WOS Indexed (2022)
clarivate analytics

AMA, Agricultural Mechanization in Asia, Africa and Latin America

AMA, Agricultural Mechanization in Asia, Africa and Latin America (AMA) (issn: 00845841) is a peer reviewed journal first published online after indexing scopus in 1982. AMA is published by Farm Machinery Industrial Research Corp and Shin-Norinsha Co. AMA publishes every subjects of general engineering and agricultural engineering.

Submission Deadline
28 Sep 2022 (Vol - 53 , Issue- 10 )
Upcoming Publication
30 Sep 2022 (Vol - 53 , Issue 09 )

Aim and Scope :

AMA, Agricultural Mechanization in Asia, Africa and Latin America

AMA, Agricultural Mechanization in Asia, Africa and Latin America (ISSN: 00845841) is a peer-reviewed journal. The journal covers Agricultural and Biological Sciences and all sort of engineering topic. the journal's scopes are in the following fields but not limited to:

Azerbaijan Medical Journal Gongcheng Kexue Yu Jishu/Advanced Engineering Science Zhonghua er bi yan hou tou jing wai ke za zhi = Chinese journal of otorhinolaryngology head and neck surgery Interventional Pulmonology
Agricultural and Biological Sciences
Electrical Engineering and Telecommunication
Electronic Engineering
Computer Science & Engineering
Civil and architectural engineering
Mechanical and Materials Engineering
Transportation Engineering
Industrial Engineering
Industrial and Commercial Design
Information Engineering
Chemical Engineering
Food Engineering

Characterization of Main Deficiencies in the Creation Cycle of Expelled Aluminum Profiles

Paper ID- AMA-05-12-2020-10481

Aluminium use has been rising steadily in recent decades. Several different industries are adapting it since its light weight, doable structure and robustness. Aluminium manufacturing runs in three ways; namely: (1) cascading, (2) extrusion and (3) drawing. Extrusion process is used to form aluminium in profiles which is one of the main semi/final-products for many industries. Although profiles production runs smoothly and easily most often, there are a number of repeated faults which might occurs during the extrusion process and some distinct patterns of faults and defects can be seen on the surface of the produced profiles. This paper describes the main types of these faults and defects and suggested solutions to avoid them based on 24 months of observations for the production process at three different extrusion machines in two different aluminium profiles manufacturing plants. The main aim of this study is to classify these faults and defects to help manufacturer to control and to avoid them or at least to minimize their occurrences by optimising quality control systems.

A Polygon Delivering Technique with Precomputed Data

Paper ID- AMA-05-12-2020-10480

The spatial data contain a lot of points. The points consist of geographic coordinates. Representing the spatial data requires many calculating the geographic coordinates. Calculations of the coordinates take much time and reduce the performance. In order to enhance the performance of rendering the spatial data, performance enhancement for rendering the polygon which are in spatial data is needed. In this paper, we present that improving the performance of rendering for polygon by utilizing the scanline algorithm. The scanline algorithm has been widely used for rendering graphics systems. It fills inside of a given polygon. In order to filling the polygon, it requires some calculations and tables for storing the variables. Calculating and sorting the variables reduce the performance. We propose a method which precomputes the variables used by the scanline algorithm. By using proposed method, it can reduce the processed time. Proposed technique can be utilized to zoom in and out the map. We implement the proposed method and perform the experiment with Tiger/Line spatial data. We compare the processing time between scanline algorithm and proposed method.

Organization Security Upgrade through Honeypot based Frameworks

Paper ID- AMA-05-12-2020-10479

Computer Networks and Internet has become very famous nowadays since it satisfies people with varying needs by providing variety of appropriate services. Computer Networks have revolutionized our use of computers. Online bills, shopping, transactions and many other essential activities performed on the go by just a single click from our homes. Though it is a boon in this era, it also has its own risks and weaknesses too. Industries need to tussle to provide security to their networks and indeed not possible to offer a cent per cent security due to the intangible intelligence of hackers intruding into the network. This paper exploits the concept of honeypots for providing security to networks of industries which may not have custom intrusion detection systems or firewalls. The proposed model captures the various techniques used by hackers and creates a log of all hacker activities. Thus using this log, the production network system can be prevented from attackers.

Different Trust Model On the web Exchange by Trusted Third Party

Paper ID- AMA-05-12-2020-10478

The information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most important barriers. In order to improve these barriers a trust based third party mechanism is successfully adopted as a self-regulatory system to improve the buyer and seller trust. The online transactions are made very easy now days by E-commerce technologies. Built integrity belief approach (BIB), Support Vector Mechanic approach (SVM) and Random Number Generation approach (RNG) are the three approaches which are mainly used in this paper for online trust management. The seller and the buyer communication will be handled through the trusted third party. Apart from this a coupon based approach is introduced as an advancement in this paper for providing discount schemes which is helpful in attracting the customer who purchase beyond the threshold level fixed by the seller. Moreover a product review study is integrated in order to reduce the scam reviews in online transactions.

Different Trust Model On the web Exchange by Trusted Third Party

Paper ID- AMA-05-12-2020-10477

The information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most important barriers. In order to improve these barriers a trust based third party mechanism is successfully adopted as a self-regulatory system to improve the buyer and seller trust. The online transactions are made very easy now days by E-commerce technologies. Built integrity belief approach (BIB), Support Vector Mechanic approach (SVM) and Random Number Generation approach (RNG) are the three approaches which are mainly used in this paper for online trust management. The seller and the buyer communication will be handled through the trusted third party. Apart from this a coupon based approach is introduced as an advancement in this paper for providing discount schemes which is helpful in attracting the customer who purchase beyond the threshold level fixed by the seller. Moreover a product review study is integrated in order to reduce the scam reviews in online transactions.