Schedule

Subscribe to RSS Feed

2020
Saturday, October 31st
9:00 AM

Aplication of Information Technology in the Helath Care

Muhamet Avdyli, University for Business and Technology - UBT
Elhame Maloku, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

Health Care is changing dramatically due to technological advances, from anesthetics and antibiotics to magnetic resonance scanners and radiotherapy. Future technological innovation will continue to transform healthcare, but while technologies (new medicines and treatments, new equipment, new social media support for healthcare, etc.) will drive innovation, human factors will remain as one of the sustained constraints of progress. No prediction can satisfy everyone; instead, this article explores fragments of the future how to think more clearly about how to meet our objectives. The importance to public health imposes the use of technology and guides healthcare more than any other force, and in the future it will continue to develop in dramatic ways. While we can see and debate the details of future trends in healthcare, so that we can align with it and work actively to ensure the best outcomes for society as a whole.

Aspects of the use of nanotechnology and nanomedicine in medicine

Muhamet Avdyli, University for Business and Technology - UBT
Era Kastrati, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

The purpose of this paper is to show aspects of the application of nanotechnology nowadays, especially in health. Nanotechnologies are the design, characterization, production and application of structures, equipment and systems by controlling the shape and size at the nanometer scale. The special branch that deals with the study of medicine in nanotechnology is called nanomedicine. Nanomedicine is a branch of medicine that applies the knowledge and tools of nanotechnology in the prevention and treatment of disease. Nanomedicine involves the use of nanoscale materials, such as nanoparticles and nanorobots, for diagnostic, dispersing, sensitizing, or activating purposes in a living organism. Nanotechnology is considered to be quite new, but it is by no means the only field that deals with atoms and molecules. In various ways, the disciplines of physics, chemistry, and biology have long been treated with atoms and molecules, their behavior and manipulation, and quantum mechanics has now proven to me to be an absolutely minor science. Nanotechnology applications can be very useful and have the potential to make a significant impact on society. Nanotechnology has already been embraced by industrial sectors, such as the information and communication sectors, but is also used in food technology, energy technology, as well as in some medical products and medicines. Nanomaterials can also offer new opportunities to reduce environmental pollution.

Comparison between DOM manipulation technologies VirtualDOM and IncrementalDOM

Samir Ajdarpašić, University for Business and Technology - UBT
Medina Shamolli, University for Business and Technology - UBT
Diellza Berisha, University for Business and Technology

Lipjan, Kosovo

9:00 AM - 10:30 AM

Manipulating the Document Object Model (DOM) is one of the most expensive operations that the browser has to do. Through the years there have been various approaches to address this problem. Many frontend frameworks and libraries have developed their own solutions. Angular and React JS are the main framework and library used in frontend development right now and they also developed their own solutions and approaches to DOM manipulation. Angular uses IncrementalDOM as their DOM rendering and manipulation technology while React JS uses VirtualDOM. But which one of them has faster rendering time and which one has a smaller memory footprint? Angular with IncrementalDOM has better memory management and way smaller memory footprint than React JS and VirtualDOM. On the other hand React JS has a small advantage when it comes to speed as it has a bit faster rendering times than Angular.

Facing the challenge of SARS CoV- 2 by building a centralized coordination mechanism for research and experience sharing for clinical and research purposes

Edin Bula, University for Business and Technology
Besnik Qehaja, University for Business and Technology
Edmond Jajaga, University for Business and Technology
Ines Bula, University for Business and Technology

Lipjan, Kosovo

9:00 AM - 10:30 AM

Global health crisis of Covid-19 is the currently the single most pressing issue that humanity is facing. All effort is given to make sure that global public health is kept running and that a collapse of health institutions is avoided or if it is inevitable delayed for as long as possible. Because Covid-19 is priority number one, the scientific community is focusing most of its recourses in fighting it. Number of studies published and experiences gained by front line workers in hospitals around the globe is becoming difficult to follow and many precious insides on the illness are overlooked and in current situation that is something we all can’t afford. A centralized platform for collecting studies, data and first hand observation coupled with machine learning based on semantic web to help sort the data find communalities in different studies and pointing them out to relevant researchers, and the platform being a good tool to facilitate contacts between researcher around the globe. A sharing point between different front line health care workers that can share there experiences and observation and thus reduce the suffering and death of patients and shorten the hospital time and therefore reduce hospital resource depletion delay or help to stay off the collapse of health systems. This platform would especially be useful to developing countries that have a weaker public health care system and fewer resources in disposition. Any help to prevent the worst case scenario of patient selection and turning down people in need of help is more than needed today.

From relational data stored on database servers to RDF files living on the web - The EasyRDF Case

Mirlinda Reqica, University for Business and Technology - UBT
Meriton Reqica, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

The current web that we are using today, allows us to jump from one document to another, but in absence of semantic data. Meanwhile, the Semantic Web known as the ‘next generation’ of web full of linked and structured data gives us the chance to jump from one dataset to another, enriching the current web with more links and semantics. As we know, for various kinds of applications relational databases have been considered as one of the most popular storage solutions. While for the web of linked data they are recognized as a main factor in generating a huge amount of data. The process of mapping relational databases into ontologies is a fundamental problem on adapting the current web into the semantic one. Therefore, in this paper we are going to demonstrate the ways we can publish data from relational databases into RDF through an approach that we find very useful and then we will present the benefits, challenges and the solutions of the problems for mapping relational databases into ontologies and vice versa.

Multithreaded Approach for Using Blockchain as an Automated Versioning Tool

Arber Kadriu, University for Business and Technology - UBT
Dijar Kadriu, University for Business and Technology - UBT
Donjet Salihi, University for Business and Technology - UBT
Edmond Jajaga, University for Business and Technology

Lipjan, Kosovo

9:00 AM - 10:30 AM

Blockchain is a new and growing technology with a bright future ahead. It can be implemented in many different ways and different industries like banking, cryptocurrencies, health information systems etc. Its powerfulness in security and systematic tracking of different items makes it one of its kind and attractive to work with. This technology is also a suitable environment for multithreaded programming to be adopted in, while using blocks and items to be tracked by single threads. This paper presents an innovative approach of using blockchain as a versioning control tool for personal or commercial usage.

OAuth2.0 in Securing APIs

Olimpion Shurdi, University of Tirana
Aleksander Biberaj, University of Tirana
Igli Tafa, University of Tirana
Genci Mesi, University of Tirana

Lipjan, Kosovo

9:00 AM - 10:30 AM

Today’s modern applications are mostly designed around API’s. API’s are used for a variety of things such as passing data to another webservice reading data from a database etc. The problem with this is that not all the API’s are secure. Most of the today’s API’s are old and rely only on an authentication token where the user data often had to share their credentials with the application to enable such an API call on their behalf or string them, which is often hardcoded. We will focus on OAUTH 2.0 as new protocol in securing our API’s. This is a new protocol based on delegation of authorization, dynamically changing authentication string based on user session or application session. We will go on this different mode of authentication and show you how to use them properly. We will set up this with a Web API integrated with OAUTH and a client application that will stimulate the requests to our API’s.

Peer to peer Audio and Video Communication

Kushtrim Pacaj, University for Business and Technology - UBT
Kujtim Hyseni, University for Business and Technology - UBT
Donika Sfishta, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

In this paper we introduce a simple way on how you can build your own “end-to- end” audio and video chat. You can expect to learn how to add new features on it, as well as building your own signaling server, your mobile UI and mobile calls logic implemented in a perfect coexistence between NodeJS, Java and Kotlin. What makes this application special is the possibility to express yourself with different annotations while you’re on a video chat.

Performance Evaluation of Non-Relational Data on Big Data Environments

Edmond Jajaga, University for Business and Technology
Edi Hasaj, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

Big data management is a real challenge for traditional systems. The experimental evaluation is performed on measurement of performance of five different databases with an open non-relational dataset. It was structured and tested separately in each store, giving some advantages and limitations to them from a practical point of view. The results are drawn based on the throughput per number of users executed respectively. It was loaded and executed more than a million of records in each and every database. Following its semi-persistent model, Redis performed better than other databases.

Smart Care Facility Software System Development

Qëndrim Muçolli, University for Business and Technology - UBT
Shkëlqim Berisha, University for Business and Technology - UBT

Lipjan, Kosovo

9:00 AM - 10:30 AM

The regional hospital centers face various challenges. One of the identified challenges is the difficulty of managing patient data, which can be generated by medical devices, as a result of which is the delay in the response of medical staff to the alarming values of various patient-connected devices. This study aims to identify the factors and requirements needed to implement a system that meets the needs of hospital centers, having performance and efficiency in mind throughout development. Taking into account the system to be with its main features and characteristics while relying on the declaration of the problem and the set objectives, we can reach the conclusion that through data centralization, automation, definition of hierarchies within the center, the connection of system equipment and patient, the general goal of eliminating repetitive processes can be achieved, thus increasing the overall system as is performance.

10:45 AM

A model for predicting the probability of code beauty

Ermira Daka, University for Business and Technology - UBT
Bleron Klaiqi, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

Software maintenance is one of the most expensive phases of the software development life cycle. This cost increases more if maintenance is performed on poorly written code (less aesthetic). There exist a set of code writing patterns that developers need to follow to write good looking code. However, coding conforms ‘rules’ is not always possible. During software evolution, code goes through different changes, which are the main reasons for breaking rules of beautiful code. In this paper, we propose an AI (artificial intelligence) based model which will measure the beauty of a written code. The model is built on a set of code- based features that are used to assign the probability of being a beautiful code.

A Review on Sorting Algorithms: Performance and Complexity

Armend Salihu, University for Business and Technology - UBT
Mergim Hoti, University for Business and Technology - UBT
Arber Hoti, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

The use of computer systems in almost every field has led to an increase in the volume of digital data. However, a large number of digital data has also created the problem of their management, one of the main problems is sort-ing of data. Several different sorting algorithms have been developed for this issue. Therefore in this paper, we have analyzed the main sorting algorithms in relation to time and space complexity, as well as their performance. Also in this paper are identified some of the advantages and disadvantages of dif-ferent sorting algorithms.

Albanian corpus dataset analysis using Apache Hadoop

Fëllanza Avdimetaj, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

Nowadays, we are dealing with a very large number of data that are generated from different fields such as medical, economic, socials, etc. Data analysis is one of the most important branches today. There are many companies that offers their services to store this voluminous data such as: Prolifics, Clairvoyant, IBM, HP Enterprise, Teradata, Oracle, SAP, EMC, Amazon, Microsoft, Google, VMware, Splunk, Alteryx[1], The growth of these data is continuing exponentially and as such has made it impossible to handle them by a traditional database system since it exceeds its capacity. When we are talking about a large number of data also knows as Big Data, we are dealing with an increase from Gigabytes, TeraBytes, Peta Bytes, Zeta Bytes, and so on. Processing of data can incorporate multiple operations depending on usage like collecting, classifying, indexing, exploring, gather results, etc. The main problem has to do with the fact that no machine alone or a few machines can process such a large amount of data for a finite period of time. This paper presents an experimental work on big data problems using the Apaches Hadoop approach as a solution. The objective is to work with Hadoop with a glance focus on the MapReduce algorithm and analysis of a data set(Albanian Text Corpus) that will be created particularly for this case. The results gathered from this paper and several analyses show positive outcomes of the above approach to address such big data problems.

Analysis and Visualization of Birth and Death Data in Kosovo

Erijona Gashi, University for Business and Technology - UBT
Vehbi Neziri, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

Nowadays, almost every institution and business processes various data which also contain personal data where it is necessary to respect the laws for their protection and confidentiality. The development and advancement of technology is enabling more and more data management in various forms, where businesses can be profiled in what they do best and entrust data management to platforms and companies that deal with data. One such service for data processing, analysis and visualization is the Microsoft tool called Power BI. This tool is simple and easy to use, which does not require large hardware infrastructure for its use, but the benefit for businesses and other users is quite large. The purpose of this study is to provide additional knowledge about these tools and platforms, in this case by presenting data on births and deaths in Kosovo during the years 2002-2018 through responsible and interactive reports.

Big Data Analytics on Cloud: challenges, techniques and technologies

Aleksander Biberaj, University of Tirana
Olimpion Shurdi, University of Tirana
Bledar Kazia, Canadian Institute of Technology (CIT), Tirana, Albania
Renalda Kushe, University of Tirana
Alban Rakipi, University of Tirana

Lipjan, Kosovo

10:45 AM - 12:30 PM

These days it is known that Big Data Analytics is taking a huge attention from researchers and also from business. We all are witness of the data growth that every institution, company or even individuals store in order to use them in the future. There is a big potential to extract useful data from this Big Data that is stored usually in Cloud because sometimes there is not enough local space to store big amounts of data. There is a huge number of sectors where Big Data can be helpful including economic and business activities, public administration, national security, scientific researches in many areas, etc. This data in order to be used must get processed, usually by using Big Data Analytics Techniques. It is for sure that the future of business and technology will be relied on Big Data Analytics. This paper aims to show how big data is analyzed especially when it is deployed on cloud as well as the challenges, techniques and technologies that are used and can be used, in order to analyze Big Data on Cloud. We discuss and implement different methodologies of Big Data Analytics on Cloud.

Big Data in Patient Health Monitoring System

Arbër Perçuku, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

Health monitoring improves better quality of care, helps prevent complications and enables patients to be proactive about their health. Big Data as new technology, can improve the monitoring of patients health care. Towards this, the health monitoring system involves collecting, processing and analyzing large amounts of data coming from various sources. These data are important for diagnose and treatment of patient. In this paper a patient monitoring system using MongoDB as NoSQL data store have proposed. This method includes collecting and analyzing patient’s health data to control and monitor continuously the parameters of health conditions.

FRAUD DETECTION USING DATA-DRIVEN APPROACH

Arianit Mehana, TEB SH.A,
Krenare Pireva Nuci, University for Business and Technology

Lipjan, Kosovo

10:45 AM - 12:30 PM

The extensive use of internet is continuously drifting businesses to incorporate their services in the online environment. One of the first spectrums to embrace this evolution was the banking sector. In fact, the first known online banking service came in 1980. It was deployed from a community bank located in Knoxville, called the United American Bank. Since then, internet banking has been offering ease and efficiency to costumers in completing their daily banking tasks. The ever increasing use of internet banking and the large number of online transactions, increased fraudulent behaviour also. As if fraud increase wasn’t enough, the massive number of online transactions further increased the data complexity. Modern data sources are not only complex but generated at high speed and in real time as well. This presents a serious problem and a definite reason why more advanced solutions are desired to protect financial service companies and credit card holders. Therefore, this thesis aims to construct an efficient fraud detection model which is adaptive to costumer behaviour changes and tends to decrease the fraud manipulation, by detecting and filtering fraud in real-time. In order to achieve this aim, a review of various methods is conducted, adding above a personal experience working at a Banking sector, specifically in Fraud Detection office. Unlike the majority of reviewed methods, the proposed model in this thesis is able to detect fraud in the moment of occurrence using an incremental classifier. The evaluation on synthetic data, based on fraud scenarios selected in collaboration with domain experts that replicate typical, real-world attacks, shows that this approach correctly ranks complex frauds. In particular, our proposal detects fraudulent behaviour and anomalies with up to 97% detection rate while maintaining a satisfying low cost.

Mapping Water Level in Lake of Badovci, Prishtina with Remote Sensing and GIS

Emin Emini, University for Business and Technology
Behar Haxhismajli, University for Business and Technology - UBT
Edmond Hajrizi, University of Business and Technology

Lipjan, Kosovo

10:45 AM - 12:30 PM

Monitoring environment changes has become a necessity as a result of current environment deteriorating due to human activities like mining activities, water consuming, fishing, etc. In most developing countries like Kosovo, acquiring information concerning the current condition and the dynamic changes of the environment for a rapid monitoring is not easy. The present study provides the droughts in artificial lakes of the study area, Prishtina. Exactly, the lake of Badovci (Alb: Liqeni i Badovcit). The main aim of the study is to monitor and evaluate changes in water level over the seasons, using WRI time series outputs. As well as this technique of monitoring water will be used to evaluate drying level as e result of the climate changes from high carbon dioxide, and different activities that we mentioned before. In the research are used images from satellite Sentinel-2 which uses Visible Light, Near Infrared and Shortwave Infrared. Taking in consideration these bands we will use WRI based on them. The Sentinel-2 satellite images give us reliable information for monitoring water change according in NDWI and WRI. According to the present study, the WRI generated data gives us valuable informations about water droughts. However, the study demonstrated that the Lake of Badovci had changed from season to season, as a result of human activities and climate change as well. The water drought is visible even with naked eye, but the goal of this research is to have a cleaner image and data about the level and time of drought.

Optimization of Travel Salesman Problem (TSP) Using Genetic Algorithms

Behar Haxhismajli, University for Business and Technology - UBT
Egzon Hasi, University for Business and Technology - UBT
Emin Emini, University for Business and Technology
Lumbardh Elshani, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

The traveling salesman problem (TSP) is one of the most famous benchmarks, significant, historic, and very hard combinatorial optimization problem. TSP was documented by Euler in 1759, whose interest was in solving the knight’s tour problem [1]. It is the fundamental problem in the fields of computer science, engineering, operations research, discrete mathematics, graph theory, and so forth. TSP can be described as the minimization of the total distance traveled by touring all cities exactly once and return to depot city. The traveling salesman problems (TSPs) are classified into two groups on the basis of the structure of the distance matrix as symmetric and asymmetric. The TSP is symmetric if , cij = cji, where i and j represent the row and column of a distance (cost) matrix, respectively, otherwise is asymmetric. To tackle the traveling salesman problem we used genetic algorithms. Genetic algorithms (GAs) are a heuristic search and optimization technique inspired by natural evolution. They have been successfully applied to a wide range of real-world problems of significant complexity. Genetic algorithms are evolutionary techniques used for optimization purposes according to the survival of the fittest idea. These methods do not ensure optimal solutions; however, they give good approximation usually in time. The genetic algorithms are useful for difficult problems, especially the traveling salesman problem. The genetic algorithm depends on the initialization approach, selection criteria, crossover, and mutation operators. There are various representations such as binary, path, adjacency, ordinal, and matrix representations. This project aims to minimize the distance traveled by a hypothetical salesperson. By giving a list of cities and the distance between each pair of cities, finding the shortest path to visit all cities and return to the initial city. Genetic algorithms (GAs) are derivative-free stochastic approach based on biological evolutionary processes proposed by Holland [2]. In nature, the most suitable individuals are likely to survive and mate; therefore, the next generation should be healthier and fitter than previous one. A lot of work and applications have been done about GAs in a frequently cited book by Golberg [3]. GAs work with population of chromosomes that are represented by some underlying parameters set codes.

Security of AI driven XR technology – a more comprehensive approach needed

Vesa Morina, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

This paper presents a study of the application of Stream Processing in order to improve the field in technology that deals with the detection and reporting of Hate Speech on social networks like Facebook, Twitter and Youtube. Quantity of the content with hate speech on social networks is growing day by day and there must be some technology to prevent this content on these networks. This paper shows some of the results that can be obtained from such an application, such as the content of a post and its comments, reporting those comments that are considered hate speech and eliminating them from the corresponding network. Then compare different organizations and see how much they contain hateful material that they display to their followers. Analyzing and acting on the data that we get from the application I think we could have a positive impact on this matter.

Technological Trends on Cognitive Virtual Assistants

Shpetim Sadriu, University for Business and Technology - UBT

Lipjan, Kosovo

10:45 AM - 12:30 PM

Cognitive Virtual Assistants (VA) are advanced by the product business as a fundamentally new sort of interaction between Hardware and Voice Recognition. Cooperation concentrates in progress with a model on showing the legitimacy of the connection between communication, language and the disclosure of techniques to diminish the administration. This examination is offered another measurement to discover the source direction whom voice- recognition is made to be conceivable by brainpower of Artificial Intelligence (AI). Such a commitment to the paper comprises of: reviewing and summing up center thoughts from different orders, having the chance to see how much communication with Voice Recognition (VR) brings to the table; clarify why the objective with remote helpers is in the closer view; Defining the difficulties on the off chance that you need to offer more open doors for Virtual Assistants (VA) has been demonstrated.

1:30 PM

5G Technologies and its Impact during the implementation within exciting technology

Ylli Ajvazi, University for Business and Technology - UBT
Besnik Qehaja, University for Business and Technology
Edmond Hajrizi, University of Business and Technology

Lipjan, Kosovo

1:30 PM - 4:15 PM

Over the last years mobile phones had a remarkable evolution in some generation staring from simple device of voice communication “0G” , it became useful multimedia device with multiple functions to the latest technology as “5G”. As we are in the latest generation 5G (super-fast wireless network technology), promises that 5G will change our lives, the network is expected to have much higher speed and capacity that allows files to be downloaded in the blink of an eye. What makes 5G unique is smart-safety and real-time monitoring,5G will allow to increased reliability for first responders in emergencies, increase sensors that can provide faster warnings of severe weather or neutral disasters such as flood, High Speed capacity will allow of lower cost and additional surveillance. Since we are talking per real-time monitoring, we make it clear that as per Police Station it will be easier to provides gun-shots in the exact location.

5G Testbed building and implementation as a form to support and drive Research and Innovation

Xhafer Krasniqi, University for Business and Technology - UBT
Edmond Hajrizi, University of Business and Technology
Besnik Qehaja, University for Business and Technology

Lipjan, Kosovo

1:30 PM - 4:15 PM

Testing and feeling the capabilities of a real 5G network, but on a smaller scale is possible only through a 5G Testbed within a private setup, such as a university campus or a private site. This type of 5G Testbeds allow academics, researchers and students to test and experiment with the features and capabilities of novel designs and solutions with very rigid technical requirements, i.e. very high bandwidth, high density and very low latency. It helps to create a platform that would enable the customization and benchmarking of different prototypes for different use cases and scenarios. In addition, this paper will also highlight potential challenges and difficulties during the Testbed building and setup.

A Framework to TOR Network Traffic Analytics

Agon Qorolli, University for Business and Technology - UBT
Zhilbert Tafa, University for Business and Technology

Lipjan, Kosovo

1:30 PM - 3:00 PM

Technology is evolving and penetrating rapidly into various domains of human life. As the number of small ubiquitous devices and web applications grows, privacy issues are becoming more and more sensitive. TOR is an application/browser that has been widely used to preserve online privacy. While it might gain some controversies, since it leaves lots of space for abuse, TOR remains one of the most successful anonymization tools available. This research aims to set and implement an experimental framework to TOR traffic analysis. The setup enables the investigation of various aspects of TOR utilization, e.g. if it is used more for web search anonymization or in non-interactive web, etc. A Raspberry Pi micro-computer was set to emulate the exit TOR routing node. Its traffic was also captured and stored in a PC. Popular traffic sniffing and analyzing applications, such as Wireshark, can be further used for various traffic classification and correlation. Based on the proposed experimental framework, the system has collected and stored the TOR traffic for two weeks and has shown its functionality and potential.

An Alternative Probabilistic Protocol for Relaying Wireless Networks

Faton Maliqi, University for Business and Technology - UBT

Lipjan, Kosovo

1:30 PM - 4:15 PM

In this paper we study the interplay between relaying protocols and ARQ in presence of channel coding. Usually, these protocols are designed to be deterministic when it comes to the order of retransmission from the communication nodes. In contrast, in [1] we have shown that by simplifying the Finite State Machines (FSM) and Finite State Markov Chains analysis, we can land to a concept of probabilistic protocols [2,3], where the retransmitting nodes are chosen probabilistically, and which allows easier performance optimization. But, since on the introduced protocols in [2,3], the number of maximum allowed retransmissions is not limited, then in this paper we have introduced an alternative probabilistic protocol where the maximum number of retransmissions is limited. Using Monte Carlo simulations, we will show at which location of the Relay do we get the best performance. Due to energy consuming concern and due to lower complexity advantage, as required in technologies such as Internet of Things (IoT), we will consider the case when Relay works on the Demodulate-and-Forward (DMF) mode, while for the destination we will focus in two cases: when the destination receiver does not perform combining and when it performs combining at the receiver.

Analyzing OSI Model Layers, Benefits and Disadvantages

Amet Shabani, University for Business and Technology - UBT
Kastriot Dermaku, University for Business and Technology - UBT
Gzim Ademi, University for Business and Technology - UBT

Lipjan, Kosovo

1:30 PM - 4:15 PM

Since long time ago, people understood the need and importance of standardization. It was clear that in order to cooperate and trade with each-other we need some rules on preparing or making goods. These rules are standards. Without them, the things could work only in one village, city or state, but not further. By using standards, the goods made in one part of the world can be used in the other part of the world. With development of internet and computers, the same approach applied too. For computers and networks to grow, we need to set some fundamental rules. There were are many vendors who worked on networks and computers. Without a precisely defined set of rules that everybody agrees on, we would create a chaos and the Internet as we know it would not be possible. Since the yearly days, there were initiatives to prepare standards. One of these was done by the International Standards Organization (ISO), which lead to creation of the Open Systems Interconnection model, known as “OSI Model”. In this paper will be discussed about disadvantages of OSI Model- comparison with TCP IP. The Open Systems Interconnection (ISO Model), is the most known model of explaining how network works and how data flows through networks. It is almost impossible to read or start learning about networks and not read about it. This model has seven layers (numbered from Layer 1 to Layer 7) and is widely used to explain the networks and flow of the information.

Constructing Hadamard matrices using binary codes

Hizer Leka, University for Business and Technology - UBT
Faton Kabashi, University for Business and Technology

Lipjan, Kosovo

1:30 PM - 4:15 PM

In this paper is presented a very efficient method for constructing Hadamard matrices, using binary code products. We will construct such matrices using the scalar production of two vectors and the tensor production of Hadamard matrices. This method is based on the representation of the natural number as a binary code which takes only two values 0 or 1. Such a method of generating Hadamard matrices can be used in practice to generate different codes, in telecommunication systems, to correct blocked codes, but also in science as for example in Boolean algebra.

Proposal of a legal framework through the development of new domain specific languages (DSL) in compliance with GDPR

Tea Tavanxhiu, University of Tirana
Andrea Alberici, Studio Synthesis
Kozeta Sevrani, University of Tirana - Faculty of Economy

Lipjan, Kosovo

1:30 PM - 4:15 PM

The adaptation of company processes to the EU Regulation represents a major opportunity to review, update and improve the internal processes and management tools used. The loss of data, in most cases, causes serious damage to the image and very often the total closure of the company. The legislation therefore represents an opportunity and a stimulus to verify the management methods applied, to define an organizational model and a code of conduct (policies, processes, rules / provisions and controls) capable of improving internal processes, defining and achieving desired objectives, ensure data and systems protection with proper risk management and assessment. This paper presents the principles of the LegalRuleML applied to the legal domain like General Data Protection Regulation (GDPR) and discusses reasons that LegalRuleML is convenient for modeling norms. We need to understand why it is important to develop a specific domain language that refers to internal GDPR privacy consulting and BPM mapping. LegalRuleML allows inconsistent renditions of a legal source to coexist in the same LegalRuleML document and provides functionality to identify and select interpretations.

SELinux Security Issues: Critical Review

Besnik Zabergja, University for Business and Technology - UBT
Agon Mehmeti, University for Business and Technology - UBT

Lipjan, Kosovo

1:30 PM - 4:15 PM

The decade of digitization and technology development has made computers an integral part of our lives and everyday life, hence making the computer security one of the most important subjects. The SELinux is a system-enforced access control that uses MAC (Mandatory Access Control) policy that combines three different policy models: (RBAC) Role based Access Control, (TE) Type Enforcement and (MLS) Multi Level Security. In this paper we are going make a critical review based on SELinux operating system security issues, especially how it is implemented through LSM (Linux Security Modules). Particularly we are going to focus on SELinux as a part of the LSM framework.

Simulation Smart City in UBT Campus using simulation software

Liza Berisha, University for Business and Technology - UBT
Besnik Qehaja, University for Business and Technology
Edmond Hajrizi, University of Business and Technology

Lipjan, Kosovo

1:30 PM - 4:15 PM

The impact of the IoT has covered many areas but its implementation is challenging. Using stimulative softwares we can stimulate even a smart city without spending money in the implementation. This scientific paper aims to stimulate the smart campus and as a case study we took the University of Bussines and Technology. Smart Campus is an automation system for controlling IoT devices in the UBT campus.This system include: Solar Pannels to convert light from the sun into electricity that can be used to power electrical loads, humidifiers to add moisture to the air to prevent dryness, smoke detectors to automatically senses the presence of smoke, fire sprinkler to prevent fires, etc. All devices are connected to each other and they function the way the conditions are programmed. Also this project includes the part of routing and switching from the ISPs (the main one and the backup) to the internal network, the access lists which are used to block the connection in sensitive areas, etc .Designed and implemented the architecture and infrastructure using packet-tracer. General overview of the infrastructure include: 22 LANs, IoT devices, access points, end devices, intermediary devices, Web server, FTP server, Email server, DNS server, IoT servers, VoIP.

Suggestions and recommendations for fulfillment and implementation of the project for Broadband internet in Macedonia

Zoran Aleksov, Agency for Electronic Communications,Skopje
Boris Arsov, Agency for Electronic Communications,Skopje
Vergim Sherifi, Agency for Electronic Communications,Skopje
Nenad Popovic, Agency for Electronic Communications,Skopje

Lipjan, Kosovo

1:30 PM - 4:15 PM

Nowadays, broadband is defined on the basis of a number of parameters that can be offered through existing electronic communications networks (fixed or mobile networks) and the construction of some next generation of advanced electronic communications networks. This is extremely important for the quality of the received service, because with the existence of a quality electronic communication network, you will distribute a quality and fast data transfer to the end users, some of whom actually want it. Optical cable, among other types of cables, using the Operator and the access method known as " fiber to the home ", has a very good advantage for the end user, who uses the required service. On the other hand, wireless technologies such as Wi-Fi, Wi-Max and GSM / GPRS / UMTS / HSDPA, 4G and 5G are also new ways to access the Internet. This electronic communication infrastructure owned by a Public Operator for Electronic Communications Services (eg optical network or wireless 4G or 5G network) would be able to provide to the users significantly higher speed and security in data transmission, consistency at speeds, reduced error rates of real-time applications (video streaming, video communication, etc.). This paper provides suggestions and recommendations for fulfilling and implementing the broadband projest. It clarifies in which segments corrections should be made in the regulatory acts, with legal and by the laws. The real situation in the part of the broadband internet in our state is summarized in which direction the goals for improvement and fulfillment of the functioning of the broadband internet should move in the future.

The Benefit from having quality TK infrastructure for realization of the project Broadband internet in Macedonia

Aleksov Zoran, Agency for Electronic Communications,Skopje
Arsov Boris, Agency for Electronic Communications,Skopje
Vergim Sherifi, Agency for Electronic Communications,Skopje
Nenad Popovci, Agency for Electronic Communications,Skopje

Lipjan, Kosovo

1:30 PM - 4:15 PM

The broadband internet provides the creation and use of new rich media content, applications, new innovative services adaptable to different platforms, available to everyone regardless of the location or the time and customized according to the user, according to his priorities or needs. The broadband internet enables the reorganization of the production and work processes in both the business sector and the administration, ie the development of the networked economy and the transition to knowledge-based societies. The existence and construction of quality telecommunications infrastructure nowadays must be owned and upgraded by every Electronic Communication Network Operator because the broadband internet requires fast and always included internet connections that support the transfer of innovative content and services. On the other hand, compared to traditional slower connections, large amounts of data can be accessed and transmitted to the broadband internet at the same time, while reducing waiting time and improving user efficiency. Hence, the paper covers the state of the broader Internet in Macedonia and the existence and construction of quality telecommunications infrastructure to provide quality and fast Internet for providing, creating and using new rich media content, applications, and new innovative services.

Towards Internet of Things: Design and Implementation of a Vehicle Measurement System for Air Quality Monitoring

Bleron Zherka, University for Business and Technology - UBT
Zhilbert Tafa, University for Business and Technology

Lipjan, Kosovo

1:30 PM - 4:15 PM

The detection of environmental pollution sources and their geographical position is of crucial importance to the pollution management. High costs of the existing measurement stations induce their sparse deployment over the area of interest. Moreover, their sampling rates are usually low. As such these systems fail to meet the application requirements regarding the spatial and temporal resolution. To improve this, modern approaches aim to incorporate much greater number of stationary low-cost wireless sensor systems over the same area, to use mobile devices, or the combination of both. This paper presents a design and implementation of an air quality (AQ) measurement system for Vehicle Sensor Networks (VSN). The system is based on Arduino board (microcontroller), various gas sensors, and GPRS communication modules. The nodes installed on the vehicles continuously transmit AQ indicators over the GPRS link to the server. User-friendly web interface enables data visualization in real time. The proposed system was tested on accuracy and functionality over a period of 10 days, and it has shown satisfying results.

Usage of the symbols and Dionis square in the cryptosystem of Dionis

Dionis Shabani, University for Business and Technology - UBT

Lipjan, Kosovo

1:30 PM - 4:15 PM

The rapid developments of technology which have brought with them a host of benefits to humanity have also left behind a host of spaces which have mostly aided cyber piracy who exploit the many benefits of the internet for purposes that are in their favor,but these actions which negatively affect the privacy of all internet users. In this project I will present some modifications which are enabled through the 16x16 square of Dionis with 256 elements based in the Masonic Cipher method, with the help of which based on the rules I have created and developed it is different from all the others that have been presented so far containing some specific specifications within it, in order to make the possibility of decryption as difficult as possible for the abusers, but understandable to implement.