Claim Missing Document
Check
Articles

Found 39 Documents
Search

Membangun Super Enkripsi untuk Mengamankan Pesan Laura Agustina; Imam Sujarwo; Muhammad Khudzaifah
Jurnal Riset Mahasiswa Matematika Vol 2, No 4 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i4.14470

Abstract

The issue of message security or an information is particularly important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipherand Bifid Cipher algorithms to secure messages. The message encryption process is using the VigenereCipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for thesecondencryptionprocess.Theencryptionprocessisdonetheotherwayaround,startingfromthebackoftheencryptionprocess.Thecombinationofthesetwoalgorithmsresultsinmoresecuremessagesecurity.
Indeks Harmonik dan Indeks Gutman Graf Nilradikal pada Gelanggang Komutatif dengan Satuan Luluk Afifah; Imam Sujarwo; Muhammad Khudzaifah
Jurnal Riset Mahasiswa Matematika Vol 2, No 4 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i4.14902

Abstract

Graph theory is a topic that is still an important subject to discuss. This is because until now graph theory has many practical applications in various disciplines, for example in biology, computer science, economics, informatics engineering, linguistics, mathematics, health, and social sciences. This study discusses the Gutman index of nilradical graphs in the commutative ring with unity.A nilradical graph whose vertices are non-zero nilpotent elements, when the domain is a commutative ring with units, it forms a complete graph only if the commutative ring with units we use is limited to a positive integer modulo n (Z_n). Where n is the square of the prime number p which is less than equal to 3. It is known that the general pattern of harmonic indices and Gutman indices of nilradical graphs in the commutative ring with unity are H(N(Z_(n=p^2 ) ))=((p-2)^2+(p -2))/2(p-2) and Gut(N(Z_(n=p^2 ) ))=(1/2 ((p-2)^2+(p-2))) (p- 2)^2 respectively. In its application, this general form can be used as a numerical parameter of a graph in chemical graph theory, molecular topology, and mathematical chemistry.
Perbandingan Uji Akurasi Fuzzy Time Series Model Cheng Dan Lee Dalam Memprediksi Perkembangan Harga Cabai Rawit Dewi Ismiarti; Jami'atu Sholichati Nafisah; Evawati Alisah; Imam Sujarwo
Jurnal Riset Mahasiswa Matematika Vol 2, No 4 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i4.16808

Abstract

Fuzzy Time Series is a method used to predict data. Fuzzy Time Series is a development of time series analysis, where Fuzzy Time Series uses the concept of fuzzy sets as the basis for its calculations. In addition, Fuzzy Time Series has various methods such as Cheng and Lee Fuzzy Time Series. In this study, Fuzzy Time Series is used to predict data on the price development of cayenne pepper in Indonesia. By using these two methods, an analysis of the level of accuracy is then carried out using several methods. So that the results obtained in this study are the MAE value of the Cheng method 669,162 and the Lee method 502,285, the MSE value of the Cheng method 1.261.393 and the Lee method 699.030.1, the MPE value of the Cheng method 0,01% and the Lee method -0,02%, and The MAPE value of the Cheng method is 1,24% and the Lee method is 0.92%. The Lee method has a smaller error value than the Cheng method, so that the Lee method is declared to be better than the Cheng method.
Membangun Super Enkripsi untuk Mengamankan Pesan Laura Agustina; Imam Sujarwo; Muhammad Khudzaifah
Jurnal Riset Mahasiswa Matematika Vol 2, No 5 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i5.21036

Abstract

The issue of message security or an information is very important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipherand Bifid Cipher algorithms to secure messages. The message encryption process is using the VigenereCipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for thesecondencryptionprocess.Theencryptionprocessisdonetheotherwayaround,startingfromthebackoftheencryptionprocess.Thecombinationofthesetwoalgorithmsresultsinmoresecuremessagesecurity.
Penerapan Graf Berarah dan Berbobot untuk Mengetahui Inluencer yang Paling Berpengaruh dalam Penyebaran Informasi pada Twitter Aisyah Rafi' Addani; Turmudi Turmudi; Imam Sujarwo
Jurnal Riset Mahasiswa Matematika Vol 2, No 5 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i5.16810

Abstract

A graph is a non-empty set whose members are vertices and edges, where the edges connect several pairs of these vertices; likewise, social media connects users with each other through interests, relationships, likes and dislikes. The rapid development of technology in the era of globalization has made social media a more effective source of information, one of them is Twitter which has been used by 280 million people in the world. This research involves 100 Twitter users who are classified as Influencers in Indonesia who have more than 10,000 followers by visualizing their relationship with other users followed by them with a directed and weighted graph. First, the data is filtered using the Twecoll script in Python software, then the data is visualized using the Gephi software in the form of a directed and weighted graph. The centrality value is calculated to determine the influential influencers in spreading information on the network. Based on the results of the study, it was found that the network pattern of 100 Influencers that had been collected in the following list of @dearmyths accounts, there were 96 points and 1883 sides with the side having the highest weight being @detikcom, followed by @ivanlanin and @ernestprakasa through the results of centrality calculations as accounts that can disseminate information on the network.
Feasibility test of teaching materials for mathematics learning evaluation integrated with Al Quran Huda, Nuril; Sujarwo, Imam
Psychology, Evaluation, and Technology in Educational Research Vol. 6 No. 2 (2024)
Publisher : Research and Social Study Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33292/petier.v6i2.198

Abstract

The study aims to determine the level of feasibility of integrated mathematics learning evaluation teaching materials with verses of the Koran. The type of research used is research & development (R&D) by adopting the ADDIE model, namely Analyze, Design, and Develop. Data collection techniques using validation sheets and questionnaires. The product validation involved nine validators consisting of 3 material experts, three media experts, and 3 Islamic integration experts, while the practicality test involved 15, tadris mathematics students. The Aiken formula analyzed the validity test. The results showed that the results of the material and language feasibility test were 59.25% in the high category, the results of the media feasibility test were 55.55% in the medium category, and the results of the material integration feasibility test were 75.00% in the high category, and the test results practicality of 80% with the category of practical and a little revision. This mathematics learning evaluation textbook integrated with the verses of the Koran that were developed is feasible and can be used to support the lecture process.
EFEKTIVITAS MODUL PEMBELAJARAN MATEMATIKA BERBASIS ELEKTRONIK DALAM MENINGKATKAN KEMAMPUAN LITERASI NUMERASI SISWA Huda, Nuril; Afidatuzzaro, Nurul; Sujarwo, Imam; Sari, Sulistya Umie Ruhmana
JP2M (Jurnal Pendidikan dan Pembelajaran Matematika) Vol 10, No 2 (2024)
Publisher : Universitas Bhinneka PGRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jp2m.v10i2.6129

Abstract

This research focuses on examining the level of effectiveness of mathematics learning e-modules in improving students' abilities in the field of numeracy literacy, especially at the initial level in the secondary school years. Based on the quasi-experimental design used and then using the one group pretest-posttest formula, this research is included in the experimental category. The population group for this study were grade 7 students at SMP Negeri 13 Malang, and the sample consisted of 20 grade 7A students. The sampling technique used is purposive non probability type. Quantitative data in this research was collected through tests using pretest and posttest sheets. Data analysis was carried out using a paired t-test using the SPSS program and the gain value formula. Based on the research results, it is known that the t-test significance level is 0.002, which means that the significance value is less than 0.05. As for the calculation of the gain value, the result was 0.4 or equivalent to the medium level effective category. So it is concluded that the e-learning module is effective in improving students' abilities in the numeracy literacy aspect.
Indeks Harmonik dan Indeks Gutman Graf Nilradikal pada Gelanggang Komutatif dengan Satuan Afifah, Luluk; Sujarwo, Imam; Khudzaifah, Muhammad
Jurnal Riset Mahasiswa Matematika Vol 2, No 4 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i4.14902

Abstract

Graph theory is a topic that is still an important subject to discuss. This is because until now graph theory has many practical applications in various disciplines, for example in biology, computer science, economics, informatics engineering, linguistics, mathematics, health, and social sciences. This study discusses the Gutman index of nilradical graphs in the commutative ring with unity.A nilradical graph whose vertices are non-zero nilpotent elements, when the domain is a commutative ring with units, it forms a complete graph only if the commutative ring with units we use is limited to a positive integer modulo n (Z_n). Where n is the square of the prime number p which is less than equal to 3. It is known that the general pattern of harmonic indices and Gutman indices of nilradical graphs in the commutative ring with unity are H(N(Z_(n=p^2 ) ))=((p-2)^2+(p -2))/2(p-2) and Gut(N(Z_(n=p^2 ) ))=(1/2 ((p-2)^2+(p-2))) (p- 2)^2 respectively. In its application, this general form can be used as a numerical parameter of a graph in chemical graph theory, molecular topology, and mathematical chemistry.
Membangun Super Enkripsi untuk Mengamankan Pesan Agustina, Laura; Sujarwo, Imam; Khudzaifah, Muhammad
Jurnal Riset Mahasiswa Matematika Vol 2, No 5 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i5.21036

Abstract

The issue of message security or an information is very important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipherand Bifid Cipher algorithms to secure messages. The message encryption process is using the VigenereCipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for thesecondencryptionprocess.Theencryptionprocessisdonetheotherwayaround,startingfromthebackoftheencryptionprocess.Thecombinationofthesetwoalgorithmsresultsinmoresecuremessagesecurity.
Analisis Sentimen Mahasiswa Terhadap Perkuliahan Dalam Jaringan Menggunakan Metode Naïve Bayes Classifier Rahmatullah, Bagus Aziz; Sujarwo, Imam; Herawati, Erna
Jurnal Riset Mahasiswa Matematika Vol 2, No 3 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i3.16415

Abstract

Since the pandemic of Covid-19 was happened in Indonesia, the government shared the letter of The Ministry of Education and Higher Culture Education Directorate No.1, year 2020 about prevention of the spread of Corona Virus Disease (Covid-19) in higher education. Through the letter, The Ministry of Education and Culture gave an instruction for college to organize online learning and suggested students to study at their home. Online learning which was considered as a strategy then became a controversy because it needed adaption. This sudden change from normal learning to online learning caused many responses from students. The aim of this research was to analyze student sentiment or responses on online learning in this pandemic era of Covid-19 in Indonesia by using data which had been collected using questionnaire and processed using naïve bayes classifier method. This research was case study descriptive quantitative research. The research was done by collecting the data first. The data was collected through questionnaire with the question about their opinion on online learning in this pandemic Covid-19 era. The data was 157 student’s data opinion on online learning. After the data was collected, the data was cleaned first from question mark and the words which didn’t give an effect in sentiment analysis. After the data was cleaned, then the result of the classification will be showed as well as the accuracy which the model earned. The result showed that online learning had negative sentiment more than positive sentiment. The height of negative sentiment was caused by discomfort of student in online learning. The word which frequently showed was ‘tidak efektif’, ‘susah’, and ‘tugas’. The accuracy of this model was 75% when the result of this accuracy was good result in classification.