Faculty of Computer Science and Engineering
Permanent URI for this communityhttps://repository.ukim.mk/handle/20.500.12188/5
The Faculty of Computer Science and Engineering (FCSE) within UKIM is the largest and most prestigious faculty in the field of computer science and technologies in Macedonia, and among the largest
faculties in that field in the region.
The FCSE teaching staff consists of 50 professors and 30 associates. These include many “best in field” personnel, such as the most referenced scientists in Macedonia and the most influential professors in the ICT industry in the Republic of Macedonia.
Browse
97 results
Search Results
- Some of the metrics are blocked by yourconsent settings
Item type:Publication, Comparing the Use of Simu5G and 5G‐Sim‐V2I/N Modules When Analysing the Edge Computing Resource Management Efficiency(Wiley, 2025-04-29) ;Bernad, Cristina ;Gilly, Katja; ;Thomas, NigelRoig, Pedro JuanPerformance analysis of smart edge computing orchestration algorithms should be done using a realistic urban simulation environment wherein mobile users are accessing their edge services using a readily available 5G network. In this paper, we investigate the influence of using two different 5G simulation frameworks, which are provided as readily available possibilities to model the access network used to deliver edge computing services. The results show that although both frameworks aim to implement the 5G specifications and are deemed suitable choices for simulating a 5G smart city vehicular environment, there can be significant differences in the obtained macro results. The analysis of the simulation results from two identical studies where the only change is the choice of a 5G simulation framework shows that the obtained average end-to-end edge service latency as perceived by edge users can differ up to more than 21 times. The choice of 5G simulation framework is also reflected in the overall generated workload for the edge computing orchestration leading to over 25% more migrations when using 5G-Sim-V2I/N compared to Simu5G. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, A novel methodological approach for learning cybersecurity topics in primary schools(Springer Science and Business Media LLC, 2025-06-24); ; - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Towards smart 6G: Mobility prediction for dynamic edge services migration(Elsevier BV (Netherlands), 2026-02-01) ;Cristina Bernad; ;Katja Gilly; - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Performance comparison of LSTM-based handover prediction models for 6G MEC services(Elsevier BV, 2026-06) ;Bernad, Cristina; ;Gilly, Katja; - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Federated architecture for serverless platforms aimed at transparent execution in the edge-cloud continuum(Inderscience Publishers, 2025); - Some of the metrics are blocked by yourconsent settings
Item type:Publication, - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Using peer-learning and game-based instruction for achieving long-lasting knowledge of cybersecurity in primary schools(IEEE, 2024-10-14) ;Videnovik, Maja ;Trajkovik, Vladimir ;Vold, Tone ;Kiønig, LindaMadevska Bogdanova, AnaAs the world becomes increasingly dependent on technology, cybersecurity education has become more important than ever before. However, teaching cybersecurity to primary school students faces several challenges, including limited resources, lack of specialized teachers, and age-appropriate content. In this paper, we propose a new and innovative approach for teaching cybersecurity to primary school students, which addresses these challenges. The proposed approach, implemented with 339 students in five primary schools in North Macedonia, combines peer learning and a game-based approach to develop students’ communication, collaboration, and critical thinking skills, and create engaging learning environments. Upper-grade students deliver lectures and create educational games for their lower-grade peers, fostering learning communities where students share their knowledge and experiences, and learn from one another’s diverse perspectives. The game-based approach is used to create interactive and engaging learning environments where students design or play games to develop their critical thinking skills and empower their cybersecurity knowledge. Initial evaluation results after one year of implementing this cybersecurity learning concept, carried out with 124 students from three participating schools, indicate that students exposed to peer learning and a game-based approach could retain their knowledge, with their knowledge levels outperforming those of students who received traditional classroom instruction. Moreover, students have positive attitudes toward implemented approach and believe that it has effectively enhanced their communication, collaboration, and critical thinking skills while creating exciting and engaging learning environments. These findings suggest that this new and innovative approach has the potential to effectively teach cybersecurity to primary school students, fostering long-lasting knowledge and creating engaging learning environments. Its implementation can be easily adopted in different educational contents and surroundings. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, A Reusable Approach to Network Service Orchestration(2024-12-10) ;Lapacz, Roman; ;Loui, Frederic ;Szewczyk, TomaszAdamski, MarcinThe Network Infrastructure as Code paradigm empowers network engineers to create a repository of configuration templates and automation scripts, facilitating the automated configuration, management, and monitoring of the network infrastructure and services. Moreover, applying standardised approaches to high-level network processes, utilising a common data model for network description, and employing standardised open APIs for components, can offer reusability of the implementation of automated and orchestrated network solutions. In its recent activities, the GÉANT Global Platform for Labs (GP4L) group is actively collaborating with the Polish national research and education network (NREN) PIONIER focusing on developing a generalised, reusable approach to orchestrating service provisioning. By abstracting the process to define common steps in service provisioning, the goal is to provide a collaborative blueprint that other NRENs can adopt. The modular nature of the approach allows the creation of a repository of processes, subprocesses, and elementary tasks that can be reused across the community. This article presents the concept of developing generalised reusable processes and discuss challenges and decisions while working on the PIONIER use case. Aiming for reusability and sharing lessons learned, it builds towards a community of network automation and orchestration activities. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Full‐mesh VPN performance evaluation for a secure edge‐cloud continuum(2024-08) ;Kjorveziroski, Vojdan ;Bernad, Cristina ;Gilly, KatjaThe recent introduction of full-mesh virtual private network (VPN) solutions which offer near native performance, coupled with modern encryption algorithms and easy scalability as a result of a central control plane have a strong potential to enable the implementation of a seamless edge-cloud continuum. To test the performance of existing solutions in this domain, we present a framework consisted of both essential and optional features that full-mesh VPN solutions need to support before they can be used for interconnecting geographically dispersed compute nodes. We then apply this framework on existing offerings and select three VPN solutions for further tests: Headscale, Netbird, and ZeroTier. We evaluate their features in the context of establishing an underlay network on top of which a Kubernetes overlay network can be created. We test pod-to-pod TCP and UDP throughput as well as Kubernetes application programming interface (API) response times, in multiple scenarios, accounting for adverse network conditions such as packet loss or packet delay. Based on the obtained measurement results and through analysis of the underlying strengths and weaknesses of the individual implementations, we draw conclusions on the preferred VPN solution depending on the use-case at hand, striking a balance between usability and performance. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, A novel methodological approach for learning cybersecurity topics in primary schools(Springer Science and Business Media LLC, 2024-08-24) ;Videnovik, Maja; Trajkovik, Vladimir
