Journal of Advanced Research in Computing and Applications
https://akademiabaru.com/submit/index.php/arca
<p><strong>Journal of Advanced Research in Computing and Applications (ARCA)</strong> is a peer-reviewed international forum for the publication and dissemination of original work which contributes to greater scientific understanding in all fields of computing and its applications. The Journal publishes review reports and surveys, theoretical and technical papers that covers all areas of computer science and computer engineering such as, but not limited to theory of computing, parallel computing, artificial intelligence, Web technologies, technology enhanced learning, services computing, cloud computing, image processing, pattern recognition, software evolution and mining, network security, Mobile & Web Applications.</p> <h3><strong>EVENTS UPDATE</strong></h3> <table width="100%"> <tbody> <tr> <td width="33%"><img src="https://semarakilmu.com.my/main/wp-content/uploads/2024/12/isfmts-new.jpg" /></td> <td width="33%"><img src="https://semarakilmu.com.my/main/wp-content/uploads/2025/01/siris-5.jpg" /></td> <td width="33%"><img src="https://semarakilmu.com.my/main/wp-content/uploads/2024/11/5th-icaseat-new-to-upload.jpg" /></td> </tr> <tr> <td width="33%">Join us at the <strong>9th International Symposium on Fluid Mechanics and Thermal Sciences (9th-ISFMTS2025)</strong>, hosted by Semarak Ilmu Sdn. Bhd., on 16th April 2025 at the Everly Hotel, Putrajaya, Malaysia. […] <a href="https://submit.confbay.com/conf/9isfmts2025" rel="bookmark">Find out more</a></td> <td width="33%">Join us virtually for the <strong>Semarak International Research Innovation Symposium IV (SIRIS IV),</strong> hosted by Semarak Ilmu Sdn. Bhd., on 30th April 2025. This exciting event will bring together [...] <a href="https://submit.confbay.com/conf/5msias2025">Find out more</a></td> <td>The primary aim of this conference is to establish itself as the premier annual gathering in the dynamic realms of Applied Science and Engineering, Advanced Technology, Applied Mechanics, Fluid Mechanics, […] <a href="https://submit.confbay.com/conf/icaseat2025" rel="bookmark">Find out more</a></td> </tr> </tbody> </table> <p><strong>The most cited articles</strong> (<strong><a href="https://www.scopus.com/results/results.uri?sort=cp-f&src=dm&st1=journal+of+advanced+research+in+computing+and+applications&sid=dfc90dca647976921108f991565a9b21&sot=b&sdt=cl&sl=68&s=SRCTITLE%28journal+of+advanced+research+in+computing+and+applications%29&origin=resultslist&editSaveSearch=&sessionSearchId=dfc90dca647976921108f991565a9b21&limit=10&cluster=scoexactsrctitle%2C%22Journal+Of+Advanced+Research+In+Computing+And+Applications%22%2Ct">SCOPUS</a></strong>)</p> <h4 class="Typography-module__lVnit Typography-module__Cv8mo Typography-module__mZVLC Typography-module__ETlt8"><a href="https://www.akademiabaru.com/submit/index.php/arca/article/view/5026">Graphical User Interface (GUI) Controlled Mobile Robot</a>, <em><span class="Typography-module__lVnit Typography-module__Cv8mo Typography-module__JqXS9 Typography-module__Nfgvc">Zulkefli, M.H., Mohd Annuar, K.A., Johari, S.H., Mohamad Sapiee, M.R., Ahmad, S.</span></em></h4> <h4 class="Typography-module__lVnit Typography-module__Cv8mo Typography-module__mZVLC Typography-module__ETlt8"><a href="https://www.akademiabaru.com/submit/index.php/arca/article/view/5007">Design and Simulation of New One Time Pad (NOTP) Stream Cipher Encryption Algorithm</a>, <em><span class="Typography-module__lVnit Typography-module__Cv8mo Typography-module__JqXS9 Typography-module__Nfgvc">Hussein, M.N., Megahed, M., Azeem, M.H.A.</span></em></h4> <h4 class="Typography-module__lVnit Typography-module__Cv8mo Typography-module__mZVLC Typography-module__ETlt8"><a href="https://www.akademiabaru.com/submit/index.php/arca/article/view/4997">E-Halal Restaurant Recommender System using Collaborative Filtering Algorithm</a>, <em><span class="Typography-module__lVnit Typography-module__Cv8mo Typography-module__JqXS9 Typography-module__Nfgvc">Mahadi, MI, Zainuddin, N, Shah, NBA, Naziron, NA, Rum, SFM</span></em></h4>Akademia Baru Publisheren-USJournal of Advanced Research in Computing and Applications2462-1927Meta Analysis of Quantitative Trait Loci (QTL) for Growth and Yield Related Traits Under Drought Stress in Wheat (Triticum aestivum L.)
https://akademiabaru.com/submit/index.php/arca/article/view/5496
<p>Wheat is a critical crop in temperate climate zones, with demand rising in both urbanized and industrialized countries. However, drought stress significantly impacts global wheat yield, highlighting the need for breeding programs focused on drought tolerant wheat. This study conducted a QTL meta analysis to identify growth characteristics and yield related traits associated with drought tolerance in wheat. Stable QTLs were targeted across different varieties and experimental environments to ensure the success of these breeding programs. The study compiled drought tolerant QTLs from 27 previous studies, identifying a total of 951 QTLs, which were used to create a consensus map. Of these, 538 QTLs were related to yield characteristics, while 413 were linked to growth characteristics associated with drought tolerance. BioMercator V4.2.3 software was employed to generate consensus maps and perform the meta analysis. The consensus map, derived from the combined data, consisted of 457 QTLs spanning a total genetic map length of 727,819 cM. The meta analysis identified 140 MQTLs, with MQTL 5B:7 and 3B:4 emerging as the most significant, harboring 24 and 20 QTLs, respectively. These chromosomes contain major QTLs associated with drought tolerance. The findings provide valuable insights that can be utilized in breeding programs to enhance drought tolerance, yield, and growth in wheat.</p>Siti Athirah IsmailKalaivani Nadarajah
Copyright (c) 2024 Journal of Advanced Research in Computing and Applications
2024-12-312024-12-3137112010.37934/arca.37.1.120The Designing of Geoinformation Backend-Frontend to Improve Landslide Mitigation Application
https://akademiabaru.com/submit/index.php/arca/article/view/5541
<p>The necessity of designing geoinformation backend-frontend is to improve landslide mitigation application built for landslide disaster management is discussed in this article. The design of geoinformation backend-frontend is critical to ensure that the landslide mitigation application will run appropriately. This research seeks to address the geoinformation backend-frontend with three subject which are input to the landslide mitigation map objective, determination of selected evacuation sites and landslide hazard mitigation services presented in the form of application. The development of landslide mitigation was done online using the waterfall model. Web-based applications are developed in programming languages as the backend. Web applications can run on the Internet or an intranet (LAN network) and can manage data centrally. The system architecture design was made based on the client-server model, where the client sends and requests JSON data from the web service located on the server with the support of using Leaflet JS API as the base map layer. The geoinformation will communicate with the database using JSON String to make changes and retrieve data in the database. The JSON String is obtained from the Web Services Application Programming Interface (API), which is available for data processing in the system database. The front end is presented as a website. This section is created using HTTP, CSS, and JavaScript so that the URL can work and be displayed on the website properly. Meanwhile Frontend developers have the task of developing all the visual components of the website and keeping the interface attractive. With a series of advantages and models built, some things could be improved in the design process, such as the choice of relevant data, analysis methods and service features that can be presented as a more interactive mobile application.</p>Iksal YanuarsyahSyarbaini AhmadNurkaliza Khalid
Copyright (c) 2024 Journal of Advanced Research in Computing and Applications
2024-12-312024-12-31371213310.37934/arca.37.1.2133Overview of Visual Literacy and Facility Support in Higher Education - Case of Indonesia and Malaysia
https://akademiabaru.com/submit/index.php/arca/article/view/5563
<p align="justify">Visual literacy is a skill that is owned by someone as a form of visual communication. Visual literacy skills are crucial to learn, especially for university students to receive and translate objects more quickly in order to improve and increase their learning achievements. The main objective of this study was identified and discuss the relationship between the understanding of visual literacy of students and university teachers in Indonesia and Malaysia to the learning media used and the use of university facilities. This study employed qualitative research, using purposive sampling method. Six respondents who were students and lecturers from the State University of Semarang (UNNES), Indonesia and Universiti Teknologi Mara (UiTM), Kelantan, Malaysia particapated in this study. The results of the sudy indicated that Indonesian and Malaysian respondents had visual literacy knowledge, although there were differences in visual interest and duration. The results further showed that in visual terms, Indonesian respondents tended to prioritize quantity, while Malaysian respondents prioritized quality. In addition, the use of learning media for Indonesian respondents tended to be less varied than that of Malaysian respondents. The results also found that the campuses in both countries provided supporting facilities. Indonesian respondents however have not used it well, while Malaysian respondents indicated that they use campus facilities to learn visual literacy. The aim of this study is to contribute to the process of improving visual literacy learning in Indonesia and Malaysia and further adding to the body of knowledge.</p>Nadia Sigi PrameswariVannie NaidooMohd Ekram Alhafis HashimMenchie A. Dela Cruz
Copyright (c) 2024 Journal of Advanced Research in Computing and Applications
2024-12-312024-12-31371344910.37934/arca.37.1.3349A Comparative Performance Analysis of Several Machine Learning Classifiers on The Credit Card Data
https://akademiabaru.com/submit/index.php/arca/article/view/5564
<p align="justify">As customers tendencies learn rapidly about online transactions due to the outbreak of the Covid-19 pandemic, fraudulent transactions that mimic legitimate transactions will continue to increase unabated. Over the years, fraudulent transactions have been committed but the supervised and unsupervised machine learning classifiers and fraud detection techniques could not stop the fraud from occurring at the onset. However, fraudulent cases are detected after post-occurrence thereby recognizing these techniques as non-smart detection models because fraud could only be detected using past data sets. Various fraud detection or classifier techniques using machine learning techniques such as decision trees, random forests, k-means, and neural networks have been studied. Also, the possibility of overfitting due to the branch growth associated with the decision trees is a classifier performance problem. The application of the probability axiomatic metric (PAM) to determine the accuracy of the models is a classification evaluation problem because of the relatively moderate error rate. To overcome the above shortfalls, we proposed a threshold Mahalanobis distance (TMD) classifier and adopted BETH as a performance evaluation metric. The result revealed that TMD is comparable to neural network (NN), k-means, isolation forest, XGBoost, and random forest based on the credit card data set. The analysis showed that TMD and NN have higher efficiency compared to other classifiers. This study demonstrated that the TMD classifier is unique and could be applied to extract legitimate and illegitimate transactions from customer transaction data sets. The study concludes that TMD is robust and comparable to NN and the classification errors associated with BETH are minimal compared to PAM for both TMD and NN.</p>Nor Aishah AhadFriday Zinzendoff OkwonuYik Siong PangOlimjon Shukurovich Sharipov
Copyright (c) 2024 Journal of Advanced Research in Computing and Applications
2024-12-312024-12-31371506410.37934/arca.37.1.5064Using Gray Wolf Optimization for Joint Request Offloading and Resource Scheduling in 5G Network which Use Mobile Edge Computing
https://akademiabaru.com/submit/index.php/arca/article/view/5580
<p align="justify">Mobile Edge Computing (MEC) is considered one of the enabling and promising technologies in 5G networks, especially with the massive data movement of various devices and the increased demand for computing. Here, computational offloading of tasks to edge clouds provides an effective, flexible, low-latency solution for mobile users in the network. However, the limited computing resources in edge clouds and the dynamic demands of mobile users make it difficult to schedule computing requests to appropriate edge clouds. Therefore, we model the joint request offloading and resource scheduling (JRORS) problem as a mixed- nonlinear program to maximize the system welfare of requests. Then we proposed gray wolf optimization algorithm referred as (GWO) to solve this problem. The simulation results showed that (GWO) outperforms existing methods in terms of system welfare and can maintain good performance in a dynamic network.</p>Safaa AlaliAbdulkarim AssalemBoushra Alali
Copyright (c) 2024 Journal of Advanced Research in Computing and Applications
2024-12-312024-12-31371658610.37934/arca.37.1.6586