Asian Journal of Computer Science Engineering(AJCSE) 2022-11-01T05:40:17+00:00 Prof. M A Naidu Open Journal Systems <p style="text-align: justify;">Asian Journal of Computer Science Engineering(AJCSE) is an international Referred and Peer Reviewed Online Journal with E-ISSN: 2581-3781 published by B.R. Nahata Smriti Sansthan for the enhancement of Computer Science Theory, Methods and Tools, Computer and Communications Networks and Systems, Computational Intelligence, Machine Learning and Data Analytics, Security in Computer Systems and Networks, Hardware Design discipline. </p> <p style="text-align: justify;">AJCSE is an Open Access Online Journal that publishes full-length papers, reviews and short communications exploring and to promote diverse and integrated areas of Computer Science Theory, Methods and Tools, Computer and Communications Networks and Systems, Computational Intelligence, Machine Learning and Data Analytics, Security in Computer Systems and Networks, Hardware Design and covers all engineering subject areas. AJCSE is steered by a distinguished Board of Editors. To maintain a high-quality journal, manuscripts that appear in the AJCSE Articles section have been subjected to a rigorous review process.</p> <p><strong>SUBJECT CATEGORY </strong></p> <p>Papers reporting original research and innovative applications from all parts of the world are welcome.</p> <p>Subject areas suitable for publication include, but are not limited to the following fields:</p> <p style="text-align: justify;">Computer Science Theory, Methods and Tools, Software engineering, algorithms and complexity, computational logic, formal methods, heuristics, mathematics and models of computation, programming languages and semantics.</p> <p><strong>Computer and Communications Networks and Systems</strong></p> <p>Network and distributed architectures and protocols, traffic engineering, resource management and Quality of Service, network monitoring and traffic measurements, wireless networks, personal and body area networks, vehicular networks, content and service-centric networking, multimedia communications and standards, energy efficient/green networks, opportunistic and cognitive networks.</p> <p><strong>Computational Intelligence, Machine Learning and Data Analytics</strong></p> <p>Human computer interaction, computational science, pattern recognition, computer vision, speech processing, machine intelligence and reasoning, web science, databases, information retrieval, visualisation, current applications domains, e.g. Healthcare and BioInformatics, and emerging application domains, e.g. big data.</p> <p><strong>Security in Computer Systems and Networks</strong></p> <p>Computer systems security, hardware and embedded systems security, security protocol design and analysis, cryptography and cryptanalysis, intrusion detection systems and techniques, user authentication techniques and systems.</p> <p><strong>Hardware Design</strong></p> <p>Computer architectures, parallel architectures, operating systems and signal processing. Some more related subject fields as follows:</p> <p> </p> <ul> <li>Artificial intelligence (AI)</li> <li>Cognitive science</li> <li>Computer engineering</li> <li>Computer information systems (CIS)</li> <li>Computer graphics</li> <li>Computer programming</li> <li>Computer networks</li> <li>Computer servicing technology</li> <li>Data processing</li> <li>Database systems</li> <li>Information science</li> <li>Knowledge engineering/expert systems</li> <li>Management information systems (MIS)</li> <li>Neural network</li> <li>Robotics</li> <li>Software engineering</li> <li>Systems analysis</li> <li>Telecommunications engineering</li> <li>Computer Science in Modeling</li> <li>Computer Architecture</li> <li>Computation and Language</li> <li>Computational Complexity</li> <li>Computational Engineering, Finance, and Science</li> <li>Computational Geometry</li> <li>Computer Science and Game Theory</li> <li>Computer Vision and Pattern Recognition</li> <li>Computers and Society</li> <li>Cryptography and Security</li> <li>Data and Web Mining</li> <li>Data Structures and Algorithms</li> <li>Databases</li> <li>Digital Libraries</li> <li>Discrete Mathematics</li> <li>Logic in Computer Science</li> <li>Mathematical Software</li> <li>Multimedia</li> <li>Networking and Internet Architecture</li> <li>Neural and Evolutionary Computing</li> <li>Numerical Analysis</li> <li>Operating Systems</li> <li>Performance</li> <li>Programming Languages</li> <li>Robotics</li> <li>Software Engineering</li> <li>Symbolic Computation</li> <li>Cover all Engineering related subject areas</li> </ul> <p> </p> <p><strong><u>JOURNAL PARTICULARS</u></strong></p> <table> <tbody> <tr> <td width="225"> <p>Title</p> </td> <td width="414"> <p>Asian Journal of Computer Science Engineering</p> </td> </tr> <tr> <td width="225"> <p>Frequency</p> </td> <td width="414"> <p>Quarterly</p> </td> </tr> <tr> <td width="225"> <p>E- ISSN</p> </td> <td width="414"> <p>2581-3781</p> </td> </tr> <tr> <td width="225"> <p>P-ISSN</p> </td> <td width="414"> <p>-</p> </td> </tr> <tr> <td width="225"> <p>DOI</p> </td> <td width="414"> <p><strong></strong></p> </td> </tr> <tr> <td width="225"> <p>Publisher</p> </td> <td width="414"> <p><strong>Mr. Rahul Nahata</strong>, B.R. Nahata College of Pharmacy, Mhow-Neemuch Road, Mandsaur-458001, Madhya Pradesh</p> </td> </tr> <tr> <td width="225"> <p>Chief Editor</p> </td> <td width="414"> <p>Dr. M.A. Naidu</p> </td> </tr> <tr> <td width="225"> <p>Starting Year</p> </td> <td width="414"> <p>2016</p> </td> </tr> <tr> <td width="225"> <p>Subject</p> </td> <td width="414"> <p>Computer Science and Engineering subjects</p> </td> </tr> <tr> <td width="225"> <p>Language</p> </td> <td width="414"> <p>English Language</p> </td> </tr> <tr> <td width="225"> <p>Publication Format</p> </td> <td width="414"> <p>Online</p> </td> </tr> <tr> <td width="225"> <p>Email Id</p> </td> <td width="414"> <p>,</p> </td> </tr> <tr> <td width="225"> <p>Mobile No.</p> </td> <td width="414"> <p>+91-7049737901</p> </td> </tr> <tr> <td width="225"> <p>Website</p> </td> <td width="414"> <p></p> </td> </tr> <tr> <td width="225"> <p>Address</p> </td> <td width="414"> <p>B.R. Nahata Smriti Sansthan, BRNSS PUBLICATION HUB, B.R. Nahata College of Pharmacy, Mhow-Neemuch Road, Mandsaur-458001, Madhya Pradesh</p> </td> </tr> </tbody> </table> <p> </p> A Comprehensive Study on Outlier Detection in Data Mining 2022-07-20T05:10:17+00:00 Deepti Mishra <p>The paper presents a survey on the literature of outliers and data mining. The prime focus of the paper is to deliver an outline of outlier with various approaches for its detection. Outliers are the data points which are partially or totally diverge from the residue data set. They can be considered as those data objects which cannot be fitted in any cluster. Outliers can be different from its neighboring data points only or from complete data set. It is a necessary task to identify and detect outliers from the dataset as their presence effect the preciseness of the outcome. Outliers can exist in any kind of data varies from low-dimensional to high-dimensional data set. The detection of an outlier requires some precise mathematical calculations, appropriate domain knowledge, and statistical calculations which are presented in the paper. The paper presents, the significant characteristics of the outliers.</p> 2022-03-15T00:00:00+00:00 Copyright (c) 2022 Design and Implementation of Smart Environmental Air Pollution Monitoring System (SEAPMS) based on IoT 2022-07-20T05:11:48+00:00 Raghad Hazim Alshekh <p>A Smart Environmental Air Pollution Monitoring System (SEAPMS) based on internet of things (IoT) has been built for monitoring the concentrations of major air pollutant gases, as well as a fire extinguishing system for fire detection and prevention. Using a network of sensors, the SEAPMS detects gas concentrations such as carbon monoxide CO, carbon dioxide CO2, methane CH4, dust, smoke, temperature, and humidity. The sensors will collect data on numerous environmental characteristics and send it to particle photons, which will compare it to a predetermined threshold for each sensor then sends it to a special IoT platform known as UBIDOTS. UBIDOTS sends data to the cloud then they will be realized and virtualized to be displayed. The fire extinguishing system will activate when the smoke concentration exceeds its threshold limit value.</p> 2022-03-15T00:00:00+00:00 Copyright (c) 2022 Performance Analysis of MAC Layer Protocols for WSN with Considering the Effects of Hidden Node Problem 2022-07-20T05:26:08+00:00 Salah Abdulghani Alabady <p>In this paper, the effects of the hidden node problem in Wireless sensor networks are studied on three different MAC protocols using various field distances and various numbers of nodes. This study provides the best number of nodes to be disseminated in a specific field distance depending on the needed performance metrics. Six performance metrics are used in this study, which are Goodput, Throughput, Packet delivery ratio (PDR), Residual Energy, Average Delay, and the first and last node dead in the network. IEEE 802.11, IEEE 802.15.4, and time division multiple access (TDMA) protocols are used. Results show that TDMA gives the best energy conservation and high delay time with high PDR, while IEEE 802.11 provides the best throughput and goodput results and low delay time.</p> 2022-03-15T00:00:00+00:00 Copyright (c) 2022 An Overview of Energy Efficient Hierarchical-Based Routing Protocols for Internet of Things 2022-09-03T05:03:33+00:00 Abdulghani Alabady <p>Wireless sensor networks (WSNs) are a common datacollection with detecting mechanisms for a variety of submissions, including environmental monitoring, agriculture, health, military, and smart transportation. Every sensor node gathers information from its surroundings and transmits it to the Base Station via a wireless link, either single-hop or multi-hop. The main energy ingestion factor in the network is dominated by the data collection and forwarding capabilities of the sensor nodes. Designing energy-efficient protocols is a significant topic of research because many sensor nodes are outfitted with low-power batteries that are challenging to replace. Various routing methods are suggested and looked into to address this issue. The main goals of hierarchical-based routing in WSNs are preserving the residual energy of each sensor node, extending the network lifetime, and assuring communication among the sensor nodes. In this study, an attempt is made to evaluate the various hierarchical routing protocols. The majority of these sensor nodes, known as cluster-head (CH) or leaders, are in charge of gathering and processing data before sending it to the sink, while other nodes, known as member nodes, are in charge of sensing the sensor field and sending the sensing data to the head nodes. Head nodes selection is done in the first layer of the two-layer hierarchy-based routing architecture, and routing is done in the second layer. Picking a suitable hierarchical routing protocol is crucial besides challenging issues. The paper’s main objective is to evaluate several recently created hierarchical-based routing protocols in WSNs, which were extended to include other published routing protocols including The Low Energy Adaptive Clustering and is extended to other presented routing protocols like Power-Efficient Gathering in Sensor Information Systems (PEGASIS), Energy Efficient PEGASIS-Based Algorithm (EEPB), Hierarchal PEGASIS, PEGASIS Double CH, Improved EEPB, and Mobile sink improved energy-efficient PEGASIS-based routing protocol.</p> 2022-06-15T00:00:00+00:00 Copyright (c) 2022 Pipeline Inspection Robot Monitoring System 2022-11-01T05:40:17+00:00 Muhammad Ahmad Baballe <p>The most popular method for transporting fluids and gases is through pipelines nowadays. Regular inspection is necessary for the pipelines to work correctly. Humans must not enter potentially dangerous environments to inspect these pipelines. As a result of this, pipeline robots came into existence. These pipe inspection robots help in pipeline inspection, protecting numerous people from harm since human beings cannot enter the pipes and inspect them in case there is any such or kind of damage that requires repair. Despite numerous improvements, pipeline robots still have several limitations. The introduction of this in pipe inspection robots helps to solve many problems, such as leakage of the gas or fluid pipelines, rustiness, and also if the pipe is broken from any part.</p> 2022-03-15T00:00:00+00:00 Copyright (c) 2022