MAL3018 COMPUTING PROJECT
Permanent URI for this collection
Browse
Browsing MAL3018 COMPUTING PROJECT by Title
Now showing 1 - 12 of 12
Results Per Page
Sort Options
- ItemApplication of IOT technology in monitoring soil conditions for gardening and assisting optimal plant growth(PCN, 2025-05-06) Tan, Brennan Jien NenThis purpose of this project is to provide a user-friendly solution that will make gardening easier by providing accurate real-time data on garden conditions and automate certain essential gardening tasks. This project consists of a IOT smart garden system that monitors garden conditions and automates certain tasks, a RESTful API that serves as an interface to access real-time garden data and to initiate automation tasks if needed, and an application to view real-time garden data and define automation conditions.
- ItemCloudChain: Integrating Blockchain systems with MANET(PCN, 2025-05-06) Yi, Danny Xiang ChanThe increasing demand for a secure, transparent and tamper-resistant voting systems has led to multiple research of technologies to effectively replace the traditional voting method. This project proposes a decentralized e-voting system by integrating blockchain technology with MANET to provide a reliable and secure voting platform. The system aims to create a transparency and immutability blockchain architecture to ensure vote integrity, while utilizing the flexibility of MANETs to create a infrastructure-less communication networks for voting system. The project will utilize Golang and MongoDB to create a permissioned blockchain model, to achieve data security and efficient voting. It aims to enhance the vote security, accessibility from rural areas and real-time consensus consistency in the blockchain network.
- ItemDanesh Ravichandran(PCN, 2025-05-06)This report presents the development of an IoT-based Smart Valet Parking Reservation System designed to address urban parking challenges through an integrated IoT solution along with back- end support using an AWS server. The system uses the back-end server of the AWS system to launch the system globally and lets users make reservations via the web interface. It utilizes the IoT ultrasonic sensors to detect the presence of availability of the parking slot with ESP32 microcontrollers connecting it to the back-end server. The RFID system is added to verify the user's identity upon arrival. A centralized AWS web hosting platform processes and presents this data along with a database setup to ensure efficient parking management. Users can interact with a web-based interface to check real-time parking slot availability and make reservations in advance, making the valet process more orderly and reducing congestion at arrival points. To enhance security, the system includes an RFID-based access control mechanism that verifies user identity at the entry point and controls a servo motor gate for automated access. The report explores the background and significance of proven smart parking solutions, which justifies the best technology for the project and details the system architecture through diagrams and code. Furthermore, the key development stages, the strength of the architecture, future security improvement of the architecture, and recommendations are discussed in the report. Last but not least, the legal, professional, and ethical considerations are examined alongside proven project management strategies.
- ItemFilpal Nexus (USB Management System)(PCN, 2025-05-06) Goh, Vincent Kah FungIn collaboration with Filpal (M) Sdn Bhd, this project addresses the critical security risks posed by USB devices, such as data breaches, malware propagation, and unauthorized access. The project focuses on the development of a USB Whitelisting Application designed to enhance endpoint security by allowing only authorized USB devices to connect to a system while blocking all others. The application is developed using C# and implements a robust whitelisting mechanism that identifies USB devices using their unique Vendor ID and Product ID. It features a real-time monitoring system that verifies connected devices against a predefined whitelist, ensuring compliance with security policies. The project includes an intuitive Windows Forms interface for user-friendly operation and an administrative panel for managing whitelist policies, viewing logs, and generating reports. The application’s backend logic is implemented in C#, ensuring seamless integration with Windows operating systems and providing scalable solutions for small to large enterprises. This project not only strengthens Filpal’s cybersecurity framework but also offers a practical solution for organizations seeking to mitigate USB-related security risks. Testing and evaluation demonstrate the application’s effectiveness in preventing unauthorized USB access while maintaining ease of use for approved devices. This collaborative effort contributes to the field of cybersecurity by providing a reliable tool for USB device management, with potential applications in corporate, educational, and government environments.
- ItemLUXE CASTLE Virtual Fitting Room For Clothing Website By Augmented Reality(PCN, 2025-05-06) Chin, Jia SinThis document provides key information about the development of an AR-based clothing try-on website, aimed at enhancing the user shopping experience through interactive technology. The project's main objective is to deliver a functional and reliable software solution that meets modern e-commerce demands. The development is divided into two primary components: creating an intuitive, user-friendly front-end interface and building a robust web-service API using Node.js and Express.js. The front end is developed using HTML, CSS, and JavaScript to ensure responsiveness and ease of use, allowing users to browse products and virtually try on clothing using their webcam. The back-end API manages product data, user interactions, and integrates with MongoDB for efficient and secure data handling. The augmented reality try-on feature is implemented using pose estimation models to detect body joints and overlay garments accurately. The complete source code for the AR Try-On Clothing Website can be found on GitHub: https://github.com/chinjiasin/FYP_LuxeCastle/tree/update-fyp
- ItemMalware Notifier(PCN, 2025-05-06) Fong, Yun XinIn the current digital era, the proliferation of malicious software (malware) poses a persistentthreat to the security and integrity of computer systems. This project, titled MalwareNotifier, introduces a real-time file monitoring application developed in Python to detectsuspicious file creations across common system directories such as Desktop, Downloads, andDocuments. When a file with a potentially dangerous extension (e.g., `.exe`, `.zip`, `.bat`) iscreated, the system triggers an automated email alert to notify the user of its presence. The application also integrates with the VirusTotal API to further classify files as malicious or benign, enhancing the credibility of the alert system. A graphical user interface (GUI) was designed using Tkinter to improve accessibility and usability, allowing non-technical users to operate the tool effortlessly. This report outlines the design, implementation, and evaluation of Malware Notifier, with particular attention to usability, performance, and its broader legal, ethical, and social implications. The project contributes a lightweight yet effective cybersecurity tool suitable for personal and small enterprise usage, reinforcing proactive malware awareness and response.
- ItemRecipe Finder: An Ingredients-Based Recipe Discovery Application(PCN, 2025-05-06) Zaidi, Fatinie NabillaIn today’s fast-paced world, convenience and time-saving solutions are essential, particularly in the kitchen. Many home cooks and working individuals face daily challenges in deciding what meals to prepare based on the limited ingredients they have on hand (Almeida et al., 2021). This project report presents the development of "Recipe Finder: An Ingredient-Based Recipe Discovery Application"—a mobile application tailored to offer personalized recipe suggestions by utilizing users’ available ingredients. The app is designed to address common cooking frustrations such as a lack of ideas, food wastage, and time constraints, which are frequently experienced in modern households (Turner & Lehane, 2020) The mobile application integrates key features such as user authentication (login, registration, and logout), an administrative dashboard for managing recipe content and associated video tutorials, and a search function that allows users to discover recipes based on their ingredients. Users can also save their favourite recipes and explore different cuisines through built-in filtering options. These features not only encourage efficient meal planning but also promote sustainability by minimizing ingredient wastage (Kim & Lee, 2019). Technologically, the system is built using Android Studio for the mobile interface, Visual Studio Code for code editing, and SQL for managing backend data storage. These tools collectively support a robust, user-friendly, and scalable solution that enhances the culinary experience for everyday users. This report covers the entire software development lifecycle of the application, starting with a detailed literature review to identify similar systems and their limitations, followed by methodology, system design (including UML diagrams), implementation details, and system testing. The final chapters evaluate the app’s usability, reliability, and legal, social, ethical, and professional (LSEP) considerations. The results indicate that Recipe Finder meets its objective of simplifying the decision-making process for meal preparation while contributing to efficient resource use and reducing food waste.
- ItemScholarChain: Blockchain-Driven Framework for E-Transcript Validation(PCN, 2025-05-06) Lim, Hon SheangWith the world becoming more digital and interconnected, authenticating academic qualificationsis still manual, takes time, and is vulnerable to forgery. ScholarChain seeks to solve this problem through a blockchain-based web application to safely provide, maintain, and authenticate academic transcripts. The system leverages Ethereum smart contracts on the Sepolia testnet to ensure data integrity, immutability, and transparency, while MongoDB Atlas supports scalable data storage. ScholarChain allows universities to issue tamper-proof transcripts, students to share verifiable academic records, and employers to authenticate credentials in real-time—eliminating the reliance on traditional paper-based verification. A key innovation in the system is the incorporation of gamification features, which award blockchain-based digital badges for academic achievements, enhancing student motivation and visibility of accomplishments. The system was developed using a modular architecture comprising frontend, backend, and smart contract layers and was subjected to rigorous functional, security, and performance testing. While limitations such as smart contract immutability, usability challenges for nontechnical users, and dependency on blockchain infrastructure were identified, ScholarChain demonstrates a secure and scalable foundation for transforming academic credentialing. Future work will focus on deploying to Ethereum Layer-2 solutions, enhancing gamification, implementing smart contract upgradability, and achieving cross-institutional interoperability.
- ItemSHIPMATE: Students Peer-to-Peer Service System(PCN, 2025-05-06) Ng, Man YewThis report presents Shipmate, a web-based peer-to-peer service platform designed specifically for students of The Ship Campus. The system allows users to offer and request services within a secure and student-verified environment. Key features include real-student verification, service listing, service application with status tracking, a messaging system, and an anonymous rating and review system. The project follows a structured Web Development Lifecycle (WDLC), encompassing research, design, implementation, and testing phases. It adopts client-server architecture using Next.js (React) on the frontend and Node.js with Express on the backend, with MongoDB as the database and Auth0 for secure authentication. Manual and automated testing were conducted to assess system reliability. Out of 21 manual test cases, 20 passed and 1 failed (non-real-time messaging). Additionally, all 31 unit tests for backend controllers passed successfully. While the system successfully delivers its core functions, some limitations such as the absence of real-time chat and admin role management were identified. Future enhancements are proposed to address these. The development of Shipmate has not only achieved its technical objectives but also contributed significantly to the developer’s growth in full-stack development, architectural planning, and resilience in overcoming personal and technical challenges.
- ItemSmart E-Commerce Platform for Plastic Household Products and Vendor Supplies(PCN, 2025-05-06) Tan, Jia TianI created my website live and publicly available online using Vercel, a cloud platform for web application deployment. Here is a quick rundown of the procedure. Local Website Development: Using common web technologies like HTML, CSS, and JavaScript, I built the front end. On my local computer, I tested and improved the website. Code Uploaded to GitHub: In order to enable automated deployment, I uploaded my project files to a GitHub repository, which Vercel can immediately integrate with. Vercel deployment: I linked the GitHub repository to Vercel. Vercel constructed and launched the website instantly after it was linked. Future updates are automatically reflected on the live site when they are pushed to GitHub. Lack of Backend or Database Link: Although the frontend is operational and live, platform constraints prevent the backend or database (such as MongoDB or a Node.js server) from being linked at this time. Only the client-side features are presently displayed on the website. Here is my live website: https://project-website-sepia.vercel.app/
- ItemWaveFyre(PCN, 2025-05-06) Khor, ChunThis report covers the new research of RF (Radio Frequency) filter design optimization method of Contour Optimization with MARL (Multi Agent Reinforcement Learning) and the desktop application development project of ‘Wave Fyre’. Wave Fyre is an application that utilizes a new, better performance optimizer in order to enhance the RF Filter design parameters. This report covers the initial background of first version of this system “VFL Project” and the current limitations, along with how these can be improved through a different approach. Next, legal, social, ethical and professional regulations are discussed with how Wave Fyre keeps on top of these areas. Furthermore, an overview of how Wave Fyre project management approaches and technologies are used in 3 main phases of this project. The main body discusses the designs, system architecture and development of Wave Fyre, along with an outline and discussion of research, MARL, hardware and software technologies used. Continued with POC (Proof of concept) and software integrate of each week of research and development with the main ideas being discussed in further detail. Performance comparison results and discussions come to next to conclude the research outcome leading to this report. The final 3 sections conclude this report, all evaluating this project with is achievements, room of improvement, evaluations of the method choices. Finally find a reference, bibliography list and an appendix, with all related documents to this report are attached.
- ItemYoInspector: An Automation Pentesting tool(PCN, 2025-05-06) Muhammad Sahif As SaniThis project, titled YoInspector, focuses on developing a command-line-based penetration testing automation tool using Python. It specifically targets two widely exploited vulnerabilities: Android Meterpreter Reverse_TCP and Windows SMB MS17-010 (EternalBlue). Both vulnerabilities are critical due to their widespread impact on Android devices and Windows systems, respectively. YoInspector aims to automate the processes of payload generation and exploitation through the integration of the Metasploit framework, a leading platform in penetration testing. Android Meterpreter Reverse_TCP is a commonly used attack vector, enabling unauthorized access to Android devices by establishing a reverse TCP connection. The exploit is significant in cybersecurity research and real-world attack simulations due to its versatility in testing mobile device vulnerabilities. Windows SMB MS17-010, known as EternalBlue, was famously used in the WannaCry ransomware attack in 2017. It exploits a critical flaw in the Windows SMB protocol, enabling remote code execution on vulnerable systems. Automating these attacks allows for a deeper understanding of their mechanisms and provides a streamlined method for cybersecurity practitioners to test their systems against these threats. This project builds on the foundation of existing penetration testing tools but fills a critical gap by focusing on lightweight automation for specific vulnerabilities. Tools like AutoSploit and Cobalt Strike offer broader automation but are either limited to generalized attack scenarios or are prohibitively expensive. YoInspector, in contrast, is open-source and caters specifically to Android and Windows vulnerabilities, ensuring cost-effectiveness and precision. The significance of this project lies in its ability to balance technical functionality with accessibility, making penetration testing more approachable for a diverse range of users. The inclusion of ethical guidelines and disclaimers further ensures that the tool aligns with responsible cybersecurity practices. As the threat landscape continues to evolve, tools like YoInspector play a vital role in equipping individuals and organizations to proactively address vulnerabilities in their systems. By integrating the Metasploit framework, the project provides users with a powerful and flexible toolset for ethical hacking. Its emphasis on automation not only simplifies the testing process but also highlights the importance of innovation in cybersecurity education and practice. With its focus on Android and Windows platforms, YoInspector demonstrates the potential to bridge the gap between complex penetration testing frameworks and accessible, targeted solutions for cybersecurity challenges.