International Conference on Informatics and Information Technologies Collection home page

Logo

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 41
PreviewTitleAuthor(s)Issue DateType
CIIT2020_paper_3.pdf.jpgDesign optimization of Earthing Transformers based on Differential Evolution AlgorithmsSalkoski, Rasim; Chorbev, Ivan8-May-2020Proceeding article
CIIT2020_paper_2.pdf.jpgDesign optimization of Rectifier TransformersSalkoski, Rasim; Chorbev, Ivan8-May-2020Proceeding article
CIIT2020_paper_38.pdf.jpgQuality of Online Teaching in Higher Education – the Case of South East European University (SEEU), North MacedoniaVeronika Kareva; Daniela Kirovska-Simjanoska8-May-2020Proceeding article
CIIT2020_paper_25.pdf.jpgExploratory data analysis and statistical inference for student`s results on several extensive courses at Faculty of computer science and engineeringLenche Jovova8-May-2020Proceeding article
CIIT2020_paper_26.pdf.jpgThe effects of flexible work in the IT industryMile Davitkovski; Smilka Janeska Sarkanjac; Branislav Sarkanjac8-May-2020Proceeding article
CIIT2020_paper_24.pdf.jpgDevelopment of educational game for children with dyslexiaAleksandra Sholdova8-May-2020Proceeding article
CIIT2020_paper_22.pdf.jpgUsing Educational Escape Room to Increase Students’ Engagement in Learning Computer ScienceGeorgina Dimova; Maja Videnovik; Vladimir Trajkovik8-May-2020Proceeding article
CIIT2020_paper_19.pdf.jpgMapping of Automobile Dealership Outlets in SkopjeSasho Nikudinoski; Andreja Naumoski; Elena M. Jovanovska8-May-2020Proceeding article
CIIT2020_paper_33.pdf.jpgScanning of services based on E-Governance Macedonia 2020Kitanov, Boshko; Ibraimi, Gzim; Gusev, Marjan8-May-2020Proceeding article
CIIT2020_paper_45.pdf.jpgSecure ECash Payment Method Based on Pseudo-Random Functions in Centralized and Decentralized SystemsLina Lumburovska; Vesna Dimitrova,; Stefan Andonov; Keti Isajloska and Jovana Dobreva; Jovana Dobreva8-May-2020Proceeding article
CIIT2020_paper_11.pdf.jpgFog Necessity Over Cloud Computing For Healthcare ApplicationsBeyza Ali; Natasa Paunkoska Dimoska; Ninoslav Marina8-May-2020Proceeding article
CIIT2020_paper_4.pdf.jpgA Note on a Successful WEP AttackVesna Dimitrova; Stefan Pavlov8-May-2020Proceeding article
CIIT2020_paper_12.pdf.jpgA survey of covert channels: Benign and malicious usage, conditions for creation and countermeasuresEma Stamenkovska; Vesna Dimitrova8-May-2020Proceeding article
CIIT2020_paper_30.pdf.jpgArtificial Intelligence: Simulating Human Emotion and Surpassing Human IntelligenceFilemon Jankuloski; Adrijan Bozinovski; Veno Pacovski8-May-2020Proceeding article
CIIT2020_paper_41.pdf.jpgWeekly Analysis of Moodle Log Data in RStudio for Future Use in PredictionNeslihan Ademi; Suzana Loshkovska8-May-2020Proceeding article
CIIT2020_paper_47.pdf.jpgSecurity Situation in Republic of Macedonia Using Semantic Algorithms for Open DataZivka Jovevska; Daniel Jovevski; Leonid Djinevski8-May-2020Proceeding article
CIIT2020_paper_13.pdf.jpgEducational robots in preschool educationTodorovska, Kristina; Madevska Bogdanova, Ana8-May-2020Proceeding article
CIIT2020_paper_23.pdf.jpgA novel platform for sharing and renting clothing to reduce environmental pollutionAna Todorovska; Evgenija Krajchevska; Dimitar Trajanov; Sasho Gramatikov8-May-2020Proceeding article
CIIT2020_paper_6.pdf.jpgObject detection and semantic segmentation of fashion imagesSandra Treneska; Sonja Gievska8-May-2020Proceeding article
CIIT2020_paper_10.pdf.jpgBlockchain-based model for authentication, authorization, and immutability of healthcare data in the referrals processGoce Gavrilov; Orce Simov; Vladimir Trajkovik8-May-2020Proceeding article
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 41