cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
ISSN : 25032259     EISSN : 25032267     DOI : -
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control was published by Universitas Muhammadiyah Malang. journal is open access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the knowledge as the result of studies. KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desire to develop knowledge based on qualified research in any field. Submitted papers are evaluated by anonymous referees by double-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully within 4 - 8 weeks. The research article submitted to this online journal will be peer-reviewed at least 2 (two) reviewers. The accepted research articles will be available online following the journal peer-reviewing process.
Arjuna Subject : -
Articles 526 Documents
Application of a Radio Frequency Identification System for Supporting the Performance of Motorcycle Parking in Narotama University Mudjanarko, Sri Wiwoho; Purworusmiardi, Tubagus
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 2, No 4, November-2017
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (452.247 KB) | DOI: 10.22219/kinetik.v2i4.528

Abstract

The increasing number of motorcycles in Indonesia creates enormous problems because of the hectic involved; thus, parking management becomes a big challenge. The applicability and the possibility of a Radio Frequency Identification (RFID) were studied in finding the solution of this pressing issue. The study was conducted at Narotama University which is located in Surabaya, East Java. This study was expected to find solutions related to provide parking facilities using RFID method to identify motorcycles. The goal of this study is to determine the number of motorcycle vehicles which is being parked electronically to facilitate the management in organizing motorcycle in parking facilities. Hence, the management can arrange the requirement of parking system in the future. From the study, it can be concluded that RFID can make the process faster and easier so that the line can significantly be reduced and provide more user friendly system because the system will give the information about parking availability. Moreover, this RFID parking system and the software can be more reliable and secured due to more complete and accurate data in the registration process required to the users.
Application Kohonen Network and Fuzzy C Means for Clustering Airports Based on Frequency of Flight Rahmalia, Dinita; Herlambang, Teguh
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (243.442 KB) | DOI: 10.22219/kinetik.v3i3.608

Abstract

In Indonesia, the demands of air tranportation for reaching destination increase rapidly. Based on the flight schedule in airports spreading in Indonesia, the airports have different flight demand rate so that it requires clustering. This research will use two methods for clustering : kohonen network and Fuzzy C Means (FCM).Kohonen network is the type neural network which uses unsupervised training.Kohonen network uses weight vectors for training while FCM uses degree of membership. Both kohonen network and FCM, inputs are represented by the number of departure and arrival of airline in one day. For kohonen network, we update weight matrices so that minimizing the sum of optimum euclidean distance. For FCM, we update degrees of membership so that minimizing the objective function value.From the simulations, we can cluster the airports based on the number of departure and arrival of airline.
Improving MoWaS Application Backbone System for The Effectiveness of Responsive Behaviour in Facing Crime Threats and Emergency Situations Arizal, Arif; Alim, Syariful
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 2, No 4, November-2017
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.5 KB) | DOI: 10.22219/kinetik.v2i4.250

Abstract

MoWaS is a mobile-based supporting application aiming to improve the rapid response against crime crime and emergency situations. The evaluation of MoWaS version 1.0 has 3 flaws. First, it is unable to create a group. Second, the MoWaS version 1.0 application is able to detect the current location of the alert sender but there is no feature to display information about nearby MoWaS application users. Third, MoWaS application version 1.0 is also not integrated with the official service or government agency related to the types of occurring crime. The results of the design revision and analysis were made including the MoWaS system architecture design, the MoWaS system flow described in the form of flowchart, and the MoWaS system interface design. The results of the analysis and design of MoWaS backbone system can be used as the basis for improvement of MoWaS system development. Hence, it can be concluded that the MoWaS application version 2.0 has a better work system than the previous version.
Implementasi Framework Twitter Bootstrap Dalam Perancangan Aplikasi Penerimaan Mahasiswa Baru Berbasis Web Rosid, Mochamad Alfan; Jakaria, Ribangun Bamban
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 1, No 3, November-2016
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (324.606 KB) | DOI: 10.22219/kinetik.v1i3.121

Abstract

Dalam mendesain template aplikasi berbasis web, programmer web menggunakan sintaks-sintaks CSS untuk membuat tampilan menjadi lebih menarik. Dalam perkembangannya banyak tool-tool atau framework CSS yang dapat dimanfaatkan untuk mempercepat pengerjaan desain template web, diantaranya Gumby, Foundation, Less Framework, Blueprint CSS dan Twitter Bootstrap. Dari beberapa framework CSS tersebut, Twitter Bootstrap hadir dengan tutorial dan dokumentasi yang berlimpah serta memiliki fitur responsive. Pada penelitian ini penulis megimplementasikan framework Twitter Bootstrap pada perancangan aplikasi penerimaan mahasiswa baru berbasis web. Tahapan yang diambil dalam perancangan Aplikasi Penerimaan Mahasiswa Baru ini diawali dengan mendownload Twitter Bootstrap dari website resminya dan melakukan ekstraksi ke folder project setelah itu baru class-class yang disediakan oleh Twitter Bootstrap dapat dipanggil dalam pengerjaan desain aplikasi. Dengan penerapan framework twitter bootstrap ini pengerjaan desain aplikasi lebih cepat karena tidak perlu lagi memikirkan sintaks-sintaks css dan menghasilkan template yang responsive, ringan dan simple.
Extraction of Eye and Mouth Features for Drowsiness Face Detection Using Neural Network Fitrianingsih, Elis; Setyati, Endang; Zaman, Luqman
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 2, May-2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (626.909 KB) | DOI: 10.22219/kinetik.v3i2.589

Abstract

Facial feature extraction is the process of searching for features of facial components such as eyes, nose, mouth and other parts of human facial features. Facial feature extraction is essential for initializing processing techniques such as face tracking, facial expression recognition or face shape recognition. Among all facial features, eye area detection is important because of the detection and localization of the eye. The location of all other facial features can be identified. This study describes automated algorithms for feature extraction of eyes and mouth. The data takes form of video, then converted into a sequence of images through frame extraction process. From the sequence of images, feature extraction is based on the morphology of the eyes and mouth using Neural Network Backpropagation method. After feature extraction of the eye and mouth is completed, the result of the feature extraction will later be used to detect a person’s drowsiness, being useful for other research.
Tingkat Kematangan Infrastruktur Teknologi Informasi Pada Domain Acquire and Implement Menggunakan COBIT 4.1 (Studi Kasus: UPT Perpustakaan Universitas Pembangunan Nasional “VETERAN” Jawa Timur) Alit, Ronggo; Pratiwi, Icha Dian; idhom, Mohammad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 2, No 3, August-2017
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (550.543 KB) | DOI: 10.22219/kinetik.v2i3.32

Abstract

Berdasarkan hasil wawancara UPT Perpustakaan kekurangan perangkat komputer dan masih menggunakan server milik UPT Telematika serta kecepatan akses wifi akan lambat jika banyak yang menggunakan sehingga perlu dilakukan penelitian ini yang bertujuan untuk mengetahui tingkat kematangan dan menghasilkan rekomendasi guna meningkatkan pengelolaan infrastruktur teknologi informasi. Penelitian dilakukan menggunakan COBIT Framework 4.1 tahap penelitian diawali dengan analisa data wawancara kemudian diidentifikasi IT goals, IT process, serta Control Objectives. Perhitungan maturity level untuk mengetahui gap antara kondisi sekarang dengan kondisi yang diharapkan dan rekomendasi digunakan untuk mengatasi gap tersebut. Dari hasil penelitian yang dilakukan diperoleh 4 IT Goals, 10 IT Processes dan 17 detailed control objectives. Karena pemilihan subdomain disesuaikan dengan masalah dan kebutuhan maka subdomain yang digunakan adalah PO3, PO7, AI3 dan AI5. Ditemukan gap sebesar 1.5 dan maturity level sebesar 2.5 sehingga berada pada level 3 artinya perpustakaan telah memiliki mekanisme dan prosedur yang jelas mengenai tata cara dan manajemen teknologi informasi.
Pengembangan Mekanisme Otentikasi Dan Otorisasi Manajemen Config Pada Kasus Shared Web Hosting Berbasis Linux Container Saifuddin, Saifuddin; Ijtihadie, Royyana Muslim; Pratomo, Baskoro Adi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 1, No 2, August-2016
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (688.279 KB) | DOI: 10.22219/kinetik.v1i2.27

Abstract

A large part of the service providers website using an operating system Linux, when one of the websites in the Shared web can be taken over, most likely other websites will also be mastered by reading config connecting to the database, the mechanism used to read a config file with the command in linux by default is available, using the command ln -s also known by the term symlink who can read the directory where the web, although different config directory.The results show config on web applications that are in the directory in a single server can be read using these methods but can not be decoded to read user, password, and dbname, because it has given authorization can be decoded only from the directory already listed. on testing performance for latency, memory, and CPU system be followed, to get good results the previous system. The test results using the cache, the response time generated when accessed simultaneously by 20 click per user amounted to 941.4 ms for the old system and amounted to 786.6 ms.
Front and Back Matter Volume 2 Nomor 4 Waskito, Adhitya Dio
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 2, No 4, November-2017
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1783.188 KB) | DOI: 10.22219/kinetik.v2i4.601

Abstract

Perbaikan Mekanisme Load Balancing Untuk Komputasi Klaster Pada Kondisi Dinamis Zarkasi, Mohammad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 2, No 2, May-2017
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (993.142 KB) | DOI: 10.22219/kinetik.v2i2.154

Abstract

Salah satu permasalahan yang sering terjadi pada lingkungan komputasi klaster adalah terjadinya beban yang tidak seimbang yang dapat menurunkan Quality of Service (QoS). Oleh sebab itu, dibutuhkan metode load balancing yang handal dalam pendistribusian beban. Pada beberapa kasus, metode load balancing dinamis gagal berperan sebagai metode load balancing yang optimal jika lingkungan implementasi tidak sesuai dengan lingkungan yang diasumsikan saat metode tersebut dikembangkan. Dalam penelitian ini diusulkan metode load balancing adaptif dengan menggunakan algoritma reinforcement learning (RL) yang mampu beradaptasi terhadap perubahan lingkungan. Hasil pengujian menunjukkan bahwa kinerja dari metode load balancing yang diusulkan lebih efisien dibandingkan dengan metode load balancing dinamis baik pada kondisi lingkungan tidak mengalami beban dengan peningkatan total waktu eksekusi sebesar 45% maupun pada saat lingkungan mengalami beban yang tidak seimbang dengan peningkatan waktu eksekusi sebesar 21%.
IT Governance Audit with COBIT 5 Framework on DSS Domain Jarsa, Vernando; Christianto, Kevin
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (247.426 KB) | DOI: 10.22219/kinetik.v3i4.665

Abstract

Information technology in organizations plays an important role for the continuity of their current business processes. Almost every organization already has information technology and dependence on their information technology. With the existence of information technology, it can help business process in the organization runs smoothly, and according to desired by every organization. But not infrequently the information technology that has been operating has problems that are very annoying and hinder the business process of the organization. Problems that exist in this company is at the time of maintenance and custom or repair process undertaken by the company. With the existence of the problem, the writer wanted to audit the existing governance in companies that have problems regarding aspects of information technology delivery. The author uses the COBIT 5 framework on the DSS domain (Deliver, Service, and Support) and focuses on the sub domains of DSS01 Manage Operations, DSS02 Manage Service Requests and Incidents, DSS03 Manage Problems, and DSS06 Manage Business Process Controls. The assessment method used is a capability model consisting of five capability levels. Based on the audit of information technology governance conducted by researchers using COBIT 5, then the conclusion of this study is the average capability level of the overall process obtained most of the process has reached level 1 performed process.

Page 5 of 53 | Total Record : 526