cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
ISSN : 25032259     EISSN : 25032267     DOI : -
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control was published by Universitas Muhammadiyah Malang. journal is open access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the knowledge as the result of studies. KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desire to develop knowledge based on qualified research in any field. Submitted papers are evaluated by anonymous referees by double-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully within 4 - 8 weeks. The research article submitted to this online journal will be peer-reviewed at least 2 (two) reviewers. The accepted research articles will be available online following the journal peer-reviewing process.
Arjuna Subject : -
Articles 536 Documents
Implementing Flash Event Discrimination in IP Traceback using Shark Smell Optimisation Algorithm Omoniyi Wale Salami; Imeh Jarlath Umoh; Emmanuel Adewale Adedokun; Muhammed Bashir Muazu
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (565.817 KB) | DOI: 10.22219/kinetik.v4i3.740

Abstract

 Denial of service attack and its variants are the largest ravaging network problems. They are used to cause damage to network by disrupting its services in order to harm a business or organization. Flash event is a network phenomenon that causes surge in normal network flow due to sudden increase in number of network users, To curtail the menace of the Denial of service attack it is pertinent to expose the perpetrator and take appropriate action against it. Internet protocol traceback is a network forensic tool that is used to identify source of an Internet protocol packet. Most of presently available Internet protocol traceback tools that are based on bio-inspired algorithm employ flow-based search method for tracing source of a Denial of service attack without facility to differentiate flash event from the attack. Surge in network due to flash event can mislead such a traceback tool that uses flow-based search. This work present a solution that uses hop-by-hop search with an incorporated discrimination policy implemented by shark smell optimization algorithm to differentiate the attack traffic from other traffics. It was tested on performance and convergence against an existing bio-inspired traceback tool that uses flow-base method and yielded outstanding results in all the tests
The Analysis of Proximity Between Subjects Based on Primary Contents Using Cosine Similarity on Lective Muhammad Andi Al-rizki; Galih Wasis Wicaksono; Yufis Azhar
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 2, No 4, November-2017
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (663.327 KB) | DOI: 10.22219/kinetik.v2i4.271

Abstract

In education world, recognizing the relationship between one subject and another is imperative. By recognizing the relationship between courses, performing sustainability mapping between subjects can be easily performed.  Moreover, detecting and reducing any duplicated contents in several subjects will be also possible to execute. Of course, these conveniences will benefit lecturers, students and departments. It will ease the analysis and discussion processes between lecturers related to subjects in the same domain. In addition, students will conveniently choose a group of subjects they are interested in. Furthermore, departments can easily create a specialization group based on the similarity of the subjects and combine the courses possessing high similarity. In this research, given a good database, the relationship between subjects was calculated based on the proximity of the primary contents of the subjects. The feature used was term feature, in which value was determined by calculating TF-IDF (Term Frequency Inverse Document Frequency) from each term. In recognizing the value of proximity between subjects, cosine similarity method was implemented. Finally, testing was done utilizing precision, recall and accuracy method. The research results show that the precision and accuracy values are 90,91% and the recall value is 100%.
Feature Selection on Pregnancy Risk Classification Using C5.0 Method Yufis Azhar; Riz Afdian
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (209.111 KB) | DOI: 10.22219/kinetik.v3i4.703

Abstract

The maternal mortality rate in Indonesia is still relatively high. This is caused by several factors, including the ignorance of pregnant women about the risk status of pregnancy. Several methods are proposed for early detection of the risk of a mother's pregnancy. However, no one has highlighted what features are most influential in the process of classifying the risk of pregnancy. In this research, we use data of pregnant women in one of the health centers in Malang, Indonesia, as a dataset. The dataset has 107 features, therefore, feature selection is needed for the classification process. We propose to use the C5.0 method to select important features while classifying dataset into low, high, and very high risk of pregnancy. C5.0 was chosen because this method has a better pruning algorithm and requires relatively smaller memory compared to C4.5. Another classification method (SVM, Naive Bayes, and Nearest Neighbor) is then used to compare the accuracy values between datasets that use all features with datasets that only use the selected features. The test results show that feature selection can increase accuracy by up to 5%.
Pemetaan Subdomain Pada Cloud Server Universitas Semarang Menggunakan Metode Port Forwarding dan Reverse Proxy Mohammad Sani Suprayogi; Prind Triajeng Pungkasanti
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 2, No 1, February-2017
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (406.098 KB) | DOI: 10.22219/kinetik.v2i1.133

Abstract

Manajemen Jaringan adalah bagian dari ilmu komputer yang berkaitan dengan pengaturan sumberdaya, optimasi, dan keamanan jaringan komputer. Port forwarding dan reverse proxy merupakan salah satu cara untuk pemetaan alamat dalam jaringan komputer. Penelitian mengenai cloud computing telah mulai banyak dilakukan, namun pembahasan mengenai manajemen jaringan masih sering menggunakan metode bridge, yang membutuhkan banyak ip public. Universitas Semarang telah mengimplementasikan cloud computing namun memiliki keterbatasan ip public, sehingga membatasi jumlah server dalam jaringan cloud Universitas Semarang. Hampir sebagian besar universitas dan institusi lain memiliki masalah yang sama (keterbatasan jumlah ip public), maka penelitian ini bertujuan untuk menghasilkan suatu konfigurasi pada server cloud dengan tujuan untuk mengoptimalkan ip private dalam jaringan, kemudian memetakan subdomain dan ip private pada setiap server supaya dapat diakses oleh pengunjung. Hasilnya Universitas Semarang hanya membutuhkan satu ip public yang berfungsi sebagai gateway terhadap server-server yang berjalan di jaringan cloud. Selain itu teknik ini dapat menjadi pengayaan dalam mata kuliah Jaringan Komputer. 
Performance Comparisson Human Activity Recognition Using Simple Linear Method Kusuma, Wahyu Andhyka; Sari, Zamah; Minarno, Agus Eko; Wibowo, Hardianto; Akbi, Denar Regata; Jawas, Naser
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 1, February 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (731 KB) | DOI: 10.22219/kinetik.v5i1.1025

Abstract

Human activity recognition (HAR) with daily activities have become leading problems in human physical analysis. HAR with wide application in several areas of human physical analysis were increased along with several machine learning methods. This topic such as fall detection, medical rehabilitation or other smart appliance in physical analysis application has increase degree of life. Smart wearable devices with inertial sensor accelerometer and gyroscope were popular sensor for physical analysis. The previous research used this sensor with a various position in the human body part. Activities can classify in three class, static activity (SA), transition activity (TA), and dynamic activity (DA). Activity from complexity in activities can be separated in low and high complexity based on daily activity. Daily activity pattern has the same shape and patterns with gathering sensor. Dataset used in this paper have acquired from 30 volunteers.  Seven basic machine learning algorithm Logistic Regression, Support Vector Machine, Decision Tree, Random Forest, Gradient Boosted and K-Nearest Neighbor. Confusion activities were solved with a simple linear method. The purposed method Logistic Regression achieves 98% accuracy same as SVM with linear kernel, with same result hyperparameter tuning for both methods have the same accuracy. LR and SVC its better used in SA and DA without TA in each recognizing.
Extraction of Eye and Mouth Features for Drowsiness Face Detection Using Neural Network Elis Fitrianingsih; Endang Setyati; Luqman Zaman
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 2, May-2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (626.909 KB) | DOI: 10.22219/kinetik.v3i2.589

Abstract

Facial feature extraction is the process of searching for features of facial components such as eyes, nose, mouth and other parts of human facial features. Facial feature extraction is essential for initializing processing techniques such as face tracking, facial expression recognition or face shape recognition. Among all facial features, eye area detection is important because of the detection and localization of the eye. The location of all other facial features can be identified. This study describes automated algorithms for feature extraction of eyes and mouth. The data takes form of video, then converted into a sequence of images through frame extraction process. From the sequence of images, feature extraction is based on the morphology of the eyes and mouth using Neural Network Backpropagation method. After feature extraction of the eye and mouth is completed, the result of the feature extraction will later be used to detect a person’s drowsiness, being useful for other research.
2D Mapping and boundary detection using 2D LIDAR sensor for prototyping Autonomous PETIS (Programable Vehicle with Integrated Sensor) Hanugra Aulia Sidharta; Sidharta Sidharta; Wina Permana Sari
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 2, May 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (326.052 KB) | DOI: 10.22219/kinetik.v4i2.731

Abstract

PETIS (Programable Vehicle with Integrated Sensor) is a research project with goal make a robot that move independently with specific purpose. Due complexity of PETIS, research divide into several important sequence. In this research author focus on sense of sight for PETIS, LIDAR chosen due flexible and comprehensive. There is many LIDAR sensor in marketplace, LDS-01 as one of commercial LIDAR sensor available on market, produced by ROBOTIS as one of low-cost LIDAR sensor. Compare with another sensor that cost more than $1000, LDS-01 just cost lower than $500. On this research study focus with LDS-01 sensor reading, include hardware, software connection, and data handling. Based on this research LDS-01 as LIDAR sensor can read obstacle with minimum 29,9 cm and maximal 290,7 cm. Comparing with datasheet LDS-01 should work from 12 cm through 350 cm. 
Tingkat Kematangan Infrastruktur Teknologi Informasi Pada Domain Acquire and Implement Menggunakan COBIT 4.1 (Studi Kasus: UPT Perpustakaan Universitas Pembangunan Nasional “VETERAN” Jawa Timur) Ronggo Alit; Icha Dian Pratiwi; Mohammad idhom
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 2, No 3, August-2017
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (550.543 KB) | DOI: 10.22219/kinetik.v2i3.32

Abstract

Berdasarkan hasil wawancara UPT Perpustakaan kekurangan perangkat komputer dan masih menggunakan server milik UPT Telematika serta kecepatan akses wifi akan lambat jika banyak yang menggunakan sehingga perlu dilakukan penelitian ini yang bertujuan untuk mengetahui tingkat kematangan dan menghasilkan rekomendasi guna meningkatkan pengelolaan infrastruktur teknologi informasi. Penelitian dilakukan menggunakan COBIT Framework 4.1 tahap penelitian diawali dengan analisa data wawancara kemudian diidentifikasi IT goals, IT process, serta Control Objectives. Perhitungan maturity level untuk mengetahui gap antara kondisi sekarang dengan kondisi yang diharapkan dan rekomendasi digunakan untuk mengatasi gap tersebut. Dari hasil penelitian yang dilakukan diperoleh 4 IT Goals, 10 IT Processes dan 17 detailed control objectives. Karena pemilihan subdomain disesuaikan dengan masalah dan kebutuhan maka subdomain yang digunakan adalah PO3, PO7, AI3 dan AI5. Ditemukan gap sebesar 1.5 dan maturity level sebesar 2.5 sehingga berada pada level 3 artinya perpustakaan telah memiliki mekanisme dan prosedur yang jelas mengenai tata cara dan manajemen teknologi informasi.
Impact of H-Index Toward Citations Using Linear Regression on Science and Technology Index Dihin Muriyatmoko; Lalu Ganda Rady Putra
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v3i3.630

Abstract

Number of Journals in Indonesia is quite a lot and various disciplines. Until March 15, 2018, registered 50,889 online and print ISSN by Indonesian Institute of Science (LIPI). The government through Ministry of Research, Technology, and Higher Education of Republic Indonesia (Kemenristekdikti) set regulated on journal index, that is Science and Technology Index (SINTA) assigned to rank quality content and management divided by six categories called S1 to S6 which of the data is taken from Google Scholar and Scopus. This research applies S1 that these journals are accredited “A” by Kemenristekdikti and or index by Scopus. That’s data is shown ranking by sorted based on h-index and citations. S1 shown that journal which has highest h-index uncertain have highest citations too, even some have zeroes. That’s data on S1 become strange and awkward when compared with S2 to S6 because some value of h-index and citations S1 is lower than S2 to S6. This research focus to find how strong correlation or impact h-index toward citations using linear regression. The test result shows that value of Multiple R = 0.78 indicates the correlative is very close, a value of R Square = 0.61 indicates the impact of h-index toward citations achieve 61% and the rest 39% affected by others factor.
Adaptive Contents Distribution Based on Traffic Congestion on Digital Signage System Alifudin, Ridhwan; Rakhmatsyah, Andrian; Yasirandi, Rahmat
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (266.289 KB) | DOI: 10.22219/kinetik.v4i3.810

Abstract

Current technological developments have been very rapid. One of them is the many choices of technology and media to deliver information to the public. Digital Signage is one of the most popular information delivery systems today, displays on digital or electronic media, and it can convey new details. The information usually showed in the form of advertising content in the format of images or videos. Ad content displayed is static, meaning that the ad content will be display in the order specified. This system usually placed next to a broad road. A place that is considered to have a broad audience and requires a significant amount of money to display ad content. However, this causes ad content owners who do not have enough costs not to be able to show the ad content in a particular place. Therefore, this research makes the content management system adaptive to road congestion situations which represented as audience quantities so that the costs can be adjusted. Data is obtained from the Google Maps API and analyzed the traffic congestion by conducting experiments. The compatibility between density and content after testing the results in 100% accuracy.