Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 51

Full-Text Articles in Computer Engineering

The Moving Object Reflected Under Matlab Test-Bench (Simulation Model Through Buit-In Functions), Virtyt Lesha, Jozef Bushati, Dea Strica Oct 2018

The Moving Object Reflected Under Matlab Test-Bench (Simulation Model Through Buit-In Functions), Virtyt Lesha, Jozef Bushati, Dea Strica

UBT International Conference

Digital image processing is an area that finds many applications in three-dimensional graphics. One of the subjects considered in image processing is detection of moving objects. In this paper, we have analyzed the performance of an algorithm that detects a moving object. The performance relates to the speed of moving object during a pre-determined time interval. The methodology supports Matlab integrated with built-in functions. Specifically, as input of the simulation model is a video material containing moving objects. The model reads a video file presenting moving objects; after the model is executed in Matlab, the output emits moving objects associated …


Multithreading Technique Improvement In Processing Client Server Communication By Utilizing Object Oriented Language, Eda Tabaku, Kliv Shapllo, Senada Bushati Oct 2018

Multithreading Technique Improvement In Processing Client Server Communication By Utilizing Object Oriented Language, Eda Tabaku, Kliv Shapllo, Senada Bushati

UBT International Conference

A comparison of an application’s performance, when a program is executed through multiple threads and only a thread to complete a specified task by using Java techniques. In this paper will be expounded how a Java programmer can profit by technology facilities. How to create a program that executes in a parallel way, that solves independent tasks not one after the other, but all at the same time. The application that is developed(the environment used is Eclipse) aims to speed up the time needed to download images from a specific website, but it is flexible for downloading images also from …


Performance Analysis Of Java Persistence Api Providers, Besart Pllana Oct 2018

Performance Analysis Of Java Persistence Api Providers, Besart Pllana

UBT International Conference

Nowadays, fast and accurate access to data is very important. Usually data is managed and processed through software applications. In recent years, the most preferred programming model by most application developers is Object Oriented Programming (OOP) where data is represented through objects. These data must be persistent and therefore needs to be stored, and storage can be done on a variety of databases. The most common databases are Relational Database Management Systems (RDBMS). While persistence of objects in RDBMS is limited by object-relational mismatch which is the inconsistency of the direct interaction between two components based on different approaches, OOP …


Review Of Cloud Migration Strategies And Providers – An Iaas Migration Strategy, Florinda Imeri, Agon Memeti Oct 2018

Review Of Cloud Migration Strategies And Providers – An Iaas Migration Strategy, Florinda Imeri, Agon Memeti

UBT International Conference

Companies are addressing the Cloud Computing issue more actively recently, as a part of a move towards a more agile and flexible IT infrastructure since benefitting from an IT infrastructure that is flexible, scalable, high-performance and up-to-date is no longer a luxury or the exception to a rule. The issue they address is “Which is the best strategy?” Of course, this is not a simple issue given that the cloud can impact an organization’s application picture across several dimensions. When an organizations made the decision to consider cloud services for its application or infrastructure deployment, it’s important to understand the …


Nb-Iot: A Network Slice For Massive Iot, Xhafer Krasniqi Oct 2018

Nb-Iot: A Network Slice For Massive Iot, Xhafer Krasniqi

UBT International Conference

Network virtualisation is a concept that has been around for some time now, but the concept of network slicing is more recent and only started to be mentioned in the context of 5G. In essence, network slicing is a specific form of network virtualisation that enables sharing of physical resources by multiple logical network slices used to serve different applications and use cases. One such a use case would be to allocate network resources to small things, e.g. sensors and very low power consumption objects. To allow these small objects access to network resources or to a slice of such …


Simulation Based Optimisation Of Ground Crews: Case Of A Regional Airport, Blaz Rodic, Alenka Baggia Oct 2018

Simulation Based Optimisation Of Ground Crews: Case Of A Regional Airport, Blaz Rodic, Alenka Baggia

UBT International Conference

Paper presents the simulation models built within an airport ground crew scheduling automatization project at a regional airport. Our goal was to develop robust ground crew task scheduling and shift generation algorithms that would improve on existing heuristic rules. We have utilized simulation modeling to develop and validate the algorithms, starting with a model of the existing scheduling process coded and visualized in spreadsheet software and ending with a hybrid Discrete Event and Agent Based model used for the visualization and verification of the optimized processes. Explicit and tacit expert knowledge was recorded through meetings with airport personnel managers and …


An Implementation Of Weighted Least Squares Method In Central Bank Twitter Accounts Grew Prediction, Goran Bjelobaba, Ana Savic, Radosav Veselinovic, Hana Stefanovic Oct 2018

An Implementation Of Weighted Least Squares Method In Central Bank Twitter Accounts Grew Prediction, Goran Bjelobaba, Ana Savic, Radosav Veselinovic, Hana Stefanovic

UBT International Conference

This paper presents some advantages of using social media and social networks as an efficient way of Central Banks communication with target audience. The statistics given in this paper presents some leading banks based on number of followers on Twitter in 2018, showing that Indonesia’s Central Bank has more Twitter followers than any other monetary authority, beating out the Banco de Mexico, Federal Reserve, European Central Bank and Reserve Bank of India. In this paper some prediction of number of Twitter followers in Central Bank communication is also contributed, based on Weighted Least Squares method. An algorithm is implemented in …


Efficiency Of Calculating Gcd Through Computer With Help Of Modified Euclidean Algorithm, Emin Emini, Azir Jusufi, Ruhada Emini Oct 2018

Efficiency Of Calculating Gcd Through Computer With Help Of Modified Euclidean Algorithm, Emin Emini, Azir Jusufi, Ruhada Emini

UBT International Conference

Euclid’s algorithm remains to be the most efficient method for finding greatest common divisor of two full numbers. By using the meaning of congruences this research paper will make a modification in the note of the Euclid’s algorithm. Here are discussed both classic and modified methods, by putting appropriate codes and observe the duration of the calculation through the computer.


Technology Mediated Nudging In A Mobile Health Context, My Zetterholm, Päivi Jokela, Lina Nilsson Oct 2018

Technology Mediated Nudging In A Mobile Health Context, My Zetterholm, Päivi Jokela, Lina Nilsson

UBT International Conference

According to a vision for eHealth that was launched in 2016 by the Swedish Government, Sweden will be leading the way in using the potential of digitalization and eHealth to help people achieve a good and equal health. To achieve this vision, we argue that initiatives in eHealth need to augment the traditional health perspective. This implies a more preventive approach that transforms the health concept to a continuous participative process over the life course. A stronger emphasis is needed to develop high quality mobile and web based systems in order to empower people to pursue a healthy lifestyle. A …


Combining Cryptographic Primitives According To Security Metrics And Vulnerabilities In Real Systems, Blerina Çeliku, Rafail Prodani, Emis Simo Oct 2018

Combining Cryptographic Primitives According To Security Metrics And Vulnerabilities In Real Systems, Blerina Çeliku, Rafail Prodani, Emis Simo

UBT International Conference

There are so many applications and data that flow during our daily activities, either personal or institutional ones. Also the companies and business do transactions or their real operations through the Web and other Internet facilities. Security breaches are costing individuals or companies millions so information security has to be a major priority. There are several forms of security technology available, but encryption is one that everyday computer users should know about. Encryption and the performance of cryptographic algorithms are variable according to implemented platforms, software and hardware components or application scenarios. According to specific security metrics and requirements we …


Research On System Communication By Using Unified Registry Model & Elements, Kujtim Gashi, Atdhe Buja, Fatos Idrizi Oct 2017

Research On System Communication By Using Unified Registry Model & Elements, Kujtim Gashi, Atdhe Buja, Fatos Idrizi

UBT International Conference

Trends of Development of Information Society in the Republic of Kosovo must fit the criteria and standards of the EU. The main objective of the paper is the identification of individual IT systems used by the Republic of Kosovo public institutions related to the trade and working out analysis and recommendations for optimizing their communication (interoperability), eventual unification in the hardware & software level and increase the efficiency of the entire economic system information. The analytical analysis outlined these points, as it follows: current technologies used by public administration of the Republic of Kosovo, risk analysis, analysis of data structures …


Smia: Improving Kosovo's Education Management System, Lazar Adjijgogov, Dejan Stamenov, Edmond Jajaga Oct 2017

Smia: Improving Kosovo's Education Management System, Lazar Adjijgogov, Dejan Stamenov, Edmond Jajaga

UBT International Conference

Successful management of today’s education systems requires effective policy-making and system monitoring through data and information. To this end, countries around the world have invested significant resources into collecting, processing, and managing more and better data through education management information systems (EMIS). SMIA is a modern EMIS, which offers easier management of educational process in Kosovo. It facilitates decision-making, resource planning, strategy building, monitoring and evaluation of educational system through a rich set of analytical and statistical tools. For over six years of activity, the system has efficiently tracked and thus helped the development of the educational process for every …


Review Of Artificial Intelligence Development, Its Impact And Its Challenges, Litvane Spahija, Festim Halili Oct 2017

Review Of Artificial Intelligence Development, Its Impact And Its Challenges, Litvane Spahija, Festim Halili

UBT International Conference

The field of Artificial Intelligence, which started roughly half a century ago, has a turbulent history. In the 1980s there has been a major paradigm shift towards embodiment. While embodied artificial intelligence is still highly diverse, changing, and far from “theoretically stable”, a certain consensus about the important issues and methods has been achieved or is rapidly emerging. In this paper we briefly characterize the field, summarize its achievements, and identify important issues for future research.

With the popularization of the Internet, permeation of sensor networks, emergence of big data, increase in size of the information community, and interlinking and …


Study Of The Power Consumption Of Pseudo Random Bit Generator Circuits Implemented On Fpga, Galia Marinova Oct 2017

Study Of The Power Consumption Of Pseudo Random Bit Generator Circuits Implemented On Fpga, Galia Marinova

UBT International Conference

Pseudo Random Bit and Number Generator (PRB/NG) circuits being very widely used for security, compressive sensing and diverse other applications in telecommunications are studies in different aspects in the laboratory of Computer-aided Design in Telecommunications in Technical University-Sofia. Some results of this study are published in [1] where tests for randomness from the National Institute of Standards and Technology (NIST) suit are applied on commonly used PRB/NGs. Other aspects of the PRB/NG circuits study is their power consumption in the aim of green communications as noticed in [2,3] and the concern about low power consuming devices for Internet of Things’ …


Computer Science: Application Of Technology/Iot In Hydropower Dams, Orjola Jaupi Oct 2017

Computer Science: Application Of Technology/Iot In Hydropower Dams, Orjola Jaupi

UBT International Conference

As time passes by, we barely see how much time it costs people to stay at work, fixing problems that happen every day. As people we should do more about humanity and technology is the door that opens opportunities for us to do this. Technology today is transforming every human daily life routine and it’s only the beginning of what technology can bring. By 2020 we know that technology will connect the unconnected by introducing the real idea of Internet of Things. Every little, tiny thing all over the world will be connected, but also big and important projects like …


Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj Oct 2017

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj

UBT International Conference

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).

In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol …


A Critical Overview Of Data Mining For Business Applications, George Telonis, Peter P. Groumpos Oct 2017

A Critical Overview Of Data Mining For Business Applications, George Telonis, Peter P. Groumpos

UBT International Conference

Everybody looks to a world that does not remain the same. Furthermore no one can deny that the world is changing, and changing very fast.

Technology, education, science, environment, health, communicating habits, entertainment, eating habits, dress - there is hardly anything in life that is not changing. Some changes we like, while others create fear and anxiety around us. Everywhere there is a feeling of insecurity.

What will happen to us tomorrow, or what will happen to our children, are questions we keep frequently asking. One thing, however, is clear.

It is no more possible to live in the way …


Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu Oct 2017

Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu

UBT International Conference

Data warehouses are a collection of several databases, whose goal is to help different companies and corporations make important decisions about their activities. These decisions are taken from the analyses that are made to the data within the data warehouse. These data are taken from data that companies and corporations collect on daily basis from their branches that may be located in different cities, regions, states and continents. Data that are entered to data warehouses are historical data and they represent that part of data that is important for making decisions. These data go under a transformation process in order …


Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi Oct 2017

Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi

UBT International Conference

Cloud Computing seems to be the most promising technology of the century we are living. It provides a new manner of sharing distributed resources and services that may be part of different organizations, geographically located in different places and different time zones. Mobile Cloud Computing offers partially the same functionality, with the only additional requirement that, at least, some of the devices are mobile. In this paper, we will try to provide a detailed explanation of Mobile Cloud Computing concept by providing different examples, figures and charts showing usage, accessibility, pros and cons and comparison of different cloud platforms.


Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa Oct 2017

Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa

UBT International Conference

While Information and Communication Technology (ICT) trends are moving towards the Internet of Things (IoT), mobile applications are becoming more and more popular. Mostly due to their pervasiveness and the level of interaction with the users, along with the great number of advantages, the mobile applications bring up a great number of privacy related issues as well. These platforms can gather our very sensitive private data by only granting them a list of permissions during the installation process. Additionally, most of the users can find it difficult, or even useless, to analyze system permissions. Thus, their guess of app’s safety …


A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani Oct 2017

A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani

UBT International Conference

State-of-the-art security frameworks have been extensively addressing security issues for web resources, agents and services in the Semantic Web. The provision of Stream Reasoning as a new area spanning Semantic Web and Data Stream Management Systems has eventually opened up new challenges. Namely, their decentralized nature, the metadata descriptions, the number of users, agents, and services, make securing Stream Reasoning systems difficult to handle. Thus, there is an inherent need of developing new security models which will handle security and automate security mechanisms to a more autonomous system that supports complex and dynamic relationships between data, clients and service providers. …


Development And Improvement Of The Quality Of The Mobile Services At The Mobile Market In Macedonia, Arsov Boris, Trajkovski Vasko, Sherifi Vergim Oct 2017

Development And Improvement Of The Quality Of The Mobile Services At The Mobile Market In Macedonia, Arsov Boris, Trajkovski Vasko, Sherifi Vergim

UBT International Conference

To determine the strategic direction for the development of electronic communications market in the part of mobile telecommunication services in Republic of Macedonia, the Agency for electronic communication has made an assessment of the regulatory progress and that has been made in recent years. The needs are in order to obtain a clear strategy for the development of the mobile telecommunication market in Macedonia, and primarily will create a clear picture in the: technical, financial, operational and competitive segments. Republic of Macedonia at this moment has 2 mobile operators with own network and the third mobile virtual operator. They are …


Analysis Of Central Banks Platforms On Social Networks, Goran Bjelobaba, Ana Savic, Hana Stefanovic Oct 2017

Analysis Of Central Banks Platforms On Social Networks, Goran Bjelobaba, Ana Savic, Hana Stefanovic

UBT International Conference

The paper describes the advantages of using technical and technological achievements through the social networks and their implementation in Central Banks communication. A study of some Central Banks on their use of social media and some of the most popular social networks are given, showing that social media is becoming an important medium of communication for Central Banks around the world. The study shows that a majority of Central Banks use Twitter to send alerts for information already disseminated through the website, even as they are not very active in responding to public tweets, and also shows an increasing number …


Morphological Parsing Of Albanian Language: A Different Approach To Albanian Verbs, Iir Çollaku, Eşref Adali Nov 2015

Morphological Parsing Of Albanian Language: A Different Approach To Albanian Verbs, Iir Çollaku, Eşref Adali

UBT International Conference

The very first step when processing a natural language is creating a morphological parser. Verbs in Albanian language are the most complex area of inflection. Besides irregular verbs, the ways in which the regular verbs change their form while being inflected are hardly definable, and the number of exceptions is huge. In this paper, a different approach to Albanian verbs is made. Unlike traditional classification, based on the inflection themes they take, verbs are classified into different verb groups. This way, the inflection process looks clearer and more regular, as the affix remains the only changeable part of the inflected …


Perfect Metamaterial Absorber Based Energy Harvesting Application In Ism Band, Furkan Dincer, Mehmet Bakir, Muharrem Karaaslan, Kemal Delihacioglu, Cumali Sabah Nov 2015

Perfect Metamaterial Absorber Based Energy Harvesting Application In Ism Band, Furkan Dincer, Mehmet Bakir, Muharrem Karaaslan, Kemal Delihacioglu, Cumali Sabah

UBT International Conference

An electromagnetic (EM) energy harvesting application based on metamaterial absorber (MA) is introduced and discussed in this paper. This application is operating at ISM band (2.40 GHz) which is especially chosen due to its wide usage area. Square ring resonator (SRR) which has two gaps and resistors across the gaps on it is used. Chips resistors are used to deliver power to any active component. Transmission and reflection characteristics of metamaterial absorber (MA) for energy harvesting application are investigated. 83.6% efficient for energy harvesting application is realized in this study.


The Analytic Hierarchic Process: A Model To Evaluate The Risk Of Getting Cancer, Daniela (Halidini) Qendraj, Markela Muca Nov 2015

The Analytic Hierarchic Process: A Model To Evaluate The Risk Of Getting Cancer, Daniela (Halidini) Qendraj, Markela Muca

UBT International Conference

The aim of this study is to classify the risk factors of being with a type of cancer by applying the AHP (analytic hierarchy process) scale. The Saaty’s analytic hierarchy process is applied for computing weights for the factors, is a modeling for classification. A case study of QSUT Tirana hospital data base is presented to rank four cancer types. By the data collect from the hospital during the years 2011-2015, the results show that lung cancer is mostly spread in humans, and the prostate cancer is lower spread in humans.


Randomizing Ensemble-Based Approaches For Outlier, Lediona Nishani, Marenglen Biba Nov 2015

Randomizing Ensemble-Based Approaches For Outlier, Lediona Nishani, Marenglen Biba

UBT International Conference

The data size is increasing dramatically every day, therefore, it has emerged the need of detecting abnormal behaviors, which can harm seriously our systems. Outlier detection refers to the process of identifying outlying activities, which diverge from the remaining group of data. This process, an integral part of data mining field, has experienced recently a substantial interest from the data mining community. An outlying activity or an outlier refers to a data point, which significantly deviates and appears to be inconsistent compared to other data members. Ensemble-based outlier detection is a line of research employed in order to reduce the …


Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach Nov 2015

Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach

UBT International Conference

Predicting demand for care is necessary to provide sufficient capacities in hospitals and enable better planning to cope with challenges like changes in the structure of the population. Emphasis in this work is put on the analysis of the data and on the parametrization of a simulation model for the paths of patients with mental diseases through the health care system. Survival analysis and model selection methods are used for this purpose. Data on patients and their treatments is analyzed with methods of survival analysis. Different methods for modelling the survival and hazard function are presented and compared. Hereby, the …


Exploring The Role Of Sentiments In Identification Of Active And Influential Bloggers, Mohammad Alghobiri, Umer Ishfaq, Hikmat Ullah Khan, Tahir Afzal Malik Nov 2015

Exploring The Role Of Sentiments In Identification Of Active And Influential Bloggers, Mohammad Alghobiri, Umer Ishfaq, Hikmat Ullah Khan, Tahir Afzal Malik

UBT International Conference

The social Web provides opportunities for the public to have social interactions and online discussions. A large number of online users using the social web sites create a high volume of data. This leads to the emergence of Big Data, which focuses on computational analysis of data to reveal patterns, and associations relating to human interactions. Such analyses have vast applications in various fields such as understanding human behaviors, studying culture influence, and promoting online marketing. The blogs are one of the social web channels that offer a way to discuss various topics. Finding the top bloggers has been a …


Bounty Techniques For Web Vulnerability Scanning, Tanzer Abazi, Mentor Hoxhaj, Edmond Hajrizi, Gazmend Krasniqi Nov 2015

Bounty Techniques For Web Vulnerability Scanning, Tanzer Abazi, Mentor Hoxhaj, Edmond Hajrizi, Gazmend Krasniqi

UBT International Conference

With the advancement of technology and the raising of massive amount of data, the used techniques for data security are continually a challenge. This paper contributes on identifying the gaps and evaluating security level on web portals hosted or managed by Republic of Kosovo institutions or businesses, whose data privacy and security could be a big business concern. The results have been obtained from real case scenario, where 25 security researchers have contributed in white hack activities. These activities, were part of a one day conference called. “The DAY when hacking is legal”, held in Pristine.