Fadhlirrahman Baso
Universitas Negeri Makassar

Published : 15 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : Journal of Embedded Systems, Security and Intelligent Systems

FEATURES SIMPLIFICATION USING CUBIC BEZIER PROPERTIES FOR GAIT RECOGNITION ON SMARTPHONE Kurnia Prima Putra; Marwan Ramdhany Edy; M. Syahid Nur Wahid; Muhammad Fajar B; Fadhlirrahman Baso
Journal of Embedded Systems, Security and Intelligent Systems Vol 3, No 1 (2022): May 2022
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Smartphone is widely used around the world. It’s user authentication usually used pin code, pattern code, fingerprint and conventional login authentication. This kinds of authentication mechanism is intrusive because those mechanisms requires users to give exclusive interaction for user authentication during the process. One of authentication method which is non-intrusive during data collection is authentication by using gait. This mechanism classified as non-intrusive because this mechanism could gather biometric data without being noticed by the authentication subjects. Since it is non-intrusive, this mechanism allows re-authentications without bothering the authentication subjects. One of the recent gait recognition is using accelerometer on smartphone to measure and capture acceleration data on gait. This method extract step cycles in various length, map and interpolate the data into higher sample count, and then use each of mapped and interpolated data as feature using recognition. Regardless the classification or recognition method, using each mapped and interpolated data as features would result in high processing time during classification or recognition due to high feature count. In this research, we try to simplify the features of gait data with minimum data loss so it might give robust result with less latency by aligning cubic Bezier curve to step cycle data and extracting the Bezier properties.
Mama Loundry: Optimizing Mobile Based Administration Processes for Laundry Businesses Fadhlirrahman Baso; Fariz Ramlan; Tessa` Labennu; Indah Febriyani Asril; Hartini Ramli
Journal of Embedded Systems, Security and Intelligent Systems Vol 4, No 2 (2023): November 2023
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v4i2.1165

Abstract

The laundry application is a mobile application that acts as a service provider resource to its customers. This application is a mobile application and therefore it was developed to facilitate the handling of user problems that are often faced by system administrators, such as: facilitating administrative processes via a smartphone without using a computer because we know that computers are relatively very expensive and consume a lot of electricity. This application is equipped with functions such as order management, customer management and order history. The method used is the SDLC model prototyping method used to quickly gather specific information about user information requirements. Keywords: laundry, app, mobile, android studio, java
DIGITAL PRIVACY PROTECTION: APPLYING STEGANOGRAPHY IN TEXT MESSAGES Fadhlirrahman Baso
Journal of Embedded Systems, Security and Intelligent Systems Vol 5, No 1 (2024): March 2024
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v5i1.2233

Abstract

Digital privacy protection has become a crucial priority in today's digital age, given the increasing risks of personal data leaks. Steganography, as a technique of concealing messages within other media, emerges as an innovative solution to safeguard text messages from unauthorized access. This article examines the implementation of steganography, specifically the Least Significant Bit (LSB) method, in protecting user's personal data. Through experiments conducted on the pelock.com website, this method successfully embedded text messages into images without compromising visual transparency. This success demonstrates the potential of steganography, especially LSB, as an effective tool in securing confidential information. Detailed implementation steps and test results indicate that steganography can serve as an additional layer in maintaining data confidentiality in the complex and evolving digital environment. The research also identifies potential avenues for further development, including the integration of artificial intelligence to enhance overall data security.
Development Monitoring Information System Based on Website and Whatsapp Gateway at Sd Telkom Makassar Al Imran; M. Syahid Nur Wahid; Fadhlirrahman Baso; A. Fadil
Journal of Embedded Systems, Security and Intelligent Systems Vol 5, No 3 (2024): November 2024
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v5i3.5193

Abstract

The research aims to determine the results of developing a monitoring system based on a website and WhatsApp gateway at SD Telkom Makassar, as well as to evaluate the system's performance using ISO/IEC 25010 standards. This research uses the Research and Development (R&D) approach. The development model applied is the prototype model. Data was collected through interviews and questionnaires. The system was implemented with several technologies, including the Laravel framework, MySQL, and WhatsApp gateway. The system testing used ISO/IEC 25010, covering 8 aspects: (1) Functional suitability aspect fulfilled 134 out of 134 total features, scoring 100% and categorized as suitable. (2) The Usability aspect achieved a percentage score of 96.3%, classified as very good. (3) The Performance efficiency aspect received a grade of B with a performance percentage of 82%. (4) Reliability aspect achieved a metric score of 100%. (5) The Maintainability aspect met the criteria of instrumentation, consistency, and simplicity. (6) The Portability aspect achieved a perfect score with no errors. (7) Compatibility aspect scored well with no errors. (8) The Security aspect was at Vulnerability Level 0 (safe). The developed system successfully met the ISO/IEC 25010 testing standards, this qualifying as a reliable information system
Hubungan Tingkat Kesadaran Pengguna terhadap Cybercrime dan Pengaplikasian Fitur Peringatan Phishing dan Malware Pada Google Browser Fadhlirrahman Baso; Muhammad Rahmat Ramadan
Journal of Embedded Systems, Security and Intelligent Systems Vol 5, No 3 (2024): November 2024
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v5i3.5527

Abstract

The high number of cybercrime cases shows the need for user awareness to avoid various crimes on the internet. This research aims to determine whether there is a relationship between the level of user awareness of cybercrime threats and the level of application of the phishing and malware warning features on the google browser. The researcher uses a quantitative approach. Data was obtained from questionnaires and analyzed using the Pearson coefficient correlation method. By using this method, a positive correlation coefficient value was found between the two variables. The positive correlation coefficient value indicates that there is a relationship between the two variables.