The Strategic Research Plan guides the UBT in responding effectively to the changing environment in research opportunities, and provides a platform for participation in international research-related initiatives. The programme research plan is linked to the institutional research strategy theme: Information Technology. UBT conducts research in all aspects of information technology : hardware and software, components and systems. Programme research topics include: IT systems, data analysis, modelling and simulation, software and programming, systems and data security, telecommunications, health informatics, Cyber security. The most recent staff research contributions are organised through the UBT Annual International Conference on Computer Science and Engineering. Additionally, there are two Centres operating as part of the CSE Department: UBT Centre for Modelling and Simulation and UBT Centre for Data Security and Privacy.

The main research topics as part of the research strategy are:

  • Big Data
  • Business Intelligence and Knowledge Management
  • Cloud Computing and Mobile Technologies
  • Cluster and Grid Computing
  • Mobile Games, Web applications
  • Customer Care Excellence
  • E-Services, e-Health, e-Governance

Follow

Works from 2018

Algorithmization and programing of certain encrytpion methods of economic data, Valdet Abdurrahmani and Azir Jusufi

Use of semantic web development and linked data in improving e-Health care systems, Edin Bula, Besnik Qehaja, and Ines Bula

Efficiency of calculating GCD through computer with help of modified Euclidean algorithm, Emin Emini, Azir Jusufi, and Ruhada Emini

Traditional Master Slave Database Replication vs Multi Master Galera Cluster for High availability Cloud based Applications and Services, Betim Gashi and Muhamet Sherifi

Application of artificial neural network for categorization of mobile bills, Kastriot Gashi and Bertan Karahoda

Enhancing the Practical Learning through the Usage of Augmented Reality, Ramiz Hoxha, Arbër Mula, and Edmond Laja

Evaluation of triggers and stored procedures of relational databases, Edmond Jajaga and Ferihane Nuhiji

Privacy and Security Data communications issues in HealthCare Ecosystem, Arton Jashari, Besnik Qehaja, and Diellza Berisha

Performance of search engines using “Elasticsearch” and “Alogia” cloud services, Besnik Korça, Krenare Pireva Nuçi, and Edrina Gashi

Design of an Internet of Things Module for Continuous Water Quality Monitoring, Ramiz Krasniqi and Zhilbert Tafa

NB-IoT: A Network slice for Massive IoT, Xhafer Krasniqi

3D in digital media, Jeton Lakna

The use of recommender systems in web applications – The use of TROI recommender systems, Donjeta Mulaj, Krenare Pireva Nuçi, and Hasan Metin

Performance Analysis of Java Persistence API Providers, Besart Pllana

A method to calculate determinants, with computer algorithm interpretation, Armend Salihu and Fatlinda Salihu

Testing and Deployment Time Performance Improvement for Telecommunications Services using SDR and Docker, Artan Salihu, Ilir Koci, and Egzon Brajshori

Implementing Lecture Scheduling in UBT through RESTful API via micro-service architecture, Blerim Zylfiu, Lavdim Menxhiqi, and Ramiz Hoxha

Works from 2017

The importance of professional certifications within ICT institutions, Blerton Abazi and Edmond Hajrizi

PDF

Permission-based Privacy Analysis for Android Applications, Erza Gashi and Zhilbert Tafa

PDF

Research on system communication by using unified registry model & elements, Kujtim Gashi, Atdhe Buja, and Fatos Idrizi

The integration of e-Health system in National healthcare – The case of Kosova, Emira Halimi and Krenare Pireva

PDF

Decision making based on data analyses using data warehouses, Valdrin Haxhiu

Mobile Applications vs Privacy, Mentor Hoxhaj, Tanzer Abazi, and Edmond Hajrizi

Social Network Usage by Kosovo Citizens, Mentor Hoxhaj, Tanzer Abazi, and Edmond Hajrizi

Enabling technologies for 5G: Small Cells, massiveMIMO, mmWave, Network Slicing and Beamforming, Xhafer Krasniqi

IoT Solution: A Mobile Application for Public Transport QoE Improvement, Armir Kuçi and Zhilbert Tafa

The effects of Security mechanisms on VoIP communication, Bajram Quka and Krenare Pireva

Comparison of Web Development Technologies ASP.NET vs. PHP, Rexhep Rexhepi, Ramiz Hoxha, and Betim Gashi

Comparison of Computer Execution Time of Determinant Calculation, Armend Salihu, Azir Jusufi, and Fatlinda Salihu

PDF

Characteristics and Temporal Behavior of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, and Arianit Maraj

Comparing Contemporary Infrastructure Services: Cloud and on-Premise, Ukë Sejfijaj and Osman Osmani

Implementation of ICT in the management of transport vehicles, Eldion Sheapi, Bilall I. Shaini, and Blerton Abazi

Synchronization and High Availability of Data by Using Technology of SQLServer 2012 Always On, Exhevit Ymeri, Besnik Qehaja, and Ramiz Hoxha

Works from 2016

PDF

Cloud Computing and Enterprise Data Reliability, Luan Gashi

PDF

Web application penetration testing, Besnik Qehaja, Gazmend Krasniqi, Ardian Bajraliu, and Amet Shabani

PDF

Improving non-native English students’ communicative competence and collaboration skills through Virtual Simulations, Alisa Sadiku

Works from 2015

PDF

Bounty techniques for web vulnerability scanning, Tanzer Abazi, Mentor Hoxhaj, Edmond Hajrizi, and Gazmend Krasniqi

PDF

Security Concerns of new alternative telecommunication services, Arbnora Hyseni, Krenare Pireva, and Miranda Kajtazi

PDF

Internet of Things: From applications, challenges and standardization to Industry implementations, Xhafer Krasniqi

PDF

Implementation of the AODV Routing in an Energy-constrained Mesh Network, Altin Zejnullahu and Zhilbert Tafa

Works from 2014

PDF

Authentication in SaaS by implementing double security measures, Muhamet Gërvalla and Shkëlqim Berisha

PDF

Efficient Algorithm for solving 3SUM problem, Muhamed Retkoceri

PDF

Using congruence in encoding musical partituras, Besim Shala, Besiana Mehmedi, Shkodran Tolaj, and Azir Jusufi

PDF

IT, E-Commerce, Individual and Team Learning Environment, Besnik Skenderi and Diamanta Skenderi

Works from 2013

PDF

Data Integrity Check using Hash Functions in Cloud environment, Selman Haxhijaha, Gazmend Bajrami, and Fisnik Prekazi

PDF

Modeling a Interworking WiMax LAN and MANET using OPNET Software, Petrit Shala and Luan Gashi

PDF

Project Scheduling and role of IT, Besnik Skenderi and Diamanta Skenderi

PDF

Estimation and Improvements of the Fundamental QoS in Networks with Random Topologies, Zhilbert Tafa