Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control was published by Universitas Muhammadiyah Malang. journal is open access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the knowledge as the result of studies.
KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desire to develop knowledge based on qualified research in any field. Submitted papers are evaluated by anonymous referees by double-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully within 4 - 8 weeks. The research article submitted to this online journal will be peer-reviewed at least 2 (two) reviewers. The accepted research articles will be available online following the journal peer-reviewing process.
Articles
536 Documents
Sistem Pendukung Keputusan Seleksi Ujian Masuk Perguruan Tinggi Menggunakan NBC (Na?ve Bayes Classifier)
Andri Suryadi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 1, No 3, November-2016
Publisher : Universitas Muhammadiyah Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (304.184 KB)
|
DOI: 10.22219/kinetik.v1i3.120
Kesuksesan sebuah perguruan tinggi dalam menciptakan lulusan yang berkualitas ditentukan oleh sumber daya yang masuk ke perguruan tinggi tersebut. Masing ? masing perguruan tinggi mempunyai sistem tersendiri dalam proses seleksi tersebut. Namun, dalam proses seleksi yang dilakukan banyak mahasiswa yang nilai kelulusannya tidak sesuai yang diharapkan. Oleh karena itu perlu adanya suatu sistem yang dapat mendukung keputusan dalam seleksi calon mahasiswa baru guna mendapatkan input calon mahasiswa yang baik. Penelitian ini membangun sistem Pendukung Keputusan menggunakan metode na?ve bayes classifier dimana nilai tes kompetensi dasar mahasiswa yang telah diterima akan dijadikan data latih kemudian diklasifikasikan berdasarkan nilai ipk yang telah diperolehnya. Nilai ipk tersebut akan menjadi patokan pembentukan kelas yang merupakan rekomendasi kepada tim penyeleksi. Kemudian diberikan sebuah data calon mahasiswa beserta nilai kompentensi dasar, jika calon mahasiswa tersebut memasuki kelas aman maka akan direkomendasikan untuk memasuki Perguruan Tinggi yang dimaksud.
Mitigating Coordinated Call Attacks On VoIP Networks Using Hidden Markov Model
Nakorji, Usman Haruna;
Adedokun, E A;
Umoh, I J;
Shettima, Abdullazeez
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 4, November 2019
Publisher : Universitas Muhammadiyah Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (418.402 KB)
|
DOI: 10.22219/kinetik.v4i4.797
Abstract This paper presents a 2-tier scheme for mitigating coordinated call attacks on VoIP networks. Call interaction pattern was considered using talk and salient periods in a VoIP call conversation. At the first-tier, Short Term Energy algorithm was used for call interaction feature extraction and at the second-tier Hidden Markov Model was used for caller legitimacy recognition. Data of VoIP call conversations were collated and analyzed to extract distinctive features in VoIP call interaction pattern to ascertain the legitimacy of a caller against coordinated call attacker. The performance metrics that was used are; False Error Rate (FER), Specificity, Detection Accuracy and Throughput. Several experiments were conducted to see how effective the mitigating scheme is, as the scheme acts as a proxy server to Session Initiation Protocol (SIP) server. The experiments show that; when the VoIP server is under coordinated call attack without a mitigating scheme only 15.2% of legitimate VoIP users had access to the VoIP network and out of which about half of the legitimate users had their calls dropped before completion, while with the 2-tier mitigating scheme, when the VoIP server is under coordinated call attacks over 90.3% legitimate VoIP callers had their calls through to completion
Implementation of Google's Technology in Android Mobile App "Kediri City Fasum and Fasos Information System"
Benni Agung Nugroho;
Abidatul Izzah
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 1, February-2018
Publisher : Universitas Muhammadiyah Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1212.718 KB)
|
DOI: 10.22219/kinetik.v3i1.543
There are so many public facilities (FasUm) and social facilities (FaSos) spreading all over the city. So that, many people do not know how to find and reach the location. Therefore, a mobile application becomes necessary to help solving problems in introducing and informing the location of those important facilities; thus, discovering and locating them can be simplified. This study aims to develop an android application providing information of public and social facilities. The application was built utilizing Google’s features consisting of Google Sign In, Google Places API, Google Custom Search Engine, and Google Map. The application was developed in several steps; requirement analysis, system design, implementation, and testing. The application provides information, routes, related news, and location markers of public and social facilities from the app contributor and Google Services. The developed application has been compared with Google Map application. The result shows that it provides some features which are better than the existing app.
An Enhancement of Data Hiding Imperceptibility using Slantlet Transform (SLT)
Daurat Sinaga;
Eko Hari Rachmawanto;
Christy Atika Sari;
De Rosal Ignatius Moses Setiadi;
Noor Ageng Setiyanto
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (877.058 KB)
|
DOI: 10.22219/kinetik.v4i1.702
This study proposes a hybrid technique in securing image data that will be applied in telemedicine in future. Based on the web-based ENT diagnosis system using Virtual Hospital Server (VHS), patients are able to submit their physiological signals and multimedia data through the internet. In telemedicine system, image data need more secure to protect data patients in web. Cryptography and steganography are techniques that can be used to secure image data implementation. In this study, steganography method has been applied using hybrid between Discrete Cosine Transform (DCT) and Slantlet Transform (SLT) technique. DCT is calculated on blocks of independent pixels, a coding error causes discontinuity between blocks resulting in annoying blocking artifact. While SLT applies on entire image and offers better energy compaction compare to DCT without any blocking artifact. Furthermore, SLT splits component into numerous frequency bands called sub bands or octave bands. It is known that SLT is a better than DWT based scheme and better time localization. Weakness of DCT is eliminated by SLT that employ an improved version of the usual Discrete Wavelet Transform (DWT). Some comparison of technique is included in this study to show the capability of the hybrid SLT and DCT. Experimental results show that optimum imperceptibility is achieved.
VOL 1 NO 1 (2016) COVER
Wahyu Andhyka Kusuma
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 1, No 1, May-2016
Publisher : Universitas Muhammadiyah Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (374.532 KB)
|
DOI: 10.22219/kinetik.v1i1.175
Classification of Lexile Level Reading Load Using the K-Means Clustering and Random Forest Method
Rosyid, Harits Ar;
Pujianto, Utomo;
Yudhistira, Moch Rajendra
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22219/kinetik.v5i2.897
There are various ways to improve the quality of someone's education, one of them is reading. By reading, insight and knowledge of various kinds of things can increase. But, the ability and someone's understanding of reading is different. This can be a problem for readers if the reading material exceeds his comprehension ability. Therefore, it is necessary to determine the load of reading material using Lexile Levels. Lexile Levels are a value that gives a size the complexity of reading material and someone's reading ability. Thus, the reading material will be classified based a value on the Lexile Levels. Lexile Levels will cluster the reading material into 2 clusters which is easy, and difficult. The clustering process will use the k-means method. After the clustering process, reading material will be classified using the reading load Random Forest method. The k-means method was chosen because of the method has a simple computing process and fast also. Random Forest algorithm is a method that can build decision tree and it’s able to build several decision trees then choose the best tree. The results of this experiment indicate that the experiment scenario uses 2 cluster and SMOTE and GIFS preprocessing are carried out shows good results with an accuracy of 76.03%, precision of 81.85% and recall of 76.05%.
Impression Classification of Endek (Balinese Fabric) Image Using K-Nearest Neighbors Method
Gede Aditra Pradnyana;
I Komang Agus Suryantara;
I Gede Mahendra Darmawiguna
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (289.092 KB)
|
DOI: 10.22219/kinetik.v3i3.611
An impression can be interpreted as a psychological feeling toward a product and it plays an important role in decision making. Therefore, the understanding of the data in the domain of impressions will be very useful. This research had the objective of knowing the performance of K-Nearest Neighbors method to classify endek image impression using K-Fold Cross Validation method. The images were taken from 3 locations, namely CV. Artha Dharma, Agung Bali Collection, and Pengrajin Sri Rejeki. To get the image impression was done by consulting with an endek expert named Dr. D.A Tirta Ray, M.Si. The process of data mining was done by using K-Nearest Neighbors Method which was a classification method to a set of data based on learning data that had been classified previously and to classify new objects based on attributes and training samples. K-Fold Cross Validation testing obtained accuracy of 91% with K value in K-Nearest Neighbors of 3, 4, 7, 8.
Peringkasan Tweet Berdasarkan Trending Topic Twitter Dengan Pembobotan TF-IDF dan Single Linkage Angglomerative Hierarchical Clustering
Annisa Annisa;
Yuda Munarko;
Yufis Azhar
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 1, No 1, May-2016
Publisher : Universitas Muhammadiyah Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (539.422 KB)
|
DOI: 10.22219/kinetik.v1i1.7
Fitur yang paling sering digunakan pada Twitter ialah Trending Topic. Trending Topic merupakan fitur yang menampilkan beberapa hashtag berisi topik yang sedang trend saat ini. Jika pengguna ingin mengetahui informasi mengenai suatu trending topic, pengguna bisa mengklik salah satu hashtag dan barulah muncul beberapa tweet terkait dengan hashtag tersebut. Agar menghemat waktu pengguna Twitter dalam membaca suatu trending topic tanpa perlu membaca beberapa tweet terlebih dahulu, maka dilakukanlah analisa dengan tujuan membuat text summarization untuk trending topic pada Twitter menggunakan algoritma TF-IDF dan Single Linkage Agglomerative Hierarchical Clustering. Penelitian ini menggunakan 100 trending topic untuk data tes pada sistem dan setiap trending topic terdiri atas 50 tweet berbahasa indonesia, sedangkan untuk pengujian digunakan 30 data trending topic diambil secara acak (data mewakili trending topic dengan sub tema minimal 2 dan maksimal 9 dari 100 data tes pada sistem). Dari 30 data pengujian, 1 data menghasilkan semua ringkasan sama persis dengan ahli, dan 29 data menghasilkan 1-4 ringkasan sama persis dengan ahli (terdiri atas 2-9 ringkasan untuk setiap trending topic).
Egg Quality Detection System Using Fuzzy Logic Method
Ikbar Mahesa;
Aji Gautama Putrada;
Maman Abdurohman
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (472.627 KB)
|
DOI: 10.22219/kinetik.v4i3.839
Determining the quality of eggs in general is used by placing eggs on a flashlight. The detection system is very necessary to determine good egg quality or rotten eggs, so that the conditions of the eggs can be known by the chicken farm company and then will be sold to the community. This egg detecting system utilizes several sensor devices that are combined. The sensor used to detect the quality of eggs is a light sensor and a heavy sensor by connected with a microcontroller. So that there is no ambiguity towards the decision making of good egg or rotten eggs, then processing the data is obtained from these sensors using Fuzzy Logic and Firebase methods in real time as data storage media, and actuators will distribute or separate good eggs or the rotten eggs one. With the development of technology now, we can use the Internet of Things (IoT) technology, one of the systems check the quality of eggs which are good or not good. This system is built using a microcontroller to coordinate the running of the system using the Fuzzy Logic Method that applies inside. Final information is obtained on the form of egg quality in real time. The test results were carried out using the Fuzzy Logic method and obtained 95% results from 20 eggs and had 1 wrong egg. When using system hardware without using the fuzzy logic method on the microcontroller that using only a light sensor and a heavy sensor it produces a result of 75% from 20 eggs and had 5 wrong eggs. Using the egg detection optimization method can be increased up to 20%.
Acquisition of Email Service Based Android Using NIST
Rusydi Umar;
Imam Riadi;
Bashor Fauzan Muthohirin
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1004.832 KB)
|
DOI: 10.22219/kinetik.v3i3.637
Email is one of the results of the development of information and communication technology. Email is widely used to exchange information by sending and receiving data, such as document files, images, correspondence and others. With the development of technology and information causing crimes in communicating also growing, the perpetrators of cyber crime commonly referred to as cybercrime. Any crime committed by cybercrime will surely leave the evidence, in this study will make the acquisition of android-based email using the method of national institute of standards and technology (NIST). The results obtained IP address of the sender's email header as digital evidence.