Claim Missing Document
Check
Articles

Found 25 Documents
Search

Desain Kurikulum dan Konversi Hasil Kegiatan MBKM Program Studi Sarjana Matematika Edi Kurniadi; Mohamad Nurzaman; Nurul Gusriani
Jurnal Cendekia : Jurnal Pendidikan Matematika Vol 7 No 2 (2023): Jurnal Cendekia: Jurnal Pendidikan Matematika Volume 7 Nomor 2 Tahun 2023
Publisher : Mathematics Education Study Program

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/cendekia.v7i2.2364

Abstract

Program Merdeka Belajar Kampus Merdeka (MBKM) adalah suatu program untuk meningkatkan kompetensi tambahan mahasiswa atau capaian pembelajaran lulusan di luar program studinya. Kegiatan MBKM yang dimaksud adalah delapan bentuk kegiatan pembelajaran yaitu magang, asistensi mengajar, pertukaran pelajar, studi independent, penelitian, kewirausahaan, proyek kemanusian, dan membangun desa atau Kuliah Kerja Nyata (KKN) tematik. Metode penelitian yang digunakan adalah metode penelitian kualitatif khususnya metode studi kasus phenomenological research. Tujuan penelitian ini adalah untuk mendesain bagaimana cara mengonversi hasil kegiatan MBKM tersebut terkait kedudukannya, khususnya dalam kurikulum program studi sarjana matematika. Metode konversi yang diperoleh dapat dipergunakan tidak hanya di Program Studi Matematika tetapi untuk program studi-program studi lainnya yang menjalankan program MBKM bagi mahasiswanya. Tahapan pelaksanaan MBKM sendiri terdiri dari tiga tahapan yaitu pertama pendaftaran baik di tingkat program studi, mitra di laman kampus merdeka, ke dua monitoring dan evaluasi pelaksanaan MBKM seperti logbook laporan dan laporan kegiatan, dan yang ke tiga penilaian berupa presentasi dan laporan akhir. Setiap tahapan dibuat rubrik penilaian sebagai bahan untuk konversi hasil akhir kegiatan MBKM. Hasil utama yang diperoleh dari penelitian ini berupa teknik baku dalam cara menilai dan mengonversi hasil MBKM.
Implementasi Algoritma RSA (Rivest-Shamir-Adleman) pada Kriptografi Klasik Muhammad Zaky Zachary; Sisilia Sylviani; Edi Kurniadi
Mathematical Sciences and Applications Journal Vol. 4 No. 2 (2024): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v4i2.28863

Abstract

The implementation of the RSA (Rivest-Shamir-Adleman) cryptography algorithm, which is one of the most commonly used public-key cryptography algorithms. RSA provides high security and is widely used in information security applications such as data encryption, digital signature generation, and key exchange. This research documents the step-by-step implementation process of the RSA algorithm in classical cryptography, including key generation, data encryption, and decryption, leading to the generation of encryption and decryption tables for a specific key.
Pengamanan Nama Customer Shopee melalui Kombinasi Algoritma Hill Cipher Modifikasi dan Rail Fence Cipher Laily Wadil Muqadas; Sisilia Sylviani; Edi Kurniadi
Mathematical Sciences and Applications Journal Vol. 4 No. 2 (2024): Mathematical Sciences and Applications Journal
Publisher : Department of Mathematics, Faculty of Science and Technology Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22437/msa.v4i2.28865

Abstract

Science and technology development has made human activities turn into cyberspace activities, one of which is buying and selling. Shopee is one of the e-commerce platforms available. As an online-based platform, Shopee certainly stores lots of user data. Since August 1st, 2022, Shopee has made a policy regarding user data security by censoring the buyer’s name and phone number in the ordering process. This research discusses one way to secure buyer data through cryptography with the concept of super encryption. This concept itself combines more than one encryption method with the goal to create ciphertext that is difficult to solve. The chosen combination for this research is the modified Hill Cipher algorithm before proceeding with the Rail Fence Cipher encryption. Result obtained in this research is possible to be applied in Shopee buyer data security system, seen from the difficulty level of the ciphertext decryption.
AN EXACT SYMPLECTIC STRUCTURE OF LOW DIMENSIONAL 2-STEP SOLVABLE LIE ALGEBRAS Edi Kurniadi; Kankan Parmikanti; Badrulfalah
EduMatSains : Jurnal Pendidikan, Matematika dan Sains Vol 8 No 2 (2024): Januari
Publisher : Fakultas Keguruan dan Ilmu Pendidikan, Universitas Kristen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33541/edumatsains.v8i2.5319

Abstract

In this paper, we study a Lie algebra equipped by an exact symplectic structure. This condition implies that the Lie algebra has even dimension. The research aims to identify and to contruct 2-step solvable exact symplectic Lie algebras of low dimension with explicit formulas for their one-forms and symplectic forms. For case of four-dimensional, we found that only one class among three classes is 2-step solvable exact symplectic Lie algebra. Furthermore, we also give more examples for case six and eight dimensional of Lie algebras with exact symplectic forms which is included 2-step solvable exact sympletic Lie algebras. Moreover, it is well known that a 2-step solvable Lie algebra equipped by an exact symplectic form is nothing but it is called a 2-step solvable Frobenius Lie algebra.
THE LIE ALGEBRA su(3) REPRESENTATION WITH RESPECT TO ITS BASIS Edi Kurniadi; Kankan Parmikanti
Jurnal Matematika UNAND Vol 13, No 3 (2024)
Publisher : Departemen Matematika dan Sains Data FMIPA Universitas Andalas Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jmua.13.3.163-169.2024

Abstract

The eight-dimensional Lie algebra of 3×3 anti-Hermitian matrices withits traces equal to zero is denoted by su(3) whose Lie group is denoted by SU(3). Theresearch aims to provide all representations of su(3) with respect to its basis which isrealized on the three complex variables homogeneous polynomials P1 of degree three. The first step is to construct representations of SU(3) on the space H and the second step is to find all derived representations of SU(3). The obtained results are eight explicit formulas of representations su(3) ↷ P1.