View Vol. 3 ,  Iss. 2 (April 2021)

Journal of Computer Science Research

ISSN: 2630-5151 (Online)

Vol. 3 , Iss. 2 (April 2021)

Articles

  • Voting System Based on Blockchain

    Zihan Guo, Xiang He, Peiyan Zou
    27-38

    Article ID: 2797
    575  (Abstract) 66  (Download)

    Online ballot box system has the advantages of high efficiency and environmental protection, but the existing network voting technology still has a lot of matter. Almost all electronic voting system could be proved to be intrusion. The administrator of the system could tamper with the data for benefit, and the system may be attacked...

  • Integration of Expectation Maximization using Gaussian Mixture Models and Naïve Bayes for Intrusion Detection

    Loka Raj Ghimire, Roshan Chitrakar
    1-10

    Article ID: 2922
    732  (Abstract) 49  (Download)
    Intrusion detection is the investigation process of information about the system activities or its data to detect any malicious behavior or unauthorized activity. Most of the IDS implement K-means clustering technique due to its linear complexity and fast computing ability. Nonetheless, it is Naïve use of the mean data value for the cluster core that...
  • Computerized FDTD Method for Longitudinal Optical Phonon Energy on Semiconductor Hybrid Structure for High Power Devices Fabrication

    Phyo Sandar Win, Hsu Myat Tin Swe, Hla Myo Tun
    39-51

    Article ID: 3139
    452  (Abstract) 49  (Download)

    The research problem in this study is the longitudinal optical phonon energy on metal/semiconductor interface for high performance semiconductor device. The research solution is to make the software model with finite difference time domain (FDTD) solution for transmission and reflection pulse between metal and semiconductor interface for carrier dynamics effects. The objective of this...

Reviews

  • Enhancing Primary School Teaching through Virtual Reality

    Vasileios Drakopoulos, Panagiotis-Vlasios Sioulas
    11-18

    Article ID: 2777
    602  (Abstract) 72  (Download)
    In this day and age, the usage of computers as well as Internet combined with mobile devices is an integral part of our routine especially for adolescents and younger children. Thus, it puts forward a multitude of challenges and advances for educational institutions. The purpose of this article is to explore the current use of...
  • A Review of Consensus Protocols in Permissioned Blockchains

    Nenad Zoran Tomić
    19-26

    Article ID: 2921
    742  (Abstract) 56  (Download)

    Consensus protocols are used for the distributed management of large databases in an environment without trust among participants. The choice of a specific protocol depends on the purpose and characteristics of the system itself. The subjects of the paper are consensus protocols in permissioned blockchains. The objective of this paper is to identify functional...