Muhammad Ilham Hakimi Mohamad Nizam, Fahd Bin Mohd Fauzi, Nurazlin Zainal Azmi
{"title":"Interactive Folklore - Re-Modernizing The Culture Through Digital Storytelling","authors":"Muhammad Ilham Hakimi Mohamad Nizam, Fahd Bin Mohd Fauzi, Nurazlin Zainal Azmi","doi":"10.31436/ijpcc.v9i2.400","DOIUrl":"https://doi.org/10.31436/ijpcc.v9i2.400","url":null,"abstract":"This project focuses on developing an interactive visual novel prototype based on a popular Malaysian folklore, Batu Belah Batu Bertangkup. The aim is to modernize and digitize folklore as an interactive visual novel with branching narratives for teaching children about moral values through the story. This visual novel includes user interaction, core gameplay mechanics, storyline, character design, and backgrounds. The game is developed using Ren’Py for Windows PC as the platform","PeriodicalId":164524,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135608400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rafidah Isa, Mohammad Fauzan Nordin, Roslina Othman, Hazwani Mohd Mohadis
{"title":"Infectious Disease-Related Applications","authors":"Rafidah Isa, Mohammad Fauzan Nordin, Roslina Othman, Hazwani Mohd Mohadis","doi":"10.31436/ijpcc.v9i2.402","DOIUrl":"https://doi.org/10.31436/ijpcc.v9i2.402","url":null,"abstract":"This study aims to identify and analyse the existing mobile applications for infectious diseases currently available for stakeholders in two major application stores: Google Play Store and Apps Store. The Google Play and Apps Store were searched between 15th June 2022 and 21st June 2022. The keywords used to search related applications on the infectious disease were “infectious disease,” “dengue,” “ebola,” “h1n1”, “influenza,” “Japanese encephalitis,” “MERSCOV,” “SARS,” “tuberculosis,” and “Covid-19”. The selection of the applications is based on the predefined inclusion criteria. Initially, two hundred eighty-three applications were identified, and 262 met the inclusion criteria. A total of 125 applications were sampled. The codes and themes were extracted from the description available in the application store. Information was recorded in Microsoft Excel. Finally, the existing application and its purpose were summarized and presented with descriptive statistics. The study discovered that the application was first released in 2011 for general infectious and significantly increased in 2020. Most applications were developed for multiple functions, mainly for general information, close contact notifications, self-reporting cases, and symptom tracking. This study provides an overview of infectious disease applications currently available regarding their purpose and the trend of the application released. It significantly contributes to mobile application research by providing the developers with an informed decision while designing infectious-related disease applications to suit the stakeholders' needs.","PeriodicalId":164524,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135608266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nur Atikah Din, Nur Ziana Syuhadah Abdul Rashid, Noor Azura Zakaria
{"title":"Short Sensory Profile Assessment System for Autism Children","authors":"Nur Atikah Din, Nur Ziana Syuhadah Abdul Rashid, Noor Azura Zakaria","doi":"10.31436/ijpcc.v9i2.410","DOIUrl":"https://doi.org/10.31436/ijpcc.v9i2.410","url":null,"abstract":"Autism Spectrum Disorders (ASD) are life-long neurodevelopmental disorders characterized by impairment in reciprocal social interactions, impairment in verbal and non-verbal communication skills, and restricted repetitive and stereotyped patterns of behaviour, interests and activities. Children with ASD normally shows the sensory impairment and struggles to process sensory data. Short Sensory Profile (SSP) is an assessment tool which is widely used to identify whether the autism children have exhibited the sensory disorder. There are seven parts of the questionnaire which are tactile sensitivity, taste/ smell sensitivity, movement sensitivity, under responsive/ seeks sensation, auditory filtering, low energy/ weak and visual auditory sensitivity. The problem with the current system is that the assessment is being done manually whereby it requires the therapist to spend more time and effort to get the results. Therefore, by providing a web-based SSP assessment system, it will ease the therapist to automate the manual process and receive the output easily. In addition, the profile of the patient can be stored digitally and can be referred for future reference of developing and revisit the therapy plan.","PeriodicalId":164524,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135608267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nurul Nuha Abdul Molok, Nur Aiena Hajeerah Abdul Hakim, Nur Syazwani Jamaludin
{"title":"SmartParents: Empowering Parents to Protect Children from Cyber Threats","authors":"Nurul Nuha Abdul Molok, Nur Aiena Hajeerah Abdul Hakim, Nur Syazwani Jamaludin","doi":"10.31436/ijpcc.v9i2.406","DOIUrl":"https://doi.org/10.31436/ijpcc.v9i2.406","url":null,"abstract":"In today’s interconnected world, parents and children face cyber safety and security issues and are exposed to cyber threats. During and after the COVID-19 pandemic, cyber safety and security cases are on the rise affecting people of all ages. During the movement control orders (MCO), children were given electronic gadgets to participate in online learning. Although there is no MCO and online learning anymore, children are still reliant on these gadgets, affecting their studies, health and safety. This study covers cyber threats that are happening to children and what can parents do about such threats to protect their children. It proposes educating parents about cyber safety and security through a web-based application prototype. Surveys were done to understand the actual cyber threats that were faced by both parents and children in order to collect user requirements for the development of the prototype. Findings suggest that such applications can help parents to recognise cyber threats that can happen to their children. The developed prototype may guide parents to implement cyber safety and security controls and protect their children from cyber threats such as cyberbullying, sexual grooming and gaming disorder.","PeriodicalId":164524,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135608407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Techniques for IoT Data in 6G Networks with Blockchain Integration: A Review","authors":"Ahmad Anwar Zainuddin, Nuraina Fitrah Omar, Nurul Nadhirah Zakaria, Nana Aichata Mbourou Camara","doi":"10.31436/ijpcc.v9i2.405","DOIUrl":"https://doi.org/10.31436/ijpcc.v9i2.405","url":null,"abstract":"Sixth-generation networks (6G) are predicted to be started use by 2030, supporting the complex communication requirements of a data-centric civilisation where everything is interconnected. The research and academics started to analyse the 6G wireless network technology after the implementation of the 5G technology globally. The 6G networks will be more deliberate to extend cell communication and network capabilities to reach ultra-high-speed connectivity which could precede into the regions where the generation before could not. The new security features need to be advanced to guarantee the data is secure and protect the network from being invaded. The technology of blockchain and integration of the Internet of Things (IoT) has the prospect to revolutionize the networking system. This paper explores the applications of blockchain in IoT networking, addressing challenges such as security, scalability, and trust. Blockchain also enhances security, audibility, and traceability in IoT networks. Use cases in the supply chain, management, healthcare, and smart cities demonstrate the benefits of this integration. Challenges include scalability, energy consumption, interoperability, and privacy concerns. Future research should focus on addressing these challenges to fully exploit the potential of IoT blockchain applications in networking systems.
","PeriodicalId":164524,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135608268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-Fungible Token based Smart Manufacturing to scale Industry 4.0 by using Augmented Reality, Deep Learning and Industrial Internet of Things","authors":"Fazeel Ahmed Khan, Adamu Abubakar Ibrahim","doi":"10.31436/ijpcc.v9i2.407","DOIUrl":"https://doi.org/10.31436/ijpcc.v9i2.407","url":null,"abstract":"The recent revolution in Industry 4.0 (IR 4.0) has characterized the integration of advance technologies to bring the fourth industrial revolution to scale the manufacturing landscape. There are different key drivers for this revolution, in this research we have explored the following among them such as, Industrial Internet of Things (IIoT), Deep Learning, Blockchain and Augmented Reality. The emerging concept from blockchain namely “Non-Fungible Token” (NFT) relating to the uniqueness of digital assets has vast potential to be considered for physical assets identification and authentication in the IR 4.0 scenario. Similarly, the data acquired through the deployment of IIoT devices and sensors into smart industry spectrum can be transformed to generated robust analytics for different industry use-cases. The predictive maintenance is a major scenario in which early equipment failure detection using deep learning model on acquired data from IIoT devices has major potential for it. Similarly, the augmented reality can be able to provide real-time visualization within the factory environment to gather real-time insight and analytics from the physical equipment for different purposes. This research initially conducted a survey to analyse the existing developments in these domains of technologies to further widen its horizon for this research. This research developed and deployed a smart contract into an ethereum blockchain environment to simulate the use-case for NFT for physical assets and processes synchronization. The next phase was deploying deep learning algorithms on a dataset having data generated from IIoT devices and sensors. The Feedforward and Convolutional Neural Network were used to classify the target variables in relation with predictive maintenance failure analysis. Lastly, the research also proposed an AR based framework for the visualization ecosystem within the industry environment to effectively visualize and monitory IIoT based equipment’s for different industrial use-cases i.e., monitoring, inspection, quality assurance.","PeriodicalId":164524,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135608402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New demand on assembly language proficiency in performing binary reverse engineering tasks","authors":"Khairol Amin bin Mohd Salleh","doi":"10.31436/ijpcc.v9i2.397","DOIUrl":"https://doi.org/10.31436/ijpcc.v9i2.397","url":null,"abstract":"Cybersecurity encompasses a wide field of disciplines and as cyber threat landscape changes, there is a need for tools, techniques and skills to provide safe and secure internet environment. The cyber space industry introduced new roles for reverse engineers, malware analysts, digital forensic experts, exploit engineers, etc which demand the new skill set, and in this context, the proficiency in assembly language programming is highly essential. This paper presents an observation on the training programme for software developers from a software integration company to attain the skills of reverse engineers, application penetration testers as well as application security analysts. In preparing for the new generation of reverse engineers and other new roles that are related to cybersecurity, it would be a good step if assembly language could be taught as a separate programming subject, and it would be highly recommended for higher education institutions to collaborate with the industry to undertake co-teaching in supporting the new roles within the realm of cybersecurity. It has been well observed that being endowed with a working knowledge of developing application from scratch using assembly language would offer a foundation to be a good binary reverse engineer.","PeriodicalId":164524,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135608403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sohaib Altaf Raja, Madihah Sheikh Abdul Aziz, Asadullah Shah
{"title":"Modeling the Workflow of Bug Prioritization Tasks Descriptively Using the Past Events","authors":"Sohaib Altaf Raja, Madihah Sheikh Abdul Aziz, Asadullah Shah","doi":"10.31436/ijpcc.v9i2.398","DOIUrl":"https://doi.org/10.31436/ijpcc.v9i2.398","url":null,"abstract":"Prioritizing bugs is one of the critical decision-related tasks in managing the maintenance phase whereas it is exposed as a key challenge in handling bug reports. On the other hand, the bug triager is a prominent role to observe influencing factors for handling the bug prioritization tasks effectively. Analysis of previous bug reports shows that it is essential to handle bug prioritization tasks with the appropriate workflow. However, it is revealed that there is a research gap in modeling the workflow of prioritization tasks. The paper aims to characterize the workflow model of prioritization tasks. This research is based on a document analysis design using qualitative data from previous bug reports and other artefacts. Over 100 bug reports from large software corporations are accessed and filtered, while 20 bug reports are used for obtaining empirical data. In this study, a descriptive workflow model for prioritizing bugs is proposed by analyzing past events. This model characterizes the states of bug prioritization tasks, their statuses, and the transitions between them. Additionally, this research analyzes the industrial aspect of the proposed model and demonstrates its usefulness in providing valuable insights to the bug triager into ongoing prioritization tasks that will assist him in decision-making in prioritizing bugs retrospectively and prospectively. The finding of this research also reveals that bug reports are a valuable resource that contains significant prioritization features which is useful for illustrating the workflow of bug prioritization tasks descriptively. Thus, the implications of the model for theory and practice are discussed.","PeriodicalId":164524,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"603 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135608401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mental State Detection From Tweets By Machine Learning","authors":"Nabiul Farhan Nabil, Ashadullah Galib, Takumi Sase","doi":"10.31436/ijpcc.v9i2.396","DOIUrl":"https://doi.org/10.31436/ijpcc.v9i2.396","url":null,"abstract":"The world over, mental illness is a serious issue. Many people use the social media that may affect their mental health positively, but often result in negative sentiments. This research aims to determine an individual's mental state based on their social media behavior on Twitter. We analysed a dataset including 170000 real tweets by using natural language processing and machine learning techniques. Decision tree, support vector machine, and recurrent neural network (RNN) were used for classifying twitter users, to detect if they are in positive or negative mental state. These models were compared to determine which approach provides more accurate detection of a positive/negative mental state. Then, the RNN yielded the highest accuracy 0.76 among the models, with the precision, recall, and the F_1 score being 0.75, 0.74, and 0.75, respectively. The truncated singular value decomposition was also utilised to visualise the high-dimensional feature space of the data.","PeriodicalId":164524,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135608265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of U-Net’s Variants for Segmentation of Polyp Images","authors":"Amelia Ritahani Ismail, Syed Qamrun Nisa","doi":"10.31436/ijpcc.v9i2.408","DOIUrl":"https://doi.org/10.31436/ijpcc.v9i2.408","url":null,"abstract":"Medical image analysis involves examining pictures acquired by medical imaging technologies in order to address clinical issues. The aim is to increase the quality of clinical diagnosis and extract useful information. Automatic segmentation based on deep learning (DL) techniques has gained popularity recently. In contrast to the conventional manual learning method, a neural network can now automatically learn image features. One of the most crucial convolutional neural network (CNN) semantic segmentation frameworks is U-net. It is frequently used for classification, anatomical segmentation, and lesion segmentation in the field of medical image analysis. This network framework's benefit is that it not only effectively processes and objectively evaluates medical images, properly segments the desired feature target, and helps to increase the accuracy of medical image-based diagnosis.","PeriodicalId":164524,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135608404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}