Claim Missing Document
Check
Articles

MODELISASI KURSI DENGAN PENGGABUNGAN HASIL DEFORMASI BENDA-BENDA RUANG MENGGUNAKAN KURVA BEZIER Nadzira, Annisa Ayu; Juliyanto, Bagus; Kamsyakawuni, Ahmad
Majalah Ilmiah Matematika dan Statistika Vol 21 No 2 (2021): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v21i2.20733

Abstract

Chairs are needed by humans to do some work, especially students and office workers. The parts contained in the chair are the chair legs, chair legs eats and chair backs. The purpose of this study is to obtain variations in the shape of office chairs using Bezier curves and incorporate the results of deformation of space geometric objects. In modeling this chair, it is divided into several stages, namely first, building the chair leg components. This chair leg component consists of chair wheels, connecting two wheels with tube deformation, modeling the chair leg branch components and modeling chair leg supports. Second, namely the model of the chair leg seat. Chair leg seat consists of regular hexagon prism deformation and regular quadrangle prism deformation. The third is the modelization of the back of the chair by using a rectangular prism model. The result of combining several components of the chair using one modeling axis produces 36 chair models, with special provisions, namely that the seat support parts can only be joined using a tube.
PENERAPAN METODE NEWTON-COTES OPEN FORM 5 TITIK UNTUK MENYELESAIKAN SISTEM PERSAMAAN NONLINIER arif, M. Ziaul; Farida, Yasmin; Kamsyakawuni, Ahmad
Unnes Journal of Mathematics Vol 6 No 1 (2017)
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/ujm.v6i1.15669

Abstract

Dalam Artikel ini, kami membahas mengenai metode penyelesaian sistem persamaan nonlinier dengan menggunakan 2 (dua) skema baru yaitu skema 3 langkah. Skema-skema tersebut merupakan skema yang didasarkan pada metode Newton dan dikembangkan dengan memanfaatkan metode integrasi numerik Newton-Cotes Open Form 5 titik. Berdasarkan analisis konvergensi, skema baru tersebut memiliki konvergensi berorde-3 dan berorde-4. Beberapa contoh hasil numerik dan perbandingan dengan metode Newton ditunjukkan pada bagian akhir artikel ini.
SISTEM PENDUKUNG KEPUTUSAN PEMASARAN MOBIL DI TOYOTA AUTO2000 JEMBER DENGAN METODE FUZZY TOPSIS Ari Susiana; Ahmad Kamsyakawuni; Abduh Riski
JURNAL SAINTIKA UNPAM Vol 3, No 1 (2020)
Publisher : Program Studi Matematika FMIPA Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/jsmu.v3i1.4215

Abstract

Angka penjualan mobil di Indonesia mengalami peningkatan dari waktu ke waktu. Pihak dealer perlu menentukan kriteria mobil yang sesuai kebutuhan konsumen sebagai strategi pemasaran sehingga dapat meningkatkan angka penjualan. Penelitian ini dilakukan untuk menentukan tipe mobil MPV (Multi Purpose Vehicle) terbaik yang dipasarkan di dealer Toyota Auto2000 Jember. Metode yang digunakan yaitu metode fuzzy TOPSIS dengan empat kriteria yaitu harga, keekonomisan perawatan, kenyamanan, dan model mobil. Hasil yang didapatkan yaitu urutan peringkat tipe mobil MPV terbaik diantaranya, Toyota Avanza, Innova, Sienta, Voxy, Alphard, dan Vellfire.
Application of Fuzzy TOPSIS Method in Scholarship Interview Abduh Riski; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2016: Proceeding The 1st International Basic Science Conference
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Decision-making problem is the process of determines the best options of all feasible alternative. In some problems, decision-making process involves the attributes of linguistic as in scholarship interview, which is one of the multi-objective decision-making (MODM) problem. The aim of this paper is to apply Fuzzy TOPSIS method in scholarship interview. Scholarship Interview that defined in this paper was implemented to  candidates by  questions for each candidate and assessed by  interviewers. Technique for the Order of Preference by Similarity to Ideal Solution (TOPSIS) method is a multi-attribute decision-making (MADM) method. The basic principle of the TOPSIS method is to choose the alternative that has similarity with the ideal solution. So that the TOPSIS method can be applied in a scholarship interview, in the first step is used fuzzy method to reduce the -dimensional objective space to be one-dimensional objective space. Then applied the TOPSIS steps by fuzzy approaching to find the best alternative. In this paper will be used a scholarship interview case to illustrate more obviously steps. With this approach, the determination of the scholarship recipients can be more powerful and assured.
A Zero Crossing-Virus Evolutionary Genetic Algorithm (VEGA) to Solve Nonlinear Equations M. Ziaul Arif; Zainul Anwar; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2016: Proceeding The 1st International Basic Science Conference
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Nonlinear equation is a mathematical problem that is quite difficult to solve. Its analytic solution is not easily discovered. There are several methods used to solve nonlinear equations and the obtained results is in the form of approximation to the analytical solution. Most of the numerical method need appropriate initial value to perform the accuration of the method. However, it will diverge if the initial value is inappropriate. Therefore, we propose discovering the solutions of nonlinear equations by applying metaheuristic methods. In this paper, we present the virus Evolutionary Genetic Algorithm (VEGA) combined with Zero Crossing Method at an early stage to solve nonlinear equations. This study was conducted to test the performance and accuracy of the combined both of the method by providing some examples.
Pengamanan Citra Dengan Operator Algoritma Genetika Abduh Riski; Ahmad Saiful Rizal; Ahmad Kamsyakawuni
Fountain of Informatics Journal Vol 4, No 1 (2019): Mei
Publisher : Universitas Darussalam Gontor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21111/fij.v4i1.2906

Abstract

AbstrakPerkembangan teknologi komputer yang semakin pesat tentu diperlukan teknik pengamanan data baik data teks maupun data citra. Pengamanan data menjadi hal yang sangat penting agar data yang dikirimkan tetap terjaga kerahasiaannya. Pada penelitian ini akan dibahas tentang Operator Algoritma Genetika dalam mengamankan data citra. Operator tersebut adalah crossover dan mutasi. Kunci yang digunakan berupa citra yang akan mengalami pergeseran bit. Proses enkripsi dengan Operator Algoritma Genetika menghasilkan citra yang terlihat acak dan  susah untuk ditebak gambar aslinya. Proses dekripsi dengan Operator Algoritma Genetika dapat mengembalikan cipher image menjadi citra yang sebenarnya. Analisis keamanan dari metode yang digunakan menunjukkan bahwa algoritma aman dari serangan analisis frekuensi dibuktikan dengan analisis histogram, analisis diferensial dengan rata-rata NPCR 99,65% dan UACI 32,41%,  dan  analisis korelasi dengan rata-rata sebesar -0,01.Kata kunci: crossover, mutasi, enkripsi, dekripsi, histogram, diferensial, korelasi Abstract[Image Security with Operator of Genetic Algorithm] The rapid development of computer technology needed a technique to secure data both text and image. Data security is vital that the data is sent still safe its confidentiality. In this article will be proposed about security image by Operator of Genetic Algorithm. These operators are crossover and mutation. The key is an image that will get bitshift. Encryption process with operator Genetic Algorithm producing the image which looks random and confusing to predict the original image. Decryption process with Operator Genetic Algorithm can change cipher image to the real image. Security analysis of the method which used indicates that algorithm is secured from analysis frequency attack, proven by analysis histogram, averages analysis differential NPCR 99,65% and UACI 32,41%, and averages correlation value -0,01.Keywords: crossover, mutation, encryption, decryption, histogram, differential, correlation
Penerapan Algoritma Elephant Herding Optimization (EHO) pada Masalah Hybrid Flowshop Scheduling (HFS) Ahmad Kamsyakawuni; Khurnia Palupi; Agustina Pradjaningsih
Journal of Applied Informatics and Computing Vol 4 No 1 (2020): Juli 2020
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (717.361 KB) | DOI: 10.30871/jaic.v4i1.1834

Abstract

The industry is the driving force for the economy in Indonesia. One of the problems faced by industrial companies in the production process is determining the production schedule. The production schedule that is not according to the specified target can cause losses to the company. Scheduling is the allocation of resources to carry out a set of work at a specified time. The problem solved in this article is hybrid flowshop scheduling (HFS), it’s will be applied to companies engaged in bread making. A solution to solve the HFS problem using elephant herding optimization (EHO) algorithm. For the company to complete the production process by minimizing makespan, effective scheduling is needed, taking into account the number of parallel machines. The results of this article are 9 jobs and makespan 11.270 seconds using the MATLAB software.
PENYEMBUNYIAN CIPHERTEXT ALGORITMA GOST PADA CITRA KE DALAM AUDIO DENGAN METODE LEAST SIGNIFICANT BIT Abduh Riski; Heri Purwantoro; Ahmad Kamsyakawuni
Jurnal Ilmiah Matematika dan Pendidikan Matematika Vol 10 No 2 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika
Publisher : Jurusan Matematika FMIPA Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jmp.2018.10.2.2844

Abstract

Government Standard (GOST) is a 64-bit block cipher algorithm with 32 round, use a 256-bit key. The weakness of this algorithm is the keys so simple, than make cryptanalyst easy to break this algorithm. Least Significant Bit (LSB) use to insert message into another form without changing the form of the cover after insertion. This research does by hiding encrypted ciphertext to image and hiding image into audio. This research use grayscale and RBG image with BMP and PNG format. Audio using music with wav format. Security analysis using differential analysis NPCR and UACI. Security analysis aims to calculate percentage from cover after hiding the message. The smaller the NPCR and UACI values, the higher the level of security the message is hidden. The results of the analysis of concealment in the image obtained by the average values of NPCR and UACI were 99.98% and 3.46% respectively. While the results of the analysis of hiding in audio obtained the average value of NPCR and UACI were 83.78% and 12.66% respectively.
PENGAMANAN CITRA DENGAN ALGORITMA DIFFIE-HELLMAN DAN ALGORITMA SIMPLIFIED DATA ENCRYPTION STANDARD (S-DES) ahmad Kamsyakawuni; Ahmad Husnan Fanani; abduh Riski
Jurnal Ilmiah Matematika dan Pendidikan Matematika Vol 10 No 2 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika
Publisher : Jurusan Matematika FMIPA Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jmp.2018.10.2.2846

Abstract

Simplified Data Encryption Standard (S-DES) is a cryptographic algorithm whose data-disguise process is simple and fast enough compared to other algorithms. Because of its simplicity, the S-DES algorithm is vulnerable to statistical attacks when applied to imagery, so this study tries to minimize S-DES weaknesses in image data by modifying S-DES keys with Diffie-Hellman. Diffie-Hellman is one of the key generating algorithms and key exchange. This research uses image data that is RGB image and grayscale image. A modified S-DES key with Diffie-Hellman is then used to encrypt the image. This study also analyzed the security level of S-DES algorithm that the key has been modified with Diffie-Hellman.
PENGKODEAN TEKS MENGGUNAKAN MODIFIKASI ALGORITMA ELECTRONIC CODE BOOK DAN MERKLE-HELLMAN KNAPSACK Innafajri Insyirah; Kiswara Agung Santoso; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data security needs to be maintained so that the messages sent to someone are not known by an unauthorized users. One of the data security techniques that can be applied is cryptography. Cryptography is a science and art to keep messages secure when messages are sent from one place to another. In this study, modification of Electronic Code Book and Merkle-Hellman Knapsack algorithms will be applied to secure messages. This research uses Matlab to create a program. The weaknesses of ECB and Merkle-Hellman Knapsack algorithms will be overcome by modifying key and XOR operations. The result of ciphertext is a random numbers which are difficult to understand by unauthorized users. In addition, the message pattern on the same plaintext no longer produces the same ciphertext. Ciphertext can be decrypted well even though the size is two times or longer than plaintext. This is proved by plaintext from the results of decryption is same as the original plaintext. Keywords: Cryptography, Electronic Code Book, Merkle-Hellman Knapsack.