Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : Journal of Embedded Systems, Security and Intelligent Systems

Classification of Bugis and Makassar Lontara Texts with Viterbi Algorithm Andi Hutami Endang; Achmad Zulfajri Syaharuddin
Journal of Embedded Systems, Security and Intelligent Systems Vol 5, No 1 (2024): March 2024
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v5i1.623

Abstract

The Bugis and Makassar ethnic groups are among those originating from South Sulawesi, characterized by the use of the Lontara Bugis and Makassar scripts. The data utilized in this research consists of image data as the initial input. Subsequently, preprocessing is conducted where the data is cropped to obtain 168x168 pixel dimensions for each word. The cropped images are then labeled. In this study, labeling involves the conversion of Lontara script into Latin words. The same procedure is applied to each letter. Next, the obtained words are categorized into two classes: Bugis language and Makassar language. The next stage is processing, where the Viterbi algorithm is employed to determine the priority within a sentence used in the training and testing processes. Python programming language is used in this research. The research utilizes image data processed in the aforementioned preprocessing stage. The data transformed from Lontara script into Latin words is used in the Viterbi process. The Viterbi algorithm tests the data from the inputted sentences. Based on the research results, it is concluded that the use of the Viterbi algorithm in classifying Bugis Makassar Lontara texts yields accurate probability results. However, there are some aspects to be considered. The more data utilized, the better the classification results will be.
Rancang Bangun Sistem Monitoring Aktivitas Pelanggan berbasis Citra Menggunakan Optical Flow Achmad Zulfajri Syaharuddin; Andi Hutami Endang; Dimas Aditya Alfarizi
Journal of Embedded Systems, Security and Intelligent Systems Vol 4, No 2 (2023): November 2023
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v4i2.699

Abstract

This article aims to detect visitors using the optical flow method approach. It is based on transaction activities that are not freed from human life especially on the basic needs of making the spending trend in physical stores has begun to be crushed by the competition of online stores. Several factors are the inability of stores employees in serving the buyer up to the process of non-instant payment makes the physical store threatened that can imply on physical assets such as display cabinets, cash machines, to buildings. Based on the problem, the research was carried out by creating a system that can detect the activity of visitors on the store. The research was done by processing three video inputs in different cases. With the application of pre-processing processes and the implementation of optical flow methods, results were obtained that the system was able to detect the movement of visitors well.
DESIGN AND CONSTRUCTION OF WEBSITE CARBON CREDIT RECORDING APPLICATION Muhammad Muhaimin Nur; Andi Hutami Endang
Journal of Embedded Systems, Security and Intelligent Systems Vol 5, No 3 (2024): November 2024
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v5i3.4289

Abstract

Global climate change is caused by the increasing emissions of greenhouse gases, especially CO2, which have significant impacts on human-induced climate change. In addressing this issue, Indonesia is committed to reducing greenhouse gas emissions by 29% by 2030. The development of a carbon accounting system using the SDLC method in this research is an essential step towards achieving this target. This system helps companies to effectively reduce and report carbon emissions, supports transparency, and facilitates interaction among various stakeholders. Through research methods such as interviews, surveys, and the SDLC Waterfall method, the carbon accounting system can be implemented as an effective tool in managing carbon data, reducing emissions, and improving environmental quality.
Design of Employee Absence System Using Web-Based Realtime Geo-Location Library Nur Azizah Yusuf; Muhammad Muhaimin Nur; Andi Hutami Endang
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.6018

Abstract

Employee performance is one of the most critical aspects of a company or organization. This is because the company's goals or targets can only be achieved if employees can demonstrate good performance in achieving them. One way to ensure this is by maintaining employee discipline. This study proposes a web-based employee attendance system using the Geo-Location Realtime library to monitor employee discipline at PT. Portal Indonesia Perkasa, which previously relied solely on a fingerprint-based attendance system. The method used is the waterfall method. Which employs a systematic and sequential approach. The system design includes flowcharts, use case diagrams, data flow diagrams, and logical legal structures. The main features include real-time location tracking and automatic attendance recording. Implementation results show the system's effectiveness in facilitating accurate attendance monitoring and reporting.
Literature Review: IT Management and Information Systems Analysis Using COBIT 5 Nur Azizah Yusuf; Andi Hutami Endang
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 3 (2025): September 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i3.9339

Abstract

This study is a literature review that examines how the COBIT 5 framework is used to assess information technology (IT) management and information systems across various businesses. The study examined 100 scholarly papers to determine how COBIT 5 domains (EDM, APO, BAI, DSS, MEA) are distributed, what combinations of domains are used, what each study aims to assess, and how well IT processes are implemented. The study results indicate that the DSS and APO domains are the most commonly used. This is due to their strong focus on IT service operations and strategic planning. Furthermore, many studies integrate two to five areas to obtain more comprehensive evaluation results. These studies examine several aspects during the evaluation, such as process capability, strategic alignment, risk management, and information systems development. However, most studies indicate that IT process capability remains at levels 1 to 3. This study can serve as a foundation for organizations and researchers to design IT management improvement strategies that are more focused and aligned with organizational goals.