Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Vulnerability Of Passwords Consisting Of Numerical Repetitive Sequences In The Wpa2 Protocol, Genc Kelmendi, Edmond Hajrizi Oct 2019

Vulnerability Of Passwords Consisting Of Numerical Repetitive Sequences In The Wpa2 Protocol, Genc Kelmendi, Edmond Hajrizi

UBT International Conference

Protocols that govern wireless security WPA2/WPA have been proven much more secure in comparison to their predecessor WEP. However, the human factor jeopardizes the solidity of cryptography by implementing passwords consisting of programmatically predictable numerical structures such as 1234512345, 11114444, 999888777 and so on. This practice endangers the security of the WPA protocol in particular, as the locally stored WPA handshake can be attacked for an unlimited number of times using brute-force attacks. The methods presented in this paper are effective in decrypting such passwords within seconds using ordinary processor power. The prevalence of this vulnerable practice in the Prishtina …


Ai Leverage In Easing The 5g Complexity And Enhancing 5g Intelligent Connectivity, Xhafer Krasniqi Oct 2019

Ai Leverage In Easing The 5g Complexity And Enhancing 5g Intelligent Connectivity, Xhafer Krasniqi

UBT International Conference

As 5G era is approaching fast and pre-commercial 5G tests and trials are happening everywhere around the world, one of the key challenges for carriers and 5G providers is to maintain and operate the network complexity required to meet diverse services and personalized user experience requirements. This maintenance and operation have to be smarter and more agile in 5G than it was in previous generations. AI and ML can be leveraged in this case to ease 5G complexity and at the same time enhance the intelligent connectivity between diverse devices and diverse tiny end points, e.g. IoT sensors.

Machine learning …


Password Typo Correction Using Discrete Logarithms, Nikola K. Blanchrad Oct 2019

Password Typo Correction Using Discrete Logarithms, Nikola K. Blanchrad

UBT International Conference

As passwords remain the main online authentication method, focus has shifted from naive entropy to how usability improvements can increase security. Chatterjee et al. recently introduced the first two typotolerant password checkers, which improve usability at no security cost but are technically complex. We look at the more general problem of computing an edit distance between two strings without having direct access to those strings — by storing the equivalent of a hash. We propose a simpler algorithm for this problem that is asymptotically quasi-optimal in both bits stored and exchanged, at the cost of more computation on the server.


How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni Oct 2019

How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni

UBT International Conference

The purpose of this paper is to examine how Kosovo firms utilize business intelligence to analyze their data and better understand the past, present and the future of their firm. Business intelligence offers firms the ability to analyze large amount of data quicker and more effective. Decision making has become easier with the use of BI tools, but making the right decision at right time has become vital for the firms performance. This research will contribute on business industry by providing evidence how Kosovo firms utilize the BI system, what BI tools and what business values and processes BI offers …


Analyzing The Linearity Of Some Operators, Faton Kabashi, Azir Jusufi, Hizer Leka Oct 2019

Analyzing The Linearity Of Some Operators, Faton Kabashi, Azir Jusufi, Hizer Leka

UBT International Conference

Linear operators occupy an important place in functional analysis and linear algebra, which are among the most important and substantive disciplines of mathematics, whose methods and results have created an indispensable apparatus for the development of numerical mathematics, theory of approximations, equations differential and especially mathematical physics and applied mathematics. Also, linear operators are a central object of study in vector space theory.

A linear operator is a function which satisfies the conditions of additivity and homogeneity. Not every function is linear operators. We will try to explore some functions which are also linear operators.


Improvement Of Gender Recognition Using The Cosfire Filter Framework (Simulations Platform Of Shape-Preserving Regression – Pchip), Virtyt Lesha, Arben Haveri, Jozef Bushati Oct 2019

Improvement Of Gender Recognition Using The Cosfire Filter Framework (Simulations Platform Of Shape-Preserving Regression – Pchip), Virtyt Lesha, Arben Haveri, Jozef Bushati

UBT International Conference

Biometrics is evolving every day more and more in technical sense and consequently faces with further challenges that become sharper. One of these challenges of is gender recognition that finds very important and key applications. In this paper, we consider the gender recognition process implemented through the Cosfire filter applied through Viola-Jones algorithm and simulated through the Matlab platform. Objective of this paper is improving the execution of gender recognition. The database contains 237 images of 128 to 128 pixels, where 128 are males and 109 are females. For each of them, gender recognition is performed by applying current and …


An Overview Of Big Data Analytics In Banking: Approaches, Challenges And Issues, Fisnik Doko, Igor Miskovski Oct 2019

An Overview Of Big Data Analytics In Banking: Approaches, Challenges And Issues, Fisnik Doko, Igor Miskovski

UBT International Conference

Banks are harnessing the power of Big Data. They use Big Data and Data Science to drive change towards data and analytics to gain an overall competitive advantage. The Big Data has potential to transform enterprise operations and processes especially in the banking sector, because they have huge amount of transaction data. The goal of this paper is to give an overview of different approaches and challenges that exists in Big Data in banking sector. The work presented here will fulfill the gap of research papers in the last five years, with focus on Big Data in central banks and …


Semantic Web Technologies, Dukagjin Hyseni Oct 2019

Semantic Web Technologies, Dukagjin Hyseni

UBT International Conference

This study attempts to highlight the great importance of developing Semantic Web as one of the best discovery of better data management and presentation within the WWW. Since the W3C's was discovered, initially providing classic web content as web 1.0 that had link / hyperlink of document`s location, then web 2.0 as web-applications have more advanced technologies to connect data, and finally semantic web as extension of web 3.0 also known as Linked Data. The results show that in addition to the rapid development of the Semantic Web, the demand to use its features by data publishers and data readers …


Applying Soa Approach To Financial Institution: Case Study, Agon Memeti, Florinda Imeri Oct 2019

Applying Soa Approach To Financial Institution: Case Study, Agon Memeti, Florinda Imeri

UBT International Conference

A financial institution is an institution that conducts financial transactions, such as depositing money, taking out loans and/or exchanging currencies. Systems used by them like any other system tend to skew old, but, the replacement and integration of these systems is a difficult due to the heterogeneous nature. Due to this it is imperative to consider alternative infrastructure such as SOA (service-oriented architecture), which is seen as the best technology for internal and external interfaces, resulting cost reductions associated with its deployment; combined with standardized protocols, and increased interoperability among IT infrastructures. Studies shows that this flexible architecture will encourage …


International Conference On Computer Science And Communication Engineering, University For Business And Technology - Ubt Oct 2019

International Conference On Computer Science And Communication Engineering, University For Business And Technology - Ubt

UBT International Conference

UBT Annual International Conference is the 8th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent …