Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Asian Journal of Computer Science and Technology
About the Journal
Aims and Scope
Editorial Team
Editorial Policy
Author Guidelines
Ethical Standards
Copyright Form
Current
Archives
Open Access
Special Issues Guideline
Subscription
Contact
Announcements
Search
Register
Login
Home
/
Archives
/
Vol. 8 No. S1 (2019): Special Issue February 2019
Vol. 8 No. S1 (2019): Special Issue February 2019
DOI:
https://doi.org/10.51983/ajcst-2019.8.S1
Published:
12-01-2019
Articles
Social Media Analysis through Big Data Using Map Reduce Algorithm
S. Lingeswari
1-3
PDF
A Review on Biometrics Authentication System Using Fingerprint
P. Sureshbabu, M. Sakthivadivu
4-6
PDF
Detecting and Preventing a Black Hole Attack in VANET
V. Sasirekha, S. Nithyadevi
7-9
PDF
Sentiment Analysis on Myocardial Infarction Using Tweets Data
M. B. Monicka, A. Krishnaveni
10-14
PDF
Network Security Based on Component for Information Network
A. Aruljothi, N. Prabhu, N. M. Mallika
15-17
PDF
An Analysis on Internet of Things (IoT) for Smart Healthcare
S. Sapna
18-20
PDF
A Survey on Traffic Sign Detection Techniques Using Text Mining
S. Murugan, R. Karthika
21-24
PDF
Impact of Digital Heritage and Heritage Computing
K. Manjulaadevi, N. Geethalakshmi
25-27
PDF
Advanced Region Detection Technique to Enhance Accurate Abnormality Isolation of Cancer in Digital Images
N. M. Mallika, S. Janarthanam, A. Aruljothi
28-32
PDF
Survey of Security and Privacy Issues in Big Data Analytics
G. A. Mylavathi, N. M. Mallika, K. Mohanraj
33-35
PDF
Study of Ensemble Classifier for Prediction in Health Care Data
S. Sathurthi, R. Kamalakannan, T. Rameshkumar
36-37
PDF
LI-FI: An Emerging Technology for Health Care
M. Pandiyan, C. S. Revathi
38-40
PDF
Mining Sequential Pattern of Data in Textual Document Using Data Mining Classification Technique
J. Jayasudha, A. Christina Esther
41-45
PDF
Quality Monitoring of School Education and Evaluation Platform Based on Big Data
C. Vanisri
46-49
PDF
Boosted Edge Detection Algorithm for Unstructured Environment in Document Using Optimized Text Region Detection
N. P. Revathy, S. Janarthanam, S. Sukumaran
50-53
PDF
Implementation of Chunks of Image Password in Cloud Computing System
V. Sulochana
54-57
PDF
FBSC: An Analyzing Sentiments Using Fuzzy Based Bayesian Classification
M. Karthica, P. Sudarmani
58-62
PDF
Review on Security in Wireless Sensor Networks
K. Divya, B. Srinivasan
63-66
PDF
Data Analytics in Banking and Financial Services
S. Palaniammal, V. S. Thangamani
67-69
PDF
Image Encryption Using Arnold Map
P. Sridevi, J. Suguna
70-73
PDF
Attack Impact Discovery and Recovery with Dynamic Bayesian Networks
T. Rajeshwari, C. Thangamani
74-79
PDF
Security Threats in Cloud Computing
J. VimalRosy, S. Britto Ramesh Kumar
80-83
PDF
A Study of Viral Marketing on Social Network in Stream Line Business Model of Data Mining in Management
S. Muthumari
84-86
PDF
Implementation of Effective Data Emplacement Algorithm in Heterogeneous Cloud Environment
S. Annapoorani, B. Srinivasan
87-88
PDF
Identifying User Personality in Facebook Using their Activity Data
P. Dhinesh Kumar, S. Anusuya
89-93
PDF
A Data Mining Approach for Intrusion Detection in a Computer Network
M. Priya, M. Rajeshwari
94-97
PDF
Monitoring the Wind Turbine Condition Using Big Data Technique
N. V. Poorima, B. Srinivasan, S. Karthikeyan
98-102
PDF
An Experimental Analysis on Rough Set Mean, Median, Mode Method of Dependency Values for Feature Selection in Medical Databases
S. Devi, V. Sasirekha
103-106
PDF
Data Replication Using Data Mining Techniques
P. Elango, K. Kuppusamy, N. Prabhu
107-109
PDF
Open Access
Abstracting and Indexing
J-Gate
Google Scholar
Scilit
CrossRef
Library of Congress
WorldCat
Join as Reviewer
JOIN AS REVIEWER
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians