11 results on '"Mollakuqe, Elissa"'
Search Results
2. Mathematical Foundations and Implementation of CONIKS Key Transparency.
- Author
-
Mollakuqe, Elissa, Dag, Hasan, and Dimitrova, Vesna
- Subjects
TIME complexity ,TELECOMMUNICATION systems ,SYSTEMS design ,COMPUTATIONAL complexity ,MATHEMATICAL analysis - Abstract
This research paper explores the CONIKS key management system's security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. We conducted a comprehensive analysis of the underlying mathematical principles, focusing on cryptographic hash functions and digital signature schemes, and their implementation in the CONIKS model. Through the use of Merkle trees, we verified the integrity of the system, while zero-knowledge proofs were utilized to ensure the confidentiality of key bindings. We conducted experimental evaluations to measure the performance of cryptographic operations like key generation, signing, and verification with varying key sizes and compared the results against theoretical expectations. Our findings demonstrate that the system performs as predicted by cryptographic theory, with only minor deviations in computational time complexities. The analysis also reveals significant trade-offs between security and efficiency, particularly when larger key sizes are used. These results confirm that the CONIKS system offers a robust framework for secure and efficient key management, highlighting its potential for real-world applications in secure communication systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Morphological Tagging and Lemmatization in the Albanian Language
- Author
-
Mati Diellza Nagavci, Hamiti Mentor, and Mollakuqe Elissa
- Subjects
part of speech tagging ,albanian language ,natural language processing ,lemmatization ,corpora ,Law ,Political science (General) ,JA1-92 - Abstract
An important element of Natural Language Processing is parts of speech tagging. With fine-grained word-class annotations, the word forms in a text can be enhanced and can also be used in downstream processes, such as dependency parsing. The improved search options that tagged data offers also greatly benefit linguists and lexicographers. Natural language processing research is becoming increasingly popular and important as unsupervised learning methods are developed. There are some aspects of the Albanian language that make the creation of a part-of-speech tag set challenging.
- Published
- 2021
- Full Text
- View/download PDF
4. Classification of Finite Groupoids of Order 3 by Using Image Patterns
- Author
-
Mollakuqe, Elissa, primary, Markovski, Smile, additional, and Dimitrova, Vesna, additional
- Published
- 2021
- Full Text
- View/download PDF
5. Classification and Analysis of Cyberattacks in the Western Balkans Countries - with a focus on the treatment of policy violations and strategies that states use to protect against attacks
- Author
-
Mollakuqe, Elissa, primary and Dimitrova, Vesna, additional
- Published
- 2023
- Full Text
- View/download PDF
6. Pedagogical Conditions for the Training of Future Teachers Based on Digital Educational Technologies.
- Author
-
Baltynova, Aizhan, Kamariyash, Kalkeeva, Muzdbaeva, Tolkyn, Bolat, Yerzhan, Beleukhanova, Korlan, Zharikova, Didar, and Mollakuqe, Elissa
- Subjects
DIGITAL technology ,TEACHER training ,STUDENT teachers ,RESEARCH personnel ,DESCRIPTIVE statistics ,SEMI-structured interviews - Abstract
This study aimed to assess the pedagogical frameworks for developing future teachers using digital education technology. The mixed-methods design, which combines quantitative and qualitative approaches, was employed to develop this study. Three hundred seventeen teacher candidates who are enrolled at several universities in Kazakhstan make up the research team. The researchers created a semi-structured interview form and an attitude scale toward digital technology in order to gather research data. The data was determined to be regularly distributed. Therefore, descriptive statistics, the T-test, and one-factor analysis of variance (ANOVA) tests were employed to assess them. The descriptive analysis method was applied to study the research's qualitative data. The study's findings showed that most pre-service teachers who took part in it thought that teacher training programs based on digital technology had adequate pedagogical conditions. Based on its results, the study offers recommendations. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. BIG DATA ANALYSIS TECHNIQUES OVER ATTACKS IN TOURISM INDUSTRY DURING A PANDEMIC CORONAVIRUS COVID 19.
- Author
-
Mollakuqe, Elissa and Maçani, Fitim
- Subjects
BIG data ,DATA analysis ,COMPUTER crimes ,CRYPTOGRAPHY ,TOURISM ,GROSS domestic product - Abstract
A long time ago, data was written, stored, and processed within a computer without the need to think about security in many respects. But the era of big data and data security now includes the era of data threats and cybercrime. Cryptography is created as a tool to keep the privacy of information that people or computers send to each other, even if it is present to another person on the communication channel. The main purpose of cryptography is providing privacy, while the main aspects are: confidentiality, integrity, and authentication as well. On the other hand, we have Tourism as a big business - where according to estimates by the World Tourism Organization it accounts for 10% of world GDP. The propose of research is to explain Tourism as an industry that uses BIG DATA, through which it can effectively offer personalized offers, tailored to the interests and needs of potential customers. BIG DATA is used to present a very large set of data that has been mined and analyzed to find patterns and behavioral trends. From, the point of view of internet data security, BIG DATA has used new opportunities in terms of security analysis and solutions to protect data as well as prevent future cyber attacks. And that offers more opportunities and risks for most businesses. Threats are in many business areas, including e-marketing, sales, ecommerce, multimedia, medicine, finance, and more. Whatever the current age, almost all aspects of human life are threatening. Therefore, it is imperative to protect user-information from harmful activities such as risks. Risk can become: from inside or outside. Outside risks - until recently, the only way to endanger the security of any organization, enterprise, has been to physically interfere and destroy the system. But now this is not the case. For hackers, it is easier and safer for the hacker to attempt to interfere with the system or through Remote Access Service (RAS) or via the Internet. Inside risks - Usually come from employees of the company, the organization, who may be malicious, unaware, or who make unintentional mistakes. Therefore, the security of the system is endangered by the misuse of rights with purpose and by ignorance or stupidity. These threats were further exacerbated during the COVID 19 coronavirus pandemic period - where many businesses switched to providing high-speed Internet service. So how can we protect our data from threats or other cybercrime? Or, how can we implement big data on cybersecurity techniques or tools are represented in this paper? But cybercrime management is also a challenge in the tourism industry. [ABSTRACT FROM AUTHOR]
- Published
- 2020
8. Statistical analyses of same content texts written in different languages
- Author
-
Hamiti, Mentor, primary, Mollakuqe, Elissa, additional, Rahmani, Asmir, additional, and Muhaxhiri, Florinda, additional
- Published
- 2017
- Full Text
- View/download PDF
9. LTP-BASED VALIDATION OF A MODIFIED LINUX REAL-TIME ENVIRONMENT.
- Author
-
Susuri, Arsim, Hamiti, Mentor, Apostolova, Marika, and Mollakuqe, Elissa
- Subjects
LINUX operating systems ,TEST systems - Abstract
The purpose of this paper is to validate the real-time system in the Linux-RTAI/LXRT environment, in the presence of hardware and software faults. Due to the simplicity of creating and injecting faults, the method of SoftWare Implemented Fault Injection (SWIFI) is selected. With this mode of fault injection, a tested system can emulate real conditions, in which it is required to function. The Linux operating system has been modified with an RTAI/LXRT patch in order to gain real-time system functionality. The purpose of using this test framework has been to carry out a comprehensive verification of the system tested under stress conditions and the presence of errors (hardware or software). Linux Test Project (LTP) testing framework was used. Subsequently, modification of the respective parts of the operating system was made to enable the injection of faults. The overall results have confirmed the robustness of the RTAI/LXRT system, despite the presence of faults. [ABSTRACT FROM AUTHOR]
- Published
- 2019
10. Algorithm for Key Transparency with Transparent Logs.
- Author
-
Mollakuqe E, Rexhepi S, Bunjaku R, Dag H, and Chukwu IJ
- Abstract
Background: Cryptography plays a crucial role in securing digital communications and data storage. This study evaluates the Transparent Key Management Algorithm utilizing Merkle trees, focusing on its performance and security effectiveness in cryptographic key handling., Methods: The research employs simulated experiments to systematically measure and analyze key operational metrics such as insertion and verification times. Synthetic datasets are used to mimic diverse operational conditions, ensuring rigorous evaluation under varying workloads and security threats. Implementation is carried out using R programming, integrating cryptographic functions and Merkle tree structures for integrity verification., Results: Performance analysis reveals efficient insertion and verification times under normal conditions, essential for operational workflows. Security evaluations demonstrate the algorithm's robustness against tampering, with approximately 95% of keys verified successfully and effective detection of unauthorized modifications. Simulated attack scenarios underscore its resilience in mitigating security threats., Conclusions: The Transparent Key Management Algorithm, enhanced by Merkle trees and cryptographic hashing techniques, proves effective in ensuring data integrity, security, and operational efficiency. Recommendations include continuous monitoring and adaptive algorithms to bolster resilience against evolving cybersecurity challenges, promoting trust and reliability in cryptographic operations., Competing Interests: No competing interests were disclosed., (Copyright: © 2024 Mollakuqe E et al.)
- Published
- 2024
- Full Text
- View/download PDF
11. Comparative analysis of identity management, access control, and authorization practices in public and private universities.
- Author
-
Mollakuqe E and Dimitrova V
- Abstract
Background: This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities. Identity management involves the meticulous management and control of user identities, encompassing the establishment and maintenance of user profiles, role assignments, and access privileges. Access control is the practice of defining and enforcing policies that govern who can access an IT system or application and which resources they can interact with. Authorization, meanwhile, determines the specific actions and privileges granted to users based on their roles and permissions., Methods: To understand the variances in identity management and access control approaches, we conducted a comparative analysis between public and private universities. Our investigation scrutinized the user populations with access to university systems, the enforcement of access limitations, authentication methods, and password policies. Additionally, we examined the nuances of authorization processes, levels of authorization, access approval authorities, user status and role changes, unique user account management, account deletion procedures, user authentication methods, password complexity and expiration policies, password storage methods, and session termination policies., Results: This study revealed that both public and private universities prioritize these security measures, with a common categorization of these processes. Nevertheless, there exist disparities, such as the inclusion of contractors and vendors in the user population at private universities, the manual deletion of user accounts in private institutions, and variations in password policies and storage methods. Private universities tend to enforce stricter password policies, employ more secure password storage methods, and implement automatic session termination features., Conclusions: This research provides valuable insights into the practices and approaches adopted by public and private universities to safeguard their digital environments. The findings serve as a valuable resource for enhancing identity management, access control, and authorization protocols, enabling institutions to fortify their cybersecurity defenses in an ever-evolving threat landscape., Competing Interests: No competing interests were disclosed., (Copyright: © 2024 Mollakuqe E and Dimitrova V.)
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.