cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
ISSN : 25032259     EISSN : 25032267     DOI : -
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control was published by Universitas Muhammadiyah Malang. journal is open access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the knowledge as the result of studies. KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desire to develop knowledge based on qualified research in any field. Submitted papers are evaluated by anonymous referees by double-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully within 4 - 8 weeks. The research article submitted to this online journal will be peer-reviewed at least 2 (two) reviewers. The accepted research articles will be available online following the journal peer-reviewing process.
Arjuna Subject : -
Articles 11 Documents
Search results for , issue "Vol 4, No 3, August 2019" : 11 Documents clear
Egg Quality Detection System Using Fuzzy Logic Method Ikbar Mahesa; Aji Gautama Putrada; Maman Abdurohman
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (472.627 KB) | DOI: 10.22219/kinetik.v4i3.839

Abstract

Determining the quality of eggs in general is used by placing eggs on a flashlight. The detection system is very necessary to determine good egg quality or rotten eggs, so that the conditions of the eggs can be known by the chicken farm company and then will be sold to the community. This egg detecting system utilizes several sensor devices that are combined. The sensor used to detect the quality of eggs is a light sensor and a heavy sensor by connected with a microcontroller. So that there is no ambiguity towards the decision making of good egg or rotten eggs, then processing the data is obtained from these sensors using Fuzzy Logic and Firebase methods in real time as data storage media, and actuators will distribute or separate good eggs or the rotten eggs one. With the development of technology now, we can use the Internet of Things (IoT) technology, one of the systems check the quality of eggs which are good or not good. This system is built using a microcontroller to coordinate the running of the system using the Fuzzy Logic Method that applies inside. Final information is obtained on the form of egg quality in real time. The test results were carried out using the Fuzzy Logic method and obtained 95% results from 20 eggs and had 1 wrong egg. When using system hardware without using the fuzzy logic method on the microcontroller that using only a light sensor and a heavy sensor it produces a result of 75% from 20 eggs and had 5 wrong eggs. Using the egg detection optimization method can be increased up to 20%.
Implementing Flash Event Discrimination in IP Traceback using Shark Smell Optimisation Algorithm Omoniyi Wale Salami; Imeh Jarlath Umoh; Emmanuel Adewale Adedokun; Muhammed Bashir Muazu
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (565.817 KB) | DOI: 10.22219/kinetik.v4i3.740

Abstract

 Denial of service attack and its variants are the largest ravaging network problems. They are used to cause damage to network by disrupting its services in order to harm a business or organization. Flash event is a network phenomenon that causes surge in normal network flow due to sudden increase in number of network users, To curtail the menace of the Denial of service attack it is pertinent to expose the perpetrator and take appropriate action against it. Internet protocol traceback is a network forensic tool that is used to identify source of an Internet protocol packet. Most of presently available Internet protocol traceback tools that are based on bio-inspired algorithm employ flow-based search method for tracing source of a Denial of service attack without facility to differentiate flash event from the attack. Surge in network due to flash event can mislead such a traceback tool that uses flow-based search. This work present a solution that uses hop-by-hop search with an incorporated discrimination policy implemented by shark smell optimization algorithm to differentiate the attack traffic from other traffics. It was tested on performance and convergence against an existing bio-inspired traceback tool that uses flow-base method and yielded outstanding results in all the tests
Adaptive Contents Distribution Based on Traffic Congestion on Digital Signage System Alifudin, Ridhwan; Rakhmatsyah, Andrian; Yasirandi, Rahmat
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (266.289 KB) | DOI: 10.22219/kinetik.v4i3.810

Abstract

Current technological developments have been very rapid. One of them is the many choices of technology and media to deliver information to the public. Digital Signage is one of the most popular information delivery systems today, displays on digital or electronic media, and it can convey new details. The information usually showed in the form of advertising content in the format of images or videos. Ad content displayed is static, meaning that the ad content will be display in the order specified. This system usually placed next to a broad road. A place that is considered to have a broad audience and requires a significant amount of money to display ad content. However, this causes ad content owners who do not have enough costs not to be able to show the ad content in a particular place. Therefore, this research makes the content management system adaptive to road congestion situations which represented as audience quantities so that the costs can be adjusted. Data is obtained from the Google Maps API and analyzed the traffic congestion by conducting experiments. The compatibility between density and content after testing the results in 100% accuracy.
A High Result in Wavelet Watermarking Using Singular Value Decomposition Wellia Shinta Sari; Christy Atika Sari
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (531.558 KB) | DOI: 10.22219/kinetik.v4i3.729

Abstract

Internet that has developed into a good distribution tool for digital data, causing a large increase in digital data sharing, especially in the form of digital images, and causing problems that need attention. One of them is about copyright protection. Watermarking is one technique that aims to protect digital image copyright. In this study, watermarking was carried out using the Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) algorithms in digital images with different file extensions. Transformation of 2 levels of DWT and SVD on the host image and SVD transformation on the watermarked image that inserted in the LL2 sub-band of the host image. Watermarking with the proposed method produces good image quality with PSNR values exceeding 40 dB, SSIM reaching 0.99 and NCC reaching 1. This shows a robust and imperceptible watermarking image.
Energy Consumption Between Routing and Bridging Protocol for Eco-Friendly Wireless Networks Rinanza Zulmy Alhamri; Toga Aldila Cinderatama; Agustono Heriadi; Andika Kurnia Adi Pradana
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (369.695 KB) | DOI: 10.22219/kinetik.v4i3.800

Abstract

The implementation of eco-friendly technology has been become an interesting field for sustainability. No exception with the implementation of wireless technology that used for developing networks infrastructure, it is necessary for saving the usage of energy. As a data forwarding protocol in a computer network, commonly there are two protocols that used for, which are routing and bridging protocol. Technically routing protocol has been confirmed that it is more effective and efficient than bridging protocol. However bridging protocol still becomes the popular protocol for data forwarding because it is easy to use. This research tried to test the energy consumption of the wireless network device that implementing between routing or bridging protocol. The wireless network device that used for this research was MikroTik router RB 433Ah. The data forwarding protocol that was tested consists of bridging, static routing, and RIP routing. Data traffic scenario that used for this research consisted of two scenarios which were HTML data access with packet size 256B and video streaming data access with packet size 1518B. Measuring the energy consumption referred to three parameters which were power consumption, CPU usage, and processor temperature. The result showed that for HTML data access scenario, the RIP routing protocol become the lowest energy consumption with power consumption reached 7.460 W, CPU usage 4.6 %, and processor temperature 38.133^C. While for video streaming scenario, generally the RIP routing protocol still become the lowest energy consumption with power consumption reached 7.567 W, CPU usage 7.33 %, and processor temperature 36.727^C.
A Monitoring System of Ankle Rehabilitation For Paralyzed Patients Using Android Aplication Hanum Arrosida; Asih Setiarini; Basuki Winarno; Albert Sudaryanto
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v4i3.674

Abstract

A Monitoring system of ankle rehabilitation for paralyzed patients was successfully designed. The monitoring application on Android smartphone was made app inventor. This application uses bluetooth HC-05 as a data transmission between the ankle therapy aids and smartphone Android. A MPX5050DP sensor is used to determine the muscle condition of the paraplegic to measure the muscle strength scale and control the motor dc speed of ankle rehabilitation hardware. The virtual keys on the application are five instructions of therapeutic movement such as, dorsiflexion (200), plantarflection (450), eversion (100), inversion (100) and patterned of movement. The access time to operate the ankle rehabilitation hardware is 0.8 seconds. This application includes an alarm and a database that can be used as a monitoring system. An alarm menu serves as a reminder for patients to take therapy and database to store data readings of sensors that converted into scale and muscle pressure. A MPX55050DP sensor output is displayed on smartphone application, stored in database and the therapy results are reserved to document format. The capacity of the database corresponds to the memory on the smartphone. Based on the measurement results, the ankle therapy application on android smartphone can control the system movement of ankle therapy aids and as a monitoring system of therapy results for paralyzed patients and make easily in analyzing the condition of leg muscle strength.
Pattern Recognition Bird Sounds Based on Their Type Using Discreate Cosine Transform (DCT) and Gaussian Methods Hendro Nugroho; Wahyu Widodo; Andy Rachman
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v4i3.791

Abstract

To know the type of bird, most people know from the shape of bird species and the sound of birds. In this study, it identified the pattern of bird sounds. The bird sounds studied were Canary Trills, Vulture and Crow birds. In the introduction of the type of bird sound pattern in this study using the Discrete Cosine Transform (DCT) method and Gaussian value. The researcher conducted several steps to get the sound model of birds, among others, namely (1) bird sound input in the form of WAV file, (2) Hamming Windowing, (3) DFT / FFT, (4) Mel Bank Filter, (5) DCT, and (6) Value Gaussian. The output obtained is in the form of vector values and represented in graphical form. The results obtained in the study of pattern recognition of bird sound types get the results of observations in the same bird sound duration and frequency of the same, then the same pattern is obtained in the same bird as evidenced by calculating the closest distance value with Bray Curtis method. For the same duration of time and the length of the frequency that is not the same; it found that the pattern of bird sounds is not the same.
Front and Back Matter V4i3 Adhitya Dio Waskito
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1630.546 KB) | DOI: 10.22219/kinetik.v4i3.972

Abstract

A Combination of Hill CIPHER-LSB in RGB Image Encryption Megantara, Rama Aria; Rafrastara, Fauzi Adi; Mahendra, Syafrie Naufal
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1401.076 KB) | DOI: 10.22219/kinetik.v4i3.785

Abstract

The progress of the development of digital technology today, many people communicate by sending and receiving messages. However, along with extensive technological developments, many crimes were committed. In avoiding these crimes, data security needs to be done. Form of data security in the form of cryptography and steganography. One of the cryptographic techniques is the hill cipher algorithm. Hill ciphers include classic cryptographic algorithms that are very difficult to solve. While the most popular steganography technique is Least Significant Bit (LSB). Least Significant Bit (LSB) is a spatial domain steganography technique using substitution methods. This study discusses the merging of message security with hill cipher and LSB. The message used is 24-bit color image for steganography and text with 32, 64 and 128 characters for cryptography. The measuring instruments used in this study are MSE, PSNR, Entropy and travel time (CPU time). Test results prove an increase in security without too damaging the image. This is evidenced by the results of the MSE trial which has a value far below the value 1, the PSNR is> 64 db, the entropy value ranges from 5 to 7 and the results of travel time <1 second.
Internet of Things Platform for Manage Multiple Message Queuing Telemetry Transport Broker Server Wardana, Aulia Arif; Rakhmatsyah, Andrian; Minarno, Agus Eko; Anbiya, Dhika Rizki
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (817.353 KB) | DOI: 10.22219/kinetik.v4i3.841

Abstract

This study proposed the Internet of Things (IoT) monitoring platform model to manage multiple Message Queuing Telemetry Transport (MQTT) broker server. The Broker is a part of the MQTT protocol system to deliver the message from publisher to subscriber. The single MQTT protocol that setup in a server just have one broker system. However, many users used more than one broker to develop their system. One of the problems with the user that use more than one MQTT broker to develop their system is no recording system that helps users to record configurations from multi brokers and connected devices. This can cause to slow the deployment process of the device because the configuration of the device and broker not properly managed. The platform built is expected to solve the problem. This proposed platform can manage multiple MQTT broker server and device configuration from different product or vendor. The platform also can manage the topic that connects to a registered broker on the platform. The other advantages of this platform are open source and can modify to a specific business process. After usability testing and response time testing, the proposed platform can manage multiple MQTT broker server, functional to use, and an average of response time from the platform page is not more than 10 seconds.

Page 1 of 2 | Total Record : 11