Scopus Indexed
Indexed by
clarivate analytics

AMA, Agricultural Mechanization in Asia, Africa and Latin America

AMA, Agricultural Mechanization in Asia, Africa and Latin America (AMA) (issn: 00845841) is a peer reviewed journal first published online after indexing scopus in 1982. AMA is published by Farm Machinery Industrial Research Corp and Shin-Norinsha Co. AMA publishes every subjects of general engineering and agricultural engineering.

Submission Deadline
18 Jan 2022 (Vol - 53 , Issue- 01 )
Upcoming Publication
31 Jan 2022 (Vol - 53 , Issue 01 )

Aim and Scope :

AMA, Agricultural Mechanization in Asia, Africa and Latin America

AMA, Agricultural Mechanization in Asia, Africa and Latin America (ISSN: 00845841) is a peer-reviewed journal. The journal covers Agricultural and Biological Sciences and all sort of engineering topic. the journal's scopes are in the following fields but not limited to:

Azerbaijan Medical Journal Gongcheng Kexue Yu Jishu/Advanced Engineering Science
Agricultural and Biological Sciences
Electrical Engineering and Telecommunication
Electronic Engineering
Computer Science & Engineering
Civil and architectural engineering
Mechanical and Materials Engineering
Transportation Engineering
Industrial Engineering
Industrial and Commercial Design
Information Engineering
Chemical Engineering
Food Engineering

Organization Security Upgrade through Honeypot based Frameworks

Paper ID- AMA-05-12-2020-10479

Computer Networks and Internet has become very famous nowadays since it satisfies people with varying needs by providing variety of appropriate services. Computer Networks have revolutionized our use of computers. Online bills, shopping, transactions and many other essential activities performed on the go by just a single click from our homes. Though it is a boon in this era, it also has its own risks and weaknesses too. Industries need to tussle to provide security to their networks and indeed not possible to offer a cent per cent security due to the intangible intelligence of hackers intruding into the network. This paper exploits the concept of honeypots for providing security to networks of industries which may not have custom intrusion detection systems or firewalls. The proposed model captures the various techniques used by hackers and creates a log of all hacker activities. Thus using this log, the production network system can be prevented from attackers.

Different Trust Model On the web Exchange by Trusted Third Party

Paper ID- AMA-05-12-2020-10478

The information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most important barriers. In order to improve these barriers a trust based third party mechanism is successfully adopted as a self-regulatory system to improve the buyer and seller trust. The online transactions are made very easy now days by E-commerce technologies. Built integrity belief approach (BIB), Support Vector Mechanic approach (SVM) and Random Number Generation approach (RNG) are the three approaches which are mainly used in this paper for online trust management. The seller and the buyer communication will be handled through the trusted third party. Apart from this a coupon based approach is introduced as an advancement in this paper for providing discount schemes which is helpful in attracting the customer who purchase beyond the threshold level fixed by the seller. Moreover a product review study is integrated in order to reduce the scam reviews in online transactions.

Different Trust Model On the web Exchange by Trusted Third Party

Paper ID- AMA-05-12-2020-10477

The information fortune and the connectivity are provided by the universe of E-commerce over an enormous distance at all time. In an open and distributed environment the buyers or providers will not act in a mutually understood or agreed manner by which the incomplete practices and fraudulent activities happen. So in any online transaction the security and trust are two important factors that are to be considered. In Ecommerce markets the above mentioned problems are criticized as the most important barriers. In order to improve these barriers a trust based third party mechanism is successfully adopted as a self-regulatory system to improve the buyer and seller trust. The online transactions are made very easy now days by E-commerce technologies. Built integrity belief approach (BIB), Support Vector Mechanic approach (SVM) and Random Number Generation approach (RNG) are the three approaches which are mainly used in this paper for online trust management. The seller and the buyer communication will be handled through the trusted third party. Apart from this a coupon based approach is introduced as an advancement in this paper for providing discount schemes which is helpful in attracting the customer who purchase beyond the threshold level fixed by the seller. Moreover a product review study is integrated in order to reduce the scam reviews in online transactions.

Morphological Investigation of Arabic Words Utilizing Parsing

Paper ID- AMA-05-12-2020-10476

In this paper, a new approach for Arabic language morphological analysis is presented. Unlike other commonly used approaches that are based on pattern matching, we propose defining the structure of Arabic language words using context free grammar (instead of regular expressions). Thus, parsers can be generated to do morphological analysis. This approach considers the annotation marks that are usually neglected by current morphological analyzers, which results in a more detailed analysis.

Secure Bury Hop Confirmation with Onion Convention Implementation for Reliable Steering In Wireless Networks

Paper ID- AMA-05-12-2020-10475

Mobile Adhoc Network provides a new challenges and difficulty when nodes are used in large network with maximum number of nodes and the reason of limited bandwidth and dynamic topology establish a good route from nodes and maintaining that routes is a very hard. To achieve the security in Mobile Adhoc Network (MANET) is very difficult because of changing topology, wireless links vulnerability, and more management point. In this proposed system we proposed onion protocol with Advanced Encryption Standard (AES) algorithm and multi-hop route forwarding algorithm. In the proposed we propose an onion routing networks using a new protocol. We describe a new secure and reliable packet sending scheme using the onion routing with Advanced Encryption Standard (AES) algorithm. When node comes to registering in network, it will get the primary key, secondary key, node id. Once source identified shortest path to destination node, it will get primary key of all nodes in the shortest path. This onion protocol with Advanced Encryption Standard technique is used to secure the data from other nodes in the network and provide the reliable packet delivery to destination. In this proposed system we use multi-hop Route forwarding algorithm technique to provide efficient shortest path from source node to destination node. It achieves shortest path identification by test of request and response process. In the proposed system all intermediate nodes not only doing packet forwarding and it is responsible for decrypting the packet using that secondary key. Secure and reliable packet delivery is achieved in this system by onion routing with Advanced Encryption Standard algorithm and multi-hop route forwarding algorithm.