Fidyatun Nisa
Universitas Malikussaleh, Indonesia

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Web-Based GIS for Oil Palm Land Suitability Assessment Using MAUT in Mandailing Natal Regency Nanda Sitti Nurfebruary; Taufik Yunan Simamora; Fidyatun Nisa; Muhammad Ikhwani
Brilliance: Research of Artificial Intelligence Vol. 5 No. 2 (2025): Brilliance: Research of Artificial Intelligence, Article Research November 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i2.6458

Abstract

Land suitability assessment plays a critical role in plantation development planning, particularly for oil palm cultivation, which requires specific environmental conditions for optimal growth. Mandailing Natal Regency, a region with significant agricultural potential, necessitates a scientific approach to identify suitable areas for oil palm development. This study aims to develop a web-based Geographic Information System (GIS) integrated with the Multi-Attribute Utility Theory (MAUT) method to evaluate and map land suitability. The analysis utilizes both spatial and attribute data based on six key criteria: soil texture, rainfall, drainage, land slope, temperature, and soil pH. Each criterion is weighted according to its relative importance, and the MAUT method is applied to compute the overall utility value for each sub-district. The results are then visualized through an interactive GIS platform developed using the CodeIgniter framework. The system classifies land into four suitability categories: highly suitable (S1), moderately suitable (S2), marginally suitable (S3), and not suitable (N). The findings indicate that a substantial portion of the study area falls within the suitable and highly suitable categories, demonstrating strong potential for oil palm cultivation. This study provides a robust, data-driven tool to support decision-making in sustainable plantation development and improve land-use efficiency in Mandailing Natal Regency.
Database Vulnerability Analysis of North Aceh e-Kinerja Website Using SQL Injection Fidyatun Nisa; Muhammad Ikhwani; Nanda Sitti Nurfebruary; Siti Nayla Husna
Brilliance: Research of Artificial Intelligence Vol. 5 No. 2 (2025): Brilliance: Research of Artificial Intelligence, Article Research November 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i2.6780

Abstract

The rapid advancement of information technology has significantly increased the risk of cyber threats, particularly in web-based systems. One of the most common attack techniques used to exploit vulnerabilities in web applications is SQL injection, which can result in sensitive data leakage and system compromise. This study aims to evaluate the database security of the E-Kinerja website of North Aceh Regency against SQL injection attacks using a black-box penetration testing approach. The assessment is conducted based on the Information Systems Security Assessment Framework (ISSAF), which provides a structured and systematic methodology for comprehensive security evaluation. The testing process includes several stages, namely planning and preparation, information gathering, network mapping, vulnerability identification, and penetration testing, utilizing tools such as SQLMap and OWASP ZAP. The results indicate that the target website is not vulnerable to SQL injection attacks, as no exploitable parameters were identified during testing. This is largely due to the implementation of security mechanisms such as Web Application Firewall (WAF) and Intrusion Prevention System (IPS), which effectively detect and prevent unauthorized access attempts. This study highlights the importance of implementing layered security strategies and continuously updating security protocols to address emerging cyber threats. The findings contribute to improving database security awareness and provide practical recommendations for strengthening the resilience of information systems in the government sector.