Artan Luma - Academia.edu (original) (raw)
Papers by Artan Luma
2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
International Journal of Engineering and Advanced Technology
One of the essential components of Recommender Systems in Software Engineering is a static analys... more One of the essential components of Recommender Systems in Software Engineering is a static analysis that is answerable for producing recommendations for users. There are different techniques for how static analysis is carried out in recommender systems. This paper drafts a technique for the creation of recommendations using Cosine Similarity. Evaluation of such a system is done by using precision, recall, and so-called Dice similarity coefficient. Ground truth evaluations consisted of using experienced software developers for testing the recommendations. Also, statistical T-test has been applied in comparing the means of the two evaluated approaches. These tests point out the significant difference between the two compared sets.
International Journal of Emerging Technologies in Learning (iJET)
Comparing textual content is becoming more and more problematic due to the fact that nowadays dat... more Comparing textual content is becoming more and more problematic due to the fact that nowadays data is very dynamic. The application of sophisticated methods enables us to compare how similar the documents are to each other. In our research we apply the Cosine Similarity method to compare the similarity of several documents with each other. We also apply the TF-IDF technique which enables us to normalize the results. Normalization of these results is necessary for the fact that there are some words that are repeated several times and from this repetition is determined their importance. Finally we can see a comparison between the similarity of documents with normalized and non-normalized results. As can be seen in the research, the normalization of results has a great value in comparing documents with textual content.
This paper presents a simple model for declarative specification of the structure of documents fo... more This paper presents a simple model for declarative specification of the structure of documents for web-based content management. The proposed model allows the description of the hierarchical structure of multi-lingual documents, relationships, and organization among documents of same type. We specify this model in a way that allows building specifications using dragand-drop interfaces. Then, we use these specifications in order to automatically generate the necessary database schemas and code for managing these documents. The final goal is to provide unobtrusive automatic code generation that is strongly based on widely used design patterns and thus fits into common workflows in web application development. The usage of such models should further reduce development time in Rapid Application Development processes, especially by shortening the time from gathering requirements to having an executable application.
2018 7th Mediterranean Conference on Embedded Computing (MECO), 2018
In spite of the fact that there is an increase in the usage of cloud storage services, there is s... more In spite of the fact that there is an increase in the usage of cloud storage services, there is still a significant number of client organizations that lack sufficient trust in third party cloud providers. To improve the privacy of users and to ensure more secured data we have proposed a model for security in cloud computing, in the previous work [1]. Part of our proposed model is IT Security Specialist (ITSS) of the company i.e. that will control security in cloud computing. This solution is based on some ways of file encryption, partitioning, and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. In this paper we propose two new methods as part of our proposed model [1,2]. Based on the results of this work, we provide the comments in relations to the methods as a part of the proposed model ...
Every year, students who complete the high education, and who intend continuing their post-second... more Every year, students who complete the high education, and who intend continuing their post-secondary education, are faced with the problem of selecting the direction of studies. The selection process of conducting studies usually starts years ago, and many factors are involved in this process. Identification and analysis of factors that influence the selection process of direction of studies by students was the purpose of this research. To identify the factors that have greater weight in determining the direction of studies by students, 1345 high school students in Kosova were surveyed using a questionnaire prepared for this purpose. These data provided descriptive information, quantitative and statistical interpretation. The statistical analysis of the data is made by using the SPSS software. Findings from this study indicate that a significant number of factors are taken into account by students during this process. Economic factors proved dominant during data analysis. Also a qua...
The purpose of this paper is to validate the real-time system in the Linux-RTAI/LXRT (Real Time A... more The purpose of this paper is to validate the real-time system in the Linux-RTAI/LXRT (Real Time Application Interface/Linux Real-time) environment, in the presence of hardware and software faults. Due to the simplicity of creating and injecting faults, the method of Software Implemented Fault Injection (SWIFI) is selected. With this mode of fault injection, a tested system can emulate real conditions, in which it is required to function. The Linux operating system was selected due to open source code and ease of manipulation of various parts. Verifications of some tests performed earlier by different authors, on various hardware and software platforms, have been made. The Linux operating system has been modified with an RTAI/LXRT patch in order to gain real-time system functionality. Subsequently, modification of the respective parts of the operating system was made to enable the injection of faults. After the injection of faults, several testing frames were selected to verify and v...
Studying the right field has great importance in human life and perspective. Rather than affectin... more Studying the right field has great importance in human life and perspective. Rather than affecting the greatest employer's ability, some studies see higher education as one of the leading factors that directly affects the style of life that we do. Therefore, today's demands have increased significantly for skilled people, and prepared in complex areas, and a consolidation between market demands and university curricula is needed. This paper examines Data mining techniques which are used in order to create an automated model which makes comparisons between market demands and university curricula. We also present how proposed model is able to give recommendations, based on the comparison between market demands and university curricula.
Information and Communications Technology (ICT) has a great importance in all aspects of life, in... more Information and Communications Technology (ICT) has a great importance in all aspects of life, including education as well. With the fast technology progress, its implementation in education is inevitable. This paper shows the implementation of ICT in education, beginning with its definition, indicators, techniques and methods of implementation, the obstacles that the implementation faces, and some good implementation practices performed in Mathematics. All the above mentioned aspects are described in this paper including the cycle of subject organization through ICT, which is followed by the creation of electronic files for teachers and students illustrated by an example of the way of organizing these files. There is also discussed for the lesson planning in Mathematics using available applications for each teacher in the R. of Macedonia. This research covers the teachers of the R. of Macedonia of different ages which come both from elementary and high schools. We show the level of...
Issues with thefts and identity fraud are countinously increasing and becoming more and more seri... more Issues with thefts and identity fraud are countinously increasing and becoming more and more serious as the usage of computerized systems for identification purposes is increasing. In this aspect, for controling access in private buildings, it becomes a necessity to use more robust techniques than those that are commonly used nowadays. Face recognition is one of the techniques that can increase the security. In this paper, we present an embedded implementation of a security access control system based on face recognition. Haar-like features are used for feature extraction, the PCA algorithm is used for eigenvector calculation and SVM based classification is used for face recognition. Our goal was to evaluate the feasibility and efficiency of implementing such a system on low-price embedded devices. This paper focuses on evaluation of the system’s accuracy and how controlling parameters such as background, light and number of trainings influences this accuracy.
One of the most disturbing problems of our society is the problem of students’ school abandoning.... more One of the most disturbing problems of our society is the problem of students’ school abandoning. It is a phenomenon that in many stages followed up our society. It is much more profound problem than actually it is considered, because it is inherited from one generation to the other. In this study we consider many fragilities of elementary and pre university education in Kosova. The right for education is guaranteed in all international convents; therefore the society should do much more in analyzing the main factors of abandoning, in order to make efforts in the direction of stopping the factors which influence it. In this research we are analyzing the main reasons of this phenomenon. For this purpose there are prepared the special questionnaires. The first questioner is fulfilled by the students and the second questioner is fulfilled by the teachers. In total there were surveyed 450 students and 229 teachers from both elementary and high schools in the Republic of Kosova. These da...
An automatic control system is a preset closed-loop control system that requires no operator acti... more An automatic control system is a preset closed-loop control system that requires no operator action. This assumes the process remains in the normal range for the control system. Elements of automatic control. Finding a transfer function for block Diagram of CNC machine-tool control system. The control system design will attempt to evaluate the system response by determining a mathematical model for the system. We have described the generalized schematic block-diagram for a closed loop, or feedback control system. Feedback loop is the signal path from the output back to the input to correct for any variation between the output levels from the set level. Programming serial and parallel port. The broad usage of Java language and Java Cards in various different fields has made them quite applicable and implementable in different applications and systems.
Education is faced with various different challenges in meeting the demands of teaching and learn... more Education is faced with various different challenges in meeting the demands of teaching and learning in the 21st century. One of the new challenges is the call for the integration of computer-based technologies in teaching and learning as an alternative mode of instruction delivery. Multimedia technology has the potential in transforming the traditional classroom into a world of unlimited imaginary environment. This paper deals with the theoretical acknowledgements concerning the learning systems on a conceptual level and the methodology for complete development of multimedia learning systems. It also considers the relation between technology and student learning -addressing the question of what kinds of impact technology has on education. Furthermore, it includes the experience in developing the bilingual interactive multimedia learning system (BIMLS). For the realization of BIMLS, standards for optimal characteristics of different multimedia components have been defined. The archi...
Different levels of impact to some phenomena that perceive and react to unexpected values affect ... more Different levels of impact to some phenomena that perceive and react to unexpected values affect the results to deviate and take inappropriate values. Our effort is to create relevant solutions, which will allow these values to minimize or recovered through analytical analysis and arithmetic expressions, which create a new condition, and affects the extreme values retrospectively. Extreme values (Max and Min) can be a part of a certain differential, which gives us the opportunity to explore the new created situation. By creating the appropriate model not only affects the performance of the model/algorithm, but also provides specific solutions at the expense of increasing of the accurate perception and creation of a certain range of values, that form the totality of the realization of a phenomenon in terms of an event is stochastic or defined in border. http://globaljournals.org/GJCST_Volume11/4-Impacts-of-Sensitivity-in-Advanced.pdf
2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
International Journal of Engineering and Advanced Technology
One of the essential components of Recommender Systems in Software Engineering is a static analys... more One of the essential components of Recommender Systems in Software Engineering is a static analysis that is answerable for producing recommendations for users. There are different techniques for how static analysis is carried out in recommender systems. This paper drafts a technique for the creation of recommendations using Cosine Similarity. Evaluation of such a system is done by using precision, recall, and so-called Dice similarity coefficient. Ground truth evaluations consisted of using experienced software developers for testing the recommendations. Also, statistical T-test has been applied in comparing the means of the two evaluated approaches. These tests point out the significant difference between the two compared sets.
International Journal of Emerging Technologies in Learning (iJET)
Comparing textual content is becoming more and more problematic due to the fact that nowadays dat... more Comparing textual content is becoming more and more problematic due to the fact that nowadays data is very dynamic. The application of sophisticated methods enables us to compare how similar the documents are to each other. In our research we apply the Cosine Similarity method to compare the similarity of several documents with each other. We also apply the TF-IDF technique which enables us to normalize the results. Normalization of these results is necessary for the fact that there are some words that are repeated several times and from this repetition is determined their importance. Finally we can see a comparison between the similarity of documents with normalized and non-normalized results. As can be seen in the research, the normalization of results has a great value in comparing documents with textual content.
This paper presents a simple model for declarative specification of the structure of documents fo... more This paper presents a simple model for declarative specification of the structure of documents for web-based content management. The proposed model allows the description of the hierarchical structure of multi-lingual documents, relationships, and organization among documents of same type. We specify this model in a way that allows building specifications using dragand-drop interfaces. Then, we use these specifications in order to automatically generate the necessary database schemas and code for managing these documents. The final goal is to provide unobtrusive automatic code generation that is strongly based on widely used design patterns and thus fits into common workflows in web application development. The usage of such models should further reduce development time in Rapid Application Development processes, especially by shortening the time from gathering requirements to having an executable application.
2018 7th Mediterranean Conference on Embedded Computing (MECO), 2018
In spite of the fact that there is an increase in the usage of cloud storage services, there is s... more In spite of the fact that there is an increase in the usage of cloud storage services, there is still a significant number of client organizations that lack sufficient trust in third party cloud providers. To improve the privacy of users and to ensure more secured data we have proposed a model for security in cloud computing, in the previous work [1]. Part of our proposed model is IT Security Specialist (ITSS) of the company i.e. that will control security in cloud computing. This solution is based on some ways of file encryption, partitioning, and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. In this paper we propose two new methods as part of our proposed model [1,2]. Based on the results of this work, we provide the comments in relations to the methods as a part of the proposed model ...
Every year, students who complete the high education, and who intend continuing their post-second... more Every year, students who complete the high education, and who intend continuing their post-secondary education, are faced with the problem of selecting the direction of studies. The selection process of conducting studies usually starts years ago, and many factors are involved in this process. Identification and analysis of factors that influence the selection process of direction of studies by students was the purpose of this research. To identify the factors that have greater weight in determining the direction of studies by students, 1345 high school students in Kosova were surveyed using a questionnaire prepared for this purpose. These data provided descriptive information, quantitative and statistical interpretation. The statistical analysis of the data is made by using the SPSS software. Findings from this study indicate that a significant number of factors are taken into account by students during this process. Economic factors proved dominant during data analysis. Also a qua...
The purpose of this paper is to validate the real-time system in the Linux-RTAI/LXRT (Real Time A... more The purpose of this paper is to validate the real-time system in the Linux-RTAI/LXRT (Real Time Application Interface/Linux Real-time) environment, in the presence of hardware and software faults. Due to the simplicity of creating and injecting faults, the method of Software Implemented Fault Injection (SWIFI) is selected. With this mode of fault injection, a tested system can emulate real conditions, in which it is required to function. The Linux operating system was selected due to open source code and ease of manipulation of various parts. Verifications of some tests performed earlier by different authors, on various hardware and software platforms, have been made. The Linux operating system has been modified with an RTAI/LXRT patch in order to gain real-time system functionality. Subsequently, modification of the respective parts of the operating system was made to enable the injection of faults. After the injection of faults, several testing frames were selected to verify and v...
Studying the right field has great importance in human life and perspective. Rather than affectin... more Studying the right field has great importance in human life and perspective. Rather than affecting the greatest employer's ability, some studies see higher education as one of the leading factors that directly affects the style of life that we do. Therefore, today's demands have increased significantly for skilled people, and prepared in complex areas, and a consolidation between market demands and university curricula is needed. This paper examines Data mining techniques which are used in order to create an automated model which makes comparisons between market demands and university curricula. We also present how proposed model is able to give recommendations, based on the comparison between market demands and university curricula.
Information and Communications Technology (ICT) has a great importance in all aspects of life, in... more Information and Communications Technology (ICT) has a great importance in all aspects of life, including education as well. With the fast technology progress, its implementation in education is inevitable. This paper shows the implementation of ICT in education, beginning with its definition, indicators, techniques and methods of implementation, the obstacles that the implementation faces, and some good implementation practices performed in Mathematics. All the above mentioned aspects are described in this paper including the cycle of subject organization through ICT, which is followed by the creation of electronic files for teachers and students illustrated by an example of the way of organizing these files. There is also discussed for the lesson planning in Mathematics using available applications for each teacher in the R. of Macedonia. This research covers the teachers of the R. of Macedonia of different ages which come both from elementary and high schools. We show the level of...
Issues with thefts and identity fraud are countinously increasing and becoming more and more seri... more Issues with thefts and identity fraud are countinously increasing and becoming more and more serious as the usage of computerized systems for identification purposes is increasing. In this aspect, for controling access in private buildings, it becomes a necessity to use more robust techniques than those that are commonly used nowadays. Face recognition is one of the techniques that can increase the security. In this paper, we present an embedded implementation of a security access control system based on face recognition. Haar-like features are used for feature extraction, the PCA algorithm is used for eigenvector calculation and SVM based classification is used for face recognition. Our goal was to evaluate the feasibility and efficiency of implementing such a system on low-price embedded devices. This paper focuses on evaluation of the system’s accuracy and how controlling parameters such as background, light and number of trainings influences this accuracy.
One of the most disturbing problems of our society is the problem of students’ school abandoning.... more One of the most disturbing problems of our society is the problem of students’ school abandoning. It is a phenomenon that in many stages followed up our society. It is much more profound problem than actually it is considered, because it is inherited from one generation to the other. In this study we consider many fragilities of elementary and pre university education in Kosova. The right for education is guaranteed in all international convents; therefore the society should do much more in analyzing the main factors of abandoning, in order to make efforts in the direction of stopping the factors which influence it. In this research we are analyzing the main reasons of this phenomenon. For this purpose there are prepared the special questionnaires. The first questioner is fulfilled by the students and the second questioner is fulfilled by the teachers. In total there were surveyed 450 students and 229 teachers from both elementary and high schools in the Republic of Kosova. These da...
An automatic control system is a preset closed-loop control system that requires no operator acti... more An automatic control system is a preset closed-loop control system that requires no operator action. This assumes the process remains in the normal range for the control system. Elements of automatic control. Finding a transfer function for block Diagram of CNC machine-tool control system. The control system design will attempt to evaluate the system response by determining a mathematical model for the system. We have described the generalized schematic block-diagram for a closed loop, or feedback control system. Feedback loop is the signal path from the output back to the input to correct for any variation between the output levels from the set level. Programming serial and parallel port. The broad usage of Java language and Java Cards in various different fields has made them quite applicable and implementable in different applications and systems.
Education is faced with various different challenges in meeting the demands of teaching and learn... more Education is faced with various different challenges in meeting the demands of teaching and learning in the 21st century. One of the new challenges is the call for the integration of computer-based technologies in teaching and learning as an alternative mode of instruction delivery. Multimedia technology has the potential in transforming the traditional classroom into a world of unlimited imaginary environment. This paper deals with the theoretical acknowledgements concerning the learning systems on a conceptual level and the methodology for complete development of multimedia learning systems. It also considers the relation between technology and student learning -addressing the question of what kinds of impact technology has on education. Furthermore, it includes the experience in developing the bilingual interactive multimedia learning system (BIMLS). For the realization of BIMLS, standards for optimal characteristics of different multimedia components have been defined. The archi...
Different levels of impact to some phenomena that perceive and react to unexpected values affect ... more Different levels of impact to some phenomena that perceive and react to unexpected values affect the results to deviate and take inappropriate values. Our effort is to create relevant solutions, which will allow these values to minimize or recovered through analytical analysis and arithmetic expressions, which create a new condition, and affects the extreme values retrospectively. Extreme values (Max and Min) can be a part of a certain differential, which gives us the opportunity to explore the new created situation. By creating the appropriate model not only affects the performance of the model/algorithm, but also provides specific solutions at the expense of increasing of the accurate perception and creation of a certain range of values, that form the totality of the realization of a phenomenon in terms of an event is stochastic or defined in border. http://globaljournals.org/GJCST_Volume11/4-Impacts-of-Sensitivity-in-Advanced.pdf