Acta Informatica Malaysia
Latest Publications


TOTAL DOCUMENTS

53
(FIVE YEARS 22)

H-INDEX

2
(FIVE YEARS 1)

Published By Zibeline International Publishing

2521-0505, 2521-0874

2020 ◽  
Vol 4 (2) ◽  
pp. 45-46
Author(s):  
Arif Apriyandi

The western artistic school understands the world through its form of expression, images creation from the consciousness which induces illusion, deal with concretion through decomposition, synthesis, overlap, art cross thinking.it reflects subconscious progress; The art school evolution from classical to modern, based on the objectives, from concretion ,impression to abstract art expression, artificial intelligence deepen the objective, scientific, rational and artistic exploration, less considering the unity of formation and content of the art in exploring the breakthrough, but the transcendence mechanism itself will continuing to research in the art field because of art nature, It will prompts the rationalization of western art in convergence and development constantly.


2020 ◽  
Vol 4 (2) ◽  
pp. 37-44
Author(s):  
Orunsolu Abiodun ◽  
Sodiya A.S ◽  
Kareem S.O

The problem of phishing attacks continues to demand new solutions as existing solutions are limited by various challenges such as high computational requirements, zero-day attacks, needs for updates, complex ruled-based, etc. Besides, the emerging mobile market demands simple solutions to phishing due to several factors such as memory, fragmentation, etc. In response to the above challenges, a simple anti-phishing tool called LinkCalculator is presented. The proposed LinkCalculator anti-phishing scheme is based on an algorithm designed to extract link characteristics from loading URLs to determine their legitimacy. Unlike the other link-based extraction approaches, the proposed approach introduced the concept of weight to represent the different links found in a URL. This is because certain link information within parsed webpages or requests is sufficient to classify them as phishing without loss of generality. The approach is experimented using a dataset of 300 instances consisting of 150 legitimate URLs and 150 phishing URLs from openly-available research datasets. The experimental results indicate a significance performance of 100%. True Negative Rate and 0.00% False Positive Rate for legitimate instances and True Positive Rate of 96.67% with 0.03 % False Negative Rate for phishing instances which indicate that the approach offers a more efficient lightweight approach to phishing detection.


2020 ◽  
Vol 4 (2) ◽  
pp. 33-36
Author(s):  
Asha Thapa Deepa Shrestha ◽  
Nisha Baudhacharya ◽  
Ranjeeta Ramtel ◽  
Sony Thapa ◽  
Suraj Poudel

This study is conducted to know Information and Communication Technology (ICT) mediated extension services in agriculture in Nepal. In this report, different ICT tools that are used for extension of agriculture in Nepal, organizations and divisions working for an extension, extension system of country, benefits and advantages from the use of ICT tools, constraints in the use of ICT tools in agriculture extension and their solutions are included. This report is prepared by studying different journal articles, reports, books and newspapers. Among ICT tools mobile phone is the most used ICT tools by farmers and laptop is the most used ICT tools used by the organizations for data processing. Radio and television are more popular in rural areas. This study shows that most of the ICT users are confined in urban areas. There are many advantages of the use of ICT tools in the field of agriculture. ICT tools can cover a large number of the population with high speed. ICT tools increase productivity, sustainability and efficiency of farms by providing relevant information timely and more easily. ICT tools provide information about quality seeds, transportation, marketing, new technologies and weather condition that facilitate the farmers for making the right decision. There are many agriculture-related mobile applications available at Google play store. These mobile apps give knowledge about cropping methods, crop management practices, crop protection, the market price of inputs and outputs etc. These mobile apps are managed in Nepali language for facilitating the Nepali farmers. Agriculture-related programs are broadcasted through national television channels and FM radio stations. There are technical, socio-economic, institutional and infrastructural constraints that limit the use of ICTs in agriculture fields.


2020 ◽  
Vol 4 (2) ◽  
pp. 30-32
Author(s):  
Alberto Moreno

Thus, for the current status of research and practical music audio processing needs, this paper argues, the music element analysis technology is the key to this research field, and on this basis, proposes a new framework music processing – Music calculation system, the core objective is to study intelligently and automatically identifies various elements of music information and analyze the information used in constructing the music content, and intelligent retrieval method translated. To achieve the above core research objectives, the paper advocates will be closely integrated music theory and calculation methods, the promotion of integrated use of music theory, cognitive psychology, music, cognitive science, neuroscience, artificial intelligence, signal processing theory to solve the music signal analysis identify the problem.


2020 ◽  
Vol 4 (2) ◽  
pp. 26-29
Author(s):  
Victor Wong

In recent years, lifelong education has become widespread in the public, contributing to explosive development of modern distance education. Meanwhile, distance learners have gradually had more and higher demands for online learning resources. Despite abundant online learning resources at present, their overall quality is relatively low and they can hardly satisfy learners’ learning demands. Based on customer satisfaction, the essay establishes evaluation indexes about online learning resources based on customer satisfaction, improves its development and proposes suggestions for improvement, which is of great theoretical and practical significance.


2020 ◽  
Vol 4 (1) ◽  
pp. 22-25
Author(s):  
Jugal Kishor Gupta ◽  
Sanjay Kumar Gupta

In this paper we present an IoT based solution that can reduce the complexity of crowd estimation. About the human crowd estimation many technique are in existence but now a day’s more work are going on in the field of IoT, because this is era of IoT and most of the every organization is shifted towards IoT based system. So we are also proposed this system in this field and we are using the Respberry Pi-3 which are having quad core processor that can very useful and gives better result and gives accurate number even in the humans are very close to each others. This IoT based model can easily implements in the crowded areas and monitor the same in this area. The camera module in this model also helps to differentiate between human and other bodies. As this is a mobile model it can easily fix on the walls of street light and in the time of dark or in night the camera capture clear image for process in the presence of street light. So that this model gives better result almost 70% better result in compare to exiting approaches.


2020 ◽  
Vol 4 (1) ◽  
pp. 19-21
Author(s):  
Yakubu Ajiji Makeri

Cryptanalysis is a new ID-based encryption scheme proposed by Meshram. I found a method for factor N, where N is the parameter proposed by Meshram. We also provide a method for retrieving the Secret Master key for Mayshram’s ID-based encryption scheme. Identity-based (ID-based) cryptography is very useful because it simplifies certificate management in public-key cryptocurrency. For the design of the Integrated File Level Cryptographic Access Control (IFLCAC) system, it makes file security much easier for the end-user. This system combines the advantages of traditional file-level cryptography and full-disc cryptography systems, making it safe and easy to use. We first look at existing file cryptography systems, compare them to two, and then describe the interactions between components and components of the integrated file-level cryptographic access control system. Because its defense relies on the difficulty of discrete logarithmic and integer factor problems, it proves that his scheme is safe against favorable select-plain invasion. We show that this new ID-based encryption scheme is not secure by introducing a method to retrieve the secret master key.


2020 ◽  
Vol 4 (1) ◽  
pp. 07-09
Author(s):  
Mardiana- Jansar K ◽  
Marlia Mohd Hanafiah

Visual communication has become an important technique for the 21st century’s education. Images and videos are essential tools for better understanding in science and technology subjects. The science and technology subjects can be better understood through a combination of visual communication and application of the theory can be practiced. 40 students from quantitative analysis and instrumentation course were given an assignment using the separation concept. Only two students were unable to perform the task well and these students were also among the students who failed to answer the examination questions involving the application of separation techniques. Correlation tests between assignment and examination scores (involving separation concept questions) showed a positive correlation (r= 61.1). Despite the small number of respondents, the results showed a relatively strong correlation. To address this issue, students were encouraged to share their video among them, so that they can understand the separation techniques excellently.


2020 ◽  
Vol 4 (1) ◽  
pp. 10-18
Author(s):  
Tita Djuitaningsih ◽  
Degi Arifiyantoro

Agency-level financial application system (SAKTI) at Directorate General of Budget (DJA) – The Ministry of Finance of the Republic of Indonesia was built to provide benefits in the form of increased integration, efficiency, planning processes, implementation, and accountability of the state budget rather than the previous system. But the fact is, the implementation of SAKTI still causes problems related to users and their impact on individuals and organizations, thereby reducing these benefits. The purpose of this study is to test the influence of information and system quality of SAKTI on attitude towards use and user satisfaction and its impact on individual of SAKTI’s user and organizational impact of DJA. This is a quantitative study using primary data from SAKTI’s operational user as respondent that was collected using paper & pencil method. The population in this study was 60 people. Using purposive sampling technique with access frequency criteria, a sample size of 55 users was obtained. Data analysis using Structural Equation Modelling (SEM) – Partial Least Square (PLS). The result proved that both system information and system quality positively of SAKTI affect both attitude towards use and user satisfaction, both attitude towards use and user satisfaction of SAKTI positively affect each other and both of them positively affect individual impact of SAKTI’s user, and individual impact of SAKTI’s user positively affect organizational impact of DJA. The results of the study still do not adequately represent the overall perception of SAKTI users. In this regard, further research is needed covering the scope of which has not been studied in the Echelon I environment at the Ministry of Finance in addition to the DJA. Research on the risks of SAKTI implementation that does not run smoothly as well as the risks of negative impacts on the performance of individuals and organizations has never been done, especially in the work unit at the DJA – The Ministry of Finance of the Republic of Indonesia.


2020 ◽  
Vol 4 (1) ◽  
pp. 01-06
Author(s):  
Anand Mohan ◽  
M Sundararajan

In this digital era, we are subject to cellular gadgets, there has been an expanding demand in antennas that are smaller, conformal, and broadband. Fractal antenna wire utilizes a self-comparative structure to expand the length of a material in an all-out surface zone. Fractal Antenna Systems creates and constructs the smaller, most astounding execution Wideband/multiband antennas on the planet. These antennas are regularly two to multiple times smaller than conventional aerials, while accomplishing remarkable recurrence inclusion and magnificent gains and power designs. Fractal Antenna’s items have been demonstrated in the toughest business, military, and government applications. Fractal antennas apparatuses depend on mind boggling rehashing geometrical shape shaving novel traits that make them particularly significant for broadcast communications and different remote needs. Their requirements are not well met by Traditional antennas apparatuses. Applications for fractal geometries in cell gadgets have turned out to be hotly debated issues of research in science and building due to buyer request.


Sign in / Sign up

Export Citation Format

Share Document