cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
ISSN : 25032259     EISSN : 25032267     DOI : -
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control was published by Universitas Muhammadiyah Malang. journal is open access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the knowledge as the result of studies. KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desire to develop knowledge based on qualified research in any field. Submitted papers are evaluated by anonymous referees by double-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully within 4 - 8 weeks. The research article submitted to this online journal will be peer-reviewed at least 2 (two) reviewers. The accepted research articles will be available online following the journal peer-reviewing process.
Arjuna Subject : -
Articles 536 Documents
Enhancing Qur'anic Recitation Experience with CNN and MFCC Features for Emotion Identification Syafa'ah, Lailis; Prasetyono, Roby; Hariyady, Hariyady
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 2, May 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i2.2007

Abstract

In this study, MFCC feature extraction and CNN algorithms are used to examine the identification of emotions in the murottal sounds of the Qur'an. A CNN model with labelled emotions is trained and tested, as well as data collection of Qur'anic murottal voices from a variety of readers using MFCC feature extraction to capture acoustic properties. The outcomes show that MFCC and CNN work together to significantly improve emotion identification. The CNN model attains an accuracy rate of 56 percent with the Adam optimizer (batch size 8) and a minimum of 45 percent with the RMSprop optimizer (batch size 16). Notably, accuracy is improved by using fewer emotional parameters, and the Adam optimizer is stable across a range of batch sizes. With its insightful analysis of emotional expression and user-specific recommendations, this work advances the field of emotion identification technology in the context of multitonal music.
Exploring Trust, Privacy, and Security in Cloud Storage Adoption among Generation Z: An Extended TAM Approach Utomo, Rio Guntur; Yasirandi, Rahmat
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2009

Abstract

The incorporation of cloud storage technology holds the promise of significantly enhancing efficiency in various sectors, particularly from the perspective of Generation Z, a demographic known for its meticulous consideration of technology acceptance factors, especially security. This research thoroughly examines the level of acceptance of cloud storage technology among Generation Z. By augmenting the Technology Acceptance Model (TAM) with five core factors and introducing three novel factors—Perceived Security, Perceived Privacy, and Trust—this study not only adheres to traditional acceptance models but also ventures into uncharted territories, marking a significant contribution to understanding technology acceptance. This study meticulously collected data from 408 Generation Z respondents who actively use cloud storage technology, employing an innovative questionnaire disseminated via an online platform. Through sophisticated PLS-SEM data analysis, the study confirmed the positive and significant impact of all tested hypotheses, underscoring the importance of attitudes, perceived benefits, and usability in fostering the intention to use cloud storage. Notably, the added dimensions of privacy and security emerged as critical in enhancing users' trust in cloud storage solutions. Furthermore, this study paves the way for future explorations into technology acceptance across diverse populations and settings, underscoring the critical role of security and privacy in shaping technology adoption decisions among emerging generations.
The Application of PROMETHEE Method in Determining Scholarship Recipients at University Prima, Wahyu; Putra, Firmansyah; Sapriadi, Sopi; Hayati, Rahmatul
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2014

Abstract

This study aims to use PROMETHEE method as a decision support system in determining the recipients of the Academic Achievement Improvement Scholarship at Universitas Dharmas Indonesia (UNDHARI). The methodological steps include problem identification, analysis, goal setting, and the application of PROMETHEE method. In this study, the criteria and alternatives have been identified to evaluate the scholarship recipients. The criteria weights are set, and the criteria preference types are determined. After obtaining the baseline data from the questionnaire assessments, pairwise preference values and multicriteria preference index values are calculated. Then, the rankings are compiled using Leaving Flow, Entering Flow, and Net Flow methods, resulting in the priority order of the scholarship recipients. The ranking results show that alternative 3 (IS) has the highest Net Flow value (0.30), while alternative 2 (AV) has the lowest Net Flow value (-0.35). Thus, the priority order from highest to lowest is IS, AV, RD, YM, and AV. In the context of Net Flow scores, these results indicate that alternative 3 (IS) has the greatest chance of receiving the academic achievement improvement scholarship. This study provides important insights for UNDHARI in the scholarship recipient determination process using the PROMETHEE method as a decision-making tool.
Security Analysis of Web-based Academic Information System using OWASP Framework Rusydi Umar; Imam Riadi; Elfatiha, Muhammad Ihya Aulia
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2015

Abstract

The Academic Information System plays a crucial role in efficiently managing student, faculty, and campus administration data. However, system security needs to be a primary concern as it is vulnerable to cyber attacks. This research aims to analyze the security of the Academic Information System at the Muhammadiyah Business Institute Bekasi. The research method used is a comprehensive security analysis based on the OWASP framework. The study includes identifying potential vulnerabilities, penetration testing, and system improvement recommendations. Testing is conducted through simulated attacks based on the OWASP-released security risk list (OWASP Top Ten Most Critical Web Application Security Risks). The analysis results indicate that the system is vulnerable to Broken Authentication due to weak passwords, Sensitive Data Exposure due to URLs pointing to direct directories, and Security Misconfiguration due to open protocols. Furthermore, in CVSS scoring, Broken Authentication scored 4.8 (Medium), Sensitive Data Exposure and Security Misconfiguration scored 5.3 (Medium), Cross-Site Scripting scored 2.0 (Low) and Using Component with Known Vulnerabilities scored 2.0 (Low), while SQL Injection, XXE, Broken Access Control, Insecure Deserialization, and Insufficient Logging and Monitoring scored 0.0 (No Vulnerability). Recommendations for future system improvements include regularly updating the system to prevent new security vulnerabilities, better server configurations, and routine system monitoring to promptly anticipate suspicious activities.
Optimizing Social Media Promotion Strategy to Increase Customer Retention Rate (CRR) with GKG Customer Engagement Ifriza, Yahya Nur; Budiman, Kholiq; Ardiansyah, Adi Satrio
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2016

Abstract

In the digital age, businesses are increasingly relying on social media platforms to engage with their customers and foster brand loyalty. This paper presents a comprehensive study aimed at optimizing social media promotion strategies to enhance Customer Retention Rate (CRR) while utilizing the GKG (Get Keep Growth) Customer Engagement framework. By examining the interplay between social media promotion tactics and customer engagement metrics, we investigate how businesses can leverage data-driven insights to improve customer retention. Our research showcases the importance of tailoring social media campaigns to individual customer preferences and behavior, ultimately leading to increased customer satisfaction and loyalty. The results of the analysis of the development of the Customer Retention Rate graph were produced on FMIPA social media with an average CRR of 71% in the base case. Through a combination of data analysis and case studies, we provide actionable recommendations for businesses seeking to maximize the effectiveness of their social media promotion efforts and elevate their CRR with GKG customer engagement.
Layout Generation: Automated Components Placement for Advertising Poster using Transformer-based from Layout Graph Ramadhanti, Aisyah Dliya; Wiharja, Kemas Rahmat Saleh; Nurzakiah, Azmi; Yustiawan, Yoga
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2035

Abstract

In the digital era, graphic design plays an important role in a company's marketing strategy, especially advertising posters that can convey messages to the audience. However, the process of creating attractive and informative posters takes a long time, especially the component placement on the layout. This research aims to develop a layout generator system that automatically places components on the layout using one of the transformer-based models. The transformer-based model used is a Graph Transformer with edge features called SGTransformer, which accepts input data as a graph. SGTransformer consists of several graph transformer layers that will calculate the attention of node and edge features on the input layout graph. A layout graph describes the spatial relationship between components in a layout. The SGTransformer model was trained by using advertising poster datasets collected from social media. The performance of the model were evaluated using the evaluation metrics commonly used in the layout generation domain such as Alignment, Overlap, Max IoU, and FID. The scores obtained from each evaluation metric are 0.025, 1.274, 0.325, and 8.575 respectively. The model evaluation results show that SGTransformer can produce structured and more diverse layouts although there are still challenges such as overlap between components.  Code and other materials will be released at https://github.com/syahdeee/Layout-Generator.
Improving Software Defect Prediction Using a Combination of Ant Colony Optimization-based Feature Selection and Ensemble Technique Retnani, Windi Eka Yulia; Furqon, Muhammad 'Ariful; Setiawan, Juni
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2038

Abstract

Software defect prediction plays a vital role in enhancing software quality and minimizing maintenance costs. This study aims to improve software defect prediction by employing a combination of Ant Colony Optimization (ACO) for feature selection and ensemble techniques, particularly Gradient Boosting. This research utilized three NASA MDP datasets: MC1, KC1, and PC2, to evaluate the performance of four machine learning algorithms: Random Forest, Support Vector Machine (SVM), Decision Tree, and Naïve Bayes. The data preprocessing comprised handling class imbalance using SMOTE and converting categorical data into numerical representations. The results indicate that the integration of ACO and Gradient Boosting significantly enhances the accuracy of all four algorithms. Notably, the Random Forest algorithm achieved the highest accuracy of 99% on the MC1 dataset. The findings suggest that combining ACO-based feature selection with ensemble techniques can effectively boost the performance of software defect prediction models, offering a robust approach for early detection of potential software defects and contributing to improved software reliability and efficiency.
Aspect-level Sentiment Analysis on GoPay App Reviews Using Multilayer Perceptron and Word Embeddings Juandri, Henzi; Hasmawati; Bunyamin
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2041

Abstract

The increasing use of smartphone in Indonesia has encouraged the development of digital wallet applications, one of which is GoPay. Nowadays, GoPay has gained significant popularity among the public in Indonesia. Therefore, this research conducts aspect-level sentiment analysis to analyze user reviews of the GoPay application in more detail and depth. The sentiment analysis process in this study utilizes the Multilayer Perceptron (MLP) with fastText and word2vec as word embeddings. The dataset used is GoPay application reviews, which consist of 15,000 reviews collected from Google Play Store. The dataset is categorized into three main aspects: Feature and functionality, App Interface, and User Satisfaction. The stages of the research include data preparation, data preprocessing, word embeddings, model training, and model testing and evaluation. This research explores the effect of fastText and word2vec as word embeddings on model performance. Furthermore, this research examines the application of oversampling techniques, such as SMOTE and Random Oversampling. Based on the experiments conducted, utilizing fastText as word embeddings in MLP with a balanced dataset resulted the best model performance, with an F1-Score of 97%, Recall of 96%, and Precision of 95% for category classification. Then, for sentiment classification, using fastText on MLP with a balanced dataset resulted in a value of 98% for each of the F1-score, Recall, and Precision metrics. This research validates that MLP is effective for aspect-level sentiment analysis, delivering strong evaluation results.
Predicting the Sentiment of Review Aspects in the Peer Review Text using Machine Learning Basuki, Setio; Sari, Zamah; Tsuchiya, Masatoshi; Indrabayu, Rizky
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2042

Abstract

This paper develops a Machine Learning (ML) model to classify the sentiment of review aspects in the peer review text. Reviewers use the review aspect as paper quality indicators such as motivation, originality, clarity, soundness, substance, replicability, meaningful comparison, and summary during the review process. The proposed model addresses the critique of the existing peer review process, including a high volume of submitted papers, limited reviewers, and reviewer bias. This paper uses citation functions, representing the author's motivation to cite previous research, as the main predictor. Specifically, the predictor comprises citing sentence features representing the scheme of citation functions, regular sentence features representing the scheme of citation functions for non-citation sentences, and reference-based representing the source of citation. This paper utilizes the paper dataset from the International Conference on Learning Representations (ICLR) 2017-2020, which includes sentiment values (positive or negative) for all review aspects. Our experiment on combining XGBoost, oversampling, and hyper-parameter optimization revealed that not all review aspects can be effectively estimated by the ML model. The highest results were achieved when predicting Replicability sentiment with 97.74% accuracy. It also demonstrated accuracies of 94.03% for Motivation and 93.93% for Meaningful Comparison. However, the model exhibited lower effectiveness on Originality and Substance (85.21% and 79.94%) and performed less effectively on Clarity and Soundness with accuracies of 61.22% and 61.11%, respectively. The combination predictor was the best for the 5 review aspects, while the other 2 aspects were effectively estimated by regular sentence and reference-based predictors.
The Implementation of Pretrained VGG16 Model for Rice Leaf Disease Classification using Image Segmentation Suseno, Jody Ririt Krido; Azhar, Yufis; Minarno, Agus Eko
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 1, February 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i1.1592

Abstract

Rice is an agricultural sector that produces rice which is one of the staple foods for the majority of the population in Indonesia. In the cultivation of rice plants there are also factors that affect rice production and are not realized by farmers causing that they are late in handling and diagnosing symptoms and making rice production decline. Therefore, it is necessary to have an early diagnosis of rice plants to identify them correctly, quickly and accurately. Machine learning is one of the classification techniques to detect various plant diseases such as rice plants. There are several studies on machine learning using the Convolutional Neural Network with the VGG16 model to classify rice leaf diseases and using Image Segmentation techniques on rice leaf datasets for make the image becomes a form that is not too complicated to analyze. The data used in this research is Rice Leaf Disease which consists of 3 classes including Bacterial leaf blight, Brown spot, and Leaf smut. Then segmentation is carried out using two techniques, namely threshold and k means. Then data augmentation for make dataset used has a large and varied number and training using VGG16 model with hyperparameter tuning and obtained 91.66% accuracy results for scenarios with the k-means dataset.