Scopus Indexed
Indexed by
clarivate analytics

AMA, Agricultural Mechanization in Asia, Africa and Latin America

AMA, Agricultural Mechanization in Asia, Africa and Latin America (AMA) (issn: 00845841) is a peer reviewed journal first published online after indexing scopus in 1982. AMA is published by Farm Machinery Industrial Research Corp and Shin-Norinsha Co. AMA publishes every subjects of general engineering and agricultural engineering.

Submission Deadline
25 Sep 2021 (Vol - 52 , Issue- 01 )
Upcoming Publication
31 Oct 2021 (Vol - 52 , Issue 01 )

Aim and Scope :

AMA, Agricultural Mechanization in Asia, Africa and Latin America

AMA, Agricultural Mechanization in Asia, Africa and Latin America (ISSN: 00845841) is a peer-reviewed journal. The journal covers Agricultural and Biological Sciences and all sort of engineering topic. the journal's scopes are in the following fields but not limited to:

Azerbaijan Medical Journal
Agricultural and Biological Sciences
Electrical Engineering and Telecommunication
Electronic Engineering
Computer Science & Engineering
Civil and architectural engineering
Mechanical and Materials Engineering
Transportation Engineering
Industrial Engineering
Industrial and Commercial Design
Information Engineering
Chemical Engineering
Food Engineering

A Polygon Delivering Technique with Precomputed Data

Paper ID- AMA-05-12-2020-10480

The spatial data contain a lot of points. The points consist of geographic coordinates. Representing the spatial data requires many calculating the geographic coordinates. Calculations of the coordinates take much time and reduce the performance. In order to enhance the performance of rendering the spatial data, performance enhancement for rendering the polygon which are in spatial data is needed. In this paper, we present that improving the performance of rendering for polygon by utilizing the scanline algorithm. The scanline algorithm has been widely used for rendering graphics systems. It fills inside of a given polygon. In order to filling the polygon, it requires some calculations and tables for storing the variables. Calculating and sorting the variables reduce the performance. We propose a method which precomputes the variables used by the scanline algorithm. By using proposed method, it can reduce the processed time. Proposed technique can be utilized to zoom in and out the map. We implement the proposed method and perform the experiment with Tiger/Line spatial data. We compare the processing time between scanline algorithm and proposed method.

Organization Security Upgrade through Honeypot based Frameworks

Paper ID- AMA-05-12-2020-10479

Computer Networks and Internet has become very famous nowadays since it satisfies people with varying needs by providing variety of appropriate services. Computer Networks have revolutionized our use of computers. Online bills, shopping, transactions and many other essential activities performed on the go by just a single click from our homes. Though it is a boon in this era, it also has its own risks and weaknesses too. Industries need to tussle to provide security to their networks and indeed not possible to offer a cent per cent security due to the intangible intelligence of hackers intruding into the network. This paper exploits the concept of honeypots for providing security to networks of industries which may not have custom intrusion detection systems or firewalls. The proposed model captures the various techniques used by hackers and creates a log of all hacker activities. Thus using this log, the production network system can be prevented from attackers.

Different Trust Model On the web Exchange by Trusted Third Party

Paper ID- AMA-05-12-2020-10478

The information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most important barriers. In order to improve these barriers a trust based third party mechanism is successfully adopted as a self-regulatory system to improve the buyer and seller trust. The online transactions are made very easy now days by E-commerce technologies. Built integrity belief approach (BIB), Support Vector Mechanic approach (SVM) and Random Number Generation approach (RNG) are the three approaches which are mainly used in this paper for online trust management. The seller and the buyer communication will be handled through the trusted third party. Apart from this a coupon based approach is introduced as an advancement in this paper for providing discount schemes which is helpful in attracting the customer who purchase beyond the threshold level fixed by the seller. Moreover a product review study is integrated in order to reduce the scam reviews in online transactions.

Different Trust Model On the web Exchange by Trusted Third Party

Paper ID- AMA-05-12-2020-10477

The information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most important barriers. In order to improve these barriers a trust based third party mechanism is successfully adopted as a self-regulatory system to improve the buyer and seller trust. The online transactions are made very easy now days by E-commerce technologies. Built integrity belief approach (BIB), Support Vector Mechanic approach (SVM) and Random Number Generation approach (RNG) are the three approaches which are mainly used in this paper for online trust management. The seller and the buyer communication will be handled through the trusted third party. Apart from this a coupon based approach is introduced as an advancement in this paper for providing discount schemes which is helpful in attracting the customer who purchase beyond the threshold level fixed by the seller. Moreover a product review study is integrated in order to reduce the scam reviews in online transactions.

Morphological Investigation of Arabic Words Utilizing Parsing

Paper ID- AMA-05-12-2020-10476

In this paper, a new approach for Arabic language morphological analysis is presented. Unlike other commonly used approaches that are based on pattern matching, we propose defining the structure of Arabic language words using context free grammar (instead of regular expressions). Thus, parsers can be generated to do morphological analysis. This approach considers the annotation marks that are usually neglected by current morphological analyzers, which results in a more detailed analysis.