https://jcrinn.com/index.php/jcrinn/issue/feed Journal of Computing Research and Innovation 2025-03-06T08:29:02+00:00 Chief Editor (attn: Siti Zulaiha Ahmad) editor@jcrinn.com Open Journal Systems <p><strong>Journal of Computing Research and Innovation (<em>eISSN : 2600-8793</em>)</strong> is a double-blind peer-reviewed, open access journal which is published bi-anually in March and September. JCRINN is managed by Universiti Teknologi MARA, Perlis Branch, MALAYSIA and published by UiTM Press.</p> <p><strong>Frequency of Publication (until 2021) : </strong>Quarterly (January, April, July and October)<br /><strong>Frequency of Publication</strong> <strong>(2022- onwards)</strong> : Twice a year (March and September)</p> <p><strong>Manuscript Language:</strong> English</p> <p> </p> https://jcrinn.com/index.php/jcrinn/article/view/510 Encouraging Recycling in Bangi Selatan Through a Content-Based Filtering Web Application 2025-03-06T07:54:21+00:00 Muhammad Akmal Ahmad Nawawi nawawi@example.com Tajul Rosli Razak tajulrosli@uitm.edu.my <p class="Abstract">This study addresses the challenges faced by residents of Bangi Selatan in adopting 3R (Reduce, Reuse, Recycle) practices, primarily due to a lack of interest in conservation efforts and insufficient awareness of recycling’s importance. To address these challenges, we presented a web application that enhances recycling adoption by delivering personalized content recommendations. The key contributions of this study include the development of a novel recommendation system based on content-based filtering (CBF) with improved accuracy through a modified Term Frequency-Inverse Document Frequency (TF-IDF) formula. We compare various recommendation techniques, including collaborative and hybrid filtering, and demonstrate how CBF effectively improves user engagement with recycling content. Our methodology involves advanced text vectorization and cosine similarity for precise content matching. User acceptance testing confirms the system’s effectiveness in increasing user engagement with relevant recycling information. This study highlights the potential of personalized recommendation systems in promoting environmental conservation and provides a foundation for future enhancements in recycling initiatives.</p> 2025-03-01T00:00:00+00:00 Copyright (c) 2025 Muhammad Akmal Ahmad Nawawi, Tajul Rosli Razak (Author) https://jcrinn.com/index.php/jcrinn/article/view/509 HelpMe: Early Detection of University Students' Mental Health Issues Using a Chatbot-Integrated Dashboard 2025-03-06T07:48:43+00:00 Nadia Abdul Wahab nadiawahab@uitm.edu.my Ahmad Asyraf Zainudin asyraf@example.com Aznoora Osman aznoora@uitm.edu.my Norfiza Ibrahim norfiza@uitm.edu.my Abdul Hapes Mohammed hapes@uitm.edu.my <p>University students face increasing mental health challenges due to academic, social, and financial pressures, yet a shortage of mental health professionals limits early intervention. To bridge this gap, HelpMe—a web-based system with an interactive dashboard and chatbot—was developed for early mental health detection. The system provides a private space for students to monitor their well-being, with the chatbot guiding users through mental health screenings and offering conversational support, while the dashboard visualizes data for tracking emotional states over time. Developed using the Design Science Research Methodology (DSRM), HelpMe follows a structured process of problem identification, system design, and evaluation. The dashboard prioritizes simplicity and engagement, utilizing Power BI for data visualization, while the chatbot ensures a user-friendly mental health screening experience. User Experience Testing (UXT) with 30 university students assessed the system across six key scales, including attractiveness, efficiency, and dependability. Feedback was largely positive, especially regarding simplicity and visual appeal, though challenges were noted in chatbot responsiveness and dashboard efficiency, with occasional delays. This study highlights HelpMe’s potential as an accessible mental health support tool and identifies areas for improvement. Future enhancements will focus on refining chatbot interactions and optimizing real-time dashboard functionality to better support student well-being</p> 2025-03-06T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/508 Evaluating Network Performance in a Web-Based Augmented Reality System for Lipmatte Color Recommendation 2025-03-06T07:41:59+00:00 Zulfikri Paidi fikri@uitm.edu.my Nurhanna Md Abd Wahid nurhanna@example.com Nurzaid Muhd Zain nurzaid@uitm.edu.my Mahfudzah Othman fudzah@uitm.edu.my <p>This study presents the Augmented Reality (AR) Lipmatte Recommendation System aimed at enhancing user experience and optimizing performance within the beauty industry. By utilizing AR technology, the system offers real-time virtual lipstick try-ons and personalized shade suggestions based on users' skin tones. Key functionalities include user registration and secure authentication, ensuring personalized and protected access. The system's performance focuses on delivering precise AR overlays for virtual try-ons, emphasizing low latency and seamless interaction across varied network environments. Network performance was analyzed in two scenarios: client-to-server data transfer and resource loading. Performance metrics indicated that the system efficiently managed increased network traffic and resource demands, demonstrating scalability and responsiveness. For instance, the average network transfer rate increased from 1.29 KB/s with four devices to 2.47 KB/s with twenty devices, confirming the system's ability to handle larger data flows efficiently. Similarly, resource loading times varied, with an average loading time of 3.76 ms for four devices, improving to 2.44 ms with eight devices, and peaking at 3.96 ms with sixteen devices before stabilizing at 2.80 ms with twenty devices. These findings underscore the necessity of a robust network infrastructure to ensure a seamless AR experience, which is vital for enhancing consumer engagement, brand loyalty, and purchasing decisions in beauty applications. This research highlights the significant potential of AR technology in modernizing the beauty shopping experience while illustrating the critical role of network performance in achieving optimal user satisfaction. Future investigations should explore advanced dynamic resource allocation algorithms and emerging technologies, such as 5G connectivity and edge computing, to further enhance real-time AR applications and better understand user interactions with AR in retail settings.</p> 2025-03-06T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/507 I-Attend: A Smart Attendance System for Secondary Schools Using RFID 2025-03-06T07:33:05+00:00 Nurul Afiqah Azri Mazlan afiqah@example.com Ruzita Ahmad ruzitaahmad@uitm.edu.my <p>I-Attend is a smart attendance system targeted at secondary school administrators and teachers. The purpose of this project is to develop a smart attendance system integrated with RFID technology to improve the efficiency and accuracy of attendance tracking. The research problems investigated include the challenges associated with the traditional method of attendance systems, such as time consumption, proneness to error, and difficulties in data retrieval due to the size of the student population. The study seeks to address these issues by proposing a technological solution that enhances the attendance process for administrators and teachers. This project design involves the development of a web-based attendance tracking system that utilises RFID technology and cloud computing. The I-Attend employs functionality testing and usability testing, revealing a mean score of 4.57, indicating a high level of satisfaction, and achieving a score of 4.71 for its ease of use. To conclude, the I-Attend effectively addresses the limitations of traditional attendance tracking methods. The positive feedback and high satisfaction from users show that the system not only meets the specific needs of administrators and teachers but also enhances the efficiency of overall attendance management in secondary schools</p> 2025-03-06T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/506 ASEAN Countries’ Life and Death Expectancy Visualization Dashboard 2025-03-06T07:19:04+00:00 Nurul Shazwani Azri shazwani@example.com Norfiza Ibrahim norfiza@uitm.edu.my Azmi Abu Seman azmi384@uitm.edu.my Nadia Abdul Wahab nadiawahab@uitm.edu.my Aznoora Osman aznoora@uitm.edu.my <p>Death is the complete cessation of life processes that every living thing experiences at some point. It is influenced by various factors, including biological, behavioral, and societal determinants. Big data and data visualization are essential tools for understanding complex datasets and making informed decisions. This study focuses on life and death expectancy in ASEAN countries, aiming to address increasing rates of heart diseases, cancer, accidents, and infectious diseases by developing an interactive dashboard using Power BI. Despite available data, there is a lack of user-friendly dashboards that inform the public about causes of death, contributing to a lack of awareness and preventive measures. The objective is to identify trends and patterns in life and death expectancy, design and develop a dashboard, and evaluate its usability. The research scope includes collecting data from official sources like the Department of Statistics Malaysia and Kaggle and classifying the causes of death into meaningful categories. The significance of this study lies in providing accessible information to the public, raising awareness about health issues, and aiding individuals and governments in making informed health decisions. By highlighting health disparities and informing public health policies, the dashboard aims to improve healthcare systems and overall quality of life in ASEAN countries. This research follows the Waterfall Model, including planning, design, development, implementation, and evaluation phases. The process involves extracting, loading, and transforming data through Apache Hive. Microsoft Power BI is used to visualize the data extracted from the warehouse. The dashboard was evaluated by 40 respondents to validate its functionality, usability, and overall performance. Positive feedback highlights its potential as a valuable tool for public health in ASEAN countries.</p> <p>&nbsp;</p> 2025-03-06T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/505 Nonlinear Equation Solver with MATLAB Graphical User Interface 2025-03-06T07:08:07+00:00 Nur Idalisa Norddin nuridalisa@uitm.edu.my Nurul Hafawati Fadhilah nurulhafawatifadhilah@gmail.com Muhammad Azri Azman Shah azrimuhammad1620@gmail.com Nurul Hajar Mohd Yusoff nurulhajar@utem.edu.my Nur Intan Syafinaz Ahmad nurin395@uitm.edu.my <p>Nonlinear systems of equations, which is common in scientific and engineering fields, pose a significant difficulty because they may have numerous solutions and are complicated to be numerically solved. This study aims to improve the effectiveness and availability of solving these systems by creating a MATLAB Graphical User Interface (GUI) to compare different iterative methods. The GUI makes it easier to evaluate algorithm performance by providing a more accessible interface to input nonlinear functions, their Jacobians, and also their respective initial approximations. The article evaluates the differences and similarities of four commonly used iterative methods: Newton, Broyden, BFGS, and Steepest Descent. A set of ten typical nonlinear test functions were created specifically as a benchmark suite for assessing methods in different situations. Thorough testing and analysis helped determine the advantages and disadvantages of each approach, offering insights into their suitability for different problem characteristics. Researchers and practitioners who have tried to analyse and contrast the reliabilities of iterative methods in solving nonlinear systems may discover the MATLAB GUI to be beneficial. By utilizing a visual and interactive interface, the GUI allows users to gain deep understanding.</p> 2025-03-01T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/504 Factors Influencing the Awareness to Adopt Permaculture Practices among Harumanis Farmers in Perlis 2025-03-06T06:59:59+00:00 Nur Syuhada Muhammat Pazil syuhada467@uitm.edu.my Siti Nor Nadrah Muhamad nadrahmuhamad@uitm.edu.my Nur Illani Razak illanirazak@uitm.edu.my Zaim Farhan Yais Hazli Yais zaim@example.com <p>In rapid advancing technology and increasing globalization, human are becoming more sophisticated in their ability to develop and execute technology in the food sector. To meet the demand for food and battle the issue of food security and sustainability, inventive solutions were taken. However, the present agricultural system has certain unintended negative consequences for both the environment and human health. The use of chemicals, expansion into new territory, reduction in soil fertility, and other practices were all part of the conventional agriculture system (CAS). Permaculture is an approach to planning that looks at the whole picture. Its goal is to build long-lasting systems that mimic the patterns and relationships of natural ecosystems. Therefore, this study investigates the factors which are knowledge, cost and attitudes in influencing the awareness to adopt permaculture practices among Harumanis farmers in Perlis using regression analysis. A set of questionnaires developed in the Google form has been distributed via online platforms to the 63 Harumanis farmers in Perlis and the completed data was then analyzed using SPSS software. The results of this study show that all the variables which are knowledge, attitudes and cost had a significant relationship with the awareness to adopt permaculture practices. It can be concluded that there were other external factors that contributed to the awareness to adopt permaculture such as type of plant and planting area. Hence, the study suggests that the government or any non-government organization should hold more campaigns or talks regarding the benefits of permaculture practices and should give more guidance on how to start and maintain the permaculture garden. In this way many people will acknowledge the importance of permaculture and they will be persuaded to start the permaculture practices.</p> <p>&nbsp;</p> 2025-03-06T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/503 A Comparative Study of Backward Euler and Adams-Moulton Methods for Lotka-Volterra Prey-Predator Model 2025-03-06T06:46:10+00:00 Nadia Sajidah Mohd Sobree ndiasjidh5@gmail.com Nurizatul Syarfinas Ahmad Bakhtiar nurizatul@uitm.edu.my Nur Fatihah Fauzi fatihah@uitm.edu.my Nur Izzati Khairudin zat.khairudin@uitm.edu.my Huda Zuhrah Ab Halim hudazuhrah@uitm.edu.my <p>This research investigates the comparison between the backward Euler and Adams-Moulton methods in solving the Lotka-Volterra prey predator model, specifically analyzing the interaction between wolf and moose populations. The study aims to identify which numerical method provides a more accurate approximation of the model’s solutions. Data collected from the interactions between wolves and moose on Isle Royale from 1959 to 2019 was used, determining a carrying capacity of 21.24 for wolves and 948.15 for moose. When the initial population is below this carrying capacity, it tends to grow due to the availability of adequate resources. The comparison results revealed that the Adams-Moulton method provided the most accurate approximation, successfully achieving the primary objective of the research. The equilibrium and stability of the system were assessed by defining its dynamics through mathematical equations and evaluating the eigenvalues of the Jacobian matrix, resulting in a growth rate value of 0.5017. The system was found to be stable when the populations of moose and wolves oscillated with consistent amplitude, influenced by the growth rate. The findings emphasize the importance of carrying capacity and initial conditions in understanding equilibrium and stability in prey-predator interactions, contributing to population dynamics. This research aids in the development of effective conservation and management strategies for maintaining ecosystem balance.</p> 2025-03-01T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/501 Write-rite: Enhancing Handwriting Visualization Proficiency in Dysgraphic Children 2025-03-06T06:30:16+00:00 Norsafinar Rahim norsafinar@usm.my <p>Dysgraphia is a significant and age-inconsistent difficulty developing writing skills among students. To address this issue, various intervention methods for developing writing skills in dysgraphic students have been implemented. However, previous studies on these intervention methods do not encompass all stages of writing skills, from basic levels to automatization. This creates a research gap, especially the lack of support to enhance writing visualization aided by technology. The study emphasized the importance of offering instructional support to educators, thereby enabling the proficient utilization of technology-assisted resources to aid dysgraphic children. By integrating this application, the research endeavoured to augment both the productivity and enjoyment inherent in the teaching and learning processes. The functionality of dysgraphic students' writing support applications would be more effective with the presence of Interaction Design (IxD) guidelines that is crucial to developing user-friendly writing support software. Dysgraphic-customized application, Write-rite, integrates IxD to improve visualization, motor control, and letter memory. Write-rite utilizes tracing exercises, animations, and repetition to enhance letter formation. The study, involving five dysgraphic students aged 8-12, employs Handwriting Legibility Scale for evaluation. The prototype is evaluated before, during, and after an eight-week intervention. Results indicate significant improvements in letter formation, motor skills, and overall handwriting legibility. The efficacy of this intervention offers dysgraphic students a tailored approach to improving handwriting skills. It emphasizes the importance of early intervention and specific strategies in alleviating writing challenges, thereby positively impacting students' cognitive skills and handwriting automation.</p> 2025-03-01T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/500 Secure File Sharing System with Strong Password and One Time Password Authentication 2025-03-06T06:21:08+00:00 Chee Lee Chong chchong@example.com Nur Ziadah Harun nurziadah@uthm.edu.my <p>A file-sharing system is a system that allows users to share their files with other users. In the digital age, file-sharing systems have become integral for various sectors, including corporate, educational, and creative fields. Inadequate security measures in file-sharing systems have become a significant concern. Many current systems expose users to unauthorized access and data breaches due to weak authentication methods, such as using simple username and password combinations. Additionally, the lack of a secure password when files are shared through links exacerbates the risk, as unauthorized users can access confidential data without needing a password. This paper presents the development of a secure file-sharing system incorporating strong password protocols and one-time password (OTP) authentication to address vulnerabilities in existing systems. The proposed system ensures robust security by implementing multi-factor authentication, end-to-end encryption, hashing in database and secure session management. The users must provide a strong password and OTP for login, register and reset password process. Key features include user management and comprehensive file management functionalities. The system offers user account management, space management, and user file management, ensuring that administrative controls are in place to manage user activities and storage efficiently. The developed system implements the file management module such as upload, download, rename, move, create folders, and share with password protection. The implementation details and testing results confirm the system's effectiveness in providing a secure and user-friendly file-sharing platform. At the end of this project, the proposed system has achieved the objective of developing a file-sharing system that can share files securely.</p> 2025-03-01T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/498 Design and Implement of Intrusion Prevention System Based on Snort and IP Tables 2025-03-06T06:02:06+00:00 Lutfi Dwi Naldi lutfi@example.com Apro Siswanto aprisiswanto@eng.uir.ac.id <p>In the era of rapid advancement in communication and computer technology, network security has become a crucial issue, especially in wireless networks. Unlimited internet access can cause security threats such as Distributed Denial of Service (DDoS) attacks, spoofing, and port scanning. This study aims to design and implement a Snort-based Intrusion Prevention System (IPS) combined with IP Tables to improve the security of wireless local area networks (WLANs). The proposed system not only detects but also prevents attacks in real-time by blocking malicious network traffic. Testing was carried out using penetration testing with various attack scenarios, including ARP spoofing and DDoS, which showed that this system successfully identified and blocked attacker access. The results of this study were measured based on the system's ability to reduce wireless network threats, which showed a significant increase in threat mitigation. This system provides a more optimal security solution compared to traditional intrusion detection systems that are only detection. Overall, the implementation of this system is able to increase the efficiency of attack prevention and show success in reducing the risk of illegal network access on WLANs.</p> 2025-03-01T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/497 SWINDLERT©: Development of Augmented Reality Game-Based Interactivity for Enhancing Cybercrime Awareness 2025-03-06T05:52:57+00:00 Sakinah Ali Pitchay sakinah.ali@usim.edu.my A.H Azni ahazni@usim.edu.my Farida Ridzuan farida@usim.edu.my Najwa Hayaati Mohd Alwi najwa@usim.edu.my Muhammad Syahmi Imran syahmi.imran92@gmail.com <p>As digital technologies advance, cybercrime has become a primary global concern, posing threats to individuals and organisations. Despite widespread Internet use, public awareness of cybercrime risks is still limited, emphasising the need for educational initiatives. The lack of engaging educational tools for cybercrime awareness is due to outdated, overly technical approaches that fail to captivate modern audiences. Limited investment and collaboration between cybersecurity experts and educational designers result in resources that are not as appealing or user-friendly as they could be. Therefore, this paper introduces SWINDLERT, an augmented reality (AR) game-based tool in a three-dimensional (3D) environment designed to enhance cybercrime awareness and educate users on early prevention. It addresses three key issues: (i) carelessness in sharing credentials, (ii) lack of cybercrime prevention literacy, and (iii) low student engagement in traditional lecture-based education. It has three main objectives: (i) to identify types of cybersecurity crime prevention, (ii) to develop an edutainment AR mobile game with 3D images, and (iii) to evaluate functionality and security. Using Agile methodology, we conduct user requirements through surveys and test the application at SK Teluk Ketapang, Terengganu, and Universiti Sains Islam Malaysia. 98% agree that SWINDLERT has effectively embedded good gamification elements such as levels, scores and timers. Users benefit from password complexity, email verification, and the ability to retrieve their progress on multiple devices. The game features three levels: beginner, intermediate, and hard. This approach blends immersive technology by integrating an AR quiz-based 3D snake and ladder board gamification to transform education, making learning engaging and enjoyable.</p> 2025-03-06T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/496 Digital Certificate-Based Authentication Model for Enhanced Smartphone Security 2025-03-06T05:42:00+00:00 A. H. Azni ahazni@usim.edu.my Sakiinah Altaf Hussain sakiinah.fst@gmail.com Najwa Hayaati Mohd Alwi najwa@usim.edu.my <p>Smartphones are integral to the Internet of Things, facilitating connectivity for various devices such as home systems and healthcare tools. However, the growing threat of identity theft, data breaches, and attacks due to weak authentication and poor password management emphasizes the critical need for mobile device security. Cryptography is pivotal in ensuring that only authorized devices can access data. This paper introduces an innovative authentication model for smartphones, integrating digital certificates and secret keys to securely encrypt and decrypt data. The model employs the RSA algorithm to generate encryption keys and authenticate user and device identities. Aimed at addressing smartphone users' authentication needs, the model operates through three phases: Registration, Digital Certificate, and Authentication, each bolstering data protection through digital certificate-based authentication. To assess the model, expert reviews are conducted to ensure its effectiveness. The results demonstrate significant improvements in security and ease of implementation compared to traditional authentication methods. Expert reviews agree that the model effectively mitigates unauthorized access risks by strengthening encryption and authentication protocols across its three key phases. These enhancements make it particularly suited for addressing the evolving security challenges of mobile applications, setting a benchmark for future authentication frameworks in smartphone ecosystems.</p> 2025-03-06T00:00:00+00:00 Copyright (c) 2025 https://jcrinn.com/index.php/jcrinn/article/view/495 Cyber Security Awareness on Social Media: Knowledge Sharing Among Orang Asli Students 2025-03-06T05:30:30+00:00 Palaniappan Shamala shamalap@uitm.edu.my Muruga Chinniah murug480@uitm.edu.my Shamsatun Nahar binti Ahmad shams551@uitm.edu.my Lee Chang Kerk kerkleechang@uitm.edu.my Abd Malik Mohd Rick malikrick@uitm.edu.my <p>Cybersecurity is becoming more vital as we rely on digital devices and technology to navigate our everyday lives. When access to cyberspace is unrestricted to all levels of age, children use the internet daily for purposes like playing online games, using social media, or even doing their schoolwork. These circumstances have created an environment that makes them vulnerable to cybercrime threats. Therefore, the need to create awareness and training on cybersecurity is vital. However, our awareness program on safety protocol, and information privacy settings in WhatsApp, TikTok, and Instagram was aimed at Orang Asli students because they reside in rural regions with increasing access to digital technologies. Thus, targeted cybersecurity education can help them bridge the knowledge gap and protect them from online risks. The methodology consists of four phases: Phase 1: MCMC as the governmental body runs awareness campaigns, Phase 2 &amp; 3: secondary students from SMK Bekok undergo expert-led training and workshops from lecturers, and Phase 4: create a sustainable educational cycle, wherein secondary students transmit their knowledge to primary students. In each phase, sets of questionnaires with pre and post-tests were distributed to assess the program’s impact. The results showed the program has successfully achieved its objectives of enhancing cybersecurity awareness among Orang Asli students. Knowledge transfer by applying a peer-to-peer approach gained better comprehension, higher engagement, and more effective learning outcomes. In addition, cultivates a collaborative learning atmosphere that advantages both students, simultaneously enriching the educational experience and fostering community engagement within the school</p> 2025-03-06T00:00:00+00:00 Copyright (c) 2025