Real time access control based on face recognition Y Januzaj, A Luma, Y Januzaj, V Ramaj International Conference on Network security & Computer Science (ICNSCS-15 …, 2015 | 29 | 2015 |
The proposed model to increase security of sensitive data in cloud computing D Hyseni, A Luma, B Selimi, B Cico Int. J. Adv. Comput. Sci. Appl 9 (2), 203-210, 2018 | 20 | 2018 |
Cyber security standards for the industrial internet of things (iiot)–a systematic review A Buja, M Apostolova, A Luma, Y Januzaj 2022 International Congress on Human-Computer Interaction, Optimization and …, 2022 | 10 | 2022 |
New Data Encryption Algorithm and its Implementation for Online User Authentication. A Luma, B Raufi Security and Management, 81-85, 2009 | 9 | 2009 |
Generalization of Dodgson’s condensation method for calculating determinant of rectangular matrices A Salihu, H Snopçe, J Ajdari, A Luma 2022 International Conference on Electrical, Computer and Energy …, 2022 | 8 | 2022 |
Using elliptic curve encryption and decryption for securing audio messages A Luma, B Selimi, L Ameti Transactions on Engineering Technologies: World Congress on Engineering 2014 …, 2015 | 8 | 2015 |
Cosine similarity–a computing approach to match similarity between higher education programs and job market demands based on maximum number of common words Y Januzaj, A Luma International Journal of Emerging Technologies in Learning (iJET) 17 (12 …, 2022 | 7 | 2022 |
The integration of Wireless Sensor Networks, Mobile Networks and Cloud Engineering for a decision support system-A Systematic Literature Review L Gashi, A Luma, Y Januzaj 2022 International Congress on Human-Computer Interaction, Optimization and …, 2022 | 7 | 2022 |
Development of the interactive multimedia learning systems and its implementation A Luma, N Zeqiri Proc. of Current Developments in Technology-Assisted Education, 1949-1953, 2006 | 7 | 2006 |
Optimization of Dodgson's condensation method for rectangular determinant calculations A Salihu, H Snopce, A Luma, J Ajdari Advanced Mathematical Models & Applications 7 (3), 264-274, 2022 | 6 | 2022 |
Cosine similarity through control flow graphs for secure software engineering A Desku, B Raufi, A Luma, B Selimi 2021 International Conference on Engineering and Emerging Technologies …, 2021 | 6 | 2021 |
Data encryption and decryption using new pythagorean triple algorithm A Luma, B Rauf Proceedings of the World Congress on Engineering 1, 2014 | 6 | 2014 |
Relationship between Fibonacci and Lucas sequences and their application in Symmetric Cryptosystems A Luma, B Raufi Proc. of the 4th Int. Conf. on Circuits, Systems and Signals, World …, 2010 | 6 | 2010 |
Multimedia learning systems and its implementation for the subject advanced it skills N Zeqiri, A Luma 30th Jubilee International Convention MIPRO, 2007, 2007 | 6 | 2007 |
Determining the Optimal Number of Clusters using Silhouette Score as a Data Mining Technique. Y Januzaj, E Beqiri, A Luma International Journal of Online & Biomedical Engineering 19 (4), 2023 | 5 | 2023 |
Time Complexity Analysis for Cullis/Radic and Dodgson’s Generalized/Modified Method for Rectangular Determinants Calculations A Salihu, H Snopce, A Luma, J Ajdari International Jwenal of Computers and Their Applications 29 (4), 245-254, 2022 | 5 | 2022 |
A Systematic Literature Review on Using Blockchain Technology in Public Administration A Aliti, E Leka, A Luma, MA Trpkovska 2022 45th Jubilee International Convention on Information, Communication and …, 2022 | 5 | 2022 |
Comparision of maturity model frameworks in information security and their implementtation A Luma, B Abazi, B Selimi, M Hamiti Proceedings International Conf on Engineering Technologies (ICENTE'18), 102-104, 2018 | 5 | 2018 |
Asymmetric encryption/decryption with Pentor and ultra Pentor operators A Luma, B Raufi, X Zenuni TOJSAT 2 (2), 9-12, 2012 | 5 | 2012 |
Control systems, smart sensors, controller, elements in a control loop, Java Card and Security N Zeqiri, A Luma WSEAS Transactions on Systems and Control, 365-374, 2008 | 5 | 2008 |