cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
ISSN : 25032259     EISSN : 25032267     DOI : -
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control was published by Universitas Muhammadiyah Malang. journal is open access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the knowledge as the result of studies. KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desire to develop knowledge based on qualified research in any field. Submitted papers are evaluated by anonymous referees by double-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully within 4 - 8 weeks. The research article submitted to this online journal will be peer-reviewed at least 2 (two) reviewers. The accepted research articles will be available online following the journal peer-reviewing process.
Arjuna Subject : -
Articles 10 Documents
Search results for , issue "Vol. 8, No. 4, November 2023" : 10 Documents clear
Improving Fuel Consumption Efficiency of Synchronous Diesel Generator Operated at Adjustable Speed using Adaptive Inertia Weight Particle Swarm Optimization Algorithm Muhtadi, M Zaky Zaim; Suryoatmojo, Heri; Soedibyo; Ashari, Mochamad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1756

Abstract

Diesel generator is a reliable source of electricity, but it requires quite high operational costs, especially for fuel. This paper describes a technique for reducing fuel consumption in Diesel Engine Synchronous Generator systems. The system is originally a Constant Speed Diesel Synchronous Generator (CSD-SG), but during certain conditions, the speed is reduced to minimize fuel consumption by adjusting the Specific Fuel Consumption (SFC) map. SFC is defined as the amount of fuel consumed by a diesel engine generator for each unit of power output. It shows various numbers depending on the speed and operating power. In this paper, we use the Adaptive Inertia Weight Particle Swarm Optimization (AIWPSO) algorithm to select of the proper SFC curve at a certain speed and operating power. AIWPSO employs an adaptive inertial weight adjustment method, which enables this algorithm to achieve faster convergence than conventional Particle Swarm Optimisation (PSO) algorithms. The system is embedded with AC/DC/AC power electronics converter to regulate the frequency. Data set of 1000 kVA Cummins diesel engine generator from the oil and gas company in Central Java, Indonesia was taken for simulations. The results show that the AIWPSO algorithm calculates the fuel consumption as 1,678 liters per day on a typical condition, whereas in the previous method, the linear line needs 1,693 liters per day. Therefore, using AIWPSO method can save up to 450 liters of fuel per month. The simulation results show that the proposed method can improve fuel efficiency compared to the previous model.
Testing Data Security Using a Vigenere Cipher Based on the QR Code Rachmawanto, Eko Hari; Gumelar, Rizky Syah; Nabila, Qotrunnada; Sari, Christy Atika; Ali, Rabei Raad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1734

Abstract

Data, especially personal data, is sensitive and if misused, it can become a source of threats and crimes for ourselves or for others. Therefore, data security is very important. Cryptography is a way to secure data that aims to safeguard the information that contained in data, so the information contained is not known by unauthorized parties. Vigenere Cipher is a cryptographic method used to hide data with steganography. In the process, the Vigenere cipher converts information called plain text into ciphertext or text that has been steganographed. In this research, process of encryption was carried out on the text based on the given key. The results of the text encryption were stored in the form of a QR-Code which can later be decrypted from the QR-Code using the key, so that the text contained in the QR-Code can be identified.
Harmonic Reduction Using THIPWM Switching Technique with Type-2 Fuzzy on 3-Phase Motor Murdianto, Farid Dwi; Wahdjono, Endro; Ramadani, Fahri
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1759

Abstract

The development of the increasingly advanced industrial world has increased the need and use of electric motors for various purposes. In the industrial world, many electric motors are found as a driving device to drive various equipment needed, including a three-phase induction motor. The induction motor is expected to operate normally by the desired working characteristics. But it is undeniable that in its use, there are disturbances that can cause damage to the work system of the Induction motor, one of which is harmonic interference. The influence of harmonics on the induction motor causes copper and core losses which will reduce the efficiency motor and cause harmonic torque along with fundamental torque to produce vibration and noise, which considerably affect the operation three-phase induction motor. In this study, a 3-phase inverter was used with the Third Harmonic Injection pulse width modulation (THIPWM) method, with the use THIPWM Switching Method expected to increase the output voltage three-phase inverter and reduce the harmonics caused by the three-phase induction motor. In optimizing a 3-phase induction motor's speed regulation, scalar control or voltage/frequency (v/f) regulation is used. With the use THIPWM switching on this three-phase inverter, it is evident from simulation results that the harmonic value of THDV is 55.62%. THDI is 19.04%, as well the acceleration 3-phase induction motor with a rise time value of 48.547ms with steady-state error of 0.08% at set point 1200 rpm and with rise time value of 52.938ms with steady-state error 0% at set point 1000 rpm.
Enhancing Accuracy on Chronic-Kidney Disease Detection Using Machine Learning with Technique of Resampling and Missing Value Treatment Wibowo, Muhammad Raihan; Palupi, Irma
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1761

Abstract

Chronic kidney disease is one of the deadliest diseases in the world. It is important to identify chronic kidney disease at an early stage, so that treatment and prevention can be carried out early. This study used linear interpolation method to treat the missing values, resampling using SMOTE method, and several feature selection methods, such as Pearson’s correlation coefficient and Principal component analysis. For the classification methods, Support Vector Machine and Logistic Regression were used to build prediction models for chronic kidney disease based on dataset on UCI Machine Learning. To measure the performance of the model, several test scenarios were tested out so it can be compared to the previous research on the detection of chronic kidney disease, which is used as a benchmark for this study. The best result from the experiment is obtained from the scenario of resampling using SMOTE and feature selection using Principal Component Analysis with averaged accuracy, precision, and f1-score respectively are 98,8%, 100%, dan 98,77%.
PID Controller Implementation on Animal Experimental Treadmill for Heart Medicine Purpose Melinda, Melinda; Ridwan, Muhammad; Nurbadriani, Cut Nanda; Yunidar, Yunidar
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1762

Abstract

Experimental animals such as rats are often used for medical research and therapy, such as cardiologists who use a special treadmill to measure the heart health of rats by training walking or running in order to determine the appropriate dose for individuals before being applied to their patients. This research designed a system that is operated by the speed of a DC motor. To control the system, it is proposed to implement a Proportional Integral Derivative (PID) control that is able to stabilize the rotation of the DC motor based on the BPM value recorded by the encoder sensor. The value is used as feedback to the PID control, so that it can control the speed of the DC motor and work optimally and stably under load or no load. Adding a limit switch as a fatigue zone to determine the final duration. This system was tested on several objects, namely 4-month-old rats with a mass of 211 grams, 224 grams, 230 grams, and 240 grams and 2-month-old rats with a mass of 24 grams, 27 grams, 28 grams, and 30 grams. The results show that the speed reading using PID control is in accordance with the constants Kp = 17, Ki = 7, and Kd = 1. This test has a percentage overshoot (%) of 5% and an average rise time value of 0.14 seconds. System performance with a percentage accuracy of 90% starting from a setpoint of 35 m/min.
Discrete Cosine Transform and Singular Value Decomposition Based on Canny Edge Detection for Image Watermarking Astuti, Erna Zuni; Sari, Christy Atika; Rachmawanto, Eko Hari; Astuti, Yani Parti; Oktaridha, Harwinanda; Isinkaye, Folasade Olubusola
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1768

Abstract

The development of an increasingly sophisticated internet allows for the distribution of digital images that can be done easily. However, with the development of increasingly sophisticated internet networks, it becomes an opportunity for some irresponsible people to misuse digital images, such as taking copyrights, modification and duplicating digital images. Watermarking is an information embedding technique to show ownership descriptions that can be conveyed into text, video, audio, and digital images. There are 2 groups of watermarking based on their working domain, namely the spatial domain and the transformation domain. In this study, three domain transformation techniques were used, namely Singular Value Descomposition (SVD), Discrete Cosine Transform (DCT) and Canny Edge Detection Techniques. The proposed attacks are rotation, gaussian blurness, salt and pepper, histogram equalization, and cropping. The results of the experiment after inserting the watermark image were measured by the Peak Signal to Noise Ratio (PSNR). The results of the image robustness test were measured by the Correlation Coefficient (Corr) and Normalized Correlation (NC). The analysis and experimental results show that the results of image extraction are good with PSNR values from watermarked images above 50dB and Corr values reaching 0.95. The NC value obtained is also high, reaching 0.98. Some of the extracted images are of fairly good quality and are similar with the original image.
A Systematic Review of Artificial Intelligence in Assistive Technology for People with Visual Impairment Triyono, Liliek; Gernowo, Rahmat; Prayitno; Cholil, Saifur Rohman
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1772

Abstract

Recent advances in artificial intelligence (AI) have led to the development of numerous successful applications that utilize data to significantly enhance the quality of life for people with visual impairment. AI technology has the potential to further improve the lives of visually impaired individuals. However, accurately measuring the development of visual aids continues to be challenging. As an AI model is trained on larger and more diverse datasets, its performance becomes increasingly robust and applicable to a variety of scenarios. In the field of visual impairment, deep learning techniques have emerged as a solution to previous challenges associated with AI models. In this article, we provide a comprehensive and up-to-date review of recent research on the development of AI-powered visual aides tailored to the requirements of individuals with visual impairment. We adopt the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) methodology, meticulously gathering and appraising pertinent literature culled from diverse databases. A rigorous selection process was undertaken, appraising articles against precise inclusion and exclusion criteria. Our meticulous search yielded a trove of 322 articles, and after diligent scrutiny, 12 studies were deemed suitable for inclusion in the ultimate analysis. The study's primary objective is to investigate the application of AI techniques to the creation of intelligent devices that aid visually impaired individuals in their daily lives. We identified a number of potential obstacles that researchers and developers in the field of visual impairment applications might encounter. In addition, opportunities for future research and advancements in AI-driven visual aides are discussed. This review seeks to provide valuable insights into the advancements, possibilities, and challenges in the development and implementation of AI technology for people with visual impairment. By examining the current state of the field and designating areas for future research, we expect to contribute to the ongoing progress of improving the lives of visually impaired individuals through the use of AI-powered visual aids.
Anomaly Detection Analysis with Graph-Based Cyber Threat Hunting Scheme Raharjo, Didit Hari Kuncoro; Salman, Muhammad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1773

Abstract

As advanced persistence threats become more prevalent and cyber-attacks become more severe, cyber defense analysts will be required to exert greater effort to protect their systems. A continuous defense mechanism is needed to ensure no incidents occur in the system, one of which is cyber threat hunting. To prove that cyber threat hunting is important, this research simulated a cyber-attack that has successfully entered the system but was not detected by the IDS device even though it already has relatively updated rules. Based on the simulation result, this research designed a data correlation model implemented in a graph visualization with enrichment on-demand features to help analysts conduct cyber threat hunting with graph visualization to detect cyber-attacks. The data correlation model developed in this research can overcome this gap and increase the percentage of detection that was originally undetected / 0% by IDS, to be detected by more than 45% and can even be assessed to be 100% detected based on the anomaly pattern that was successfully found.
Combination of Term Weighting with Class Distribution and Centroid-based Approach for Document Classification Sri Kusuma Aditya, Christian; Sumadi, Fauzi Dwi Setiawan
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1793

Abstract

A text retrieval system requires a method that is able to return a number of documents with high relevance upon user requests. One of the important stages in the text representation process is the weighting process. The use of Term Frequency (TF) considers the number of word occurrences in each document, while Inverse Document Frequency (IDF) considers the wide distribution of words throughout the document collection. However, the TF-IDF weighting cannot represent the distribution of words to documents with many classes or categories. The more unequal the distribution of words in each category, the more important the word features should be. This study developed a new term weighting method where weighting is carried out based on the frequency of occurrence of terms in each class which is integrated with the distribution of centroid-based terms which can minimize intra-cluster similarity and maximize inter-cluster variance. The ICF.TDCB term weighting method has been able to provide the best results in its application to SVM modeling with a dataset of 931 online news documents. The results show that SVM modeling had accuracy of 0.723, outperforming the use of other term weightings such as TF.IDF, ICF & TDCB.
Improving the Major Recommendation Systems: Analysis of Hybrid Naïve Bayes-based Collaborative Filtering and Fuzzy Logic Amir Saleh; Sitompul, Boy Arnol; Wijaya Laia, Laksana Febri; Sinaga, Nicholas Ferdinan
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1797

Abstract

Major recommendation systems have been widely used to assist prospective students in choosing major that matches their interests and potential. In an effort to improve the performance of the recommendation system, this study proposed to use collaborative filtering techniques with naïve Bayes approach. In addition, this study improved the input parameters using fuzzy logic in determining the recommended majors. The methodology used started from collecting user data, including gender, academic history, interests, and other relevant attributes. The data were used to train the naïve Bayes technique by estimating the probability of feature conformity between users and students in the recommended majors. However, there were problems such as uncertainty and ambiguity in user preferences for input data. The fuzzy logic method aimed to improve the input parameters to more accurately reflect the user preferences. The results of improving the input parameters by using fuzzy logic were then used in the naïve Bayes technique to obtain recommendations for the direction that best suits the user’s preferences. The final stage of this study used evaluation metrics such as precision, recall, and f1-score to measure the performance of the recommendation system in providing accurate recommendations. The use of a hybrid of naïve Bayes and fuzzy logic algorithms obtains an accuracy value of 87.27%, a precision value of 87.33%, a recall value of 87.24%, and an f1-score value of 87.26%. These results are higher than the usual naïve Bayes model applied in major recommendation systems.

Page 1 of 1 | Total Record : 10