Asian Journal of Computer Science Engineering(AJCSE) http://ajcse.info/index.php/ajcse <p style="text-align: justify;">Asian Journal of Computer Science Engineering(AJCSE) is an international Referred and Peer Reviewed Online Journal with E-ISSN: 2581-3781 published by B.R. Nahata Smriti Sansthan for the enhancement of Computer Science Theory, Methods and Tools, Computer and Communications Networks and Systems, Computational Intelligence, Machine Learning and Data Analytics, Security in Computer Systems and Networks, Hardware Design discipline. </p> <p style="text-align: justify;">AJCSE is an Open Access Online Journal that publishes full-length papers, reviews and short communications exploring and to promote diverse and integrated areas of Computer Science Theory, Methods and Tools, Computer and Communications Networks and Systems, Computational Intelligence, Machine Learning and Data Analytics, Security in Computer Systems and Networks, Hardware Design and covers all engineering subject areas. AJCSE is steered by a distinguished Board of Editors. To maintain a high-quality journal, manuscripts that appear in the AJCSE Articles section have been subjected to a rigorous review process.</p> <p><strong>SUBJECT CATEGORY </strong></p> <p>Papers reporting original research and innovative applications from all parts of the world are welcome.</p> <p>Subject areas suitable for publication include, but are not limited to the following fields:</p> <p style="text-align: justify;">Computer Science Theory, Methods and Tools, Software engineering, algorithms and complexity, computational logic, formal methods, heuristics, mathematics and models of computation, programming languages and semantics.</p> <p><strong>Computer and Communications Networks and Systems</strong></p> <p>Network and distributed architectures and protocols, traffic engineering, resource management and Quality of Service, network monitoring and traffic measurements, wireless networks, personal and body area networks, vehicular networks, content and service-centric networking, multimedia communications and standards, energy efficient/green networks, opportunistic and cognitive networks.</p> <p><strong>Computational Intelligence, Machine Learning and Data Analytics</strong></p> <p>Human computer interaction, computational science, pattern recognition, computer vision, speech processing, machine intelligence and reasoning, web science, databases, information retrieval, visualisation, current applications domains, e.g. Healthcare and BioInformatics, and emerging application domains, e.g. big data.</p> <p><strong>Security in Computer Systems and Networks</strong></p> <p>Computer systems security, hardware and embedded systems security, security protocol design and analysis, cryptography and cryptanalysis, intrusion detection systems and techniques, user authentication techniques and systems.</p> <p><strong>Hardware Design</strong></p> <p>Computer architectures, parallel architectures, operating systems and signal processing. Some more related subject fields as follows:</p> <p> </p> <ul> <li>Artificial intelligence (AI)</li> <li>Cognitive science</li> <li>Computer engineering</li> <li>Computer information systems (CIS)</li> <li>Computer graphics</li> <li>Computer programming</li> <li>Computer networks</li> <li>Computer servicing technology</li> <li>Data processing</li> <li>Database systems</li> <li>Information science</li> <li>Knowledge engineering/expert systems</li> <li>Management information systems (MIS)</li> <li>Neural network</li> <li>Robotics</li> <li>Software engineering</li> <li>Systems analysis</li> <li>Telecommunications engineering</li> <li>Computer Science in Modeling</li> <li>Computer Architecture</li> <li>Computation and Language</li> <li>Computational Complexity</li> <li>Computational Engineering, Finance, and Science</li> <li>Computational Geometry</li> <li>Computer Science and Game Theory</li> <li>Computer Vision and Pattern Recognition</li> <li>Computers and Society</li> <li>Cryptography and Security</li> <li>Data and Web Mining</li> <li>Data Structures and Algorithms</li> <li>Databases</li> <li>Digital Libraries</li> <li>Discrete Mathematics</li> <li>Logic in Computer Science</li> <li>Mathematical Software</li> <li>Multimedia</li> <li>Networking and Internet Architecture</li> <li>Neural and Evolutionary Computing</li> <li>Numerical Analysis</li> <li>Operating Systems</li> <li>Performance</li> <li>Programming Languages</li> <li>Robotics</li> <li>Software Engineering</li> <li>Symbolic Computation</li> <li>Cover all Engineering related subject areas</li> </ul> <p> </p> <p><strong><u>JOURNAL PARTICULARS</u></strong></p> <table> <tbody> <tr> <td width="225"> <p>Title</p> </td> <td width="414"> <p>Asian Journal of Computer Science Engineering</p> </td> </tr> <tr> <td width="225"> <p>Frequency</p> </td> <td width="414"> <p>Quarterly</p> </td> </tr> <tr> <td width="225"> <p>E- ISSN</p> </td> <td width="414"> <p>2581-3781</p> </td> </tr> <tr> <td width="225"> <p>P-ISSN</p> </td> <td width="414"> <p>-</p> </td> </tr> <tr> <td width="225"> <p>DOI</p> </td> <td width="414"> <p><strong>https://doi.org/10.22377/ajcse</strong></p> </td> </tr> <tr> <td width="225"> <p>Publisher</p> </td> <td width="414"> <p><strong>Mr. Rahul Nahata</strong>, B.R. Nahata College of Pharmacy, Mhow-Neemuch Road, Mandsaur-458001, Madhya Pradesh</p> </td> </tr> <tr> <td width="225"> <p>Chief Editor</p> </td> <td width="414"> <p>Dr. M.A. Naidu</p> </td> </tr> <tr> <td width="225"> <p>Starting Year</p> </td> <td width="414"> <p>2016</p> </td> </tr> <tr> <td width="225"> <p>Subject</p> </td> <td width="414"> <p>Computer Science and Engineering subjects</p> </td> </tr> <tr> <td width="225"> <p>Language</p> </td> <td width="414"> <p>English Language</p> </td> </tr> <tr> <td width="225"> <p>Publication Format</p> </td> <td width="414"> <p>Online</p> </td> </tr> <tr> <td width="225"> <p>Email Id</p> </td> <td width="414"> <p>editorajcse@brnsspublicationhub.org,editor@brnsspublicationhub.org</p> </td> </tr> <tr> <td width="225"> <p>Mobile No.</p> </td> <td width="414"> <p>+91-7049737901</p> </td> </tr> <tr> <td width="225"> <p>Website</p> </td> <td width="414"> <p>www.ajcse.info</p> </td> </tr> <tr> <td width="225"> <p>Address</p> </td> <td width="414"> <p>B.R. Nahata Smriti Sansthan, BRNSS PUBLICATION HUB, B.R. Nahata College of Pharmacy, Mhow-Neemuch Road, Mandsaur-458001, Madhya Pradesh</p> </td> </tr> </tbody> </table> <p> </p> BRNSS Publication Hub en-US Asian Journal of Computer Science Engineering(AJCSE) 2581-3781 This is an Open Access article distributed under the terms of the Attribution-Noncommercial 4.0 International License [CC BY-NC 4.0], which requires that reusers give credit to the creator. It allows reusers to distribute, remix, adapt, and build upon the material in any medium or format, for noncommercial purposes only. A Comprehensive Study on Outlier Detection in Data Mining http://ajcse.info/index.php/ajcse/article/view/185 <p>The paper presents a survey on the literature of outliers and data mining. The prime focus of the paper is to deliver an outline of outlier with various approaches for its detection. Outliers are the data points which are partially or totally diverge from the residue data set. They can be considered as those data objects which cannot be fitted in any cluster. Outliers can be different from its neighboring data points only or from complete data set. It is a necessary task to identify and detect outliers from the dataset as their presence effect the preciseness of the outcome. Outliers can exist in any kind of data varies from low-dimensional to high-dimensional data set. The detection of an outlier requires some precise mathematical calculations, appropriate domain knowledge, and statistical calculations which are presented in the paper. The paper presents, the significant characteristics of the outliers.</p> Deepti Mishra Copyright (c) 2022 https://creativecommons.org/licenses/by-nc/4.0 2022-03-15 2022-03-15 7 1 Design and Implementation of Smart Environmental Air Pollution Monitoring System (SEAPMS) based on IoT http://ajcse.info/index.php/ajcse/article/view/186 <p>A Smart Environmental Air Pollution Monitoring System (SEAPMS) based on internet of things (IoT) has been built for monitoring the concentrations of major air pollutant gases, as well as a fire extinguishing system for fire detection and prevention. Using a network of sensors, the SEAPMS detects gas concentrations such as carbon monoxide CO, carbon dioxide CO2, methane CH4, dust, smoke, temperature, and humidity. The sensors will collect data on numerous environmental characteristics and send it to particle photons, which will compare it to a predetermined threshold for each sensor then sends it to a special IoT platform known as UBIDOTS. UBIDOTS sends data to the cloud then they will be realized and virtualized to be displayed. The fire extinguishing system will activate when the smoke concentration exceeds its threshold limit value.</p> Raghad Hazim Alshekh Copyright (c) 2022 https://creativecommons.org/licenses/by-nc/4.0 2022-03-15 2022-03-15 7 1 Performance Analysis of MAC Layer Protocols for WSN with Considering the Effects of Hidden Node Problem http://ajcse.info/index.php/ajcse/article/view/187 <p>In this paper, the effects of the hidden node problem in Wireless sensor networks are studied on three different MAC protocols using various field distances and various numbers of nodes. This study provides the best number of nodes to be disseminated in a specific field distance depending on the needed performance metrics. Six performance metrics are used in this study, which are Goodput, Throughput, Packet delivery ratio (PDR), Residual Energy, Average Delay, and the first and last node dead in the network. IEEE 802.11, IEEE 802.15.4, and time division multiple access (TDMA) protocols are used. Results show that TDMA gives the best energy conservation and high delay time with high PDR, while IEEE 802.11 provides the best throughput and goodput results and low delay time.</p> Salah Abdulghani Alabady Copyright (c) 2022 https://creativecommons.org/licenses/by-nc/4.0 2022-03-15 2022-03-15 7 1