Faculty of Computer Science and Engineering
Permanent URI for this communityhttps://repository.ukim.mk/handle/20.500.12188/5
The Faculty of Computer Science and Engineering (FCSE) within UKIM is the largest and most prestigious faculty in the field of computer science and technologies in Macedonia, and among the largest
faculties in that field in the region.
The FCSE teaching staff consists of 50 professors and 30 associates. These include many “best in field” personnel, such as the most referenced scientists in Macedonia and the most influential professors in the ICT industry in the Republic of Macedonia.
Browse
31 results
Search Results
- Some of the metrics are blocked by yourconsent settings
Item type:Publication, Reducing the number of instructions(IEEE, 2000-06-13); ; ;Popovski, GMitrevski, PThe purpose of this article is to reduce the number of instructions while executing in processor. We analyse memoiy address dependent instructions and eliminate the ada'ress generation processing if the address was previously calculated For standard RISC? WIWand inorder superscalar processor we introduce a solution where the MI (Reduction of Memory Instructions) Algorithm is perfomzed in the compile stage and aa'hess dependent instructions do not enter the processor at all. For out-qfdr&r superscalm processors we introduce two solutions, theJirst one when these instructions me not issued at all and the second solution when these instructions are issued only in a reservation station without execution unit. All these solutions improve the behaviour of thc processor for at least 10% since the processor does not executes these instructions. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Exploring the Register Renaming Design Space Using the Supersim Simulator(Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss. Cyril and Methodius University in Skopje, Macedonia, 2001); Usage of simulators in the process of processor development is very common thing. Simulators are used mainly in designing new techniques to improve performances. Main purpose of all these techniques is extracting more parallelism by resolving dependencies. Register renaming is a mechanism for coping with false data dependencies. Exploring the design space for register renaming gives plenty of opportunities to improve the overall performance. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Logic Circuit Visualization(Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss. Cyril and Methodius University in Skopje, Macedonia, 2001) ;Markovski, Jasen; There are a lot of tools for logic circuit design and presentation. These applications have a lot of features, although they can be applied after the user draws the circuit. In this article we give an algorithm for logic circuit visualization for known connections between the elements. The logic circuit is defined by the connections between the elements regardless the circuit type. The algorithm is presented by flowchart and its application in real world application is shown. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Simulators for courses in advance computer architecture(2005); The usage of simulator in teaching computer architecture courses has proven to be the most acceptable way, especially when the simulators offer rich graphical and visual representation of the architecture. In this paper we present several simulators used to teach ILP (Instruction Level of Parallelism) courses. The simulators cover wide area of concepts such as internal logic organization, datapath, control, memory behavior, register renaming, branch prediction, and overall out of order execution. Special dedicated simulators cover details in internal organization like Tomasulo approach and scoreboard for organization of reservation stations. This innovative approach in laboratory exercises is used for advanced ILP course. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Prediction and speculation techniques in ILP(IEEE, 2000-06-13) ;Mitrevski, P; In this article we review the concepts of branch, value and meniory prediction used in conjunction with control and Liata speculative execution in superscalm processors. Since the amount of available instruction level parallelism within a basic block is relatively small, control speculation techniques increase the number of candidate instructions for execution. Moreover, the integration of value and memory prediction in superscalar processors introduces a new kind of speculative execution. Data Jpeculation techniques allow the processor to execute instructions beyond the limit of true data RAW depemkncies. We identifi data speculation as a natural extension of control speculation and capture their similarities and diflerences. We also raise a new question: is the analytical mockelling approach really infeasible? - Some of the metrics are blocked by yourconsent settings
Item type:Publication, MOBILE PAYMENT’S SECURITY(2002-12) ;Antovski, LjupchoMobile payments play an important role in retail payments. Mpayments are defined as payments carried out by mobile phone. This is especially promising with the third generation (3G) networks. M-commerce as a wide area could be divided into mobile E-commerce and M-trade area. Different models of mobile payments are proposed considering the physical disposition. A brief research on the state of the market is given to present a framework for possible solutions. Financial service provider is essential mediator among customers, merchants and banks. The iMS specification proposed in this paper enables mobile payments with one button click. Different levels of security have to be implemented for small, medium and large transaction of funds. The security algorithms are lightweight in correlation with the device’s processing power. The proposed models are simple, secure and scalable. Future solutions would merge m-payment and e-payments infrastructures in future proof architectures. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Wireless and Mobile Services(Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss. Cyril and Methodius University in Skopje, Macedonia, 2003) ;Antovski, LjupchoIn Europe and Asia, transactions of mobile commerce and services are reaching billions of dollars per year. The European mobile market is expected to range between EUR 7,8 billion and EUR 27,4 billion in 2006, with a median forecast of EUR 18,9 billion. Successful new market creation requires that a set of convergent forces drive all players in the same relevant direction. Seven major forces have been identified that need to be in place to stimulate the feedback loops. Many content providers currently base their services on SMS, rather than WAP. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, M-Government(2004) ;Antovski, Ljupcho; Mitrevski, PeceM-government is defined as the strategy and its implementation involving the utilization of all kinds of wireless and mobile technology, services, applications and devices for improving benefits to the parties involved in e-government. The main effort of m-government is to become a complement to egovernment. The 3P Value Model for m-government application has three dimensions of evaluations: prime value, pleasure value and post value. There are four major factors concerning citizens and the use m-government applications: awareness, ease of use, real added-value/benefit and price. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, M-gov: The evolution method(2006-08) ;Antovski, LjupchoThe current state of the art in e-government and m-government inMacedonia is presented in the first part of the paper. The second part concentrates on the M-GOV platform. The M-GOV (Mobile Services for Government) project is a research and innovation project at the Institute of Informatics in Skopje, designed to encourage the access to new mobile and wireless public electronic services. As a common mobile public services framework, it incorporates the following five principles: Interoperability, Security, Openness, Flexibility and Scalability. It is a SOA (Service Oriented Architecture). The M-GOV architecture is formed of three major components: Citizens access devices, Service Discovery Directory and the Collection of public electronic services from various sources. The citizens can access the electronic public services from anywhere, anytime from any mobile Internet-connected device. Key points of innovative ideas and views for further research and development in this field are presented in the paper. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, WIRELESS AND MOBILE MULTI INPUT INFORMATION SYSTEM(Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss. Cyril and Methodius University in Skopje, Macedonia, 2002-12) ;Antovski, Ljupcho ;Petkovski, NThe system emphasized in this paper is a multi-channel system that can be accessed trough different channels as WEB, WAP, SMS and IVR for either results submission or overview. The system offers platform independent access to XML web services over predefined SOAP messages. The results gathering system is reliable, secure and scalable. It is appropriate for broad scope of analyses for elections, surveys and research. It is built on the .NET platform over n-tier architecture. An overview is given concerning the response time and the maximum throughput of the system. The congestion factors are discussed in more specific manner. The experience from real work is analytically presented. The paper also deals with the social and political aspects of the system.
