{"title":"Smart Campus Food Ordering and Recommendation System with Emotion Booster: A First Design","authors":"Akeem Olowolayemo, Ahmed Faisal, Muhammad Ismail","doi":"10.31436/ijpcc.v10i1.454","DOIUrl":"https://doi.org/10.31436/ijpcc.v10i1.454","url":null,"abstract":"A healthy food intake is necessary for every person to function to their optimum potential. Apart from keeping the body fit and full of energy, food is also known to boost people’s moods and ward off negative emotions. Typically, people order food, considering their budget, the time of the day as well as what they are craving. Consequently, this study proposes a system that can detect users’ moods depending on their facial expression and accordingly, recommends food that they usually order during that particular emotion or related food, to subsequently improve how they feel. The system keeps track of a user’s budget, the time of the day, the users’ current emotions, and provides recommendations with a view to boosting their mood through foods that they like or through foods that are scientifically proven to help improve their mood. The system is intertwined with a campus food ordering system specifically designed for on-campus food stalls in their respective hostels. This food ordering system allows us to get an insight into the student’s preferences and include them in our recommendations as well as providing a delivery system that allows students to save time from standing in queues usually during rush hour. The usability evaluation conducted to evaluate the system proved successful as all the users that evaluated the system provided positive feedback and most of the tasks assigned to them were satisfactorily completed.","PeriodicalId":479637,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"339 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140490882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noor Hayani Abdul Rahim, Abdul Rashid Nuhairi, Muhammad Irfan Danial Baharim
{"title":"Famlogger: The development of keylogger tools for parental online monitoring","authors":"Noor Hayani Abdul Rahim, Abdul Rashid Nuhairi, Muhammad Irfan Danial Baharim","doi":"10.31436/ijpcc.v10i1.437","DOIUrl":"https://doi.org/10.31436/ijpcc.v10i1.437","url":null,"abstract":"Recent advances in the Internet have brought about many benefits, but they have also created a number of major problems, particularly for children. One of the most pressing issues is the exposure of children to inappropriate content, such as cyberbullying, online grooming, phishing, and explicit material. This problem is exacerbated by the fact that children are often alone and unsupervised while using the Internet, making it difficult for parents to monitor their online activity. In order to address this issue, a developer has proposed the creation of FamLogger, a keylogger system that would allow parents to monitor their children's online activity from anywhere in the home. The system is designed to provide parents with real-time updates on their children's online activity, including the websites they visit, the apps they use, and the messages they send. To ensure that the system meets the needs of parents and children alike, a survey has been conducted to gather feedback and requirements for the system. The survey results are used to improve the quality of the system and make it more user-friendly for parents. FamLogger can help parents monitor their children's activity from anywhere in the home, providing them with peace of mind and giving them the ability to intervene if necessary.","PeriodicalId":479637,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"44 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140490670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Najhan M.Ibrahim, Mohd Fadzil Hassan, Muhammad Amrullah Drs Nasrul
{"title":"Multi-Agent System in Web Services","authors":"Najhan M.Ibrahim, Mohd Fadzil Hassan, Muhammad Amrullah Drs Nasrul","doi":"10.31436/ijpcc.v10i1.429","DOIUrl":"https://doi.org/10.31436/ijpcc.v10i1.429","url":null,"abstract":"The term \"service-oriented architecture\" (SOA) refers to a software paradigm for creating systems made up of a variety of services that interact with one another to accomplish a certain task. The communications involve more than just transmitting data back and forth; they also connect two or more services to coordinate the required operations. Cross-platform communication is necessary for the coordinating process when services are spread across several platforms. Several web service standards and specifications are used in the present SOA implementation. Based on the prototype's implementation and simulation, this proposed research study has been validated and evaluated. The suggested cross-platform communications architecture is implemented using NetBeans, JADE, WSIG, and OWL-S. An integrated development environment for Java is offered by Oracle in the form of NetBeans. Telecom Italia's Java Agent DEvelopment Framework (JADE) is an agent software framework that is entirely built in the Java language. Web Service Integration Gateway (WSIG), which helps to facilitate JADE agent services being called by Web service clients. The core fundamental engine of the suggested framework is OWL-S. It is a web ontology language used to describe Semantic Web Services in the Semantic Web's OWL-based framework. A quantitative approach is used in this study's performance analysis and comparative investigation for evaluation and validation. The prototype's major element is the Java agent development framework (JADE), which was used to create a multi-agent system for the agent-based MOM framework that has been presented. The creation of the multi-agent systems was facilitated by the JADE platform. JADE 3.7 was the version that was employed. Two key features of JADE are a FIPA-compliant agent platform and a package for creating Java agents. The implementation results show that the proposed agent-based MOM framework was successful communicate between multiple types of SOA application with a better performance of the average of round-trip time where the proposed framework was successful in responding to all the requests.","PeriodicalId":479637,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"385 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140490798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transporter Mobile Application","authors":"Ahmad Faiz Tajul Anuar, Noor Azura Zakaria","doi":"10.31436/ijpcc.v10i1.459","DOIUrl":"https://doi.org/10.31436/ijpcc.v10i1.459","url":null,"abstract":"Transporter is a popular service within the IIUM community. It is an e-hailing service operated by the community itself. It is hosted on the Telegram app, which is available on Android, iOS, and desktop computers. However, there are various downsides related to handling user registration, transportation requests, and efficiency. To address these shortcomings, a transporter application was created as a mobile app. This project intends to create a mobile application employing the agile method and FlutterFlow, a low-code platform built on top of Flutter, an open-source development framework. At the same time, it improves on the current IIUM transporter system while retaining the features that make it so popular among the community.","PeriodicalId":479637,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"7 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140490590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmad Zulfakar Abd Aziz, Muhammad Fitri Mohd Sultan, Nurul Liyana Mohamad Zulkufli
{"title":"Image Steganography:","authors":"Ahmad Zulfakar Abd Aziz, Muhammad Fitri Mohd Sultan, Nurul Liyana Mohamad Zulkufli","doi":"10.31436/ijpcc.v10i1.449","DOIUrl":"https://doi.org/10.31436/ijpcc.v10i1.449","url":null,"abstract":"Steganography is the practice of hiding secret information within other media, such as images, audio, video, and text. It has become increasingly important in today's society as a way to enable private and secure communication. This research project focuses on image steganography techniques that are used to evade detection of the secret message through statistical steganalysis techniques. The aim of this research is to compare and evaluate different image steganography methods, study their implementation complexity, and propose a framework to improve current approaches. The research will provide a comparison of the efficiency of different steganography techniques in avoiding detection by steganalysis and may lead to the development of better steganography techniques in the future. This paper focuses on the three steganography methods in the spatial domain: Least Significant Bit (LSB), Pixel-Value Difference (PVD) and Edge-based Data Embedding (EBE) methods. A simple experiment has been conducted to encrypt several images using these three methods, and the distortion measure for LSB using mean square error (MSE) and peak-to-noise ratio (PSNR) has been investigated. Although the distortion measure result is considered acceptable for LSB method in the experiment, all methods resulted in significant difference in the file capacity. This shows that further enhancement in the security of the encryption is necessary so that the secret message will not be easily discovered. Thus, in this paper, we propose a conceptualized enhancement in the security using Morse Code, Base 64, SHA-245, and Advanced Encryption Standard (AES) before encrypting using PVD.","PeriodicalId":479637,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"394 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140490790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilising VGG-16 of Convolutional Neural Network for Medical Image Classification","authors":"Amelia Ritahani Ismail, Syed Qamrun Nisa, Shahida Adila Shaharuddin, Syahmi Irdina Masni, Syaza Athirah Suharudin Amin","doi":"10.31436/ijpcc.v10i1.460","DOIUrl":"https://doi.org/10.31436/ijpcc.v10i1.460","url":null,"abstract":"Medical image classification, which involves accurately classifying anomalies or abnormalities within images, is an important area of attention in healthcare domain. It requires a fast and exact classification to ensure appropriate and timely treatment to the patients. This paper introduces a model based on Convolutional Neural Network (CNN) that utilises the VGG16 architecture for medical image classification, specifically in brain tumour and Alzheimer dataset. The VGG16 architecture, is known for its remarkable ability to extract important features, that is crucial in medical image classification. To enhance the precision of diagnosis, a detailed experimental setup is conducted, which includes the careful selection and organisation of a collection of medical images that cover different illnesses and anomalies to the dataset. The architecture of the model is then adjusted to achieve optimal performance in for image classification. The results show the model's efficiency in identifying anomalies in medical images especially for brain tumour dataset. The sensitivity, specificity, and F1-score evaluation metrics are presented, emphasising the model's ability to accurately differentiate between various medical image diseases.","PeriodicalId":479637,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"199 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140491537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jamaludin Nazurin, Ahmad Kamran Alya, Azlin Nordin
{"title":"Collaborative Requirements Review Tool (Collaborev) to Support Requirements Validation","authors":"Jamaludin Nazurin, Ahmad Kamran Alya, Azlin Nordin","doi":"10.31436/ijpcc.v10i1.456","DOIUrl":"https://doi.org/10.31436/ijpcc.v10i1.456","url":null,"abstract":"Requirements review involves a team of reviewers, who will go through the requirements in an attempt to find any requirements issues. The checklist-based technique is the most typically adopted method during requirements reviews. Due to the inconsistency and inefficiency of manual requirements review procedures, requirement engineers often find it challenging to effectively and productively review requirements. By streamlining the process with automated processes, collaborative features, and clear traceability, the web-based solution increases productivity, accuracy, and transparency of review. This innovative solution solves the shortcomings of manual procedures, paving the way for more fruitful software development endeavours. The software project was planned and managed using the Model-View-Controller (MVC) architecture framework and adopted an iterative prototyping methodology. The implementation of the project is using Laravel framework by utilizing PHP, JavaScript, HTML, CSS, Bootstrap, and MySQL.","PeriodicalId":479637,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140490775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hani Kadouf, Abdul Wahab Abdul Rahman, Norhaslinda Kamaruddin, Jamilah Hanum Abdul Khaiyom
{"title":"Affective Modelling of Eustress and Distress using Psychological Scales","authors":"Hani Kadouf, Abdul Wahab Abdul Rahman, Norhaslinda Kamaruddin, Jamilah Hanum Abdul Khaiyom","doi":"10.31436/ijpcc.v10i1.434","DOIUrl":"https://doi.org/10.31436/ijpcc.v10i1.434","url":null,"abstract":"This article is a case study that illustrates how a linear regression model can be implemented in eustress and distress analysis based on the correlation between emotion and stress and uses it to develop prediction equations of stress. This study proposes the use of five questionnaires; Perceived Stress Scale 10, Academic Eustress scale, Academic Distress scale, Bosse’s Distress Eustress scale and Adolescent Distress Eustress scale to determine perceived stress, eustress or distress. A sixth questionnaire, the Self-Assessment Manikin was used to determine emotional state in terms of valence and arousal, which are represented on 2-dimensional axis, where the x axis represents valence, and the y axis represents arousal. An analysis of the relationship between the results of the stress questionnaires and results of SAM based valence and arousal is carried out. Significant correlations are then used to derive regression equations used to predict eustress, distress or perceived stress. The findings showed that neither valence nor arousal was correlated with perceived stress, hence no regression equation was derived for it. However, valence and/or arousal were correlated with the remaining five questionnaires. Finally, this article analyzes the predictions comparing actual vs predicted values. Error analysis showed that the ADES questionnaire had the lowest average error, making it the most suitable in predicting eustress and distress from emotion.","PeriodicalId":479637,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"267 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140491448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adamu Abubakar, Nadhirah Muhammed Najmuddin, Rabiatul Adawiyah Mohd Alwi, Nur Amirotul Izzah Mohamad Faizal
{"title":"Examining Potential Threats of Eavesdropping in TCP Stream of Personal Interactive Transmission Session","authors":"Adamu Abubakar, Nadhirah Muhammed Najmuddin, Rabiatul Adawiyah Mohd Alwi, Nur Amirotul Izzah Mohamad Faizal","doi":"10.31436/ijpcc.v10i1.461","DOIUrl":"https://doi.org/10.31436/ijpcc.v10i1.461","url":null,"abstract":"This study establishes that Personal Interactive Transmission Sessions conducted using TCP streams provide exceptional convenience and immediacy. However, they also provide noteworthy challenges and considerations, especially in terms of security, integrity, and performance. This study investigates the security weaknesses present in potential eavesdropping threats on TCP Streams during personal interactive transmission sessions. An experimental analysis was carried out, by doing a comprehensive analysis of network traffic using Wireshark. The investigation reveals a notable vulnerability in the management of user-provided data, together with the possible risks of eavesdropping, emphasizing the urgent need for enhanced security measures. The findings underscore the need of proactive cybersecurity strategies, such as frequent security audits, vulnerability assessments, and the implementation of robust encryption methods, to safeguard user privacy and ensure data integrity. To enhance risk mitigation, data protection, and user confidence in the digital environment, organizations should prioritize addressing potential eavesdropping threats during transmission sessions that involve sensitive personal data.","PeriodicalId":479637,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"76 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140491142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zaireen Abdul Rahman, Bazilah A. Talip, Husna Sarirah
{"title":"Exploring Customer Review of Local Agriculture Product Acceptance in Malaysia: A Concept Paper on Sentiment Mining","authors":"Zaireen Abdul Rahman, Bazilah A. Talip, Husna Sarirah","doi":"10.31436/ijpcc.v10i1.418","DOIUrl":"https://doi.org/10.31436/ijpcc.v10i1.418","url":null,"abstract":"Online consumer reviews in e-commerce are one technique to gather consumer opinion and sentiment about a company's products and services. However, manual analysis is impractical due to natural language text's enormous volume and complexity. Text mining and sentiment analysis methods based on machine learning provide an opportunity to analyze data for marketing objectives by increasing sales, positive electronic word-of-mouth (e-WOM), and meeting consumer demands and wants through the enhancement of market offerings. Despite the numerous benefits of analyzing e-commerce reviews to assist a company's marketing strategy, very little research has focused on sentiment and acceptance for Malaysia’s local agriculture products due to mixed language (English-Malay language) processing challenges. This concept paper highlights the use of text mining techniques to extract valuable insights from e-commerce comments related to Malaysian local agriculture products. By leveraging text mining, the study aims to better understand consumer sentiments, preferences, and feedback regarding local products, thereby facilitating improved market analysis and decision-making processes.","PeriodicalId":479637,"journal":{"name":"International Journal on Perceptive and Cognitive Computing","volume":"120 9-10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140491707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}