Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : UNEJ e-Proceeding

Application of Fuzzy TOPSIS Method in Scholarship Interview Abduh Riski; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2016: Proceeding The 1st International Basic Science Conference
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Decision-making problem is the process of determines the best options of all feasible alternative. In some problems, decision-making process involves the attributes of linguistic as in scholarship interview, which is one of the multi-objective decision-making (MODM) problem. The aim of this paper is to apply Fuzzy TOPSIS method in scholarship interview. Scholarship Interview that defined in this paper was implemented to  candidates by  questions for each candidate and assessed by  interviewers. Technique for the Order of Preference by Similarity to Ideal Solution (TOPSIS) method is a multi-attribute decision-making (MADM) method. The basic principle of the TOPSIS method is to choose the alternative that has similarity with the ideal solution. So that the TOPSIS method can be applied in a scholarship interview, in the first step is used fuzzy method to reduce the -dimensional objective space to be one-dimensional objective space. Then applied the TOPSIS steps by fuzzy approaching to find the best alternative. In this paper will be used a scholarship interview case to illustrate more obviously steps. With this approach, the determination of the scholarship recipients can be more powerful and assured.
A Zero Crossing-Virus Evolutionary Genetic Algorithm (VEGA) to Solve Nonlinear Equations M. Ziaul Arif; Zainul Anwar; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2016: Proceeding The 1st International Basic Science Conference
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Nonlinear equation is a mathematical problem that is quite difficult to solve. Its analytic solution is not easily discovered. There are several methods used to solve nonlinear equations and the obtained results is in the form of approximation to the analytical solution. Most of the numerical method need appropriate initial value to perform the accuration of the method. However, it will diverge if the initial value is inappropriate. Therefore, we propose discovering the solutions of nonlinear equations by applying metaheuristic methods. In this paper, we present the virus Evolutionary Genetic Algorithm (VEGA) combined with Zero Crossing Method at an early stage to solve nonlinear equations. This study was conducted to test the performance and accuracy of the combined both of the method by providing some examples.
PENGKODEAN TEKS MENGGUNAKAN MODIFIKASI ALGORITMA ELECTRONIC CODE BOOK DAN MERKLE-HELLMAN KNAPSACK Innafajri Insyirah; Kiswara Agung Santoso; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data security needs to be maintained so that the messages sent to someone are not known by an unauthorized users. One of the data security techniques that can be applied is cryptography. Cryptography is a science and art to keep messages secure when messages are sent from one place to another. In this study, modification of Electronic Code Book and Merkle-Hellman Knapsack algorithms will be applied to secure messages. This research uses Matlab to create a program. The weaknesses of ECB and Merkle-Hellman Knapsack algorithms will be overcome by modifying key and XOR operations. The result of ciphertext is a random numbers which are difficult to understand by unauthorized users. In addition, the message pattern on the same plaintext no longer produces the same ciphertext. Ciphertext can be decrypted well even though the size is two times or longer than plaintext. This is proved by plaintext from the results of decryption is same as the original plaintext. Keywords: Cryptography, Electronic Code Book, Merkle-Hellman Knapsack.
PENGAMANAN TEKS MENGGUNAKAN ALGORITMA TRANSPOSISI DAN MODIFIKASI SANDI MORSE Rizki Gangsar Septiono; Kiswara Agung Santoso; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Humans as social beings communicate to exchange information. Information has many forms including text data, sound, images, and so on. Not all information is freely accessible. Information security is needed to prevent information from being misused by irresponsible parties. Cryptography studies how to convert information into a form that is unknown except for the sender and recipient of the information. Cryptography is divided into two, classical cryptography and modern cryptography. One form of cryptography that can be found around us is the use of Morse code in scouting. Classical cryptography and modern cryptography can be combined to increase the security of the algorithms used in hiding information. In this article, the transposition algorithm is applied in binary digits. Keys in the form of ASCII characters are converted into binary using modified Morse code and operated with plaintext. The results showed that the combination of transposition algorithm and Morse code modification adds complexity so that the proposed algorithm is difficult for cryptanalysts to solve. Keywords: Cryptography, Morse Code, Transposition Algorithm.
PENERAPAN JARINGAN SARAF TIRUAN BACKPROPAGATION UNTUK MEMPREDIKSI INDEKS HARGA SAHAM LQ45 Febia Zein Aziza; Abduh Riski; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Stock price movements are very volatile from time to time. The stock price movement is influenced by many factors, including company performance, dividend risk, the country’s economic conditions, and inflation rate. The existence of these complex factors makes stock price movements challenging to predict. Investors need stock price predictions to see the company’s stock investment prospects in the next period. The method that can predict stock prices is Backpropagation. The Backpropagation method is an algorithm that adopts a human mindset systematically to minimize the error rate by adjusting the weights based on differences in output and the desired target. This study uses historical stock index data for LQ45 from February 26, 2019 – February 26, 2021, namely the closing price as an input and the opening price as the target. The best network model from the Backpropagation method uses a binary sigmoid activation function with nine neurons in the hidden layer. The testing accuracy value is 95.2481% (MAPE), and the error value is 0.000266 (MSE). The error value shows that the prediction model results are excellent. Keywords: Backpropagation, index, prediction, stock.