cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
ISSN : 25032259     EISSN : 25032267     DOI : -
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control was published by Universitas Muhammadiyah Malang. journal is open access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the knowledge as the result of studies. KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desire to develop knowledge based on qualified research in any field. Submitted papers are evaluated by anonymous referees by double-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully within 4 - 8 weeks. The research article submitted to this online journal will be peer-reviewed at least 2 (two) reviewers. The accepted research articles will be available online following the journal peer-reviewing process.
Arjuna Subject : -
Articles 11 Documents
Search results for , issue "Vol. 5, No. 2, May 2020" : 11 Documents clear
Classification of Lexile Level Reading Load Using the K-Means Clustering and Random Forest Method Rosyid, Harits Ar; Pujianto, Utomo; Yudhistira, Moch Rajendra
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v5i2.897

Abstract

There are various ways to improve the quality of someone's education, one of them is reading. By reading, insight and knowledge of various kinds of things can increase. But, the ability and someone's understanding of reading is different. This can be a problem for readers if the reading material exceeds his comprehension ability. Therefore, it is necessary to determine the load of reading material using Lexile Levels. Lexile Levels are a value that gives a size the complexity of reading material and someone's reading ability. Thus, the reading material will be classified based a value on the Lexile Levels. Lexile Levels will cluster the reading material into 2 clusters which is easy, and difficult. The clustering process will use the k-means method. After the clustering process, reading material will be classified using the reading load Random Forest method. The k-means method was chosen because of the method has a simple computing process and fast also. Random Forest algorithm is a method that can build decision tree and it’s able to build several decision trees then choose the best tree. The results of this experiment indicate that the experiment scenario uses 2 cluster and SMOTE and GIFS preprocessing are carried out shows good results with an accuracy of 76.03%, precision of 81.85% and recall of 76.05%.
Development and Optimization of NoSQL Database in Food Insecurity Early Warning System Based on Local Community Participation Yani Nurhadryani; Wiradani Ramadhan; Auzi Asfarian
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v5i2.1048

Abstract

As a part of the food insecurity early warning system based on local participation, a robust and scalable database service is required. This necessity caused by the large area of services which include 34 provinces, 416 districts, 7,215 sub-districts and 80,534 villages in Indonesia. The abundant number of the expected daily transaction might not be handled properly using the traditional model. In this research, we design, implement, and optimize the NoSQL database to create scalable, dynamic, and flexible database service for the early warning system. The cohesion of the model is then measured, resulting in 5 entities with high cohesion, 16 with moderate cohesion, and 3 with low cohesion. After refactoring, we reduced the number of the low-cohesion entity into one and increased the average cohesion from 0.62 to 0.67. An empirical experiment was conducted to compare the response time before and after the refactoring. As the results, the average response time is decreased from 11.0 ms to 7.99 ms or equal to 1.38 in speedup. The experiment results suggest there is an impact of the logical data model improvement, by increasing their cohesion, to the performance of the NoSQL database.
Live Forensics Method for Acquisition on the Solid State Drive (SSD) NVMe TRIM Function Wisnu Pranoto; Imam RIadi; Yudi Prayudi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v5i2.1032

Abstract

SSD currently has a new storage media technology namely Solid State Drive Non-volatile Memory Express (SSD NVMe). In addition, SSD has a feature called TRIM. The TRIM feature allows the operating system to tell SSDs which blocks are not used. TRIM removes blocks that have been marked for removal by the operating system. However, the TRIM function has a negative effect for the digital forensics specifically related to data recovery. This study aimed to compare the TRIM disable and enable functions to determine the ability of forensics tools and recovery tools to restore digital evidence on the NVMe SSD TRIM function. The operating system used in this study was Windows 10 professional with NTFS file system. Typically, acquisition is conducted by using traditional or static techniques. Therefore, there was a need of a technique to acquire SSD by using the live forensics method without shutting down the running operating system. The live forensics method was applied to acquire SSD NVMe directly to the TRIM disable and enable functions. The tools used for live acquisition and recovery were FTK Imager Portable. The inspection and analysis phases used Sleutkit Autopsy and Belkasoft Evidence Center. This research found that in the recovery process of TRIM disabled and enabled, TRIM disabled could find evidence while maintaining the integrity of evidence. It was indicated by the same hash value of the original file and the recovery file. Conversely, when TRIM is enabled, the files were damaged and could not be recovered. The files were also not identical to the original so the integrity of evidence was not guaranteed.
Soybean Disease Detection with Feature Selection Using Stepwise Regression Algorithm: LVQ vs LVQ2 Muhamad, Nida; Endah, Sukmawati Nur; Sarwoko, Eko Adi; Sasongko, Priyo Sidik
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (518.977 KB) | DOI: 10.22219/kinetik.v5i2.919

Abstract

ndonesia's soybean needs increase from year to year. But according to data from the Badan Pusat Statistik (BPS) the amount of national soybean productivity is still low, so the fulfillment of soybean needs is done by importing soybeans from several countries such as China, Ukraine, Canada, Malaysia, and the United States. Low soybean productivity is caused by several factors. One of the causes is disease. This study aims to create a soybean disease detection by applying Learning Vector Quantization 2 (LVQ2) neural network algorithm(ANN) and Stepwise Regression Algorithm attribute selection. The attribute variables used consisted of 35 symptoms of the disease in soybean crop data. The data used in this study is a soybean dataset taken from University of California Irvine Machine Learning Repository as much as 200 data. The distribution of training data and test data is done by the k-fold cross validation method with a value of k = 10. The result of the study shows that the best paramater use in lVQ2. The results showed that the best parameters in LVQ2 is learning rate (α) value of 0.3; epsilon 0.04; and maximum epoch 100. While the best attribute selection uses the parameter p to enter and p to remove of  0.15 which produces 17 selected attributes such as date, plant stand, precipitation, leaves, leaf spot halo, leaf spot margins, leafspot size, leaf mildew, stem canker, stem fungi, external decay, fruit pods, fruit spots, seeds, mold growth, seed discolor, roots. The best results in this study resulted in an accuracy of 90.5%, 9.5% error rate, 90.5% sensitivity, and 98.94% specificity
Image Retrieval Based on Texton Frequency-Inverse Image Frequency Azhar, Yufis; Minarno, Agus Eko; Munarko, Yuda; Ibrahim, Zaidah
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (550.257 KB) | DOI: 10.22219/kinetik.v5i2.1026

Abstract

In image retrieval, the user hopes to find the desired image by entering another image as a query. In this paper, the approach used to find similarities between images is feature weighting, where between one feature with another feature has a different weight. Likewise, the same features in different images may have different weights. This approach is similar to the term weighting model that usually implemented in document retrieval, where the system will search for keywords from each document and then give different weights to each keyword. In this research, the method of weighting the TF-IIF (Texton Frequency-Inverse Image Frequency) method proposed, this method will extract critical features in an image based on the frequency of the appearance of texton in an image, and the appearance of the texton in another image. That is, the more often a texton appears in an image, and the less texton appears in another image, the higher the weight. The results obtained indicate that the proposed method can increase the value of precision by 7% compared to the previous method.
The Calorie Burning Calculation System in Jogging Using a Thresholding-Based Accelerometer Sensor Okmayura, Finanta; Jefiza, Adlian; Ramadhani, Witri
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v5i2.1005

Abstract

Jogging has benefits for burning calories as well as for losing the weight of the body. However, the reality that often happens is that sportsmen overwork their body in exercising so that it has passed its normal threshold. This causes over or lower calorie burning in these athletes. To overcome these problems, we need a device that can later monitor calorie burning. This device is created on an Android-based platform using an accelerometer sensor. Using this sensor, the system can count the number of a person’s steps previously obtained through the threshold value as the threshold value to determine the steps. Calculation of calorie burning uses a formula that involves the number of footsteps, time, and weight of the user. This application testing involved 15 participants by comparing the calorie burning results through the application and manual calculation, so that the overall error percentage of 0.60% was obtained, so it can be concluded that 99.40% of the calorie burning calculation system in jogging using a thresholding-based accelerometer sensor is appropriate for athletes to provide information of their calories burning in jogging.
The impact of Nodes Distance on Wireless Energy Transfer System Risma, Pola; Dewi, Tresna; Oktarina, Yurni
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (640.412 KB) | DOI: 10.22219/kinetik.v5i2.1051

Abstract

Wireless energy transfer (WET) reemerges as the method for transmitting electric power without the necessity to deal with cable losses and an aesthetically pleasing environment. The problem with WET is how to maintain magnetic induction as the distance gets further. This paper investigates the impact of nodes distance on the WET system. The experimental results show that the most effective distance among transmitter, nodes, and receiver are 4 cm. The measurement is taken with and without load. The without load application give that for node 1; the results are 6 V, 110 mA, and 2.85 mT for voltage, current, and magnetic flux, respectively. At the application of 2 nodes, the voltage is 6.8 V, the current is 0.124 mA, and the magnetic flux is 3.83 mT, and at three nodes installation, it is 7 V, 134 mA, and 3.83 mT. During the application of 3-Watt and 5-Watt lamp, at 4 cm distance, the power received is 1.66 W and 3.66 W at 3-Watt and 5-Watt lamp for one node, 1.84 W, and 3.84 for two nodes, and 1.93 W and 3.93 for three nodes. The experimental results show that the transmitted signal can be prolonged by installing nodes. Even though this study shows that 4 cm is the most effective, it is possible to increase up to 20 cm to power a 3-Watt lamp and 5-Watt lamp.
Detection of Metasploit Attacks Using RAM Forensic on Proprietary Operating Systems Prakoso, Danar Cahyo; Riadi, Imam; Prayudi, Yudi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (288.564 KB) | DOI: 10.22219/kinetik.v5i2.1037

Abstract

Information technology has become an essential thing in the digital era as it is today. With the support of computer networks, information technology is used as a medium for exchanging data and information. Much information is confidential. Therefore, security is also essential. Metasploit is one of the frameworks commonly used by penetration testers to audit or test the security of a computer system legally, but it does not rule out the possibility that Metasploit can also be used for crime. For this reason, it is necessary to carry out a digital forensic process to uncover these crimes. In this study, a simulation of attacks on Windows 10 will be carried out with Metasploit. Then the digital forensics process uses live forensics techniques on computer RAM, where the computer RAM contains information about the processes running on the computer. The live forensic technique is important because information on RAM will be lost if the computer is off. This research will use FTK Imager, Dumpit, and Magnet RAM Capture as the RAM acquisition tool and Volatility as the analysis tool. The results of the research have successfully shown that the live forensics technique in RAM is able to obtain digital evidence in the form of an attacker's IP, evidence of exploits/Trojans, processes running on RAM, operating system profiles used and the location of the exploits/Trojan when executed by the victim.
Time Optimization for Radius Updates in Zone Dynamics of Zone Routing Protocol Muhsin Bayu Aji Fadhillah; Radityo Anggoro
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (748.307 KB) | DOI: 10.22219/kinetik.v5i2.1064

Abstract

Vehicular ad hoc networks are wireless network technologies that can be used to communicate without the need for fixed infrastructure. The use of zone routing protocol which is a hybrid routing protocol in a vehicular ad hoc network environment can reduce delay, packet flooding, and excess bandwidth usage on the network. However, traditional zone routing protocol is only configured for one fixed radius value, which makes it not adapt to existing network conditions. Zone dynamics with adaptive radius values in zone routing protocol are used so that zones formed by nodes are more optimal. In adapting the radius value to make the zone dynamics necessary, the optimal configuration of the radius update time is required. Simulations and tests that have been carried out with NS-2 show that the proper update time can improve zone routing protocol performance with a low end-to-end delay and routing overhead value, but has a high packet delivery ratio.
Experimental Study on The Effect of Arches Setting on Semi-Flexible Monocrystalline Solar Panels Arissetyadhi, Iwan; Dewi, Tresna; Kusumanto, RD
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1517.728 KB) | DOI: 10.22219/kinetik.v5i2.1055

Abstract

Indonesia has a high potential for renewable energy, especially solar power, due to its location in the equator and blessed with an abundance of sunlight. However, the energy potential from the sun is not maximally utilized. One of the efforts to increase the generated electricity and efficiency is by applied the panels in arches setting. This setting is made possible by the availability of the semi-flexible monocrystalline solar panel. This paper investigates the increment of harvested power and efficiency by arranging the solar panel in concave, convex, and plane settings. The data were taken in August 2019, where Palembang experiences the dry season and January 2020 during the rainy season. The highest power produced (20.27 Watt) and efficiency (13.14%) were achieved in a concave setting during the dry season. The convex setting produced more power and efficiency (13.26 Watt and 9.30%) compared to the plane setting (10.24 Watt and 9.71%). These results show that arches setting are more efficient to harvest solar power and give more extensive applications such as to power a dynamics mobile robot applied in agriculture.

Page 1 of 2 | Total Record : 11