Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Physical Sciences and Mathematics

Constructing Hadamard Matrices Using Binary Codes, Hizer Leka, Faton Kabashi Oct 2020

Constructing Hadamard Matrices Using Binary Codes, Hizer Leka, Faton Kabashi

UBT International Conference

In this paper is presented a very efficient method for constructing Hadamard matrices, using binary code products. We will construct such matrices using the scalar production of two vectors and the tensor production of Hadamard matrices. This method is based on the representation of the natural number as a binary code which takes only two values 0 or 1. Such a method of generating Hadamard matrices can be used in practice to generate different codes, in telecommunication systems, to correct blocked codes, but also in science as for example in Boolean algebra.


Suggestions And Recommendations For Fulfillment And Implementation Of The Project For Broadband Internet In Macedonia, Zoran Aleksov, Boris Arsov, Vergim Sherifi, Nenad Popovic Oct 2020

Suggestions And Recommendations For Fulfillment And Implementation Of The Project For Broadband Internet In Macedonia, Zoran Aleksov, Boris Arsov, Vergim Sherifi, Nenad Popovic

UBT International Conference

Nowadays, broadband is defined on the basis of a number of parameters that can be offered through existing electronic communications networks (fixed or mobile networks) and the construction of some next generation of advanced electronic communications networks. This is extremely important for the quality of the received service, because with the existence of a quality electronic communication network, you will distribute a quality and fast data transfer to the end users, some of whom actually want it. Optical cable, among other types of cables, using the Operator and the access method known as " fiber to the home ", has …


Usage Of The Symbols And Dionis Square In The Cryptosystem Of Dionis, Dionis Shabani Oct 2020

Usage Of The Symbols And Dionis Square In The Cryptosystem Of Dionis, Dionis Shabani

UBT International Conference

The rapid developments of technology which have brought with them a host of benefits to humanity have also left behind a host of spaces which have mostly aided cyber piracy who exploit the many benefits of the internet for purposes that are in their favor,but these actions which negatively affect the privacy of all internet users. In this project I will present some modifications which are enabled through the 16x16 square of Dionis with 256 elements based in the Masonic Cipher method, with the help of which based on the rules I have created and developed it is different from …


An Alternative Probabilistic Protocol For Relaying Wireless Networks, Faton Maliqi Oct 2020

An Alternative Probabilistic Protocol For Relaying Wireless Networks, Faton Maliqi

UBT International Conference

In this paper we propose an alternative probabilistic protocol for relaying wireless network. Usually, the communication protocols are designed to be deterministic when it comes to the order of retransmission from the communication nodes. In contrast, we propose an alternative probabilistic protocol where the retransmitting nodes are chosen probabilistically, and which allows easier performance optimization. Using Monte Carlo simulations, we will show at which location of the Relay do we get the best performance. Due to energy consuming concern and due to lower complexity advantage, as required in technologies such as Internet of Things (IoT), we will consider the case …


Proposal Of A Legal Framework Through The Development Of New Domain Specific Languages (Dsl) In Compliance With Gdpr, Tea Tavanxhiu, Andrea Alberici, Kozeta Sevrani Oct 2020

Proposal Of A Legal Framework Through The Development Of New Domain Specific Languages (Dsl) In Compliance With Gdpr, Tea Tavanxhiu, Andrea Alberici, Kozeta Sevrani

UBT International Conference

The adaptation of company processes to the EU Regulation represents a major opportunity to review, update and improve the internal processes and management tools used. The loss of data, in most cases, causes serious damage to the image and very often the total closure of the company. The legislation therefore represents an opportunity and a stimulus to verify the management methods applied, to define an organizational model and a code of conduct (policies, processes, rules / provisions and controls) capable of improving internal processes, defining and achieving desired objectives, ensure data and systems protection with proper risk management and assessment. …


Big Data Analytics On Cloud: Challenges, Techniques And Technologies, Aleksander Biberaj, Olimpion Shurdi, Bledar Kazia, Renalda Kushe, Alban Rakipi Oct 2020

Big Data Analytics On Cloud: Challenges, Techniques And Technologies, Aleksander Biberaj, Olimpion Shurdi, Bledar Kazia, Renalda Kushe, Alban Rakipi

UBT International Conference

These days it is known that Big Data Analytics is taking a huge attention from researchers and also from business. We all are witness of the data growth that every institution, company or even individuals store in order to use them in the future. There is a big potential to extract useful data from this Big Data that is stored usually in Cloud because sometimes there is not enough local space to store big amounts of data. There is a huge number of sectors where Big Data can be helpful including economic and business activities, public administration, national security, scientific …


Fraud Detection Using Data-Driven Approach, Arianit Mehana, Krenare Pireva Nuci Oct 2020

Fraud Detection Using Data-Driven Approach, Arianit Mehana, Krenare Pireva Nuci

UBT International Conference

The extensive use of internet is continuously drifting businesses to incorporate their services in the online environment. One of the first spectrums to embrace this evolution was the banking sector. In fact, the first known online banking service came in 1980. It was deployed from a community bank located in Knoxville, called the United American Bank. Since then, internet banking has been offering ease and efficiency to costumers in completing their daily banking tasks. The ever increasing use of internet banking and the large number of online transactions, increased fraudulent behaviour also. As if fraud increase wasn’t enough, the massive …


Peer To Peer Audio And Video Communication, Kushtrim Pacaj, Kujtim Hyseni, Donika Sfishta Oct 2020

Peer To Peer Audio And Video Communication, Kushtrim Pacaj, Kujtim Hyseni, Donika Sfishta

UBT International Conference

In this paper we introduce a simple way on how you can build your own “end-to- end” audio and video chat. You can expect to learn how to add new features on it, as well as building your own signaling server, your mobile UI and mobile calls logic implemented in a perfect coexistence between NodeJS, Java and Kotlin. What makes this application special is the possibility to express yourself with different annotations while you’re on a video chat.


Oauth2.0 In Securing Apis, Olimpion Shurdi, Aleksander Biberaj, Igli Tafa, Genci Mesi Oct 2020

Oauth2.0 In Securing Apis, Olimpion Shurdi, Aleksander Biberaj, Igli Tafa, Genci Mesi

UBT International Conference

Today’s modern applications are mostly designed around API’s. API’s are used for a variety of things such as passing data to another webservice reading data from a database etc. The problem with this is that not all the API’s are secure. Most of the today’s API’s are old and rely only on an authentication token where the user data often had to share their credentials with the application to enable such an API call on their behalf or string them, which is often hardcoded. We will focus on OAUTH 2.0 as new protocol in securing our API’s. This is a …


Multithreaded Approach For Using Blockchain As An Automated Versioning Tool, Arber Kadriu, Dijar Kadriu, Donjet Salihi, Edmond Jajaga Oct 2020

Multithreaded Approach For Using Blockchain As An Automated Versioning Tool, Arber Kadriu, Dijar Kadriu, Donjet Salihi, Edmond Jajaga

UBT International Conference

Blockchain is a new and growing technology with a bright future ahead. It can be implemented in many different ways and different industries like banking, cryptocurrencies, health information systems etc. Its powerfulness in security and systematic tracking of different items makes it one of its kind and attractive to work with. This technology is also a suitable environment for multithreaded programming to be adopted in, while using blocks and items to be tracked by single threads. This paper presents an innovative approach of using blockchain as a versioning control tool for personal or commercial usage.


Performance Evaluation Of Non-Relational Data On Big Data Environments, Edmond Jajaga, Edi Hasaj Oct 2020

Performance Evaluation Of Non-Relational Data On Big Data Environments, Edmond Jajaga, Edi Hasaj

UBT International Conference

Big data management is a real challenge for traditional systems. The experimental evaluation is performed on measurement of performance of five different databases with an open non-relational dataset. It was structured and tested separately in each store, giving some advantages and limitations to them from a practical point of view. The results are drawn based on the throughput per number of users executed respectively. It was loaded and executed more than a million of records in each and every database. Following its semi-persistent model, Redis performed better than other databases.


Aspects Of The Use Of Nanotechnology And Nanomedicine In Medicine, Muhamet Avdyli, Era Kastrati Oct 2020

Aspects Of The Use Of Nanotechnology And Nanomedicine In Medicine, Muhamet Avdyli, Era Kastrati

UBT International Conference

The purpose of this paper is to show aspects of the application of nanotechnology nowadays, especially in health. Nanotechnologies are the design, characterization, production and application of structures, equipment and systems by controlling the shape and size at the nanometer scale. The special branch that deals with the study of medicine in nanotechnology is called nanomedicine. Nanomedicine is a branch of medicine that applies the knowledge and tools of nanotechnology in the prevention and treatment of disease. Nanomedicine involves the use of nanoscale materials, such as nanoparticles and nanorobots, for diagnostic, dispersing, sensitizing, or activating purposes in a living organism. …


9th International Conference On Business, Technology And Innovation 2020, University For Business And Technology - Ubt Oct 2020

9th International Conference On Business, Technology And Innovation 2020, University For Business And Technology - Ubt

UBT International Conference

Welcome to IC – UBT 2020

UBT Annual International Conference is the 9th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make …


International Conference Information Systems And Security, University For Business And Technology - Ubt Oct 2020

International Conference Information Systems And Security, University For Business And Technology - Ubt

UBT International Conference

UBT Annual International Conference is the 9th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent …


International Conference On Mechatronics, System Engineering And Robotics & Informations System And Engineering, University For Business And Technology - Ubt Oct 2020

International Conference On Mechatronics, System Engineering And Robotics & Informations System And Engineering, University For Business And Technology - Ubt

UBT International Conference

UBT Annual International Conference is the 9th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent …


International Conference On Computer Science And Communication Engineering, University For Business And Technology - Ubt Oct 2020

International Conference On Computer Science And Communication Engineering, University For Business And Technology - Ubt

UBT International Conference

UBT Annual International Conference is the 9th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent …


How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni Oct 2020

How Do Kosovo Firms Utilize Business Intelligence? An Exploratory Study, Ardian Hyseni

UBT International Conference

The purpose of this paper is to examine how Kosovo firms utilize business intelligence to analyze their data and better understand the past, present and the future of their firm. Business intelligence offers firms the ability to analyze large amount of data quicker and more effective. Decision making has become easier with the use of BI tools, but making the right decision at right time has become vital for the firms performance. This research will contribute on business industry by providing evidence how Kosovo firms utilize the BI system, what BI tools and what business values and processes BI offers …


Visual Cryptography Scheme With Digital Watermarking In Sharing Secret Information From Car Number Plate Digital Images, Ana Savic, Goran Bjelobaba, Radosav Veselinovic, Hana Stefanovic Oct 2020

Visual Cryptography Scheme With Digital Watermarking In Sharing Secret Information From Car Number Plate Digital Images, Ana Savic, Goran Bjelobaba, Radosav Veselinovic, Hana Stefanovic

UBT International Conference

In this paper a visual cryptography scheme with a binary additive stream cipher is used to form the meaningless shares (share images or multiple layers) of original digital image, hiding some secret information. Each share image holds some information, but at the receiver side only when all of them are superimposed, the secret information is revealed by human vision without any complex computation. Proposed algorithm for generating shares is applied in MATLAB programming environment, using MATLAB built-in functions to create sequences of pseudorandom numbers or streams, which are used to make share images of original digital image. The input image …