Schedule

Subscribe to RSS Feed

2019
Saturday, October 26th
8:30 AM

International Conference on Computer Science and Communication Engineering

PDF

University for Business and Technology - UBT

Lipjan, Kosovo

8:30 AM - 5:00 PM

11:00 AM

3D Animation and Virtual Reality in Education and Training

Jeton Lakna, University for Business and Technology
Edmond Hajrizi, University of Business and Technology

Pristina, Kosovo

11:00 AM - 12:30 PM

In this publication, I have chosen an important field in computer animation and virtual reality which is a new way of teaching in education, and there is scope for further research evaluating its use under different educational programs. The use of computer animation and virtual reality technologies also can be used in a wide variety of areas - in science, art, education, as well as in leisure (computer games, laser shows) and everyday life (animation on displays of mobile phones and household appliances).

The purpose of this study was to evaluate and compare how three-dimensional model and virtual reality with or without instructor feedback influenced students’ learning new skills related to human anatomy.

Analysis and Applications of Software System for Calibration of Vehicles

Admir Dermala, University for Business and Technology - UBT
Bekim Fetaji, University for Business and Technology - UBT

Pristina, Kosovo

11:00 AM - 12:30 PM

This research study aims to evaluate the analysis and application of vehicle calibration software and to measure the power of vehicles before calibration and after calibration. To accomplish this topic, a descriptive method was used which describes in detail the operation of the Engine Control Unit (ECU) and WINOLS, as well as the analytical method to analyze and show the results before and after ECU modification or calibration. The sample in this research considered four cars: Passat CC, Golf 6, BMW and Audi A3. The research results show that cars before calibration, ie. with software that are calibrated by the manufacturer, have the power assigned, so we did pre-calibration measurement if everything is OK with the machine. The analysis has shown that after the software recalibration we have achieved 10% - 30% more power from the same engine only by recalibration of the original software from the manufacturer.

Applying SOA Approach to Financial Institution: Case Study

PDF

Agon Memeti, University of Macedonia
Florinda Imeri, University of Macedonia

Pristina, Kosovo

11:00 AM - 12:30 PM

A financial institution is an institution that conducts financial transactions, such as depositing money, taking out loans and/or exchanging currencies. Systems used by them like any other system tend to skew old, but, the replacement and integration of these systems is a difficult due to the heterogeneous nature. Due to this it is imperative to consider alternative infrastructure such as SOA (service-oriented architecture), which is seen as the best technology for internal and external interfaces, resulting cost reductions associated with its deployment; combined with standardized protocols, and increased interoperability among IT infrastructures. Studies shows that this flexible architecture will encourage innovation and increase the banks' ability to react to customer feedback a lot more swiftly.

An approach to building information system for the financial institution, based on the technology of SOA is discussed in the paper. The financial institution for which we have proposed a SOA based architecture is Saving House Mozhnosti, a financial institution that exists in the financial market for 17 years. The Savings House serves micro, small and middle enterprises that belong in the sector of trade, services and production as well as physical persons and offers financial products and services such as crediting and savings. It is recognizable for the support to the people in need to get financial support for their good business ideas, belief in free initiative, individual creativity and personal responsibility. As one successful financial institution, there is no doubt it can highly benefit by SOA approach.

Our goal is to act as a guide in helping this institution tackle the types of issues using a services-based approach, thus improving customer experience. The proposed approach will improve the manageability of the system, increase its speed and reliability and provide security.

Conceptual Design and Software Development of Clinical Management System based on Microservices

Xhelal Jashari, University for Business and Technology - UBT
Edin Vllaço, University for Business and Technology - UBT
Bekim Fetaji, University for Business and Technology - UBT
Besnik Qehaja, University for Business and Technology

Pristina, Kosovo

11:00 AM - 12:30 PM

Healthcare as a field contains many processes that require time and dedication. So far, many of these processes have been done manually, which has come with a number of problems. New software systems make it possible to avoid these problems, as in our case the digitalization of health services management. The primary goal is to increase the many factors associated with these processes, including increasing safety, efficiency, speed and performance. To achieve these goals we need to incorporate various technologies such as software and hardware, usage of software architectures, and network deployment at the national level. A distinctive element of this paper is the use of the microservices architecture which provides us a solution to some of the above factors and enables system expansion through the scalability feature. This paper also includes the part of the communication that is made between the components within the system, where they are based on HTTP protocol methods. An analysis was also made of how other services could be integrated without affecting the current structure.

Design and implementation of digital learning resources using cloud services – ORA case

Shkodran Lladrofci, University for Business and Technology - UBT
Edmond Jajaga, University for Business and Technology

Pristina, Kosovo

11:00 AM - 12:30 PM

Kosova’s primary and secondary school poor results in local and international level show that there is a need of including new tools and methodologies in order to transform education using technology. Providing digital learning materials have proved to be very useful. Main purpose of this research is to identify technological possibilities in providing such materials through cloud services for the grades I-XII. Its main research question is: “How to design a platform that fulfills the needs of the material also being competitive to other stuff on Internet, such as video games and social networks?” Moreover, we address the issues on deciding about the best techniques to be used on providing such materials and the underlying hardware and software requirements. Cloud services are large in number and advantageous when comparing it to traditional ones e.g. scalability, processing power, availability, to name a few. The Microservices architecture cloud platform described in this paper ensures student’s attractiveness and competitiveness at the same time by including video games for learning purposes. As per the case for the learning material of the curriculum for grad I-XII of Kosovo education system, it was estimated that the required storage space is around 32 TB. Besides the current results, for future work is planned to include applications that stimulate experiments in chemistry, biology, geography, and Virtual Labs (through Virtual Reality technology).

Development of A Testing Methodology for Improving Testing Processes

Neliferin Dresha, University for Business and Technology - UBT
Bekim Fetaji, University for Business and Technology - UBT

Pristina, Kosovo

11:00 AM - 12:30 PM

This research study analyzes various published papers that provide an overview of different testing tools, and focuses on TestBench application which was developed by Imbus and is of great help in terms of test management, TestBench supports manual and automated testing including documenting and reporting of the testing procedure, TestBench along with the Testing Intelligence tool developed to present real-time testing reports by metrics is a great help in testing management. This topic describes software testing methodology through the TestBench tool which through the Testing Intelligence module generates real test reports by metrics. The purpose of testing may be quality assurance, verification and validation, or reliability assessment. Testing can also be used as a general metric. Correctness testing and reliability testing are two major areas of testing offered by the TestBench tool. The contribution of of this research study is in presenting case study analyses of the tool and analyses the benefits and the way and manner of providing the correctness of testing through these tools.

Microservices architecture using .NET Core and ReactJS

Arber Kadiri, University for Business and Technology - UBT
Ramiz Hoxha, University for Business and Technology

Pristina, Kosovo

11:00 AM - 12:30 PM

The concept of designing systems architecture has evolved, from one to another, each of them satisfying different quality requirements. Now days, main goal is to satisfy all the user requests, minimize the server response time, secure the integrity of components of the system and at the same time make them cooperative, in order to achieve a fully functional feature. Microservices architecture has the ability to satisfy all of those needs and demands, implemented with modern technologies, such as .NET Core and ReactJS. As a case study, “Diploma Theses Management System at UBT” combined all these technologies and architectures patterns, to make a fully functional system.

Semantic Web Technologies

PDF

Dukagjin Hyseni

Pristina, Kosovo

11:00 AM - 12:30 PM

This study attempts to highlight the great importance of developing Semantic Web as one of the best discovery of better data management and presentation within the WWW. Since the W3C's was discovered, initially providing classic web content as web 1.0 that had link / hyperlink of document`s location, then web 2.0 as web-applications have more advanced technologies to connect data, and finally semantic web as extension of web 3.0 also known as Linked Data. The results show that in addition to the rapid development of the Semantic Web, the demand to use its features by data publishers and data readers is rapidly expanding due to the time saving to publish multiple times the same data on other web pages.

Moreover, we will present the features of the Semantic Web, its technologies, development history, advantages and weaknesses, the potential benefits, and so on, including standards, frameworks, and programming languages that are being used in its development like: RDF (Resource Description Framework), XML etc.

The development and implementation of National PhD School in ICT in Kosovo Education System

Anita Mirijamdotter, Linnaeus University
Krenare Pireva, University for Business and Technology

Pristina, Kosovo

11:00 AM - 12:30 PM

Despite ever accelerating workplace changes, including rapidly expanding technological access and fast improving information and communication systems, Kosovo still lack of national research program, and thereby also lack of research in Higher Education Systems. Currently in the national level, Kosovo spends only 0.1% of GDP on research. The Kosovo education system is not fully developed to provide a high quality research-based education, including in Information and Communication Technology. This paper stems from an EU funded project which aims to develop and implement a non-existing National PhD School in ICT, in Kosovo, as a solution for the identified problems and its root causes. These problems are to a high degree related to lack of adequate infrastructure and human capacities. The project is run in collaboration with 7 consortia partner and is coordinated by Linnaeus University, Sweden. This country is listed by the World Bank as the second worldwide leading country in terms of research related to GDP, i.e., 3.26 % of Swedish GDP. Further, according to OECD Sweden is one of the leaders in terms of R&D. By using the model of Sweden, adapted to the Kosovo context, this project will contribute to increasing the research infrastructure of Kosovo and the level of academic human capacities. In the long run the project results will contribute to policies which increase government investments in research.

Towards Polyglot Persistence: The Use of Various Data Storages with Microservices Architecture

Besart Pllana, University for Business and Technology
Granit Krasniqi, University for Business and Technology - UBT

Pristina, Kosovo

11:00 AM - 12:30 PM

When thinking about data usage and how to manage it, the first thing that comes to our mind is developing a software application to help us on this matter. This thinking is usually followed by other thoughts on other topics such as software architecture and data storage. The most common architecture that was used for a long time is the classic one: The Monolithic Architecture. Although Monolithic Architecture supports storing data on various data storages, with relational model being the most common data model, usually only one data storage is used per application. In most cases the performance of an application also depends on the structure of the data, and the database this data is stored in. If an application needs to manage different data structures then it is very useful if it could persist data to various data storages in an easy way. Another software architectural style that organizes an application as a set of (micro)services where each one is organized around its own independent business logic is Microservices Architecture. In Microservices Architecture every service can use its own data storage, allowing that the application persist data to various data storages. In this paper we will analyze the use of Microservices Architecture towards polyglot persistence, which is an application persisting data in various data storages.

1:30 PM

An Overview of Big Data Analytics in Banking: Approaches, Challenges and Issues

PDF

Fisnik Doko, Univiversity Ss. Cyril and Methodius
Igor Miskovski, Univiversity Ss. Cyril and Methodius

Pristina, Kosovo

1:30 PM - 3:00 PM

Banks are harnessing the power of Big Data. They use Big Data and Data Science to drive change towards data and analytics to gain an overall competitive advantage. The Big Data has potential to transform enterprise operations and processes especially in the banking sector, because they have huge amount of transaction data. The goal of this paper is to give an overview of different approaches and challenges that exists in Big Data in banking sector. The work presented here will fulfill the gap of research papers in the last five years, with focus on Big Data in central banks and credit scoring in central banks. For this paper, we have reviewed existing research literature, official reports, surveys and seminars of central banks, all these related directly or indirectly to Big Data in banks.

Analyzing the linearity of some operators

PDF

Faton Kabashi, University for Business and Technology - UBT
Azir Jusufi, University for Business and Technology
Hizer Leka, University for Business and Technology - UBT

Pristina, Kosovo

1:30 PM - 3:00 PM

Linear operators occupy an important place in functional analysis and linear algebra, which are among the most important and substantive disciplines of mathematics, whose methods and results have created an indispensable apparatus for the development of numerical mathematics, theory of approximations, equations differential and especially mathematical physics and applied mathematics. Also, linear operators are a central object of study in vector space theory.

A linear operator is a function which satisfies the conditions of additivity and homogeneity. Not every function is linear operators. We will try to explore some functions which are also linear operators.

Automatic Lung Cancer Detection Using Artificial Intelligence

Rushiti Bardh, University for Business and Technology
Bertan Karahoda, University for Business and Technology

Pristina, Kosovo

1:30 PM - 3:00 PM

By far, lung cancer is the prominent cause of cancer deaths for both men and women around the world. In 2018, statistics for WHO (World Health Organization) showed that of 2.09 million people diagnosed with this disease, 1.76 million people have died. The survival rate increases if it is detected in its early stages. Taking into consideration the complexity of the problem, many computer-aided diagnosis systems that increase the survival rate have been proposed and developed. Driven by the notable success of deep learning in the area of complex image classification problems, this paper presents the use ResNet34, ResNet50, VGG16, and VGG19 convolutional neural network architectures or classifying images of patients with cancer. Moreover, to compare the performance evaluation Accuracy, Precision, Area Under Curve, and F1 score were calculated. In conclusion, ResNet50 architecture was estimated with the best result for this classification problem, with 87.04% Accuracy and 85.71% F1 score. The strategy of using pre-trained deep learning models proved to be pertinent to this problem.

Benefits and Challenges of Applying Machine Learning in Adaptive Systems

Ermira Daka, University for Business and Technology - UBT
Krenare Pireva, University for Business and Technology

Pristina, Kosovo

1:30 PM - 3:00 PM

Adaptive software systems have the ability to configure their process based on the input. This means that, they can change their behavior based on internal changes, or changes in the running environment. Different user requirement, big data inputs, large scale services, and always available processes made adaptive systems evolve even more. However, there is always a gap that can be filled in order to improve them further. Machine learning is one of the techniques that is widely used to improve different software systems. Its main idea is to use previous knowledge, train it, and predict new results. There exist a bunch of algorithms that are being used in this evolving area, and adaptive systems are good targets where they can have a great effect. This paper reviewed the main machine learning algorithms that are being used for adaptive systems, and further it considered the impact and challenge of these techniques in the usability of the systems.

Developing an online bookstore using various technologies and open APIs

Andi Hoxha, University for Business and Technology - UBT
Fatmir Marmullaku, University for Business and Technology - UBT
Agon Hashani, University for Business and Technology - UBT
Ramiz Hoxha, University for Business and Technology
Medina Shamolli, University for Business and Technology - UBT

Pristina, Kosovo

1:30 PM - 3:00 PM

Due to the increasing saturation of the modern technology, fuelled by its inherent properties such as flexibility, ease of use, and ubiquity, e-commerces and e-learning platforms has gained significant business reputation promising great productivity, high profitability and an immense level of security. Considering dynamic life and according to recent research the decline of readability and the difficulty or lack of finding books, professional notes and scientific works in our country, has encouraged us to develop an online bookstore.

The goal of this project was to design and develop a Web Application for online bookstore. Focusing on business-to-consumer markets, the customers of a book sales’ company could purchase books conveniently and pay with credit card via the integrated Stripe service using any device. The application allows a user to register an account, login, search for particular books of interest, filter books by any category, sort books in ascending or descending order of price and purchase book(s) in the cart with a credit card.

The goal of the project was achieved by observing software development procedures and principles for software designs and implementation. In achieving the goal of this project, three major parts were designed and implemented. Firstly, the design of the UI (User Interface) was implemented by following the Web design guidelines for any compatible devices. Secondly, a PostgreSQL database that connects and communicates with the web server through the Internet was designed to store the data. Thirdly, the design of software architecture which is MVC architecture for client-side and the Monolithic Architecture for server-side.

The result of the project was a complete web application, developed by various technologies such as Angular 8, SpringBoot, PostgreSQL, Stripe API, Gmail API that is targeted at delivering a solution for online shopping with the Credit Card integration(Stripe).The project eliminates the need to drive to a bookstore, find and pay for a parking place. In addition, considerable time is saved as consumers do not need to walk throughout the store in search for an item to buy. The project can easily turned into an e-commerce thanks to these two technologies (Angular + SpringBoot) which could be a huge change for our market.

Domain Name System: an extensive summary

Gent Reshtani, University for Business and Technology - UBT
Besnik Qehaja, University for Business and Technology

Pristina, Kosovo

1:30 PM - 3:00 PM

The Domain Name System protocol, or DNS, is one of the first processes to enable a given user to communicate with a desired resource - mainly a website. As such, the DNS protocol has served as a building block of the Internet architecture and, to this day, continues to be extended and considered a relevant topic, mostly through the extensions proposed by standardization bodies aiming to (primarily) enforce the protection of the user’s privacy. This study will analyze the DNS architecture, protocol format, and the communication structure of the participants of the DNS, in order to clarify the benefits, functional drawbacks and their implications for the general public.

From relational data stored on database servers to RDF files living on the web

Mirlinda Reqica, University for Business and Technology - UBT
Meriton Reqica, University for Business and Technology - UBT

Pristina, Kosovo

1:30 PM - 3:00 PM

The current web that we are using today, allows us to jump from one document to another, but in absence of semantic data. Meanwhile, the Semantic Web known as the ‘next generation’ of web full of linked and structured data gives us the chance to jump from one dataset to another, enriching the current web with more links and semantics.

As we know, for various kinds of applications relational databases have been considered as one of the most popular storage solutions. While for the web of linked data they are recognized as a main factor in generating a huge amount of data. The process of mapping relational databases into ontologies is a fundamental problem on adapting the current web into the semantic one.

Therefore, in this paper we are going to demonstrate the ways how we can publish data from relational databases into RDF through an approach that we find it very useful and then we will present the benefits, challenges and the solutions of the problems for mapping relational databases into ontologies and vice versa.

Hadamard's coding matrix and some decoding methods

Hizer Leka, University for Business and Technology - UBT
Azir Jusufi, University for Business and Technology
Faton Kabashi, University for Business and Technology

Pristina, Kosovo

1:30 PM - 3:00 PM

In this paper, we will show a way to form Hadamard's code order n 2p (where p is a positive integer) with the help of Rademacher functions, through which matrix elements are generated whose binary numbers 0,1, while its columns are Hadamard's encodings and are called Hadamard's coding matrix. Two illustrative examples will be taken to illustrate this way of forming the coding matrix. Then, in a graphical manner and by means of Hadamard's form codes, the message sequence encoding as the order coding matrix will be shown. It will also give Hadamard two methods of decoding messages, which are based on the so-called Haming distance. Haming's distance between two vectors u and v was denoted by du,v and represents the number of places in which they differ. In the end, three conclusions will be given, where a comparison will be made of encoding and decoding messages through Haming's coding matrices and distances.

How Do Kosovo Firms Utilize Business Intelligence? An Exploratory study

PDF

Ardian Hyseni, University of Ljubljana

Pristina, Kosovo

1:30 PM - 3:00 PM

The purpose of this paper is to examine how Kosovo firms utilize business intelligence to analyze their data and better understand the past, present and the future of their firm. Business intelligence offers firms the ability to analyze large amount of data quicker and more effective. Decision making has become easier with the use of BI tools, but making the right decision at right time has become vital for the firms performance. This research will contribute on business industry by providing evidence how Kosovo firms utilize the BI system, what BI tools and what business values and processes BI offers to the firms.

Improvement of Gender Recognition using the Cosfire Filter Framework (Simulations Platform of Shape-Preserving Regression – PCHIP)

PDF

Virtyt Lesha, Luarasi University
Arben Haveri, University of Shkodra
Jozef Bushati, University of Shkodra

Pristina, Kosovo

1:30 PM - 3:00 PM

Biometrics is evolving every day more and more in technical sense and consequently faces with further challenges that become sharper. One of these challenges of is gender recognition that finds very important and key applications. In this paper, we consider the gender recognition process implemented through the Cosfire filter applied through Viola-Jones algorithm and simulated through the Matlab platform. Objective of this paper is improving the execution of gender recognition. The database contains 237 images of 128 to 128 pixels, where 128 are males and 109 are females. For each of them, gender recognition is performed by applying current and improved Viola-Jones algorithm and execution time for each of them is measured. Consequently, it is noticed that the execution time in the case of modified algorithm is lower than the first version. The change consists in intervening in recursive filtering by duplicating it. Furthermore, data obtained from both algorithms in question are processed through the Shape-Preserving Regression - PCHIP regression by giving respective equations and the coefficients of the determination and the respective residual plots performed by Matlab simulation test-bench. Recommendations can be issued in context of further execution time reduction of Viola-Jones algorithm applied on gender recognition.

Machine Learning applications in elections. Sentimental analysis of tweets during campaigns

Vesa Morina, University for Business and Technology - UBT
Hakan Shehu, University for Business and Technology - UBT

Pristina, Kosovo

1:30 PM - 3:00 PM

Machine Learning is one of the most impactful technology of our era. Increasingly powerful computers harnessed to algorithms refined over the past decade are driving an explosion of applications in everything from medical physics to materials. In this paper we are going to present how to use machine learning to analyse election campaigns. Our focus is on using natural language processing, especially sentimental analysis and text classification to analyse public posts of running candidates. As a case study, we will use a dataset of public tweets written in the English language, by a group of selected politicians. We will classify these tweets in three categories: Positive, Neutral and Negative by using classification algorithms. Since we are experiencing government elections in our country we will analyse how the sentiment of tweets by candidates is changing before and after elections. We will also analyse the correlation between the sentiments of tweets with the reaction they get from social media. The purpose of the presentation is to encourage social scientists to start using machine learning as an important tool for analysing election campaigns and their impact on public presentation of politicians.

3:30 PM

AI leverage in easing the 5G complexity and enhancing 5G intelligent connectivity

PDF

Xhafer Krasniqi, University for Business and Technology

Pristina, Kosovo

3:30 PM - 5:00 PM

As 5G era is approaching fast and pre-commercial 5G tests and trials are happening everywhere around the world, one of the key challenges for carriers and 5G providers is to maintain and operate the network complexity required to meet diverse services and personalized user experience requirements. This maintenance and operation have to be smarter and more agile in 5G than it was in previous generations. AI and ML can be leveraged in this case to ease 5G complexity and at the same time enhance the intelligent connectivity between diverse devices and diverse tiny end points, e.g. IoT sensors.

Machine learning and AI algorithms can be used to digest and analyse cross-domain data that would be required in 5G in a much more efficient way enabling quick decision and as such easing the network complexity and reducing the maintenance cost. The cross-domain data includes geographic information, engineering parameters and other data to be used by AI and ML to better forecast the peak traffic, optimize the network for capacity expansion and enable more intelligent coverage through dynamic interference measurements.

This paper provides an overview of 5G complexity due to its heterogeneous nature and the key role of AI and ML to ease this complexity and enhance the intelligent connectivity between diverse devices with different requirements. The focus of this paper will be on the key aspects of AI and ML application in 5G and the key benefits from this application. Finally, this paper will analyse the overall performance of 5G in terms of coverage and latency compared with traditionally operated networks.

Data Privacy in Social Networks: Awareness and Exposure Issues

Ariana Hoxha, University for Business and Technology - UBT
Zhilbert Tafa, University for Business and Technology

Pristina, Kosovo

3:30 PM - 5:00 PM

As various technological platforms and algorithms are getting more and more sophisticated and present in human lives, the data privacy is becoming one of the most sensitive issues in human-computer interaction. This paper presents a qualitative research on the level the young people in Kosovo are aware of the possible privacy violations in social networks, as well as on the degree they expose their private data in Facebook and Instagram. The data privacy awareness and exposure phenomena are time-varying, location-related, socially-dependent etc., which bring up the need for continuous surveys on this topic. While relying on best practices and actual privacy guidelines, a questionnaire-based survey was conducted. The study involves young population who are supposed to be mostly present/active in social networks. In this case for practical reasons, participants are mainly students of computer sciences. Generally, the results show relatively low awareness and high privacy exposure in social networks. Female participants show much higher awareness and concerns on data privacy. Somewhat paradoxically, they seem to expose much more of personal details in social networks.

HTTPS as a growing alternative for cybersecurity and digital privacy

Gent Reshtani, University for Business and Technology - UBT
Gazmend Krasniqi, University for Business and Technology
Kujtim Gashi

Pristina, Kosovo

3:30 PM - 5:00 PM

Hypertext Transfer Protocol Secure (HTTPS) is a Hypertext Transfer Protocol (HTTP) extension that introduces additional mechanisms to provide for more secure communications over an unreliable network, such as the Internet. Due to an increasing number of https adopters - on the one hand, and the encouragement of large companies to use https - on the other hand, reports now indicate that about 80% of the Internet traffic is encrypted using HTTPS mechanisms or, more precisely, the underlying architecture mechanisms that are consisted of the TLS suite of cryptographic protocols. The operational problems and the many questions that have arisen precisely because of the mass adoption of this technology will be addressed by analyzing the components of the HTTPS architecture.

Intrusion Detection and Prevention Measures for Cybercrimes

Blerton Abazi, University for Business and Technology
Artan Luma, University for Business and Technology - UBT
Arta Abdullahu, University for Business and Technology - UBT

Pristina, Kosovo

3:30 PM - 5:00 PM

This research paper examines the topic of cyber-crime and the prevention measures applied against them. According to statistics released by cyber-crime institutions, the greatest risk of today is the risk of malicious codes which causes personal threats and as well many other organizational damages. Also in the paper we have pointed out the management of threats that continue to be a top priority where it is important for security professionals to understand the functionality of intrusion detection and prevention systems in order to make good decisions. Finally, it is worth concluding that the greatest need of today's companies is to hire security professionals and the technologies they provide, since the losses that can be caused by various carelessness and mistakes can be very large and unavoidable.

Microservice architecture as an eco approach for software development

Egzon Berisha, University for Business and Technology - UBT
Ramiz Hoxha, University for Business and Technology
Medina Shamolli, University for Business and Technology - UBT

Pristina, Kosovo

3:30 PM - 5:00 PM

Although they’ve been around for a while now, microservices are gaining popularity with continuously deployed systems. Many web giants, including Amazon, Netflix, Twitter, PayPal have successfully adopted the microservice architecture. A micro-service is a lightweight and independent service that performs single functions and collaborates with other similar services using a well-defined interface. Microservices are small autonomous systems that provide a solution that is unique, distinct within the eco-system. It runs as a full-stack module and collaborates with other microservices that are part of the eco-system. The microservice architecture is an approach to developing an application as a set of small independent services. Each of the services is running in its own independent process. Services can communicate with some mechanisms something around HTTP. Such services could be deployed absolutely independently. Also, the centralized management of these services is a completely separate service tool. It may be written in different programming languages, use own data models etc. Microservices enable IT organizations to be more agile and reduce costs by taking advantage of the granularity and reuse of microservices.

Multilayer Perceptron and Learning Vector Quantization: A Comparison

Nora Gjergji, University for Business and Technology - UBT
Sunil Patel, University of London

Pristina, Kosovo

3:30 PM - 5:00 PM

In this paper we will train two Neural Computing algorithms on the Habbermann Survival dataset and compare their efficacy on predicting a patient’s survival status, five years after breast cancer operation. The data generated in Habbermann’s case study can be used with effective Machine learning algorithms to generate effective prognoses for patients. This paper compares a Multi Layer Perceptron with Marquardt Levenberg Backpropagation (MLP) and Learning Vector Quantization (LVQ) in terms of accurate target predictions (survived or didn’t survive), using the three available predictors.

Password typo correction using discrete logarithms

PDF

Nikola K. Blanchrad, Université de Lorraine

Pristina, Kosovo

3:30 PM - 5:00 PM

As passwords remain the main online authentication method, focus has shifted from naive entropy to how usability improvements can increase security. Chatterjee et al. recently introduced the first two typotolerant password checkers, which improve usability at no security cost but are technically complex. We look at the more general problem of computing an edit distance between two strings without having direct access to those strings — by storing the equivalent of a hash. We propose a simpler algorithm for this problem that is asymptotically quasi-optimal in both bits stored and exchanged, at the cost of more computation on the server.

Performance comparison of the TCP methods to control congestion

Salem Lepaja, University for Business and Technology - UBT
Shpresë Sadiku Maxhuni, University for Business and Technology - UBT

Pristina, Kosovo

3:30 PM - 5:00 PM

In this paper we will analyze and compare performances of the TCP NewReno, TCP Westwood and TCP Vegas methods to control congestion in the networks. Performance analysis in terms of: throughput, goodput, number of lost packets, and the cwnd dynamics are carried out by means of simulation using NS3 simulator. We have considered two scenarios. In the first scenario we have measured performances of each of the three methods operating individually, whereas in the second scenario performances are measured when they share the bottleneck link.

Simulation results show that in both scenarios TCP NewReno outperforms two other methods, followed by TCP Vegas. Whereas, in the second scenario, sharing the link resource, TCP Westwood shows better performances than TCP Vegas.

Security and Data Encryption on Cloud Platform

Arton Jashari, University for Business and Technology
Arbian Shkodra, University for Business and Technology - UBT
Diellza Berisha, University for Business and Technology

Pristina, Kosovo

3:30 PM - 5:00 PM

SAAS (Software as a Service) may at a large extent considered a state-of-the-art cloud platform for virtualization, concerned with systematic operation of use (software) in a single physical system and coupled with basic security, encryption and access hardware resources from everywhere in customer data. Besides that, Cloud services are capable of providing simpler services for a single operating system, to virtualize only for data known as a middleware layer that can select a combination of physical and virtualized resources from an operating system or multiple operating systems which consist of engines which are optimized to carry out a wide range of procedures as well as meet your requests. The underlying purpose of this paper is to provide an overview regarding the processing of algorithms for information on Cloud software infrastructure as well as all prior algorithms it is most certainly for data encryption. Indeed systematic diligence is intermittently providing virtualization for users. Furthermore, this paper also focuses on techniques which assure isolation between Cloud service processes and full integration with Internet data sources.

The architecture of the intelligent transport system (ITS)

Muhamet Avdyli, University for Business and Technology - UBT
Ruzhdi Jashari, University for Business and Technology

Pristina, Kosovo

3:30 PM - 5:00 PM

The purpose of this paper is to treat and explain how it works, repectively connection schemes that would have to be made within an intelligent system for the distance tracking of vehicles or objects while moving or standing, describing the role of each component in this architecture of the Intelligent Transportation System or similar.

Vulnerability of passwords consisting of Numerical Repetitive Sequences in the WPA2 protocol

PDF

Genc Kelmendi, University for Business and Technology - UBT
Edmond Hajrizi, University of Business and Technology

Pristina, Kosovo

3:30 PM - 5:00 PM

Protocols that govern wireless security WPA2/WPA have been proven much more secure in comparison to their predecessor WEP. However, the human factor jeopardizes the solidity of cryptography by implementing passwords consisting of programmatically predictable numerical structures such as 1234512345, 11114444, 999888777 and so on. This practice endangers the security of the WPA protocol in particular, as the locally stored WPA handshake can be attacked for an unlimited number of times using brute-force attacks. The methods presented in this paper are effective in decrypting such passwords within seconds using ordinary processor power. The prevalence of this vulnerable practice in the Prishtina (Kosovo) region is estimated to be 15.7% in 89 tested wireless routers. Under this study such types of passwords are termed and referred to as Numerical Repetitive Sequences or NRS. The paper defines NRS mathematically, identifies NRS types, composes formulas for calculating variations, presents algorithms to generate NRS, and proposes tools to implement attacks. The methods documented in this study should only be used for educational purposes.

2020
Thursday, October 1st
12:00 AM

How Do Kosovo Firms Utilize Business Intelligence? An Exploratory study

PDF

Ardian Hyseni, Faculty of Economics, University of Ljubljana

Lipjan, Kosovo

12:00 AM - 12:00 AM

Visual cryptography scheme with digital watermarking in sharing secret information from car number plate digital images

PDF

Ana Savic, Academy of Technical and Art Applied Studies, School of Electrical and Computer Engineering of Applied Studies, Belgrade, Serbia,
Goran Bjelobaba, National Bank of Serbia, Belgrade, Serbia
Radosav Veselinovic, Faculty of Economics, Belgrade, Serbia
Hana Stefanovic, Comtrade Information Technology School of Applied Studies, Belgrade, Serbia

Lipjan, Kosovo

12:00 AM - 12:00 AM

Friday, October 30th
8:30 AM

International Conference on Computer Science and Communication Engineering

University for Business and Technology - UBT

Lipjan, Kosovo

8:30 AM - 6:30 PM

Saturday, October 31st
9:00 AM

Aplication of Information Technology in the Helath Care

Muhamet Avdyli, University for Business and Technology - UBT
Elhame Maloku, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

Health Care is changing dramatically due to technological advances, from anesthetics and antibiotics to magnetic resonance scanners and radiotherapy. Future technological innovation will continue to transform healthcare, but while technologies (new medicines and treatments, new equipment, new social media support for healthcare, etc.) will drive innovation, human factors will remain as one of the sustained constraints of progress. No prediction can satisfy everyone; instead, this article explores fragments of the future how to think more clearly about how to meet our objectives. The importance to public health imposes the use of technology and guides healthcare more than any other force, and in the future it will continue to develop in dramatic ways. While we can see and debate the details of future trends in healthcare, so that we can align with it and work actively to ensure the best outcomes for society as a whole.

Aspects of the use of nanotechnology and nanomedicine in medicine

PDF

Muhamet Avdyli, University for Business and Technology - UBT
Era Kastrati, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

The purpose of this paper is to show aspects of the application of nanotechnology nowadays, especially in health. Nanotechnologies are the design, characterization, production and application of structures, equipment and systems by controlling the shape and size at the nanometer scale. The special branch that deals with the study of medicine in nanotechnology is called nanomedicine. Nanomedicine is a branch of medicine that applies the knowledge and tools of nanotechnology in the prevention and treatment of disease. Nanomedicine involves the use of nanoscale materials, such as nanoparticles and nanorobots, for diagnostic, dispersing, sensitizing, or activating purposes in a living organism. Nanotechnology is considered to be quite new, but it is by no means the only field that deals with atoms and molecules. In various ways, the disciplines of physics, chemistry, and biology have long been treated with atoms and molecules, their behavior and manipulation, and quantum mechanics has now proven to me to be an absolutely minor science. Nanotechnology applications can be very useful and have the potential to make a significant impact on society. Nanotechnology has already been embraced by industrial sectors, such as the information and communication sectors, but is also used in food technology, energy technology, as well as in some medical products and medicines. Nanomaterials can also offer new opportunities to reduce environmental pollution.

Comparison between DOM manipulation technologies VirtualDOM and IncrementalDOM

Samir Ajdarpašić, University for Business and Technology - UBT
Medina Shamolli, University for Business and Technology - UBT
Diellza Berisha, University for Business and Technology

Lipjan, Kosovo

9:00 AM - 10:30 AM

Manipulating the Document Object Model (DOM) is one of the most expensive operations that the browser has to do. Through the years there have been various approaches to address this problem. Many frontend frameworks and libraries have developed their own solutions. Angular and React JS are the main framework and library used in frontend development right now and they also developed their own solutions and approaches to DOM manipulation. Angular uses IncrementalDOM as their DOM rendering and manipulation technology while React JS uses VirtualDOM. But which one of them has faster rendering time and which one has a smaller memory footprint? Angular with IncrementalDOM has better memory management and way smaller memory footprint than React JS and VirtualDOM. On the other hand React JS has a small advantage when it comes to speed as it has a bit faster rendering times than Angular.

Facing the challenge of SARS CoV- 2 by building a centralized coordination mechanism for research and experience sharing for clinical and research purposes

Edin Bula, University for Business and Technology
Besnik Qehaja, University for Business and Technology
Edmond Jajaga, University for Business and Technology
Ines Bula, University for Business and Technology

Lipjan, Kosovo

9:00 AM - 10:30 AM

Global health crisis of Covid-19 is the currently the single most pressing issue that humanity is facing. All effort is given to make sure that global public health is kept running and that a collapse of health institutions is avoided or if it is inevitable delayed for as long as possible. Because Covid-19 is priority number one, the scientific community is focusing most of its recourses in fighting it. Number of studies published and experiences gained by front line workers in hospitals around the globe is becoming difficult to follow and many precious insides on the illness are overlooked and in current situation that is something we all can’t afford. A centralized platform for collecting studies, data and first hand observation coupled with machine learning based on semantic web to help sort the data find communalities in different studies and pointing them out to relevant researchers, and the platform being a good tool to facilitate contacts between researcher around the globe. A sharing point between different front line health care workers that can share there experiences and observation and thus reduce the suffering and death of patients and shorten the hospital time and therefore reduce hospital resource depletion delay or help to stay off the collapse of health systems. This platform would especially be useful to developing countries that have a weaker public health care system and fewer resources in disposition. Any help to prevent the worst case scenario of patient selection and turning down people in need of help is more than needed today.

From relational data stored on database servers to RDF files living on the web - The EasyRDF Case

Mirlinda Reqica, University for Business and Technology - UBT
Meriton Reqica, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

The current web that we are using today, allows us to jump from one document to another, but in absence of semantic data. Meanwhile, the Semantic Web known as the ‘next generation’ of web full of linked and structured data gives us the chance to jump from one dataset to another, enriching the current web with more links and semantics. As we know, for various kinds of applications relational databases have been considered as one of the most popular storage solutions. While for the web of linked data they are recognized as a main factor in generating a huge amount of data. The process of mapping relational databases into ontologies is a fundamental problem on adapting the current web into the semantic one. Therefore, in this paper we are going to demonstrate the ways we can publish data from relational databases into RDF through an approach that we find very useful and then we will present the benefits, challenges and the solutions of the problems for mapping relational databases into ontologies and vice versa.

Multithreaded Approach for Using Blockchain as an Automated Versioning Tool

PDF

Arber Kadriu, University for Business and Technology - UBT
Dijar Kadriu, University for Business and Technology - UBT
Donjet Salihi, University for Business and Technology - UBT
Edmond Jajaga, University for Business and Technology

Lipjan, Kosovo

9:00 AM - 10:30 AM

Blockchain is a new and growing technology with a bright future ahead. It can be implemented in many different ways and different industries like banking, cryptocurrencies, health information systems etc. Its powerfulness in security and systematic tracking of different items makes it one of its kind and attractive to work with. This technology is also a suitable environment for multithreaded programming to be adopted in, while using blocks and items to be tracked by single threads. This paper presents an innovative approach of using blockchain as a versioning control tool for personal or commercial usage.

OAuth2.0 in Securing APIs

PDF

Olimpion Shurdi, University of Tirana
Aleksander Biberaj, University of Tirana
Igli Tafa, University of Tirana
Genci Mesi, University of Tirana

Lipjan, Kosovo

9:00 AM - 10:30 AM

Today’s modern applications are mostly designed around API’s. API’s are used for a variety of things such as passing data to another webservice reading data from a database etc. The problem with this is that not all the API’s are secure. Most of the today’s API’s are old and rely only on an authentication token where the user data often had to share their credentials with the application to enable such an API call on their behalf or string them, which is often hardcoded. We will focus on OAUTH 2.0 as new protocol in securing our API’s. This is a new protocol based on delegation of authorization, dynamically changing authentication string based on user session or application session. We will go on this different mode of authentication and show you how to use them properly. We will set up this with a Web API integrated with OAUTH and a client application that will stimulate the requests to our API’s.

Peer to peer Audio and Video Communication

PDF

Kushtrim Pacaj, University for Business and Technology - UBT
Kujtim Hyseni, University for Business and Technology - UBT
Donika Sfishta, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

In this paper we introduce a simple way on how you can build your own “end-to- end” audio and video chat. You can expect to learn how to add new features on it, as well as building your own signaling server, your mobile UI and mobile calls logic implemented in a perfect coexistence between NodeJS, Java and Kotlin. What makes this application special is the possibility to express yourself with different annotations while you’re on a video chat.

Performance Evaluation of Non-Relational Data on Big Data Environments

PDF

Edmond Jajaga, University for Business and Technology
Edi Hasaj, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

Big data management is a real challenge for traditional systems. The experimental evaluation is performed on measurement of performance of five different databases with an open non-relational dataset. It was structured and tested separately in each store, giving some advantages and limitations to them from a practical point of view. The results are drawn based on the throughput per number of users executed respectively. It was loaded and executed more than a million of records in each and every database. Following its semi-persistent model, Redis performed better than other databases.

Smart Care Facility Software System Development

Qëndrim Muçolli, University for Business and Technology - UBT
Shkëlqim Berisha, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

The regional hospital centers face various challenges. One of the identified challenges is the difficulty of managing patient data, which can be generated by medical devices, as a result of which is the delay in the response of medical staff to the alarming values of various patient-connected devices. This study aims to identify the factors and requirements needed to implement a system that meets the needs of hospital centers, having performance and efficiency in mind throughout development. Taking into account the system to be with its main features and characteristics while relying on the declaration of the problem and the set objectives, we can reach the conclusion that through data centralization, automation, definition of hierarchies within the center, the connection of system equipment and patient, the general goal of eliminating repetitive processes can be achieved, thus increasing the overall system as is performance.

10:45 AM

A model for predicting the probability of code beauty

Ermira Daka, University for Business and Technology - UBT
Bleron Klaiqi, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

Software maintenance is one of the most expensive phases of the software development life cycle. This cost increases more if maintenance is performed on poorly written code (less aesthetic). There exist a set of code writing patterns that developers need to follow to write good looking code. However, coding conforms ‘rules’ is not always possible. During software evolution, code goes through different changes, which are the main reasons for breaking rules of beautiful code. In this paper, we propose an AI (artificial intelligence) based model which will measure the beauty of a written code. The model is built on a set of code- based features that are used to assign the probability of being a beautiful code.

A Review on Sorting Algorithms: Performance and Complexity

Armend Salihu, University for Business and Technology - UBT
Mergim Hoti, University for Business and Technology - UBT
Arber Hoti, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

The use of computer systems in almost every field has led to an increase in the volume of digital data. However, a large number of digital data has also created the problem of their management, one of the main problems is sort-ing of data. Several different sorting algorithms have been developed for this issue. Therefore in this paper, we have analyzed the main sorting algorithms in relation to time and space complexity, as well as their performance. Also in this paper are identified some of the advantages and disadvantages of dif-ferent sorting algorithms.

Albanian corpus dataset analysis using Apache Hadoop

Fëllanza Avdimetaj, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

Nowadays, we are dealing with a very large number of data that are generated from different fields such as medical, economic, socials, etc. Data analysis is one of the most important branches today. There are many companies that offers their services to store this voluminous data such as: Prolifics, Clairvoyant, IBM, HP Enterprise, Teradata, Oracle, SAP, EMC, Amazon, Microsoft, Google, VMware, Splunk, Alteryx[1], The growth of these data is continuing exponentially and as such has made it impossible to handle them by a traditional database system since it exceeds its capacity. When we are talking about a large number of data also knows as Big Data, we are dealing with an increase from Gigabytes, TeraBytes, Peta Bytes, Zeta Bytes, and so on. Processing of data can incorporate multiple operations depending on usage like collecting, classifying, indexing, exploring, gather results, etc. The main problem has to do with the fact that no machine alone or a few machines can process such a large amount of data for a finite period of time. This paper presents an experimental work on big data problems using the Apaches Hadoop approach as a solution. The objective is to work with Hadoop with a glance focus on the MapReduce algorithm and analysis of a data set(Albanian Text Corpus) that will be created particularly for this case. The results gathered from this paper and several analyses show positive outcomes of the above approach to address such big data problems.

Analysis and Visualization of Birth and Death Data in Kosovo

Erijona Gashi, University for Business and Technology - UBT
Vehbi Neziri, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

Nowadays, almost every institution and business processes various data which also contain personal data where it is necessary to respect the laws for their protection and confidentiality. The development and advancement of technology is enabling more and more data management in various forms, where businesses can be profiled in what they do best and entrust data management to platforms and companies that deal with data. One such service for data processing, analysis and visualization is the Microsoft tool called Power BI. This tool is simple and easy to use, which does not require large hardware infrastructure for its use, but the benefit for businesses and other users is quite large. The purpose of this study is to provide additional knowledge about these tools and platforms, in this case by presenting data on births and deaths in Kosovo during the years 2002-2018 through responsible and interactive reports.

Big Data Analytics on Cloud: challenges, techniques and technologies

PDF

Aleksander Biberaj, University of Tirana
Olimpion Shurdi, University of Tirana
Bledar Kazia, Canadian Institute of Technology (CIT), Tirana, Albania
Renalda Kushe, University of Tirana
Alban Rakipi, University of Tirana

Lipjan, Kosovo

10:45 AM - 12:30 PM

These days it is known that Big Data Analytics is taking a huge attention from researchers and also from business. We all are witness of the data growth that every institution, company or even individuals store in order to use them in the future. There is a big potential to extract useful data from this Big Data that is stored usually in Cloud because sometimes there is not enough local space to store big amounts of data. There is a huge number of sectors where Big Data can be helpful including economic and business activities, public administration, national security, scientific researches in many areas, etc. This data in order to be used must get processed, usually by using Big Data Analytics Techniques. It is for sure that the future of business and technology will be relied on Big Data Analytics. This paper aims to show how big data is analyzed especially when it is deployed on cloud as well as the challenges, techniques and technologies that are used and can be used, in order to analyze Big Data on Cloud. We discuss and implement different methodologies of Big Data Analytics on Cloud.

Big Data in Patient Health Monitoring System

Arbër Perçuku, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

Health monitoring improves better quality of care, helps prevent complications and enables patients to be proactive about their health. Big Data as new technology, can improve the monitoring of patients health care. Towards this, the health monitoring system involves collecting, processing and analyzing large amounts of data coming from various sources. These data are important for diagnose and treatment of patient. In this paper a patient monitoring system using MongoDB as NoSQL data store have proposed. This method includes collecting and analyzing patient’s health data to control and monitor continuously the parameters of health conditions.

Detection and reporting of hate speech on social networks through stream processing

Vesa Morina, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

This paper presents a study of the application of Stream Processing in order to improve the field in technology that deals with the detection and reporting of Hate Speech on social networks like Facebook, Twitter and Youtube. Quantity of the content with hate speech on social networks is growing day by day and there must be some technology to prevent this content on these networks. This paper shows some of the results that can be obtained from such an application, such as the content of a post and its comments, reporting those comments that are considered hate speech and eliminating them from the corresponding network. Then compare different organizations and see how much they contain hateful material that they display to their followers. Analyzing and acting on the data that we get from the application I think we could have a positive impact on this matter.

FRAUD DETECTION USING DATA-DRIVEN APPROACH

Arianit Mehana, TEB SH.A,
Krenare Pireva Nuci, University for Business and Technology

Lipjan, Kosovo

10:45 AM - 12:30 PM

The extensive use of internet is continuously drifting businesses to incorporate their services in the online environment. One of the first spectrums to embrace this evolution was the banking sector. In fact, the first known online banking service came in 1980. It was deployed from a community bank located in Knoxville, called the United American Bank. Since then, internet banking has been offering ease and efficiency to costumers in completing their daily banking tasks. The ever increasing use of internet banking and the large number of online transactions, increased fraudulent behaviour also. As if fraud increase wasn’t enough, the massive number of online transactions further increased the data complexity. Modern data sources are not only complex but generated at high speed and in real time as well. This presents a serious problem and a definite reason why more advanced solutions are desired to protect financial service companies and credit card holders. Therefore, this thesis aims to construct an efficient fraud detection model which is adaptive to costumer behaviour changes and tends to decrease the fraud manipulation, by detecting and filtering fraud in real-time. In order to achieve this aim, a review of various methods is conducted, adding above a personal experience working at a Banking sector, specifically in Fraud Detection office. Unlike the majority of reviewed methods, the proposed model in this thesis is able to detect fraud in the moment of occurrence using an incremental classifier. The evaluation on synthetic data, based on fraud scenarios selected in collaboration with domain experts that replicate typical, real-world attacks, shows that this approach correctly ranks complex frauds. In particular, our proposal detects fraudulent behaviour and anomalies with up to 97% detection rate while maintaining a satisfying low cost.

Mapping Water Level in Lake of Badovci, Prishtina with Remote Sensing and GIS

Emin Emini, University for Business and Technology
Behar Haxhismajli, University for Business and Technology - UBT
Edmond Hajrizi, University of Business and Technology

Lipjan, Kosovo

10:45 AM - 12:30 PM

Monitoring environment changes has become a necessity as a result of current environment deteriorating due to human activities like mining activities, water consuming, fishing, etc. In most developing countries like Kosovo, acquiring information concerning the current condition and the dynamic changes of the environment for a rapid monitoring is not easy. The present study provides the droughts in artificial lakes of the study area, Prishtina. Exactly, the lake of Badovci (Alb: Liqeni i Badovcit). The main aim of the study is to monitor and evaluate changes in water level over the seasons, using WRI time series outputs. As well as this technique of monitoring water will be used to evaluate drying level as e result of the climate changes from high carbon dioxide, and different activities that we mentioned before. In the research are used images from satellite Sentinel-2 which uses Visible Light, Near Infrared and Shortwave Infrared. Taking in consideration these bands we will use WRI based on them. The Sentinel-2 satellite images give us reliable information for monitoring water change according in NDWI and WRI. According to the present study, the WRI generated data gives us valuable informations about water droughts. However, the study demonstrated that the Lake of Badovci had changed from season to season, as a result of human activities and climate change as well. The water drought is visible even with naked eye, but the goal of this research is to have a cleaner image and data about the level and time of drought.

Optimization of Travel Salesman Problem (TSP) Using Genetic Algorithms

Behar Haxhismajli, University for Business and Technology - UBT
Egzon Hasi, University for Business and Technology - UBT
Emin Emini, University for Business and Technology
Lumbardh Elshani, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

The traveling salesman problem (TSP) is one of the most famous benchmarks, significant, historic, and very hard combinatorial optimization problem. TSP was documented by Euler in 1759, whose interest was in solving the knight’s tour problem [1]. It is the fundamental problem in the fields of computer science, engineering, operations research, discrete mathematics, graph theory, and so forth. TSP can be described as the minimization of the total distance traveled by touring all cities exactly once and return to depot city. The traveling salesman problems (TSPs) are classified into two groups on the basis of the structure of the distance matrix as symmetric and asymmetric. The TSP is symmetric if , cij = cji, where i and j represent the row and column of a distance (cost) matrix, respectively, otherwise is asymmetric. To tackle the traveling salesman problem we used genetic algorithms. Genetic algorithms (GAs) are a heuristic search and optimization technique inspired by natural evolution. They have been successfully applied to a wide range of real-world problems of significant complexity. Genetic algorithms are evolutionary techniques used for optimization purposes according to the survival of the fittest idea. These methods do not ensure optimal solutions; however, they give good approximation usually in time. The genetic algorithms are useful for difficult problems, especially the traveling salesman problem. The genetic algorithm depends on the initialization approach, selection criteria, crossover, and mutation operators. There are various representations such as binary, path, adjacency, ordinal, and matrix representations. This project aims to minimize the distance traveled by a hypothetical salesperson. By giving a list of cities and the distance between each pair of cities, finding the shortest path to visit all cities and return to the initial city. Genetic algorithms (GAs) are derivative-free stochastic approach based on biological evolutionary processes proposed by Holland [2]. In nature, the most suitable individuals are likely to survive and mate; therefore, the next generation should be healthier and fitter than previous one. A lot of work and applications have been done about GAs in a frequently cited book by Golberg [3]. GAs work with population of chromosomes that are represented by some underlying parameters set codes.

Technological Trends on Cognitive Virtual Assistants

Shpetim Sadriu, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

Cognitive Virtual Assistants (VA) are advanced by the product business as a fundamentally new sort of interaction between Hardware and Voice Recognition. Cooperation concentrates in progress with a model on showing the legitimacy of the connection between communication, language and the disclosure of techniques to diminish the administration. This examination is offered another measurement to discover the source direction whom voice- recognition is made to be conceivable by brainpower of Artificial Intelligence (AI). Such a commitment to the paper comprises of: reviewing and summing up center thoughts from different orders, having the chance to see how much communication with Voice Recognition (VR) brings to the table; clarify why the objective with remote helpers is in the closer view; Defining the difficulties on the off chance that you need to offer more open doors for Virtual Assistants (VA) has been demonstrated.

1:30 PM

5G Technologies and its Impact during the implementation within exciting technology

Ylli Ajvazi, University for Business and Technology - UBT
Besnik Qehaja, University for Business and Technology
Edmond Hajrizi, University of Business and Technology

Lipjan, Kosovo

1:30 PM - 4:15 PM

Over the last years mobile phones had a remarkable evolution in some generation staring from simple device of voice communication “0G” , it became useful multimedia device with multiple functions to the latest technology as “5G”. As we are in the latest generation 5G (super-fast wireless network technology), promises that 5G will change our lives, the network is expected to have much higher speed and capacity that allows files to be downloaded in the blink of an eye. What makes 5G unique is smart-safety and real-time monitoring,5G will allow to increased reliability for first responders in emergencies, increase sensors that can provide faster warnings of severe weather or neutral disasters such as flood, High Speed capacity will allow of lower cost and additional surveillance. Since we are talking per real-time monitoring, we make it clear that as per Police Station it will be easier to provides gun-shots in the exact location.

5G Testbed building and implementation as a form to support and drive Research and Innovation

Xhafer Krasniqi, University for Business and Technology - UBT
Edmond Hajrizi, University of Business and Technology
Besnik Qehaja, University for Business and Technology

Lipjan, Kosovo

1:30 PM - 4:15 PM

Testing and feeling the capabilities of a real 5G network, but on a smaller scale is possible only through a 5G Testbed within a private setup, such as a university campus or a private site. This type of 5G Testbeds allow academics, researchers and students to test and experiment with the features and capabilities of novel designs and solutions with very rigid technical requirements, i.e. very high bandwidth, high density and very low latency. It helps to create a platform that would enable the customization and benchmarking of different prototypes for different use cases and scenarios. In addition, this paper will also highlight potential challenges and difficulties during the Testbed building and setup.

A Framework to TOR Network Traffic Analytics

Agon Qorolli, University for Business and Technology - UBT
Zhilbert Tafa, University for Business and Technology

Lipjan, Kosovo

1:30 PM - 3:00 PM

Technology is evolving and penetrating rapidly into various domains of human life. As the number of small ubiquitous devices and web applications grows, privacy issues are becoming more and more sensitive. TOR is an application/browser that has been widely used to preserve online privacy. While it might gain some controversies, since it leaves lots of space for abuse, TOR remains one of the most successful anonymization tools available. This research aims to set and implement an experimental framework to TOR traffic analysis. The setup enables the investigation of various aspects of TOR utilization, e.g. if it is used more for web search anonymization or in non-interactive web, etc. A Raspberry Pi micro-computer was set to emulate the exit TOR routing node. Its traffic was also captured and stored in a PC. Popular traffic sniffing and analyzing applications, such as Wireshark, can be further used for various traffic classification and correlation. Based on the proposed experimental framework, the system has collected and stored the TOR traffic for two weeks and has shown its functionality and potential.

An Alternative Probabilistic Protocol for Relaying Wireless Networks

PDF

Faton Maliqi, University for Business and Technology - UBT

Lipjan, Kosovo

1:30 PM - 4:15 PM

In this paper we propose an alternative probabilistic protocol for relaying wireless network. Usually, the communication protocols are designed to be deterministic when it comes to the order of retransmission from the communication nodes. In contrast, we propose an alternative probabilistic protocol where the retransmitting nodes are chosen probabilistically, and which allows easier performance optimization. Using Monte Carlo simulations, we will show at which location of the Relay do we get the best performance. Due to energy consuming concern and due to lower complexity advantage, as required in technologies such as Internet of Things (IoT), we will consider the case when Relay works on the Demodulate-and-Forward (DMF) mode, while for the destination we focus on the case when the receiver performs combining.

Analyzing OSI Model Layers, Benefits and Disadvantages

Amet Shabani, University for Business and Technology - UBT
Kastriot Dermaku, University for Business and Technology - UBT
Gzim Ademi, University for Business and Technology - UBT

Lipjan, Kosovo

1:30 PM - 4:15 PM

Since long time ago, people understood the need and importance of standardization. It was clear that in order to cooperate and trade with each-other we need some rules on preparing or making goods. These rules are standards. Without them, the things could work only in one village, city or state, but not further. By using standards, the goods made in one part of the world can be used in the other part of the world. With development of internet and computers, the same approach applied too. For computers and networks to grow, we need to set some fundamental rules. There were are many vendors who worked on networks and computers. Without a precisely defined set of rules that everybody agrees on, we would create a chaos and the Internet as we know it would not be possible. Since the yearly days, there were initiatives to prepare standards. One of these was done by the International Standards Organization (ISO), which lead to creation of the Open Systems Interconnection model, known as “OSI Model”. In this paper will be discussed about disadvantages of OSI Model- comparison with TCP IP. The Open Systems Interconnection (ISO Model), is the most known model of explaining how network works and how data flows through networks. It is almost impossible to read or start learning about networks and not read about it. This model has seven layers (numbered from Layer 1 to Layer 7) and is widely used to explain the networks and flow of the information.

Constructing Hadamard matrices using binary codes

PDF

Hizer Leka, University for Business and Technology - UBT
Faton Kabashi, University for Business and Technology

Lipjan, Kosovo

1:30 PM - 4:15 PM

In this paper is presented a very efficient method for constructing Hadamard matrices, using binary code products. We will construct such matrices using the scalar production of two vectors and the tensor production of Hadamard matrices. This method is based on the representation of the natural number as a binary code which takes only two values 0 or 1. Such a method of generating Hadamard matrices can be used in practice to generate different codes, in telecommunication systems, to correct blocked codes, but also in science as for example in Boolean algebra.

Proposal of a legal framework through the development of new domain specific languages (DSL) in compliance with GDPR

PDF

Tea Tavanxhiu, University of Tirana
Andrea Alberici, Studio Synthesis
Kozeta Sevrani, University of Tirana - Faculty of Economy

Lipjan, Kosovo

1:30 PM - 4:15 PM

The adaptation of company processes to the EU Regulation represents a major opportunity to review, update and improve the internal processes and management tools used. The loss of data, in most cases, causes serious damage to the image and very often the total closure of the company. The legislation therefore represents an opportunity and a stimulus to verify the management methods applied, to define an organizational model and a code of conduct (policies, processes, rules / provisions and controls) capable of improving internal processes, defining and achieving desired objectives, ensure data and systems protection with proper risk management and assessment. This paper presents the principles of the LegalRuleML applied to the legal domain like General Data Protection Regulation (GDPR) and discusses reasons that LegalRuleML is convenient for modeling norms. We need to understand why it is important to develop a specific domain language that refers to internal GDPR privacy consulting and BPM mapping. LegalRuleML allows inconsistent renditions of a legal source to coexist in the same LegalRuleML document and provides functionality to identify and select interpretations.

SELinux Security Issues: Critical Review

Besnik Zabergja, University for Business and Technology - UBT
Agon Mehmeti, University for Business and Technology - UBT

Lipjan, Kosovo

1:30 PM - 4:15 PM

The decade of digitization and technology development has made computers an integral part of our lives and everyday life, hence making the computer security one of the most important subjects. The SELinux is a system-enforced access control that uses MAC (Mandatory Access Control) policy that combines three different policy models: (RBAC) Role based Access Control, (TE) Type Enforcement and (MLS) Multi Level Security. In this paper we are going make a critical review based on SELinux operating system security issues, especially how it is implemented through LSM (Linux Security Modules). Particularly we are going to focus on SELinux as a part of the LSM framework.

Simulation Smart City in UBT Campus using simulation software

Liza Berisha, University for Business and Technology - UBT
Besnik Qehaja, University for Business and Technology
Edmond Hajrizi, University of Business and Technology

Lipjan, Kosovo

1:30 PM - 4:15 PM

The impact of the IoT has covered many areas but its implementation is challenging. Using stimulative softwares we can stimulate even a smart city without spending money in the implementation. This scientific paper aims to stimulate the smart campus and as a case study we took the University of Bussines and Technology. Smart Campus is an automation system for controlling IoT devices in the UBT campus.This system include: Solar Pannels to convert light from the sun into electricity that can be used to power electrical loads, humidifiers to add moisture to the air to prevent dryness, smoke detectors to automatically senses the presence of smoke, fire sprinkler to prevent fires, etc. All devices are connected to each other and they function the way the conditions are programmed. Also this project includes the part of routing and switching from the ISPs (the main one and the backup) to the internal network, the access lists which are used to block the connection in sensitive areas, etc .Designed and implemented the architecture and infrastructure using packet-tracer. General overview of the infrastructure include: 22 LANs, IoT devices, access points, end devices, intermediary devices, Web server, FTP server, Email server, DNS server, IoT servers, VoIP.

Suggestions and recommendations for fulfillment and implementation of the project for Broadband internet in Macedonia

PDF

Zoran Aleksov, Agency for Electronic Communications,Skopje
Boris Arsov, Agency for Electronic Communications,Skopje
Vergim Sherifi, Agency for Electronic Communications,Skopje
Nenad Popovic, Agency for Electronic Communications,Skopje

Lipjan, Kosovo

1:30 PM - 4:15 PM

Nowadays, broadband is defined on the basis of a number of parameters that can be offered through existing electronic communications networks (fixed or mobile networks) and the construction of some next generation of advanced electronic communications networks. This is extremely important for the quality of the received service, because with the existence of a quality electronic communication network, you will distribute a quality and fast data transfer to the end users, some of whom actually want it. Optical cable, among other types of cables, using the Operator and the access method known as " fiber to the home ", has a very good advantage for the end user, who uses the required service. On the other hand, wireless technologies such as Wi-Fi, Wi-Max and GSM / GPRS / UMTS / HSDPA, 4G and 5G are also new ways to access the Internet. This electronic communication infrastructure owned by a Public Operator for Electronic Communications Services (eg optical network or wireless 4G or 5G network) would be able to provide to the users significantly higher speed and security in data transmission, consistency at speeds, reduced error rates of real-time applications (video streaming, video communication, etc.). This paper provides suggestions and recommendations for fulfilling and implementing the broadband projest. It clarifies in which segments corrections should be made in the regulatory acts, with legal and by the laws. The real situation in the part of the broadband internet in our state is summarized in which direction the goals for improvement and fulfillment of the functioning of the broadband internet should move in the future.

The Benefit from having quality TK infrastructure for realization of the project Broadband internet in Macedonia

Aleksov Zoran, Agency for Electronic Communications,Skopje
Arsov Boris, Agency for Electronic Communications,Skopje
Vergim Sherifi, Agency for Electronic Communications,Skopje
Nenad Popovci, Agency for Electronic Communications,Skopje

Lipjan, Kosovo

1:30 PM - 4:15 PM

The broadband internet provides the creation and use of new rich media content, applications, new innovative services adaptable to different platforms, available to everyone regardless of the location or the time and customized according to the user, according to his priorities or needs. The broadband internet enables the reorganization of the production and work processes in both the business sector and the administration, ie the development of the networked economy and the transition to knowledge-based societies. The existence and construction of quality telecommunications infrastructure nowadays must be owned and upgraded by every Electronic Communication Network Operator because the broadband internet requires fast and always included internet connections that support the transfer of innovative content and services. On the other hand, compared to traditional slower connections, large amounts of data can be accessed and transmitted to the broadband internet at the same time, while reducing waiting time and improving user efficiency. Hence, the paper covers the state of the broader Internet in Macedonia and the existence and construction of quality telecommunications infrastructure to provide quality and fast Internet for providing, creating and using new rich media content, applications, and new innovative services.

Towards Internet of Things: Design and Implementation of a Vehicle Measurement System for Air Quality Monitoring

Bleron Zherka, University for Business and Technology - UBT
Zhilbert Tafa, University for Business and Technology

Lipjan, Kosovo

1:30 PM - 4:15 PM

The detection of environmental pollution sources and their geographical position is of crucial importance to the pollution management. High costs of the existing measurement stations induce their sparse deployment over the area of interest. Moreover, their sampling rates are usually low. As such these systems fail to meet the application requirements regarding the spatial and temporal resolution. To improve this, modern approaches aim to incorporate much greater number of stationary low-cost wireless sensor systems over the same area, to use mobile devices, or the combination of both. This paper presents a design and implementation of an air quality (AQ) measurement system for Vehicle Sensor Networks (VSN). The system is based on Arduino board (microcontroller), various gas sensors, and GPRS communication modules. The nodes installed on the vehicles continuously transmit AQ indicators over the GPRS link to the server. User-friendly web interface enables data visualization in real time. The proposed system was tested on accuracy and functionality over a period of 10 days, and it has shown satisfying results.

Usage of the symbols and Dionis square in the cryptosystem of Dionis

PDF

Dionis Shabani, University for Business and Technology - UBT

Lipjan, Kosovo

1:30 PM - 4:15 PM

The rapid developments of technology which have brought with them a host of benefits to humanity have also left behind a host of spaces which have mostly aided cyber piracy who exploit the many benefits of the internet for purposes that are in their favor,but these actions which negatively affect the privacy of all internet users. In this project I will present some modifications which are enabled through the 16x16 square of Dionis with 256 elements based in the Masonic Cipher method, with the help of which based on the rules I have created and developed it is different from all the others that have been presented so far containing some specific specifications within it, in order to make the possibility of decryption as difficult as possible for the abusers, but understandable to implement.

2021
Saturday, October 30th
12:00 AM

5G Network Deployment at UBT: Features, capabilities and challenges

Xhafer Krasniqi, University for Business and Technology
Betim Gashi, University for Business and Technology
Osman Osmani, University for Business and Technology
Edmond Hajrizi, University of Business and Technology

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Application of Machine Learning in Software Testing: Survey

Ermira Daka, University for Business and Technology - UBT
Edona Veseli, University for Business and Technology - UBT

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Development of a web application for user management

Vigan Ramadani, University for Business and Technology - UBT
Medina Shamolli, University for Business and Technology - UBT

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Digitalization gap in academic institutions

Edin Bula, University for Business and Technology
Besnik Qehaja, University for Business and Technology
Edmond Jajaga, University for Business and Technology

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

IMPLEMENTATION OF INTERNET OF THINGS IN STEAM EDUCATION

Eljona Proko, Computer Science Dept, University “Ismail Qemali” Vlora,
Alketa Hyso, Ismail Qemali University
Dezdemona Gjylapi, Computer Science Dept, University “Ismail Qemali” Vlora,

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Monitoring Water Level in Lake of Badovci, Prishtina with Remote Sensing & GIS

Behar Haxhismajli, University for Business and Technology - UBT
Besnik Qehaja, University for Business and Technology
Edmond Hajrizi, University of Business and Technology

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

MPLS protocol function analysis

Valdon Vitija
Besnik Qehaja, University for Business and Technology
Kujtim Gashi, Agency for Information Society/Ministry of Public Administration, Pristina, Republic of Kosov

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Optimization of energy flow in a microgrid application with a photovoltaic electricity supply

PDF

Vassil Guliashki, Institute of Information and Communication Technologies
Egzon Salihu, University for Business and Technology - UBT
Galia Marinova, Technical University Sofia

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Pneumonia detection in X-ray images using convolutional neural networks

Leandrit Ferizi, University for Business and Technology - UBT

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Road Signs with AI powered applications

Vesa Morina, University for Business and Technology - UBT
Edmond Hajrizi, University of Business and Technology

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Security and privacy in social networks- Cambridge Analytica and manipulation with data’’

Amet Shabani, University for Business and Technology - UBT
Kushtrim Pacaj, University for Business and Technology - UBT

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

TCP Congestion Control Mechanisms – an Experimental Analysis and Comparison

Vilzan Arifaj, University for Business and Technology - UBT
Zhilbert Tafa, University for Business and Technology

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

The Digitalization Revolution in Dental Health Care and the Application of VR and AR

Vassil Guliashki, Institute of Information and Communication Technologies
Melid Lješnjanin
Diellza Berisha, University for Business and Technology

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Traffic Sign Detection and Recognition

Edmond Jajaga, University for Business and Technology
Rreza Pylla, University for Business and Technology - UBT
Saura Dinarama
Valentina Shabani

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Vulnerability and security and in XGS-PON and NG-PON2 technologies

Jakup Ratkoceri, University for Business and Technology - UBT

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

9:00 AM

International Conference on Computer Science and Communication Engineering

PDF

University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 6:30 PM

Membership Application Subscription based

PDF

Vlera Zhubi
Medina Shamolli, University for Business and Technology - UBT

UBT Kampus, Lipjan

9:00 AM - 10:30 AM

One-Time Pad Cipher (OTP) Use Cases and Simulation Examples for Electronic Financial Transactions

PDF

Ana Savic, School of Electrical Engineering and Computer Science Applied Studies
Goran Bjelobaba, University of Belgrade
Nikola Popović, Alfa BK University
Hana Stefanovic, ComTrade

UBT Kampus, Lipjan

9:00 AM - 10:30 AM

Software Automated Testing using BDD Approach with Cucumber Framework

PDF

Arbesë Musliu, University for Business and Technology - UBT
Xhelal Jashari, University for Business and Technology - UBT

UBT Kampus, Lipjan

9:00 AM - 10:30 AM

Workplace Chat Application Using Socket Programming in Python

PDF

Egzon Salihu, University for Business and Technology - UBT
Gentiana Blakaj, University for Business and Technology - UBT

UBT Kampus, Lipjan

9:00 AM - 10:30 AM

10:45 AM

Chatbot in banks of Kosovo and Albania

PDF

Festinë Retkoceri, University of Tetova
Festim Halili, University of Tetova

UBT Kampus, Lipjan

10:45 AM - 12:15 PM

1:30 PM

Blockchain invoicing for government services

PDF

Vehbi Neziri, University for Business and Technology - UBT
Ramadan Dervishi, University of Prishtina
Blerim Rexha, University of Prishtina

UBT Kampus, Lipjan

1:30 PM - 4:15 PM

Importance of Cryptography in the Government

PDF

Gazmend Krasniqi, University for Business and Technology
Agnesa Pefqeli, University for Business and Technology - UBT

UBT Kampus, Lipjan

1:30 PM - 4:15 PM

Incidence matrix and some of its applications in graph theory

PDF

Hizer Leka, University for Business and Technology - UBT
Faton Kabashi, University for Business and Technology

UBT Kampus, Lipjan

1:30 PM - 4:15 PM

Internet of Things in Healthcare: A Review

PDF

Faton Kabashi, University for Business and Technology
Lamir Shkurti, University of Tetova
Hizer Leka, University for Business and Technology - UBT
Vehbi Sofiu, University for Business and Technology - UBT
Nazmi Misini, University for Business and Technology - UBT

UBT Kampus, Lipjan

1:30 PM - 4:15 PM

The impact of GeoGebra on learning the concept of quadratic function

PDF

Nazmi Misini, University for Business and Technology - UBT
Faton Kabashi, University for Business and Technology

UBT Kampus, Lipjan

1:30 PM - 4:15 PM

2022
Saturday, October 29th
12:00 AM

A Review on the Emerging Technologies for Air Pollution Monitoring and Management

Zhilbert Tafa, University for Business and Technology

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

A systematic review of Domain Specific Languages in Supply Chain

Tea Tavanxhiu, University of Tirana
Kozeta Sevrani, University of Tirana - Faculty of Economy
Andrea Alberici, University of Tirana

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

APPLICATION OF BLOCKCHAIN TECHNOLOGY IN BANKING TRANSACTIONS

Hasan Metin, University for Business and Technology - UBT
Valdrin Qerimi

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Application of shortest path algorithms in OSM. Case study-Prishtina

Mirlinda Reqica, University for Business and Technology - UBT
Diellza Berisha, University for Business and Technology
Bukuri Imeri
Blinera Zekaj, University for Business and Technology - UBT
Azir Jusufi, University for Business and Technology

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

CinemaVerse

Euron Ramadani, University for Business and Technology - UBT
Hizer Leka, University for Business and Technology - UBT

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Computational Data Analysis - Classification

Lavdim Beqiri, University for Business and Technology - UBT
Greta Ahma, University for Business and Technology - UBT

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Evaluation of Grad-CAM for explaining Deep Learning's decisions on various medical imaging datasets

Ifigeneia Athanasoula, University of Patras
Ioannis D. Apostolopoulos, University of Patras
Peter P. Groumpos, University of Patras

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Fuzzy Cognitive Maps and Explainable Artificial Intelligence: a critical perspective

Ifigeneia Athanasoula, University of Patras
Ioannis D. Apostolopoulos, University of Patras
Peter P. Groumpos, University of Patras

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Graphic presentation and statistical data analysis of the number of children in the families of 7th grade students in a lower secondary school in the Republic of Kosovo

Nazmi Misini, University for Business and Technology - UBT

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Healthcare Application for Blood Donation

Greta Ahma, University for Business and Technology - UBT
Elton Boshnjaku, University for Business and Technology - UBT

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Healthcare Information Privacy and Security

Nita Qarri, University for Business and Technology - UBT
Besnik Qehaja, University for Business and Technology

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Intelligent Modeling for the food chain using Fuzzy Cognitive Maps

Ifigeneia Athanasoula, University of Patras
Ioannis D. Apostolopoulos, University of Patras
Peter P. Groumpos, University of Patras

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Internal Security threats in Information System - threat protection at all stages of the chain

Amet Shabani, University for Business and Technology
Fatos Rushiti, University for Business and Technology - UBT

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Machine Learning tools for Studying Unemployment in Albania

Blerina Vika, University of Tirana
Desara Rustemi, University of Tirana
Kozeta Sevrani, University of Tirana - Faculty of Economy

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Modelling Zero Energy Buildings using Fuzzy Cognitive Maps

Lazaros Avgeris, University of Patras. Lazaros Avgeris
Peter P. Groumpos, University of Patras

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Models for Load and Price Formation in Deregulated Electricity Markets

Valbona Karapici
Arsena Gjipali

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Profit from integration of Big Data, Cloud Computing and Internet of Things in Industry 4.0

Eljona Proko, University of Vlora
Alketa Hyso, University of Vlora
Dezdemona Gjylapi, University of Vlora

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Security and Privacy Requirement Analysis of Blockchain-based e-Voting System

Blerina Rrmoku, University for Business and Technology (UBT) in Kosovo
Edmond Jajaga, University for Business and Technology

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Solar Energy Forecasting in Vlora using Artificial Neural Networks and Open Data

Dezdemona Gjylapi, University of Vlora
Alketa Hyso, University of Vlora
Eljona Proko, University of Vlora
Sokol Gjylapi, University of Vlora

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

The Evolution of Cybersecurity

Egzon Kamberi, University for Business and Technology (UBT) in Kosovo

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Traffic light design through digital circuits and simulation through the Electronic WorkBench program

Bashkim Cerkini, University of Applied Sciences in Ferizaj
Fakije Zejnullahu, University of Applied Sciences in Ferizaj

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Transformation of the modern radio signal in modeling the sensor transmission between concentric antennas for frequency integration

Vehebi Sofiu, University for Business and Technology
Faton Kabashi, University for Business and Technology
Greta Ahma, University for Business and Technology - UBT
Lamir Shkurti

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Using matrices in cryptography

Faton Kabashi, University for Business and Technology
Lamir Shkurti, University of Tetova
Besnik Qehaja, University for Business and Technology
Hizer Leka, University for Business and Technology - UBT
Mirlinda Slimaj, University for Business and Technology - UBT

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

Using polynomials over the GF(2) field for detecting and correcting errors in cyclic codes

Diellza Berisha, University for Business and Technology
Bukuri Imeri
Mirlinda Reqica, University for Business and Technology - UBT
Blinera Zekaj, University for Business and Technology - UBT
Azir Jusufi, University for Business and Technology

UBT Kampus, Lipjan

12:00 AM - 12:00 AM

2023
Saturday, October 28th
8:00 AM

5G sustainability and Use of 5G to support other sectors to become more sustainable

Xhafer Krasniqi, University for Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

A DSL Framework for requirements engineering.

PDF

Tea Tavanxhiu, University of Tirana
Kozeta Sevrani, University of Tirana - Faculty of Economy

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

A Comparative Analysis of Pathfinding Algorithms in NPC Movement Systems for Computer Games

PDF

Vesa Morina, University for Business and Technology - UBT
Rinesa Rafuna, University for Business and Technology (UBT) in Kosovo

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Advancing Communication Efficiency: A Study of WebRTC, WebSockets, REDIS, and MongoDB in a Social Network Platform

Genc Abazi, University for Business and Technology (UBT) in Kosovo
Xhelal Jashari, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Applying functions f:D1×D2→R2 � : � 1 × � 2 → ℝ 2 for encryption and decryption of data within the field

Azir Jusufi, University for Business and Technology
Blinera Zekaj, University for Business and Technology - UBT
Diellza Berisha, University for Business and Technology
Bukurie Imeri, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Architecture for communication between the user interface and the server (BFF - Backend For Frontend).

Muhamet Avdyli, University for Business and Technology - UBT
Muhamet Sadiku, University for Business and Technology (UBT) in Kosovo

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Automated Design Pattern Generator: Empowering Student Learning in Software Design

Blerina Rrmoku, University for Business and Technology (UBT) in Kosovo
Edmond Jajaga, University for Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

AUTOMATION AND OPTIMIZATION OF COMPUTER NETWORKS

Valdon Vitija
Besnik Qehaja, University for Business and Technology
Edmond Hajrizi, University of Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Blockchain in education: opportunities, applications and challenges

PDF

Elira Shala, University for Business and Technology - UBT
Faton Kabashi, University for Business and Technology
Lamir Shkurti, University for Business and Technology - UBT
Mirlinda Selimaj, University for Business and Technology - UBT
Laura Gjikokaj, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Case Management System

Fat Sijarina, University for Business and Technology - UBT
Blerim Zylfiu, University for Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Cloud applications leveraging serverless and container resources

Fisnik Doko, Mother Teresa Women's University

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Creating a Block-Diagram System for Continuous and Discrete-Time Signals

PDF

Vehebi Sofiu, University for Business and Technology
Gresa Shala
Faton Kabashi, University for Business and Technology
Lamir Shkurti, University for Business and Technology - UBT
Mirlinda Selimaj, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Deep learning’s impact on autonomous vehicle evolution

PDF

Endrit Berisha, University for Business and Technology (UBT) in Kosovo
Faton Kabashi, University for Business and Technology
Lamir Shkurti, University for Business and Technology - UBT
Vehbi Sofiu, University for Business and Technology - UBT
Mirlinda Selimaj, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Design and development of the recommendation mechanism with performance high and scalable using Kafka, Spring Boot and algorithms collaborative filtering

Edmond Jajaga, University for Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Development and Evaluation of a Real-Time Communication Web Application Using WebSocket’s, React, Node.js, and MongoDB

PDF

Albijon Hyseni, University for Business and Technology - UBT
Lamir Shkurti, University for Business and Technology - UBT
Faton Kabashi, University for Business and Technology
Vehbi Sofiu, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Development of a computer-based platform. Impact of these platforms on the field of education

Denis Kolaj, University for Business and Technology (UBT) in Kosovo
Besnik Qehaja, University for Business and Technology
Elton Boshnjaku, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Development of the application for cinema management with .net technology

PDF

Enise Hasanaj, University for Business and Technology - UBT
Lavdim Beqiri, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

DORMITORY MANAGEMENT SYSTEM FOR UBT COLLEGE

Bleona Gerbavci, University for Business and Technology - UBT
Blerim Zylfiu, University for Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Efficient Spam Email Detection with WEKA: A Comparative Analysis of Naïve Bayes, Support Vector Machine, and J48 Decision Tree Algorithms

Greta Ahma, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

FACE RECOGNITION ALGORITHMS IN RECORDING STUDENT ATTENDANCE DURING LECTURES

Fitore Tahiri, University for Business and Technology - UBT
Hizer Leka, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Internet of Things (IoT) in Healthcare

PDF

Ibadete Gashi, University for Business and Technology - UBT
Faton Kabashi, University for Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Internet of things(IOT) in education: Opportunities and Challenges

PDF

Labinot Krasniqi, University for Business and Technology (UBT) in Kosovo
Faton Kabashi, University for Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

IoT-Based Smart Garden System

Milot Morina, University for Business and Technology - UBT
Astrit Hulaj, University for Business and Technology - UBT
Besnik Qehaja, University for Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Machine Learning and its impact on everyday life

Rina Ademi, University for Business and Technology - UBT
Hizer Leka, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Mail Express Management System

Alma Novoberdaliu, University for Business and Technology - UBT
Blerim Zylfiu, University for Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Navigating the Future of Hospital Management: A Digital Solution for Departmental Coordination

PDF

Gresa Shala
Vehebi Sofiu, University for Business and Technology
Faton Kabashi, University for Business and Technology
Lamir Shkurti, University for Business and Technology - UBT
Mirlinda Selimaj, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Optimization problems

PDF

Nazmi Misini, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Passive Optical Network with Modular Optical Line Terminal in Software Defined Environment

Jakup Ratkoceri, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Review of Artificial Intelligence Implementation in Electronic Design Automation Methods and Tools

PDF

Katerina Kostova, Technical University of Sofia
Lavdim Menxhiqi, University for Business and Technology
Blerim Zylfiu, University for Business and Technology
Galia Marinova, Technical University Sofia

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

System for registration and management of workers

PDF

Edison Kastrati, University for Business and Technology - UBT
Faton Kabashi, University for Business and Technology
Lamir Shkurti, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

The Evolution of Computer Network Automation

Rinor Neziraj, University for Business and Technology - UBT
Lavdim Beqiri, University for Business and Technology - UBT
Besnik Qehaja, University for Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Usage of the fractional functions of the form f(x)=ax+bcx+d, cx+d≠0 for data encryption and decryption

Azir Jusufi, University for Business and Technology
Meriton Reqica, University for Business and Technology - UBT
Mirlinda Reqica, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Using blockchain in healthcare

PDF

Erodina Sejdiu, University for Business and Technology - UBT
Faton Kabashi, University for Business and Technology

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

Using functions f: D1x D2X D3- R3 for encryption and decryption of data in space

Blinera Zekaj, University for Business and Technology - UBT
Azir Jusufi, University for Business and Technology
Diellza Berisha, University for Business and Technology
Bukurie Imeri, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM

USING THE INTERNET OF THINGS IN PERSONAL HEALTH

PDF

Eros Mehmeti, University for Business and Technology - UBT
Hizer Leka, University for Business and Technology - UBT

UBT Lipjan, Kosovo

8:00 AM - 6:00 PM