Full Issue

View or download the full issue PDF

Table of Contents


Zihan Guo, Xiang He, Peiyan Zou

Article ID: 2797
Views - 310  (Abstract) PDF - 55  (Download)
Abstract: Online ballot box system has the advantages of high efficiency and environmental protection, but the existing network voting technology still has a lot of matter. Almost all electronic voting system could be proved to be intrusion. The administrator of the system could tamper with the data for benefit, and the system may be attacked by hac...
Loka Raj Ghimire, Roshan Chitrakar

Article ID: 2922
Views - 485  (Abstract) PDF - 46  (Download)
Abstract:Intrusion detection is the investigation process of information about the system activities or its data to detect any malicious behavior or unauthorized activity. Most of the IDS implement K-means clustering technique due to its linear complexity and fast computing ability. Nonetheless, it is Naïve use of the mean data value for the cluster core that present...
Phyo Sandar Win, Hsu Myat Tin Swe, Hla Myo Tun

Article ID: 3139
Views - 202  (Abstract) PDF - 35  (Download)
Abstract: The research problem in this study is the longitudinal optical phonon energy on metal/semiconductor interface for high performance semiconductor device. The research solution is to make the software model with finite difference time domain (FDTD) solution for transmission and reflection pulse between metal and semiconductor interface for c...


Vasileios Drakopoulos, Panagiotis-Vlasios Sioulas

Article ID: 2777
Views - 322  (Abstract) PDF - 58  (Download)
Abstract:In this day and age, the usage of computers as well as Internet combined with mobile devices is an integral part of our routine especially for adolescents and younger children. Thus, it puts forward a multitude of challenges and advances for educational institutions. The purpose of this article is to explore the current use of virtual reality in order to sup...
Nenad Zoran Tomić

Article ID: 2921
Views - 368  (Abstract) PDF - 49  (Download)
Abstract: Consensus protocols are used for the distributed management of large databases in an environment without trust among participants. The choice of a specific protocol depends on the purpose and characteristics of the system itself. The subjects of the paper are consensus protocols in permissioned blockchains. The objective of this paper is t...