cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
ISSN : 25032259     EISSN : 25032267     DOI : -
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control was published by Universitas Muhammadiyah Malang. journal is open access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the knowledge as the result of studies. KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desire to develop knowledge based on qualified research in any field. Submitted papers are evaluated by anonymous referees by double-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully within 4 - 8 weeks. The research article submitted to this online journal will be peer-reviewed at least 2 (two) reviewers. The accepted research articles will be available online following the journal peer-reviewing process.
Arjuna Subject : -
Articles 15 Documents
Search results for , issue "Vol. 10, No. 3, August 2025" : 15 Documents clear
Collaborative Filtering Modification Technology for Recommendation Systems in Smart Digital Agribusiness Marketplace Arif Prabowo, Setya Budi; Subiyanto; Azis Salim, Nur
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2264

Abstract

The rapid transformation in the agribusiness sector, driven by globalization and digitalization, necessitates the adoption of intelligent systems to enhance performance, market accessibility, and decision-making processes. Despite the growing use of personalized recommender systems in e-commerce, geographical context remains insufficiently integrated into recommendation processes. This lack of geolocation awareness diminishes recommendation relevance and accuracy by overlooking geographical factors that influence user preferences. To address this limitation, this work aims to enhance the performance of recommendation systems in agricultural e-commerce by incorporating geolocation context through the integration of the Geo-Mod Neuro Collaborative Filtering (GMNCF) model into an Android-based application for agricultural products. The GMNCF model improves collaborative filtering by incorporating geographical region data to capture spatial user preferences and reduce data sparsity. Using Graph Neural Networks (GNNs), the model captures complex relationships among users, items, and geographic regions to generate more accurate recommendations. Experimental results reveal that GMNCF consistently delivers substantial performance improvements over baseline models such as NGCF, GC-MC, ASMG, and GCZRec. Compared to the strongest baselines, GMNCF demonstrates relative gains of approximately 4.9% in Precision, 5.9% in Recall, 5.6% in F1-Score, and 5.7% in Hit Rate. These improvements underscore the model’s effectiveness in capturing spatially influenced user preferences and strengthening the relevance of recommendations in the agribusiness e-commerce system. Furthermore, user testing with diverse respondents indicates high levels of satisfaction, particularly regarding location-based recommendation features and accessibility. These findings highlight the effectiveness of incorporating geographical region data into recommendation systems, which is particularly beneficial for geographically fragmented agribusiness markets.
Improved Chaotic Image Encryption on Grayscale Colorspace Using Elliptic Curves and 3D Lorenz System Sinaga, Daurat; Jatmoko, Cahaya; Astuti, Erna Zuni; Rachmawanto, Eko Hari; Abdussalam, Abdussalam; Pramudya, Elkaf Rahmawan; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Doheir, Mohamed
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2251

Abstract

Digital data, especially visual content, faces significant security challenges due to its susceptibility to eavesdropping, manipulation, and theft in the modern digital landscape. One effective solution to address these issues is the use of encryption techniques, such as image encryption algorithms, that ensure the confidentiality, integrity, and authenticity of digital visual content. This study addresses these concerns by introducing an advanced image encryption method that combines Elliptic Curve Cryptography (ECC) with the 3D Lorenz chaotic system to enhance both security and efficiency. The method employs pixel permutation, ECC-based encryption, and diffusion using pseudo-random numbers generated by the Lorenz 3D system. The results show superior performance, with an MSE of 3032 and a PSNR of 8.87 dB, as well as UACI and NPCR values of 33.34% and 99.64%, respectively, indicating strong resilience to pixel intensity changes. During testing, the approach demonstrated robustness, allowing only the correct key to decrypt images accurately, while incorrect or modified keys led to distorted outputs, ensuring encryption reliability. Future work could explore extending the method to color images, optimizing processing for larger datasets, and incorporating additional chaotic systems to further fortify encryption strength.
Optimized Visualization of Digital Image Steganography using Least Significant Bits and AES for Secret Key Encryption Jatmoko, Cahaya; Sinaga, Daurat; Lestiawan, Heru; Astuti, Erna Zuni; Sari, Christy Atika; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Yaacob, Noorayisahbe Mohd
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2252

Abstract

Data hiding is a technique used to embed secret information into a cover medium, such as an image, audio, or video, with minimal distortion, ensuring that the hidden data remains imperceptible to an observer. The key challenge lies in embedding secret information securely while maintaining the original quality of the host medium. In image-based data hiding, this often means ensuring the hidden data cannot be easily detected or extracted while still preserving the visual integrity of the host image. To overcome this, we propose a combination of AES (Advanced Encryption Standard) encryption and Least Significant Bit (LSB) steganography. AES encryption is used to protect the secret images, while the LSB technique is applied to embed the encrypted images into the host images, ensuring secure data transfer. The dataset includes grayscale 256x256 images, specifically "aerial.jpg," "airplane.jpg," and "boat.jpg" as host images, and "Secret1," "Secret2," and "Secret3" as the encrypted secret images. Evaluation metrics such as Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Unified Average Changing Intensity (UACI), and Number of Pixels Changed Rate (NPCR) were used to assess both the image quality and security of the stego images. The results showed low MSE (0.0012 to 0.0013), high PSNR (58 dB), and consistent UACI and NPCR values, confirming both the preservation of image quality and the effectiveness of encryption for securing the secret data.
Efficient Thoracic Abnormalities Detection Using Mobile Deep Learning Models Bauravindah, Achmad; Fudholi, Dhomas Hatta; Wahyuningrum, Rima Tri
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2268

Abstract

Indonesia faces a critical shortage of radiologists, with only 1.2 radiologists per 100,000 individuals. This shortage leads to delays in diagnosing thoracic abnormalities such as pneumothorax, cardiomegaly, nodule/mass, consolidation, and infiltration. Chest X-ray (CXR) interpretation remains challenging due to overlapping radiological features, necessitating AI-assisted solutions. This study evaluates three lightweight deep learning models—MobileNetV2, ShuffleNetV2, and EfficientNetB0—for automated thoracic abnormality detection using the ChestX-ray8 dataset. We assessed model performance using accuracy, precision, recall, F1-score, and AUC-ROC, selecting the best model based on the highest per-fold F1-score. EfficientNetB0 emerged as the top-performing model, achieving a macro-average F1-score of 0.556 and AUC-ROC of 0.765, outperforming MobileNetV2 (0.494, 0.719) and ShuffleNetV2 (0.481, 0.713). Grad-CAM analysis revealed strong localization for pneumothorax and consolidation but misclassifications in cardiomegaly and nodule/mass detection due to poor feature differentiation. The findings highlight EfficientNetB0’s potential as an AI-assisted diagnostic tool for low-resource settings while also underscoring the need for segmentation-based pretraining and multi-scale feature extraction to enhance detection accuracy. Future work should focus on optimizing sensitivity to subtle abnormalities and ensuring clinical trust through improved interpretability techniques.
Exploiting Vulnerabilities of Machine Learning Models on Medical Text via Generative Adversarial Attacks Akmal Shahib, Maulana; Basuki, Setio; Aulia Arif, Wardhana
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2280

Abstract

Significant developments in artificial intelligence (AI) technology have fueled its adoption across a range of fields. The use of AI, particularly machine learning (ML), has expanded significantly in the medical field due to its high diagnostic precision. However, the AI model faces a serious challenge to handle the adversarial attacks. These attacks use perturbed data (modified data), which is unnoticeable to humans but can significantly alter prediction results. This paper uses a medical text dataset containing descriptions of patients with lung diseases classified into eight categories. This paper aims to implement the TextFooler technique to deceive predictive models on medical text against adversarial attacks. The experiment reveals that three ML models developed using popular approaches, i.e., transformer-based model based on Bidirectional Encoder Representations from Transformers (BERT), Stack Classifier that combines three traditional machine learning models, and individual traditional algorithms achieved the same classification accuracy of 99.98%.  The experiment reveals that BERT is the weakest model, with an attack success rate of 76.8%, followed by traditional machine learning methods and the stack classifier, with success rates of 28.73% and 5.21%, respectively. This implies that although BERT classification demonstrates good performance, it is highly vulnerable to adversarial attacks. Therefore, there is an urgency to develop predictive models that are robust and secure against potential attacks.

Page 2 of 2 | Total Record : 15