Claim Missing Document
Check
Articles

Found 6 Documents
Search

Design and Implementation of Web Service for Laundry Service Payment at RAZ-Q Laundry Samarinda Mallala, Syamsudin; Pukeng, Ahmad Fahrijal; Nursobah, Nursobah
Journal of Applied Science, Engineering, Technology, and Education Vol. 6 No. 2 (2024)
Publisher : PT Mattawang Mediatama Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35877/454RI.asci3639

Abstract

The advancement of technology has facilitated access to information and various applications spanning desktop, web, and mobile platforms, becoming an integral part of everyday life. Among these platforms, websites are the most widely used. The web is widely used for business purposes. One of the common businesses is laundry services, which has become essential for individuals with busy schedules, such as workers and students. Busy daily activities make the need for clean clothes a top priority. However, the existence of many laundry service providers creates intense competition and difficulties for new consumers in finding the right service. This research examines a web services-based laundry service designed to help consumers find and book quality laundry services in their vicinity. It also provides process monitoring features and estimated time for clothes pickup. For laundry service owners, these web services offer opportunities to improve their business. This research uses the Waterfall method of software development, including the stages of analysis, design, coding, and testing. Use case diagrams were used to model the interaction between actors in the application. The web interface is designed according to user needs. The result of this research is web services that can help consumers find and order laundry services easily and efficiently. Blackbox testing is conducted to ensure that all designed functions run properly. This application has the potential to help laundry service owners increase their income. Application development is done using Visual Studi Code with PHP Native programming language and MySQL as database management.
Implementasi Seed Phrase Dalam Keamanan Dompet Kripto Pada Metamask Kalvin, Fernanda; Sa'ad, Muhammad Ibnu; Pukeng, Ahmad Fahrijal
Bulletin of Information Technology (BIT) Vol 6 No 2: Juni 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bit.v6i2.2026

Abstract

Seed phrases are a crucial element in the security system of non-custodial crypto wallets like MetaMask. These phrases allow users to recover their wallets and serve as the primary key to access digital assets. This research aims to analyze and implement seed phrase-based security in crypto wallets, using MetaMask as a case study. Through literature review and technical simulation, this study explains how seed phrases function, the potential risks if compromised, and possible mitigation strategies. The results show that while seed phrases are vital for maintaining user asset security and integrity, they can be a vulnerability if not properly protected.
Pemanfaatan Set Top Box Bekas Sebagai Server Cloud Hosting dengan Aapanel dan Cloudflare Zerotrust Rohman, Abdur; Fahmi, Muhammad; Pukeng, Ahmad Fahrijal
Blend Sains Jurnal Teknik Vol. 4 No. 1 (2025): Edisi Juli
Publisher : Ilmu Bersama Center

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56211/blendsains.v4i1.985

Abstract

Transformasi digital meningkatkan kebutuhan hosting, namun biaya berlangganan menjadi kendala bagi sebagian pengguna. Solusi alternatif adalah memanfaatkan set top box (STB) bekas sebagai server cloud hosting berbasis Armbian, sistem operasi ringan yang mendukung berbagai perangkat. Tantangan utama adalah mengakses server tanpa IP publik, yang diatasi dengan tunneling menggunakan Cloudflare Zerotrust. Penelitian bertujuan untuk membangun server cloud hosting berbasis set top box (STB) menggunakan Armbian dan Cloudflare Zerotrust untuk solusi hosting murah tanpa IP publik. Metode penelitian yang dipakai adalah metode eksperimen yang meliputi studi literatur, desain sistem, implementasi, dan pengujian. Perangkat utama berupa STB ZTE HG-680P (quad-core ARM Cortex-A53, RAM 2GB) dengan Armbian, AaPanel, dan Cloudflare. Hasil menunjukkan server dapat diakses via domain pribadi, meski layanan FTP/SSH hanya berfungsi di jaringan lokal. Pengujian beban mengungkap kinerja optimal untuk 15 user (website sederhana, respon 81,72 ms) dan 8 user (WordPress, respon 860,29 ms). Server ini cocok untuk kebutuhan pribadi trafik rendah, tetapi tidak untuk skala besar. Jika ingin penggunaan dalam skala besar, bisa melakukan optimasi sumber daya seperti mengganti set top box menggunakan mini pc dan menggunaan IP publik untuk peningkatan kinerja jaringannya. Penelitian memberikan kebaruan dengan memberikan solusi alternatif pemakaian ip publik dengan menggunakan tunneling dari Cloudflare Zerotrust yang dapat menekan biaya pembuatan server.
The Design and Implementation of Web Service for Laundry Service Payment at RAZ-Q Laundry Samarinda Malalla, Syamsuddin; Pukeng, Ahmad Fahrijal; Nursobah, Nursobah
TEPIAN Vol. 5 No. 3 (2024): September 2024
Publisher : Politeknik Pertanian Negeri Samarinda

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51967/tepian.v5i3.3087

Abstract

The advancement of technology has facilitated access to information and various applications spanning desktop, web, and mobile platforms, becoming an integral part of everyday life. Among these platforms, websites are the most widely used. The web is widely used for business purposes. One of the common businesses is laundry services, which has become essential for individuals with busy schedules, such as workers and students. Busy daily activities make the need for clean clothes a top priority. However, the existence of many laundry service providers creates intense competition and difficulties for new consumers in finding the right service. This research examines a web services-based laundry service designed to help consumers find and book quality laundry services in their vicinity. It also provides process monitoring features and estimated time for clothes pickup. For laundry service owners, these web services offer opportunities to improve their business. This research uses the Waterfall method of software development, including the stages of analysis, design, coding, and testing. Use case diagrams were used to model the interaction between actors in the application, while class diagrams were used to describe the database structure. Activity and sequence diagrams were used to illustrate the flow of the application. The web interface is designed according to user needs. The result of this research is web services that can help consumers find and order laundry services easily and efficiently. Blackbox testing is conducted to ensure that all designed functions run properly. This application has the potential to help laundry service owners increase their income. Application development is done using Visual Studi Code with PHP Native programming language and MySQL as database management.
Security Design for Local Area Networks Using Port Firewall Security Pukeng, Ahmad Fahrijal; Havid, Hervan
Sebatik Vol. 29 No. 2 (2025): December 2025
Publisher : STMIK Widya Cipta Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46984/sebatik.v29i2.2699

Abstract

Network security design is a crucial aspect in maintaining data integrity, confidentiality, and availability. This study develops and tests an effective network security system using the firewall security port method. This method focuses on identifying and restricting access to physical switch ports to prevent unauthorized access and protect the system from external threats. The research method uses experimental stages through subjective means to describe current practices. Through configuration and testing in a simulated environment, this study shows that the implementation of MAC address-based port security effectively blocks illegal devices without disrupting the connectivity of legitimate devices. This study provides evidence and practical guidelines that the firewall security port method is an efficient solution for improving network access layer security. The conclusions of this study provide a basis for organizations to implement proactive security measures in the face of evolving cyber threats.
Evaluasi Kinerja Virtualbox Pada Laptop Berbasis Intel N100 Dengan Media Penyimpanan EMMC Fadillah, Ridhy Awal; Fahmi, Muhammad; Pukeng, Ahmad Fahrijal
ILKOMNIKA Vol 7 No 3 (2025): Volume 7, Number 3, December 2025
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28926/ilkomnika.v7i3.796

Abstract

Virtualisasi merupakan komponen kunci dalam arsitektur komputasi awan maupun tepi karena memungkinkan pemanfaatan perangkat keras secara lebih efisien. Meski demikian, agar teknologi ini dapat bekerja optimal pada perangkat berdaya rendah yang umum digunakan dalam lingkungan terdistribusi, diperlukan strategi konfigurasi yang bersifat adaptif. Sampai saat ini, penelitian yang mengkaji performa virtualisasi secara menyeluruh pada platform Intel N100 dengan penyimpanan eMMC masih sangat minim, sehingga muncul celah riset terkait konfigurasi optimal untuk perangkat edge computing kelas entry-level. Melalui desain eksperimen one-group pretest–posttest, penelitian ini menilai efektivitas beberapa strategi konfigurasi pada Oracle VM VirtualBox yang dijalankan pada platform Intel N100 berbasis eMMC yang mencerminkan karakteristik tipikal node komputasi tepi. Evaluasi performa dilakukan menggunakan FIO dan Sysbench untuk mengukur kinerja I/O disk, CPU, serta memori. Hasil pengujian menunjukkan bahwa penggunaan driver VirtIO memberikan peningkatan signifikan pada operasi I/O acak, dengan peningkatan performa mencapai sekitar 227,4%. Temuan ini penting bagi implementasi layanan mikro dan mekanisme komputasi adaptif yang membutuhkan respons cepat pada lingkungan tepi. Namun, peningkatan tersebut diikuti penurunan performa pembacaan sekuensial, sehingga konfigurasi sistem perlu mempertimbangkan konteks dan karakteristik beban kerja. Penerapan rule-based adaptive configuration dapat menjadi solusi yang lebih sesuai. Secara keseluruhan, hasil penelitian ini memberikan kontribusi praktis bagi perancang sistem dalam menyeimbangkan efisiensi dan kinerja pada ekosistem cloud-to-edge yang memiliki keterbatasan daya maupun kapasitas.