cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
ISSN : 25032259     EISSN : 25032267     DOI : -
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control was published by Universitas Muhammadiyah Malang. journal is open access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the knowledge as the result of studies. KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desire to develop knowledge based on qualified research in any field. Submitted papers are evaluated by anonymous referees by double-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully within 4 - 8 weeks. The research article submitted to this online journal will be peer-reviewed at least 2 (two) reviewers. The accepted research articles will be available online following the journal peer-reviewing process.
Arjuna Subject : -
Articles 526 Documents
A Three Area Interconnected Power System Network Load Frequency Controller Simulator Muritala, Ibrahim Olawale; Mu’azu, M B; Adedokun, E A
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (636.555 KB) | DOI: 10.22219/kinetik.v3i4.657

Abstract

This paper presents a MATLAB simulator of a three area interconnected power system of Thermal-Gas-Hydro. Nonlinearities intrinsic in the interconnected power system of communication delay, Generation Rate Constraint and Generation Dead Band were measured. Bat Inspired Algorithm was exploited to select the favourable parameters of the Model Predictive Controller and the Super Conducting Magnetic Energy Storage. Model Predictive Controller was the subordinate controller employed to minimalize the Area Control Error, Super Conducting Magnetic Energy Storage was the energy buffer to balance the load demand and the power generated. Integral Time Absolute Error was the performance metrics employed to minimize the Area Control Error. Parametric dissimilarity was tested on the inter-connected power system to observe the efficacy of the controller. Step load perturbation of  was concurrently applied to the three-area inter-connected network,  was introduced to the thermal generating unit,  was introduced to the gas and hydro generating unit.  Value of the tie-line was introduced to examine its effect on the frequency deviation. The results performed better when compared with Model Predictive Controller joined with Super Conducting Magnetic Energy Storage against the Model Predictive Controller without Super Conducting Magnetic Energy Storage in relations to settling time, overshoot and undershoot.
A Modified Real-Time Fault-Tolerant Task Allocation Scheme for Wireless Sensor Networks Marshall, Francis Franklin; Muazu, M B; Umoh, I J; Salawudeen, A T; Sadiq, B O; Ikpe, D E
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (587.063 KB) | DOI: 10.22219/kinetik.v4i1.659

Abstract

In WSNs, the sensor nodes are at risk of failure and malicious attacks (selective forwarding). This may have a profound negative effect when you consider real-time WSNs, making them challenging to deploy. When there is a delay in tasks allocation execution processes in real-time WSNs because of sensor nodes failures, this will cause disastrous consequences if the systems are safety-critical, e.g. aircraft, nuclear power plant, forest fire detection, battlefield monitoring, thus the need to developed a real-time system that is fault-tolerable. This paper developed a modified real-time fault-tolerant task allocation scheme (mRFTAS) for WSNs (wireless sensor networks), using active replication techniques. mRFTAS and RFTAS performance were compared using time of execution of the task, network lifetime and reliability cost. The mRFTAS performance showed an improvement over that of RFTAS when it comes to reducing the time it takes for task execution by 45.56% and reliability cost of 7.99% while prolonging the network lifetime by 36.35%.
Genetic Algorithm Application for Navigation System on Virtual Shop Syahputra, Andi Nagoro; Kholimi, Ali Sofyan; Husniah, Lailatul
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (324.972 KB) | DOI: 10.22219/kinetik.v3i4.668

Abstract

Online shop becomes one of the updated common types of shop in the era of rapidly grown technology development, yet this system provides its drawbacks. One of the problems which commonly found is a great deal of scamming practices for profit-oriented aims. Virtual shop is defined as a virtual reality application allowing its user to experience shopping in virtual world. A navigation system is required to enable its users in finding out the expected product. Genetic algorithm is one of many search algorithms based on natural selection and natural genetics. On this algorithm, data and string are executed through process of selection to generate problem solving solution. Using this algorithm, the navigation system is proved to be successful on generating path leading to expected product in the virtual shop.
Encryption of Text Message on Audio Steganography Using Combination Vigenere Cipher and LSB (Least Significant Bit) Sari, Christy Atika; Mulyono, Ibnu Utomo Wahyu; Susanto, Ajib; Anggraeny, Tiara
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (475.723 KB) | DOI: 10.22219/kinetik.v4i1.701

Abstract

 The growing information technology is very rapidly, the more evolving crime techniques to find information that is confidential. The Internet is one of the main media in disseminating information. The use of security on the internet still needs to be developed. Based on these problems, the type of research undertaken in the writing of this final task is the type of experimental research by developing methods that have been done by previous researchers to hide secret data that is inserted into the audio * .wav so that the security and confidentiality of data can be guaranteed. data security can be done with various methods, including cryptography and steganography. Cryptography is a technique for encrypting messages and steganography is a message concealment technique. This insertion type uses binary ASCII character code. In the cryptographic process, using the Vigenere Cipher algorithm and in the steganography, process using the algorithm (LSB) Least Significant Bits. The merger of the two techniques resulted in a better new digital image security system and increased the value of MSE, PSNR and Execution time. Then the test results in the evaluation using BER and histogram analysis. Good audio quality has a minimum value of 30 dB PSNR. In the embedding process using combinations of vigenere and LSB methods, Audio 15 is the best audio compared to other audio. Audio 15 has a smaller MSE (0.001656) value and a larger PSNR (124.138499) value than any other audio when embeded messages *.txt file with character 4096.
Analysis Tunneling IPv4 and IPv6 on VoIP Network Haji, Muhammad Ismu; E.S.G.S, Sugeng Purwantoro; Arifin, Satria Perdana
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (169.147 KB) | DOI: 10.22219/kinetik.v3i4.708

Abstract

Using of IP addresses is currently still using IPv4. Meanwhile, the availability of the IPv4 address is gradually diminishes. IPv4 has a limited address capacity. IPv6 was developed with a capacity greater than IPv4. Connect between IPv4 and IPv6 without having to interfere with the existing infrastructure. So, methods like tunneling are needed. Tunneling builds a way that IPv4 and IPv6 can communicate. 6to4 tuning makes IPv6 able to communicate with IPv4 over IPv4 infrastructure. Real time communication is needed by internet users to be able to connect to each other. One of the real time communications is VoIP. To find out the quality of tunneling implemented on a VoIP network, it will analyze QoS such as delay, packet loss, and jitter. Delay obtained is 20,01ms for IPv4, 19,99ms for IPv6 and 20,03ms for 6to4. Packet loss obtained 0,01% for IPv4, IPv6 0,01% and 6to4 0,08%. The obtained jitter is 7,96ms for IPv4, IPv6 7.39ms, and 8,48 for 6to4. The test results show that using IPv6 gets a better QoS value than using IPv4 and 6to4 tunneling. The results using 6to4 tunneling obtained the highest QoS value between IPv4 and IPv6. Implementation using 6to4 tunneling results in high results because, IPv6 packets that are sent are wrapped into the IPv4 form to get through the IPv4 infrastructure. 
Fuzzy Logic Control Design in Hybrid Energy Storage System Super-Capacitor Battery for Electric Vehicle Dhia, Thomi; Mardiyah, Nur Alif; Nurhadi, Nurhadi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (740.662 KB) | DOI: 10.22219/kinetik.v4i1.658

Abstract

HESS is a suitable technology when applied to electric cars. One application is in SUV (Sport Utility Vehicle) car. The use of Supercapacitors can reduce the excess of load on the battery. Uneven soil contours cause current spike and drop in battery voltage which can reduce battery lifetime. This journal presents a simulated study of HESS batteries and Supercapacitors in SUV cars. Fuzzy-based energy management strategies and threshold control are introduced. The simulation study shows the difference between the control using the number of climb data and not, and the Fuzzy control response to the demand load. The simulation results mention the reduction of the maximum current and the battery voltage drop according to the load. The total energy ratio used between the two controls is also presented.
Front and Back Matter V3i4 Waskito, Adhitya Dio
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1360.078 KB) | DOI: 10.22219/kinetik.v3i4.732

Abstract

Front and Back Matter V4i1 Waskito, Adhitya Dio
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1291.058 KB) | DOI: 10.22219/kinetik.v4i1.750

Abstract

2D Mapping and boundary detection using 2D LIDAR sensor for prototyping Autonomous PETIS (Programable Vehicle with Integrated Sensor) Sidharta, Hanugra Aulia; Sidharta, Sidharta; Sari, Wina Permana
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 2, May 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (326.052 KB) | DOI: 10.22219/kinetik.v4i2.731

Abstract

PETIS (Programable Vehicle with Integrated Sensor) is a research project with goal make a robot that move independently with specific purpose. Due complexity of PETIS, research divide into several important sequence. In this research author focus on sense of sight for PETIS, LIDAR chosen due flexible and comprehensive. There is many LIDAR sensor in marketplace, LDS-01 as one of commercial LIDAR sensor available on market, produced by ROBOTIS as one of low-cost LIDAR sensor. Compare with another sensor that cost more than $1000, LDS-01 just cost lower than $500. On this research study focus with LDS-01 sensor reading, include hardware, software connection, and data handling. Based on this research LDS-01 as LIDAR sensor can read obstacle with minimum 29,9 cm and maximal 290,7 cm. Comparing with datasheet LDS-01 should work from 12 cm through 350 cm. 
Adaptive Non Playable Character in RPG Game Using Logarithmic Learning For Generalized Classifier Neural Network (L-GCNN) Mabruroh, Izza; Herumurti, Darlis
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 2, May 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (286.645 KB) | DOI: 10.22219/kinetik.v4i2.755

Abstract

Non-playable Character (NPC) is one of the important characters in the game. An autonomous and adaptive NPC can adjust actions with player actions and environmental conditions. To determine the actions of the NPC, the previous researchers used the Neural Network method but there were weaknesses, namely the action produced was not in accordance with the desired so the accuracy was not good. This study overcomes the problem of poor accuracy by using the Logarithmic Learning for Generalized Classifier Neural Network (L-GCNN) method with 6 input parameters, NPC health, distance from players, other NPCs involved, attack power, number of NPCs and NPC levels. While the output is to attack itself, attack in groups and move away. For testing, this study was tested on RPG games. From the results of the experiments conducted, it shows that the L-GCNN method has better accuracy than the 3 methods compared to 7% better than NN and SVM and 8% better than RBFNN because in the L-GCNN method there is an encapsulation process that is data have the same class will. Whereas the L-GCNN training time is 30% longer than the NN method because on L-GCNN one neuron consists of one data where there are fewer NNs in the hidden layer.

Page 11 of 53 | Total Record : 526