cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
ISSN : 25032259     EISSN : 25032267     DOI : -
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control was published by Universitas Muhammadiyah Malang. journal is open access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the knowledge as the result of studies. KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desire to develop knowledge based on qualified research in any field. Submitted papers are evaluated by anonymous referees by double-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully within 4 - 8 weeks. The research article submitted to this online journal will be peer-reviewed at least 2 (two) reviewers. The accepted research articles will be available online following the journal peer-reviewing process.
Arjuna Subject : -
Articles 536 Documents
Movie Recommender System on Twitter Using Weighted Hybrid Filtering and GRU Valentino, Nico; Setiawan, Erwin Budi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 2, May 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i2.1941

Abstract

The development of the industry in the film sector has experienced rapid growth, marked by the emergence of film streaming platforms such as Netflix and Disney+. With the abundance of available films, users face difficulty in choosing films that suit their preferences. Recommender systems can be a solution to this problem for users. Recommender systems rely on user reviews, making Twitter a platform that can be used to collect user reviews of a film. This study will develop a recommender system that has the potential to provide item recommendations to users using the weighted hybrid filtering and GRU methods. The weighted hybrid filtering used is a combination of collaborative filtering and content-based filtering methods. The dataset used in this study was obtained by crawling tweets relevant to the feedback of specific accounts regarding a film. The dataset resulting from the data crawling consists of a total of 854 films, 45 users and 34,086 tweets consisting of film reviews from Twitter users. The GRU model classification is performed on the results of weighted hybrid filtering with model optimization involving testing various test size scenarios and optimizer methods. The test sizes used are 40%, 30%, and 20%. The optimizer methods used include Adam, Nadam, Adamax, Adadelta, Adagrad, and SGD. The research results show that the optimal outcome is obtained using the Nadam optimization method. The performance evaluation yielded 85.74% precision, 88.63% recall, 88.63% accuracy, and 86.30% F1-score.
Android-Based Wireless Single-Lead Electrocardiogram: Heart Rate Measurement and ECG Signal Visualization Novitasari, Atika; Nuryani, Nuryani; Darsono, Darsono
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 3, August 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i3.1943

Abstract

Heart rate (HR) is vital for medical and healthcare purposes. This study presents an Android-based heart rate measurement system utilizing a single-lead electrocardiogram (ECG). Three electrodes placed on the arm in lead I configuration capture the ECG signals. An AD8232 sensor amplifies the signal, which is then digitized by Arduino Nano and transmitted to an Android device via HC-05 Bluetooth. The Android application processes the ECG data using the Pan-Tompkins algorithm with an optimized threshold coefficient to extract HR information. The system displays the ECG waveform and the calculated HR on the user interface. Our evaluation demonstrates high accuracy with an error rate of only 0.042%, sensitivity of 99.84%, and positive predictive value of 97.06%. This research suggests the potential of this system for convenient and reliable HR monitoring using readily available smartphones.
Optimizing Android Program Malware Classification Using GridSearchCV Optimized Random Forest Hakim, Luqman; Sari, Zamah; Aristyo, Ananda Rizaldy; Pangestu, Syahrul
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 2, May 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i2.1944

Abstract

The growing number of smartphones, particularly Android powered ones, has increased public awareness of the security concerns posed by malware and viruses. While machine learning models have been studied for malware prediction in this field, methods for precise identification and classification still require improvement for the perfect detection of malwares and minimizing the cracks on machine learning based classification. Detection accuracy that ranges from 93% to 95% has been observed in prior research, indicates room for improvement.  In order to maximize the hyperparameters, this paper suggests improving the Random Forest method by introducing the grid search algorithm which isn’t present in previous studies. A significant increase in classification accuracy is the main aim of the research. We exhibit an outstanding 99% accuracy rate in detecting malware contaminated programs, demonstrating the significance of our technique. The proposed method can be seen as a huge improvement over existing models, achieving near perfection in detection, in contrast to which typically obtained by previous models with the accuracy rate of 95% max on the same dataset. Our approach achieves such high accuracy and provides a novel remedy for the limits of the Android based platforms, particularly when program processing resources are limited. This study confirms the effectiveness of our improved Random Forest algorithm, points to a paradigm shift in malware detection, and heightened cybersecurity measures for the rapidly growing smartphone market.
Design of SEPIC Converter for Battery Charging System using ANFIS Suryono; Sudiharto, Indhana; Anggriawan, Dimas Okky; Jufriyadi, Mohammad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 2, May 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i2.1954

Abstract

Rechargeable batteries are the most widely used medium for storing energy today. One type of rechargeable battery that is widely used is lithium-ion batteries. The large use of lithium-ion batteries in society requires companies to conduct research so that the life time of these batteries can last a long time and charging can take place quickly. Charging system at this time is less efficient in charging lithium batteries where the time needed is still quite long where when lithium batteries are charged with a long time can cause the battery to heat up quickly and can reduce the life time of the battery. To overcome this, a system is needed that can control the battery charger process so that the output voltage and current are constant and battery charging is faster. It is hoped that the SEPIC converter system can help many people who forget to unplug the power supply during the charging process so as to maintain the life time of the battery. Setting the output voltage and current in the DC-DC converter can be done using an Adaptive Neuro Fuzzy Inference System which aims to keep the output of SEPIC stable according to the setting point. In this system, the DC-DC converter used is a SEPIC converter which can increase and decrease the output voltage for battery charging. The battery charging process uses the CC-CV method. In the test, the average error is 0.025% where when the SOC is 60% to 80% the average error is 0.04% and when the SOC is 80% to 95% the average error is 0.0005%.
Smart AODV Routing Protocol Strategies Based on Learning Automata to Improve V2V Communication Quality of Services in VANET Bintoro, Ketut Bayu Yogha; Priyambodo, Tri Kuntoro; Sardjono, Yadie Prasetyo
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 3, August 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i3.1969

Abstract

The Adhoc On-Demand Distance Vector (AODV) protocol faces challenges in selecting the best relay nodes, which requires optimization to improve performance in Vehicular ad-hoc networks (VANETs). This study aims to enhance Vehicle-to-Vehicle (V2V) communication in VANETs by implementing the Learning Automata-Driven Ad-hoc On-Demand Distance Vector (LA-AODV) routing protocol. LA-AODV is designed to achieve higher packet delivery ratios and optimize data transfer rates, even under congested network conditions, by dynamically adjusting to changing network scenarios. The performance evaluation includes six key metrics analyzed under varying node densities and time intervals, comparing LA-AODV against the standard AODV protocol. Results indicate that LA-AODV consistently outperforms AODV, demonstrating improved efficiency in flood identifier management, reduced data loss, higher packet delivery ratios, better throughput, and reduced end-to-end delay and jitter. Specifically, under a 20-node scenario, LA-AODV exhibits lower flood ID scores (54 vs. 88), reduced packet loss (11% vs. 12%), higher PDR (88.0% vs. 87.0%), and superior throughput (85.34 Kbps vs. 47.26 Kbps). Additionally, LA-AODV achieves lower end-to-end delay (6.84E+09 ns vs. 3.76E+10 ns) and jitter (2.52E+09 ns vs. 2.15E+10 ns). These findings suggest that LA-AODV significantly enhances Quality of Service (QoS) in vehicular ad-hoc networks, positioning it as a promising solution for optimizing V2V communication performance.
A Super Encryption Approach for Enhancing Digital Security using Column Transposition - Hill Cipher for 3D Image Protection Handoko, Lekso Budi; Umam, Chaerul
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 3, August 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i3.1984

Abstract

Image encryption is an indispensable technique in the realm of information security, serving as a pivotal mechanism to safeguard visual data against unauthorized access and potential breaches. This study scrutinizes the effectiveness of merging columnar transposition with the Hill Cipher methodologies, unveiling specific metrics from a curated set of sample images. Notably, employing column transposition with the key "JAYA" and the Hill Cipher with the key "UDINUSSMG," the encrypted images underwent rigorous evaluation. 'Lena.png' demonstrated an MSE of 513.32 with a PSNR of 7.89 dB, while 'Peppers.png' and 'Baboon.png' recorded MSE values of 466.67 and 423.92, respectively, with corresponding PSNR figures of 7.12 dB and 7.31 dB. Across all samples, a consistent BER of 50.00% indicated uniform error propagation, while entropy values settled uniformly at 7.9999, highlighting consistent data complexity. While the findings underscore a consistent error rate and complexity, there's a compelling need for further refinement to enhance image quality and security. Moreover, the study proposes future research avenues exploring a three-layer super encryption paradigm, amalgamating columnar transposition, Hill Cipher, and other robust algorithms. This approach aims to fortify encryption methodologies against evolving threats and challenges in data protection, offering heightened resilience and efficacy in safeguarding sensitive information.
Pattern Recognition of Bima Script Handwritting using Convolutional Neural Network Method Ramdhani, Ghina Kamilah; Bimantoro, Fitri; Wijaya, I Gede Pasek Suta
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 3, August 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i3.1990

Abstract

Bima is one of the regions in West Nusa Tenggara Province. The Bima script is a cultural heritage used as a means of communication by the Bima community in the past. The decline in the use of the Bima script threatens cultural heritage. The government has addressed this issue by providing training to teachers to teach it in schools, but this has still been insufficient due to the limited number of teachers participating in the training. Therefore, one efficient method to assist with this issue is by leveraging modern technology, particularly through machine learning for handwriting recognition. This study aims to find the best CNN model for recognizing the Bima script with diacritics to help preserve Bima's cultural heritage through handwriting recognition. The CNN model is combined with hyperparameter tuning, and then testing is conducted in four different scenarios to evaluate the performance of each model architecture and hyperparameter variation to find the best combination. The dataset used is sourced from the Kaggle platform, and augmentation is performed to increase the total number of images to 6,750, with each image containing 75 images in 90 different classes. In this study, testing is done by dividing the dataset into training and testing sets in an 80:20 ratio. The test results show high performance, achieving an accuracy of 98.00%, precision of 98.19%, recall of 98.00%, and f1-score of 98.00% in scenario 4.
Fuzzy C-Means Algorithm Modification Based on Distance Measurement for River Water Quality ‘Uyun, Shofwatul; Eka Sulistiyowati; Jati, Tirta Agung
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 3, August 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i3.1991

Abstract

River water quality could be determined by understanding the capacity of pollutants in a water body. Fuzzy C-Means (FCM) is one of the fuzzy clustering methods for determining river water quality by measuring water quality parameters, that is, dissolved oxygen (DO) and total dissolved solids (TDS). The FCM algorithm is an effective fuzzy clustering algorithm for grouping data but often produces local and inconsistent optimal solutions due to the partition matrix's random initialisation process.  Therefore, this study proposes to modify the FCM algorithm to be precise in the partition matrix initialisation process using several distance concepts. The purpose of the proposed algorithm modification is to get more consistent FCM clustering results and minimise stop iterations. The validation process for the clustering results uses the FCM algorithm, and the FCM modification algorithm uses three parameters, namely the Partition Coefficient Index (PCI), Partition Entropy Index (PEI) and Silhouette Score (SS). The experiments were conducted with three replications and using various distance concepts. The results showed that the number of iterations stopped in the FCM algorithm has different values for PCI, PEI, SS, and stop iterations and objective functions in each trial. On the contrary, the FCM modification algorithm has consistent PCI, PEI, and SS values, and the number of iterations stops with fewer iterations. Therefore, the modified algorithm for initialising the partition matrix can be used in the fuzzy C-means clustering algorithm.
Advancements in Cooperative Mobile Robots Control Strategies for Large-Scale Material Transport: Review Agung, Hendi Wicaksono
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.1992

Abstract

This paper explores groundbreaking advancements in control strategies for cooperative mobile robots used in large-scale material transport, a critical aspect of modern industrial, manufacturing, logistics, and construction sectors. It delves into the development of sophisticated systems that enable seamless coordination among multiple mobile robot systems. The research presents a novel hierarchical finite state automaton for dynamic mission adaptation and a null space-based control scheme for precise task execution and enhanced system resilience. The introduction of Mecanum wheels facilitates flexible movement and manipulation of materials, thereby increasing the operational efficiency and safety. Cutting-edge sensory technology, including LiDAR (Light Detection and Ranging), and the implementation of Robot Operating System are highlighted for their roles in enhancing autonomous navigation and intelligent operation. Additionally, the paper discusses the impact of centralized and decentralized control methods in ensuring safe cooperative object transport. The findings contribute to the vision of Industry 4.0 by promoting the integration of automation and robotic cooperation in complex environments and present a foundational blueprint for further research. Challenges for future work such as scalability, communication efficiency, collision avoidance, and energy efficiency are also considered, underscoring the need for ongoing development of robust and scalable robotic systems to address modern transport challenges.
Kinematic of 3-Wheels Swerve Drive Using BLDC Motor Rosyidin, Arif Anwar; Siradjuddin, Indrazno; Putri, Ratna Ika; Achmadiah, Mas Nurul
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 3, August 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i3.1995

Abstract

The stability of the robot's performance is very important, especially for the wheeled mobile robots that use swerve drives, which need kinematic control to reach the destination point. The study of robot movement known as kinematics is based on an examination of the geometric structure of the robot, with no consideration given to the mass, force, or acceleration that the robot experiences during movement. This study aims to model and simulate the kinematic control design of a wheeled robot that uses a swerve drive. This robot uses BLDC motor actuator so that the robot can reach its destination very quickly and steadily. The test is carried out by simulating and comparing the performance response using BLDC motors and DC motors. According to the testing and trials, the robot can reach its destination by modeling its kinematic control, and BLDC motors are found to be more reliable and efficient for driving and steering than DC motors.