Journal of Computer Science Research

Journal Information
EISSN : 2630-5151
Current Publisher: Bilingual Publishing Co. (10.30564)
Total articles ≅ 48
Filter:

Latest articles in this journal

Drakopoulos Vasileios
Journal of Computer Science Research, Volume 3; doi:10.30564/jcsr.v3i2.2777

Abstract:
In our day and age, the usage of computers as well as the Internet in combination with mobile devices is an integral part of our routine especially for adolescents and younger children. Thus, it puts forward a multitude of challenges and advances for educational institutions. The purpose of this article is to explore the current use of virtual reality in order to support teaching and learning along with presenting a teaching proposal concerning the utilization of CoSpace Edu software on the subject of Religious Affairs.
Loka Raj Ghimire, Roshan Chitrakar(Phd)
Journal of Computer Science Research, Volume 3; doi:10.30564/jcsr.v3i2.2922

Abstract:
Intrusion detection is the investigation process of information about the system activities or its data to detect any malicious behavior or unauthorized activity. Most of the IDS implements K-means clustering technique due to its linear complexity and fast computing ability. Nonetheless, it is Naïve use of the mean data value for the cluster core that presents a major drawback. The chances of two circular clusters having different radius and centering at the same mean the occur. This condition cannot be addressed by the K-means algorithm because the mean value of the various clusters is very similar together. However, if the clusters are not spherical, it fails. To overcome this issue, a new integrated hybrid model by integrating expectation maximizing (EM) clustering using Gaussian mixture model (GMM) and naïve Bays classifier have been proposed. In this model, GMM give more flexibility than K-Means in terms of cluster covariance. Also, they use probabilities function and soft clustering, that’s why they can have multiple cluster for a single data. In GMM, we can define the cluster form in GMM by two parameters: the mean and the standard deviation. This means that by using these two parameters, the cluster can take any kind of elliptical shape. EM-GMM will be used to cluster data based on data activity into the corresponding category.
Devasis Pradhan, A. Dash, Hla Myo Tun
Journal of Computer Science Research, Volume 3; doi:10.30564/jcsr.v3i2.2875

Abstract:
As the world pushes toward the utilization of greener innovation and limits energy squander, energy productivity in the remote organization has gotten more basic than any other time in recent memory. The cutting edge network, for example, 5G, are being intended to improve energy productivity and accordingly establish a basic part of the exploration and network planning. The 5G Green era required to convey a wide scope of administrations that incorporates upgraded versatile broadband, gigantic machine-type correspondence and ultra-dependability, and low inertness. Presently various difficulties and open doors for the plan of modern client affiliation instruments. Thus, considerable examination endeavours are committed to client relationship issues in HetNets, massive MIMO, mmWave, and energy harvesting. The paper further discussed the new security highlights including various innovations applied to 5G Green Communication, such as heterogeneous networks, gadget to-gadget interchanges or D2D Communication, enormous different info numerous yield, programming characterized networks, and the Internet of Things(IoT).
Nenad Zoran Tomić
Journal of Computer Science Research, Volume 3; doi:10.30564/jcsr.v3i2.2921

Abstract:
Consensus protocols are used for the distributed management of large databases in an environment without trust among participants. The choice of a specific protocol depends on the purpose and characteristics of the system itself. The subjects of the paper are consensus protocols in permissioned blockchains. The objective of this paper is to identify functional advantages and disadvantages of observed protocol. The analysis covers a total of six consensus protocols for permissioned blockchains. The following characteristics were compared: security, trust among participants, throughput and scalability. The results show that no protocol shows absolute dominance in all aspects of the comparison. Paxos and Raft are intended for systems in which there is no suspicion of unreliable users, but only the problem of a temporary shutdown. Practical Byzantine Fault Tolerance is intended for systems with a small number of nodes. Federated Byzantine Fault Tolerance shows better scalability and is more suitable for large systems, but can withstand a smaller number of malicious nodes. Proof-of-authority can withstand the largest number of malicious nodes without interfering with the functioning of the system. When choosing a consensus protocol for a blockchain application, one should take into account priority characteristics.
Zi Han Guo, Xiang He, Pei Yan Zou
Journal of Computer Science Research, Volume 3; doi:10.30564/jcsr.v3i2.2797

Abstract:
Online ballot box system has the advantages of high efficiency and environmental protection, but the existing network voting technology still has a lot of matter, almost all electronic voting system could be proved to be intrusion. The administrator of the system could tamper with the data for benefit, and the system may be attacked by hackers. The safety and fairness of the existing network voting system depend entirely on the safety and credibility of the website itself, but these cannot guarantee the fairness of voting. Make full use of blockchain technology, so that voting, even if there are malicious participants, but also to ensure the correctness and safety of the vote. The introduction of block chain technology, block chain has decentralized, data tampering and other characteristics.P2P network is applied in the block chain layer to construct a distributed database, digital signature algorithm and encryption technology are used to ensure that the data cannot be tampered with, consensus network algorithm is used to ensure the consistency of the data in the network, and timestamp technology is applied to save the data blocks in a chain structure connected end to end. It paper focuses on the implementation of P2P network networking mode, node block synchronization, data and block verification mechanism and consensus mechanism to ensure data consistency in the network layer of block chain layer. Using time stamp, Merkle tree, asymmetric encryption and other technologies to design data blocks and use chain structure to store data blocks. Combined with the characteristics of blockchain, a fair, fair and transparent voting system is constructed. Model aims to apply the block chain technology to the voting scenario and design a secure block chain voting architecture. It system is designed and developed based on the block chain system. It makes full use of its decentralization, removes the dependence of electronic voting on trusted third parties, and protects the privacy of voters and candidates. Data cannot be tampered with. Once the data is stored in the block chain, it cannot be tampered with. It provides a real and credible database.
Hla Myo Tun
Journal of Computer Science Research, Volume 3; doi:10.30564/jcsr.v3i1.2701

Abstract:
The paper mainly focuses on the network planning and optimization problem in the 5G telecommunication system based on the numerical investigation. There have been two portions of this work, such as network planning for efficient network models and optimization of power allocation in the 5G network. The radio network planning process has been completed based on a specific area. The data rate requirement can be solved by allowing the densification of the system by deploying small cells. The radio network planning scheme is the indispensable platform in arranging a wireless network that encounters convinced coverage method, capacity, and Quality of Service necessities. In this study, the eighty micro base stations and two-hundred mobile stations are deployed in the -15km×15km wide selected area in the Yangon downtown area. The optimization processes were also analyzed based on the source and destination nodes in the 5G network. The base stations' location is minimized and optimized in a selected geographical area with the linear programming technique and analyzed in this study.
Gajendra Sharma
Journal of Computer Science Research, Volume 3; doi:10.30564/jcsr.v3i1.2730

Abstract:
With the popularity of the Internet and improvement of information technology, digital information sharing increasingly becomes the trend. More and More universities pay attention to the digital campus, and the construction of digital library has become the focus of digital campus. A set of manageable, authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users. Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources, networks resources and so on very safely through a public network. It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms. It is to establish a virtual private network in Internet, so that the two long-distance network users can transmit data to each other in a dedicated network channel. Using this technology, multi-network campus can communicate securely in the unreliable public internet.
Jin Liu, Yiwen Zhang
Journal of Computer Science Research, Volume 3; doi:10.30564/jcsr.v3i1.2735

Abstract:
Web page has many redundancies, especially the dynamic html multimedia object. This paper proposes a novel method to employ the commonly used image elements on web pages. Due to the various types of image format and complexity of image contents and their position information, secret message bits could be coded to embed in these complex redundancies. Together with a specific covering code called average run-length-coding, the embedding efficiency could be reduced to a low level and the resulting capacity outperforms traditional content-based image steganography, which modifies the image data itself and causes a real image quality degradation. Our experiment result demonstrates that the proposed method has limited processing latency and high embedding capacity. What’s more, this method has a low algorithm complexity and less image quality distortion compared with existing steganography methods.
Sushil Shrestha, Manish Pokharel
Journal of Computer Science Research, Volume 3; doi:10.30564/jcsr.v3i1.2761

Abstract:
The use of Information and Communication Technology (ICT) in education has been rapidly growing in recent years which has converted conventional classrooms teaching environments into online learning (OL) environment. Online learning system is gaining popular and widely accepted in the world due to the current pandemic due to COVID 19. This has created an opportunity to take online classes through several online learning platforms. This research was also done during pandemic. The data were collected from one of the undergraduate courses where there were 108 learners. The objective of the study is to determine the learning style preferences based on the learner’s interactions data. one of the popular and widely used learning style model called Felder Silverman Learning Style Model (FSLSM) was implemented in this study to determine the learning preferences. The learners were classified according to the two dimensions i.e., input and processing of FSLSM. Further, two popular tree-based classifier such as decision tree and random forest were implemented. Decision tree had a better performance in terms of accuracy than random forest. This type of research is very much beneficial to the instructors, learners and researchers and administrators working in the field of online learning.
Binggong Chang
Journal of Computer Science Research, Volume 3; doi:10.30564/jcsr.v3i1.2780

Abstract:
The space-time ladder theory reveals that the formation of electronic tornadoes, or the formation of electronic dissipative structures, to be precise, the enhancement of electronic Energy Qi field is the basis of superconductivity. The surrounding area of the electronic tornado is expanding, which is the basis of the Meissner effect, and the center is contracting, which is the basis of the pinning force. When the attractive force of the Energy Qi field is greater than the Coulomb repulsive force, the electrons form a Cooper pair and release dark energy into virtual space-time. When the dark energy increases to a certain extent, the virtual space-time frees the Cooper pair and forms an electron-virtual space-time wave, which fluctuates freely in the superconducting material, which is the basis for the superconducting resistance to be zero. This is similar to the principle of a hot air balloon. The virtual space-time is hot air and the electron pair is a hot air balloon device. Conductor electrons are free and easy to emit dark energy, resulting in insufficient dark energy, and it is not easy to form electron-pair virtual space-time waves, so the superconducting critical temperature is very low. This is because the emission coefficient of the conductor is too high. Insulator electrons are not easy to emit dark energy and easily form electron-pair virtual space-time waves. Therefore, the superconducting critical temperature is slightly higher because of the low emission coefficient of the insulator. The solution of the Qi-space-time wave equation, that is, the coherence coefficient, is an important factor in superconductivity. In addition, the conditions under which tornadoes form are also an important basis for superconductivity. Finally, it is emphasized that the coherence coefficient and prevention of dark energy emission are the two most important elements for preparing superconducting materials.
Back to Top Top