Toni Stojanovski | University for Information Science and Technology (original) (raw)

Uploads

Papers by Toni Stojanovski

Research paper thumbnail of ARTICLE INFO Article data

Research paper thumbnail of On Nonlinear Phenomena in Linear Arrays of Electrical Circuits

Research paper thumbnail of Increasing the information-theoretic secrecy by cooperative relaying and jamming

2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2012

ABSTRACT The use of cooperation to increase the information-theoretic secrecy in a decentralized ... more ABSTRACT The use of cooperation to increase the information-theoretic secrecy in a decentralized ad-hoc wireless network is investigated. In particular, four cases of cooperative relaying are analyzed and compared. These cases include the no-cooperation case, the case with single-hop cooperation with multiple relays, the case with single-hop cooperation with the strongest relay, and finally the case of multi-hop cooperation with the strongest relay. From the results, it is seen that cooperation increases the probability of a positive secrecy rate between two nodes in a network with friendly (cooperative) nodes and eavesdropping nodes. The improved information-theoretic secrecy increases the probability that two nodes can share a secret message with perfect secrecy using a multi-hop route of trusted nodes. Cooperative jamming is also studied, and it is observed that very often it is more beneficial to use friendly nodes for cooperative jamming than cooperative relaying. Finally, a combination of cooperative relaying and jamming is considered.

Research paper thumbnail of Digital chaotic encoding of digital information

Proceedings of 1997 IEEE International Symposium on Circuits and Systems. Circuits and Systems in the Information Age ISCAS '97

Research paper thumbnail of Security in Cloud Computing: Issues and Opportunities for Businesses and Governments

Cloud Computing: Definition, Model, Architecture. The rationale. Main obstacles/Security issues. ... more Cloud Computing: Definition, Model, Architecture. The rationale. Main obstacles/Security issues. Human Factor. Solutions.

Research paper thumbnail of Stock Pricing Model aided by Blind Component Processing

ICIC Express Letters

This manuscript presents a novel approach based on blind component processing to estimate the par... more This manuscript presents a novel approach based on blind component processing to estimate the parameters of the jump-diffusion model for stock pricing processes used in finance theory. While emerging markets suffer by huge frequent changes and well developed markets bubble burst effect, the resultant heavy tails violate the assumption of normality of stock data for both types of market. This research work, by assuming a linear time in-variance behavior for stock options, removes the heavy tails at blind component level by deploying blind component processing. The stock with heavy tails removed in components matches better with available stock pricing models because of their higher normality. Numerical evaluations approve the validation of the proposed method in bringing higher normality to stock pricing data.

Research paper thumbnail of Increasing Information Secrecy with Poisson Distributed Jammers

ABSTRACT Transmission of confidential messages over wireless networks between a transmitter and a... more ABSTRACT Transmission of confidential messages over wireless networks between a transmitter and a receiver in the presence of illegitimate receivers called eavesdroppers is an active area of research. Cooperation by jamming can improve informationtheoretic secrecy in wireless networks. However, randomly chosen jammers can have a negative impact on the secrecy capacity. This raises the question about the configuration of the jammers which minimizes the negative impact on the secrecy capacity. For this purpose, we consider a network configuration with two legitimate communicating parties, one eavesdropper and randomly positioned jammers. The jammers follow a spatial Poisson process. Only the jammer closest to the eavesdropper is active. For a simplified model of this network configuration, we derive analytical results on the size of the secrecy region.

Research paper thumbnail of Ericsson AB, Dubai, United Arab Emirates

Research paper thumbnail of Univ. for Inf. Sci. & Technol. St. Paul the Apostle, Ohrid, Macedonia

Research paper thumbnail of Chaos synchronization using sporadic driving

Physica D: Nonlinear Phenomena, 1997

Research paper thumbnail of Chaos synchronization using sporadic driving

Physica D: Nonlinear Phenomena, 1997

Research paper thumbnail of Secure wireless communications via exhaustive cooperative jamming against a single eavesdropper

2012 20th Telecommunications Forum (TELFOR), 2012

Abstract The use of multiple network configurations for cooperative jamming with the aim to incre... more Abstract The use of multiple network configurations for cooperative jamming with the aim to increase the region with information-theoretic secrecy is analysed. The case with a single eavesdropper at an unknown location is investigated. A pre-master key message is broken into multiple data blocks, which are then sent for different network configurations. Provided that the secrecy capacity for a given eavesdropper's position is positive for at least one configuration, the corresponding data block can be securely delivered to the receiver, and ...

Research paper thumbnail of Pattern recognition with OpenCL heterogeneous platform

2012 20th Telecommunications Forum (TELFOR), 2012

Abstract OpenCL platform provides unified development environment for various multicore processor... more Abstract OpenCL platform provides unified development environment for various multicore processors. In this paper, we evaluate the OpenCL framework for application in pattern recognition. We have selected the most common algorithm for Artificial Neural Networks (ANN) training—the backpropagation algorithm for parallelization with OpenCL because of its high demand for processing resources. We will show a SIMD version of the algorithm suitable for OpenCL implementation. Our OpenCL implementation showed 25.8 speedup ...

Research paper thumbnail of An application of synchronized chaotic dynamic arrays

Physics Letters A, 1996

We propose a novel approach for constructing synchronized chaotic arrays and demonstrate its appl... more We propose a novel approach for constructing synchronized chaotic arrays and demonstrate its application for encoding messages. When applied to the problem of communicating information signals, in this case, the transmitted signal is a hyper-chaotic. Therefore, this approach provides an efficient encoding of the information and may be useful in private communication applications.

Research paper thumbnail of Linear conjugacy of vector fields in Lur'e form

IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 1996

Research paper thumbnail of A Study of the MD5 Collisions

eurm.edu.mk

Abstract—MD5 hash function was designed as an improvement and strengthened successor of the MD4 h... more Abstract—MD5 hash function was designed as an improvement and strengthened successor of the MD4 hash function by Ron Rivest [4]. It quickly gained popularity, but not long after its publication it was subjected to a number of attacks which discovered many weaknesses [1][2][3]. ...

Research paper thumbnail of Building manageable web applications using Software Factory

ict-act.org

Abstract. Software industry is still based on manufactory production, and most of the programming... more Abstract. Software industry is still based on manufactory production, and most of the programming code is still hand-crafted. Considerable enhancements in the technologies, methods and techniques in software development occurred in the past 30 years, and reuse and productivity have increased in the past 20 years due to the introduction of the object-oriented programming and serviceoriented architecture. Still, we are very far away from the ultimate goal of industrialization in software production, something which has been ...

Research paper thumbnail of Express Letters

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: FUNDAMENTAL THEORY AND APPLICATIONS, Jun 1, 1997

Abstract—The concept of time-discontinuous coupling of two identical chaotic systems called spora... more Abstract—The concept of time-discontinuous coupling of two identical chaotic systems called sporadic coupling is addressed. The conditions for the occurrence of synchronization between two sporadically coupled chaotic systems are given. Amplitude quantization of the driving signal in addition to the sporadic coupling allows digital exchange of digital information signals between the sporadically coupled chaotic systems. Index Terms—Chaos, chaos synchronization, digital coding.

Research paper thumbnail of Mutual Applications of Chaos and Communications

Research paper thumbnail of Method for generating a random number sequence and a relative random bit generator

Abstract: A method for generating a random number sequence whose randomness properties are determ... more Abstract: A method for generating a random number sequence whose randomness properties are determined a priori, comprises the steps of defining a parametric map; calculating, in function of parameters of the map, the entropy and the Lyapunov exponent of random number sequences obtainable using the parametric map; identifying at least a set of values of parameters for which the entropy and the Lyapunov exponent are positive numbers the map has no attracting point; assigning a pre-established value as a first ...

Research paper thumbnail of ARTICLE INFO Article data

Research paper thumbnail of On Nonlinear Phenomena in Linear Arrays of Electrical Circuits

Research paper thumbnail of Increasing the information-theoretic secrecy by cooperative relaying and jamming

2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2012

ABSTRACT The use of cooperation to increase the information-theoretic secrecy in a decentralized ... more ABSTRACT The use of cooperation to increase the information-theoretic secrecy in a decentralized ad-hoc wireless network is investigated. In particular, four cases of cooperative relaying are analyzed and compared. These cases include the no-cooperation case, the case with single-hop cooperation with multiple relays, the case with single-hop cooperation with the strongest relay, and finally the case of multi-hop cooperation with the strongest relay. From the results, it is seen that cooperation increases the probability of a positive secrecy rate between two nodes in a network with friendly (cooperative) nodes and eavesdropping nodes. The improved information-theoretic secrecy increases the probability that two nodes can share a secret message with perfect secrecy using a multi-hop route of trusted nodes. Cooperative jamming is also studied, and it is observed that very often it is more beneficial to use friendly nodes for cooperative jamming than cooperative relaying. Finally, a combination of cooperative relaying and jamming is considered.

Research paper thumbnail of Digital chaotic encoding of digital information

Proceedings of 1997 IEEE International Symposium on Circuits and Systems. Circuits and Systems in the Information Age ISCAS '97

Research paper thumbnail of Security in Cloud Computing: Issues and Opportunities for Businesses and Governments

Cloud Computing: Definition, Model, Architecture. The rationale. Main obstacles/Security issues. ... more Cloud Computing: Definition, Model, Architecture. The rationale. Main obstacles/Security issues. Human Factor. Solutions.

Research paper thumbnail of Stock Pricing Model aided by Blind Component Processing

ICIC Express Letters

This manuscript presents a novel approach based on blind component processing to estimate the par... more This manuscript presents a novel approach based on blind component processing to estimate the parameters of the jump-diffusion model for stock pricing processes used in finance theory. While emerging markets suffer by huge frequent changes and well developed markets bubble burst effect, the resultant heavy tails violate the assumption of normality of stock data for both types of market. This research work, by assuming a linear time in-variance behavior for stock options, removes the heavy tails at blind component level by deploying blind component processing. The stock with heavy tails removed in components matches better with available stock pricing models because of their higher normality. Numerical evaluations approve the validation of the proposed method in bringing higher normality to stock pricing data.

Research paper thumbnail of Increasing Information Secrecy with Poisson Distributed Jammers

ABSTRACT Transmission of confidential messages over wireless networks between a transmitter and a... more ABSTRACT Transmission of confidential messages over wireless networks between a transmitter and a receiver in the presence of illegitimate receivers called eavesdroppers is an active area of research. Cooperation by jamming can improve informationtheoretic secrecy in wireless networks. However, randomly chosen jammers can have a negative impact on the secrecy capacity. This raises the question about the configuration of the jammers which minimizes the negative impact on the secrecy capacity. For this purpose, we consider a network configuration with two legitimate communicating parties, one eavesdropper and randomly positioned jammers. The jammers follow a spatial Poisson process. Only the jammer closest to the eavesdropper is active. For a simplified model of this network configuration, we derive analytical results on the size of the secrecy region.

Research paper thumbnail of Ericsson AB, Dubai, United Arab Emirates

Research paper thumbnail of Univ. for Inf. Sci. & Technol. St. Paul the Apostle, Ohrid, Macedonia

Research paper thumbnail of Chaos synchronization using sporadic driving

Physica D: Nonlinear Phenomena, 1997

Research paper thumbnail of Chaos synchronization using sporadic driving

Physica D: Nonlinear Phenomena, 1997

Research paper thumbnail of Secure wireless communications via exhaustive cooperative jamming against a single eavesdropper

2012 20th Telecommunications Forum (TELFOR), 2012

Abstract The use of multiple network configurations for cooperative jamming with the aim to incre... more Abstract The use of multiple network configurations for cooperative jamming with the aim to increase the region with information-theoretic secrecy is analysed. The case with a single eavesdropper at an unknown location is investigated. A pre-master key message is broken into multiple data blocks, which are then sent for different network configurations. Provided that the secrecy capacity for a given eavesdropper's position is positive for at least one configuration, the corresponding data block can be securely delivered to the receiver, and ...

Research paper thumbnail of Pattern recognition with OpenCL heterogeneous platform

2012 20th Telecommunications Forum (TELFOR), 2012

Abstract OpenCL platform provides unified development environment for various multicore processor... more Abstract OpenCL platform provides unified development environment for various multicore processors. In this paper, we evaluate the OpenCL framework for application in pattern recognition. We have selected the most common algorithm for Artificial Neural Networks (ANN) training—the backpropagation algorithm for parallelization with OpenCL because of its high demand for processing resources. We will show a SIMD version of the algorithm suitable for OpenCL implementation. Our OpenCL implementation showed 25.8 speedup ...

Research paper thumbnail of An application of synchronized chaotic dynamic arrays

Physics Letters A, 1996

We propose a novel approach for constructing synchronized chaotic arrays and demonstrate its appl... more We propose a novel approach for constructing synchronized chaotic arrays and demonstrate its application for encoding messages. When applied to the problem of communicating information signals, in this case, the transmitted signal is a hyper-chaotic. Therefore, this approach provides an efficient encoding of the information and may be useful in private communication applications.

Research paper thumbnail of Linear conjugacy of vector fields in Lur'e form

IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 1996

Research paper thumbnail of A Study of the MD5 Collisions

eurm.edu.mk

Abstract—MD5 hash function was designed as an improvement and strengthened successor of the MD4 h... more Abstract—MD5 hash function was designed as an improvement and strengthened successor of the MD4 hash function by Ron Rivest [4]. It quickly gained popularity, but not long after its publication it was subjected to a number of attacks which discovered many weaknesses [1][2][3]. ...

Research paper thumbnail of Building manageable web applications using Software Factory

ict-act.org

Abstract. Software industry is still based on manufactory production, and most of the programming... more Abstract. Software industry is still based on manufactory production, and most of the programming code is still hand-crafted. Considerable enhancements in the technologies, methods and techniques in software development occurred in the past 30 years, and reuse and productivity have increased in the past 20 years due to the introduction of the object-oriented programming and serviceoriented architecture. Still, we are very far away from the ultimate goal of industrialization in software production, something which has been ...

Research paper thumbnail of Express Letters

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: FUNDAMENTAL THEORY AND APPLICATIONS, Jun 1, 1997

Abstract—The concept of time-discontinuous coupling of two identical chaotic systems called spora... more Abstract—The concept of time-discontinuous coupling of two identical chaotic systems called sporadic coupling is addressed. The conditions for the occurrence of synchronization between two sporadically coupled chaotic systems are given. Amplitude quantization of the driving signal in addition to the sporadic coupling allows digital exchange of digital information signals between the sporadically coupled chaotic systems. Index Terms—Chaos, chaos synchronization, digital coding.

Research paper thumbnail of Mutual Applications of Chaos and Communications

Research paper thumbnail of Method for generating a random number sequence and a relative random bit generator

Abstract: A method for generating a random number sequence whose randomness properties are determ... more Abstract: A method for generating a random number sequence whose randomness properties are determined a priori, comprises the steps of defining a parametric map; calculating, in function of parameters of the map, the entropy and the Lyapunov exponent of random number sequences obtainable using the parametric map; identifying at least a set of values of parameters for which the entropy and the Lyapunov exponent are positive numbers the map has no attracting point; assigning a pre-established value as a first ...

Research paper thumbnail of A Model for Secret-key Cryptography Using Chaotic Synchronisation

ISITA'94: International …, Jan 1, 1994

In this paper we present a novel system for information transmission by means of chaos synchronis... more In this paper we present a novel system for information transmission by means of chaos synchronisation. Unlike the existing systems for communication via chaotic synchronization, our system extracts the information at the receiver without error. We propose a new algorithm for secret-key cryptography, based on our system for chaos synchronization. Its quality is evaluated through numerous statistical tests that have not pointed out any weakness. To the best of our knowledge, the modern cryptoanalysis techniques do not ...

Research paper thumbnail of Compressive sampling with chaotic dynamical systems

Research paper thumbnail of On the Performance of Exhaustive Search with Cooperating agents

Research paper thumbnail of Order Handling in Convergent Environments

Research paper thumbnail of Using parallel processing for file carving

Research paper thumbnail of Using high performance computing and Monte Carlo simulation for pricing american options

Research paper thumbnail of Secure Wireless Communications via Exhaustive Cooperative Jamming Against a Single Eavesdropper

The use of multiple network configurations for cooperative jamming with the aim to increase the ... more The use of multiple network configurations for
cooperative jamming with the aim to increase the region with
information-theoretic secrecy is analysed. The case with a single
eavesdropper at an unknown location is investigated. A premaster
key message is broken into multiple data blocks, which
are then sent for different network configurations. Provided
that the secrecy capacity for a given eavesdropper’s position is
positive for at least one configuration, the corresponding data
block can be securely delivered to the receiver, and thus the
eavesdropper can not discover the master key.