Claim Missing Document
Check
Articles

Analysis Comparative of Performance Optimization Techniques for PHP Framework Testing: Laravel, CodeIgniter, Symfony: Analisis Perbandingan Teknik Optimasi Performa Untuk Pengujian Framework PHP: Laravel, CodeIgniter, Symfony Putra, Fauzan Prasetyo Eka; Zulfikri, Achmad; Rohman, Abd; Alim, Royfal
Brilliance: Research of Artificial Intelligence Vol. 5 No. 1 (2025): Brilliance: Research of Artificial Intelligence, Article Research May 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i1.5989

Abstract

Web application performance significantly impacts digital services in sectors like e-commerce, education, and healthcare, where poor response time (>100 ms) can reduce user satisfaction by up to 20% and cause revenue losses. Despite numerous studies on PHP frameworks, comprehensive comparisons integrating optimization techniques remain limited. This research empirically evaluates the performance of Laravel, CodeIgniter, and Symfony, focusing on response time, throughput, and error rate before and after applying optimization techniques. Load and stress testing was conducted using Apache JMeter, Xdebug, and New Relic on a student management system with a MySQL database (10,000 records), simulating realistic scenarios from 1 to 100 users, mimicking e-commerce or educational platforms. Optimization techniques included caching (e.g., route caching in Laravel, query caching in CodeIgniter), database optimization (indexing, eager loading), and code refactoring. Results revealed CodeIgniter achieved the lowest response time (16.49 ms, 41.4% reduction) and highest throughput, ideal for lightweight applications like news portals. Laravel showed the greatest improvement under high load (35.1% reduction, from 118.34 ms to 76.80 ms), suitable for e-commerce platforms. Symfony demonstrated stable performance (20.0%–25.0% reduction), fitting enterprise applications with complex APIs. This study provides practical guidance for developers in selecting PHP frameworks based on project requirements and offers optimization recommendations to enhance web application efficiency and scalability.
Firewall Implementation as a Computer Network Security Strategy for Data Protection Putra, Fauzan Prasetyo Eka; Dafid, Mohammat; Syafi’i, Imam
Brilliance: Research of Artificial Intelligence Vol. 5 No. 1 (2025): Brilliance: Research of Artificial Intelligence, Article Research May 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i1.6162

Abstract

Computer network security plays a crucial role in ensuring the integrity, confidentiality, and availability of data in the modern digital era. One of the primary tools used to safeguard networks from unauthorized access and external threats is the firewall. This paper explores the significance of firewalls in protecting network systems by examining their functions, various types, and capability to regulate data traffic. Firewalls work by enforcing specific rules to limit access, effectively reducing the risk of cyber threats such as malware, hacking attempts, and unauthorized intrusions. The study also involves practical observation of firewall implementation in a real network setup to evaluate their efficiency in mitigating security risks. Findings indicate that properly configured firewalls can considerably strengthen a network’s defense. Nevertheless, relying solely on firewalls is insufficient. They should be supported by additional security technologies and best practices to achieve comprehensive network protection. In conclusion, firewalls are essential elements in upholding the reliability and safety of computer networks.
Technical Performance Comparison of Modern Frontend Frameworks Study on Svelte, React, and Vue Putra, Fauzan Prasetyo Eka; Hasbullah, Hasbullah; Muslim, Farhan; Paradina, Reni
Brilliance: Research of Artificial Intelligence Vol. 5 No. 1 (2025): Brilliance: Research of Artificial Intelligence, Article Research May 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i1.6133

Abstract

This research aims to analyze and compare the technical performance of three of the most widely used modern frontend frameworks, namely Svelte, React, and Vue. These frameworks are popular among developers for building responsive, efficient, and maintainable user interfaces. Using a systematic and controlled experimental approach, we developed identical simple web applications on each of the three frameworks to ensure fairness in comparison. The evaluation focused on four key performance metrics: rendering time, bundle size, memory usage during idle, and DOM operation efficiency. The experiments were conducted using a desktop computer equipped with an AMD Ryzen 5 5600X processor, 32 GB of RAM, and the Firefox browser running on the Ubuntu 22.04 LTS operating system. The results revealed that Svelte consistently outperformed React and Vue in all measured aspects. It achieved the fastest rendering time at 110 milliseconds, the smallest bundle size of 22 KB, the lowest idle memory usage at 7.8 MB, and the most efficient DOM operation with only one operation per action. React and Vue, although still considered performant, showed slower rendering times of 170 ms and 140 ms, respectively, along with larger bundle sizes and higher memory usage. Svelte’s superior performance is largely due to its compiler-based architecture, which transforms components into highly optimized vanilla JavaScript without relying on a virtual DOM or heavy runtime. This study provides valuable insights for developers and decision-makers in selecting the most technically efficient frontend framework for high-performance web applications.
Security Analysis And Data Recovery On Large-Scale Computer Networks Putra, Fauzan Prasetyo Eka; Syirofi, Syirofi; Wahid, Durrahman; Syam, Abd. Mu’iz
Brilliance: Research of Artificial Intelligence Vol. 5 No. 1 (2025): Brilliance: Research of Artificial Intelligence, Article Research May 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i1.6276

Abstract

Large computer networks are now needed to help institutions, businesses, and governments do their work in today's complex and connected digital world. At the same time, the growth of very large and important data sets brings new problems for keeping data safe and quickly getting it back when needed. This research aims to carefully study security plans and data recovery methods that can be used well with large computer networks. This research looks at scientific papers, information technology articles, and related research reports from the last ten years. The main things to do are to use firewalls in layers, use encryption methods like AES and RSA, and use systems to find and block malware by looking at its signatures and actions. We also need to make the physical security of network devices stronger, automatically manage updates, and set up regular data backups along with a plan for recovering from disasters (DRP). The study's results show that a complete security and recovery system that combines different parts can greatly improve how well the system can handle different threats, whether they are technical or not. Working together to prevent cyberattacks and being ready to recover data is very important for keeping information technology services running smoothly. This research gives key suggestions on how to build a network that is not only secure and works well but can also quickly recover if there is an emergency or system problem.
Designing an Information System for Student Admissions at SMAN 1 Pademawu Using the Waterfall Method Putra, Fauzan Prasetyo Eka; Mu'minin, Fadilatul; Nuraini, Alief; Barokah, Selviana Nur Rizqi; Khairurrozi, Khairurrozi
Brilliance: Research of Artificial Intelligence Vol. 5 No. 1 (2025): Brilliance: Research of Artificial Intelligence, Article Research May 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i1.6508

Abstract

 New Learner Admission (PPDB) is one of the processes of accepting students at every school level, starting from PAUD, kindergarten, elementary school, junior high school, to high school / vocational school. This term is used by various school bodies when they want to accept new students. Often these institutions experience problems in managing the administration of new participants, one of which is SMAN 1 Pademawu. The obstacles that occur include the buildup of queues of participants who register at the institution and constraints in inputting new participant data due to the limited number of PPDB organizing committee members. Therefore, this research will create a PPDB information system to overcome the obstacles experienced by the institution. The information system created is in the form of flow chart design, ERD (Entity Relationship Diagram), UML (Unified Modeling Language) and DFD (Data Flow Diagram). Using Javascript programming language, React Js framework and bootstrap. The result of this research is the construction of PPDB information system at SMAN 1 Pademawu by using waterfall method. With this system, it is expected to facilitate the PPDB committee of SMAN 1 Pademawu in managing or inputting data and reducing the buildup of registration queues effectively and efficiently.  
Implementation And Simulation Of Dynamic Arp Inspection In Cisco Packet Tracer For Network Security Putra, Fauzan Prasetyo Eka; Ubaidi, Ubaidi; Tamam, Alief Badrit; Efendi, Reynal Widya
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4199

Abstract

Dynamic ARP Inspection (DAI) is a security feature that helps prevent Address Resolution Protocol (ARP) spoofing attacks, which can compromise the integrity and confidentiality of data in a network. This paper presents the implementation and simulation of DAI using Cisco Packet Tracer, a network simulation tool. The goal is to show how DAI can be configured and used to improve network security by verifying ARP packets in a switched network. The implementation involved setting up a network topology with switches and end devices, configuring DHCP snooping, and enabling DAI on the switches. Simulations tested various scenarios, including normal operation, ARP spoofing attacks, and the network response to these attacks with DAI enabled. The results show that DAI effectively mitigates ARP spoofing attacks, ensuring only legitimate ARP packets are forwarded, thus protecting the network from potential security breaches. The study concludes that implementing DAI is an important step in securing networks, especially in environments with sensitive data and high security needs. This paper serves as a practical guide for network administrators looking to improve their network security posture using Cisco Packet Tracer.
Systematic Literature Review: Security Gap Detection On Websites Using Owasp Zap Putra, Fauzan Prasetyo Eka; Ubaidi, Ubaidi; Hamzah, Amir; Pramadi, Walid Agel; Nuraini, Alief
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4227

Abstract

This research highlights the detection of security vulnerabilities on websites using OWASP ZAP, a highly regarded open-source web security testing tool. Through a comprehensive literature review approach and systematic research methodology, this research emphasizes the urgency of addressing the ever-evolving security threats in web systems. Web security is a crucial aspect of information technology as more and more sensitive data is transmitted through web applications. OWASP ZAP, recognized for its reliability in identifying various security holes, was used to evaluate its effectiveness and efficiency in detecting vulnerabilities in web applications. This tool assists developers and security researchers in finding and fixing weaknesses that could be exploited by attackers. The results of the study show that OWASP ZAP is not only effective in identifying vulnerabilities such as SQL Injection, XSS (Cross-Site Scripting), and misconfiguration but also provides practical solutions to strengthen overall web security. Additionally, this research identifies several challenges faced when using OWASP ZAP and offers recommendations to address these issues. This study makes a significant contribution towards a better understanding of web security and offers recommendations for the implementation of better security testing tools in web development environments. Consequently, this research encourages the adoption of more proactive and systematic security practices in web application development.
Service Quality Analysis of RFID-Based Smart Door Lock in Front One Azana Style Hotel Area Putra, Fauzan Prasetyo Eka; Ramadhani, Nilam; Fauzan, Fauzan; Mursidi, Moh.
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4292

Abstract

This research evaluates the service quality of an RFID-based smart door lock system in the Front One area of Azana Style Hotel Pamekasan. Employing qualitative analysis techniques, the study assesses the system's reliability, security, convenience, and responsiveness based on user experience and behavioral data. The primary goal is to understand how effectively the smart lock system enhances hotel services and operational efficiency. The findings aim to offer valuable insights to hotel management and the broader hospitality industry regarding the impact of smart technology on guest experience and hotel operations, thus fostering innovation and promoting environmental sustainability. By integrating RFID-based smart door locks with the Internet of Things (IoT), the system enables real-time access control, manages meeting room schedules, facilitates remote security monitoring, and oversees employee access management. This integration not only boosts service quality and operational efficiency but also creates a more connected and intelligent hotel environment. Consequently, the study highlights the potential of smart technology to transform hotel operations, improve guest satisfaction, and contribute to a sustainable future for the hospitality industry. Additionally, the research underscores the importance of continuous technological advancements in maintaining competitive advantage in the rapidly evolving hospitality sector, ensuring that hotels can meet the ever-changing needs and expectations of their guests.
Case Study of Computer Network Development for the Internet Of Things (IoT) Industry in an Urban Environment Rachman, Anang Fakchtur; Putra, Fauzan Prasetyo Eka; Syirofi, Syirofi; Wahid, Durrahman
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4302

Abstract

This research presents a case study of computer network development to support the Internet of Things (IoT) industry in an urban environment. The rapid growth of the IoT industry has created the need for a network infrastructure that can support the connectivity of various smart devices widely and reliably. This research focuses on urban environments that have unique complexities such as high population density, intensive movement, and diverse infrastructure needs. The research methodology involves a detailed analysis of the implementation of computer networks in the context of the IoT industry in urban environments. Data was collected through field observations, interviews with experts, and analysis of relevant project documents. The analysis results show that the development of computer networks in urban environments to support industrial IoT requires scalable network design, efficient bandwidth management, tight security, and adaptation to existing infrastructure. This case study describes various strategies and technologies used in the development of computer networks, including the implementation of 5G-based wireless networks and the monitoring of urban environments using smart sensors. These results highlight the importance of a holistic and sustainable approach when developing computer networks for the IoT industry in urban environments. Ensuring your infrastructure can meet future needs requires collaboration between stakeholders, investment in the right technology, and careful planning. This study makes an important contribution to the optimisation of computer networks that support the growth of the IoT ecosystem in urban environments.
Improving Network Service Quality in parts of Sampang City: QoS Evaluation and User Perception of QoE Putra, Fauzan Prasetyo Eka; Ubaidi, Ubaidi; Aziz, Mohammad; Irfan, Moh.; Alim, Royfal
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4311

Abstract

In an era of rapid urbanization, the quality of network services in urban environments is becoming increasingly important. This article explores efforts to improve network service quality in several sampang cities through an evaluation of Quality of Service (QoS) and user perceptions of Quality of Experience (QoE). The research is based on a survey conducted at various locations in sampang city to collect data on the reliability, speed, and availability of network services. The survey involved a diverse sample of users, covering a wide range of ages, professions, and levels of technology usage. In addition, we also analyzed users' perceptions of service quality based on their experiences of using the network in an urban environment. The results highlighted several key challenges in improving QoS, such as user density, signal interference, and network infrastructure limitations. However, we also found that strategies such as the use of advanced network technologies, such as 5G and beamforming, as well as traffic prioritization based on application type, can help to significantly improve QoS. In addition, we found a strong positive correlation between improved QoS and improved QoE, suggesting that improved quality of service has a direct impact on improving user experience. These findings provide valuable insights for network operators and policy makers in their efforts to improve network services in dense urban environments. The research also recommends further investment in network technologies and the development of policies that support more effective management of network traffic to ensure optimal quality of service.
Co-Authors ., Ubaidi Abd Muiz Syam Abd Rohman Abd Rohman, Abd Abdul Adim Mubarok Abdulloh Rizki Achmad Zulfikri Achmad Zulfikri Agel, Walid Agus Irmawan Ainur Rofiq Hafsi Akbar , Nawawi Muhammad Alfin Firdaus Alief Nuraini Alim, Royfal Amir Hamzah Amir Hamzah Amir Hamzah Anggreni Amba Sugi, Senah Anjarani, Devie Reztia Arifin, Goffal Arifin, Mohammad Nazir Arifin, Mohammad Nazir Asmat Baidawi Aziz, Mohammad Barokah, Selviana Nur Rizqi Dafid, Mohammat Dewi, Nindian Puspa Dimas Arman Maulana Putra Durrohman Wahid Dwi Mayangsari Edo Saputra Efendi, Reynal Widya Efendy, Satrio Ananta Fahmi, Zainol Fauzan Fauzan Fauzan . Firmansyah Kusuma, R. Okky Frediyanto Gelu, Leonard Peter Goffal Arifin Goffal Arifin Hamdlani Hamdlani Harfin Lanya, Harfin Hari, Nirwana Haidar Hasan Basri Hasbullah Hasbullah Hasbullah Hasbullah Hasbullah Holipah Huda, Moh Abroril Iksan Iksya Syariifal Maqom Ilhamsyah, Revi Mario Irfan, Moh. Irwan Darmawan Isma’el, M Jannah, Ukhti Raudhatul Khafifatul Mufidah Khafifatul Mufidah Khairurrozi, Khairurrozi Khana Zulfana Imam Khana Zulfana Imam Kusuma, Okky Firmansyah Kusuma, R. Okky Firmansyah M. Amir Mahmud Mahendra Mahendra Mahendra, Mahendra Mahmud, M. Amir Mansyur, Muhammad Umar Maqom, Iksya Syariifal Maulana, Fairuz Iqbal Miftahus Surur Miftahus Surur Miftahus Surur, Miftahus Moch. Amir Mahmud Moh Abroril Huda Moh Mursidi Moh Nazir Moh Riski Moh Syahdan Moh. Nazir Arifin Mohammad Aziz Mohammad Nazir Arifin Mohammad Syaltut Abduh Javier Mu'minin, Fadilatul Mu'nim, M. Zaini Mubarok, Abdul Adim Mufidah, Khafifatul Muhammad Umar Mansyur Muhammad Umar Mansyur Muim, Zaini Mujibur Rohman, Mujibur Mursidi, Moh Mursidi, Moh. Muslim, Farhan Nailus Saadah Nawawi Muhammad Akbar Nor Hasanah Nuraini, Alief Nurul Fajrin Ariyani Nurul Fajrin Ariyani Paradina, Reni Permana, Putra Pramadi, Walid Agel Rachman, Anang Fakchtur Rachman, Anang Faktchur Ramadhani, Nilam Reni Paradina Retno Sukmawati Revi Mario Ilhamsyah Riyan Riyan Riyanarto Sarno Rizki, Abdulloh Safiuddin Safiuddin Safiuddin, Safiuddin Said, Badar Samsul Arifin Satrio Ananta Efendy Sa’id, Badar Selviana Nur Rizqi Barokah Sholihah, Wildanus Siti Ririn Sutarsih Sofiyullah Sofiyulloh, Sofiyulloh Sutarsih, Siti Ririn Syafi’i, Imam Syam, Abd Muiz Syam, Abd Mu’iz Syam, Abd. Mu’iz Syirofi Syirofi Syirofi, Syirofi Tamam, Alief Badrit Ubaidi Ubaidi, Ubaidi Ulfatul Hasanah Umar Mansyur, Muhammad Wahid, Durrahman Wahid, Durrohman Wicaksono Febriantoro, Wicaksono Yasir Zain Yayu Rahma Febriani Zayyadi, Moh Zulfikri, Achmad