Nanda Sitti Nurfebruary
Universitas Malikussaleh, Indonesia

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Usability-Driven Development of an IoT-Based Salted Fish Quality Detection Application Using the QUIM Model Muhammad Ikhwani; Lidya Rosnita; Nanda Sitti Nurfebruary; Asih Makarti Muktitama; Fidyatunnisa Fidyatunnisa; Muhammad Zuhdi
Brilliance: Research of Artificial Intelligence Vol. 5 No. 2 (2025): Brilliance: Research of Artificial Intelligence, Article Research November 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i2.6209

Abstract

Salted fish is a vital component of Indonesia’s coastal economy, supporting numerous fishing households and local micro, small, and medium enterprises (MSMEs). However, maintaining product quality during household freezer storage remains a significant challenge. Temperature and humidity fluctuations in shared freezers often lead to quality degradation, discoloration, and the risk of microbial contamination by pathogens such as Salmonella and Staphylococcus aureus. To address these issues, this study developed an Internet of Things (IoT)–based monitoring system that integrates temperature and humidity sensors with an Android application to provide real-time data visualization and automated risk notifications. Recognizing that usability is critical for technology adoption among food-related MSMEs, the Quality in Use Integrated Measurement (QUIM) framework was applied to evaluate system performance across ten dimensions: effectiveness, productivity, satisfaction, efficiency, learnability, flexibility, error tolerance, safety, accessibility, and sustainability. The system was designed using human-centered principles and implemented with an ESP32 microcontroller and DHT22 sensors. A 14-day pilot trial demonstrated that the application could reliably detect environmental fluctuations, with usability scores reflecting high effectiveness (4.1/5) and user satisfaction (4.3/5). Although minor issues with internet connectivity and error message clarity were noted, iterative improvements were successfully incorporated. These findings demonstrate the feasibility of combining IoT technology with QUIM-based evaluation to enhance food storage practices and support quality management in salted fish processing among MSMEs.
Web-Based GIS for Oil Palm Land Suitability Assessment Using MAUT in Mandailing Natal Regency Nanda Sitti Nurfebruary; Taufik Yunan Simamora; Fidyatun Nisa; Muhammad Ikhwani
Brilliance: Research of Artificial Intelligence Vol. 5 No. 2 (2025): Brilliance: Research of Artificial Intelligence, Article Research November 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i2.6458

Abstract

Land suitability assessment plays a critical role in plantation development planning, particularly for oil palm cultivation, which requires specific environmental conditions for optimal growth. Mandailing Natal Regency, a region with significant agricultural potential, necessitates a scientific approach to identify suitable areas for oil palm development. This study aims to develop a web-based Geographic Information System (GIS) integrated with the Multi-Attribute Utility Theory (MAUT) method to evaluate and map land suitability. The analysis utilizes both spatial and attribute data based on six key criteria: soil texture, rainfall, drainage, land slope, temperature, and soil pH. Each criterion is weighted according to its relative importance, and the MAUT method is applied to compute the overall utility value for each sub-district. The results are then visualized through an interactive GIS platform developed using the CodeIgniter framework. The system classifies land into four suitability categories: highly suitable (S1), moderately suitable (S2), marginally suitable (S3), and not suitable (N). The findings indicate that a substantial portion of the study area falls within the suitable and highly suitable categories, demonstrating strong potential for oil palm cultivation. This study provides a robust, data-driven tool to support decision-making in sustainable plantation development and improve land-use efficiency in Mandailing Natal Regency.
Database Vulnerability Analysis of North Aceh e-Kinerja Website Using SQL Injection Fidyatun Nisa; Muhammad Ikhwani; Nanda Sitti Nurfebruary; Siti Nayla Husna
Brilliance: Research of Artificial Intelligence Vol. 5 No. 2 (2025): Brilliance: Research of Artificial Intelligence, Article Research November 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i2.6780

Abstract

The rapid advancement of information technology has significantly increased the risk of cyber threats, particularly in web-based systems. One of the most common attack techniques used to exploit vulnerabilities in web applications is SQL injection, which can result in sensitive data leakage and system compromise. This study aims to evaluate the database security of the E-Kinerja website of North Aceh Regency against SQL injection attacks using a black-box penetration testing approach. The assessment is conducted based on the Information Systems Security Assessment Framework (ISSAF), which provides a structured and systematic methodology for comprehensive security evaluation. The testing process includes several stages, namely planning and preparation, information gathering, network mapping, vulnerability identification, and penetration testing, utilizing tools such as SQLMap and OWASP ZAP. The results indicate that the target website is not vulnerable to SQL injection attacks, as no exploitable parameters were identified during testing. This is largely due to the implementation of security mechanisms such as Web Application Firewall (WAF) and Intrusion Prevention System (IPS), which effectively detect and prevent unauthorized access attempts. This study highlights the importance of implementing layered security strategies and continuously updating security protocols to address emerging cyber threats. The findings contribute to improving database security awareness and provide practical recommendations for strengthening the resilience of information systems in the government sector.