cover
Filter by Year
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control was published by Universitas Muhammadiyah Malang. journal is open access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the knowledge as the result of studies. KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desire to develop knowledge based on qualified research in any field. Submitted papers are evaluated by anonymous referees by double-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully within 4 - 8 weeks. The research article submitted to this online journal will be peer-reviewed at least 2 (two) reviewers. The accepted research articles will be available online following the journal peer-reviewing process.
Articles by issue : Vol 3, No 4, November 2018
11
Articles
‚Äč
IT Governance Audit with COBIT 5 Framework on DSS Domain

Jarsa, Vernando, Christianto, Kevin

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Original Source | Check in Google Scholar

Abstract

Information technology in organizations plays an important role for the continuity of their current business processes. Almost every organization already has information technology and dependence on their information technology. With the existence of information technology, it can help business process in the organization runs smoothly, and according to desired by every organization. But not infrequently the information technology that has been operating has problems that are very annoying and hinder the business process of the organization. Problems that exist in this company is at the time of maintenance and custom or repair process undertaken by the company. With the existence of the problem, the writer wanted to audit the existing governance in companies that have problems regarding aspects of information technology delivery. The author uses the COBIT 5 framework on the DSS domain (Deliver, Service, and Support) and focuses on the sub domains of DSS01 Manage Operations, DSS02 Manage Service Requests and Incidents, DSS03 Manage Problems, and DSS06 Manage Business Process Controls. The assessment method used is a capability model consisting of five capability levels. Based on the audit of information technology governance conducted by researchers using COBIT 5, then the conclusion of this study is the average capability level of the overall process obtained most of the process has reached level 1 performed process.

Purchase Recommendation and Product Inventory Management using Content Based Filtering with Sequential Pattern Mining Approach

Raharja, Aditya Cipta, Sitanggang, Imas Sukaesih, Buono, Agus

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Original Source | Check in Google Scholar

Abstract

Today, the product sales at XYZ Bookstore are increase in accordance to the trend in society. In that case, high sales must be supported by good supply and on target. Product sold based on needs of consumers will make possibility to achieve high sales. Using the Sequential Pattern Mining approach, we can specify sales patterns of products in relation to another products. SPADE (Sequential Pattern Discovery using Equivalence classes) is an algorithm that can be used to find sequential patterns in a large database. This algorithm finds frequent sequences of the sales transaction data using database vertical and join process of the sequence. The results of SPADE algorithm is frequent sequences which are used to form the rules. Those can be used as predictors of other items that will be purchased by consumers in the future. The result of this study is a lot of unique sequence appears that can provide the best advice for Merchandiser Officer, for example, there are 1.468 sequences that prove the customer who bought the product in Children‚??s Book category will always bought the same thing in the others day. This research produce some recommendation, one of the recommendation is Childrens Book category has a very high chance of being a Best Seller for a long time so that the purchasing officer on XYZ bookstore should ensure that the products supply of the category is always safe throughout the year. It means SPADE is successfully used to provide the advice and Merchandiser Officer must ensure the stock of that product is always available to avoid Lost Sales.

Feature Selection on Pregnancy Risk Classification Using C5.0 Method

Azhar, Yufis, Afdian, Riz

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Original Source | Check in Google Scholar

Abstract

The maternal mortality rate in Indonesia is still relatively high. This is caused by several factors, including the ignorance of pregnant women about the risk status of pregnancy. Several methods are proposed for early detection of the risk of a mothers pregnancy. However, no one has highlighted what features are most influential in the process of classifying the risk of pregnancy. In this research, we use data of pregnant women in one of the health centers in Malang, Indonesia, as a dataset. The dataset has 107 features, therefore, feature selection is needed for the classification process. We propose to use the C5.0 method to select important features while classifying dataset into low, high, and very high risk of pregnancy. C5.0 was chosen because this method has a better pruning algorithm and requires relatively smaller memory compared to C4.5. Another classification method (SVM, Naive Bayes, and Nearest Neighbor) is then used to compare the accuracy values between datasets that use all features with datasets that only use the selected features. The test results show that feature selection can increase accuracy by up to 5%.

Indonesian Dataset Expansion of Microsoft Research Video Description Corpus and Its Similarity Analysis

Rahutomo, Faisal, Hafidh Ayatullah, Ahmad

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Original Source | Check in Google Scholar

Abstract

This paper describes the academic base of an openly Indonesian dataset in Mendeley Data with DOI: 10.17632/d7vx5cc92y.1 [1]. The dataset is an Indonesian language expansion of Microsoft research video description corpus, an open dataset contains about 120 thousand sentences. The dataset is a useful resource because the sentences are a set of roughly parallel descriptions of more than 2,000 video snippets of 35 languages. Both paraphrase and bilingual relation are available but Indonesian description is not available in the dataset. Therefore, this paper describes the research effort to expand the dataset for the Indonesian language. The research collected 43,753 description texts of 1,959 short videos, parallel with Microsoft‚??s dataset. Adding more value to the dataset, similarity metrics calculations of the texts were done. The metrics were Cosine, Jaccard, euclidian, and Manhattan with average results were 0.22, 0.33, 2.38, and 6.08 respectively.

Gamification And GDLC (Game Development Life Cycle) Application For Designing The Sumbawa Folklore Game ‚?ĚThe Legend Of Tanjung Menangis (Crying Cape)‚?Ě

Husniah, Lailatul, Pratama, Bayu Fajar, Wibowo, Hardianto

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Original Source | Check in Google Scholar

Abstract

Sumbawa is popularly known as one of the regions in Indonesia, having a well- known folklore among the Sumbawa people, entitled the legend of Tanjung Menangis (Crying Cape). However, Tanjung Menangis is commonly recognized for its beauty than the stories contained. Therefore, a research is carried out by developing a game that is employed as a tool to introduce the story of Tanjung Menangis Legend as effort to preserve the original story of the mainland Sumbawa. The media game is chosen due to its favoured technology by children and adolescent as the target users of this research. This study applies Game Development Life Cycle (GDLC) method in the development stage which consists of several stages includinng: pre-production, production, testing, and post-production by adding an element of gamification. The game is tested on students at Labangka Elementary School in Sumbawa district in an age range of 10-15 years. After playing the game, the majority of respondents states that students gain knowledge about the Legend of Tanjung Menangis as reported from the results of the t- test with a probability value of 7.369x10-41, which is far below the value of őĪ = 0.05. This result means that there was an increase in user knowledge of application. The test results also showed that all respondents agreed that the game of The Legend of Tanjung Menangis was used as one of the media used to introduce the story of the original Sumbawa people. In addition, the testing results as conducted with playtesting and gameflow test achieved good grades, with a range of values 4.5-4.81 of the seven elements tested, including: Concentration, Challenge, Player Skills, Control, Clear Goals, Feedback, and Immersion.

An Election Energy Threshold Based Multi-Hop Routing Protocol in a Grid-Clustered Wireless Sensor Network

Dadah, Funom Samuel, Ore-Ofe, Ajayi, Usman, Aliyu D, Mshelia, Y A, Babatunde, M O

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Original Source | Check in Google Scholar

Abstract

Owing to the limited energy of sensor nodes (SNs) in a wireless sensor network (WSN), it is important to reduce and balance the energy consumption of the SNs in order to extend the WSN lifetime. Clustering mechanism is a highly efficient and effective mechanism for minimizing the amount of energy that SNs consume during the transmission of data packets. In this paper, an election energy threshold based multi-hop routing protocol (mEEMRP) is presented. In order to minimize energy consumption, this routing protocol uses grid clustering, where the network field is divided into grid clusters. SNs in each grid cluster select a cluster head (CH) based on a weight factor that takes the node location, node‚??s residual energy (RE) as well as the node‚??s distance from the base station into consideration. An energy efficient multi-hop routing algorithm is adopted during the transmission of data packets from the cluster heads (CHs) to the base station (BS). This multi-hop routing algorithm uses an election energy threshold value, T¬≠nhCH that takes into consideration the RE of CHs as well as the distance between CHs. Simulation results show a 1.77% and 10.65% improvement in terms of network lifetime for two network field scenarios over Energy Efficient Multi-hop Routing Protocol (EEMRP).

DBscan Algorithm and Decision Tree to Automate Trip Purpose Detection

Hidayah, Lailatul, Wulandari, Catur

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Original Source | Check in Google Scholar

Abstract

One of transportation research topic is detecting trip purpose. Given a collection of GPS mobility records, researchers endeavored to infer useful information such as trip, travel mode, and trip purpose. Obtaining these attributes will help researcher in transportation modelling.  This work proposed an approach in defining a trip or a trip segmentation which is a part of trip purpose problem as well as inferring the trip purpose. By Utilizing Dbscan clustering algorithm, decision tree, and some useful features, we are able to detect the trips and their purposes as well as building the model to automate the trip derivation.

A Three Area Interconnected Power System Network Load Frequency Controller Simulator

Muritala, Ibrahim Olawale, Mu√ʬĬôazu, M B, Adedokun, E A

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Original Source | Check in Google Scholar

Abstract

This paper presents a MATLAB simulator of a three area interconnected power system of Thermal-Gas-Hydro. Nonlinearities intrinsic in the interconnected power system of communication delay, Generation Rate Constraint and Generation Dead Band were measured. Bat Inspired Algorithm was exploited to select the favourable parameters of the Model Predictive Controller and the Super Conducting Magnetic Energy Storage. Model Predictive Controller was the subordinate controller employed to minimalize the Area Control Error, Super Conducting Magnetic Energy Storage was the energy buffer to balance the load demand and the power generated. Integral Time Absolute Error was the performance metrics employed to minimize the Area Control Error. Parametric dissimilarity was tested on the inter-connected power system to observe the efficacy of the controller. Step load perturbation of  was concurrently applied to the three-area inter-connected network,  was introduced to the thermal generating unit,  was introduced to the gas and hydro generating unit.  Value of the tie-line was introduced to examine its effect on the frequency deviation. The results performed better when compared with Model Predictive Controller joined with Super Conducting Magnetic Energy Storage against the Model Predictive Controller without Super Conducting Magnetic Energy Storage in relations to settling time, overshoot and undershoot.

Genetic Algorithm Application for Navigation System on Virtual Shop

Syahputra, Andi Nagoro, Kholimi, Ali Sofyan, Husniah, Lailatul

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Original Source | Check in Google Scholar

Abstract

Online shop becomes one of the updated common types of shop in the era of rapidly grown technology development, yet this system provides its drawbacks. One of the problems which commonly found is a great deal of scamming practices for profit-oriented aims. Virtual shop is defined as a virtual reality application allowing its user to experience shopping in virtual world. A navigation system is required to enable its users in finding out the expected product. Genetic algorithm is one of many search algorithms based on natural selection and natural genetics. On this algorithm, data and string are executed through process of selection to generate problem solving solution. Using this algorithm, the navigation system is proved to be successful on generating path leading to expected product in the virtual shop.

Analysis Tunneling IPv4 and IPv6 on VoIP Network

Haji, Muhammad Ismu, E.S.G.S, Sugeng Purwantoro, Arifin, Satria Perdana

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 4, November 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Original Source | Check in Google Scholar

Abstract

Using of IP addresses is currently still using IPv4. Meanwhile, the availability of the IPv4 address is gradually diminishes. IPv4 has a limited address capacity. IPv6 was developed with a capacity greater than IPv4. Connect between IPv4 and IPv6 without having to interfere with the existing infrastructure. So, methods like tunneling are needed. Tunneling builds a way that IPv4 and IPv6 can communicate. 6to4 tuning makes IPv6 able to communicate with IPv4 over IPv4 infrastructure. Real time communication is needed by internet users to be able to connect to each other. One of the real time communications is VoIP. To find out the quality of tunneling implemented on a VoIP network, it will analyze QoS such as delay, packet loss, and jitter. Delay obtained is 20,01ms for IPv4, 19,99ms for IPv6 and 20,03ms for 6to4. Packet loss obtained 0,01% for IPv4, IPv6 0,01% and 6to4 0,08%. The obtained jitter is 7,96ms for IPv4, IPv6 7.39ms, and 8,48 for 6to4. The test results show that using IPv6 gets a better QoS value than using IPv4 and 6to4 tunneling. The results using 6to4 tunneling obtained the highest QoS value between IPv4 and IPv6. Implementation using 6to4 tunneling results in high results because, IPv6 packets that are sent are wrapped into the IPv4 form to get through the IPv4 infrastructure.