EconPapers    
Economics at your fingertips  
 

Acta Informatica Malaysia (AIM)

2017 - 2024

Current editor(s): Associate Professor Dr. Shahreen Kasim

From Zibeline International Publishing
Bibliographic data for series maintained by Zibeline International Publishing ( this e-mail address is bad, please contact ).

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 8, issue 2, 2024

FORECASTING OF POTATO YIELD ESTIMATION BY SATELLITE BASED REMOTE SENSING TECHNIQUE pp. 49-55 Downloads
Mohammad Mukhlesur Rahman, Mohammad Amirul Islam, Md. Golam Mahboob, Nur Mohammad and Istiak Ahmed
MAKE AN IMPRESSION IN 60 SECONDS: VIDEO ON SOCIAL MEDIA, THE MAIN WEAPON OF PROFESSIONAL MARKETERS – TRENDS 2023 pp. 56-59 Downloads
Hilda
THE ERA OF DIGITAL LITERACY: HIGHLIGHTING GEN Z’S 60% ADVANTAGE IN TECHNOLOGY UNDERSTANDING pp. 60-63 Downloads
Hilda
DESIGN OF TRANSLATION AMBIGUITY ELIMINATION METHOD BASED ON RECURRENT NEURAL NETWORKS pp. 64-68 Downloads
Jianzhou Cui
DESIGN OF A PROPERTY PRODUCT RECOMMENDATION SYSTEM USING ASSOCIATION RULE METHOD BASED ON USER INTERACTION PATTERNS pp. 69-78 Downloads
Yudi Irawan Chandra, Susi Wagiyati Purtiningrum, Dian Gustina, Nafisah Yuliani, Fahrul Nurzaman, Jhonny Z.a and Agus Wismo
RESEARCH ON THE INTEGRATION OF ARTIFICIAL INTELLIGENCE IN MBA LITERATURE SEARCH COURSE INSTRUCTION pp. 79-83 Downloads
Xiaofeng Zhang and Siqi Zhang
UNLEASHING THE POWER OF VISUAL ENGAGEMENT: ANALYSIS OF VIDEO MARKETING STRATEGIES USED BY RESORTS IN LAIYA, BATANGAS pp. 84-86 Downloads
Charmaine P. Galano
A QUALITATIVE ANALYSIS OF THE INFLUENCE OF MANAGEMENT INFORMATION SYSTEMS ON ORGANIZATIONAL DECISION-MAKING PROCESSES pp. 87-93 Downloads
Mubashshir Bin Mahbub and Taskin Ahmed Mushfiq Nabil

Volume 8, issue 1, 2024

RESEARCH ON THE CONSTRUCTION OF A KNOWLEDGE GRAPH OF INTERACTION RISK BETWEEN HOME INVASION THEFT OFFENDERS AND VICTIMS BASED ON INFORMATION EXTRACTION TECHNOLOGY pp. 01-04 Downloads
Qi Zhang Danyang Li and Tuo Sh
EMERGING TECHNOLOGIES IN PUBLIC HEALTH CAMPAIGNS: ARTIFICIAL INTELLIGENCE AND BIG DATA pp. 05-10 Downloads
Oluwatoyin Ayo-Farai, Yvonne Oshevwe Okoro, Chinedu Paschal Maduka, Chiamaka Chinaemelum Okongwu and Olamide Tolulope Sodamade
REVIEWING ADVANCEMENT IN TELECOMMUNICATIONS INFRASTRUCTURE: A COMPARATIVE STUDY OF AFRICA AND THE USA pp. 11-18 Downloads
Chinedu Alex Ezeigweneme, Aniekan Akpan Umoh, Valentine Ikenna Ilojianya and Abimbola Oluwatoyin Adegbite
RELATIONSHIP BETWEEN NATIVE INTELLIGENCE (NI) AND ARTIFICIAL INTELLIGENCE (AI): AN OVERVIEW pp. 19-21 Downloads
Bawallah Musa Adesola, Kehinde Odole, Stephen Olubusola Ilugbo, Ojo Omonijo Dare, Owele Boye Agatha and Hadiza Mali Bukar
INVESTIGATING USER PERCEPTIONS OF AI TECHNOLOGY AND ITS ETHICAL IMPLICATIONS ON EMPLOYMENT DYNAMICS AND BIAS pp. 22-25 Downloads
Saleh Ahmed Jalal Siam and Mubashshir Bin Mahbub
THERMAL IMAGES PRE-PROCESSING FOR EARLY DETECTION OF BREAST CANCER: A PROGRESSIVE REVIEW pp. 26-31 Downloads
Azman Brahim Llaguno Garcia, Arturo Orellana Garcia and Vivian Estrada Senti
APPLIED AI IN NEOM CONSTRUCTION PROJECTS: THE POTENTIAL IMPACT OF AI IN ENHANCING PROJECTS SUCCESS pp. 32-44 Downloads
Mohammad Allouz and Mohammad Aljaafreh
BOOSTING INDONESIA’S DIGITAL COMPETITIVENESS: INSIGHTS FROM THE 2023 EAST VENTURES INDEX pp. 45-48 Downloads
Hilda

Volume 7, issue 2, 2023

A REVIEW OF CONVOLUTIONAL NEURAL NETWORK IN EMERGING TRENDS AND OPPORTUNITIES IN PRECISION AGRICULTURE pp. 67-73 Downloads
Amit Hasan Sadhin and Reshad Rayhan
IMPLEMENTATION OF AHP-MOORA APPROACH SELECTION OF WEB-BASED MORTGAGE PROVIDER BANKS pp. 74-82 Downloads
Rudi Sutomo and Herdiyanto Putra
FAST DEVELOPMENT KANGEAN ISLAND TOURISM WEBSITE USING MAF-INC MODEL pp. 83-91 Downloads
Andy Rachman, Muchamad Kurniawan, Choirul Anam, Ricky Eka Putra, Nanang Fakhrur Rozi, Sulistyowati and Adib Pakarbudi
OPTIMIZATION OF QUANTITATIVE RESEARCH METHODS IN SOCIAL SCIENCES IN THE ERA OF BIG DATA pp. 92-96 Downloads
Yirui Song
RESEARCH ON KEYWORD MINING OF ACADEMIC LIBRARY SUBJECT SERVICE pp. 97-100 Downloads
Fan Zhang
DESIGN AND RESEARCH OF AUTOMATIC STATION BUFR DATA EMERGENCY BACKUP PLATFORM BASED ON HYBRID PROGRAMMING pp. 101-104 Downloads
Jie Fu, Hao Liu, Peng Gao and Juan Xu
THINKING ON THE INFORMATION CONSTRUCTION AND STANDARDIZED MANAGEMENT OF UNIVERSITY CONSTRUCTION ENGINEERING ARCHIVES pp. 105-107 Downloads
Feiyan Zhang
STUDY ON THE FEASIBILITY, CONDITIONS AND MAIN TIMING OF THE LINKAGE SPACE EVOLUTION OF THE NICHE REAL ESTATE MARKET UNDER THE BACKGROUND OF BIG DATA pp. 108-112 Downloads
Junqi Liu, Yucong Hu, Hong Liu, Jiangtao Li, Jiangtao Li, Lin Zhou, Changyou Chen and Bin Tang
LIBRARY AND INFORMATION SERVICES IN THE DIGITAL AGE: OPPORTUNITIES AND CHALLENGES pp. 113-121 Downloads
Chibuike Daraojimba, Okeoma Onunka, Tochukwu Onunka, Akeeb Adepoju Fawole and Ife Jesuseun Adeleke
CHALLENGES AND OPPORTUNITIES IN THE IMPLEMENTATION OF BIG DATA ANALYTICS IN MANAGEMENT INFORMATION SYSTEMS IN BANGLADESH pp. 122-130 Downloads
Md Mehedi Hasan Emon, Golam Mustafa MD. Nurullah Rabbani and Avishek Nath

Volume 7, issue 1, 2023

TRANSFER LEARNING MODELS COMPARISON FOR DETECTING AND DIAGNOSING SKIN CANCER pp. 01-07 Downloads
Peshraw Ahmed Abdalla, Abdalbasit Mohammed Qadir, Omed Jamal Rashid, Sarkhel H. Taher Karim, Bashdar Abdalrahman Mohammed and Karzan Jaza Ghafoor
A COMPARATIVE STUDY USING 2D CNN AND TRANSFER LEARNING TO DETECT AND CLASSIFY ARABIC-SCRIPT-BASED SIGN LANGUAGE pp. 08-14 Downloads
Karwan Mahdi Hama Rawf, Aree Ali Mohammed, Ayub Othman Abdulrahman, Peshraw Ahmed Abdalla and Karzan J. Ghafor
CONSUMER CONCERNS ON SMART METER USAGE IN MALAYSIA pp. 15-18 Downloads
Afida Jemat and Siti Nur Hidayah Malek
A REVIEW ON THE IMPACT OF CYBERSECURITY CRIMES IN FINANCIAL INSTITUTIONS DURING THE TIME OF COVID-19 pp. 19-23 Downloads
Abthal Abdajabar and Nur Arzilawati Md Yunus
ADOPTION OF ARTIFICIAL INTELLIGENCE IN THE PHILIPPINE HOTEL AND LEISURE INDUSTRY: AN ASSESSMENT pp. 24-28 Downloads
Marierose P. Valenzuela, Lorena H. Garcia, Ismaela Bawica, Wendy Sadang and Eduardo R. Lalas
REAL-TIME TOMATO LEAF DISEASE CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK pp. 29-32 Downloads
Amit Hasan Sadhin
IMPACT OF ICTS USAGE ON SMALLHOLDER FARMER’S ADAPTATION STRATEGIES: A STRUCTURAL EQUATION MODELING STUDY IN NIGER STATE pp. 33-37 Downloads
Isah Shehu Nabara, Mohammad Yakubu and Abubakar Shehu Umar
A NEW SOFT SET OPERATION: COMPLEMENTARY SOFT BINARY PIECEWISE UNION (∪) OPERATION pp. 38-53 Downloads
Aslıhan Sezgin, Fitnat Nur Aybek and Nurcan Bilgili Güngör
CYBERSECURITY IN U.S. AND NIGERIA BANKING AND FINANCIAL INSTITUTIONS: REVIEW AND ASSESSING RISKS AND ECONOMIC IMPACTS pp. 54-62 Downloads
Chibuike Daraojimba, Okeoma Onunka, Ayoola Maxwell Alabi, Chiedozie Marius Okafor, Anwuli Nkemchor Obiki-Osafiele and Tochukwu Onunka
ONLINE NEWS STORIES ON THE 2022 PRESIDENTIAL CANDIDATES pp. 63-66 Downloads
Yolanda L. Pasia

Volume 6, issue 2, 2022

CONCEPTUAL DESIGN IMPACTS IN NEW NORMAL ERA: THE USE OF ARTIFICIAL INTELLIGENCE (AI) AND INTERNET OF THINGS (IOT) (CASE STUDIES: CLASS ROOM AND RESTAURANT) pp. 39-42 Downloads
Ahmad Muhammad Thantawi and Sri Astuti Indriyati
A DEEP LEARNING MODEL FOR FACE RECOGNITION IN PRESENCE OF MASK pp. 43-46 Downloads
Kalembo Vikalwe Shakrani, Ngonidzashe Mathew Kanyangarara, Prince Tinashe Parowa, Vibhor Gupta and Rajendra Kumar
THE BENEFITS OF ARTIFICIAL INTELLIGENCE IN CONSTRUCTION PROJECTS pp. 47-51 Downloads
Mabrouka Shahat Younis and Elfargani
APPLICATION OF INTERACTIVE VISUALIZATION IN THE PREFABRICATED BUILDING CONSTRUCTION PROCESS pp. 52-54 Downloads
Hao Liu
ARTIFICIAL NEURAL NETWORK ANALYSIS OF SOME SELECTED KDD CUP 99 DATASET FOR INTRUSION DETECTION Abstract: Due to the growing number of intrusions in local networks and the internet, it has become so universal that institution increasingly implements many structures that investigate information technology security violations. This study aimed to process, classify and predict the intrusion detection accuracy of some selected network attacks using the artificial neural network (ANN) technique. Five important attacks, namely; Buffer overflow, Denial of Service (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L) and PROBE were chosen from the KDD CUPP’99 information and intrusion identification accuracy was investigated with artificial neural network (ANN) modeling technique. Findings from the classification show that out of the procedures utilized to establish the ANN model, 27262 of the 45528 buffer overflow are classified appropriately, 7903 of the 45528 DoS attacks are arranged appropriately, 1371 of the 45528 U2R are classified appropriately, 431 of the 45528 R2L are arranged appropriately and, 8304 of the 45528 PROBE are classified appropriately. Comprehensively, about 99.1% of the training proceedings are arranged properly, equivalent to 0.9% erroneous classification while the testing specimen assisted to confirm the model with99.1% of the attacks were appropriately arranged by the ANN equation. This support that, comprehensively, the ANN equation is precise about the classification and prediction of the five attacks investigated in this study pp. 55-61 Downloads
Samuel Olorunfemi Adams, Ednah Azikwe and Mohammed Anono Zubair
ARE MILLENNIAL MOTHERS ADDICTED TO SMARTPHONES DURING A PANDEMIC: STUDY IN MALAYSIA AND INDONESIA pp. 62-66 Downloads
Herdian, Nur’aeni, Siti Aisyah Binti Panatik and Dyah Siti Septiningsih
DIGITAL RESILIENCE: OPPORTUNITIES AND THREATS FOR ADOLESCENTS IN A VIRTUAL WORLD pp. 67-71 Downloads
Rr. Setyawati, Lia Mareza and Muhammad Hamka

Volume 6, issue 1, 2022

SECURING DATA NETWORK FOR GROWING BUSINESS VPN ARCHITECTURES CELLULAR NETWORK CONNECTIVITY pp. 01-06 Downloads
Hillman Akhyar Damanik
THE DEVELOPMENT OF A CLOUD-BASED UNIVERSITY RESEARCH REPOSITORY SOFTWARE USING A CONFIGURABLE SUBSCRIPTION MODEL pp. 07-12 Downloads
Reynaldo G. Alvez
STATUS AND PROSPECTS OF ICT AMONG NEPALESE SMALLHOLDER FARMERS pp. 13-16 Downloads
Rejina Bachkain
AN EFFICIENT AND SECURED GRAPHICAL AUTHENTICATION SYSTEM pp. 17-21 Downloads
Orunsolu A.a
ENHANCING THE SECURITY OF AN ORGANIZATION FROM SHADOW IOT DEVICES USING BLOW-FISH ENCRYPTION STANDARD pp. 22-24 Downloads
M. Senthilkumar
AN EMPIRICAL INVESTIGATION INTO THE EXTENT UNIVERSITY STUDENTS UTILISE MOBILE EDUCATIONAL APPLICATIONS FOR LEARNING pp. 25-33 Downloads
Kuttikattu Varughese John
ACONVERGENCE OF MACHINE LEARNING AND STATISTICS TO PREDICT COVID-19 EVOLUTION pp. 34-38 Downloads
Madan Mohan Gupta and Ajay Singh
Page updated 2025-04-06