Fitri Nova
Department Of Information Technology, Politeknik Negeri Padang, 21562, Indonesia

Published : 8 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 8 Documents
Search

Mata Ketiga Untuk Tuna Netra Menggunakan Sensor Ultrasonik dan Arduino Pro mini328 Fitri Nova
Elektron : Jurnal Ilmiah Volume 11 Nomor 2 Tahun 2019
Publisher : Teknik Elektro Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (545.906 KB) | DOI: 10.30630/eji.11.2.141

Abstract

Blind people have limited physical condition. This condition makes the blind use sticks as a guide in their daily activities. With advances in technology, the stick used was replaced with a device used on the wrist by using an ultrasonic sensor and Arduino Promini 328. The ultrasonic sensor works by utilizing ultrasonic waves as transmitters and calculating distances with differences in time difference. Ultrasonic sensor sensitivity from 2 cm to 200 cm. The data processor used was the Arduino Pro Mini 328 microcontroller and the Esp8266 nodemcu with input in the form of sound issued by the Raspberry Pi. Raspberry pi is placed in the user's pocket and connected to the headset to give a warning when the ultrasonic sensor is active. This tool can also detect a distance of 45 cm ahead and 65 cm down.
Sistem Monitoring Suhu Dan Jumlah Pengunjung Kafe Berbasis Cloud Computing Fachru Ramadhan; Hanriyawan Adnan Mooduto; Fitri Nova
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 2 No 4 (2021)
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1435.627 KB) | DOI: 10.30630/jitsi.2.4.51

Abstract

Currently, Indonesia is being faced with the COVID-19 pandemic, to prevent being infected with the corona virus, it is to implement health protocols, especially in public places such as shopping centers to airports. The method taken by the Indonesian government in reducing the spread of the corona virus is by implementing PPKM (Enforcement of Community Activity Restrictions) which is one of the requirements for restaurants/cafes, namely limiting the number of visitors to eat in places that are allowed to be around 25% and checking the temperature of restaurant/cafe visitors. The Cloud Computing implementation tool on the temperature monitoring sistem and the number of visitors can assist in the implementation of health protocols in checking the body temperature of visitors at your cafe and make it easier for cafe owners to monitor the number of visitors so that when workers allow an increase in the number of visitors, it can be immediately known through a linked website. with tools.
Monitoring Polusi Udara Dan Kebakaran Berbasis Android Fitri Nova; Andre Febrian Kasmar; Meri Azmi; Khaira Aprinaldo Putra
Elektron : Jurnal Ilmiah Volume 13 Nomor 1 Tahun 2021
Publisher : Teknik Elektro Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/eji.0.0.185

Abstract

A fire in a building or office is one of the main cases that is currently being serious attention for businessmen and government agencies. Considering there are no activities in an office during nights and holidays, makes the business owners feel uncomfortable leaving the office. To overcome this problem, a sensor is to monitor a situation in the office whether there is a gas leak or a hotspot. It is hope that air pollution and fire monitoring tool can help to prevent fires. The way this tool works uses the Arduino Uno to retrieve data from the gas sensor and flame sensor. The data will be sent to the Ubidots server via NodeMCU ESP8266 as wifi or the internet. The monitoring display can be seen via Android and when there is an emergency, the ubidots server will immediately notify the room owner. The result shows that the effective distance of the sensor is around 10cm to 50 cm and the overall system runs well
Implementasi dan Analisa Keamanan Jaringan IDS (Intrusion Detection System) Menggunakan Suricata Pada Web Server Elsa Stephani; Fitri Nova; Ervan Asri
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 1 No 2 (2020)
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2272.112 KB) | DOI: 10.30630/jitsi.1.2.10

Abstract

The defense system against servers is generally still done manually by administrators. To overcome this, we need a system that functions to inform threats that occur optimally and be resolved quickly. The IDS network security system was developed using Suricata. Suricata itself will be built using OPNsense. With the Suricata system using OPNsense, it can detect or prevent incoming attacks.
Wazuh sebagai Log Event Management dan Deteksi Celah Keamanan pada Server dari Serangan Dos Fitri Nova; Muhammad Dehan Pratama; Deddy Prayama
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022): Computer Engineering
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.1.59

Abstract

Server monitoring is the process of monitoring server system resources such as monitoring server performance also helps identify other performance-related problems such as resource utilization, application downtime, and response time to a service. File Integrity Monitoring (FIM) is the activity of monitoring the integrity of a file to maintain the integrity of a file from unauthorized changes, by utilizing Wazuh as one of the open source applications to monitor has various features to perform monitoring. Computer network security becomes something that needs to be considered as technology develops rapidly. It is the responsibility of a network administrator to monitor system security at any time. Given the various threats that can enter the system at any time, an application is needed that can detect and prevent the threat in real time. The problem raises the idea for the author to utilize one of the applications, namely Suricata in which there is an IDS (Intruction Detection System) method that will serve as an attacker detection. Suricata will display an alert when there is a suspicious package. The resulting alert will be stored in the file log. Then the log will be displayed on the Wazuh web interface. Alerts that appear on Wazuh will be sent to network administrators via e-mail
Bioinformatic Analysis in Designing Mega-primer in Overlap Extension PCR Cloning (OEPC) Technique - Mardalisa; Sony Suhandono; Novi Yanti; Fazrol Rozi; Fitri Nova; - Primawati
JOIV : International Journal on Informatics Visualization Vol 5, No 2 (2021)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.2.459

Abstract

Bioinformatics has developed into an application tool for basic and applied research in the biomedical and biotechnology field. Polymerase Chain Reaction (PCR) is a common technique in the molecular area that has always involved bioinformatics science. PCR cloning techniques such as TA cloning and PCR-mediated cloning exhibit complex processes with low success rates. One easy, effective, and practical solution is to use a mega-primer with the Overlap Extension PCR Cloning (OEPC) technique. The success of PCR cloning using the mega-primer design in the OEPC technique is strongly influenced by the characteristics of the mega-primer used. Knowledge of mega-primer characteristics is one of the important factors in the success of PCR cloning. The design process for the mega-primer str promoter was characterized based on the principle of a genetic algorithm using the web-based bioinformatics tools such as ClustalW, NetPrimer, and BLAST. The success of the mega-primer construction in producing recombinant pSB1C3 vector has been confirmed by the sequencing method and the function of the reporting protein (AmilCP). DNA analysis shows a 100 % homologous sequence on the str promoter, while  E. coli colonies successfully express the purplish-blue color. Mega-primer characters can save costs and time of the research by maintaining the primer parameters that provide optimal values and increase the success value of PCR cloning via bioinformatics software. Hence, implications on biological problems, especially using DNA and amino acid sequences, could solve rapidly.
Sistem Informasi Penerimaan Donasi Zakat, Infaq dan Sedekah (ZIS) pada Etalase Sedekah Kota Padang Berbasis Web Framework Laravel Indra Zandi; Yance Sonatha; Fitri Nova
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 2 (2022): Information Technology and Visualization
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.2.62

Abstract

The Sedekah Showcase is one of the organizations that organizes donations where this institution provides a forum for the community to distribute donations, which will later be distributed to the people in need who are registered. In analyzing the Donation Information System and ZIS (Zakat, Infaq, Alms) there are 6 aspects of system analysis needed, namely Performance (Performance), Information (Information), Economy (Economic), Control (Control), Efficiency (Efficiency), and Service ( services). In the donation information system and ZIS Etalase Sedekah, the actors involved are system administrators, donors, and volunteers. Information System for Receiving Donations and Zakat, Infaq and Alms (ZIS) at the Sedekah Showcase of Padang City Based on the Laravel Web Framework includes management of receiving donations and ZIS transactions as well as transaction history, periodic reporting of transactions, surveys of Beneficiaries, data management of Donors, Volunteers , and Beneficiaries. PHP programming language using Laravel framework and database using MySQL and using DOMPDF in designing e-reports.
Sistem Manajemen Kehadiran Menggunakan Metode Face Recognition Berbasis Web Nur Jaini; Ervan Asri; Fitri Nova
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 2 No 2 (2021)
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1589.488 KB) | DOI: 10.30630/jitsi.2.2.39

Abstract

Attendance system with the use of face recognition is a system that utilizes biometrics in the form of facial patterns and compares detected faces with stored faces.To capture facial patterns from users who will be absent, use an esp32-cam camera module embedded in the face recognition library so that able to compare detected faces with stored ones. This system is integrated with a web server which is designed to manage and store student absences so that one face detection tool can be used by more than one class simultaneously. The web server is controlled by the admin to manage absent schedules starting from class schedules, class schedules as well as entry and exit hours, so that the use of the web server does not allow duplicate data or attendance more than once