Bujar Raufi

Bujar Raufi
Technological University Dublin - City Campus | TU Dublin · School of Computing

Doctor of Philosophy

About

65
Publications
43,799
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
295
Citations
Citations since 2016
32 Research Items
235 Citations
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050
Introduction
Bujar Raufi currently is engaged as a post-doctoral research fellow at Technological University Dublin (TUD), Dublin Ireland. Bujar does research in Human Mental Workload in Adaptive User Interfaces, Physiological measurements of human performance in computer interfaces. Its current project is 'Enabling Human Mental Workload in User Modelling for PersOnalized Web ExpeRiences (EMPOWER)'. The project addresses this issue of user aims to address this issue of user’s engagement with Interfaces.
Additional affiliations
February 2021 - December 2021
Technological University Dublin - City Campus
Position
  • Researcher
Description
  • Post Doctoral Fellow at TU Dublin within Marie Curie Fellowship financed by EU and Enterprise Ireland as part of CareerFIT programme.
September 2003 - present
South East European University
Position
  • Professor (Assistant)
September 2003 - October 2017
South East European University
Position
  • Professor (Associate)
Education
September 2006 - September 2011
Technical University of Sofia
Field of study
  • Computer Systems, Complexes and Networks.
September 2004 - November 2005
New Bulgarian University
Field of study
  • Internet Software Technologies
February 2001 - November 2003
South Eastern European University
Field of study
  • Computer Science

Publications

Publications (65)
Article
One of the essential components of Recommender Systems in Software Engineering is a static analysis that is answerable for producing recommendations for users. There are different techniques for how static analysis is carried out in recommender systems. This paper drafts a technique for the creation of recommendations using Cosine Similarity. Evalu...
Article
Full-text available
Many research works indicate that EEG bands, specifically the alpha and theta bands, have been potentially helpful cognitive load indicators. However, minimal research exists to validate this claim. This study aims to assess and analyze the impact of the alpha-to-theta and the theta-to-alpha band ratios on supporting the creation of models capable...
Article
Recommender Systems are software tools that can assist developers with a wide range of activities, from reusing codes to suggest developers what to do during development of these systems. This paper outlines an approach to generating recommendation using SQL Semantic Search. Performance measurement of this recommender system is conducted by calcula...
Preprint
Full-text available
Many research works indicate that EEG bands, specifically the alpha and theta bands, have been potentially helpful cognitive load indicators. However, minimal research exists to validate this claim. This study aims to assess and analyze the impact of the alpha-to-theta and the theta-to-alpha band ratios on supporting the creation of models capable...
Conference Paper
As quoted recently, this is the age of information, and for information we need data. Data is everywhere around us and it is expanding dramatically. The aim of this research is to inspect and summarize the state-of-the-art approaches and studies of machine learning methods to causal inference techniques. This review utilizes a systematic literature...
Article
Full-text available
In the last decade, there has been paradigm shift on causal reasoning, the discovery of causal relationships between variables and its potential to help understand and solve different complex real-life problems. The aim of this paper is to present a systematic review of relevant studies related to causal reasoning, with emphasis on smart agricultur...
Chapter
Mental Workload (MWL) represents a key concept in human performance. It is a complex construct that can be viewed from multiple perspectives and affected by various factors that are quantified by different collection of methods. In this direction, several approaches exist that aggregate these factors towards building a unique workload index that be...
Article
Full-text available
Web personalization is a process that utilizes a set of methods, techniques, and actions for adapting the linking structure of an information space or its content or both to user interaction preferences. The aim of personalization is to enhance the user experience by retrieving relevant resources and presenting them in a meaningful fashion. The adv...
Conference Paper
Full-text available
In this paper, we describe the Machine Learning methods for Natural Language Processing tasks used in low-resource languages such as the Albanian language. The Albanian language belongs to the family of Indo-European languages. It can be inferred as being one of the oldest languages, consequently, different from the others. The aim of this paper is...
Conference Paper
Full-text available
The proliferation of data through various platforms and applications is in constant increase. The versatility of data and its omnipresence makes it very hard to detect the trustworthiness and intention of the source. This is very evident in dynamic environments such as mobile applications. As a result, designing mobile applications that will monito...
Article
Full-text available
Technology plays a very important role in virtually all areas, and has become an inseparable part of the industry. Currently, industry and technology are at a high point of development and research, but there is an ever increasing gap between the market needs and the skills that universities deliver to students. There is an increasing need for cons...
Article
Full-text available
The development of Information Technology has generated large amount of data in various areas. Organizations are deploying different analytic techniques to evaluate rich data sources in order to extract useful information within the data and utilize this in further decision making. In this paper the different approaches to IS development as well as...
Conference Paper
Full-text available
The development of Information Technology has generated large amount of data in various areas. Organizations are deploying different analytic techniques to evaluate rich data sources in order to extract useful information within the data and utilize this in further decision making. In this paper the different approaches to IS development as well as...
Conference Paper
Full-text available
Access to web content continues to be a challenge for the visually impaired, as the needs of such community are very diverse. The access is further hindered by the fact that designers continue to build websites non-compliant with Web Content Accessibility Guidelines (WCAG). To better understand the needs of the visually impaired community, three wo...
Conference Paper
Full-text available
The expansion and ever evolving web makes it difficult to find relevant information that best fits user's intentions. This paper introduces development of hybrid approach that addresses the issue of collecting large knowledgebase by fusing the thematic or focused crawling methodologies, with adaptive and semantic web concepts. Focused crawling ensu...
Conference Paper
Requirements gathering are an important aspect of application development, especially when users are people with special needs. Traditionally, this process is being conducted using conventional methods, such as interviews, workshops and questionnaires. These approaches, however, are unable to grasp the full context when collecting data from the com...
Article
Full-text available
In today's growing of enterprise data, in order to make a full use of the capabilities of hardware, increasing application performance, reducing cost of ownership and enabling new scenarios that were not possible before such as are today's developed in-memory data platforms is essential. In this paper, an in-depth analysis of benefits and features...
Article
Full-text available
The world of Internet as such is open and insecure by nature. Companies and organizations exploit enormous possibilities that internet offers to build computer systems to enable communication and data sharing capabilities within their corporate platforms. In doing so, they continuously strive towards providing a fast, efficient and at the same time...
Article
Full-text available
The ultimate goal to improve healthcare practices and the development of better biomedical products largely depends on the ability to share and link the wealth of collected medical data. The key challenge to pursue this ambitious objective is not only enabling the integration of the data spanning heterogeneous data sources and formats, but in the d...
Article
Full-text available
Massive volumes of information shared on the web together with linked open data initiatives and exabytes of data generated through social networks frequently disorientates and confuses web users in their everyday interaction. Additionally, web users constitute a highly heterogeneous entities with different needs and requirements. Considering this,...
Conference Paper
Full-text available
In recent years, a substantial shift from the web of documents to the paradigm of web of data is witnessed. This is seen from the proliferation of massive semantic repositories such as Linked Open Data. Recommending and adapting resources over these repositories however, still represents a research challenge in the sense of relevant data aggregatio...
Conference Paper
Full-text available
At the time when we are debating the Internet as a human right, an access to basic online information is a challenge for blind and visually impaired community. Steps taken for their digital inclusion, such as, the Web Content Accessibility Guidelines (WCAG) are often insufficient. In this paper we present initial requirements gathered during three...
Article
Full-text available
Storage and file synchronisation is a common and important service provided by contemporary cloud providers and a new standard for file sharing and information storage among companies and individuals. However, choosing the right storage provider depends on many factors. This paper defines a set of important criteria to evaluate cloud storage provid...
Article
Full-text available
This paper investigates the possibility of extending web resource linkings with other linking methodologies besides the unidirectional one. The process of interlinking web resources nowadays is done through hypertext references which allow only unidirectional coupling. We explore the extension of the linking process in the web of data through the u...
Article
Full-text available
This paper investigates the possibility of extending web resource linkings with other linking methodologies besides the unidirectional one. The process of interlinking web resources nowadays is done through hypertext references which allow only unidirectional coupling. We explore the extension of the linking process in the web of data through the u...
Conference Paper
Full-text available
Most of today's web applications represent pure casts of (X)HTML tags organized as documents. The linking process between such documents is done solely through hypertext references which allow only unidirectional linking. In this paper, an extension of the linking process in the web of data is presented with the use of XML Linking Technologies (XLi...
Book
Development and Implementation of Adaptive Web-Based Systems is not a straightforward and trivial task and requires involvement of many disciplines and research areas. In this dissertation, the issues of complexity in such systems, as well as proposal of a new framework in developing and implementing of Adaptive Web-Based Systems are addressed. The...
Conference Paper
Full-text available
Electronic banking must be secure and easy to use and many banks heavily advertise an apparent of 100% secure system which is contestable in many points. In this work, an alternative approach to the design of e-banking system, through a new solution for user authentication and security with digital certificate called LumaCert is introduced. The cer...
Chapter
Full-text available
User authentication and identification have always represented a challenge in web-based e-mail systems. The text-based authentication and user identification are not sufficient to address the security issues facing web-based e-mail systems. This sort of security is completely retrograde and obsolete for current security threats that easily undermin...
Conference Paper
Full-text available
The principles of the WWW used today rely solely on links and on content presented through simple HTML tags. The drawback of the above mentioned modus operandi is that it is purely syntactic with no clear emphasis on meaning about data. The Semantic Web approach tries to bridge that gap by providing additional information, mainly conceptual to the...
Article
Full-text available
The principles of the WWW used today rely solely on links and on content presented through simple HTML tags. The drawback of the above mentioned modus operandi is that it is purely syntactic with no clear emphasis on meaning about data. The Semantic Web approach tries to bridge that gap by providing additional information, mainly conceptual to the...
Article
Full-text available
Finding new approaches for asymmetric encryption / decryption process represents a milestone in cryptographic research and development. In this paper we introduce new algorithm for asymmetric encryption by utilizing two mathematical operators called Pentors and Ultra Pentors. The public and private key in this algorithm represent a quadruple of par...
Conference Paper
Full-text available
Finding new approaches for asymmetric encryption / decryption process represents a milestone in cryptographic research and development. In this paper we introduce new algorithm for asymmetric encryption by utilizing two mathematical operators called Pentors and Ultra Pentors. The public and private key in this algorithm represent a quadruple of par...
Conference Paper
Full-text available
The principles of the WWW used today rely solely on links and on content presented through simple HTML tags. The drawback of the above mentioned modus operandi is that it is purely syntactic with no clear emphasis on meaning about data. The Semantic Web approach tries to bridge that gap by providing additional information, mainly conceptual to the...
Thesis
Development and Implementation of Adaptive Web-Based Systems is not a straightforward and trivial task and requires involvement of many disciplines and research areas. In this dissertation, the issues of complexity in such systems, as well as proposal of a new framework in developing and implementing of Adaptive Web-Based Systems are addressed. The...
Conference Paper
Full-text available
This paper addresses the issue of implementation and evaluation of adaptation algorithm for Adaptive Web-Based Systems. The proposed architectural model of the system is consisted of two logical modes: Online and Offline mode, whilst the evaluation of the adaptation algorithm is done by using two criteria. The first one is measuring the performance...
Conference Paper
Full-text available
The paper gives an insight of the work done so far in modelling and implementation of user adapted software systems or adaptive web sites. We introduce a five layer framework which gives to our adaptive web based system flexibility, expressiveness, modularity and interoperability. The work so far has been concentrated in the first four layers of th...
Conference Paper
Full-text available
Traditional approaches on attacking adaptation issue in adaptive web based systems are very complex seen from the perspective of their design and development. The lack of effective general purpose adaptation algorithm for adaptive web sites renders it applicable only in isolated cases like virtual education or e-commerce. In this work, an algorith...
Conference Paper
Full-text available
Many traditional adaptive web based systems today are complex in its design and implementation which makes them hard to implement in general purpose web sites. The lack of efficient approach and adaptation algorithm makes their usage in isolated cases like: e-commerce sites or only education systems. In this paper we introduce a new adaptation algor...
Conference Paper
Full-text available
Identification whether a certain number belongs to either Fibonacci or Lucas sequence is computationally intense task in the sense that the sequence itself need to be written from the beginning until the requested number. In this paper we present a method of detecting whether a certain number is of Lucas or Fibonacci sequence as well as introduce r...
Article
Full-text available
The increasing number of available web services necessitates new ways for efficient Web service discovery. In this paper we follow up our previous work of proposing new framework for efficient web service discovery by combining the growing hierarchical self-organizing map (GHSOM), a powerful data mining technique for the clustering and visualizatio...
Conference Paper
Full-text available
Efficiently finding Web services on the Web is a challenge research question in service oriented architecture-SOA. Web services are becoming necessary part of the semantic Web, and research on semantic Web services aims to automate their use. However, finding the adequate service for each individual user becomes a more and more demanding problem. I...
Conference Paper
Full-text available
The web pages of today strive to think out of the box by creating different look-and-feel for each particular user. Most of them still are a pure cast of HTML tags, however some web applications tend to organize their structure and content based on user access patterns. These systems are known as Adaptive web based systems. In this paper we present...
Conference Paper
Full-text available
Most of the encryption algorithms used today generate huge cipher messages as well as long encryption keys. These approaches require time and are computationally intensive. In this paper we introduce two operators, represented as mathematical models called Pentor and Ultra Pentor. These operators can be easily generated out of any number and can be...
Conference Paper
Creating a presentation for the web that drastically differs from standard ones is still a challenge and represents a milestone for many research groups. Virtual university campuses together with virtual learning represent one of these challenges, because it fuses in-place learning with Virtual Learning or education. In this paper we present the i...
Conference Paper
Full-text available
Adaptive web based systems tend to arrange its content and internal structure based on user access patterns. A myriad of approaches and frameworks have been presented recent years, however many of them bypass an important component of such systems which is the data itself. In this paper we propose a new, top-down five layer framework for adaptive w...