Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of Embedded Systems, Security and Intelligent Systems

Morphological-Based Analysis for Fruit Shape and Size Estimation in Binary Image Processing Budiarti, Nur Azizah Eka; Prima, Kurnia Wahyu; Carli Apriansyah Hutagalung
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.9248

Abstract

The automatic identification of fruit dimensions and morphology is a major requirement in agricultural and food technology. This research formulates a technique for fruit separation by employing mathematical morphology on binary images to identify the attributes of fruit shape and size. The dataset has 100 fruit photos featuring diverse geometric designs. The image processing procedure commences with grayscale conversion, followed by threshold adjustment, and culminates in the use of morphological operations to refine the image. The area and perimeter characteristics of the objects are extracted and utilized to categorize the fruit forms into circles or ellipses, triangles, and squares or rectangles. Segmentation accuracy was evaluated using the Intersection over Union (IoU) metric, yielding an average result of 85.67%, which signifies a high degree of segmentation precision. This study's findings affirm that mathematical morphology techniques are exceptionally effective in the automated detection of fruit size and form, with the potential to enhance efficiency in agricultural crop sorting processes.
Balancing Data Security: A Comparative Review of Hashing and Non-Hashing Approaches in Data Storage Prima, Kurnia Wahyu
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.9257

Abstract

Data security is a vital pillar in modern information system management, particularly in preventing unauthorized access, data breaches, and internal misuse. Among the core techniques to protect sensitive information, hashing stands out as an essential approach, transforming original data into a fixed, non-reversible format to ensure confidentiality and integrity. However, many systems still store passwords or other sensitive data in plaintext, leaving them highly vulnerable to exploitation. This study conducts a comparative experimental analysis between two system prototypes: one implementing the SHA-256 hashing algorithm and another storing data without hashing. Tests were conducted through brute-force attack simulations and direct database inspections using phpMyAdmin on a local server environment. The findings show that the non-hashing system exposed 100% of stored passwords in readable form, allowing immediate access and manipulation by internal actors. In contrast, the hashing-based system successfully obscured password content, making it computationally infeasible to reverse even with administrative database access. These results affirm the crucial role of hashing in enhancing data protection. Beyond technical validation, this study underscores the urgency of adopting hashing as a minimum security standard in any system managing confidential data. The results highlight that incorporating cryptographic hashing not only defends against external attacks but also mitigates insider threats. Therefore, organizations and developers must treat hashing as a non-negotiable part of system architecture to ensure long-term data security, compliance with global standards, and the preservation of user trust in the digital era.