Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 45 of 45

Full-Text Articles in Physical Sciences and Mathematics

The Influence Of Cloud Computing And Mobile Technology In Our Activities, Ramadan Cikaqi, Ilir Morina Nov 2015

The Influence Of Cloud Computing And Mobile Technology In Our Activities, Ramadan Cikaqi, Ilir Morina

UBT International Conference

Through this paper we present the development of information technology especially in cloud computing and mobile technology as an integral part of everyday life, as well as the advantages that cloud computing and mobile technology offers to the business community and the private one. Furthermore, it presents the possibilities offered by this technology on the data preservation compared with the traditional ones. Due to the increased demand for big space, it was necessary to establish a centralized data storage which has brought with it more innovation and advantage, in comparison with other media for data storage in personal memories. This …


Performance Indicators Analysis Inside A Call Center Using A Simulation Program, Ditila Ekmekçiu, Markela Muça, Adrian Naço Nov 2015

Performance Indicators Analysis Inside A Call Center Using A Simulation Program, Ditila Ekmekçiu, Markela Muça, Adrian Naço

UBT International Conference

This paper deals with and shows the results of different performance indicators analyses made utilizing the help of Simulation and concentrated on dimensioning problems of handling calls capacity in a call center. The goal is to measure the reactivity of the call center’s performance to potential changes of critical variables. The literature related to the employment of this kind of instrument in call centers is reviewed, and the method that this problem is treated momentarily is precisely described. The technique used to obtain this paper’s goal implicated a simulation model using Arena Contact Center software that worked as a key …


Exploring The Role Of Sentiments In Identification Of Active And Influential Bloggers, Mohammad Alghobiri, Umer Ishfaq, Hikmat Ullah Khan, Tahir Afzal Malik Nov 2015

Exploring The Role Of Sentiments In Identification Of Active And Influential Bloggers, Mohammad Alghobiri, Umer Ishfaq, Hikmat Ullah Khan, Tahir Afzal Malik

UBT International Conference

The social Web provides opportunities for the public to have social interactions and online discussions. A large number of online users using the social web sites create a high volume of data. This leads to the emergence of Big Data, which focuses on computational analysis of data to reveal patterns, and associations relating to human interactions. Such analyses have vast applications in various fields such as understanding human behaviors, studying culture influence, and promoting online marketing. The blogs are one of the social web channels that offer a way to discuss various topics. Finding the top bloggers has been a …


Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach Nov 2015

Microsimulation Models For Simulating Pathways Of Patients With Mental Diseases, Andreas Bauer, Felix Breitenecker, Christoph Urach

UBT International Conference

Predicting demand for care is necessary to provide sufficient capacities in hospitals and enable better planning to cope with challenges like changes in the structure of the population. Emphasis in this work is put on the analysis of the data and on the parametrization of a simulation model for the paths of patients with mental diseases through the health care system. Survival analysis and model selection methods are used for this purpose. Data on patients and their treatments is analyzed with methods of survival analysis. Different methods for modelling the survival and hazard function are presented and compared. Hereby, the …


The Importance Of Big Data Analytics, Eljona Proko Nov 2015

The Importance Of Big Data Analytics, Eljona Proko

UBT International Conference

Identified as the tendency of IT, Big Data gained global attention. Advances in data analytics are changing the way businesses compete, enabling them to make faster and better decisions based on real-time analysis. Big Data introduces a new set of challenges. Three characteristics define Big Data: volume, variety, and velocity. Big Data requires tools and methods that can be applied to analyze and extract patterns from large-scale data. Companies generate enormous volumes of polystructured data from Web, social network posts, sensors, mobile devices, emails, and many other sources. Companies need a cost-effective, massively scalable solution for capturing, storing, and analyzing …


10 W Dc-Dc Converter Based Led Driver Circuit Design, Ö. Faruk Farsakoğlu, H. Yusuf Hasrici, Ibrahim Çelik Nov 2015

10 W Dc-Dc Converter Based Led Driver Circuit Design, Ö. Faruk Farsakoğlu, H. Yusuf Hasrici, Ibrahim Çelik

UBT International Conference

Considering the total amount of energy consumed in the world, energy used in lighting is of utmost importance. For this reason, systems used in lighting should be energy efficient, and mıre efficient lighting elements should be preferred. LED, as a solid-state lighting system, is more energy efficient than the lighting systems with conventional lighting elements. Some of the LEDs used in solid-state lighting systems are named as standard 5mm LEDs and power LEDs. Because power LEDs have more light efficiency than standard 5 mm LEDs, they are produced as an alternative to conventional light sources. Power LEDs draw much more …


Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa Nov 2015

Implementation Of The Aodv Routing In An Energy-Constrained Mesh Network, Altin Zejnullahu, Zhilbert Tafa

UBT International Conference

Wireless sensor networks (WSNs) compose the fundamental platform for a number of Internet of Things (IoT) applications, especially those related to the environmental, health, and military surveillance. While being autonomous in power supply, the main challenge in node’s processing and communication architecture design remains the energy efficiency. However, this goal should not limit the main functionality of the system which is often related to the network coverage and connectivity. This paper shows the implementation of the Ad-hoc On-demand Distance Vector (AODV) routing algorithm in an XBee based platform. As shown, the network can achieve low power consumption per node primarily …


Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi Nov 2015

Internet Of Things: From Applications, Challenges And Standardization To Industry Implementations, Xhafer Krasniqi

UBT International Conference

The Internet of Things that is defined as anything that can be accessible anytime and anywhere provides connectivity to different objects and sensors around us and which will enable the transfer of different data between these objects and devices. A thing in the Internet of Things can be any natural or man-made object that can be assigned an IP address with a capability to exchange date over a network. There is a huge number of applications of IoT to benefit users, such as health monitors, smart homes, connected cars etc. If everything around us is connected and information about these …


Bounty Techniques For Web Vulnerability Scanning, Tanzer Abazi, Mentor Hoxhaj, Edmond Hajrizi, Gazmend Krasniqi Nov 2015

Bounty Techniques For Web Vulnerability Scanning, Tanzer Abazi, Mentor Hoxhaj, Edmond Hajrizi, Gazmend Krasniqi

UBT International Conference

With the advancement of technology and the raising of massive amount of data, the used techniques for data security are continually a challenge. This paper contributes on identifying the gaps and evaluating security level on web portals hosted or managed by Republic of Kosovo institutions or businesses, whose data privacy and security could be a big business concern. The results have been obtained from real case scenario, where 25 security researchers have contributed in white hack activities. These activities, were part of a one day conference called. “The DAY when hacking is legal”, held in Pristine.


Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi Nov 2015

Security Concerns Of New Alternative Telecommunication Services, Arbnora Hyseni, Krenare Pireva, Miranda Kajtazi

UBT International Conference

With the advancing new era of communication, the so-called era of ‘being always online’ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update …


Menaxhimi I Patundshmërive (Ueb Aplikacion), Liridon Vrapca Oct 2015

Menaxhimi I Patundshmërive (Ueb Aplikacion), Liridon Vrapca

Theses and Dissertations

Shumë studentë vijnë nga qytete të ndryshme të vendit këtu në Prishtinë për të studiuar, dhe shumë herë kanë hasur në problemin e gjetjes së një apartamenti dhe vendi adekuat ku do të vendosen gjatë viteve të studimeve. Duke parë që kemi mungesë të zgjidhjes së këtij problemi në tregun tonë, kompanitë që ofrojnë sot ueb aplikacione në këtë drejtim nuk kanë zgjidhje adekuate dhe nuk janë të përshtatshme, duke parë që këto ueb aplikacione nuk posedojnë përkrahje në menaxhim të pronave dhe përdoruesve të agjensioneve të patundshmërive ku këtu shfrytëzohen ueb aplikacionet duke regjistruar pronat nga përdorues vetëm për …


Implementimi I Sherbimeve Te Kualitetit (Qos) Ne Ndermarrjet E Vogla Dhe Te Mesme, Kushtrim Berisha Jul 2015

Implementimi I Sherbimeve Te Kualitetit (Qos) Ne Ndermarrjet E Vogla Dhe Te Mesme, Kushtrim Berisha

Theses and Dissertations

Në ndërmarrjet e vogla apo të mesme shpesh bie nevoja që kualiteti i shërbimeve të jetë pikë kritike për shumë arsye si p.sh. Ofrimi i shërbimeve online për konsumatorin në kohë reale dhe efikasitet të lartë, si dhe parandalime të vonesave të mundshme në rrjetë për arsye të kapacitetit të bandwidth-it apo resurseve teknike.

Si fillim nevoja për shërbime të kualitetit është shfaqur në voice (telephony) në vitin 1994 nga organizata për standardizime të teknologjisë informative ITU [1]. Më vonë shërbimet e kualiteti u bënë të nevojshme edhe në shërbime dhe servise të tjera siç janë: response time, loss, crosstalk …


Edukimi I Punonjësve Për Mbrojtje Nga Spyware – Rasti I Studimit Nëkompanitë E Sigurimit, Gentian Qorraj May 2015

Edukimi I Punonjësve Për Mbrojtje Nga Spyware – Rasti I Studimit Nëkompanitë E Sigurimit, Gentian Qorraj

Theses and Dissertations

Spyware është një softuer i instaluar në një sistem kompjuterik. Programet Spyware tentojnë të instalohen në kompjutëret e punonjësve për të monitoruar veprimet e tyre duke mbledhur informacione private të cilat janë në rëndësi për palen e tretë. Spyware është një kërcënim në rritje duke përfshire kompanitë në përgjithësi poashtu edhe mjedise tjera të punës.Spyware-i është një kategori e gjerë e softuerit me qëllim të keq. Ai është zhvilluar nga individët të cilët kanë krijuar këtë lloj programi me qëllim që të ndërpres ose të marrë kontrollin e pjesshëm të funksionit të kompjuterit në mesin e aktivitetetve tjera të dyshimta …


Windows Authentication, Rfid Security, Shkëlqim Rexhepi Apr 2015

Windows Authentication, Rfid Security, Shkëlqim Rexhepi

Theses and Dissertations

Identifikimi Radio Frekuencor (Radio Frequency Identification - RFID) është teknologji identifikimi automatik që duke përdorur radio valët transmeton informata shumë fleksibile në lidhje me një objekt të caktuar, person apo gjësend. Me ndihmën e sistemeve RFID dhe sidomos me zhvillimin e atyre NFC (NearFieldCommunication) kjo lloj teknologjie ka tërhek interes dhe ka gjetur zbatim shumë të madh në mbarë botën në shumë fusha të ndryshme. Në këtë punim është bërë një studim dhe shtjellim i temave të ndryshme lidhur me teknologjinë RFID duke filluar prej koncepteve bazë si verifikimi, identifikimi dhe performaca e ketyre llojeve të teknologjisë, është bërë shtjellim …


Kuptimi Dhe Rëndësia E Studimit, Te Dizajnimi Ux, Shkëlqim Mula Feb 2015

Kuptimi Dhe Rëndësia E Studimit, Te Dizajnimi Ux, Shkëlqim Mula

Theses and Dissertations

Ky dokumente paraqet rëndësinë e dizajnimit Përdoruesi në Qendër ( nga Anglishtja “User Experience” që njihet me shkurtesën UX ) në ndryshimin e industrisë, duke theksuar fuqinë e këtij dizajnimi për të zhvilluar produkte, sisteme, softvere, aplikacione të reja me fokus përdoruesin, për të arritur një produkt final që i përmbushë të gjitha çka kërkohet dhe më shumë.

Bazuar në evoluimin e teknologjisë dhe rritjes së konkurrencës ndërmjet zhvilluesve për të ofruar një produkt, aplikacion revulocionar, dizajnimi UX tanimë veçse është e qartë, që përdormi i këtij dizajni është bërë një mënyrë e zakonshme për krijimin e produkteve, aplikacioneve të …