experimental results show that there in not a significant decrease of performance when migration to a private cloud environment.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks
    (Springer Netherlands, 2010)
    ;
    ;
    ;
    ;
    Kocarev, Ljupcho
    Complex networks have been an up-and-coming exciting field in the realm of interactions. With their widespread use appearing on the horizon it is ever more vital to be able to measure their vulnerability as a function of their topology. Precisely, discovering vulnerable links, disposed to attacks, can help in hardening these links and by that providing more secure and reliable network structure. This paper addresses the link vulnerability of different topologies of complex networks such as: random networks, geographic random networks, small world networks and scale-free networks. We introduce measure for vulnerability of complex networks, and prove by simulations that network vulnerability heavily depends on the network topology.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Performances of clustered ad hoc networks on 3D terrains
    (ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2009-03-02)
    ;
    ;
    Vuckovik, Marija
    Propagation prediction algorithms which use terrain information are typically used for the design of modern wireless systems. Therefore, it is essential that when analyzing the performances of ad hoc networks we observe the network in a natural 3D terrain and we use an appropriate propagation model. In this paper we explain our extension of the NS-2 simulator using Digital Elevation Model data and terrain aware propagation model. Because of the natural emergence of clustering in the network of users, we also study the relationship between the clustering in the ad hoc networks and different terrain profiles. The simulations show that, when the network clusters are accompanied with related terrain contours, the observed network performances demonstrate measurable enhancement.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Analysis of small world phenomena and group mobility in ad hoc networks
    (Springer Netherlands, 2007)
    ;
    ;
    Grnarov, Aksenti
    The main application of wireless mobile ad hoc networks is to offer services for situations wherein groups of people come together and share information. The groups of people that use the ad hoc network form some kind of social network. In this paper an analysis of the performances of mobile ad hoc networks is performed when taking into consideration its social characteristics through the small world phenomena of the application layer and usage of group-based mobility. The simulations show that the social interconnection between the network users has an extreme influence on the network performances. The results bring forth a different view on the real life deployment of ad hoc networks when compared to the poor performances of the purely randomized scenarios.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Ad hoc networks connection availability modeling
    (ACM, 2004-10-04)
    ;
    ;
    Marija Efnuseva,
    ;
    Grnarov, Aksenti
    One of the most important issues for mobile ad hoc networks is to know the availability of the system. In this paper we propose a generalized connection availability model based on real measurable parameters that concern the performances of mobile ad hoc networks. Detailed validation of the connection availability model is presented through simulations. The proposed model can be used for analysis or design of an ad hoc network that needs to satisfy a given connection availability level.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Ad Hoc Networks Routing Protocols Efficiency With Respect To Connection Availability
    (2004-06-16)
    ;
    ;
    Cilku, Bekim
    ;
    Grnarov, Aksenti
    One of the most important issues in the main applications of mobile ad hoc networks (as rescue and military operations) is to know the availability of the system. We developed an analytical model in order to investigate the routing protocol efficiency using real measurable parameters that concern the performances of mobile ad hoc networks. We analyzed the routing protocol efficiency with respect to connection availability for rescue mission example application.
  • Some of the metrics are blocked by your 
    Item type:Publication,
    Ad Hoc Network Simulators Features
    (Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss. Cyril and Methodius University in Skopje, Macedonia, 2003)
    ;
    Trendafilova, I
    ;
    ;
    Grnarov, Aksenti
    The deployment of wireless applications or protocols in the context of MANETs, often requires stepping through a simulation phase. There are several popular simulators, such as OPNET Modeller, GloMoSim or NS-2. Since NS-2 is more frequently used in worldwide network societies we present our experiences gained with the use of NS-2 for simulations of wireless mobile ad hoc networks. Facing the problem of poor documentation for ad hoc networks, our research resulted in reach documentation for NS-2 trace files and behaviour of ad hoc networks. We observed the flexibility of NS-2 simulator, by the means of adding new application layers, change of existing routing protocols, and incorporating various extensions created outside the NS-2 development team.