Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Florim Idrizi

    Florim Idrizi

    This paper intends to introduce discovery of various objects, object classification, object tracking algorithms including analysis and a comparison of different techniques used for different stages of tracking. The purpose of tracking... more
    This paper intends to introduce discovery of various objects, object classification, object tracking algorithms including analysis and a comparison of different techniques used for different stages of tracking. The purpose of tracking objects is segmenting a region of interest from a video scene and continuing tracking movement, positioning, and match. Detection of the object and classification are the steps preceding the object tracking in a sequence of images. Object detection is performed to control the existence of objects in the video and find that object, and then the detected object can be classified into many categories such as people, vehicles, floating trees, trees and other moving objects. In this paper is elaborated the autonomous tracking system with the aim of opposing movement in the event of a demonstration of human tracking, as such may enable the former to be distributed as it comprises more than one control center, key component parts of the system include:The camera and its 'interface, arduino viewing boards., PC - Controlled Center.
    In this paper I have shown the importance of protecting the data from others that is very necessary but the eventual omissions we may make may be fatal to us and to society as a whole. Data should be kept and be careful about any... more
    In this paper I have shown the importance of protecting the data from others that is very necessary but the eventual omissions we may make may be fatal to us and to society as a whole. Data should be kept and be careful about any information we distribute on the Internet. Damaging attacks hurt businesses in billions of dollars each year. This has led many IT researchers to deal with data security and the ability to protect users from cybercrime. These crimes, in addition to material damage, also cause psychological harm as it may affect children or even adults in online fraud and considered online pornography. Cybercrime should be fought as much so that others can use software and hardware without fear of crime.This paper will provide a brief overview of the field of cybercrime expertise including a brief history of its development, definitions, goals, and how it is implemented. Particular emphasis will be given to problems within the process, including various examples of cybercrime expertise.
    The history of e-government in Macedonia goes back to 2000, with the law for electronic data and that for the electronic signature. From then and until now the Republic of Macedonia has developed significantly in terms of e-government.
    Choosing the right method to sort numbers has a huge effect on how quickly a computer can process a task. The most used sorting algorithms today have been discovered years ago, and to this day, they have been the best for the job as there... more
    Choosing the right method to sort numbers has a huge effect on how quickly a computer can process a task. The most used sorting algorithms today have been discovered years ago, and to this day, they have been the best for the job as there was no other competitive algorithm. Through this paper, we make an analysis and comparison between the state of the art algorithms in sorting and based on their analogy of functionality, we propose a new modified sorting algorithm. We then present a brief description of the new modified algorithm, conduct comparisons with the state of the art, and finally we give conclusions about the performance of the proposed algorithm versus the most popular sorting algorithms. Moreover, we highlight the benefits of using this algorithm in different fields by various business companies or software developers, in cases when they need faster and easier sorting for their data management.
    Nowadays data is growing tremendously. Therefore, there is a great need to store and process data. The problem of Pattern Searching has different applications. When searching for text or words in computer application systems, Pattern... more
    Nowadays data is growing tremendously. Therefore, there is a great need to store and process data. The problem of Pattern Searching has different applications. When searching for text or words in computer application systems, Pattern searching is used to display the search results. The purpose of Pattern searching is to find text within another text. For example, searching for text in books will take a long time and is hard work. Using Pattern searching will save you time and effort. If similar words are found within the requested text, it will underline the word similar to what was requested, otherwise it does not display any matches if there are no similar words within a text.  This paper presents comparisons of the speed of different Pattern searching algorithms, precisely the Naive, KMP, Rabin-Karp, Finite Automata, Boyer-Moore, Aho-Corasick, Z Algorithm algorithms. We will test the time complexity of these algorithms in the three programming languages C#, Java and Python using ...
    Web services are becoming increasingly complex and mission critical. To assist manage this complexity they need to be modeled. This paper introduces a new way of modeling Web services through the UML Diagrams dedicated for a specific use... more
    Web services are becoming increasingly complex and mission critical. To assist manage this complexity they need to be modeled. This paper introduces a new way of modeling Web services through the UML Diagrams dedicated for a specific use case. Web services can be seen as a new paradigm for the interconnection of classes and the communication among them. They determine three main functions, the service, the repository (directory) and the consumer. The service provider publishes the created Web service to the directory, with intention that consumers can find them and bind a required service. We strive to indicate the UML modeling of the activities occurred in Web services, which would be useful for their coders or their providers to implement them. The paper deals with the UML diagrams and their implementation in a specific case study for a Traveller Management System (TMS).
    Choosing the right method to sort numbers has a huge effect on how quickly a computer can process a task. The most used sorting algorithms today have been discovered years ago, and to this day, they have been the best for the job as there... more
    Choosing the right method to sort numbers has a huge effect on how quickly a computer can process a task. The most used sorting algorithms today have been discovered years ago, and to this day, they have been the best for the job as there was no other competitive algorithm. Through this paper, we make an analysis and comparison between the state of the art algorithms in sorting and based on their analogy of functionality, we propose a new modified sorting algorithm. We then present a brief description of the new modified algorithm, conduct comparisons with the state of the art, and finally we give conclusions about the performance of the proposed algorithm versus the most popular sorting algorithms. Moreover, we highlight the benefits of using this algorithm in different fields by various business companies or software developers, in cases when they need faster and easier sorting for their data management.
    This paper intends to introduce discovery of various objects, object classification, object tracking algorithms including analysis and a comparison of different techniques used for different stages of tracking. The purpose of tracking... more
    This paper intends to introduce discovery of various objects, object classification, object tracking algorithms including analysis and a comparison of different techniques used for different stages of tracking. The purpose of tracking objects is segmenting a region of interest from a video scene and continuing tracking movement, positioning, and match. Detection of the object and classification are the steps preceding the object tracking in a sequence of images. Object detection is performed to control the existence of objects in the video and find that object, and then the detected object can be classified into many categories such as people, vehicles, floating trees, trees and other moving objects. In this paper is elaborated the autonomous tracking system with the aim of opposing movement in the event of a demonstration of human tracking, as such may enable the former to be distributed as it comprises more than one control center, key component parts of the system include:The camera and its 'interface, arduino viewing boards., PC - Controlled Center.
    In this paper I have shown the importance of protecting the data from others that is very necessary but the eventual omissions we may make may be fatal to us and to society as a whole. Data should be kept and be careful about any... more
    In this paper I have shown the importance of protecting the data from others that is very necessary but the eventual omissions we may make may be fatal to us and to society as a whole. Data should be kept and be careful about any information we distribute on the Internet. Damaging attacks hurt businesses in billions of dollars each year. This has led many IT researchers to deal with data security and the ability to protect users from cybercrime. These crimes, in addition to material damage, also cause psychological harm as it may affect children or even adults in online fraud and considered online pornography. Cybercrime should be fought as much so that others can use software and hardware without fear of crime.This paper will provide a brief overview of the field of cybercrime expertise including a brief history of its development, definitions, goals, and how it is implemented. Particular emphasis will be given to problems within the process, including various examples of cybercrime expertise.
    The Dark Web is the web that provides more freedom, so the main goal of the Dark Web is the freedom that some do not feel on the Surface Web. It is the Web content that is available on darknet and to access them, you need to have specific... more
    The Dark Web is the web that provides more freedom, so the main goal of the Dark Web is the freedom that some do not feel on the Surface Web. It is the Web content that is available on darknet and to access them, you need to have specific software. The dark network is often confused with Deep Web, which refers to unmarked (searchable) internet sites from traditional search engines. The Dark Web is at the center of the debate over whether anonymity online should be kept regardless of the illegal activity it provides. It is growing fast thanks to new tools, which makes the navigation easier. Websites which are the part of the Dark Web are accessible only by using Tor (The Onion Routing) and I2P (Invisible Internet Protocol). Tor provides anonymous access to the Internet and I2P specializes in allowing the sites to be accessed anonymously. The Darknet is used for illegal activities such as selling and buying drugs, hacking, fraud, pornography, etc. But also anonymity, privacy, access t...
    Secure messages and key management have been a focal point in cryptography. In the cryptographic systems, the notion of key is referred ti an numerical value which is used by an algorithm, making the information secure and visible only to... more
    Secure messages and key management have been a focal point in cryptography. In the cryptographic systems, the notion of key is referred ti an numerical value which is used by an algorithm, making the information secure and visible only to individuals that possess the proper key to discover that information. In this article we will explain the concepts of private key and public key cryptography, and combined cryptography in terms of protecting information that is being sent through Internet. Further, we will analyze some secret and public algorithms, and combined algorithms with LABView. The speed measurement of these algorithms also represents a significant contribution of this paper.
    Tools emerged from information technology, such as Learning Management Systems (LMS), have been proven to significantly boost the students’ performance and productivity. Hence, many higher education institutions have adopted such systems.... more
    Tools emerged from information technology, such as Learning Management Systems (LMS), have been proven to significantly boost the students’ performance and productivity. Hence, many higher education institutions have adopted such systems. Given the fact of the growth rates in adopting LMS in university education and the imperativeness of the factors’ evaluation before the adoption of such a system at State University of Tetova in Macedonia, adds to the urgency to conduct a research by which factors that predict the students’ intention to adopt LMS to be examined. In this paper, based on extant literature review and by utilizing the Unified Theory of Acceptance and Use of Technology (UTAUT), as the best model for predicting individual’s technology acceptance, a research model is developed. By employing survey, the relations between the factors are described. Empirical data is gathered through purposive sampling technique. The results of this study, beside the theoretical contribution...
    Money as an instrument for making payments, is indeed a very important tool. Without it, it would be impossible the exchange of goods and services within the economy. As time moves on, money has gone through different stages of... more
    Money as an instrument for making payments, is indeed a very important tool. Without it, it would be impossible the exchange of goods and services within the economy. As time moves on, money has gone through different stages of development, even transforming the traditional system of payments into a contemporary system of payments where the main item is digital money in all kinds of forms and by-products. Hence this includes digital currencies. Although for the time being digital currencies do not have the power of replacing the common currency, they can therefore influence on changing the way of doing business and the functioning of society, mostly by easing the realizations of various transactions, accompanied by a series of inevitable risks in functioning business operations. The field of digital currencies is a new one and it influences on payment system, therefore it acquires detailed analysis of their full potential, esepcially the one in the function of business and its devel...
    Research Interests:
    In a fast changing business environment, companies that can innovate better and faster, and respond quickly to customer’s requirements, will win. One of the most important industries of knowledge-based economy, by all means, is the... more
    In a fast changing business environment, companies that can innovate better and faster, and respond quickly to customer’s requirements, will win. One of the most important industries of knowledge-based economy, by all means, is the software industry. In order to achieve business success and to innovate in the market, almost every large organization relies on software. The emergence of Web 2.0 and web-based services have changed radically the way of conducting business as well as the way of building applications. In a web service environment, software applications are becoming services that can be easily linked with other software components, and can provide faster and more productive communication between businesses and customers. The software development companies now need to release products and services more frequently, involve the user participation even as co-developers, and improve the product continuously by receiving real time feedback from the users. In such a dynamic and n...
    infrastructure. To overcome these problems, smart grid is the new solution which is more reliable, flexible and controllable. Home energy management system (HEMS) in the smart home allows the customer to control, optimize and monitor the... more
    infrastructure. To overcome these problems, smart grid is the new solution which is more reliable, flexible and controllable. Home energy management system (HEMS) in the smart home allows the customer to control, optimize and monitor the energy consumption. In this paper, a brief overview on the architecture and functional modules of smart HEMS is presented. Then, the advanced HEMS infrastructures and home appliances in smart houses are thoroughly analyzed and reviewed. This paper presents an intelligent HEM algorithm for managing high power consumption household appliances. The proposed algorithm manages household loads according to their preset priority and guarantees the total household power consumption below certain levels. The home server monitors and controls the energy consumption and controls the home energy use to reduce the energy cost. The remote energy management server aggregates the energy information from the home servers, compares them and creates statistical analys...
    The history of e-government in Macedonia goes back to 2000, with the law for electronic data and that for the electronic signature. From then and until now the Republic of Macedonia has developed significantly in terms of e-government.
    Secure communications are an important precondition of e-commerce transactions and are required for confidential electronic communications. Every e-commerce system relies on encryption to secure data transmission by controlling data... more
    Secure communications are an important precondition of e-commerce transactions and are required for confidential electronic communications. Every e-commerce system relies on encryption to secure data transmission by controlling data access and protect information on the internet and ultimately boost consumer confidence. By implementing encryption, integrity is maintained while digital authentication is enforced, thus allowing both customers and merchants to verify the identity of the other party, a concept fundamental to secure online credit card transactions. In this paper we will explain the basic concepts of encryption and the needs and opportunities of using several cryptographic systems. Next, we will present some of the most recent algorithms which are supporting and enabling these confidential electronic communications. At the same time we will compare and evaluate individual algorithms by taking into consideration the security aspect and their complexity.
    Since the primary attraction for IT developers is to build applications by reusing the existing resources, especially using mobile platforms as it is changing the way software applications are developed and accessed, the platform... more
    Since the primary attraction for IT developers is to build applications by reusing the existing resources, especially using mobile platforms as it is changing the way software applications are developed and accessed, the platform presented in this paper aims to keep users up to date for all of their daily events. The idea was to develop a new contemporary application for the mobile platform that will be able to integrate several social media APIs. While selecting sources and notification time, the proposed implemented platform will be able to generate a todo list of the daily events, offering high flexibility and portability.
    Small and medium-sized enterprises (SMEs) are known as accelerators of social and economic development due to the important role they play in increasing GDP, job creation and entrepreneurship, with all the ways of doing business and... more
    Small and medium-sized enterprises (SMEs) are known as accelerators of social and economic development due to the important role they play in increasing GDP, job creation and entrepreneurship, with all the ways of doing business and especially with the electronic way, and which implements information technology and the Internet for the realization of business relationships with customers. The Internet and information technology are destroying the walls and barriers between countries not only economically but also in every other social aspect, thus influencing the globalization of the international economy and the opening of markets between different countries, facilitating the exchange of goods and services. Over time, e-business began to be applied, which made sales and purchases, ie exchanges between businesses and consumers, online. This means that various businesses in addition to traditional shops began to open virtual stores (read electronic). The development of Internet-based...
    Research Interests:
    Technology plays a significant role in the area of development of new methods of payment and settlement. Banking and financial systems are closely linked to information and communication technologies. In general, the existence and... more
    Technology plays a significant role in the area of development of new methods of payment and settlement. Banking and financial systems are closely linked to information and communication technologies. In general, the existence and functioning of virtual banks and the usage of Internet is part of developed countries practice. In this paper we attempt to throw light on the advantages of E payments and E-banking as innovative products so as the costumers tend to benefits more from them. In the near future the traditional banking services will be completely replaced with electronic banking services. Blockchain technology as undeniably ingenious invention will change the way payments are conducted and fulfilled. The aim of this study is to analyze the potential impact of Blockchain technology and its rapidly growing development. The Blockchain technology and cryptocurrency provides a large field for the implementation of new ideas in new areas and provide new solutions for consumers worl...
    Research Interests:
    Technology has always been on the agenda of important world events and continues to be the main topic with perspective in the future as well. The practical relevance of the topic is about understanding the speeds that different networks... more
    Technology has always been on the agenda of important world events and continues to be the main topic with perspective in the future as well. The practical relevance of the topic is about understanding the speeds that different networks have on different mobile phones whether Android or iPhone with proportions each different from each other. This paper discusses each generation characteristics and provides more accurate visions for technology development and the advancement of new technologies ranging from 2G to the latest as the most advanced 5G. Analysis and the difference of 2G, 3G, 4G and 5G Technologies and algorithms is made. In the end, an experiment using Android and IOS Smartphones is made as related to their download speed of three different files including a video, a picture and a music file.
    Abstrac he future of the banking and financial world is tightly connected with ICT technologies, it works and relies on them. Currently there are more digital moneys circulating the world than traditional paper money. Most of the banking... more
    Abstrac he future of the banking and financial world is tightly connected with ICT technologies, it works and relies on them. Currently there are more digital moneys circulating the world than traditional paper money. Most of the banking transactions today are done through the means of e-banking and m-banking. It is fair to assume that in the near future we will witness a global redefinition of the banking system, payment network, currencies and financial transactions as we know them today. New paradigms are emerging, ICT companies primarily based in the Silicon Valley with their inventions are threatening the traditional banking world. New digital currencies, e-banks and way of doing online transactions is a reality in the developed countries. We are experiencing the rise of the new digital currency which are governed by decentralized banking systems and are not under control of any government. In the new future, traditional banking will be something of our past.
    What is the impact of technology and to what level the high schools in Gjilan (Kosovo) are prepared in the incorporation of various learning technologies in teaching and learning? These are two essential issues that have resulted in a... more
    What is the impact of technology and to what level the high schools in Gjilan (Kosovo) are prepared in the incorporation of various learning technologies in teaching and learning? These are two essential issues that have resulted in a significant research on the application of different technologies in education and in preparing young people to become leaders and successful in society today which is running by the internet. This paper reports on the outcomes of a survey implemented in high schools, also in this paper is presented the real situation in high schools in Gjilan using questionnaires with students and teachers. How often these technologies are used in teaching and if these schools meet requirements regarding to technology equipment, the condition of the IT cabinets, if the teachers are trained and what is the ability of students to deal with technologies.
    Due to its transferability, soil has been commonly used as evidence in criminal investigations. In this work, urban soil samples taken from five parks are subject of analysis. Infrared spectroscopy was used as experimental technique.... more
    Due to its transferability, soil has been commonly used as evidence in criminal investigations. In this work, urban soil samples taken from five parks are subject of analysis. Infrared spectroscopy was used as experimental technique. Using this technique, a total number of 80 samples of urban soils were examined. The infrared spectra were properly pre‐processed and were further used for development of classification models based on supervised self‐organizing maps. In order to perform the variable selection and the optimization of the supervised self‐organizing maps in automated manner, genetic algorithms were employed. Using this approach, for three locations with our models, we are able to successfully predict all samples used for external validation, while for the remaining two locations, 96% of the samples, used for external validation, were successfully classified by the developed models. In addition to this, the developed models were used for examination of influence of the weather and the seasonal changes on the composition of the soil. For this purpose, 3 years after the initial soil samples were collected, additional 12 samples were analyzed. All these samples were correctly classified by the previously developed model.
    Research has demonstrated that firms using e-business culminate with considerable returns through efficiency improvement, inventory reduction, sales increase, customer relationship enhancement, new market penetration, and ultimately... more
    Research has demonstrated that firms using e-business culminate with considerable returns through efficiency improvement, inventory reduction, sales increase, customer relationship enhancement, new market penetration, and ultimately financial returns. However, there is little systematic research in terms of e-business adoption patterns in firms using TOE (Technology-Organization-Environment) framework. This paper illustrates the potential of adoption and use of ICT and e-business applications in small and medium sized enterprises (SMEs) in Macedonia. In the paper we present preliminary results of a survey of around 60 SMEs. In this study we explore several factors enabling or impeding the successful adoption and use of e-business and ICT by Macedonian SMEs. Based on technology-environment-organization (TOE) theory, three aspects influence e-business adoption: technological context (we explore technology integration among firms, more specifically the type of ICT adoption and applicat...
    ABSTRACT Ontologies represent an immense opportunity and are bringing great advantages to e-learning systems. Their implementation is seen as a better solution for organizing and visualizing didactic knowledge, and for this knowledge to... more
    ABSTRACT Ontologies represent an immense opportunity and are bringing great advantages to e-learning systems. Their implementation is seen as a better solution for organizing and visualizing didactic knowledge, and for this knowledge to be shared and reused by different educational applications. This paper aims at proposing a model which is focused on integrating ontological principles with e-learning standards. We developed a prototype model that is integrated with an ontology which gives a semantic representation of learning contents by adding semantic notations to each learning resource. The ontology is used for identifying the structure of learning module and defining the needed vocabulary for the student to conceptualize the learning modules. Another special ontology is introduced for learning materials, which is located at the systems metadata. Here, we included also the system access options, results registering and the communications.