Journal of Computing Research and Innovation <p><strong>Journal of Computing Research and Innovation (<em>eISSN : 2600-8793</em>)</strong> is a double-blind peer-reviewed, open access journal which is published bi-anually in March and September. JCRINN is managed by Universiti Teknologi MARA, Perlis Branch, MALAYSIA.</p> <p><strong>Frequency of Publication (until 2021) : </strong>Quarterly (January, April, July and October)<br /><strong>Frequency of Publication</strong> <strong>(2022- onwards)</strong> : Twice a year (March and September)</p> <p><strong>Manuscript Language:</strong> English</p> <p> </p> en-US (Chief Editor (attn: Siti Zulaiha Ahmad)) (Technical Contact (Managing Editor)) Mon, 04 Sep 2023 09:45:19 +0000 OJS 60 Minimization Traffic Congestion with Smart Traffic Light by Using Fuzzy Logic <p><em>Traffic congestion has become a pervasive problem in the world including Malaysia for the past few years while present indication shows that it is expected to get worse. The phenomenon of being stuck in traffic congestion for an extension period also causes stress and tiredness, Due to this, there is no denying that this problem is </em><em>significantly contributes to negative social, economic, and environmental impacts. This study aims to reduce traffic congestion at Jalan Raja Ashman Shah, Ipoh by implementing an intelligent fuzzy logic traffic light system. The system aims to reduce waiting times and improve traffic flow by automatically adjusting green light durations based on real-time traffic conditions. Data on the number of vehicles and queue lengths during peak hours were collected to compare congestion levels before and after the intervention. The results of this study demonstrate the effectiveness of deploying an intelligent traffic light system with fuzzy logic in minimizing traffic congestion and reducing waiting times. By dynamically adjusting green light duration based on real-time traffic conditions, the system optimized traffic flow and improved overall congestion. A comparison of congestion levels before and after the introduction showed a significant reduction in congestion and an improvement in traffic flow. The adaptability of the intelligent traffic light system makes better use of road capacity, reducing waiting times and minimizing congestion. As a result, we found a significant reduction in waiting time compared to the previous static system. Consequently, this study gives great impact to Ipoh citizens if the fuzzy logic method is implemented in traffic light system. Due to this, improving the transportation system and the quality of life for road users.&nbsp;</em></p> Sharifah Fhahriyah Syed Abas, Nur Qurratu’ Aini Jefrydin (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Wed, 11 Oct 2023 00:00:00 +0000 The Aspects of Information and Communication Technology in the Educational System of Islam- Comprehensive Review <p><em>The advancement of teaching and learning across the majority of courses is made possible by information and communication technology (ICT), and Islamic studies is no exception. Education has been among the many industries that information and communication technology (ICT) has revolutionized. Islamic education has embraced ICT to improve teaching and learning processes since it is based on the Quran's teachings and the traditions of the Prophet Muhammad (peace be upon him). This article aims to address the role of digital technology, or ICT, in Islamic teaching and learning, as well as ICT applications for spreading Islamic education, which are becoming increasingly significant over time. Overall, this review offers insightful information about the state of ICT integration in Islamic education today and shows the upcoming directions for additional study and advancement in this area.</em></p> Amina Shaikh, Akram Zeki, Asadullah Shah (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 Performance Analysis of Open-Source Network Monitoring Software in Wireless Network <p><em>Nowadays, computer networks are used in education, sports, business, transportation, manufacturing, and more. Thus, it makes the network more complex and harder to monitor, especially in terms of performance. The implementation of network monitoring software presents a viable solution for resolving this issue. It is because network monitoring software can monitor behaviours, provide alertness for any failing component of a computer network, and measure performance such as CPU usage, bandwidth, throughput, response time, and packet loss. However, network monitoring software has common problems, such as being hard to set up and making it hard to find the best network monitoring that fits the requirements. Thus, this study aims to identify network monitoring software that is easy to configure and analyse the performance of network monitoring software in terms of response time and packet loss. The study comprises the implementation of open-source network monitoring software, including PRTG, OpManager, Zabbix, and LibreNMS. The two experiments were conducted by launching TCP attacks for response time and UDP attacks for packet loss. Both attacks consisted of four scenarios: 15 threads, 30 threads, 45 threads, and 60 threads. As a result, PRTG offers a simpler installation procedure and easier configuration options, with a straightforward and attractive Graphical User Interface (GUI) that allows for all configurations to be conveniently performed directly through the interface. For monitoring websites, users need to add the device that was targeted by the website and choose an HTTP sensor for response time and PING for packet loss. The evaluation was based on the lowest average response time and consistency in the detection of packet loss. Consequently, Zabbix demonstrates the highest level of responsiveness about web services, which have the lowest average response time and consistently exhibit the lowest occurrence of packet loss.</em></p> Mohd Faris Mohd Fuzi, Mohd Firdaus Mohd Mahdzir, Iman Hazwam Abd Halim, Rafiza Ruslan (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 Empowering Online Safety: A Child-CyberCare Mobile App Approach to Inappropriate Content Filtering in Web Browsing <p><em>The use of smartphone and digital platform increased skyrocketed over the past decade. Due to generation gap between parent and children, youth internet addiction among early adolescents seems to be&nbsp;increasing. Internet addiction is more likely in children who feel unsupervised, have their privacy violated, or have poor parent-child relationships. Parental supervision, involvement, and meaningful connections reduce these risks and protect children from excessive internet use. Thus, this is the reason why a mobile app that can protect early adolescents is needed. By using this mobile app, parents can track their children’s online activity, detect unwanted keywords in Google searches, and receive pop-up alerts. The app's search history lets parents address concerns. SQLite manages keyword lists and search history efficiently. Usability testing and user feedback showed app effectiveness. Participating in their children's online activities teach responsible digital behaviour and creates a safe and supportive online environment. Future work entails enhancing cross-platform compatibility, refining content detection capabilities, and implementing cloud-based synchronization. Further, integrating advanced parental controls and comprehensive reporting mechanisms will fortify the app's ability to protect children's online experiences, positioning the Child-CyberCare app as a robust tool for ensuring digital safety for children.</em></p> Ros Syamsul Hamid, Iman Hazwam bin Abd Halim, Muhammad Nabil Fikri bin Jamaluddin, Muhamad Arif bin Hashim, Nurfarah Hani Che Ismail (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 Image Steganography Using Web Application <p><em>Nowadays most people are workaholics, driven by intense peer pressure to break new ground. Therefore, rather than using books as their source material, photographic memories are kept as images. However, to protect sensitive information, reliable and secure communication techniques are necessary in many real-world situations. This research offers a user-friendly interface for securely embedding and extracting secret information within digital images.</em> <em>The primary goals are to design a steganographic algorithm for concealing data in images and to evaluate the usability of image steganography while keeping the quality of images and the access to decode the image. The application utilizes an advanced steganographic algorithm, which is Randomized Least Significant Bit (RLSB), to ensure robust data concealment while maintaining the visual integrity of the cover image. Users can upload their desired image, select the preferred steganographic algorithm, and encode the hidden data for added security. The web application supports encoding and decoding images for concealing data in images. To evaluate its performance, extensive testing was conducted, including embedding and extracting data using different image formats. The results demonstrated the application's effectiveness in hiding information while preserving image quality. The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. In conclusion, the Image Steganography Web Application provides a convenient and secure solution for individuals and organizations needing to transmit sensitive data covertly within images, ensuring data privacy and integrity in an intuitive and user-friendly manner.</em></p> Nor Arzami Othman, Mohd Nizam Osman, Khairul Anwar Sedek, Muhammad Nur Harith Shariffudin (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 Contribution of TEE and Parallel Computing to Performance and Security of Biometric Authentication Improvement <p><em>In a world increasingly dominated by digital interactions, it has become essential to guarantee the authenticity of personal identities. Traditional authentication methods, based on passwords or tokens, are proving inadequate in the face of advanced cyber threats. In response, the field of biometric recognition has emerged as a transformative force, offering a new paradigm for identity verification with significant accuracy and convenience. The problems that arise here are the vulnerability and confidentiality of biometric data before, during and after a biometric recognition operation, and the low processing speed during the same operation. The aim of this work is to propose a combination of the concepts of parallel computing and Trusted Execution Environments (TEE) as a solution to the problems raised. Finally, a hardware-assisted technology namely Intel SGX (Software Guard Extensions) is proposed for practical implementations.</em></p> Maxim EDOH, Tahirou DJARA, Aziz SOBABE, Antoine VIANOU (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 A Web-Based Student Residential Searching Integrated with Google Maps and WhatsApp API: A Case Study of UiTM Arau Perlis <p><em>Every year, the university receives many students from all over the state or country. Consequently, the college facilities at the university are unable to accommodate the volume of students who recently enrolled sufficiently. Besides, some old students do not get college facilities because the university gives those facilities to newly registered students. This causes some students to experience problems in finding a rental room that suits their needs. Therefore, a web-based Student Residential search integrated with Google Maps and WhatsApp API was designed and implemented, that allows students, especially non-resident students to find and rent rooms near UiTM Arau Perlis. The rental rooms displayed on this website are rental rooms that the landlord wants to rent. Landlords can register the rental rooms they want to rent by logging into the website, while tenants can only rent the house after logging in. Besides, the Student Residential Searching System also was integrated with the WhatsApp API, enabling the admin to notify the landlord if the information such as the electric or water bill they uploaded, was invalid for validation purposes. While the integration of Google Maps allowed students to search for rental properties based on location. The system uses the System Development Life Cycle (SDLC) by implementing the waterfall model as the methodology. Usability testing was conducted to determine user acceptance using a set of questionnaires, where thirty participants were chosen to test and evaluate the proposed system. The findings and analysis showed that the system was manageable, usable, and reached participants’ expectations and achievement. Hence, the system helps the rental management between admin, landlord, and tenant to be more effective and smoother to complete the process.</em></p> Mohd Nizam Osman, Nor Arzami Othman, Khairul Anwar Sedek (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 Fitness Tracker Mobile Application for Calisthenics Exercises <p>Living in a world of hectic schedule between work and personal life has made many individuals difficult to find time for exercising and keep track their fitness progress. Memberships for gym nowadays is costly and even hiring a personal trainer is not everyone can afford. Due to these challenges, this paper introduces a fitness tracker mobile application named iCalFit that assists users in managing their calisthenics exercises routine and encourage individuals to engage in exercises despite their constrained time and resources. The application provides guides for calisthenics exercises, tracking users’ exercises, its calorie loss and reminders. Development methodology involved three main phases which are requirement identification, design and development and testing. The assessment of the mobile application is based on technology acceptance model, that considers three main components: Intention of Use (IU), Perceive Usefulness (PU) and Attitude (A). The questionnaire covers 15 questions distributed over to 31 randomly selected participants. PU had gained highest score out of three components, proven that the mobile application developed is efficient and capable of assisting user during exercise routine. The development of iCalFit is believed that it can solve individuals with limited fitness opportunities and drives for a healthy lifestyle.</p> Aiman Harith Zaharudin, Muhammad Nabil Fikri Jamaluddin, Iman Hazwam Abd Halim, Alif Faisal Ibrahim, Mohd Faris Mohd Fuzi, Ros Syamsul Hamid (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 Development of Employee Attendance Management System using Flutter <p>The workforce constitutes a fundamental element of organisations, and effectively addressing the challenges associated with governing employees is crucial for maintaining the overall stability of the firm. In the past, businesses and organisations used to depend on manual attendance tracking systems within their human resources departments to manage their staff. In the contemporary era characterised by significant advancements in technology, several recommendations are put out to enhance the existing system. Nevertheless, it is possible that small enterprises may encounter difficulties in coping with the escalating living expenses and the expenses associated with implementing an advanced attendance management system. Hence, this study proposes the creation of a straightforward yet dependable mobile application for the purpose of documenting and overseeing staff attendance through the utilisation of Flutter. The application was developed in a series of incremental steps utilising the Waterfall methodology. The effectiveness and acceptance of the application were evaluated using a comprehensive testing process that included both functionality and usability testing. Both testing findings yielded favourable outcomes, indicating that the application was favourably received by the responders. The application is anticipated to provide assistance to small enterprises or organisations that have encountered challenges in managing their operating expenses.</p> Muhamad Faiz Akmal Mohamad Noor, Alif Faisal Ibrahim, Muhammad Nabil Fikri Jamaluddin (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 Corn Leaf Disease Recognition System Using Convolutional Neural Network With The Implementation of Xception Model <p>Monitoring a plant's health and looking for signs of infection are two highly important aspects of sustainable agriculture. Monitoring plant diseases by manually is an extremely time-consuming and tedious task. It takes a significant amount of time, a substantial amount of labor, as well as knowledge in plant diseases to achieve. Image processing is thus used in the process of detecting plant diseases. This project mainly focuses on corn leaves disease recognition using convolutional neural network. The Xception model, which is a part of a convolutional neural network capable of classifying images into broad object categories, would be the model of choice for this image classification. Using Convolutional Neural Network (CNN), this study aims to build and test an image classification system for identifying corn leaf diseases recognition. This research dataset is trained by analyzing a big dataset that contains pictures of various diseases that might affect corn leaves as well as pictures of corn leaves that are healthy in order to precisely identify them. The data were then analysed using a methodology known as the Agile model, which included phases for planning, requirement analysis, design, development, testing, and documentation. The findings from the study provide evidence on the precision with which the Xception model performs when applied to the datasets that have been gathered. Strongly, the results of the study will emphasize the need for developing a thorough image classification system in detecting plant diseases without human intervention.</p> Iman Hazwam Abd Halim, Wan Nurul Izzah Abd Hadi, Muhammad Nabil Fikri Jamaluddin, Ros Syamsul Hamid (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 E-government Challenges in Developing Countries: Development of Iraqi e-government <p><em>E-government involves utilizing technology to provide information and deliver governmental services to employees, citizens, and businesses. Developing countries implementing e-government should aim to keep pace with rapid technological advances in order to continuously improve their systems and enhance the services offered to citizens through government portals in an efficient manner requiring minimal time and effort. However, many developing nations, especially most Arabic countries, face numerous challenges in implementing and gaining adoption of e-government initiatives. This paper examines the concept, sectors, and definition of e-government, along with the potential benefits. It then discusses the current status of e-government in Iraq, focusing on the issues and obstacles impacting further development of e-government systems in the country. The goal is to provide an overview of e-government and its applications, while analysing the specific difficulties Iraq faces in advancing its e-government efforts in order to identify strategies to overcome these barriers.</em></p> Ahmed Totonchi, Abd Rahman AHLAN (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 Unveiling Sarcastic Intent: Web-Based Detection of Sarcasm In News Headlines <p><em>Detecting sarcasm in news headlines poses a significant challenge due to the intricate nature of language and the subtle nuances of sarcastic expressions. This study uses machine learning techniques to introduce a novel web-based sarcasm detection system tailored explicitly for news headlines. This study’s key novelty and contribution lie in addressing the domain-specific problem of sarcasm detection in news headlines, which has received limited attention in previous research. The proposed algorithm effectively distinguishes between sarcastic and non-sarcastic headlines by analysing the semantic features of words and the underlying attitude conveyed by the headline’s structure. Data pre-processing played a critical role in preparing the dataset for analysis and modelling, ensuring the accuracy and reliability of the system. A comparative study was conducted to validate the system’s performance, benchmarking it against existing approaches. The results demonstrate the superiority of the developed model in sarcasm detection for news headlines. The system’s unique output classifies sarcastic words into low, moderate, or high probabilities of being sarcastic, providing valuable insights into the intensity of sarcasm. Notably, the system is user-friendly and versatile, capable of processing diverse inputs effectively. The significance of this study lies in its novel contribution to the field of sarcasm detection in news headlines. By addressing the specific challenges of this domain, the developed system enhances the overall understanding and interpretation of news content. It is a valuable tool for individuals and news organisations, enabling swift and reliable identification of sarcasm in headlines, thereby enriching news comprehension and analysis. &nbsp;</em></p> Mohd Nazzim Lahaji, Tajul Rosli Razak, Mohammad Hafiz bin Ismail (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 Analysing Influential Factors in University Selection Using Fuzzy TOPSIS <p><em>Students must carefully choose their university because it will affect their motivation for studying, dedication, and engagement with the university. Normally, students will consider some factors that influence their choice of the university. Therefore, this study aims to determine the most important factor that influences students' choice of university. The study also analyses the preferable university either IPTA or IPTS. Besides, the study is conducted to rank the six variables: the influence of family, the influence of friends, the university’s image, the university’s environment, suitability with personality and interest, and financial support. The data was collected by distributing questionnaires to 30 experts which are teachers and counsellors. They are required to evaluate the issues in this study using linguistic variables ranging from "unaffected" to "very affected". The data was analysed using Fuzzy TOPSIS. The finding shows that the most influential factor in deciding the university selection is the suitability with personality and interest with a closeness coefficient of 0.4869. The influence of friends is the least important in university selection with a closeness coefficient of 0.4713. This study’s findings might benefit communities such as students, parents, and teachers. Universities may also benefit from it because they need to attract more students to expand their market.</em></p> Nurul Athilah Azaman, Jasmani Bidin, Noorzila Sharif, Ku Azlina Ku Akil (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000 A Fuzzy Analytic Hierarchy Process (FAHP) Application for Multi-Criteria Purchase Decisions Regarding Various Brands of Motorcycles <p><em>It shows that motorbikes are widely employed as a primary means of transportation for everyday movement despite the hot environment and frequent downpours, as they discovered that a motorcycle was more effective and efficient due to the congestion. Transport is currently becoming highly important to support all human activities. Because different clients place different values on other brands, the study stresses the need to know about the various motorbike manufacturers and models available on the market. By understanding customer preferences and demands, motorcycle dealers can enhance profitability and buyer satisfaction by offering products that meet or exceed expectations in design, price, availability of special offers, and reliability. The Fuzzy Analytical Hierarchy Process is used in this study to choose the top motorcycle brand names and rate the importance of four criteria. The financial features, promotion and types of motorcycles were employed in this study’s Analytical Hierarchy Process (AHP) comparison of each motorcycle brand. These criteria are analysed in detail to give buyers essential insights for making well-informed decisions and optimising their daily satisfaction while minimising costs. The findings of this research contribute to the existing knowledge of decision-making methodologies and provide practical implications for motorcycle businesses in Kota Bharu. The outcome demonstrates that, among the scores of possibilities, Honda is the finest brand for people to purchase concerning related criteria is 0.3881, followed by Suzuki (0.3029), Yamaha (0.2615), and Modenas (0.0476). It is also demonstrated by the approach that finances are the most crucial factor to consider before a buyer engages in a motorcycle purchase by having the highest weight score, which is 0.5920, followed by features (0.2439), motorbike kinds (0.1157) and promotions (0.0484).</em></p> Suzanawati Abu Hassan, Yeong Kin Teoh, Diana Sirmayunie Mohd Nasir, Nur Atirah Annuar Farish, Anas Fathul Ariffin (Author) Copyright (c) 2023 Journal of Computing Research and Innovation Fri, 01 Sep 2023 00:00:00 +0000