{"title":"Face and Facial Expressions Recognition System for Blind People Using ResNet50 Architecture and CNN","authors":"Jia-Rou Lee, Kok-Why Ng, Yih-Jian Yoong","doi":"10.33093/jiwe.2023.2.2.20","DOIUrl":"https://doi.org/10.33093/jiwe.2023.2.2.20","url":null,"abstract":"Many blind individuals have difficulties in recognizing people’s facial expression which may impact their social interaction. With the recognition, the blind individuals can accurately interpret and respond to the emotions. There is a lack in the existing application with the combination of face and facial expressions recognition. The blind individuals have to rely on multiple applications to accomplish the same task, making it difficult and time-consuming for them to use. The paper aims to recognize faces and facial expressions for blind individuals and provides feedback in real-time. Three face detection algorithms of Haar Cascade Classifier, Dlib, and RetinaFace are compared. Dlib is chosen to process with Histogram of Oriented Gradients (HOG) and Support Vector Machine (SVM). It loads the pre-trained model, computes the HOG features, slide the window scanning at different scales, classify the windows using the SVM classifier, generate bounding boxes, and applying non-maximum suppression. ResNet50 architecture is employed to recognize face and Convolutional Neural Networks (CNN) is applied to recognize facial expression. The training accuracy is 70% and validation accuracy is 60%.","PeriodicalId":484462,"journal":{"name":"Journal of Informatics and Web Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134990004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilizing Fuzzy Algorithm for Understanding Emotional Intelligence on Individual Feedback","authors":"Elham Abdulwahab Anaam, Su-Cheng Haw, Kok-Why Ng, Palanichamy Naveen, Rasha Thabit","doi":"10.33093/jiwe.2023.2.2.19","DOIUrl":"https://doi.org/10.33093/jiwe.2023.2.2.19","url":null,"abstract":"algorithms for FCMs are commonly utilized for assessing correlated systems that are complicated, that were created by fusing logic that is fuzzy and deep neural networks, in addition to attracted a lot of academic attention during the last ten years of study. FCMs are currently used in many different segments of application, including technology, These An essential component of informal communication, body language propose insight into a person's purposes & feelings of affection. Whereas previous studies have examined the manner in which individuals should express regret or ask for assistance, there hasn't been a thorough examination of the methods used to create an emotionally intelligent (EI) artificial a representative. This study examines a number of significant usages and developments of fuzzy mental modeling. The primary objective of the current section is to provide an innovative technique for modeling an emotion-based acceleration the compressor for individuals. Methodologies of experiential thinking postulate which our comprehension of face emotional reactions depends significantly on facial behavior imitation and the reactions as opportunities. Considering the theoretical foundations of combined logical reasoning. In addition, the hypothesis of probability, it additionally is not effective to build a comprehensive hypothesis concerning impressions. Combining EI with fuzzy logic as a combination, we were able to tackle issues with current techniques that neither artificial intelligence nor fuzzy mathematics alone could.","PeriodicalId":484462,"journal":{"name":"Journal of Informatics and Web Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134989830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sin Yin Ong, Choo Yee Ting, Hui Ngo Goh, Albert Quek, Chin Leei Cham
{"title":"Workplace Preference Analytics Among Graduates","authors":"Sin Yin Ong, Choo Yee Ting, Hui Ngo Goh, Albert Quek, Chin Leei Cham","doi":"10.33093/jiwe.2023.2.2.17","DOIUrl":"https://doi.org/10.33093/jiwe.2023.2.2.17","url":null,"abstract":"Graduates often find themselves difficult to secure a job after completing their education at universities or colleges. In this light, researchers have proposed various solutions to address this challenge. However, most of the work has largely focused on academic profile and personality traits; very few have highlighted the importance of workplace location characteristics. To address this challenge, this study has employed feature selection and machine learning approach to help graduates identify desired company type and sector based on their preferences and preferred location. The data used in this study was obtained from the Ministry of Higher Education Graduates Tracer Study's data, specifically for 2382 Multimedia University (MMU) students' employment situation upon graduating. Additional analytical datasets focusing on company and graduate locations were developed in order to extract further features relevant for this analysis. Feature selection was used to identify top-10 predictors that influence the selection of jobs in graduates' desired sectors. Various analytics methods such as Decision Tree Analysis, Random Forest Model selection, Naive Bayes Classification Method, Support Vector Machines and K-Nearest Neighbor Algorithms were employed for comparative evaluations within the workplace analytics scope. Notably so, results from this study demonstrate that using Random Forest Algorithm resulted in better performance in predicting employment status with an accuracy rate of 99.40%, predicting company type with 66.60% and lastly predicting company sector with 30.80% when compared to other predictive models utilized during our research work's project lifecycle phase.","PeriodicalId":484462,"journal":{"name":"Journal of Informatics and Web Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134990001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AIRA: An Intelligent Recommendation Agent Application for Movies","authors":"Ayesha Anees Zaveri, Ramsha Mashood, Sarama Shehmir, Misbah Parveen, Naveera Sami, Mobeen Nazar","doi":"10.33093/jiwe.2023.2.2.6","DOIUrl":"https://doi.org/10.33093/jiwe.2023.2.2.6","url":null,"abstract":"An intelligent Recommendation App has been developed to assist caregivers. This project's primary objective is to assist parents in determining whether a particular movie/cartoon/drama is adequate for their children by providing ratings that will assist them in identifying age-appropriate content. This application will provide reliable evaluations, reviews, and recommendations to parents. Each rating and review are based on fundamental, essential child development principles. Intelligent Recommendation Agent aids families in making intelligent media selections. It provides the most extensive and reliable database of learning ratings, age recommendations, and content evaluations for films, television series, and dramas. In addition, there will be a list of abusive words from the content with its subtitles so that parents can identify appropriate content for children. By limiting their child's exposure to violent acts, parents can play a positive role in their child's life by using this application. Movies with positive role models can also have a positive effect on children.","PeriodicalId":484462,"journal":{"name":"Journal of Informatics and Web Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134990000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Engaging Learning Experience: Enhancing Productivity Software Lessons with Screencast Videos","authors":"Usha Vellappan, Lim Liyen, Su Yin Lim","doi":"10.33093/jiwe.2023.2.2.14","DOIUrl":"https://doi.org/10.33093/jiwe.2023.2.2.14","url":null,"abstract":"The use of screencast videos can improve the effectiveness of the teaching and learning process, whether it is face-to-face or online. Screencast videos are digital resources that capture the computer screen and create an audio-visual experience, and they can be shared online to aid the learning process. It eliminates the need for educators to repeat information multiple times and creates an uninterrupted personalised learning environment for the students. This method of learning gives students a more personalised sense, as if they were given one-on-one guidance from the educator, with students having access to the educator and receiving immediate feedback during the class session. The purpose of this study is to investigate how well students learn when screencast videos are used as instructional materials in lab classes. The report gives the opinions of 34 business programme students regarding their experience learning basic word processing, presentation slides, and spreadsheet creation using screencast recordings. This is a descriptive study with data collected using a Likert scale questionnaire. According to the study's findings, students responded favourably to this technique. Students stated that they can study more effectively and complete their work faster when there is no interruption. They were able to fully concentrate on the videos and effortlessly follow the instructions. When compared to traditional instructor-led lab programmes, the time required to complete the video lessons and supplementary challenge questions was significantly reduced. They also appreciated the educator’s immediate feedback because the educator's time was spent observing them rather than teaching.","PeriodicalId":484462,"journal":{"name":"Journal of Informatics and Web Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134989652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Assistance of Eye Blink Detection for Two- Factor Authentication","authors":"Wei-Hoong Chuah, Siew-Chin Chong, Lee-Ying Chong","doi":"10.33093/jiwe.2023.2.2.8","DOIUrl":"https://doi.org/10.33093/jiwe.2023.2.2.8","url":null,"abstract":"This paper discusses the implementation of a blink detection method using 68 facial markers and the eye aspect ratio (EAR) to provide strong protection for access systems. It investigates the importance of 68 facial markers and explores how to use eye landmarks to calculate the eye aspect ratio. Access systems, which should have good security measures and be difficult to decipher, are typically safeguarded by passwords or multi-factor verification, such as passwords combined with facial recognition. However, these methods have inherent weaknesses, including the risk of shoulder surfing with passwords and the potential to be deceived by fake face images with facial recognition. To address these issues, a two-factor authentication method by using password with eye blink recognition is proposed as an effective solution for access control. By incorporating real-time eye blinking action, the system can avoid the use of fake images and prevent shoulder spoofing. To demonstrate the practical application of eye blink detection for enhanced two-factor authentication, a web application called \"Eblink\" is introduced. Functional tests have been conducted to validate the application's core features.","PeriodicalId":484462,"journal":{"name":"Journal of Informatics and Web Engineering","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134989842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi Hong Tay, Shih Yin Ooi, Ying Han Pang, Ying Huey Gan, Sook Ling Lew
{"title":"Ensuring Privacy and Security on Banking Websites in Malaysia: A Cookies Scanner Solution","authors":"Yi Hong Tay, Shih Yin Ooi, Ying Han Pang, Ying Huey Gan, Sook Ling Lew","doi":"10.33093/jiwe.2023.2.2.12","DOIUrl":"https://doi.org/10.33093/jiwe.2023.2.2.12","url":null,"abstract":"In this new era of science and technology, data can be said to be an extremely valuable asset for individuals, corporations, and even countries. Different parties attempt to obtain users' data occasionally, and the collection of web cookies is a prominent example. When users use a computer network, their data will be saved by the web server as cookies, including their private information. As people with bad intentions obtain this information, they can use it to commit cybercrimes and cause losses to the information owners. Thus, cookies management is vital for web users to protect their data. This paper proposes a cookies scanner for banking websites in Malaysia to help web users manage cookies. The scope is focused on banking websites as it is the most targeted website by cybercriminals. The proposed scanner will help users identify, understand, and manage cookies to keep their banking information safe. This paper explores existing cookie scanners to determine the proposed system's design and identify improvement areas. In this paper, we proposed a framework to develop the cookie scanner in the browser extension format. The system's access mode, workflow, functionalities, technical specifications, and requirements are discussed throughout the paper. To show our contribution, a copy of the proposed code implementation has been made available at https://github.com/gnohiy/cookies-scanner-for-banking-websites-in-malaysia.git.","PeriodicalId":484462,"journal":{"name":"Journal of Informatics and Web Engineering","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134989829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}