Pub Date : 2022-01-01DOI: 10.26480/aim.02.2022.55.61
Samuel Olorunfemi Adams, Ednah Azikwe, Mohammed Anono Zubair
Due to the growing number of intrusions in local networks and the internet, it has become so universal that institution increasingly implements many structures that investigate information technology security violations. This study aimed to process, classify and predict the intrusion detection accuracy of some selected network attacks using the artificial neural network (ANN) technique. Five important attacks, namely; Buffer overflow, Denial of Service (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and PROBE were chosen from the KDD CUPP’99 information and intrusion identification accuracy was investigated with artificial neural network (ANN) modeling technique. Findings from the classification show that out of the procedures utilized to establish the ANN model, 27262 of the 45528 buffer overflow are classified appropriately, 7903 of the 45528 DoS attacks are arranged appropriately, 1371 of the 45528 U2R are classified appropriately, 431 of the 45528 R2L are arranged appropriately and, 8304 of the 45528 PROBE are classified appropriately. Comprehensively, about 99.1% of the training proceedings are arranged properly, equivalent to 0.9% erroneous classification while the testing specimen assisted to confirm the model with 99.1% of the attacks were appropriately arranged by the ANN equation. This support that, comprehensively, the ANN equation is precise about the classification and prediction of the five attacks investigated in this study.
{"title":"ARTIFICIAL NEURAL NETWORK ANALYSIS OF SOME SELECTED KDD CUP 99 DATASET FOR INTRUSION DETECTION","authors":"Samuel Olorunfemi Adams, Ednah Azikwe, Mohammed Anono Zubair","doi":"10.26480/aim.02.2022.55.61","DOIUrl":"https://doi.org/10.26480/aim.02.2022.55.61","url":null,"abstract":"Due to the growing number of intrusions in local networks and the internet, it has become so universal that institution increasingly implements many structures that investigate information technology security violations. This study aimed to process, classify and predict the intrusion detection accuracy of some selected network attacks using the artificial neural network (ANN) technique. Five important attacks, namely; Buffer overflow, Denial of Service (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and PROBE were chosen from the KDD CUPP’99 information and intrusion identification accuracy was investigated with artificial neural network (ANN) modeling technique. Findings from the classification show that out of the procedures utilized to establish the ANN model, 27262 of the 45528 buffer overflow are classified appropriately, 7903 of the 45528 DoS attacks are arranged appropriately, 1371 of the 45528 U2R are classified appropriately, 431 of the 45528 R2L are arranged appropriately and, 8304 of the 45528 PROBE are classified appropriately. Comprehensively, about 99.1% of the training proceedings are arranged properly, equivalent to 0.9% erroneous classification while the testing specimen assisted to confirm the model with 99.1% of the attacks were appropriately arranged by the ANN equation. This support that, comprehensively, the ANN equation is precise about the classification and prediction of the five attacks investigated in this study.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":"161 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73309004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.26480/aim.01.2022.17.21
O.J Elugbadebo, A. A. Orunsolu, S. A. Akinyele, S. I. Salawu
Authentication through the use of passwords usually allow users to access resources in a computer or automated installations. However, remembering such passwords is often a problem for most users due to complex nature of most stong password. As a viable alternative, graphical passwords were introduced to complement the security problems in this method of authentication. Therefore, this papr proposes the concept of a graphical password authentication system using hybrid approach. This approach that allows users to identity a number of images during the registration process and then requested to draw a pattern on each image in a pre-defined order to complete the system approach. This process is represented via a three-stage scheme which consists of the Registration phase, the Login phase and the Authentication phase (RLA). The evaluation was carried out using the comparative study that involves generation of secure graphical password. This methodology is often refered to as Educating Users to Generate Secure Graphical Password Secrets (EUSGPAS). The evaluation involved 200 purposively selected participants who were made to use the new system over six weeks. Experimental results of ESGAS and EUSGPAS indicated a mean success rate of 100%, 97%, 100% and 99%, 96%, 98.9% with a mean completion time of 29.71s and 30.89s respectively. These results indicated the merits of the proposed method over the EUSGPAS approach.
{"title":"AN EFFICIENT AND SECURED GRAPHICAL AUTHENTICATION SYSTEM","authors":"O.J Elugbadebo, A. A. Orunsolu, S. A. Akinyele, S. I. Salawu","doi":"10.26480/aim.01.2022.17.21","DOIUrl":"https://doi.org/10.26480/aim.01.2022.17.21","url":null,"abstract":"Authentication through the use of passwords usually allow users to access resources in a computer or automated installations. However, remembering such passwords is often a problem for most users due to complex nature of most stong password. As a viable alternative, graphical passwords were introduced to complement the security problems in this method of authentication. Therefore, this papr proposes the concept of a graphical password authentication system using hybrid approach. This approach that allows users to identity a number of images during the registration process and then requested to draw a pattern on each image in a pre-defined order to complete the system approach. This process is represented via a three-stage scheme which consists of the Registration phase, the Login phase and the Authentication phase (RLA). The evaluation was carried out using the comparative study that involves generation of secure graphical password. This methodology is often refered to as Educating Users to Generate Secure Graphical Password Secrets (EUSGPAS). The evaluation involved 200 purposively selected participants who were made to use the new system over six weeks. Experimental results of ESGAS and EUSGPAS indicated a mean success rate of 100%, 97%, 100% and 99%, 96%, 98.9% with a mean completion time of 29.71s and 30.89s respectively. These results indicated the merits of the proposed method over the EUSGPAS approach.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83368713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-29DOI: 10.26480/aim.01.2021.42.47
P. Ghimire
This article strives to explore the need of digitalization of indigenous knowledge for socio economic development and its effective management. The best use of natural resources is aided by the indigenous practices providing invaluable knowledge. In these modern days of technological advancement, it is seen that this knowledge is often being ignored. Naturally rich countries like Nepal, which holds innumerable counts of Indigenous practices, no any considerable efforts have been seen to understand the scientific basis of this knowledge. Studies have shown that most of the world’s natural resources, along with digitally born resources have been vanished and due to neglectism, some cannot even be recovered. So, in order to provide long term preservation and global access to Indigenous Knowledge, digitalization can be viewed as a remarkable tool. The introduction of new technology and communication channels are changing the way how we gain knowledge. Many of us are considered to be living in a digital age, this era however is having an effect on cultural/traditional/indigenous knowledge and create new challenges for indigenous communities. Documentation and digitalization of Indigenous knowledge should be included in the curricula of environment and sustainable development as a cross-cutting issue.
{"title":"DIGITALIZATION OF INDIGENOUS KNOWLEDGE IN NEPAL – REVIEW ARTICLE","authors":"P. Ghimire","doi":"10.26480/aim.01.2021.42.47","DOIUrl":"https://doi.org/10.26480/aim.01.2021.42.47","url":null,"abstract":"This article strives to explore the need of digitalization of indigenous knowledge for socio economic development and its effective management. The best use of natural resources is aided by the indigenous practices providing invaluable knowledge. In these modern days of technological advancement, it is seen that this knowledge is often being ignored. Naturally rich countries like Nepal, which holds innumerable counts of Indigenous practices, no any considerable efforts have been seen to understand the scientific basis of this knowledge. Studies have shown that most of the world’s natural resources, along with digitally born resources have been vanished and due to neglectism, some cannot even be recovered. So, in order to provide long term preservation and global access to Indigenous Knowledge, digitalization can be viewed as a remarkable tool. The introduction of new technology and communication channels are changing the way how we gain knowledge. Many of us are considered to be living in a digital age, this era however is having an effect on cultural/traditional/indigenous knowledge and create new challenges for indigenous communities. Documentation and digitalization of Indigenous knowledge should be included in the curricula of environment and sustainable development as a cross-cutting issue.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":"93 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90990486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-29DOI: 10.26480/aim.02.2021.58.61
Gaurav Sharma, A. Kapil
Security becomes the main concern when the resources are shared over a network for many purposes. For ease of use and time saving several services offered by banks and other financial companies are accessible over mobile apps and computers connected with the Internet. Intrusion detection (ID) is the act of detecting actions that attempt to compromise the confidentiality, integrity, or availability of a shared resource over a network. Intrusion detection does not include the prevention of intrusions. A different solution is required for intrusion prevention. The major intrusion detection technique is host-based where major accountabilities are taken by the server itself to detect relevant security attacks. In this paper, an intrusion detection algorithm using data mining is presented. The proposed algorithm is compared with the signature apriori algorithm for performance. The proposed algorithm observed better results. This framework may help to explore new areas of future research in increasing security in the banking and financial sector enabled by an intrusion detection system (IDS).
{"title":"INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR","authors":"Gaurav Sharma, A. Kapil","doi":"10.26480/aim.02.2021.58.61","DOIUrl":"https://doi.org/10.26480/aim.02.2021.58.61","url":null,"abstract":"Security becomes the main concern when the resources are shared over a network for many purposes. For ease of use and time saving several services offered by banks and other financial companies are accessible over mobile apps and computers connected with the Internet. Intrusion detection (ID) is the act of detecting actions that attempt to compromise the confidentiality, integrity, or availability of a shared resource over a network. Intrusion detection does not include the prevention of intrusions. A different solution is required for intrusion prevention. The major intrusion detection technique is host-based where major accountabilities are taken by the server itself to detect relevant security attacks. In this paper, an intrusion detection algorithm using data mining is presented. The proposed algorithm is compared with the signature apriori algorithm for performance. The proposed algorithm observed better results. This framework may help to explore new areas of future research in increasing security in the banking and financial sector enabled by an intrusion detection system (IDS).","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79831942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-29DOI: 10.26480/aim.02.2021.62.70
P. Chukwuere, J. Chukwuere, Dickson Adom
This study investigates the psychosocial impact of cyberbullying on social media among students in Nigeria, Ghana, Zimbabwe, and Cameroon. The study adopted a quantitative research methodology in collecting data from 99 students across the selected African countries using a well-designed electronic questionnaire (e-questionnaire). The study found that cyberbullying on social media has psychosocial implications for the student. Furthermore, the study revealed ways and strategies to mitigate the spread and act of cyberbullying of students on social media platforms. Conclusively, the study unpacked the psychosocial impacts of cyberbullying on students. Therefore, the research, without a doubt, contributed to an in-depth understanding of various aspects of the psychosocial impact of cyberbullying on social media on students and as well as a possible profound solution to mitigating cyberbullying.
{"title":"THE PSYCHOSOCIAL EFFECTS OF SOCIAL MEDIA CYBERBULLYING ON STUDENTS IN SELECTED AFRICAN COUNTRIES","authors":"P. Chukwuere, J. Chukwuere, Dickson Adom","doi":"10.26480/aim.02.2021.62.70","DOIUrl":"https://doi.org/10.26480/aim.02.2021.62.70","url":null,"abstract":"This study investigates the psychosocial impact of cyberbullying on social media among students in Nigeria, Ghana, Zimbabwe, and Cameroon. The study adopted a quantitative research methodology in collecting data from 99 students across the selected African countries using a well-designed electronic questionnaire (e-questionnaire). The study found that cyberbullying on social media has psychosocial implications for the student. Furthermore, the study revealed ways and strategies to mitigate the spread and act of cyberbullying of students on social media platforms. Conclusively, the study unpacked the psychosocial impacts of cyberbullying on students. Therefore, the research, without a doubt, contributed to an in-depth understanding of various aspects of the psychosocial impact of cyberbullying on social media on students and as well as a possible profound solution to mitigating cyberbullying.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84567762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-29DOI: 10.26480/aim.01.2021.53.57
A. A. Orunsolu, S. O. Kareem, S. Salawu, K.S Famuyiwa, O.J Elugbadebo
Heuristics-based anti-phishing systems are the most deployed solutions in cyberspace. This is due to their generalization feature which is capable of preventing zero-day attacks. However, this promising anti-phishing countermeasure is faced with the problem of managing the feature corpus for scale and complexity. In addition, managing the redundant feature during an upgrade is another factor. In this paper, an incremental component system is proposed to this problem. The proposed framework consists of atomic units and composite units. These units provide encapsulations through which feature corpus is built with ease of management and upgrade. The scheme provides both generic and specific frameworks for designing an anti-phishing scheme with effective management of feature vectors. Therefore, maintenance and updates can be integrated without the total collapse of the system. Hence, the proposed framework can be described as being fault tolerant.
{"title":"AN INCREMENTAL COMPONENT-BASED SYSTEM FOR MITIGATING PHISHING ATTACKS","authors":"A. A. Orunsolu, S. O. Kareem, S. Salawu, K.S Famuyiwa, O.J Elugbadebo","doi":"10.26480/aim.01.2021.53.57","DOIUrl":"https://doi.org/10.26480/aim.01.2021.53.57","url":null,"abstract":"Heuristics-based anti-phishing systems are the most deployed solutions in cyberspace. This is due to their generalization feature which is capable of preventing zero-day attacks. However, this promising anti-phishing countermeasure is faced with the problem of managing the feature corpus for scale and complexity. In addition, managing the redundant feature during an upgrade is another factor. In this paper, an incremental component system is proposed to this problem. The proposed framework consists of atomic units and composite units. These units provide encapsulations through which feature corpus is built with ease of management and upgrade. The scheme provides both generic and specific frameworks for designing an anti-phishing scheme with effective management of feature vectors. Therefore, maintenance and updates can be integrated without the total collapse of the system. Hence, the proposed framework can be described as being fault tolerant.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":"79 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90293644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.26480/aim.01.2021.12.15
M. H. Saeed, Bahjat Taha Ahmed
It is difficult for hospitals and clinics to manage their documents related to their patients and routine works without having management software. The purpose of this paper is to design and develop a web-based dental clinic application for educating and managing patients. Recent web technologies such as ASP.NET, JavaScript, Bootstrap, and Web Service have been used for developing the application; it is hosted in the Cloud and it is powered by Microsoft Azure Cloud computing Service. A clinic has been selected to use and evaluate the application. The evaluation results of the application show that the application meets its objectives of educating and managing patients. It can be updated and extended to use in various private and public hospitals and clinics for educating and managing patients.
{"title":"WEB-BASED DENTAL PATIENT EDUCATION AND MANAGEMENT APPLICATION","authors":"M. H. Saeed, Bahjat Taha Ahmed","doi":"10.26480/aim.01.2021.12.15","DOIUrl":"https://doi.org/10.26480/aim.01.2021.12.15","url":null,"abstract":"It is difficult for hospitals and clinics to manage their documents related to their patients and routine works without having management software. The purpose of this paper is to design and develop a web-based dental clinic application for educating and managing patients. Recent web technologies such as ASP.NET, JavaScript, Bootstrap, and Web Service have been used for developing the application; it is hosted in the Cloud and it is powered by Microsoft Azure Cloud computing Service. A clinic has been selected to use and evaluate the application. The evaluation results of the application show that the application meets its objectives of educating and managing patients. It can be updated and extended to use in various private and public hospitals and clinics for educating and managing patients.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85526262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.26480/aim.01.2021.31.41
Daisy Mbucu Ireri, Mzee Awuor, J. Ogalo, D. Nzuki
The agricultural sector has been described as the engine for economic growth and improved livelihoods in Africa. However, the sector has been in decline over many years and poor farmers have largely remained poor with 73 percent of the people living in rural areas subsisting on less than a dollar a day. The efforts to ensure global food security face an ever-expanding list of challenges such as climate change, reduced biodiversity, increasingly frequent natural disasters, food price volatility and inefficient supply chains. The inaccessibility of technological and market information has been cited as the major reason for the low productivity in African agriculture knowledge and information have become the major drivers of social and economic transformation in the world. The objective of the paper was to demonstrate the role of ICT in the dissemination and access of agricultural information by smallholder farmers in South Eastern Kenya. The researcher used mixed research method because it had the ability to explore both quantitative and qualitative research methods hence the researcher had the opportunity to use a wide variety of techniques that aided the research process. This study was carried out in Machakos, Makueni and Kitui Counties of Kenya. The local community were mostly smallholder farmers that relied on rain fed agriculture for crop farming of maize, beans, cow pea, pigeon pea and green grams. The study captured in detail the information needs of the farmers by addressing what they required in the course of normal agricultural activities. It was found out that farmers required information on soil management, pest management, use of fertilizer, weather forecast and financial management tips for mainly improving their productivity. The study concluded that there were positive outcome whenever accurate and timely information was disseminated to the farmer which led to higher quality of production and increased productivity.
{"title":"ROLE OF ICT IN THE DISSEMINATION AND ACCESS OF AGRICULTURAL INFORMATION BY SMALLHOLDER FARMERS IN SOUTH EASTERN KENYA","authors":"Daisy Mbucu Ireri, Mzee Awuor, J. Ogalo, D. Nzuki","doi":"10.26480/aim.01.2021.31.41","DOIUrl":"https://doi.org/10.26480/aim.01.2021.31.41","url":null,"abstract":"The agricultural sector has been described as the engine for economic growth and improved livelihoods in Africa. However, the sector has been in decline over many years and poor farmers have largely remained poor with 73 percent of the people living in rural areas subsisting on less than a dollar a day. The efforts to ensure global food security face an ever-expanding list of challenges such as climate change, reduced biodiversity, increasingly frequent natural disasters, food price volatility and inefficient supply chains. The inaccessibility of technological and market information has been cited as the major reason for the low productivity in African agriculture knowledge and information have become the major drivers of social and economic transformation in the world. The objective of the paper was to demonstrate the role of ICT in the dissemination and access of agricultural information by smallholder farmers in South Eastern Kenya. The researcher used mixed research method because it had the ability to explore both quantitative and qualitative research methods hence the researcher had the opportunity to use a wide variety of techniques that aided the research process. This study was carried out in Machakos, Makueni and Kitui Counties of Kenya. The local community were mostly smallholder farmers that relied on rain fed agriculture for crop farming of maize, beans, cow pea, pigeon pea and green grams. The study captured in detail the information needs of the farmers by addressing what they required in the course of normal agricultural activities. It was found out that farmers required information on soil management, pest management, use of fertilizer, weather forecast and financial management tips for mainly improving their productivity. The study concluded that there were positive outcome whenever accurate and timely information was disseminated to the farmer which led to higher quality of production and increased productivity.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80397602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.26480/aim.01.2021.16.20
Samuel Ro Paian Purba, Harummi S. Amarilies, Nur Layi Rachmawati, A. P. Redi
In order to increase customer satisfaction and maintain customer loyalty, logistics service providers must pay attention to the quality of service provided, one of which is effecive warehouse management, especially in scheduling the arrival and departure of products transporting vehicles. Therefore, this study discusses warehouse management in form of delivery and pickup scheduling at PT XYZ’s cross-docking warehouse. This study aims to obtain effective delivery and pickup scheduling and minimize operational costs. The Cross-docking Distribution Problem is an np-hard problem, so the Particle Swarm Optimization algorithm is used, which is a metaheuristic method in finding solutions. Based on the result, it was found that effective delivery and pickup scheduling was able to save inventory cost by 3.12% and reduce the percentage of delays from 73% to 0%. The scheduling process using Particle Swarm Optimization requires an average computation time of 26.2 seconds.
{"title":"IMPLEMENTATION OF PARTICLE SWARM OPTIMIZATION ALGORITHM IN CROSS-DOCKING DISTRIBUTION PROBLEM","authors":"Samuel Ro Paian Purba, Harummi S. Amarilies, Nur Layi Rachmawati, A. P. Redi","doi":"10.26480/aim.01.2021.16.20","DOIUrl":"https://doi.org/10.26480/aim.01.2021.16.20","url":null,"abstract":"In order to increase customer satisfaction and maintain customer loyalty, logistics service providers must pay attention to the quality of service provided, one of which is effecive warehouse management, especially in scheduling the arrival and departure of products transporting vehicles. Therefore, this study discusses warehouse management in form of delivery and pickup scheduling at PT XYZ’s cross-docking warehouse. This study aims to obtain effective delivery and pickup scheduling and minimize operational costs. The Cross-docking Distribution Problem is an np-hard problem, so the Particle Swarm Optimization algorithm is used, which is a metaheuristic method in finding solutions. Based on the result, it was found that effective delivery and pickup scheduling was able to save inventory cost by 3.12% and reduce the percentage of delays from 73% to 0%. The scheduling process using Particle Swarm Optimization requires an average computation time of 26.2 seconds.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87093396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.26480/aim.01.2021.25.30
Kalyan Bhandari
21st century has been era of digitalization which is totally assisted by internet networks. Internet has been developing its wings in every possible way in order to make human life simpler, luxurious and entertaining. Withholding many beauties, it has been favoriting all generation people. But young millennials who are born simultaneously with the emerge of internet technology are found to be more fascinated and attracted by this technology and thus are in the 1st rank in internet use. The COVID-19 pandemic has something powerful to change many things. Along with human health and psychology, it had also changed the internet use pattern of the people worldwide. In this review, impact of pandemic on internet use behavior mostly by college studying youths is analyzed. Time spent by surfing internet is hiked unexpectedly due to this pandemic as daily scheduled has of many citizens is altered. It is found that some of the students have taken this as an opportunity to explore and develop knowledge about new technologies. Online class has been normalized in many places and they are not deprived of education. But various disastrous impact is also seen. Third world countries students are having problem in study due to poor internet management. Students are facing problem of Internet Addiction using it all time. Mental stress, anxiety, aggressiveness, etc. can be seen when they are disconnected from internet for certain period of time. Here seems to drag attention of socialists and psychologist towards measures that needs to be adopted to minimize these dreadful impacts of internet use and emphasize more on benefits.
{"title":"EXPLOITATION OF INTERNET BY MILLENNIALS ENSUING COVID PANDEMIC","authors":"Kalyan Bhandari","doi":"10.26480/aim.01.2021.25.30","DOIUrl":"https://doi.org/10.26480/aim.01.2021.25.30","url":null,"abstract":"21st century has been era of digitalization which is totally assisted by internet networks. Internet has been developing its wings in every possible way in order to make human life simpler, luxurious and entertaining. Withholding many beauties, it has been favoriting all generation people. But young millennials who are born simultaneously with the emerge of internet technology are found to be more fascinated and attracted by this technology and thus are in the 1st rank in internet use. The COVID-19 pandemic has something powerful to change many things. Along with human health and psychology, it had also changed the internet use pattern of the people worldwide. In this review, impact of pandemic on internet use behavior mostly by college studying youths is analyzed. Time spent by surfing internet is hiked unexpectedly due to this pandemic as daily scheduled has of many citizens is altered. It is found that some of the students have taken this as an opportunity to explore and develop knowledge about new technologies. Online class has been normalized in many places and they are not deprived of education. But various disastrous impact is also seen. Third world countries students are having problem in study due to poor internet management. Students are facing problem of Internet Addiction using it all time. Mental stress, anxiety, aggressiveness, etc. can be seen when they are disconnected from internet for certain period of time. Here seems to drag attention of socialists and psychologist towards measures that needs to be adopted to minimize these dreadful impacts of internet use and emphasize more on benefits.","PeriodicalId":53122,"journal":{"name":"Acta Informatica Malaysia","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73579561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}