フォロー
Artan Luma
Artan Luma
確認したメール アドレス: seeu.edu.mk - ホームページ
タイトル
引用先
引用先
Real time access control based on face recognition
Y Januzaj, A Luma, Y Januzaj, V Ramaj
International Conference on Network security & Computer Science (ICNSCS-15 …, 2015
292015
The proposed model to increase security of sensitive data in cloud computing
D Hyseni, A Luma, B Selimi, B Cico
Int. J. Adv. Comput. Sci. Appl 9 (2), 203-210, 2018
202018
Cyber security standards for the industrial internet of things (iiot)–a systematic review
A Buja, M Apostolova, A Luma, Y Januzaj
2022 International Congress on Human-Computer Interaction, Optimization and …, 2022
92022
New Data Encryption Algorithm and its Implementation for Online User Authentication.
A Luma, B Raufi
Security and Management, 81-85, 2009
92009
Generalization of Dodgson’s condensation method for calculating determinant of rectangular matrices
A Salihu, H Snopçe, J Ajdari, A Luma
2022 International Conference on Electrical, Computer and Energy …, 2022
82022
Using elliptic curve encryption and decryption for securing audio messages
A Luma, B Selimi, L Ameti
Transactions on Engineering Technologies: World Congress on Engineering 2014 …, 2015
82015
The integration of Wireless Sensor Networks, Mobile Networks and Cloud Engineering for a decision support system-A Systematic Literature Review
L Gashi, A Luma, Y Januzaj
2022 International Congress on Human-Computer Interaction, Optimization and …, 2022
72022
Development of the interactive multimedia learning systems and its implementation
A Luma, N Zeqiri
Proc. of Current Developments in Technology-Assisted Education, 1949-1953, 2006
72006
Optimization of Dodgson's condensation method for rectangular determinant calculations
A Salihu, H Snopce, A Luma, J Ajdari
Advanced Mathematical Models & Applications 7 (3), 264-274, 2022
62022
Cosine similarity–a computing approach to match similarity between higher education programs and job market demands based on maximum number of common words
Y Januzaj, A Luma
International Journal of Emerging Technologies in Learning (iJET) 17 (12 …, 2022
62022
Cosine similarity through control flow graphs for secure software engineering
A Desku, B Raufi, A Luma, B Selimi
2021 International Conference on Engineering and Emerging Technologies …, 2021
62021
Data encryption and decryption using new pythagorean triple algorithm
A Luma, B Rauf
Proceedings of the World Congress on Engineering 1, 2014
62014
Relationship between Fibonacci and Lucas sequences and their application in Symmetric Cryptosystems
A Luma, B Raufi
Proc. of the 4th Int. Conf. on Circuits, Systems and Signals, World …, 2010
62010
Determining the Optimal Number of Clusters using Silhouette Score as a Data Mining Technique.
Y Januzaj, E Beqiri, A Luma
International Journal of Online & Biomedical Engineering 19 (4), 2023
52023
Time Complexity Analysis for Cullis/Radic and Dodgson’s Generalized/Modified Method for Rectangular Determinants Calculations
A Salihu, H Snopce, A Luma, J Ajdari
International Jwenal of Computers and Their Applications 29 (4), 245-254, 2022
52022
A Systematic Literature Review on Using Blockchain Technology in Public Administration
A Aliti, E Leka, A Luma, MA Trpkovska
2022 45th Jubilee International Convention on Information, Communication and …, 2022
52022
Comparision of maturity model frameworks in information security and their implementtation
A Luma, B Abazi, B Selimi, M Hamiti
Proceedings International Conf on Engineering Technologies (ICENTE'18), 102-104, 2018
52018
Asymmetric encryption/decryption with Pentor and ultra Pentor operators
A Luma, B Raufi, X Zenuni
TOJSAT 2 (2), 9-12, 2012
52012
Control systems, smart sensors, controller, elements in a control loop, Java Card and Security
N Zeqiri, A Luma
WSEAS Transactions on Systems and Control, 365-374, 2008
52008
Multimedia learning systems and its implementation for the subject advanced it skills
N Zeqiri, A Luma
30th Jubilee International Convention MIPRO, 2007, 2007
52007
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20