U. F. Bahrin, H. Jantan, Muhammad Adam Sani Mohd Sofian, Izzatul Syahirah Ismail, Siti Hajar Aishah Samsudin
{"title":"Classifying Body Type based on Eating Habits and Physical Condition using Decision Tree Technique","authors":"U. F. Bahrin, H. Jantan, Muhammad Adam Sani Mohd Sofian, Izzatul Syahirah Ismail, Siti Hajar Aishah Samsudin","doi":"10.1109/IVIT55443.2022.10033335","DOIUrl":"https://doi.org/10.1109/IVIT55443.2022.10033335","url":null,"abstract":"Nowadays, due to busy schedules, many people are unaware of what they are eating and their physical condition. This scenario will lead to various health issues such as obesity, diabetes, blood pressure, etc. Hence, it has become very essential for people to have a good balanced nutritional healthy diet to deal with those issues. Therefore, it is important to determine what factors may be conducive to healthy eating behaviors among people with different Body Mass Index (BMI). A predictive analysis approach in data mining can be used to identify the food consumption pattern in people's eating habits and how it is related to their body type. This study aims to classify body types based on eating habits and physical conditions using a decision tree induction algorithm. Several phases have been conducted in this study such as data understanding, data preparation, modeling, and evaluation. In the experimental phase, the datasets that are known as full dataset and reduced dataset have been used to identify which dataset will produce high accuracy. As a result, it is shown that a full dataset produces higher accuracy compared to a reduced dataset. Perhaps there is room for improvement in the reduced dataset by applying other attribute selection methods to produce better accuracy of the classifier. This study brings a high significance for effectiveness and efficiency in eating habits and physical condition analysis based on body type, and it can also be explored for other classification methods for future work enhancement.","PeriodicalId":325667,"journal":{"name":"2022 International Visualization, Informatics and Technology Conference (IVIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132796610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shrimp Farming Water Parameter Monitoring System using LoRa","authors":"Roziyani Rawi, Suhaida Salleh, H. S. Husin","doi":"10.1109/IVIT55443.2022.10033355","DOIUrl":"https://doi.org/10.1109/IVIT55443.2022.10033355","url":null,"abstract":"It is necessary to improve the efficiency of water parameter monitoring at the shrimp hatchery. Currently, staff at the hatchery use a traditional method where water is manually tested using a multiparameter instrument. Thus, this system is built with the aim of developing a system prototype to measure shrimp farming water parameters using LoRa technology and remotely monitor the status of shrimp farming water parameters using an IoT platform. The integration of sensors, Arduino UNO, and LoRa transmitter module was placed at the shrimp farm, while the ESP32 and LoRa receiver module have been placed in the office. Data is transmitted from transmitter to receiver and sent to ESP32 to be forwarded into the cloud via a Wi-Fi connection. Blynk IoT retrieved and displayed data from the cloud for user view. Therefore, the system is proof that LoRa-based communication and Blynk IoT monitoring systems can enhance the efficiency of water parameter monitoring at shrimp hatcheries.","PeriodicalId":325667,"journal":{"name":"2022 International Visualization, Informatics and Technology Conference (IVIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125898689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. M. Sabri, Jasmine Nor Azman Norman, Norulhidayah Isa, Ummu Fatihah Mohd Bahrin
{"title":"Sentiment Analysis On Covid-19 Outbreak Awareness Using Naïve Bayes Algorithm","authors":"N. M. Sabri, Jasmine Nor Azman Norman, Norulhidayah Isa, Ummu Fatihah Mohd Bahrin","doi":"10.1109/IVIT55443.2022.10033379","DOIUrl":"https://doi.org/10.1109/IVIT55443.2022.10033379","url":null,"abstract":"Sentiment analysis has gained much attention nowadays among the researchers especially during the Covid-19 pandemic. Due to the increasing volume of data coming from the social media platforms, researchers have been using sentiment analysis to analyse topics regarding commercial products, daily issues among the society and also to detect important events from the community. Since the social media users are consisting of the community, content that are shared could also be used to detect possible situational hazard such as the outbreak of Covid-19 in advanced. The result from the sentiment analysis could be beneficial to government organizations in order to contain the outbreaks and public health crisis related to Covid-19. The objective of this research is to explore Naive Bayes algorithm for the sentiment analysis on the Covid-19 outbreak awareness based on Twitter data. In this research, the data were collected during the Malaysia's second lock down, which was between the months of April to June 2021 using the Twitter API Tweepy. After the pre-processing and feature extraction stages, the data have been divided into the training and testing dataset for the Naive Bayes sentiment classification. The result has shown that Naive Bayes has been able to generate high performance with more than 90% accuracy for this classification problem. Future work would include the improvement of data preprocessing, more balance of dataset, enhancement of the algorithm and also comparing the performance with other well-known classification algorithms.","PeriodicalId":325667,"journal":{"name":"2022 International Visualization, Informatics and Technology Conference (IVIT)","volume":"76 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126002059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Malay Language Cyberbullying Detection Model on Twitter using Supervised Machine Learning","authors":"Nurina Farhanah Binti Johari, J. Jaafar","doi":"10.1109/IVIT55443.2022.10033395","DOIUrl":"https://doi.org/10.1109/IVIT55443.2022.10033395","url":null,"abstract":"This research detects cyberbullying for the Malay language using supervised machine learning (ML) and Natural Language Processing (NLP). Due to the high number of cyberbullying cases in Malaysia over the years and the belief that there is an increased number of unreported cyberbullying cases, there needs an intelligent way to detect cyberbullying on social media. Thus, this research explores how supervised ML and NLP can help detect cyberbullying incidents for the Malay language on social media. The dataset was collected from Twitter by scrapping tweets based on some common Malay words used in cyberbullying incidents before being labelled into six cyberbullying classes: appearance, intellectual, political, racial, sexual, and non-abusive. The resulting cyberbullying dataset is an imbalanced dataset with 45,580 tweets. The model is then built using Logistic Regression (LR), Naïve Bayes (NB), Support Vector Machine (SVM) and Random Forest (RF) algorithms combined with three different feature extraction techniques, that is Bag of Words (BoW), Term Frequency-Inverse Document Frequency (TF-IDF) and Word2Vec. The result indicates that the best model uses LR combined with the TF-IDF feature extraction technique. The model was improved further by using an oversampling technique (Synthetic Minority Oversampling Technique, SMOTE) to deal with the imbalanced dataset and tuning the model hyperparameters. The F-Score of the optimised TF-IDF – LR is 0.46.","PeriodicalId":325667,"journal":{"name":"2022 International Visualization, Informatics and Technology Conference (IVIT)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127437142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syarifah Bahiyah Rahayu, Iqbal Shamsudheen, Mohd Sidek Fadhil Mohd Yunus, Mohd Hazali Mohamed Halip
{"title":"Three-Level Password Approach in Granting User Access to Shared Folders","authors":"Syarifah Bahiyah Rahayu, Iqbal Shamsudheen, Mohd Sidek Fadhil Mohd Yunus, Mohd Hazali Mohamed Halip","doi":"10.1109/IVIT55443.2022.10033357","DOIUrl":"https://doi.org/10.1109/IVIT55443.2022.10033357","url":null,"abstract":"An established file sharing infrastructure can be a huge convenience for organizations to allow members of all levels within an organization to collaborate and share data. While allowing multiple access to files and folders, the privacy and secrecy of files that reside in the shared space become something of a tradeoff among users. It has now become a major challenge to set folder exclusive access to certain users when shared media is accessible to all. Thus, this study proposed a method to lock a specific shared folder that can only be accessed by utilizing a three-level password approach. The proposed method required users to provide textual password at the first level, then employing a color combination picker at the second level and finally utilizing a picture password in third level. The knowledge of the passwords for each level can only be known by exclusive users in order to acquire access to the protected folder. This enhanced method will ensure the access right would only be granted to users with exclusive rights. Consequently, hard to guess password challenge has the added benefit of hindering illicit folder access attempt.","PeriodicalId":325667,"journal":{"name":"2022 International Visualization, Informatics and Technology Conference (IVIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127754019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kathlene P. Aglibot, Jewel A. Angeles, Jomar F. Gecana, Ariel B. Germano, Jessica A. Macalindong, R. Tolentino
{"title":"Urine Crystal Classification Using Convolutional Neural Networks","authors":"Kathlene P. Aglibot, Jewel A. Angeles, Jomar F. Gecana, Ariel B. Germano, Jessica A. Macalindong, R. Tolentino","doi":"10.1109/IVIT55443.2022.10033363","DOIUrl":"https://doi.org/10.1109/IVIT55443.2022.10033363","url":null,"abstract":"This study focuses on classifying different types of urine crystals using Convolutional Neural Networks (CNN). 1100 data samples are collected from medical books and hospitals and divided as training and testing datasets in a 70:30 percentage ratio. To yield an optimized reliability rate in classifying the types of urine crystals, CNN, a deep learning algorithm is used. First, the images underwent preprocessing stage to eliminate noise, to smooth, and to convert it as a binary image. In the segmentation process of the system, some images that contains overlapping urine crystals, indefinite in shape and colorless crystals become major factors and caused these images not to be optimally segmented. Layers of CNN are trained in a way that it can detect patterns from simple to further complex patterns. A convolution examines the entire image in search of information required for greater prediction accuracy. The system’s overall reliability is to be equal in 87.88%. The error rate for classification was often caused by the overlapping of urine crystals in the test image and differences of some urine crystals in terms of its shape and appearance.","PeriodicalId":325667,"journal":{"name":"2022 International Visualization, Informatics and Technology Conference (IVIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117101583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of excessive use of social media on students learning performance: Gratifications theory perspective","authors":"Shardha Nand, Siti Haryani Shaikh Ali","doi":"10.1109/IVIT55443.2022.10033346","DOIUrl":"https://doi.org/10.1109/IVIT55443.2022.10033346","url":null,"abstract":"Social media is a growing field, mostly everyone is availing the benefits of it. It seems that overuse of this technology may cripple academic standards of our next generations. Nevertheless research studies in this direction is limited, and recent information systems scholars has warranted more research in this direction. The motive of this study is to explore how excessive social media use affects students' academic performance and come up with a suggestion to reduce social media usage and increase educational learning of an individual. Using primary data collected from Pakistani university students, 265 entries were analyzed using SPSS tool. Findings suggest that usage of social networking sites has a significant result on undue use of social media. Furthermore, results also indicated that unwarranted use of social media has a detrimental effect on learning performance. Results also supported the idea that student technology self-efficacy diminishes the undesirable association between excessive social media use and academic performance.","PeriodicalId":325667,"journal":{"name":"2022 International Visualization, Informatics and Technology Conference (IVIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114177990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Suzaril Shah Bin Zakaria, Shafina Binti Mohamed Salleh, Ahmad Hafize Bin Ahmed Nasser, Mohd Ariff Majmi Zaaba, A. S. Ali
{"title":"LoRa Network Based Wearable Tracker- A Preliminary Work","authors":"Muhammad Suzaril Shah Bin Zakaria, Shafina Binti Mohamed Salleh, Ahmad Hafize Bin Ahmed Nasser, Mohd Ariff Majmi Zaaba, A. S. Ali","doi":"10.1109/IVIT55443.2022.10033340","DOIUrl":"https://doi.org/10.1109/IVIT55443.2022.10033340","url":null,"abstract":"In Malaysia, it is reported that many deaths are linked to heart-related complications. Many of these deaths are preventable if the caretaker can be notified of the warning signs leading to the complication. However, appointing a caretaker to monitor a patient around the clock is virtually impossible. The objective of this project is to create a system to notify the caretakers in real-time of the locations of the patients and warn them of possible risks of complications. The proposed system uses the LoRa Network to communicate without needing communication towers or routers as intermediaries. The development of the prototype using the Iterative Waterfall Model is focused on the feasibility of this technology to be equipped in a small tracker device powered by a lightweight lithium battery and to find a way to bridge the connection between the LoRa network and smartphones since currently, there is yet to be a smartphone that comes equipped with such technology. At the end of the project, it is concluded and verified by the testing done that it is indeed feasible to use LoRa as a means of transferring critical information, as it can transmit information for over 100-meters without the need for any intermediary device to facilitate the communications. However, further testing in urban areas and in different weather conditions is needed if such devices are widely used in real-life applications.","PeriodicalId":325667,"journal":{"name":"2022 International Visualization, Informatics and Technology Conference (IVIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Zainuddin, Mohamed Ibrahim Abd Majid, H. Hamizan, A. A. Puzi, Nuaomi Jusat, Krishnan Subramaniam, R. Sahak, A. Mansor, Satya Devu Svpk, Siti Husna Abdul Rahman, Muhammad Farhan Affendi bin Yunos
{"title":"Design of Mobile Application for SME Business Sustainability During Post Covid-19","authors":"A. Zainuddin, Mohamed Ibrahim Abd Majid, H. Hamizan, A. A. Puzi, Nuaomi Jusat, Krishnan Subramaniam, R. Sahak, A. Mansor, Satya Devu Svpk, Siti Husna Abdul Rahman, Muhammad Farhan Affendi bin Yunos","doi":"10.1109/IVIT55443.2022.10033365","DOIUrl":"https://doi.org/10.1109/IVIT55443.2022.10033365","url":null,"abstract":"In the 21st century, mobile and portable devices have become an integral part of people's lives, assisting them in managing daily tasks, whether for work or personal reasons. Furthermore, this technology will benefit people, particularly those who run small to medium-sized businesses (SMEs), by allowing them to manage their firms’ using smartphones and other portable devices from anywhere and at any time. However, many SMEs in Malaysia do not own a mobile app. During this Covid-19 pandemic, the country's economic growth rate has slowed. It has impacted negatively on all types of businesses on a massive scale. Several major retailers have temporarily closed their doors. Aside from that, poor footfalls are causing problems for medium and small-sized enterprises. They have entirely lost their businesses due to the absence of a mobile app. They might still earn profits if they had their smartphone app because the delivery sectors were still operating as usual. The primary purpose of this study is to create importance of using electronic commerce mobile applications among SME business owners. This ecommerce mobile application was developed using Android studio with Kotlin programming language. UI of this application was designed with simple widget and layout. Google Firebase platform was connected to Android studio application which is used to store user details and verify whenever user try to login.","PeriodicalId":325667,"journal":{"name":"2022 International Visualization, Informatics and Technology Conference (IVIT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122048680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hana Munira Muhd Mukhtar, R. Ismail, Yasmin Yahya, Azizah Rahmat
{"title":"Timber Harvesting Decision-Making for Sustainable Forest Management: Elimination Process of Potential Tree To Be Harvested On Promoting Forest Regrowth and Minimize Damages","authors":"Hana Munira Muhd Mukhtar, R. Ismail, Yasmin Yahya, Azizah Rahmat","doi":"10.1109/IVIT55443.2022.10033391","DOIUrl":"https://doi.org/10.1109/IVIT55443.2022.10033391","url":null,"abstract":"Sustainable Forest Management (SFM) is important to maintain the world's ecosystem. Forest conservation and natural regeneration are crucial as mitigation actions to preserve the species composition structure and biodiversity of the forest. At present, there are studies indicate that the current logging practice is not sustainable. Hence, a revision and adoption of appropriate harvesting methods are critical to ensure forest regrowth. The adequate growth of residual forest stands and minimizing damages require high consideration towards improving forest management decisions on the timber harvesting process. Various options need to consider in selecting the potential tree to be harvested that complies with Sustainable Forest Management (SFM). The main objective of this study is to propose 4 cases of elimination process to determine the potential trees to be harvested by considering the forest re-growth and residual trees' minimum damage besides high production volume and production value. The methodology chosen is the waterfall model. Meanwhile, the finding of this research; the result provides a significant impact on promoting forest regrowth and minimizes damages.","PeriodicalId":325667,"journal":{"name":"2022 International Visualization, Informatics and Technology Conference (IVIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128112517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}