cover
Contact Name
M. Miftach Fakhri
Contact Email
fakhri@unm.ac.id
Phone
+6282290603030
Journal Mail Official
wahid@unm.ac.id
Editorial Address
Program Studi Teknik Komputer, UNM Parangtambung, Daeng Tata Raya, Makassar, South Sulawesi, Indonesia
Location
Kota makassar,
Sulawesi selatan
INDONESIA
Journal of Embedded Systems, Security and Intelligent Systems
ISSN : 2745925X     EISSN : 2722273X     DOI : -
Core Subject : Science,
The Journal of Embedded System Security and Intelligent System (JESSI), ISSN/e-ISSN 2745-925X/2722-273X covers all topics of technology in the field of embedded system, computer and network security, and intelligence system as well as innovative and productive ideas related to emerging technology and computer engineering, including but not limited to : Network Security System Security Information Security Social Network & Digital Security Cyber Crime Machine Learning Decision Support System Intelligent System Fuzzy System Evolutionary Computating Internet of Thing Micro & Nano Technology Sensor Network Renewable Energy Wearable Devices Embedded Robotics Microcontroller
Articles 157 Documents
Comparison of Efficiency 3D Rendering Methods for Augmented Reality: A Case Study of SRP, URP, and Light Estimation on a Mobile Device Indasari, Sri Suci; Achmad Zulfajri Syaharuddin; Nurhikmayana Janna; Irmawati
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.8400

Abstract

This study examines the efficiency of 3D rendering methods in the development of Augmented Reality (AR) applications, which significantly impact visual quality, response speed, and device resource consumption. The main objective of this research is to analyze and compare three commonly used rendering methods in AR development: Standard Render Pipeline (SRP), Universal Render Pipeline (URP), and Light Estimation. Data collection was conducted through the implementation of an AR prototype application featuring two 3D objects (Earth and Mars), followed by testing the render latency for each method. The results showed that all three methods produced the same latency time of 0.03 seconds on a high-specification device. These findings suggest that, under the given testing conditions, the choice of rendering method has no significant impact on rendering latency. However, overall efficiency may still be influenced by other factors such as lighting conditions, hardware specifications, and marker quality.
Secure Web-Based File Encryption Using AES-128 Nasrullah, Asmaul Husnah
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.8436

Abstract

This study presents the development of a web-based file encryption and decryption system utilizing the 128-bit Advanced Encryption Standard (AES). AES, a symmetric-key algorithm, uses a single secret key for both encryption and decryption, ensuring consistent data confidentiality. The system was implemented using PHP and JavaScript and tested on files ranging from 100 KB to 5 MB in size. Empirical evaluation shows that the prototype achieves an average encryption time of 0.84 seconds and a decryption time of 0.90 seconds per file. Peak processing time for 5 MB files did not exceed 1.45 seconds, indicating stable performance under moderate loads. The system successfully supports common file types including .txt, .pdf, .jpg, and .docx, with a throughput rate of approximately 1.15 MB/s. Usability testing involving 15 non-expert participants resulted in a System Usability Scale (SUS) score of 82.5, classifying the interface as "excellent" in terms of user experience. Despite these strengths, secure key management remains a critical concern in web-based environments. To mitigate this, the system enforces HTTPS, session timeout controls, and client-side key handling. The results suggest that the proposed system can serve as a practical reference for lightweight, secure file transmission in educational, commercial, and governmental web applications
Development of an IoT-Based Home Security System Prototype Using Multisensors and ESP32-CAM Nannung, Jumita; Sa'ban Miru, Alimuddin; Muliadi; Gunawan
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.8456

Abstract

Advancements in information technology have driven the development of home security systems based on the Internet of Things (IoT). This study aims to design a home security system using ESP32-CAM, multisensors, and Telegram for real-time monitoring. The system features face recognition using the Haar Cascade and LBPH algorithms, along with DHT22 and MQ-2 sensors to monitor temperature, humidity, and hazardous gases. The development method used is the prototype model. Testing results showed a face recognition accuracy of 95.31% and the ability to detect temperatures above 40°C and gas concentrations exceeding 300 PPM. The system performs optimally at a distance of 35–150 cm but is limited by extreme lighting and facial angle variations. In conclusion, the system enhances home surveillance effectiveness through real-time monitoring and reliable remote access control
LSTM Based Stock Price Forecasting Using RSI and MACD: A Case Study On BBRI Abdal, Nurul Mukhlisah; Mahande, Ridwan Daud; Wahyuni, Maya Sari; Siddik, Andi Muhammad Amil
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.8518

Abstract

The high volatility and non-linearity of stock market data present significant challenges in forecasting price movements. This study aims to develop an accurate predictive model for the daily closing price of PT Bank Rakyat Indonesia (Persero) Tbk (BBRI) using a Long Short-Term Memory (LSTM) neural network. The primary objective is to enhance predictive accuracy by incorporating technical indicators—Relative Strength Index (RSI) and Moving Average Convergence Divergence (MACD)—into the model architecture. Historical stock data from 2010 to 2024 were collected from Yahoo Finance. The dataset was preprocessed through data cleaning, feature engineering, normalization, and time-based splitting into training and testing sets. The LSTM model was trained using the Mean Squared Error (MSE) loss function and optimized with the Adam optimizer. Model performance was evaluated based on key metrics including MSE, Root Mean Squared Error (RMSE), and Mean Absolute Error (MAE). The results indicate that the model performs effectively, with training RMSE of 73.61 and testing RMSE of 92.47. These findings demonstrate that the LSTM model, enriched with RSI and MACD indicators, is capable of capturing temporal patterns in stock prices and generating reliable forecasts. The study contributes to the growing body of literature on deep learning applications in financial forecasting, and offers practical insights for investors and analysts in understanding market behavior and supporting data-driven decision-making.
Design of Employee Absence System Using Web-Based Realtime Geo-Location Library Yusuf, Nur Azizah; Nur, Muhammad Muhaimin; Endang, Andi Hutami
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.6018

Abstract

Employee performance is one of the most critical aspects of a company or organization. This is because the company's goals or targets can only be achieved if employees can demonstrate good performance in achieving them. One way to ensure this is by maintaining employee discipline. This study proposes a web-based employee attendance system using the Geo-Location Realtime library to monitor employee discipline at PT. Portal Indonesia Perkasa, which previously relied solely on a fingerprint-based attendance system. The method used is the waterfall method. Which employs a systematic and sequential approach. The system design includes flowcharts, use case diagrams, data flow diagrams, and logical legal structures. The main features include real-time location tracking and automatic attendance recording. Implementation results show the system's effectiveness in facilitating accurate attendance monitoring and reporting.
Development and Optimization of An Automated Thesis Format Checking System For Undergraduate Students At Universitas Negeri Makassar Haekal Febriansyah Ramadhan
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.9211

Abstract

This research presents the development and optimization of an automated thesis format checking system tailored for undergraduate students at Universitas Negeri Makassar (UNM). Motivated by the disproportionate ratio of 1538 students to 52 lecturers in the Informatics and Computer Engineering Education Study Program, this project aims to reduce lecturers’ workload by automating compliance verification with institutional thesis formatting guidelines. A web-based application was developed using an iterative, consultation-driven design approach involving system prototyping, expert testing, and feedback-based refinement. The application detects elements such as font usage, margins, spacing, and heading structure based on the official formatting standards. Expert feedback indicated a high satisfaction level (4.36/5). Although current limitations include manual file uploads and lack of integration with UNM's official systems, the tool significantly enhances efficiency and consistency in academic supervision. Future developments aim at full portal integration and real-time feedback mechanisms.
The Role of Enterprise Resource Planning in Improving Data Integration and Managerial Decision Making Ayu Hasnining; Mushaf
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.9247

Abstract

This study aims to examine the role of Enterprise Resource Planning (ERP) in improving the integration of operational data and managerial decisions at IFAH Group. The main problem raised is the non-optimal utilization of ERP as a strategic tool in supporting data-based decision making. Using a quantitative approach with a correlational design, 50 respondents were selected through purposive sampling. Data were collected through a Likert-scale closed questionnaire and analyzed with multiple linear regression using SPSS. Results show ERP has a significant effect on data integration and managerial decisions (R² = 0.574; p < 0.001), with data integration as a mediator. This study confirms the importance of ERP in the digital transformation of organizations. However, this research is limited to one case study and user perceptions, so further research with a multi-method approach or in different industry contexts is recommended
Morphological-Based Analysis for Fruit Shape and Size Estimation in Binary Image Processing Budiarti, Nur Azizah Eka; Prima, Kurnia Wahyu; Carli Apriansyah Hutagalung
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.9248

Abstract

The automatic identification of fruit dimensions and morphology is a major requirement in agricultural and food technology. This research formulates a technique for fruit separation by employing mathematical morphology on binary images to identify the attributes of fruit shape and size. The dataset has 100 fruit photos featuring diverse geometric designs. The image processing procedure commences with grayscale conversion, followed by threshold adjustment, and culminates in the use of morphological operations to refine the image. The area and perimeter characteristics of the objects are extracted and utilized to categorize the fruit forms into circles or ellipses, triangles, and squares or rectangles. Segmentation accuracy was evaluated using the Intersection over Union (IoU) metric, yielding an average result of 85.67%, which signifies a high degree of segmentation precision. This study's findings affirm that mathematical morphology techniques are exceptionally effective in the automated detection of fruit size and form, with the potential to enhance efficiency in agricultural crop sorting processes.
Balancing Data Security: A Comparative Review of Hashing and Non-Hashing Approaches in Data Storage Prima, Kurnia Wahyu
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.9257

Abstract

Data security is a vital pillar in modern information system management, particularly in preventing unauthorized access, data breaches, and internal misuse. Among the core techniques to protect sensitive information, hashing stands out as an essential approach, transforming original data into a fixed, non-reversible format to ensure confidentiality and integrity. However, many systems still store passwords or other sensitive data in plaintext, leaving them highly vulnerable to exploitation. This study conducts a comparative experimental analysis between two system prototypes: one implementing the SHA-256 hashing algorithm and another storing data without hashing. Tests were conducted through brute-force attack simulations and direct database inspections using phpMyAdmin on a local server environment. The findings show that the non-hashing system exposed 100% of stored passwords in readable form, allowing immediate access and manipulation by internal actors. In contrast, the hashing-based system successfully obscured password content, making it computationally infeasible to reverse even with administrative database access. These results affirm the crucial role of hashing in enhancing data protection. Beyond technical validation, this study underscores the urgency of adopting hashing as a minimum security standard in any system managing confidential data. The results highlight that incorporating cryptographic hashing not only defends against external attacks but also mitigates insider threats. Therefore, organizations and developers must treat hashing as a non-negotiable part of system architecture to ensure long-term data security, compliance with global standards, and the preservation of user trust in the digital era.
Internet of Things Experiment Device for Laboratory Activities in Heat Transfer Mechanism Rahmawati, Siti Nur; Wahyuningsih, Daru
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.2216

Abstract

As a branch of fundamental science, physics studies the laws underlying physical events that happen in nature. To learn physics, laboratory activity is necessarily involved, and it requires supporting devices to observe and study phenomena that are physically abstract, such as heat transfer mechanisms. This research aims to develop an Internet of Things (IoT) experiment device for heat transfer using NodeMCU and describe its working principle and measurement result. It involved NodeMCU, MAX6675 sensor, and LCD 1602 as the main components. The procedures carried out in this research included planning, developing, testing, data collecting, data analyzing, and reporting. Multiple measurements were carried out to analyze the standard error value of the device. The standard error values of both thermocouples used in the device were 1,336104 for the first thermocouple and 0,754315 for the second. Additionally, the IoT device’s thermocouple readings were calibrated using the linear regression method and the validation experiment showed that the calibration has increased its accuracy value.

Page 10 of 16 | Total Record : 157