Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control https://kinetik.umm.ac.id/index.php/kinetik <div class="row"> <p><strong>Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control</strong> <strong>published by Universitas Muhammadiyah Malang</strong>. Kinetik Journal is an open-access journal in the field of Informatics and Electrical Engineering. This journal is available for researchers who want to improve their knowledge in those particular areas and intended to spread the experience as a result of studies. </p> <p>KINETIK has been <strong>ACCREDITED</strong> with a grade "<a title="Sinta KINETIK" href="https://sinta.kemdikbud.go.id/journals/profile/1197" target="_blank" rel="noopener"><strong>SINTA 2</strong></a>" by the Ministry of Research, Technology, and Higher Education (RistekDikti) of The Republic of Indonesia as an achievement for the peer-reviewed journal which has excellent quality in management and publication. The recognition published in Director Decree <a title="SK KINETIK S2" href="https://arjuna2.kemdikbud.go.id/files/berita/Salinan_Kepdirjen_Risbang_Tentang_Peringkat_Akreditasi_Jurnal_Ilmiah_Periode_II_Tahun_2019-REVISI.pdf" target="_blank" rel="noopener"><strong>No. 10/E/KPT/2019</strong></a> April 4, 2019, is valid until 2023.</p> <p>KINETIK journal is a scientific research journal for Informatics and Electrical Engineering. It is open for anyone who desires to develop knowledge based on qualified research in any field. Anonymous referees evaluate submitted papers by single-blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the report as soon as possible. The research article submitted to this online journal will be peer-reviewed by at least 2 (two) reviewers. The accepted articles will be available online following the journal <strong>binary peer-reviewing process</strong>.</p> <p><strong>Binary peer review</strong> combines the rigor of peer review with the speed of open-access publishing. The authors will receive an accept or reject decision after the article has completed peer review. If the article is rejected for publication, the reasons will be explained to the author. If the article is accepted, authors are able to make minor edits to their articles based on reviewers’ comments before publication.</p> <p>On average, The Kinetik peer review process takes <strong>4 weeks</strong> from submission to an accept/reject decision notification. Submission to publication time typically <strong>takes 4 to 8 weeks</strong>, depending on how long it takes the authors to submit final files after they receive the acceptance notification.</p> <p>To improve the quality of articles, we inform you that each submitted paper <strong>must be written in English</strong> and at least <strong>25 articles referenced</strong> from primary resources, using Mendeley as referencing software and using Turnitin as a plagiarism checker.</p> <p style="background-color: #eee; padding: 5px 10px;"><strong>Publication schedule</strong>: February, May, August, and November | <a href="https://kinetik.umm.ac.id/index.php/kinetik/important-dates" target="_blank" rel="noopener">more info</a><br /><strong>Language</strong>: English<br /><strong>APC</strong>: 1.500.000 (IDR) / 100 (USD)* | <a title="Article Processing Charge" href="https://kinetik.umm.ac.id/index.php/kinetik/author-fees" target="_blank" rel="noopener">more info</a><br /><strong>Accreditation (S2)</strong>: Indonesian Ministry of Res. Tech. &amp; Higher Edu. <a title="SK KINETIK S2" href="https://arjuna2.kemdikbud.go.id/files/berita/Salinan_Kepdirjen_Risbang_Tentang_Peringkat_Akreditasi_Jurnal_Ilmiah_Periode_II_Tahun_2019-REVISI.pdf" target="_blank" rel="noopener"><strong>No. 10/E/KPT/2019</strong></a> April 4, 2019, effective until 2023. | <a href="https://kinetik.umm.ac.id/public/site/images/kinetik/sertifikat_kinetik.pdf" target="_blank" rel="noopener">show decree</a><br /><strong>Indexing</strong>: <a href="https://sinta.kemdikbud.go.id/journals/profile/1197" target="_blank" rel="noopener"><strong>SINTA 2</strong></a>, <a href="https://scholar.google.com/citations?hl=en&amp;view_op=search_venues&amp;vq=Kinetik%3A+Game+Technology%2C+Information+System%2C+Computer+Network%2C+Computing%2C+Electronics%2C+and+Control&amp;btnG=" target="_blank" rel="noopener">Scholar Metrics</a>, <a href="https://scholar.google.co.id/citations?user=oM1x2QsAAAAJ&amp;hl=id" target="_blank" rel="noopener">Google Scholar</a><br /><strong>OAI address</strong>: <a href="https://kinetik.umm.ac.id/index.php/kinetik/oai" target="_blank" rel="noopener">http://kinetik.umm.ac.id/index.php/kinetik/oai</a></p> <p>Ready for submitting a manuscript? Please follow [<a title="Author Guidelines" href="https://kinetik.umm.ac.id/index.php/kinetik/pages/view/Guidelines">Author Guidelines</a>] and click [<a title="Online Submission" href="https://kinetik.umm.ac.id/index.php/kinetik/author/submit/1">Submit</a>].</p> <p>Interested in becoming our reviewer/editor? Please fill out [<a href="https://docs.google.com/forms/d/e/1FAIpQLSe5XORAawzoMBl3lXNNjwV2j7WLeV0ZMgrwTvCFOIbK0XjTFw/viewform" target="_blank" rel="noopener">Reviewer Form</a>].</p> </div> <div class="row"> </div> <h4>Editorial Office of Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control</h4> <div class="col-xs-12 col-sm-12 col-md-12 col-lg-12 ikon"> <div class="col-xs-10 col-sm-10 col-md-11 col-lg-11"> <p>Department of Informatics and the Department of Electrical Engineering<br />Faculty of Engineering, Muhammadiyah University of Malang<br />Raya Tlogomas 246 Malang, Indonesia<br />Phone 0341-464318 Ext. 247</p> </div> <div class="col-xs-11 col-sm-11 col-md-11 col-lg-11"> </div> </div> <div class="col-xs-12 col-sm-12 col-md-12 col-lg-12 ikon"> <div class="col-xs-10 col-sm-10 col-md-11 col-lg-11">kinetik@umm.ac.id<br />Facebook: <a title="Follow our Facebook page" href="https://fb.me/jurnalkinetik" target="_blank" rel="noopener">https://fb.me/jurnalkinetik</a></div> <div class="col-xs-11 col-sm-11 col-md-11 col-lg-11"> </div> </div> <div class="col-xs-12 col-sm-12 col-md-12 col-lg-12 ikon"> <div class="col-xs-10 col-sm-10 col-md-11 col-lg-11">Support Contact: +6281511456946 (Fauzi Dwi Setiawan Sumadi)<br />Publisher: (0341) 464319 - ext. 243 (LPPI Universitas Muhammadiyah Malang)</div> <div class="col-xs-10 col-sm-10 col-md-11 col-lg-11"> </div> <div class="col-xs-10 col-sm-10 col-md-11 col-lg-11"> </div> </div> en-US It is a condition of publication that authors assign copyright or licence the publication rights in their articles to Journal KINETIK. Authors are themselves responsible for obtaining permission to reproduce copyright material from other sources. kinetik@umm.ac.id (Amrul Faruq) fauzisumadi@umm.ac.id (Fauzi Dwi Setiawan Sumadi) Fri, 01 Nov 2024 00:00:00 +0000 OJS 3.2.1.0 http://blogs.law.harvard.edu/tech/rss 60 Performance Comparison between Double Exponential Smoothing and Double Moving Average Methods in Seasonal Beef Demand https://kinetik.umm.ac.id/index.php/kinetik/article/view/1934 <p><em>Beef demand relies on seasonal patterns because it depends on feed supplies, especially in the rural areas, that still rely on natural feeds. Beef supply is regulated by the government as it is one of the highly demanded commodities. It is a livestock product containing nutritional value to meet the protein needs of the community. The supply is influenced by several factors such as beef production, beef consumption, and the people's income level. In order to anticipate the increasing demand for beef, it is necessary to conduct a forecast to estimate the demand for meat in the future. In forecasting, various methods were examined to choose the method with the lowest error rate. This research compared the Mean Absolute Percentage Error (MAPE) resulted from Double Exponential Smoothing (DES) and Double Moving Average (DMA) methods. Based on the test results and analysis on beef supplies in Madura, it can be concluded that the method with the lowest MAPE value is Double Exponential Smoothing, i.e. 9.50% with an alpha parameter of 0.5. Meanwhile, the test using the Double Moving Average method to determine the best MAPE value, resulted the best time order of 2 with a MAPE value of 29.8408%. After finding the parameter with the lowest MAPE value, that parameter was used for the data testing. In the measurement, the data used for the testing were the data of 1-year, 2-year, 3-year, and 4-year period. Each method has a level of error value that increases the same; the number of data entered can affect the MAPE value. Therefore, the more data entered, the lower the error value.</em></p> Bain Khusnul Khotimah, Setiani, Ana Yuniasti Retno Wulandari, Devie Rosa Anamisa Copyright (c) 2024 Bain Khusnul Khotimah, Setiani, Ana Yuniasti Retno Wulandari, Devie Rosa Anamisa https://creativecommons.org/licenses/by-nc-sa/4.0 https://kinetik.umm.ac.id/index.php/kinetik/article/view/1934 Fri, 01 Nov 2024 00:00:00 +0000 Advancements in Cooperative Mobile Robots Control Strategies for Large-Scale Material Transport: Review https://kinetik.umm.ac.id/index.php/kinetik/article/view/1992 <p><em>This paper explores groundbreaking advancements in control strategies for cooperative mobile robots used in large-scale material transport, a critical aspect of modern industrial, manufacturing, logistics, and construction sectors. It delves into the development of sophisticated systems that enable seamless coordination among multiple mobile robot systems. The research presents a novel hierarchical finite state automaton for dynamic mission adaptation and a null space-based control scheme for precise task execution and enhanced system resilience. The introduction of Mecanum wheels facilitates flexible movement and manipulation of materials, thereby increasing the operational efficiency and safety. Cutting-edge sensory technology, including LiDAR (Light Detection and Ranging), and the implementation of Robot Operating System are highlighted for their roles in enhancing autonomous navigation and intelligent operation. Additionally, the paper discusses the impact of centralized and decentralized control methods in ensuring safe cooperative object transport. The findings contribute to the vision of Industry 4.0 by promoting the integration of automation and robotic cooperation in complex environments and present a foundational blueprint for further research. Challenges for future work such as scalability, communication efficiency, collision avoidance, and energy efficiency are also considered, underscoring the need for ongoing development of robust and scalable robotic systems to address modern transport challenges.</em></p> Hendi Wicaksono Agung Copyright (c) 2024 Hendi Wicaksono https://creativecommons.org/licenses/by-nc-sa/4.0 https://kinetik.umm.ac.id/index.php/kinetik/article/view/1992 Fri, 01 Nov 2024 00:00:00 +0000 Exploring Trust, Privacy, and Security in Cloud Storage Adoption among Generation Z: An Extended TAM Approach https://kinetik.umm.ac.id/index.php/kinetik/article/view/2009 <p><em>The incorporation of cloud storage technology holds the promise of significantly enhancing efficiency in various sectors, particularly from the perspective of Generation Z, a demographic known for its meticulous consideration of technology acceptance factors, especially security. This research thoroughly examines the level of acceptance of cloud storage technology among Generation Z. By augmenting the Technology Acceptance Model (TAM) with five core factors and introducing three novel factors—Perceived Security, Perceived Privacy, and Trust—this study not only adheres to traditional acceptance models but also ventures into uncharted territories, marking a significant contribution to understanding technology acceptance. This study meticulously collected data from 408 Generation Z respondents who actively use cloud storage technology, employing an innovative questionnaire disseminated via an online platform. Through sophisticated PLS-SEM data analysis, the study confirmed the positive and significant impact of all tested hypotheses, underscoring the importance of attitudes, perceived benefits, and usability in fostering the intention to use cloud storage. Notably, the added dimensions of privacy and security emerged as critical in enhancing users' trust in cloud storage solutions. Furthermore, this study paves the way for future explorations into technology acceptance across diverse populations and settings, underscoring the critical role of security and privacy in shaping technology adoption decisions among emerging generations.</em></p> Rio Guntur Utomo, Rahmat Yasirandi Copyright (c) 2024 Rio Guntur Utomo, Rahmat Yasirandi https://creativecommons.org/licenses/by-nc-sa/4.0 https://kinetik.umm.ac.id/index.php/kinetik/article/view/2009 Fri, 01 Nov 2024 00:00:00 +0000 The Application of PROMETHEE Method in Determining Scholarship Recipients at University https://kinetik.umm.ac.id/index.php/kinetik/article/view/2014 <p>This study aims to use PROMETHEE method as a decision support system in determining the recipients of the Academic Achievement Improvement Scholarship at Universitas Dharmas Indonesia (UNDHARI). The methodological steps include problem identification, analysis, goal setting, and the application of PROMETHEE method. In this study, the criteria and alternatives have been identified to evaluate the scholarship recipients. The criteria weights are set, and the criteria preference types are determined. After obtaining the baseline data from the questionnaire assessments, pairwise preference values and multicriteria preference index values are calculated. Then, the rankings are compiled using Leaving Flow, Entering Flow, and Net Flow methods, resulting in the priority order of the scholarship recipients. The ranking results show that alternative 3 (IS) has the highest Net Flow value (0.30), while alternative 2 (AV) has the lowest Net Flow value (-0.35). Thus, the priority order from highest to lowest is IS, AV, RD, YM, and AV. In the context of Net Flow scores, these results indicate that alternative 3 (IS) has the greatest chance of receiving the academic achievement improvement scholarship. This study provides important insights for UNDHARI in the scholarship recipient determination process using the PROMETHEE method as a decision-making tool.</p> Wahyu Prima, Firmansyah Putra, Sopi Sapriadi, Rahmatul Hayati Copyright (c) 2024 Wahyu Prima, Firmansyah Putra, Sopi Sapriadi, Rahmatul Hayati https://creativecommons.org/licenses/by-nc-sa/4.0 https://kinetik.umm.ac.id/index.php/kinetik/article/view/2014 Fri, 01 Nov 2024 00:00:00 +0000 Security Analysis of Web-based Academic Information System using OWASP Framework https://kinetik.umm.ac.id/index.php/kinetik/article/view/2015 <p>The Academic Information System plays a crucial role in efficiently managing student, faculty, and campus administration data. However, system security needs to be a primary concern as it is vulnerable to cyber attacks. This research aims to analyze the security of the Academic Information System at the Muhammadiyah Business Institute Bekasi. The research method used is a comprehensive security analysis based on the OWASP framework. The study includes identifying potential vulnerabilities, penetration testing, and system improvement recommendations. Testing is conducted through simulated attacks based on the OWASP-released security risk list (OWASP Top Ten Most Critical Web Application Security Risks). The analysis results indicate that the system is vulnerable to Broken Authentication due to weak passwords, Sensitive Data Exposure due to URLs pointing to direct directories, and Security Misconfiguration due to open protocols. Furthermore, in CVSS scoring, Broken Authentication scored 4.8 (Medium), Sensitive Data Exposure and Security Misconfiguration scored 5.3 (Medium), Cross-Site Scripting scored 2.0 (Low) and Using Component with Known Vulnerabilities scored 2.0 (Low), while SQL Injection, XXE, Broken Access Control, Insecure Deserialization, and Insufficient Logging and Monitoring scored 0.0 (No Vulnerability). Recommendations for future system improvements include regularly updating the system to prevent new security vulnerabilities, better server configurations, and routine system monitoring to promptly anticipate suspicious activities.</p> Rusydi Umar, Imam Riadi, Muhammad Ihya Aulia Elfatiha Copyright (c) 2024 Muhammad Ihya Aulia Elfatiha, Imam Riadi, Rusydi Umar https://creativecommons.org/licenses/by-nc-sa/4.0 https://kinetik.umm.ac.id/index.php/kinetik/article/view/2015 Fri, 01 Nov 2024 00:00:00 +0000 Optimizing Social Media Promotion Strategy to Increase Customer Retention Rate (CRR) with GKG Customer Engagement https://kinetik.umm.ac.id/index.php/kinetik/article/view/2016 <p>In the digital age, businesses are increasingly relying on social media platforms to engage with their customers and foster brand loyalty. This paper presents a comprehensive study aimed at optimizing social media promotion strategies to enhance Customer Retention Rate (CRR) while utilizing the GKG (Get Keep Growth) Customer Engagement framework. By examining the interplay between social media promotion tactics and customer engagement metrics, we investigate how businesses can leverage data-driven insights to improve customer retention. Our research showcases the importance of tailoring social media campaigns to individual customer preferences and behavior, ultimately leading to increased customer satisfaction and loyalty. The results of the analysis of the development of the Customer Retention Rate graph were produced on FMIPA social media with an average CRR of 71% in the base case. Through a combination of data analysis and case studies, we provide actionable recommendations for businesses seeking to maximize the effectiveness of their social media promotion efforts and elevate their CRR with GKG customer engagement.</p> Yahya Nur Ifriza, Kholiq Budiman, Adi Satrio Ardiansyah Copyright (c) 2024 Yahya Nur Ifriza, Kholiq Budiman, Adi Satrio Ardiansyah https://creativecommons.org/licenses/by-nc-sa/4.0 https://kinetik.umm.ac.id/index.php/kinetik/article/view/2016 Fri, 01 Nov 2024 00:00:00 +0000 Layout Generation: Automated Components Placement for Advertising Poster using Transformer-based from Layout Graph https://kinetik.umm.ac.id/index.php/kinetik/article/view/2035 <p>In the digital era, graphic design plays an important role in a company's marketing strategy, especially advertising posters that can convey messages to the audience. However, the process of creating attractive and informative posters takes a long time, especially the component placement on the layout. This research aims to develop a layout generator system that automatically places components on the layout using one of the transformer-based models. The transformer-based model used is a Graph Transformer with edge features called SGTransformer, which accepts input data as a graph. SGTransformer consists of several graph transformer layers that will calculate the attention of node and edge features on the input layout graph. A layout graph describes the spatial relationship between components in a layout. The SGTransformer model was trained by using advertising poster datasets collected from social media. The performance of the model were evaluated using the evaluation metrics commonly used in the layout generation domain such as Alignment, Overlap, Max IoU, and FID. The scores obtained from each evaluation metric are 0.025, 1.274, 0.325, and 8.575 respectively. The model evaluation results show that SGTransformer can produce structured and more diverse layouts although there are still challenges such as overlap between components. Code and other materials will be released at https://github.com/syahdeee/Layout-Generator.</p> Aisyah Dliya Ramadhanti, Kemas Rahmat Saleh Wiharja, Azmi Nurzakiah, Yoga Yustiawan Copyright (c) 2024 Aisyah Dliya Ramadhanti Syahde, Kemas Rahmat Saleh Wiharja, Azmi Nurzakiah, Yoga Yustiawan https://creativecommons.org/licenses/by-nc-sa/4.0 https://kinetik.umm.ac.id/index.php/kinetik/article/view/2035 Fri, 01 Nov 2024 00:00:00 +0000 Improving Software Defect Prediction Using a Combination of Ant Colony Optimization-based Feature Selection and Ensemble Technique https://kinetik.umm.ac.id/index.php/kinetik/article/view/2038 <p>Software defect prediction plays a vital role in enhancing software quality and minimizing maintenance costs. This study aims to improve software defect prediction by employing a combination of Ant Colony Optimization (ACO) for feature selection and ensemble techniques, particularly Gradient Boosting. This research utilized three NASA MDP datasets: MC1, KC1, and PC2, to evaluate the performance of four machine learning algorithms: Random Forest, Support Vector Machine (SVM), Decision Tree, and Naïve Bayes. The data preprocessing comprised handling class imbalance using SMOTE and converting categorical data into numerical representations. The results indicate that the integration of ACO and Gradient Boosting significantly enhances the accuracy of all four algorithms. Notably, the Random Forest algorithm achieved the highest accuracy of 99% on the MC1 dataset. The findings suggest that combining ACO-based feature selection with ensemble techniques can effectively boost the performance of software defect prediction models, offering a robust approach for early detection of potential software defects and contributing to improved software reliability and efficiency.</p> Windi Eka Yulia Retnani, Muhammad 'Ariful Furqon, Juni Setiawan Copyright (c) 2024 Windi Eka Yulia Retnani, Muhammad 'Ariful Furqon, Juni Setiawan https://creativecommons.org/licenses/by-nc-sa/4.0 https://kinetik.umm.ac.id/index.php/kinetik/article/view/2038 Fri, 01 Nov 2024 00:00:00 +0000 Aspect-level Sentiment Analysis on GoPay App Reviews Using Multilayer Perceptron and Word Embeddings https://kinetik.umm.ac.id/index.php/kinetik/article/view/2041 <p>The increasing use of smartphone in Indonesia has encouraged the development of digital wallet applications, one of which is GoPay. Nowadays, GoPay has gained significant popularity among the public in Indonesia. Therefore, this research conducts aspect-level sentiment analysis to analyze user reviews of the GoPay application in more detail and depth. The sentiment analysis process in this study utilizes the Multilayer Perceptron (MLP) with fastText and word2vec as word embeddings. The dataset used is GoPay application reviews, which consist of 15,000 reviews collected from Google Play Store. The dataset is categorized into three main aspects: Feature and functionality, App Interface, and User Satisfaction. The stages of the research include data preparation, data preprocessing, word embeddings, model training, and model testing and evaluation. This research explores the effect of fastText and word2vec as word embeddings on model performance. Furthermore, this research examines the application of oversampling techniques, such as SMOTE and Random Oversampling. Based on the experiments conducted, utilizing fastText as word embeddings in MLP with a balanced dataset resulted the best model performance, with an F1-Score of 97%, Recall of 96%, and Precision of 95% for category classification. Then, for sentiment classification, using fastText on MLP with a balanced dataset resulted in a value of 98% for each of the F1-score, Recall, and Precision metrics. This research validates that MLP is effective for aspect-level sentiment analysis, delivering strong evaluation results.</p> Henzi Juandri, Hasmawati, Bunyamin Copyright (c) 2024 Henzi Juandri Juandri, Hasmawati Hasmawati, Bunyamin Bunyamin https://creativecommons.org/licenses/by-nc-sa/4.0 https://kinetik.umm.ac.id/index.php/kinetik/article/view/2041 Fri, 01 Nov 2024 00:00:00 +0000 Predicting the Sentiment of Review Aspects in the Peer Review Text using Machine Learning https://kinetik.umm.ac.id/index.php/kinetik/article/view/2042 <p>This paper develops a Machine Learning (ML) model to classify the sentiment of review aspects in the peer review text. Reviewers use the review aspect as paper quality indicators such as motivation, originality, clarity, soundness, substance, replicability, meaningful comparison, and summary during the review process. The proposed model addresses the critique of the existing peer review process, including a high volume of submitted papers, limited reviewers, and reviewer bias. This paper uses citation functions, representing the author's motivation to cite previous research, as the main predictor. Specifically, the predictor comprises citing sentence features representing the scheme of citation functions, regular sentence features representing the scheme of citation functions for non-citation sentences, and reference-based representing the source of citation. This paper utilizes the paper dataset from the International Conference on Learning Representations (ICLR) 2017-2020, which includes sentiment values (positive or negative) for all review aspects. Our experiment on combining XGBoost, oversampling, and hyper-parameter optimization revealed that not all review aspects can be effectively estimated by the ML model. The highest results were achieved when predicting Replicability sentiment with 97.74% accuracy. It also demonstrated accuracies of 94.03% for Motivation and 93.93% for Meaningful Comparison. However, the model exhibited lower effectiveness on Originality and Substance (85.21% and 79.94%) and performed less effectively on Clarity and Soundness with accuracies of 61.22% and 61.11%, respectively. The combination predictor was the best for the 5 review aspects, while the other 2 aspects were effectively estimated by regular sentence and reference-based predictors.</p> Setio Basuki, Zamah Sari, Masatoshi Tsuchiya, Rizky Indrabayu Copyright (c) 2024 Setio Basuki, Zamah Sari, Masatoshi Tsuchiya, Rizky Indrabayu https://creativecommons.org/licenses/by-nc-sa/4.0 https://kinetik.umm.ac.id/index.php/kinetik/article/view/2042 Fri, 01 Nov 2024 00:00:00 +0000