Acta Informatica Malaysia (AIM)
2017 - 2024
Current editor(s): Associate Professor Dr. Shahreen Kasim From Zibeline International Publishing Bibliographic data for series maintained by Zibeline International Publishing ( this e-mail address is bad, please contact ). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 8, issue 2, 2024
- FORECASTING OF POTATO YIELD ESTIMATION BY SATELLITE BASED REMOTE SENSING TECHNIQUE pp. 49-55

- Mohammad Mukhlesur Rahman, Mohammad Amirul Islam, Md. Golam Mahboob, Nur Mohammad and Istiak Ahmed
- MAKE AN IMPRESSION IN 60 SECONDS: VIDEO ON SOCIAL MEDIA, THE MAIN WEAPON OF PROFESSIONAL MARKETERS – TRENDS 2023 pp. 56-59

- Hilda
- THE ERA OF DIGITAL LITERACY: HIGHLIGHTING GEN Z’S 60% ADVANTAGE IN TECHNOLOGY UNDERSTANDING pp. 60-63

- Hilda
- DESIGN OF TRANSLATION AMBIGUITY ELIMINATION METHOD BASED ON RECURRENT NEURAL NETWORKS pp. 64-68

- Jianzhou Cui
- DESIGN OF A PROPERTY PRODUCT RECOMMENDATION SYSTEM USING ASSOCIATION RULE METHOD BASED ON USER INTERACTION PATTERNS pp. 69-78

- Yudi Irawan Chandra, Susi Wagiyati Purtiningrum, Dian Gustina, Nafisah Yuliani, Fahrul Nurzaman, Jhonny Z.a and Agus Wismo
- RESEARCH ON THE INTEGRATION OF ARTIFICIAL INTELLIGENCE IN MBA LITERATURE SEARCH COURSE INSTRUCTION pp. 79-83

- Xiaofeng Zhang and Siqi Zhang
- UNLEASHING THE POWER OF VISUAL ENGAGEMENT: ANALYSIS OF VIDEO MARKETING STRATEGIES USED BY RESORTS IN LAIYA, BATANGAS pp. 84-86

- Charmaine P. Galano
- A QUALITATIVE ANALYSIS OF THE INFLUENCE OF MANAGEMENT INFORMATION SYSTEMS ON ORGANIZATIONAL DECISION-MAKING PROCESSES pp. 87-93

- Mubashshir Bin Mahbub and Taskin Ahmed Mushfiq Nabil
Volume 8, issue 1, 2024
- RESEARCH ON THE CONSTRUCTION OF A KNOWLEDGE GRAPH OF INTERACTION RISK BETWEEN HOME INVASION THEFT OFFENDERS AND VICTIMS BASED ON INFORMATION EXTRACTION TECHNOLOGY pp. 01-04

- Qi Zhang Danyang Li and Tuo Sh
- EMERGING TECHNOLOGIES IN PUBLIC HEALTH CAMPAIGNS: ARTIFICIAL INTELLIGENCE AND BIG DATA pp. 05-10

- Oluwatoyin Ayo-Farai, Yvonne Oshevwe Okoro, Chinedu Paschal Maduka, Chiamaka Chinaemelum Okongwu and Olamide Tolulope Sodamade
- REVIEWING ADVANCEMENT IN TELECOMMUNICATIONS INFRASTRUCTURE: A COMPARATIVE STUDY OF AFRICA AND THE USA pp. 11-18

- Chinedu Alex Ezeigweneme, Aniekan Akpan Umoh, Valentine Ikenna Ilojianya and Abimbola Oluwatoyin Adegbite
- RELATIONSHIP BETWEEN NATIVE INTELLIGENCE (NI) AND ARTIFICIAL INTELLIGENCE (AI): AN OVERVIEW pp. 19-21

- Bawallah Musa Adesola, Kehinde Odole, Stephen Olubusola Ilugbo, Ojo Omonijo Dare, Owele Boye Agatha and Hadiza Mali Bukar
- INVESTIGATING USER PERCEPTIONS OF AI TECHNOLOGY AND ITS ETHICAL IMPLICATIONS ON EMPLOYMENT DYNAMICS AND BIAS pp. 22-25

- Saleh Ahmed Jalal Siam and Mubashshir Bin Mahbub
- THERMAL IMAGES PRE-PROCESSING FOR EARLY DETECTION OF BREAST CANCER: A PROGRESSIVE REVIEW pp. 26-31

- Azman Brahim Llaguno Garcia, Arturo Orellana Garcia and Vivian Estrada Senti
- APPLIED AI IN NEOM CONSTRUCTION PROJECTS: THE POTENTIAL IMPACT OF AI IN ENHANCING PROJECTS SUCCESS pp. 32-44

- Mohammad Allouz and Mohammad Aljaafreh
- BOOSTING INDONESIA’S DIGITAL COMPETITIVENESS: INSIGHTS FROM THE 2023 EAST VENTURES INDEX pp. 45-48

- Hilda
Volume 7, issue 2, 2023
- A REVIEW OF CONVOLUTIONAL NEURAL NETWORK IN EMERGING TRENDS AND OPPORTUNITIES IN PRECISION AGRICULTURE pp. 67-73

- Amit Hasan Sadhin and Reshad Rayhan
- IMPLEMENTATION OF AHP-MOORA APPROACH SELECTION OF WEB-BASED MORTGAGE PROVIDER BANKS pp. 74-82

- Rudi Sutomo and Herdiyanto Putra
- FAST DEVELOPMENT KANGEAN ISLAND TOURISM WEBSITE USING MAF-INC MODEL pp. 83-91

- Andy Rachman, Muchamad Kurniawan, Choirul Anam, Ricky Eka Putra, Nanang Fakhrur Rozi, Sulistyowati and Adib Pakarbudi
- OPTIMIZATION OF QUANTITATIVE RESEARCH METHODS IN SOCIAL SCIENCES IN THE ERA OF BIG DATA pp. 92-96

- Yirui Song
- RESEARCH ON KEYWORD MINING OF ACADEMIC LIBRARY SUBJECT SERVICE pp. 97-100

- Fan Zhang
- DESIGN AND RESEARCH OF AUTOMATIC STATION BUFR DATA EMERGENCY BACKUP PLATFORM BASED ON HYBRID PROGRAMMING pp. 101-104

- Jie Fu, Hao Liu, Peng Gao and Juan Xu
- THINKING ON THE INFORMATION CONSTRUCTION AND STANDARDIZED MANAGEMENT OF UNIVERSITY CONSTRUCTION ENGINEERING ARCHIVES pp. 105-107

- Feiyan Zhang
- STUDY ON THE FEASIBILITY, CONDITIONS AND MAIN TIMING OF THE LINKAGE SPACE EVOLUTION OF THE NICHE REAL ESTATE MARKET UNDER THE BACKGROUND OF BIG DATA pp. 108-112

- Junqi Liu, Yucong Hu, Hong Liu, Jiangtao Li, Jiangtao Li, Lin Zhou, Changyou Chen and Bin Tang
- LIBRARY AND INFORMATION SERVICES IN THE DIGITAL AGE: OPPORTUNITIES AND CHALLENGES pp. 113-121

- Chibuike Daraojimba, Okeoma Onunka, Tochukwu Onunka, Akeeb Adepoju Fawole and Ife Jesuseun Adeleke
- CHALLENGES AND OPPORTUNITIES IN THE IMPLEMENTATION OF BIG DATA ANALYTICS IN MANAGEMENT INFORMATION SYSTEMS IN BANGLADESH pp. 122-130

- Md Mehedi Hasan Emon, Golam Mustafa MD. Nurullah Rabbani and Avishek Nath
Volume 7, issue 1, 2023
- TRANSFER LEARNING MODELS COMPARISON FOR DETECTING AND DIAGNOSING SKIN CANCER pp. 01-07

- Peshraw Ahmed Abdalla, Abdalbasit Mohammed Qadir, Omed Jamal Rashid, Sarkhel H. Taher Karim, Bashdar Abdalrahman Mohammed and Karzan Jaza Ghafoor
- A COMPARATIVE STUDY USING 2D CNN AND TRANSFER LEARNING TO DETECT AND CLASSIFY ARABIC-SCRIPT-BASED SIGN LANGUAGE pp. 08-14

- Karwan Mahdi Hama Rawf, Aree Ali Mohammed, Ayub Othman Abdulrahman, Peshraw Ahmed Abdalla and Karzan J. Ghafor
- CONSUMER CONCERNS ON SMART METER USAGE IN MALAYSIA pp. 15-18

- Afida Jemat and Siti Nur Hidayah Malek
- A REVIEW ON THE IMPACT OF CYBERSECURITY CRIMES IN FINANCIAL INSTITUTIONS DURING THE TIME OF COVID-19 pp. 19-23

- Abthal Abdajabar and Nur Arzilawati Md Yunus
- ADOPTION OF ARTIFICIAL INTELLIGENCE IN THE PHILIPPINE HOTEL AND LEISURE INDUSTRY: AN ASSESSMENT pp. 24-28

- Marierose P. Valenzuela, Lorena H. Garcia, Ismaela Bawica, Wendy Sadang and Eduardo R. Lalas
- REAL-TIME TOMATO LEAF DISEASE CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK pp. 29-32

- Amit Hasan Sadhin
- IMPACT OF ICTS USAGE ON SMALLHOLDER FARMER’S ADAPTATION STRATEGIES: A STRUCTURAL EQUATION MODELING STUDY IN NIGER STATE pp. 33-37

- Isah Shehu Nabara, Mohammad Yakubu and Abubakar Shehu Umar
- A NEW SOFT SET OPERATION: COMPLEMENTARY SOFT BINARY PIECEWISE UNION (∪) OPERATION pp. 38-53

- Aslıhan Sezgin, Fitnat Nur Aybek and Nurcan Bilgili Güngör
- CYBERSECURITY IN U.S. AND NIGERIA BANKING AND FINANCIAL INSTITUTIONS: REVIEW AND ASSESSING RISKS AND ECONOMIC IMPACTS pp. 54-62

- Chibuike Daraojimba, Okeoma Onunka, Ayoola Maxwell Alabi, Chiedozie Marius Okafor, Anwuli Nkemchor Obiki-Osafiele and Tochukwu Onunka
- ONLINE NEWS STORIES ON THE 2022 PRESIDENTIAL CANDIDATES pp. 63-66

- Yolanda L. Pasia
Volume 6, issue 2, 2022
- CONCEPTUAL DESIGN IMPACTS IN NEW NORMAL ERA: THE USE OF ARTIFICIAL INTELLIGENCE (AI) AND INTERNET OF THINGS (IOT) (CASE STUDIES: CLASS ROOM AND RESTAURANT) pp. 39-42

- Ahmad Muhammad Thantawi and Sri Astuti Indriyati
- A DEEP LEARNING MODEL FOR FACE RECOGNITION IN PRESENCE OF MASK pp. 43-46

- Kalembo Vikalwe Shakrani, Ngonidzashe Mathew Kanyangarara, Prince Tinashe Parowa, Vibhor Gupta and Rajendra Kumar
- THE BENEFITS OF ARTIFICIAL INTELLIGENCE IN CONSTRUCTION PROJECTS pp. 47-51

- Mabrouka Shahat Younis and Elfargani
- APPLICATION OF INTERACTIVE VISUALIZATION IN THE PREFABRICATED BUILDING CONSTRUCTION PROCESS pp. 52-54

- Hao Liu
- ARTIFICIAL NEURAL NETWORK ANALYSIS OF SOME SELECTED KDD CUP 99 DATASET FOR INTRUSION DETECTION Abstract: Due to the growing number of intrusions in local networks and the internet, it has become so universal that institution increasingly implements many structures that investigate information technology security violations. This study aimed to process, classify and predict the intrusion detection accuracy of some selected network attacks using the artificial neural network (ANN) technique. Five important attacks, namely; Buffer overflow, Denial of Service (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and PROBE were chosen from the KDD CUPP’99 information and intrusion identification accuracy was investigated with artificial neural network (ANN) modeling technique. Findings from the classification show that out of the procedures utilized to establish the ANN model, 27262 of the 45528 buffer overflow are classified appropriately, 7903 of the 45528 DoS attacks are arranged appropriately, 1371 of the 45528 U2R are classified appropriately, 431 of the 45528 R2L are arranged appropriately and, 8304 of the 45528 PROBE are classified appropriately. Comprehensively, about 99.1% of the training proceedings are arranged properly, equivalent to 0.9% erroneous classification while the testing specimen assisted to confirm the model with99.1% of the attacks were appropriately arranged by the ANN equation. This support that, comprehensively, the ANN equation is precise about the classification and prediction of the five attacks investigated in this study pp. 55-61

- Samuel Olorunfemi Adams, Ednah Azikwe and Mohammed Anono Zubair
- ARE MILLENNIAL MOTHERS ADDICTED TO SMARTPHONES DURING A PANDEMIC: STUDY IN MALAYSIA AND INDONESIA pp. 62-66

- Herdian, Nur’aeni, Siti Aisyah Binti Panatik and Dyah Siti Septiningsih
- DIGITAL RESILIENCE: OPPORTUNITIES AND THREATS FOR ADOLESCENTS IN A VIRTUAL WORLD pp. 67-71

- Rr. Setyawati, Lia Mareza and Muhammad Hamka
Volume 6, issue 1, 2022
- SECURING DATA NETWORK FOR GROWING BUSINESS VPN ARCHITECTURES CELLULAR NETWORK CONNECTIVITY pp. 01-06

- Hillman Akhyar Damanik
- THE DEVELOPMENT OF A CLOUD-BASED UNIVERSITY RESEARCH REPOSITORY SOFTWARE USING A CONFIGURABLE SUBSCRIPTION MODEL pp. 07-12

- Reynaldo G. Alvez
- STATUS AND PROSPECTS OF ICT AMONG NEPALESE SMALLHOLDER FARMERS pp. 13-16

- Rejina Bachkain
- AN EFFICIENT AND SECURED GRAPHICAL AUTHENTICATION SYSTEM pp. 17-21

- Orunsolu A.a
- ENHANCING THE SECURITY OF AN ORGANIZATION FROM SHADOW IOT DEVICES USING BLOW-FISH ENCRYPTION STANDARD pp. 22-24

- M. Senthilkumar
- AN EMPIRICAL INVESTIGATION INTO THE EXTENT UNIVERSITY STUDENTS UTILISE MOBILE EDUCATIONAL APPLICATIONS FOR LEARNING pp. 25-33

- Kuttikattu Varughese John
- ACONVERGENCE OF MACHINE LEARNING AND STATISTICS TO PREDICT COVID-19 EVOLUTION pp. 34-38

- Madan Mohan Gupta and Ajay Singh
| |