Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Mitko Bogdanoski"'
Publikováno v:
Journal of Computer and Forensic Sciences. 1:55-75
This paper proposed an approach to mathematical modeling of the file system performance in a hypervisor-based virtual environment, with special focus on the file system pair interactions. The main goal of this research is to conduct an in-depth analy
Publikováno v:
Journal of Computer and Forensic Sciences. 1:7-16
This paper proposes an approach to evaluate spoken words based on lip movements without accompanying sound signals using convolutional neural networks. The main goal of this research is to prove the efficiency of neural networks in the field, where a
Autor:
Monika Kachurova, Mitko Bogdanoski
The future of mobile and Internet technologies envisions advances beyond the existing scope of science. The concepts of automatic driving and machine-type communication are quite sophisticated and require the upgrading and improvement of the current
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cd7f4983ec120da5e43e39b9b26bd0bd
https://doi.org/10.3233/nhsdp220007
https://doi.org/10.3233/nhsdp220007
Autor:
Dimitar Bogatinov, Mitko Bogdanoski
The progress of information and communication technology has a positive impact, and it is a part of our everyday activities. In the same time, it presents an attack vector and vulnerability used by attackers to generate advanced cyber threats. Attack
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a6067b5abd5d103241701599966d37e4
https://doi.org/10.3233/nhsdp220006
https://doi.org/10.3233/nhsdp220006
Autor:
Z Mitko Bogdanoski, G Komlen Lalović
Publikováno v:
Vojnotehnički Glasnik, Vol 69, Iss 3, Pp 676-686 (2021)
Introduction/purpose: The main purpose of this paper is to present a novel Java GUI - based software application for a comparative analysis of fingerprint and iris biometrics. Methods: The first part of this work is realized in Java Programming langu
Autor:
Mitko Bogdanoski, Trajche Kasapinov
Information infrastructure – computers, embedded devices, networks and software systems – is vital for proper functioning of every sector: chemical, commercial, telecommunications, critical manufacturing, dams, defense production, critical servic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::92847fc3f9b49856fe33880fe8081cc3
https://doi.org/10.3233/nicsp220022
https://doi.org/10.3233/nicsp220022
The security of the Internet of Things (IoT) is a key worry since it deals with personal data that must be dependable and can be used dangerously to control and manipulate device operations. In addition, the data generating process is heterogeneous,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::72c57db10312370d86e16426ebc552a9
https://doi.org/10.3233/nicsp220023
https://doi.org/10.3233/nicsp220023
Publikováno v:
Journal of Engineering Science and Technology Review. 14:91-101
Autor:
Mitko Bogdanoski, Aleksandar Risteski, Metodi Hadji-Janev, Tomislav Shuminoski, Toni Janevski
Publikováno v:
Acta Polytechnica Hungarica. 17:27-46
Autor:
Metodi Hadji-Janev, Mitko Bogdanoski
Publikováno v:
Security Journal. 30:39-59
In the digital age, contemporary international security has dramatically changed and continues to rapidly evolve. These new security dynamics after the Cold War have caused a marked change in global power structures. Modern information and communicat