首页 > 最新文献

Acta Informatica Malaysia最新文献

英文 中文
ARTIFICIAL NEURAL NETWORK ANALYSIS OF SOME SELECTED KDD CUP 99 DATASET FOR INTRUSION DETECTION 人工神经网络分析了KDD cup 99数据集的入侵检测
Pub Date : 2022-01-01 DOI: 10.26480/aim.02.2022.55.61
Samuel Olorunfemi Adams, Ednah Azikwe, Mohammed Anono Zubair
Due to the growing number of intrusions in local networks and the internet, it has become so universal that institution increasingly implements many structures that investigate information technology security violations. This study aimed to process, classify and predict the intrusion detection accuracy of some selected network attacks using the artificial neural network (ANN) technique. Five important attacks, namely; Buffer overflow, Denial of Service (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and PROBE were chosen from the KDD CUPP’99 information and intrusion identification accuracy was investigated with artificial neural network (ANN) modeling technique. Findings from the classification show that out of the procedures utilized to establish the ANN model, 27262 of the 45528 buffer overflow are classified appropriately, 7903 of the 45528 DoS attacks are arranged appropriately, 1371 of the 45528 U2R are classified appropriately, 431 of the 45528 R2L are arranged appropriately and, 8304 of the 45528 PROBE are classified appropriately. Comprehensively, about 99.1% of the training proceedings are arranged properly, equivalent to 0.9% erroneous classification while the testing specimen assisted to confirm the model with 99.1% of the attacks were appropriately arranged by the ANN equation. This support that, comprehensively, the ANN equation is precise about the classification and prediction of the five attacks investigated in this study.
由于对本地网络和互联网的入侵越来越多,它已经变得如此普遍,以至于机构越来越多地实施了许多调查信息技术安全违规的结构。本研究旨在利用人工神经网络(ANN)技术对一些选定的网络攻击进行处理、分类和预测入侵检测的准确性。五项重要攻击,即;从KDD CUPP ' 99信息中选择了缓冲区溢出、拒绝服务攻击(DoS)、用户对根攻击(U2R)、远程对本地攻击(R2L)和探针攻击,并利用人工神经网络(ANN)建模技术对入侵识别的准确性进行了研究。分类结果表明,在用于建立ANN模型的程序中,45528缓冲区溢出有27262个被分类正确,45528 DoS攻击有7903个被分类正确,45528 U2R有1371个被分类正确,45528 R2L有431个被分类正确,45528 PROBE有8304个被分类正确。综合来看,约99.1%的训练过程安排得当,相当于0.9%的错误分类,而辅助确认模型的测试样本中,99.1%的攻击被ANN方程安排得当。这表明,总的来说,人工神经网络方程对于本研究中调查的五种攻击的分类和预测是精确的。
{"title":"ARTIFICIAL NEURAL NETWORK ANALYSIS OF SOME SELECTED KDD CUP 99 DATASET FOR INTRUSION DETECTION","authors":"Samuel Olorunfemi Adams, Ednah Azikwe, Mohammed Anono Zubair","doi":"10.26480/aim.02.2022.55.61","DOIUrl":"https://doi.org/10.26480/aim.02.2022.55.61","url":null,"abstract":"Due to the growing number of intrusions in local networks and the internet, it has become so universal that institution increasingly implements many structures that investigate information technology security violations. This study aimed to process, classify and predict the intrusion detection accuracy of some selected network attacks using the artificial neural network (ANN) technique. Five important attacks, namely; Buffer overflow, Denial of Service (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and PROBE were chosen from the KDD CUPP’99 information and intrusion identification accuracy was investigated with artificial neural network (ANN) modeling technique. Findings from the classification show that out of the procedures utilized to establish the ANN model, 27262 of the 45528 buffer overflow are classified appropriately, 7903 of the 45528 DoS attacks are arranged appropriately, 1371 of the 45528 U2R are classified appropriately, 431 of the 45528 R2L are arranged appropriately and, 8304 of the 45528 PROBE are classified appropriately. Comprehensively, about 99.1% of the training proceedings are arranged properly, equivalent to 0.9% erroneous classification while the testing specimen assisted to confirm the model with 99.1% of the attacks were appropriately arranged by the ANN equation. This support that, comprehensively, the ANN equation is precise about the classification and prediction of the five attacks investigated in this study.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73309004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN EFFICIENT AND SECURED GRAPHICAL AUTHENTICATION SYSTEM 一个高效和安全的图形认证系统
Pub Date : 2022-01-01 DOI: 10.26480/aim.01.2022.17.21
O.J Elugbadebo, A. A. Orunsolu, S. A. Akinyele, S. I. Salawu
Authentication through the use of passwords usually allow users to access resources in a computer or automated installations. However, remembering such passwords is often a problem for most users due to complex nature of most stong password. As a viable alternative, graphical passwords were introduced to complement the security problems in this method of authentication. Therefore, this papr proposes the concept of a graphical password authentication system using hybrid approach. This approach that allows users to identity a number of images during the registration process and then requested to draw a pattern on each image in a pre-defined order to complete the system approach. This process is represented via a three-stage scheme which consists of the Registration phase, the Login phase and the Authentication phase (RLA). The evaluation was carried out using the comparative study that involves generation of secure graphical password. This methodology is often refered to as Educating Users to Generate Secure Graphical Password Secrets (EUSGPAS). The evaluation involved 200 purposively selected participants who were made to use the new system over six weeks. Experimental results of ESGAS and EUSGPAS indicated a mean success rate of 100%, 97%, 100% and 99%, 96%, 98.9% with a mean completion time of 29.71s and 30.89s respectively. These results indicated the merits of the proposed method over the EUSGPAS approach.
通过使用密码进行身份验证通常允许用户访问计算机或自动安装中的资源。然而,由于大多数强密码的复杂性,记住这些密码对大多数用户来说通常是一个问题。作为一种可行的替代方案,引入了图形密码来补充这种身份验证方法中的安全问题。因此,本文提出了一种采用混合方法的图形化密码认证系统的概念。这种方法允许用户在注册过程中识别多个图像,然后按照预先定义的顺序在每个图像上绘制图案以完成系统方法。这个过程通过一个由注册阶段、登录阶段和身份验证阶段(RLA)组成的三阶段方案来表示。评估是使用涉及生成安全图形密码的比较研究进行的。这种方法通常被称为教育用户生成安全图形密码秘密(EUSGPAS)。该评估涉及200名有意挑选的参与者,他们被要求在六周内使用新系统。实验结果表明,ESGAS和EUSGPAS的平均成功率分别为100%、97%、100%和99%、96%、98.9%,平均完成时间分别为29.71s和30.89s。这些结果表明了该方法相对于EUSGPAS方法的优点。
{"title":"AN EFFICIENT AND SECURED GRAPHICAL AUTHENTICATION SYSTEM","authors":"O.J Elugbadebo, A. A. Orunsolu, S. A. Akinyele, S. I. Salawu","doi":"10.26480/aim.01.2022.17.21","DOIUrl":"https://doi.org/10.26480/aim.01.2022.17.21","url":null,"abstract":"Authentication through the use of passwords usually allow users to access resources in a computer or automated installations. However, remembering such passwords is often a problem for most users due to complex nature of most stong password. As a viable alternative, graphical passwords were introduced to complement the security problems in this method of authentication. Therefore, this papr proposes the concept of a graphical password authentication system using hybrid approach. This approach that allows users to identity a number of images during the registration process and then requested to draw a pattern on each image in a pre-defined order to complete the system approach. This process is represented via a three-stage scheme which consists of the Registration phase, the Login phase and the Authentication phase (RLA). The evaluation was carried out using the comparative study that involves generation of secure graphical password. This methodology is often refered to as Educating Users to Generate Secure Graphical Password Secrets (EUSGPAS). The evaluation involved 200 purposively selected participants who were made to use the new system over six weeks. Experimental results of ESGAS and EUSGPAS indicated a mean success rate of 100%, 97%, 100% and 99%, 96%, 98.9% with a mean completion time of 29.71s and 30.89s respectively. These results indicated the merits of the proposed method over the EUSGPAS approach.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83368713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DIGITALIZATION OF INDIGENOUS KNOWLEDGE IN NEPAL – REVIEW ARTICLE 尼泊尔本土知识的数位化-回顾文章
Pub Date : 2021-09-29 DOI: 10.26480/aim.01.2021.42.47
P. Ghimire
This article strives to explore the need of digitalization of indigenous knowledge for socio economic development and its effective management. The best use of natural resources is aided by the indigenous practices providing invaluable knowledge. In these modern days of technological advancement, it is seen that this knowledge is often being ignored. Naturally rich countries like Nepal, which holds innumerable counts of Indigenous practices, no any considerable efforts have been seen to understand the scientific basis of this knowledge. Studies have shown that most of the world’s natural resources, along with digitally born resources have been vanished and due to neglectism, some cannot even be recovered. So, in order to provide long term preservation and global access to Indigenous Knowledge, digitalization can be viewed as a remarkable tool. The introduction of new technology and communication channels are changing the way how we gain knowledge. Many of us are considered to be living in a digital age, this era however is having an effect on cultural/traditional/indigenous knowledge and create new challenges for indigenous communities. Documentation and digitalization of Indigenous knowledge should be included in the curricula of environment and sustainable development as a cross-cutting issue.
本文旨在探讨社会经济发展对本土知识数字化的需求及其有效管理。土著实践提供了宝贵的知识,有助于最好地利用自然资源。在科技进步的今天,我们看到这些知识经常被忽视。像尼泊尔这样自然资源丰富的国家,拥有无数的土著实践,却没有任何可观的努力来理解这些知识的科学基础。研究表明,世界上大部分的自然资源,包括数字资源已经消失,由于忽视,有些甚至无法恢复。因此,为了提供土著知识的长期保存和全球访问,数字化可以被视为一个了不起的工具。新技术和沟通渠道的引入正在改变我们获取知识的方式。我们中的许多人都被认为生活在数字时代,然而,这个时代正在对文化/传统/土著知识产生影响,并为土著社区带来新的挑战。土著知识的文件化和数字化应作为一个跨领域问题纳入环境与可持续发展课程。
{"title":"DIGITALIZATION OF INDIGENOUS KNOWLEDGE IN NEPAL – REVIEW ARTICLE","authors":"P. Ghimire","doi":"10.26480/aim.01.2021.42.47","DOIUrl":"https://doi.org/10.26480/aim.01.2021.42.47","url":null,"abstract":"This article strives to explore the need of digitalization of indigenous knowledge for socio economic development and its effective management. The best use of natural resources is aided by the indigenous practices providing invaluable knowledge. In these modern days of technological advancement, it is seen that this knowledge is often being ignored. Naturally rich countries like Nepal, which holds innumerable counts of Indigenous practices, no any considerable efforts have been seen to understand the scientific basis of this knowledge. Studies have shown that most of the world’s natural resources, along with digitally born resources have been vanished and due to neglectism, some cannot even be recovered. So, in order to provide long term preservation and global access to Indigenous Knowledge, digitalization can be viewed as a remarkable tool. The introduction of new technology and communication channels are changing the way how we gain knowledge. Many of us are considered to be living in a digital age, this era however is having an effect on cultural/traditional/indigenous knowledge and create new challenges for indigenous communities. Documentation and digitalization of Indigenous knowledge should be included in the curricula of environment and sustainable development as a cross-cutting issue.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90990486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR 基于数据挖掘技术的金融入侵检测与防御框架
Pub Date : 2021-09-29 DOI: 10.26480/aim.02.2021.58.61
Gaurav Sharma, A. Kapil
Security becomes the main concern when the resources are shared over a network for many purposes. For ease of use and time saving several services offered by banks and other financial companies are accessible over mobile apps and computers connected with the Internet. Intrusion detection (ID) is the act of detecting actions that attempt to compromise the confidentiality, integrity, or availability of a shared resource over a network. Intrusion detection does not include the prevention of intrusions. A different solution is required for intrusion prevention. The major intrusion detection technique is host-based where major accountabilities are taken by the server itself to detect relevant security attacks. In this paper, an intrusion detection algorithm using data mining is presented. The proposed algorithm is compared with the signature apriori algorithm for performance. The proposed algorithm observed better results. This framework may help to explore new areas of future research in increasing security in the banking and financial sector enabled by an intrusion detection system (IDS).
当出于多种目的在网络上共享资源时,安全性成为主要关注的问题。为了方便使用和节省时间,银行和其他金融公司提供的一些服务可以通过连接互联网的移动应用程序和计算机访问。入侵检测(ID)是检测试图破坏网络上共享资源的机密性、完整性或可用性的行为。入侵检测不包括入侵预防。入侵防御需要不同的解决方案。主要的入侵检测技术是基于主机的,其中主要的责任由服务器本身承担,以检测相关的安全攻击。本文提出了一种基于数据挖掘的入侵检测算法。将该算法与签名先验算法进行性能比较。该算法取得了较好的效果。该框架可能有助于探索未来研究的新领域,即通过入侵检测系统(IDS)提高银行和金融部门的安全性。
{"title":"INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR","authors":"Gaurav Sharma, A. Kapil","doi":"10.26480/aim.02.2021.58.61","DOIUrl":"https://doi.org/10.26480/aim.02.2021.58.61","url":null,"abstract":"Security becomes the main concern when the resources are shared over a network for many purposes. For ease of use and time saving several services offered by banks and other financial companies are accessible over mobile apps and computers connected with the Internet. Intrusion detection (ID) is the act of detecting actions that attempt to compromise the confidentiality, integrity, or availability of a shared resource over a network. Intrusion detection does not include the prevention of intrusions. A different solution is required for intrusion prevention. The major intrusion detection technique is host-based where major accountabilities are taken by the server itself to detect relevant security attacks. In this paper, an intrusion detection algorithm using data mining is presented. The proposed algorithm is compared with the signature apriori algorithm for performance. The proposed algorithm observed better results. This framework may help to explore new areas of future research in increasing security in the banking and financial sector enabled by an intrusion detection system (IDS).","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79831942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
THE PSYCHOSOCIAL EFFECTS OF SOCIAL MEDIA CYBERBULLYING ON STUDENTS IN SELECTED AFRICAN COUNTRIES 社交媒体网络欺凌对某些非洲国家学生的心理社会影响
Pub Date : 2021-09-29 DOI: 10.26480/aim.02.2021.62.70
P. Chukwuere, J. Chukwuere, Dickson Adom
This study investigates the psychosocial impact of cyberbullying on social media among students in Nigeria, Ghana, Zimbabwe, and Cameroon. The study adopted a quantitative research methodology in collecting data from 99 students across the selected African countries using a well-designed electronic questionnaire (e-questionnaire). The study found that cyberbullying on social media has psychosocial implications for the student. Furthermore, the study revealed ways and strategies to mitigate the spread and act of cyberbullying of students on social media platforms. Conclusively, the study unpacked the psychosocial impacts of cyberbullying on students. Therefore, the research, without a doubt, contributed to an in-depth understanding of various aspects of the psychosocial impact of cyberbullying on social media on students and as well as a possible profound solution to mitigating cyberbullying.
本研究调查了尼日利亚、加纳、津巴布韦和喀麦隆学生在社交媒体上的网络欺凌对他们的心理社会影响。该研究采用了定量研究方法,使用设计良好的电子问卷(电子问卷)从选定的非洲国家的99名学生中收集数据。研究发现,社交媒体上的网络欺凌对学生有心理影响。此外,该研究揭示了减轻社交媒体平台上学生网络欺凌的传播和行为的方法和策略。最后,该研究揭示了网络欺凌对学生的心理社会影响。因此,本研究无疑有助于深入了解社交媒体网络欺凌对学生心理社会影响的各个方面,并为减轻网络欺凌提供可能的深刻解决方案。
{"title":"THE PSYCHOSOCIAL EFFECTS OF SOCIAL MEDIA CYBERBULLYING ON STUDENTS IN SELECTED AFRICAN COUNTRIES","authors":"P. Chukwuere, J. Chukwuere, Dickson Adom","doi":"10.26480/aim.02.2021.62.70","DOIUrl":"https://doi.org/10.26480/aim.02.2021.62.70","url":null,"abstract":"This study investigates the psychosocial impact of cyberbullying on social media among students in Nigeria, Ghana, Zimbabwe, and Cameroon. The study adopted a quantitative research methodology in collecting data from 99 students across the selected African countries using a well-designed electronic questionnaire (e-questionnaire). The study found that cyberbullying on social media has psychosocial implications for the student. Furthermore, the study revealed ways and strategies to mitigate the spread and act of cyberbullying of students on social media platforms. Conclusively, the study unpacked the psychosocial impacts of cyberbullying on students. Therefore, the research, without a doubt, contributed to an in-depth understanding of various aspects of the psychosocial impact of cyberbullying on social media on students and as well as a possible profound solution to mitigating cyberbullying.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84567762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
AN INCREMENTAL COMPONENT-BASED SYSTEM FOR MITIGATING PHISHING ATTACKS 一个基于增量组件的系统,用于减轻网络钓鱼攻击
Pub Date : 2021-09-29 DOI: 10.26480/aim.01.2021.53.57
A. A. Orunsolu, S. O. Kareem, S. Salawu, K.S Famuyiwa, O.J Elugbadebo
Heuristics-based anti-phishing systems are the most deployed solutions in cyberspace. This is due to their generalization feature which is capable of preventing zero-day attacks. However, this promising anti-phishing countermeasure is faced with the problem of managing the feature corpus for scale and complexity. In addition, managing the redundant feature during an upgrade is another factor. In this paper, an incremental component system is proposed to this problem. The proposed framework consists of atomic units and composite units. These units provide encapsulations through which feature corpus is built with ease of management and upgrade. The scheme provides both generic and specific frameworks for designing an anti-phishing scheme with effective management of feature vectors. Therefore, maintenance and updates can be integrated without the total collapse of the system. Hence, the proposed framework can be described as being fault tolerant.
基于启发式的反网络钓鱼系统是网络空间中部署最多的解决方案。这是由于它们的泛化特性,能够防止零日攻击。然而,这种很有前途的反网络钓鱼对策面临着特征语料库管理规模和复杂性的问题。此外,在升级期间管理冗余特性是另一个因素。针对这一问题,本文提出了一种增量分量系统。提出的框架由原子单元和组合单元组成。这些单元提供了封装,通过封装构建功能语料库,便于管理和升级。该方案为设计具有有效特征向量管理的反网络钓鱼方案提供了通用和特定框架。因此,可以集成维护和更新,而不会使系统完全崩溃。因此,所提出的框架可以被描述为具有容错性。
{"title":"AN INCREMENTAL COMPONENT-BASED SYSTEM FOR MITIGATING PHISHING ATTACKS","authors":"A. A. Orunsolu, S. O. Kareem, S. Salawu, K.S Famuyiwa, O.J Elugbadebo","doi":"10.26480/aim.01.2021.53.57","DOIUrl":"https://doi.org/10.26480/aim.01.2021.53.57","url":null,"abstract":"Heuristics-based anti-phishing systems are the most deployed solutions in cyberspace. This is due to their generalization feature which is capable of preventing zero-day attacks. However, this promising anti-phishing countermeasure is faced with the problem of managing the feature corpus for scale and complexity. In addition, managing the redundant feature during an upgrade is another factor. In this paper, an incremental component system is proposed to this problem. The proposed framework consists of atomic units and composite units. These units provide encapsulations through which feature corpus is built with ease of management and upgrade. The scheme provides both generic and specific frameworks for designing an anti-phishing scheme with effective management of feature vectors. Therefore, maintenance and updates can be integrated without the total collapse of the system. Hence, the proposed framework can be described as being fault tolerant.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90293644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WEB-BASED DENTAL PATIENT EDUCATION AND MANAGEMENT APPLICATION 基于web的牙科患者教育与管理应用
Pub Date : 2021-01-01 DOI: 10.26480/aim.01.2021.12.15
M. H. Saeed, Bahjat Taha Ahmed
It is difficult for hospitals and clinics to manage their documents related to their patients and routine works without having management software. The purpose of this paper is to design and develop a web-based dental clinic application for educating and managing patients. Recent web technologies such as ASP.NET, JavaScript, Bootstrap, and Web Service have been used for developing the application; it is hosted in the Cloud and it is powered by Microsoft Azure Cloud computing Service. A clinic has been selected to use and evaluate the application. The evaluation results of the application show that the application meets its objectives of educating and managing patients. It can be updated and extended to use in various private and public hospitals and clinics for educating and managing patients.
如果没有管理软件,医院和诊所很难管理与病人和日常工作有关的文件。本文的目的是设计和开发一个基于web的牙科诊所应用程序,用于教育和管理患者。最新的web技术,如ASP。使用。NET、JavaScript、Bootstrap和Web Service进行开发;它托管在云中,由微软Azure云计算服务提供支持。已经选择了一家诊所来使用和评估应用程序。应用程序的评估结果表明,该应用程序达到了其教育和管理患者的目标。它可以更新和扩展到各种私立和公立医院和诊所,用于教育和管理病人。
{"title":"WEB-BASED DENTAL PATIENT EDUCATION AND MANAGEMENT APPLICATION","authors":"M. H. Saeed, Bahjat Taha Ahmed","doi":"10.26480/aim.01.2021.12.15","DOIUrl":"https://doi.org/10.26480/aim.01.2021.12.15","url":null,"abstract":"It is difficult for hospitals and clinics to manage their documents related to their patients and routine works without having management software. The purpose of this paper is to design and develop a web-based dental clinic application for educating and managing patients. Recent web technologies such as ASP.NET, JavaScript, Bootstrap, and Web Service have been used for developing the application; it is hosted in the Cloud and it is powered by Microsoft Azure Cloud computing Service. A clinic has been selected to use and evaluate the application. The evaluation results of the application show that the application meets its objectives of educating and managing patients. It can be updated and extended to use in various private and public hospitals and clinics for educating and managing patients.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85526262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ROLE OF ICT IN THE DISSEMINATION AND ACCESS OF AGRICULTURAL INFORMATION BY SMALLHOLDER FARMERS IN SOUTH EASTERN KENYA 信息通信技术在肯尼亚东南部小农传播和获取农业信息方面的作用
Pub Date : 2021-01-01 DOI: 10.26480/aim.01.2021.31.41
Daisy Mbucu Ireri, Mzee Awuor, J. Ogalo, D. Nzuki
The agricultural sector has been described as the engine for economic growth and improved livelihoods in Africa. However, the sector has been in decline over many years and poor farmers have largely remained poor with 73 percent of the people living in rural areas subsisting on less than a dollar a day. The efforts to ensure global food security face an ever-expanding list of challenges such as climate change, reduced biodiversity, increasingly frequent natural disasters, food price volatility and inefficient supply chains. The inaccessibility of technological and market information has been cited as the major reason for the low productivity in African agriculture knowledge and information have become the major drivers of social and economic transformation in the world. The objective of the paper was to demonstrate the role of ICT in the dissemination and access of agricultural information by smallholder farmers in South Eastern Kenya. The researcher used mixed research method because it had the ability to explore both quantitative and qualitative research methods hence the researcher had the opportunity to use a wide variety of techniques that aided the research process. This study was carried out in Machakos, Makueni and Kitui Counties of Kenya. The local community were mostly smallholder farmers that relied on rain fed agriculture for crop farming of maize, beans, cow pea, pigeon pea and green grams. The study captured in detail the information needs of the farmers by addressing what they required in the course of normal agricultural activities. It was found out that farmers required information on soil management, pest management, use of fertilizer, weather forecast and financial management tips for mainly improving their productivity. The study concluded that there were positive outcome whenever accurate and timely information was disseminated to the farmer which led to higher quality of production and increased productivity.
农业部门被描述为非洲经济增长和改善生计的引擎。然而,该部门多年来一直在下降,贫困农民基本上仍然贫穷,73%的农村人口每天的生活费不到一美元。确保全球粮食安全的努力面临着越来越多的挑战,如气候变化、生物多样性减少、自然灾害日益频繁、粮食价格波动和供应链效率低下。技术和市场信息的难以获取被认为是非洲农业生产力低下的主要原因。知识和信息已成为世界社会和经济转型的主要驱动力。该文件的目的是展示信息和通信技术在肯尼亚东南部小农传播和获取农业信息方面的作用。研究人员使用混合研究方法,因为它有能力探索定量和定性研究方法,因此研究人员有机会使用各种各样的技术来辅助研究过程。这项研究是在肯尼亚的马查科斯、马库尼和基图伊县进行的。当地社区大多是小农,依靠雨养农业种植玉米、豆类、豇豆、鸽豆和绿克。该研究通过解决农民在正常农业活动过程中所需要的问题,详细地了解了农民的信息需求。调查发现,农民需要土壤管理、病虫害管理、肥料使用、天气预报和财务管理方面的信息,主要是为了提高他们的生产力。该研究的结论是,只要向农民传播准确和及时的信息,就会产生积极的结果,从而提高生产质量和提高生产力。
{"title":"ROLE OF ICT IN THE DISSEMINATION AND ACCESS OF AGRICULTURAL INFORMATION BY SMALLHOLDER FARMERS IN SOUTH EASTERN KENYA","authors":"Daisy Mbucu Ireri, Mzee Awuor, J. Ogalo, D. Nzuki","doi":"10.26480/aim.01.2021.31.41","DOIUrl":"https://doi.org/10.26480/aim.01.2021.31.41","url":null,"abstract":"The agricultural sector has been described as the engine for economic growth and improved livelihoods in Africa. However, the sector has been in decline over many years and poor farmers have largely remained poor with 73 percent of the people living in rural areas subsisting on less than a dollar a day. The efforts to ensure global food security face an ever-expanding list of challenges such as climate change, reduced biodiversity, increasingly frequent natural disasters, food price volatility and inefficient supply chains. The inaccessibility of technological and market information has been cited as the major reason for the low productivity in African agriculture knowledge and information have become the major drivers of social and economic transformation in the world. The objective of the paper was to demonstrate the role of ICT in the dissemination and access of agricultural information by smallholder farmers in South Eastern Kenya. The researcher used mixed research method because it had the ability to explore both quantitative and qualitative research methods hence the researcher had the opportunity to use a wide variety of techniques that aided the research process. This study was carried out in Machakos, Makueni and Kitui Counties of Kenya. The local community were mostly smallholder farmers that relied on rain fed agriculture for crop farming of maize, beans, cow pea, pigeon pea and green grams. The study captured in detail the information needs of the farmers by addressing what they required in the course of normal agricultural activities. It was found out that farmers required information on soil management, pest management, use of fertilizer, weather forecast and financial management tips for mainly improving their productivity. The study concluded that there were positive outcome whenever accurate and timely information was disseminated to the farmer which led to higher quality of production and increased productivity.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80397602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IMPLEMENTATION OF PARTICLE SWARM OPTIMIZATION ALGORITHM IN CROSS-DOCKING DISTRIBUTION PROBLEM 粒子群优化算法在交叉对接分配问题中的实现
Pub Date : 2021-01-01 DOI: 10.26480/aim.01.2021.16.20
Samuel Ro Paian Purba, Harummi S. Amarilies, Nur Layi Rachmawati, A. P. Redi
In order to increase customer satisfaction and maintain customer loyalty, logistics service providers must pay attention to the quality of service provided, one of which is effecive warehouse management, especially in scheduling the arrival and departure of products transporting vehicles. Therefore, this study discusses warehouse management in form of delivery and pickup scheduling at PT XYZ’s cross-docking warehouse. This study aims to obtain effective delivery and pickup scheduling and minimize operational costs. The Cross-docking Distribution Problem is an np-hard problem, so the Particle Swarm Optimization algorithm is used, which is a metaheuristic method in finding solutions. Based on the result, it was found that effective delivery and pickup scheduling was able to save inventory cost by 3.12% and reduce the percentage of delays from 73% to 0%. The scheduling process using Particle Swarm Optimization requires an average computation time of 26.2 seconds.
为了提高客户满意度,保持客户忠诚度,物流服务商必须注重所提供的服务质量,其中之一就是有效的仓库管理,特别是在安排产品运输车辆的到达和离开方面。因此,本研究讨论了PT XYZ交叉对接仓库的交付和取件调度形式的仓库管理。本研究的目的是获得有效的送货和取件调度,并使运营成本最小化。交叉对接分布问题是一个np-hard问题,因此采用粒子群优化算法,这是一种元启发式的求解方法。结果表明,有效的派送提货调度可以节省3.12%的库存成本,将延迟率从73%降低到0%。采用粒子群算法的调度过程平均计算时间为26.2秒。
{"title":"IMPLEMENTATION OF PARTICLE SWARM OPTIMIZATION ALGORITHM IN CROSS-DOCKING DISTRIBUTION PROBLEM","authors":"Samuel Ro Paian Purba, Harummi S. Amarilies, Nur Layi Rachmawati, A. P. Redi","doi":"10.26480/aim.01.2021.16.20","DOIUrl":"https://doi.org/10.26480/aim.01.2021.16.20","url":null,"abstract":"In order to increase customer satisfaction and maintain customer loyalty, logistics service providers must pay attention to the quality of service provided, one of which is effecive warehouse management, especially in scheduling the arrival and departure of products transporting vehicles. Therefore, this study discusses warehouse management in form of delivery and pickup scheduling at PT XYZ’s cross-docking warehouse. This study aims to obtain effective delivery and pickup scheduling and minimize operational costs. The Cross-docking Distribution Problem is an np-hard problem, so the Particle Swarm Optimization algorithm is used, which is a metaheuristic method in finding solutions. Based on the result, it was found that effective delivery and pickup scheduling was able to save inventory cost by 3.12% and reduce the percentage of delays from 73% to 0%. The scheduling process using Particle Swarm Optimization requires an average computation time of 26.2 seconds.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87093396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
EXPLOITATION OF INTERNET BY MILLENNIALS ENSUING COVID PANDEMIC 新冠疫情后千禧一代对互联网的利用
Pub Date : 2021-01-01 DOI: 10.26480/aim.01.2021.25.30
Kalyan Bhandari
21st century has been era of digitalization which is totally assisted by internet networks. Internet has been developing its wings in every possible way in order to make human life simpler, luxurious and entertaining. Withholding many beauties, it has been favoriting all generation people. But young millennials who are born simultaneously with the emerge of internet technology are found to be more fascinated and attracted by this technology and thus are in the 1st rank in internet use. The COVID-19 pandemic has something powerful to change many things. Along with human health and psychology, it had also changed the internet use pattern of the people worldwide. In this review, impact of pandemic on internet use behavior mostly by college studying youths is analyzed. Time spent by surfing internet is hiked unexpectedly due to this pandemic as daily scheduled has of many citizens is altered. It is found that some of the students have taken this as an opportunity to explore and develop knowledge about new technologies. Online class has been normalized in many places and they are not deprived of education. But various disastrous impact is also seen. Third world countries students are having problem in study due to poor internet management. Students are facing problem of Internet Addiction using it all time. Mental stress, anxiety, aggressiveness, etc. can be seen when they are disconnected from internet for certain period of time. Here seems to drag attention of socialists and psychologist towards measures that needs to be adopted to minimize these dreadful impacts of internet use and emphasize more on benefits.
21世纪是一个完全由互联网辅助的数字化时代。为了使人类的生活更简单、奢华和娱乐,互联网已经以各种可能的方式发展了它的翅膀。它保留了许多美丽,一直受到所有人的喜爱。但与互联网技术同时诞生的千禧一代年轻人对互联网技术更加着迷和吸引,因此在互联网使用方面排名第一。COVID-19大流行具有改变许多事情的强大力量。随着人类健康和心理的变化,它也改变了全世界人们的互联网使用模式。本文分析了流行性疾病对大学生网络使用行为的影响。由于新冠肺炎疫情,许多市民的日常日程被改变,上网时间出乎意料地增加。我们发现,一些学生将此作为探索和发展新技术知识的机会。网络课堂在很多地方已经常态化,他们并没有被剥夺受教育的权利。但各种灾难性影响也可见一斑。由于互联网管理不善,第三世界国家的学生在学习上遇到了问题。学生们一直面临着网络成瘾的问题。当他们一段时间不上网时,会出现精神压力、焦虑、攻击性等症状。这似乎将社会主义者和心理学家的注意力转移到需要采取的措施上,以尽量减少互联网使用的可怕影响,并更多地强调其好处。
{"title":"EXPLOITATION OF INTERNET BY MILLENNIALS ENSUING COVID PANDEMIC","authors":"Kalyan Bhandari","doi":"10.26480/aim.01.2021.25.30","DOIUrl":"https://doi.org/10.26480/aim.01.2021.25.30","url":null,"abstract":"21st century has been era of digitalization which is totally assisted by internet networks. Internet has been developing its wings in every possible way in order to make human life simpler, luxurious and entertaining. Withholding many beauties, it has been favoriting all generation people. But young millennials who are born simultaneously with the emerge of internet technology are found to be more fascinated and attracted by this technology and thus are in the 1st rank in internet use. The COVID-19 pandemic has something powerful to change many things. Along with human health and psychology, it had also changed the internet use pattern of the people worldwide. In this review, impact of pandemic on internet use behavior mostly by college studying youths is analyzed. Time spent by surfing internet is hiked unexpectedly due to this pandemic as daily scheduled has of many citizens is altered. It is found that some of the students have taken this as an opportunity to explore and develop knowledge about new technologies. Online class has been normalized in many places and they are not deprived of education. But various disastrous impact is also seen. Third world countries students are having problem in study due to poor internet management. Students are facing problem of Internet Addiction using it all time. Mental stress, anxiety, aggressiveness, etc. can be seen when they are disconnected from internet for certain period of time. Here seems to drag attention of socialists and psychologist towards measures that needs to be adopted to minimize these dreadful impacts of internet use and emphasize more on benefits.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73579561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Acta Informatica Malaysia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1