Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Algorithm (2)
- Java (2)
- 5G (1)
- AHP process (1)
- AODV (1)
-
- Absorber (1)
- Agent-Based Model (1)
- Airport ground crews (1)
- Alpha software (1)
- Big Data (1)
- Blogger (1)
- Broadcast messages (1)
- Cancer types (1)
- Captcha (1)
- Central Bank (1)
- Cloud providers (1)
- Cloud strategies. (1)
- Computer security (1)
- Congruence (1)
- Cox regression (1)
- Cross-model validation (1)
- Database (1)
- E-learning. (1)
- EHealth (1)
- Eclipse Link (1)
- Encryption (1)
- Energy harvesting (1)
- Euclid (1)
- Facebook (1)
- Facebook/Twitter accounts (1)
- Publication
- Publication Type
Articles 1 - 25 of 25
Full-Text Articles in Computer Engineering
Exploring The Role Of Sentiments In Identification Of Active And Influential Bloggers, Mohammad Alghobiri, Umer Ishfaq, Hikmat Ullah Khan, Tahir Afzal Malik
Exploring The Role Of Sentiments In Identification Of Active And Influential Bloggers, Mohammad Alghobiri, Umer Ishfaq, Hikmat Ullah Khan, Tahir Afzal Malik
International Journal of Business and Technology
The social Web provides opportunities for the public to have social interactions and online discussions. A large number of online users using the social web sites create a high volume of data. This leads to the emergence of Big Data, which focuses on computational analysis of data to reveal patterns, and associations relating to human interactions. Such analyses have vast applications in various fields such as understanding human behaviors, studying culture influence, and promoting online marketing. The blogs are one of the social web channels that offer a way to discuss various topics. Finding the top bloggers has been a …
Perfect Metamaterial Absorber Based Energy Harvesting Application In Ism Band, Furkan Dincer, Mehmet Bakir, Muharrem Karaaslan, Kemal Delihacioglu, Cumali Sabah
Perfect Metamaterial Absorber Based Energy Harvesting Application In Ism Band, Furkan Dincer, Mehmet Bakir, Muharrem Karaaslan, Kemal Delihacioglu, Cumali Sabah
International Journal of Business and Technology
An electromagnetic (EM) energy harvesting application based on metamaterial absorber (MA) is introduced and discussed in this paper. This application is operating at ISM band (2.40 GHz) which is especially chosen due to its wide usage area. Square ring resonator (SRR) which has two gaps and resistors across the gaps on it is used. Chips resistors are used to deliver power to any active component. Transmission and reflection characteristics of metamaterial absorber (MA) for energy harvesting application are investigated. 83.6% efficient for energy harvesting application is realized in this study.
The Analytic Hierarchic Process: A Model To Evaluate The Risk Of Getting Cancer, Daniela (Halidini) Qendraj, Markela Muça
The Analytic Hierarchic Process: A Model To Evaluate The Risk Of Getting Cancer, Daniela (Halidini) Qendraj, Markela Muça
International Journal of Business and Technology
The aim of this study is to classify the risk factors of being with a type of cancer by applying the AHP (analytic hierarchy process) scale. The Saaty’s analytic hierarchy process is applied for computing weights for the factors, is a modeling for classification. A case study of QSUT Tirana hospital data base is presented to rank four cancer types. By the data collect from the hospital during the years 2011-2015, the results show that lung cancer is mostly spread in humans, and the prostate cancer is lower spread in humans.
Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi
Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi
International Journal of Business and Technology
The Internet of Things that is defined as anything that can be accessible anytime and anywhere provides connectivity to different objects and sensors around us and which will enable the transfer of different data between these objects and devices. A thing in the Internet of Things can be any natural or man-made object that can be assigned an IP address with a capability to exchange date over a network. There is a huge number of applications of IoT to benefit users, such as health monitors, smart homes, connected cars etc.
If everything around us is connected and information about these …
Hybrid Modelling In System Simulation, Andreas Körner
Hybrid Modelling In System Simulation, Andreas Körner
International Journal of Business and Technology
In times of increasing power and capacity in computer, simulation mathematical models are getting more and more important. For different technical applications and in natural science but also in economic systems and management processes appropriate mathematical model descriptions are necessary. Hybrid modelling is a special technique for more complex model descriptions in order to reduce the degree of complexity. In different fields of interest, the behavior of a model is dependent on the active state. When the model description is changing from one state to another, a so-called state event takes place. State event modelling is the overall term to …
E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili
E-Learning Systems In Higher Education Institutions: An Outlook Of Their Use In The Western Balkan Region, Blerta Abazi Chaushi, Agron Chaushi, Florije Ismaili
International Journal of Business and Technology
This study provides a review of the literature on e-learning systems evolution and environments. The argument is that e-learning systems should be embedded in the core strategy of the institution. To support this premise, studies for e-learning are analyzed and six recommendations are drawn for universities to follow in order to have successful e-learning environments. The main contribution of this study, however, is the identification of the trends and statistics regarding the e-learning usage in the Balkan region. These stats are identified through a survey conducted in 40 universities in 10 countries from this region. The results show that more …
Definition, Validation And Comparison Of Two Population Models For Austria, Martin Bicher, Barbara Glock, Florian Miksch, Niki Popper, Günter Schneckenreither
Definition, Validation And Comparison Of Two Population Models For Austria, Martin Bicher, Barbara Glock, Florian Miksch, Niki Popper, Günter Schneckenreither
International Journal of Business and Technology
In this work we present two structurally different mathematical models for the prognostic simulation of Austria’s population: A time-continuous, macroscopic system dynamics approach and a time-discrete, microscopic agent-based approach. Both models were developed as case studies of a series of population concepts in order to support models for decision-support in Austria’s health care system. In the present work we want to focus on the definition, the parametrisation as well as especially the validation process of both population-models. The latter was of special interest as it included a cross-model validation with Statistics Austria’s own prognostic model SIKURS.
Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher
Case Studies For A Markov Chain Approach To Analyze Agent-Based Models, Florian Kitzler, Martin Bicher
International Journal of Business and Technology
Agent-Based Models have become a widely used tool in social sciences, health care management and other disciplines to describe complex systems from a bottom-up perspective. Some reasons for that are the easy understanding of Agent-Based Models, the high flexibility and the possibility to describe heterogeneous structures. Nevertheless problems occur when it comes to analyzing Agent-Based Models. This paper shows how to describe Agent-Based Models in a macroscopic way as Markov Chains, using the random map representation. The focus is on the implementation of this method for chosen examples of a Random Walk and Opinion Dynamic Models. It is also shown …
Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach
Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach
International Journal of Business and Technology
Predicting demand for care is necessary to provide sufficient capacities in hospitals and enable better planning to cope with challenges like changes in the structure of the population. Emphasis in this work is put on the analysis of the data and on the parametrization of a simulation model for the paths of patients with mental diseases through the health care system. Survival analysis and model selection methods are used for this purpose. Data on patients and their treatments is analyzed with methods of survival analysis. Different methods for modelling the survival and hazard function are presented and compared. Hereby, the …
Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa
Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa
International Journal of Business and Technology
Wireless sensor networks (WSNs) compose the fundamental platform for a number of Internet of Things (IoT) applications, especially those related to the environmental, health, and military surveillance. While being autonomous in power supply, the main challenge in node’s processing and communication architecture design remains the energy efficiency. However, this goal should not limit the main functionality of the system which is often related to the network coverage and connectivity.
This paper shows the implementation of the Ad-hoc On-demand Distance Vector (AODV) routing algorithm in an XBee based platform. As shown, the network can achieve low power consumption per node primarily …
Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi
Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi
International Journal of Business and Technology
With the advancing new era of communication, the so-called era of ‘being always online’ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update …
Labeled-Image Captcha: Concept Of A Secured And Universally Useful Captcha, Mokter Hossain, Ken Nguyen, Muhammad Asadur Rahman
Labeled-Image Captcha: Concept Of A Secured And Universally Useful Captcha, Mokter Hossain, Ken Nguyen, Muhammad Asadur Rahman
International Journal of Business and Technology
Captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) is a widely used online security tool that ensures that a computer program is not posing as a human user. While smart programs with advanced image processing capability have already cracked picture based captcha systems there is a need for making the test harder. This paper presents a design prototype of a simplified type of labeled-image captcha where a picture of a common animal or household item is marked with a number of different labels and the users will be asked to provide the correct label for specific …
A Policeless Traffic Ticketing System With Autonomous Vehicles, Mükremin Özkul, Ilir Çapuni
A Policeless Traffic Ticketing System With Autonomous Vehicles, Mükremin Özkul, Ilir Çapuni
International Journal of Business and Technology
Besides being expensive, traffic violation monitoring systems rely heavily on a huge infrastructure that incurs installation, operational, and maintenance costs.
Developing countries — where people do exhibit less traffic safety aware- ness — deployment of such systems becomes a daunting task. A police- men cannot be everywhere, and a policeman can also be bribed.
With the above goals in mind, in this paper we present an infrastructure- less and police-less traffic violation detection system that relies solely on the broadcast messages between the vehicles and secure communication of the vehicles with the transportation authority. Each vehicle should be equipped with …
The Moving Object Reflected Under Matlab Test-Bench (Simulation Model Through Buit-In Functions), Virtyt Lesha, Jozef Bushati, Dea Strica
The Moving Object Reflected Under Matlab Test-Bench (Simulation Model Through Buit-In Functions), Virtyt Lesha, Jozef Bushati, Dea Strica
UBT International Conference
Digital image processing is an area that finds many applications in three-dimensional graphics. One of the subjects considered in image processing is detection of moving objects. In this paper, we have analyzed the performance of an algorithm that detects a moving object. The performance relates to the speed of moving object during a pre-determined time interval. The methodology supports Matlab integrated with built-in functions. Specifically, as input of the simulation model is a video material containing moving objects. The model reads a video file presenting moving objects; after the model is executed in Matlab, the output emits moving objects associated …
Performance Analysis Of Java Persistence Api Providers, Besart Pllana
Performance Analysis Of Java Persistence Api Providers, Besart Pllana
UBT International Conference
Nowadays, fast and accurate access to data is very important. Usually data is managed and processed through software applications. In recent years, the most preferred programming model by most application developers is Object Oriented Programming (OOP) where data is represented through objects. These data must be persistent and therefore needs to be stored, and storage can be done on a variety of databases. The most common databases are Relational Database Management Systems (RDBMS). While persistence of objects in RDBMS is limited by object-relational mismatch which is the inconsistency of the direct interaction between two components based on different approaches, OOP …
Multithreading Technique Improvement In Processing Client Server Communication By Utilizing Object Oriented Language, Eda Tabaku, Kliv Shapllo, Senada Bushati
Multithreading Technique Improvement In Processing Client Server Communication By Utilizing Object Oriented Language, Eda Tabaku, Kliv Shapllo, Senada Bushati
UBT International Conference
A comparison of an application’s performance, when a program is executed through multiple threads and only a thread to complete a specified task by using Java techniques. In this paper will be expounded how a Java programmer can profit by technology facilities. How to create a program that executes in a parallel way, that solves independent tasks not one after the other, but all at the same time. The application that is developed(the environment used is Eclipse) aims to speed up the time needed to download images from a specific website, but it is flexible for downloading images also from …
Review Of Cloud Migration Strategies And Providers – An Iaas Migration Strategy, Florinda Imeri, Agon Memeti
Review Of Cloud Migration Strategies And Providers – An Iaas Migration Strategy, Florinda Imeri, Agon Memeti
UBT International Conference
Companies are addressing the Cloud Computing issue more actively recently, as a part of a move towards a more agile and flexible IT infrastructure since benefitting from an IT infrastructure that is flexible, scalable, high-performance and up-to-date is no longer a luxury or the exception to a rule. The issue they address is “Which is the best strategy?” Of course, this is not a simple issue given that the cloud can impact an organization’s application picture across several dimensions. When an organizations made the decision to consider cloud services for its application or infrastructure deployment, it’s important to understand the …
Nb-Iot: A Network Slice For Massive Iot, Xhafer Krasniqi
Nb-Iot: A Network Slice For Massive Iot, Xhafer Krasniqi
UBT International Conference
Network virtualisation is a concept that has been around for some time now, but the concept of network slicing is more recent and only started to be mentioned in the context of 5G. In essence, network slicing is a specific form of network virtualisation that enables sharing of physical resources by multiple logical network slices used to serve different applications and use cases. One such a use case would be to allocate network resources to small things, e.g. sensors and very low power consumption objects. To allow these small objects access to network resources or to a slice of such …
Simulation Based Optimisation Of Ground Crews: Case Of A Regional Airport, Blaz Rodic, Alenka Baggia
Simulation Based Optimisation Of Ground Crews: Case Of A Regional Airport, Blaz Rodic, Alenka Baggia
UBT International Conference
Paper presents the simulation models built within an airport ground crew scheduling automatization project at a regional airport. Our goal was to develop robust ground crew task scheduling and shift generation algorithms that would improve on existing heuristic rules. We have utilized simulation modeling to develop and validate the algorithms, starting with a model of the existing scheduling process coded and visualized in spreadsheet software and ending with a hybrid Discrete Event and Agent Based model used for the visualization and verification of the optimized processes. Explicit and tacit expert knowledge was recorded through meetings with airport personnel managers and …
An Implementation Of Weighted Least Squares Method In Central Bank Twitter Accounts Grew Prediction, Goran Bjelobaba, Ana Savic, Radosav Veselinovic, Hana Stefanovic
An Implementation Of Weighted Least Squares Method In Central Bank Twitter Accounts Grew Prediction, Goran Bjelobaba, Ana Savic, Radosav Veselinovic, Hana Stefanovic
UBT International Conference
This paper presents some advantages of using social media and social networks as an efficient way of Central Banks communication with target audience. The statistics given in this paper presents some leading banks based on number of followers on Twitter in 2018, showing that Indonesia’s Central Bank has more Twitter followers than any other monetary authority, beating out the Banco de Mexico, Federal Reserve, European Central Bank and Reserve Bank of India. In this paper some prediction of number of Twitter followers in Central Bank communication is also contributed, based on Weighted Least Squares method. An algorithm is implemented in …
Efficiency Of Calculating Gcd Through Computer With Help Of Modified Euclidean Algorithm, Emin Emini, Azir Jusufi, Ruhada Emini
Efficiency Of Calculating Gcd Through Computer With Help Of Modified Euclidean Algorithm, Emin Emini, Azir Jusufi, Ruhada Emini
UBT International Conference
Euclid’s algorithm remains to be the most efficient method for finding greatest common divisor of two full numbers. By using the meaning of congruences this research paper will make a modification in the note of the Euclid’s algorithm. Here are discussed both classic and modified methods, by putting appropriate codes and observe the duration of the calculation through the computer.
Combining Cryptographic Primitives According To Security Metrics And Vulnerabilities In Real Systems, Blerina Çeliku, Rafail Prodani, Emis Simo
Combining Cryptographic Primitives According To Security Metrics And Vulnerabilities In Real Systems, Blerina Çeliku, Rafail Prodani, Emis Simo
UBT International Conference
There are so many applications and data that flow during our daily activities, either personal or institutional ones. Also the companies and business do transactions or their real operations through the Web and other Internet facilities. Security breaches are costing individuals or companies millions so information security has to be a major priority. There are several forms of security technology available, but encryption is one that everyday computer users should know about. Encryption and the performance of cryptographic algorithms are variable according to implemented platforms, software and hardware components or application scenarios. According to specific security metrics and requirements we …
Technology Mediated Nudging In A Mobile Health Context, My Zetterholm, Päivi Jokela, Lina Nilsson
Technology Mediated Nudging In A Mobile Health Context, My Zetterholm, Päivi Jokela, Lina Nilsson
UBT International Conference
According to a vision for eHealth that was launched in 2016 by the Swedish Government, Sweden will be leading the way in using the potential of digitalization and eHealth to help people achieve a good and equal health. To achieve this vision, we argue that initiatives in eHealth need to augment the traditional health perspective. This implies a more preventive approach that transforms the health concept to a continuous participative process over the life course. A stronger emphasis is needed to develop high quality mobile and web based systems in order to empower people to pursue a healthy lifestyle. A …
Performanca E Makinave Kerkuese Duke Perdorur Cloud Shërbimet “Elasticsearch” Dhe “Algolia”, Besnik Korça
Performanca E Makinave Kerkuese Duke Perdorur Cloud Shërbimet “Elasticsearch” Dhe “Algolia”, Besnik Korça
Theses and Dissertations
Ueb Aplikacionet me data-set të mëdha në kohën e tanishme janë shumë më të përhapura. Kërkimet e të dhënave në data-set të tilla për shkak të performances bëhen duke përdorur makinat kërkuese. Provider të ndryshëm ofrojnë makina kërkuese si Software as a Service(SaaS) shërbime të cilat kanë për avantazh konfigurimin minimal që duhet bërë makinave kërkuese për t’i vënë në funksion. Nëpërmjet këtij punimi synohet që së pari të analizohen shërbimet cloud computing që ofrohen nga provider të ndryshem. Pastaj pasi që fokusi i makinave kërkuese ndodhet në “information retrieval” është bë analizimi i disa teknikave të “information retrieval”. Makinat …
The Use Of Recommender Systems In Web Applications – The Troi Case, Donjeta Mulaj
The Use Of Recommender Systems In Web Applications – The Troi Case, Donjeta Mulaj
Theses and Dissertations
Avoiding digital marketing, surveys, reviews and online users behavior approaches on digital age are the key elements for a powerful businesses to fail, there are some systems that should preceded some artificial intelligence techniques. In this direction, the use of data mining for recommending relevant items as a new state of the art technique is increasing user satisfaction as well as the business revenues. And other related information gathering approaches in order to our systems thing and acts like humans. To do so there is a Recommender System that will be elaborated in this thesis. How people interact, how to …