The Strategic Research Plan guides the UBT in responding effectively to the changing environment in research opportunities, and provides a platform for participation in international research-related initiatives. The programme research plan is linked to the institutional research strategy theme: Information Technology. UBT conducts research in all aspects of information technology : hardware and software, components and systems. Programme research topics include: IT systems, data analysis, modelling and simulation, software and programming, systems and data security, telecommunications, health informatics, Cyber security. The most recent staff research contributions are organised through the UBT Annual International Conference on Computer Science and Engineering. Additionally, there are two Centres operating as part of the CSE Department: UBT Centre for Modelling and Simulation and UBT Centre for Data Security and Privacy.

The main research topics as part of the research strategy are:

  • Big Data
  • Business Intelligence and Knowledge Management
  • Cloud Computing and Mobile Technologies
  • Cluster and Grid Computing
  • Mobile Games, Web applications
  • Customer Care Excellence
  • E-Services, e-Health, e-Governance

Follow

Works from 2017

The effects of Security mechanisms on VoIP communication, Bajram Quka and Krenare Pireva

Comparison of Web Development Technologies ASP.NET vs. PHP, Rexhep Rexhepi, Ramiz Hoxha, and Betim Gashi

Comparison of Computer Execution Time of Determinant Calculation, Armend Salihu, Azir Jusufi, and Fatlinda Salihu

PDF

Characteristics and Temporal Behavior of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, and Arianit Maraj

Comparing Contemporary Infrastructure Services: Cloud and on-Premise, Ukë Sejfijaj and Osman Osmani

Implementation of ICT in the management of transport vehicles, Eldion Sheapi, Bilall I. Shaini, and Blerton Abazi

Synchronization and High Availability of Data by Using Technology of SQLServer 2012 Always On, Exhevit Ymeri, Besnik Qehaja, and Ramiz Hoxha

Works from 2016

PDF

Cloud Computing and Enterprise Data Reliability, Luan Gashi

PDF

Web application penetration testing, Besnik Qehaja, Gazmend Krasniqi, Ardian Bajraliu, and Amet Shabani

PDF

Improving non-native English students’ communicative competence and collaboration skills through Virtual Simulations, Alisa Sadiku

Works from 2015

PDF

Bounty techniques for web vulnerability scanning, Tanzer Abazi, Mentor Hoxhaj, Edmond Hajrizi, and Gazmend Krasniqi

PDF

Security Concerns of new alternative telecommunication services, Arbnora Hyseni, Krenare Pireva, and Miranda Kajtazi

PDF

Internet of Things: From applications, challenges and standardization to Industry implementations, Xhafer Krasniqi

PDF

Implementation of the AODV Routing in an Energy-constrained Mesh Network, Altin Zejnullahu and Zhilbert Tafa

Works from 2014

PDF

Authentication in SaaS by implementing double security measures, Muhamet Gërvalla and Shkëlqim Berisha

PDF

Efficient Algorithm for solving 3SUM problem, Muhamed Retkoceri

PDF

Using congruence in encoding musical partituras, Besim Shala, Besiana Mehmedi, Shkodran Tolaj, and Azir Jusufi

PDF

IT, E-Commerce, Individual and Team Learning Environment, Besnik Skenderi and Diamanta Skenderi

Works from 2013

PDF

Data Integrity Check using Hash Functions in Cloud environment, Selman Haxhijaha, Gazmend Bajrami, and Fisnik Prekazi

PDF

Modeling a Interworking WiMax LAN and MANET using OPNET Software, Petrit Shala and Luan Gashi

PDF

Project Scheduling and role of IT, Besnik Skenderi and Diamanta Skenderi

PDF

Estimation and Improvements of the Fundamental QoS in Networks with Random Topologies, Zhilbert Tafa