Claim Missing Document
Check
Articles

Found 38 Documents
Search

Penerapan Algoritma DNA dalam Membangkitkan Kunci pada Algoritma Elgamal Khoiroh, Ihda Umdatul; Turmudi, Turmudi; Sujarwo, Imam
Jurnal Riset Mahasiswa Matematika Vol 3, No 3 (2024): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v3i3.23930

Abstract

The security of secret messages is an important aspect that must be preserved to prevent public knowledge of the information contained within. One way to secure messages is by utilizing the assistance of cryptography. By employing algorithms found in cryptography, messages are disguised in a manner that makes them difficult to decipher. In this research, the DNA algorithm is used in the key generation process of the Elgamal algorithm. The objective of this research is to enhance the security of plaintext by modifying the key generation process, thereby making it difficult for others to crack the key. The result of this research is the encrypted private key x using the DNA algorithm and the public key g, which is a primitive root of the selected prime number that is further encrypted using the DNA algorithm, resulting in a new public key. Consequently, prior to encrypting the plaintext, decryption of the public key must be performed first.
Enkripsi dan Dekripsi Pesan Menggunakan Polinomial Galois Field dengan Algoritma Hill Cipher Vega, Amelia; Sujarwo, Imam; Khudzaifah, Muhammad
Jurnal Riset Mahasiswa Matematika Vol 2, No 2 (2022): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i2.15150

Abstract

An information is extremely easy to obtain when technology is evolving so fast and it is important to secure the information to avoid irresponsible parties who want to abuse it. Messages that are not safe will harm the owner of the message, therefore a lot of research is related to message security. This study aims to deepen the message security in encoded form using Galois Field polynomials with one of the symmetric encryption algorithms, namely the Hill Cipher algorithm. Encryption is the process of converting a message into a secret code while decryption is the reverse process. The encryption and decryption process in this discussion is carried out by changing the message character into Galois Field polynomial form, then operating calculations based on the Hill Cipher algorithm, and then changing the results of the calculation operations into character form again. Based on the modifications have been made, the encryption and decryption formulas will be multiplied by modulo in polynomials form. In this study, the encryption and decryption keys are in matrix form with elements in it are members of the Galois Field polynomial and the result is a random message of 256 characters in binary bit-8. From this research, we gain insight into the encoding that can be done using polynomials which can be used later in other forms of encoding.
Penerapan Graf Berarah dan Berbobot untuk Mengetahui Inluencer yang Paling Berpengaruh dalam Penyebaran Informasi pada Twitter Rafi' Addani, Aisyah; Turmudi, Turmudi; Sujarwo, Imam
Jurnal Riset Mahasiswa Matematika Vol 2, No 5 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i5.16810

Abstract

A graph is a non-empty set whose members are vertices and edges, where the edges connect several pairs of these vertices; likewise, social media connects users with each other through interests, relationships, likes and dislikes. The rapid development of technology in the era of globalization has made social media a more effective source of information, one of them is Twitter which has been used by 280 million people in the world. This research involves 100 Twitter users who are classified as Influencers in Indonesia who have more than 10,000 followers by visualizing their relationship with other users followed by them with a directed and weighted graph. First, the data is filtered using the Twecoll script in Python software, then the data is visualized using the Gephi software in the form of a directed and weighted graph. The centrality value is calculated to determine the influential influencers in spreading information on the network. Based on the results of the study, it was found that the network pattern of 100 Influencers that had been collected in the following list of @dearmyths accounts, there were 96 points and 1883 sides with the side having the highest weight being @detikcom, followed by @ivanlanin and @ernestprakasa through the results of centrality calculations as accounts that can disseminate information on the network.
Perbandingan Uji Akurasi Fuzzy Time Series Model Cheng Dan Lee Dalam Memprediksi Perkembangan Harga Cabai Rawit Ismiarti, Dewi; Nafisah, Jami'atu Sholichati; Alisah, Evawati; Sujarwo, Imam
Jurnal Riset Mahasiswa Matematika Vol 2, No 4 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i4.16808

Abstract

Fuzzy Time Series is a method used to predict data. Fuzzy Time Series is a development of time series analysis, where Fuzzy Time Series uses the concept of fuzzy sets as the basis for its calculations. In addition, Fuzzy Time Series has various methods such as Cheng and Lee Fuzzy Time Series. In this study, Fuzzy Time Series is used to predict data on the price development of cayenne pepper in Indonesia. By using these two methods, an analysis of the level of accuracy is then carried out using several methods. So that the results obtained in this study are the MAE value of the Cheng method 669,162 and the Lee method 502,285, the MSE value of the Cheng method 1.261.393 and the Lee method 699.030.1, the MPE value of the Cheng method 0,01% and the Lee method -0,02%, and The MAPE value of the Cheng method is 1,24% and the Lee method is 0.92%. The Lee method has a smaller error value than the Cheng method, so that the Lee method is declared to be better than the Cheng method.
Membangun Super Enkripsi untuk Mengamankan Pesan Agustina, Laura; Sujarwo, Imam; Khudzaifah, Muhammad
Jurnal Riset Mahasiswa Matematika Vol 2, No 3 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i3.16335

Abstract

The issue of message security or an information is very important. A science that studies about securing the confidentiality of messages using passwords is called cryptography. To enhance security, two algorithms are combined to secure messages. Super encryption is a concept that uses a combination of two or more substitution and permutation (transposition) cryptography techniques to obtain an algorithm that is more difficult to crack. The first thing to do is to encrypt the message using a substitution technique (Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In this study, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipher and Bifid Cipher algorithms to secure messages. The message encryption process is using the Vigenere Cipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for the second encryption process. The encryption process is done the other way around, starting from the back of the encryption process. The combination of these two algorithms results in more secure message security.
Development of Relation and Function e-Modules Based on Contextual Learning Integrated with Islamic Values Radjak, Dwi Setiawati; Turmudi, Turmudi; Sujarwo, Imam
International Journal of Education and Teaching Zone Vol. 3 No. 3 (2024): October 2024 Edition
Publisher : Yayasan Nurul Yakin Bunga Tanjung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57092/ijetz.v3i3.309

Abstract

This research aims to develop an e-module about relations and functions based on contextual learning that is integrated with Islamic values ​​that are valid, practical, and interesting. The research carried out is development research (R&D) using the ADDIE model, which goes through 5 stages, namely analysis, design, development, implementation, and evaluation. The research subjects were class VIII students at MTs Arafah Bitung, North Sulawesi. The data obtained was analyzed descriptively, and percentage data was used to represent the results.  The research results show that the e-module developed on relation and function material is valid, practical, and interesting. The validity test obtained an average feasibility percentage of 86.8%. The practicality test obtained an average feasibility percentage of 90.1%. Meanwhile, the attractiveness test obtained an average feasibility percentage of 87.7%. The relations and function e-module specifications developed include understanding the concepts of relations and functions and presenting relations and functions based on integrated contextual learning of Islamic values. This proves that the e-module is suitable for use as teaching material and a means of independent education in the learning process.
Students Proportional Reasoning Level in Solving Ill Structured Problem on Proportion Material in Terms of Gregorc’s Thinking Style Pramono, Yasmine Az Zahra Awwalina; Abdussakir, Abdussakir; Irawan, Wahyu Henky; Sujarwo, Imam
Jurnal Pendidikan Matematika IKIP Veteran Semarang Vol 9 No 1 (2025): Journal of Medives : Journal of Mathematics Education IKIP Veteran Semarang
Publisher : Urogram Studi Pendidikan Matematika, Universitas Ivet

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31331/medivesveteran.v9i1.3568

Abstract

This study examines the level of proportional reasoning in students when solving ill-structured problems concerning proportions, in terms of Gregorc's cognitive styles. A qualitative approach was used, involving 8 participants from grade VIII-B of MTsN Kota Batu. Based on the analysis, it can be concluded that students' cognitive styles affect their understanding of proportional reasoning. Students with a concrete sequential (CS) thinking style showed difficulty in understanding the concept of proportional and still relied on trial-and-error approaches, indicating they are at Level 0 (Non-proportional reasoning). Students with a abstract sequential (AS) and concrete random (CR) thinking style have used some visual or concrete aids, although they have not fully transitioned to a more systematic mathematical approach, placing them at Level 1 (Manipulative Proportional Reasoning). Meanwhile, students with an abstract random (AR) thinking style were able to use mathematical models to solve proportional problems but still faced challenges in consistently applying the correct method, leading them to Level 3 (Pre-multiplicative Proportional Reasoning). The differences in students' cognitive styles affect how they understand and apply the concept of proportional reasoning, including their ability to choose the appropriate method and maintain consistency in its application.
Optimal Control of a Modified Mathematical Model of Social Media Addiction Juhari, Juhari; Alisah, Evawati; Safitri, Alisa Ayu; Sujarwo, Imam
InPrime: Indonesian Journal of Pure and Applied Mathematics Vol 6, No 2 (2024)
Publisher : Department of Mathematics, Faculty of Sciences and Technology, UIN Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/inprime.v6i2.41438

Abstract

This research investigates the application of optimal control in the Susceptible, Exposed, Addicted, Recovery, Quit (SEA_1 A_2 RQ) model to address social media addiction. The primary objective is to develop an effective control strategy to reduce the prevalence of social media addiction. The methodology employs Pontryagin's maximum principle to formulate the optimal control problem, incorporating two time-dependent control variables: control (u_1) and treatment (u_2). The optimal control model is numerically simulated using the 4th-order Runge-Kutta method. Comparative analysis of the simulation results, with and without control, demonstrates significant differences in all population groups after four years. The findings reveal that implementing control (u_1) and treatment (u_2) markedly decreases the number of individuals addicted to social media, highlighting the efficacy of the proposed strategy in mitigating social media addiction.Keywords: Optimal control; Social media addiction model; Pontryagin maximum principle. AbstrakPenelitian ini mengkaji penerapan kontrol optimal pada model Susceptible, Exposed, Addicted, Recovery, model Quit (SEA_1 A_2 RQ)  untuk menangani kecanduan sosial media. Tujuan utama penelitian ini adalah untuk mengembangkan strategi kontrol yang efektif untuk mengurangi jumlah individu yang mengalami kecanduan media sosial. Metodologi penelitian ini menggunakan prinsip maksimum Pontryagin untuk merumuskan masalah kontrol optimal, yang menggabungkan dua variabel kontrol bergantung pada waktu: pengendalian (u_1) dan pengobatan (u_2). Model kontrol optimal disimulasikan secara numerik menggunakan metode Runge-Kutta orde 4. Analisis komparatif dari hasil simulasi, dengan dan tanpa kontrol, menunjukkan perbedaan yang signifikan pada semua kelompok populasi setelah empat tahun. Temuan tersebut mengungkapkan bahwa penerapan pengendalian (u_1) dan pengobatan (u_2) secara signifikan mengurangi populasi pengguna kecanduan sosial media, yang menyoroti kemanjuran strategi yang diusulkan untuk mengurangi kecanduan sosial media.Kata Kunci: Kontrol optimal; Model kecanduan media sosial; Prinsip maksimum Pontryagin. 2020MSC: 49N90, 91D10, 92B05.
Self-Efficacy Santri dalam Penggunaan Modul Pembelajaran Matematika Berbasis Pesantren Dengan Pendekatan Saintifik Mohammad Nadzir Azhari; Turmudi; Imam Sujarwo
EDUPEDIKA: Jurnal Studi Pendidikan dan Pembelajaran Vol. 1 No. 2 (2022): Agustus 2022
Publisher : PELITA NUSA TENGGARA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60004/edupedika.v1i2.32

Abstract

Abstrak: Penelitian ini bertujuan untuk mengetahui bagaimana self-efficacy santri setelah menggunakan modul pembelajaran berbasis pesantren dengan pendekatan saintifik. Metode penelitian yang digunakan dalam penelitian ini adalah penelitian kuantitaif dengan menggunakan pendekatan pre experimental design. Pendekatan pre experimental design yang digunakan dalam penelitian ini menggunakan jenis one group pretest-posttest study. Hasil analisis angket self-efficacy menunjukkan bahwa terdapat peningkatan self-efficacy santri antara sebelum dan sesudah menggunakan modul. Hasil analisis sumber self-efficacy setelah menggunakan modul diperoleh bahwa sumber mastery experience dan social persuasions berada pada kategori tinggi, sumber vicarious experience berada pada kategori sangat tinggi, sedangkan sumber physiological state berada pada kategori sedang. Hasil analisis skor seluruh angket menunjukkan self-efficacy santri berada pada kategori tinggi setelah pemakaian modul. Abstract: The goal of this research is to assess students' self-efficacy after utilizing Islamic boarding school-based mathematics learning module with scientific approach. The research method used in this research using a pre experimental design approach.The pre experimental design approach used in this study used the type of one group pretest-posttest study. The examination of the self-efficacy questionnaire revealed that students' self-efficacy increased between before and after using the module. After using the module, the sources of mastery experience and social persuasion were in the high category, sources of vicarious experience were in the very high category, and sources of physiological state were in the medium category, according to the results of the self-efficacy sources analysis. After using the module, the students' self-efficacy was in the high category, according to the results of the analysis of all the questionnaire scores.
Perencanaan Pengadaan Sanitasi Lingkungan di Taman Nasional Bromo Tengger Semeru dengan Pendekatan Sanitasi Total Berbasis Masyarakat Jamhuri, Mohammad; Sujarwo, Imam; Alisah, Evawati
JRCE (Journal of Research on Community Engagement) Vol 1, No 2 (2020): Journal of Research on Community Engagement
Publisher : Universitas Islam Negeri Maulana Malik Ibrahim Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrce.v1i2.31899

Abstract

Bromo Tengger Semeru National Park (TNBTS) is one of Indonesia’s premier tourist destinations, experiencing surging visitor numbers each year. During peak hours—especially early morning for sunrise—tourists flock to popular spots such as Penanjakan, Seruni, Mentingen, Kingkong, and Bukit Cinta, often causing long queues at toilet facilities. This community service program aimed to (1) identify sanitation needs in critical TNBTS locations, (2) propose additional sanitation facilities where required, and (3) conduct community mentoring to ensure sustainable involvement in facility planning and management. The methods included field surveys, queueing analysis, visitor forecasting, water requirement and cost calculations, and a Community-Based Total Sanitation (STBM) approach for local empowerment.Results indicate a need for more toilet units at several sunrise viewpoints and in the jeep and motorcycle parking areas. Queueing analysis suggests that to maintain waiting times under one minute per person at high-traffic spots, at least nine toilets for men and thirteen for women are necessary. Economic feasibility calculations reveal potential for self-financing through toilet fees, since visitor numbers are projected to rise above one million annually within five years. Community mentoring is crucial for collaborative efforts and shared ownership among local managers, residents, and relevant government agencies, thereby ensuring the facilities’ long-term sustainability.