The Strategic Research Plan guides the UBT in responding effectively to the changing environment in research opportunities, and provides a platform for participation in international research-related initiatives. The programme research plan is linked to the institutional research strategy theme: Information Technology. UBT conducts research in all aspects of information technology : hardware and software, components and systems. Programme research topics include: IT systems, data analysis, modelling and simulation, software and programming, systems and data security, telecommunications, health informatics, Cyber security. The most recent staff research contributions are organised through the UBT Annual International Conference on Computer Science and Engineering. Additionally, there are two Centres operating as part of the CSE Department: UBT Centre for Modelling and Simulation and UBT Centre for Data Security and Privacy.
The main research topics as part of the research strategy are:
- Big Data
- Business Intelligence and Knowledge Management
- Cloud Computing and Mobile Technologies
- Cluster and Grid Computing
- Mobile Games, Web applications
- Customer Care Excellence
- E-Services, e-Health, e-Governance
Works from 2017
The effects of Security mechanisms on VoIP communication, Bajram Quka and Krenare Pireva
Comparison of Web Development Technologies ASP.NET vs. PHP, Rexhep Rexhepi, Ramiz Hoxha, and Betim Gashi
Comparison of Computer Execution Time of Determinant Calculation, Armend Salihu, Azir Jusufi, and Fatlinda Salihu
Characteristics and Temporal Behavior of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, and Arianit Maraj
Comparing Contemporary Infrastructure Services: Cloud and on-Premise, Ukë Sejfijaj and Osman Osmani
Implementation of ICT in the management of transport vehicles, Eldion Sheapi, Bilall I. Shaini, and Blerton Abazi
Synchronization and High Availability of Data by Using Technology of SQLServer 2012 Always On, Exhevit Ymeri, Besnik Qehaja, and Ramiz Hoxha
Works from 2016
Cloud Computing and Enterprise Data Reliability, Luan Gashi
Web application penetration testing, Besnik Qehaja, Gazmend Krasniqi, Ardian Bajraliu, and Amet Shabani
Improving non-native English students’ communicative competence and collaboration skills through Virtual Simulations, Alisa Sadiku
Works from 2015
Bounty techniques for web vulnerability scanning, Tanzer Abazi, Mentor Hoxhaj, Edmond Hajrizi, and Gazmend Krasniqi
Security Concerns of new alternative telecommunication services, Arbnora Hyseni, Krenare Pireva, and Miranda Kajtazi
Internet of Things: From applications, challenges and standardization to Industry implementations, Xhafer Krasniqi
Implementation of the AODV Routing in an Energy-constrained Mesh Network, Altin Zejnullahu and Zhilbert Tafa
Works from 2014
Authentication in SaaS by implementing double security measures, Muhamet Gërvalla and Shkëlqim Berisha
Efficient Algorithm for solving 3SUM problem, Muhamed Retkoceri
Using congruence in encoding musical partituras, Besim Shala, Besiana Mehmedi, Shkodran Tolaj, and Azir Jusufi
IT, E-Commerce, Individual and Team Learning Environment, Besnik Skenderi and Diamanta Skenderi
Works from 2013
Data Integrity Check using Hash Functions in Cloud environment, Selman Haxhijaha, Gazmend Bajrami, and Fisnik Prekazi
Modeling a Interworking WiMax LAN and MANET using OPNET Software, Petrit Shala and Luan Gashi
Project Scheduling and role of IT, Besnik Skenderi and Diamanta Skenderi
Estimation and Improvements of the Fundamental QoS in Networks with Random Topologies, Zhilbert Tafa