Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Walden University (81)
- Chulalongkorn University (54)
- University for Business and Technology in Kosovo (51)
- San Jose State University (45)
- Air Force Institute of Technology (42)
-
- University of Central Florida (42)
- University of South Florida (41)
- Manipal Academy of Higher Education (40)
- Western University (32)
- Nova Southeastern University (28)
- Dartmouth College (23)
- New Jersey Institute of Technology (23)
- University of Arkansas, Fayetteville (23)
- University of Massachusetts Amherst (23)
- Clark University (22)
- Utah State University (21)
- Portland State University (20)
- Florida Institute of Technology (18)
- Missouri University of Science and Technology (17)
- University of Wisconsin Milwaukee (17)
- California Polytechnic State University, San Luis Obispo (16)
- Old Dominion University (16)
- CCT College Dublin (15)
- Wright State University (15)
- City University of New York (CUNY) (14)
- University of Tennessee, Knoxville (14)
- University of Texas at El Paso (14)
- University of Nevada, Las Vegas (13)
- Western Michigan University (13)
- Bard College (12)
- Keyword
-
- Machine learning (90)
- Machine Learning (48)
- Deep learning (43)
- Computer Science (40)
- Artificial intelligence (29)
-
- Deep Learning (24)
- Cybersecurity (22)
- Security (17)
- Artificial Intelligence (16)
- Computer vision (15)
- MPA (15)
- Research Project (15)
- Department of Computer Science and Engineering (14)
- Computer Vision (13)
- Computer science (13)
- #antcenter (12)
- Natural Language Processing (12)
- Mobile Application (11)
- Natural language processing (11)
- Neural networks (11)
- Social media (11)
- Blockchain (10)
- Classification (10)
- Daniel Felix Ritchie School of Engineering and Computer Science (10)
- Cloud computing (9)
- Neural network (9)
- Optimization (9)
- Visualization (9)
- Clustering (8)
- Data mining (8)
- Publication
-
- Theses and Dissertations (167)
- Walden Dissertations and Doctoral Studies (81)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (54)
- Doctoral Dissertations (47)
- Master's Projects (45)
-
- USF Tampa Graduate Theses and Dissertations (41)
- Manipal Institute of Technology, Manipal Theses and Dissertations (40)
- Electronic Theses and Dissertations, 2020- (39)
- Dissertations (33)
- Electronic Thesis and Dissertation Repository (32)
- CCE Theses and Dissertations (27)
- School of Professional Studies (22)
- Dartmouth College Undergraduate Theses (19)
- Electronic Theses and Dissertations (19)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (18)
- Master's Theses (17)
- Browse all Theses and Dissertations (15)
- Graduate Theses and Dissertations (15)
- ICT (15)
- Masters Theses (14)
- Open Access Theses & Dissertations (14)
- Honors Theses (13)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (13)
- Dissertations and Theses (12)
- Dissertations, Theses, and Masters Projects (11)
- Masters Theses & Doctoral Dissertations (11)
- McKelvey School of Engineering Theses & Dissertations (11)
- Dissertations and Theses Collection (Open Access) (10)
- Graduate Theses, Dissertations, and Problem Reports (10)
- University Honors Theses (10)
- File Type
Articles 31 - 60 of 1149
Full-Text Articles in Physical Sciences and Mathematics
A Federated Deep Autoencoder For Detecting Iot Cyber Attacks, Christopher M. Regan
A Federated Deep Autoencoder For Detecting Iot Cyber Attacks, Christopher M. Regan
Master of Science in Computer Science Theses
Internet of Things (IoT) devices are mass-produced and rapidly released to the public in a rough state. IoT devices are produced by various companies satisfying various goals, such as monitoring the environment, senor trigger cameras, on-demand electrical switches. These IoT devices are produced by companies to meet a market demand quickly, producing a rough software solution that customers or other enterprises willingly buy with the expectation they will have software updates after production. These IoT devices are often heterogeneous in nature, only to receive updates at infrequently intervals, and can remain out of sight on a home or office network …
Automatically Classifying Non-Functional Requirements With Feature Extraction And Supervised Machine Learning Techniques, Mahtab Ezzatikarami
Automatically Classifying Non-Functional Requirements With Feature Extraction And Supervised Machine Learning Techniques, Mahtab Ezzatikarami
Electronic Thesis and Dissertation Repository
Abstract. Context and Motivation: Non-functional requirements (NFRs) of a system need to be classified into different types such as usability, performance, etc. This would enable stakeholders to ensure the completeness of their work by extracting specific NFRs related to their expertise. Question/Problem: Because of the size and complexity of requirement specification documents, the manual classification of NFRs is time-consuming, labour-intensive, and error-prone. We thus need an automated solution that can provide a highly accurate and efficient categorization of NFRs. Principal ideas/results: In this investigation, using natural language processing and supervised machine learning (SML) techniques, we investigate with feature extraction techniques …
A Preliminary Analysis Of How A Software Organization’S Maturity And Size Affect Its Intellectual Property Portfolio, Daniel Gifford
A Preliminary Analysis Of How A Software Organization’S Maturity And Size Affect Its Intellectual Property Portfolio, Daniel Gifford
Master of Science in Software Engineering Theses
Intellectual property, commonly known as IP, is complex. The four main types of software IP, which is what this thesis will focus on, are patents, trade secrets, trademarks, and copyright. Patents, trade secrets, and copyrights were all studied by this thesis. Software IP is unique in that it can by copyrighted. Different IP owners, which can be businesses of different types, individuals, and universities, often have different strategies as to how to use their IP portfolio. This thesis studies differences in IP usage between these entities specifically in the field of software. Large and small software companies were analyzed specifically. …
Bioinformatics Metadata Extraction For Machine Learning Analysis, Zachary Tom
Bioinformatics Metadata Extraction For Machine Learning Analysis, Zachary Tom
Master's Projects
Next generation sequencing (NGS) has revolutionized the biological sciences. Today, entire genomes can be rapidly sequenced, enabling advancements in personalized medicine, genetic diseases, and more. The National Center for Biotechnology Information (NCBI) hosts the Sequence Read Archive (SRA) containing vast amounts of valuable NGS data. Recently, research has shown that sequencing errors in conventional NGS workflows are key confounding factors for detecting mutations. Various steps such as sample handling and library preparation can introduce artifacts that affect the accuracy of calling rare mutations. Thus, there is a need for more insight into the exact relationship between various steps of the …
Quantifying Deepfake Detection Accuracy For A Variety Of Natural Settings, Pratikkumar Prajapati
Quantifying Deepfake Detection Accuracy For A Variety Of Natural Settings, Pratikkumar Prajapati
Master's Projects
Deep fakes are videos generated from a starting video of a person where that person's face has been swapped for someone else's. In this report, we describe our work to develop general, deep learning-based models to classify Deep Fake content. Our first experiments involved simple Convolution Neural Network (CNN)-based models where we varied how individual frames from the source video were passed to the CNN. These simple models tended to give low accuracy scores for discriminating fake versus non-fake videos of less than 60%. We then developed three more sophisticated models: one based on choosing test frames, one based on …
Malware Classification Using Lstms, Dennis Dang
Malware Classification Using Lstms, Dennis Dang
Master's Projects
Signature and anomaly based detection have long been quintessential techniques used in malware detection. However, these techniques have become increasingly ineffective as malware becomes more complex. Researchers have therefore turned to deep learning to construct better performing models. In this project, we create four different long-short term memory (LSTM) models and train each model to classify malware by family type. Our data consists of opcodes extracted from malware executables. We employ techniques used in natural language processing (NLP) such as word embedding and bidirection LSTMs (biLSTM). We also use convolutional neural networks (CNN). We found that our model consisting of …
Regional Integration: Physician Perceptions On Electronic Medical Record Use And Impact In South West Ontario, Sadiq Raji
Electronic Thesis and Dissertation Repository
Regional initiatives in the health care context in Canada are typically organized and administered along geographic boundaries or operational units. Regional integration of Electronic Medical Records (EMR) has been continuing across Canadian provinces in recent years, yet the use and impact of regionally integrated EMRs are not routinely assessed and questions remain about their impact on and use in physicians’ practices. Are stated goals of simplifying connections and sharing of electronic health information collected and managed by many health services providers being met? What are physicians’ perspectives on the use and impact of regionally integrated EMR? In this thesis, I …
Applying Front End Compiler Process To Parse Polynomials In Parallel, Amha W. Tsegaye
Applying Front End Compiler Process To Parse Polynomials In Parallel, Amha W. Tsegaye
Electronic Thesis and Dissertation Repository
Parsing large expressions, in particular large polynomial expressions, is an important task for computer algebra systems. Despite of the apparent simplicity of the problem, its efficient software implementation brings various challenges. Among them is the fact that this is a memory bound application for which a multi-threaded implementation is necessarily limited by the characteristics of the memory organization of supporting hardware.
In this thesis, we design, implement and experiment with a multi-threaded parser for large polynomial expressions. We extract parallelism by splitting the input character string, into meaningful sub-strings that can be parsed concurrently before being merged into a single …
Sybil Defense Using Efficient Resource Burning, Diksha Gupta
Sybil Defense Using Efficient Resource Burning, Diksha Gupta
Computer Science ETDs
In 1993, Dwork and Naor proposed using computational puzzles, a resource burning mechanism, to combat spam email. In the ensuing three decades, resource burning has broadened to include communication capacity, computer memory, and human effort. It has become a well-established tool in distributed security. Due to the cost attached to utilizing resource burning mechanism, these have not been popularized in domains apart from cryptocurrency.
In this dissertation, we design efficient resource burning based Sybil defense techniques for permissionless systems. As a first step, we identify existing resource burning mechanisms in literature in Chapter 2. Additionally, we enumerate numerous open problems …
Approximating Fol Ontologies Using Owl2, Robert W. Powell
Approximating Fol Ontologies Using Owl2, Robert W. Powell
Electronic Theses and Dissertations
With the amount of data collected everyday ever expanding, techniques which allow com- puters to semantically understand data are growing in importance. Ontologies are a tool to describe the relationships connecting data so that computers can correctly interpret and combine data from many sources. An ontology about water needs to describe what the term "river" may refer to: An arbitrary river or one usable for navigation; a single tributary or an entire river network; the riverbed or the water itself? Well-designed ontologies can be shared, reused, and extended across multiple applications and facilitate betters integration of different data collections.
Common …
Longitudinal Partitioning Waveform Relaxation Methods For The Analysis Of Transmission Line Circuits, Tarik Menkad
Longitudinal Partitioning Waveform Relaxation Methods For The Analysis Of Transmission Line Circuits, Tarik Menkad
Electronic Thesis and Dissertation Repository
Three research projects are presented in this manuscript. Projects one and two describe two waveform relaxation algorithms (WR) with longitudinal partitioning for the time-domain analysis of transmission line circuits. Project three presents theoretical results about the convergence of WR for chains of general circuits.
The first WR algorithm uses a assignment-partition procedure that relies on inserting external series combinations of positive and negative resistances into the circuit to control the speed of convergence of the algorithm. The convergence of the subsequent WR method is examined, and fast convergence is cast as a generic optimization problem in the frequency-domain. An automatic …
School District Boundaries Map, Nick Huffman
School District Boundaries Map, Nick Huffman
Honors Theses
The purpose of this project is to provide a school district boundary mapping feature to a product sold by Level Data called SDVS, which is a plugin used by districts inside of PowerSchool. Using primarily the features offered by Mapbox, We have implemented a React component that is capable of plotting useful data points related to a student and their school district on a map. The tool is designed to be used primarily by school administrators to determine whether or not a student lives within their district boundaries. The application uses a dataset that is provided by the NCES to …
Metalearning By Exploiting Granular Machine Learning Pipeline Metadata, Brandon J. Schoenfeld
Metalearning By Exploiting Granular Machine Learning Pipeline Metadata, Brandon J. Schoenfeld
Theses and Dissertations
Automatic machine learning (AutoML) systems have been shown to perform better when they use metamodels trained offline. Existing offline metalearning approaches treat ML models as black boxes. However, modern ML models often compose multiple ML algorithms into ML pipelines. We expand previous metalearning work on estimating the performance and ranking of ML models by exploiting the metadata about which ML algorithms are used in a given pipeline. We propose a dynamically assembled neural network with the potential to model arbitrary DAG structures. We compare our proposed metamodel against reasonable baselines that exploit varying amounts of pipeline metadata, including metamodels used …
Stem Teacher Database, Veronica Buss
Stem Teacher Database, Veronica Buss
Honors Theses
The College of Engineering and Applied Sciences (CEAS) Recruitment web application provides access to recruitment information for the Manager of Recruitment and Outreach and those who also use the spreadsheet file with their current data. This database is a functional database for the WMU college of engineering and applied sciences’ recruiters to organize their data on STEM teachers from the feeder high schools of WMU. The app provides an interface for its users to filter and search the data they have compiled to create recruitment mailing reports. The main purpose of this app was to facilitate the retrieval and upkeep …
Computer Vision For Recycling, Pratima Kandel
Computer Vision For Recycling, Pratima Kandel
Student Research Submissions
Americans recycle 32.1 percent of all the waste they create, as confirmed by the latest report from the Environmental Protection Agency. However, the underlying issue that remains is that most Americans are not equipped with the knowledge of the correct methods of recycling – and the deficiency of that knowledge is the greatest quandary to ensuring that the country is “green” and environment friendly. A survey of two thousand American citizens revealed that 62 percent of them worry that this inadequate knowledge is causing them to recycle incorrectly. The aim of this research is to develop an Android App, where …
Research On Improving Maritime Emergency Management Based On Ai And Vr In Tianjin Port, Shuli Sun
Research On Improving Maritime Emergency Management Based On Ai And Vr In Tianjin Port, Shuli Sun
Maritime Safety & Environment Management Dissertations (Dalian)
No abstract provided.
Extended Functionalities For Automating Comic Book Pull Files, Jackson Cunningham
Extended Functionalities For Automating Comic Book Pull Files, Jackson Cunningham
Theses/Capstones/Creative Projects
This Honors Thesis project involves programming additional features for a Java application developed as a team for the UNO Computer Science Capstone Project. The purpose of this Capstone project was to develop an updated Pull File system for Dragon’s Lair Comics & Games, which has been running an outdated system in need of improvement. The pull file is an organizational system used by customers to reserve new issues of specific on-going comic book series as they are released. The comic book store can use a pull file system to maintain records of customers, store inventory, and order requests, gaining important …
Nonparametric Bayesian Deep Learning For Scientific Data Analysis, Devanshu Agrawal
Nonparametric Bayesian Deep Learning For Scientific Data Analysis, Devanshu Agrawal
Doctoral Dissertations
Deep learning (DL) has emerged as the leading paradigm for predictive modeling in a variety of domains, especially those involving large volumes of high-dimensional spatio-temporal data such as images and text. With the rise of big data in scientific and engineering problems, there is now considerable interest in the research and development of DL for scientific applications. The scientific domain, however, poses unique challenges for DL, including special emphasis on interpretability and robustness. In particular, a priority of the Department of Energy (DOE) is the research and development of probabilistic ML methods that are robust to overfitting and offer reliable …
Exploration Of Mid To Late Paleozoic Tectonics Along The Cincinnati Arch Using Gis And Python To Automate Geologic Data Extraction From Disparate Sources, Kenneth Steven Boling
Exploration Of Mid To Late Paleozoic Tectonics Along The Cincinnati Arch Using Gis And Python To Automate Geologic Data Extraction From Disparate Sources, Kenneth Steven Boling
Doctoral Dissertations
Structure contour maps are one of the most common methods of visualizing geologic horizons as three-dimensional surfaces. In addition to their practical applications in the oil and gas and mining industries, these maps can be used to evaluate the relationships of different geologic units in order to unravel the tectonic history of an area. The construction of high-resolution regional structure contour maps of a particular geologic horizon requires a significant volume of data that must be compiled from all available surface and subsurface sources. Processing these data using conventional methods and even basic GIS tools can be tedious and very …
Development Of Computational Tools To Target Microrna, Luo Song
Development Of Computational Tools To Target Microrna, Luo Song
Dissertations & Theses (Open Access)
MicroRNAs (a.k.a, miRNAs) play an important role in disease development. However, few of their structures have been determined and structure-based computational methods remain challenging in accurately predicting their interactions with small molecules. To address this issue, my thesis is to develop integrated approaches to screening for novel inhibitors by targeting specific structure motifs in miRNAs. The project starts with implementing a tool to find potential miRNA targets with desired motifs. I combined both sequence information of miRNAs and known RNA structure data from Protein Data Bank (PDB) to predict the miRNA structure and identify the motif to target, then I …
Eelgrass (Zostera Marina) Population Decline In Morro Bay, Ca: A Meta-Analysis Of Herbicide Application In San Luis Obispo County And Morro Bay Watershed, Tyler King Sinnott
Eelgrass (Zostera Marina) Population Decline In Morro Bay, Ca: A Meta-Analysis Of Herbicide Application In San Luis Obispo County And Morro Bay Watershed, Tyler King Sinnott
Master's Theses
The endemic eelgrass (Zostera marina) community of Morro Bay Estuary, located on the central coast of California, has experienced an estimated decline of 95% in occupied area (reduction of 344 acres to 20 acres) from 2008 to 2017 for reasons that are not yet definitively clear. One possible driver of degradation that has yet to be investigated is the role of herbicides from agricultural fields in the watershed that feeds into the estuary. Thus, the primary research goal of this project was to better understand temporal and spatial trends of herbicide use within the context of San Luis …
Narrowing The Wealth And Income Gap In Poland, China, And The United States, Cyndy Carboo, Zhiling Song, Jiawei Feng, Xudong Zhu
Narrowing The Wealth And Income Gap In Poland, China, And The United States, Cyndy Carboo, Zhiling Song, Jiawei Feng, Xudong Zhu
School of Professional Studies
With the widespread of globalization, the wealth gap continues to widen globally. Due to the enormous differences in national conditions and political systems of various countries, this article selects China, the United States, and Poland as the research objects, and uses a specific time unit as the benchmark, and mainly focuses on the four directions of medical care, education, job opportunities, and pensions. A reader could understand the correlation between the wealth gap and multiple factors deeply in this article. This article analyzes the impact of income disparity on these three countries and proposes solutions to help narrow the gap …
The Impact Of Special Interest Groups On The Federal Dietary Guidelines: Consequences For American Health, Dory Mcmillan
The Impact Of Special Interest Groups On The Federal Dietary Guidelines: Consequences For American Health, Dory Mcmillan
School of Professional Studies
This research paper explores the impact of relationships between lobbyists and both the USDA and HSS, and the impact these relationships have on the Dietary Guidelines for Americans that the agencies work together to create. The paper focuses specifically on the information the guidelines present in regard to red meat consumption, and the impacts this may have on American health, and healthcare costs associated. It was hypothesized that a relationship would be found between special interest groups and the U.S. Department of Health and Human Services and/or the U.S. Department of Agriculture. Research found there was a relationship between special …
Healthy Food Portal Business Plan And Its Function Model, Alena Raupova
Healthy Food Portal Business Plan And Its Function Model, Alena Raupova
School of Professional Studies
Business planning is a tool of paramount importance in the process of company management, on the efficiency of which the future functioning of the enterprise depends. Formation of a business plan enables the team to productively and competently use existing funds and resources in their work and apply planning as a very effective management mechanism (Hamm, 2016).
The goal of this final project is to develop a business plan for a healthy nutrition portal for Bellyful LLC. Bellyful is based in Boston, USA, and the portal will be its first product. Our client is interested in researching the prospects of …
Worst Time Being Poor? The Hunger Problem In U.S. During Covid-19 Pandemic, Yuanhang Hu
Worst Time Being Poor? The Hunger Problem In U.S. During Covid-19 Pandemic, Yuanhang Hu
School of Professional Studies
Food insecurity is deeply rooted in American society during and before the COVID-19 pandemic. Food Insecurity usually associates with economic indicators, such as unemployment rate, income level, etc. Currently, there are two main tools to fight the war of hunger. The first one is the government food assistance programs. And the second one is food pantries from the private sectors of the community. Both tools are facing numerous challenges due to COVID-19. The purpose of this article is to provide rational reasons to persuade the government to enhance the benefits of the Supplemental Nutrition Assistance Program (SNAP) and use administrative …
Rcap Solutions Breach Management - Case Study, Eugene Adu-Gyamfi, Gio Al Muarrawi, Kwame Ofori
Rcap Solutions Breach Management - Case Study, Eugene Adu-Gyamfi, Gio Al Muarrawi, Kwame Ofori
School of Professional Studies
Companies get hacked every day, and our in-scope company for this case study, RCAP Solution, was not an exception. Security incidents have increased both in volume and range in recent years, and cyber-attacks have become more sophisticated than ever before. There are so many reasons that drive this fact; one is that our infrastructure was not protected efficiently, but also attackers have become more knowledgeable in initiating advanced attacks at a scale. Additionally, the entrance of emerging technologies such as blockchain, machine learning, and the internet of things, added additional complexity to the already complex scene. Cybercriminals are using various …
A Web-Based Ai Assistant Application Using Python And Javascript, Viet Le, Tej Bahadur, Jainee Shah, Roushan Ara
A Web-Based Ai Assistant Application Using Python And Javascript, Viet Le, Tej Bahadur, Jainee Shah, Roushan Ara
School of Professional Studies
Our research is mainly based on a chatbot which is powered by Artificial Intelligence. Nowadays, Artificial Intelligence assistants such as Apple’s Siri, Google’s Now and Amazon’s Alexa are currently fast-growing and widely integrated with many smart devices. These assistants are built with the primary purpose of being personal assistants for every individual user in certain contexts. In this research, we would highlight the development process of the chatbots, features, problems, case studies and limitations.
This research delivers the information, helps developers to build answer bots and integrate chatbots with business accounts. The aim is to assist users and allow transactions …
Implementimi I Devops Strategjisë Në Kompani Të Vogla Dhe Të Mesme, Diellza Shabani
Implementimi I Devops Strategjisë Në Kompani Të Vogla Dhe Të Mesme, Diellza Shabani
Theses and Dissertations
DevOps është një kornizë konceptuale për riintegrimin e zhvillimit dhe funksionimit të Sistemeve të Informacionit. Unë kam kryer një studim për strategjitë e ndryshme të implementimit të DevOps në kompani të ndryshme. Unë vërejta se DevOps nuk është studiuar në mënyrë adekuate në literaturën shkencore. Ekzistojnë relativisht pak kërkime në dispozicion në DevOps dhe studimet shpesh janë me cilësi të ulët. Unë gjithashtu vërejta që DevOps mbështetet nga një kulturë e bashkëpunimit, automatizimi, matje, shkëmbimi i informacionit dhe përdorimi i shërbimit në internet. DevOps përfiton nga SI dhe zhvillimi i operacioneve. Ajo gjithashtu ka efekte pozitive në zhvillimin e shërbimit …
Ndërtimi I Një "To-Do" Aplikacioni Me Teknologjinë Flutter, Emnolina Brahimi
Ndërtimi I Një "To-Do" Aplikacioni Me Teknologjinë Flutter, Emnolina Brahimi
Theses and Dissertations
Aplikacionet për telefon mobil viteve të fundit kanë filluar të zëvendësojnë shumë veprimtari që në të shkuarën i kemi bërë në mënyrë primitive te themi. Nevoja për të kursyer sa më shumë kohë, energji dhe para ka bërë që të krijohen aplikacione të ndryshme, inovative dhe mbi të gjitha aplikacione që ofrojnë zgjidhje të problemeve.
Smartphone-ët por edhe shumë pajisje të tjera elektronike si tabletet dhe smartwatch janë bërë aq të nevojshme sa që pothuajse secili person i rritur mund të posedoj një të tillë.
Duke parë kërkesën dhe nevojën në tregun tonë për zgjidhje të problemeve përmes aplikacioneve, si …
Vitrina Virtuale E Librit, Genti Sheholli
Vitrina Virtuale E Librit, Genti Sheholli
Theses and Dissertations
Zhvillimi i aplikacioneve moderne në ditët e sotme nuk është vetëm proces i ndërtimit të aplikacionit. Procesi përfshin zhvillimin e shërbimeve në anën e serverit dhe aplikacionit në anën e klientit. Teknologjitë dhe opsionet për të zhvilluar një web aplikacion janë të shumta dhe varësisht se cfarë web aplikacioni duhet të zhvillohet mund të vendosim edhe për teknologjitë në secilin aspekt.
Qëllimi i këtij web aplikacioni është hulmtimi në teknologjit të kohës që kanë marrë hov të zhvillimit në aplikacionet moderne dhe hulumtim në zhvillimin e aplikacionit me struktura moderne.
Ky web aplikacion është një sintezë e proceseve, procedurave dhe …