Articles
Syarat Cukup Ketaksamaan Holder di Ruang Lebesgue dengan Variabel Eksponen
Ba'is, Mohamad Abdul;
Rahman, Hairur;
Herawati, Erna
Jurnal Riset Mahasiswa Matematika Vol 2, No 1 (2022): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i1.14619
Hӧlder inequality is a basic inequality in functional analysis. The inequality used for proofing other inequalities. In this research, the development of the application of the Hӧlder inequality in the Lebesgue spaces with variable exponent and Morrey spaces with variable exponent. The integral Hӧlder inequality is used because the Lebesgue spaces with variable exponent and Morrey spaces with variable exponent is a function space.This research shows the sufficient condition of Hӧlder inequality in Lebesgue spaces with variable exponent and the Morrey spaces with variable exponent according to the norm of the function and its characteristics.
Analisis Sentimen Mahasiswa Terhadap Perkuliahan Dalam Jaringan Menggunakan Metode Naïve Bayes Classifier
Rahmatullah, Bagus Aziz;
Sujarwo, Imam;
Herawati, Erna
Jurnal Riset Mahasiswa Matematika Vol 2, No 3 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i3.16415
Since the pandemic of Covid-19 was happened in Indonesia, the government shared the letter of The Ministry of Education and Higher Culture Education Directorate No.1, year 2020 about prevention of the spread of Corona Virus Disease (Covid-19) in higher education. Through the letter, The Ministry of Education and Culture gave an instruction for college to organize online learning and suggested students to study at their home. Online learning which was considered as a strategy then became a controversy because it needed adaption. This sudden change from normal learning to online learning caused many responses from students. The aim of this research was to analyze student sentiment or responses on online learning in this pandemic era of Covid-19 in Indonesia by using data which had been collected using questionnaire and processed using naïve bayes classifier method. This research was case study descriptive quantitative research. The research was done by collecting the data first. The data was collected through questionnaire with the question about their opinion on online learning in this pandemic Covid-19 era. The data was 157 student’s data opinion on online learning. After the data was collected, the data was cleaned first from question mark and the words which didn’t give an effect in sentiment analysis. After the data was cleaned, then the result of the classification will be showed as well as the accuracy which the model earned. The result showed that online learning had negative sentiment more than positive sentiment. The height of negative sentiment was caused by discomfort of student in online learning. The word which frequently showed was ‘tidak efektif’, ‘susah’, and ‘tugas’. The accuracy of this model was 75% when the result of this accuracy was good result in classification.
Penerapan Metode Segmentasi Gabor Filter Dan Algoritma Support Vector Machine Untuk Pendeteksian Penyakit Daun Tomat
Habibullah, Muhamad;
Fahmi, Hisyam;
Herawati, erna
Jurnal Riset Mahasiswa Matematika Vol 2, No 6 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i6.22023
This research discusses about processing a formulation that we can give to diseased tomato leaves. Gabor Filter is a method used to detect textures using frequency and orientation parameters. The Support Vector Machine (SVM) algorithm is an algorithm that can be used classifying tomato leaf diseases. The purpose of this research is to determine the accuracy of the Gabor Filter segmentation and the Support Vector Machine Algorithm for detecting tomato leaf disease to facilitate farmers in analyzing diseases on tomato leaves. The input will go through pre-processing of RGB pixels to Greyscale ones before being processed using Gabor Filter. This Gabor Filter process segments the image to produce a magnitude value. The results of the image magnitude values here will be seen and will enter the classification process using SVM. The SVM algorithm aims to find the best hyperlane on tomato leaves that have been segmented to separate classes in the input space. The application of the SVM method with class classification of tomato leaves by calculating the energy value and entropy of the extraction results, assisted by 12 features, namely: CiriR, Feature G, FeatureB, Standard DeviationR, Standard DeviationG, Standard DeviationB, SkewnessR, SkewnessG, SkewnessB, Mean, Energy, Entropy are used to the simplity classification process with a high degree of accuracy. The process of classification of tomato leaf disease with test data of 600 images managed to get an accuracy value of 74.1667%. In order to facilitate the performance of farmers in predicting tomato leaf disease.
Implementasi Algoritma Rivest Shamir Adleman atas Ring Dedekind
Ladunniyyah, Zakiyya Dzul;
Khudzaifah, Muhammad;
Herawati, Erna
Jurnal Riset Mahasiswa Matematika Vol 3, No 4 (2024): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v3i4.25407
The issue of security and confidentiality of data or messages is very important so efforts are needed to maintain the security and confidentiality of messages, one of which is with cryptography. This study aims to determine the implementation of the RSA algorithm over the Dedekind ring to secure text messages. This implementation is done by modifying the key formation, encryption, and decryption processes of the RSA cryptographic algorithm to match the Dedekind ring used. The research stage carried out is to form a key on the RSA algorithm over the Dedekind ring, then construct an encryption and decryption algorithm to secure messages with RSA over the Dedekind ring. From this research, results were obtained in the form of an RSA message encoding algorithm in accordance with the Dedekind ring where the Dedekind ring was used in the key formation process. Furthermore, the encryption and decryption process is carried out with the RSA algorithm. The conclusion of this study is that the implementation of the RSA algorithm over the Dedekind ring can produce a wider public key where the public key used is any member number of the set of maximal ideal products on the Dedekind ring.
Analisis Konstanta Euler-Mascheroni yang Diperumum pada Deret Harmonik
Rahman, Raisha Inayah;
Rahman, Hairur;
Herawati, Erna
Jurnal Riset Mahasiswa Matematika Vol 3, No 2 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v3i2.22447
The generalized Euler-Mascheroni constant analyzes functions or sequences with specific parameters in various scientific fields. As scientific knowledge advances, the generalized Euler-Mascheroni constant continues to undergo renewal. One example is found in "On Generalized Euler-Mascheroni Constants" by G. Abe-I-Kpeng, M.M. Iddirisu, and K. Nantomah in 2022. The purpose of this study is to analyze the relationship between the generalized Euler-Mascheroni constant and harmonic series, as well as to examine its connection with signed count permutations. The analysis involves decomposing the Riemann Zeta function and using Stirling numbers of the first kind. The methodology employed in this study was literature research. This study yields new theorems concerning the generalized Euler-Mascheroni constant.
Solusi Eksak Sistem Imun Terhadap Virus Ebola
Aisyiyah, Amadhea Aisyatul;
Widayani, Heni;
Herawati, Erna
Jurnal Riset Mahasiswa Matematika Vol 3, No 2 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v3i2.22449
The Ebola virus is a deadly disease that causes blood clots in the body's organs and is spread through direct contact with the blood or body fluids of sufferers. Based on this, the immune system in the body will continue to decrease and cause Ebola Hemorrhagic Fever. The 2014-2016 Ebola outbreak in West Africa has accelerated the development of several preventive vaccines against the Ebola virus. The goal of the vaccination is to induce immunity against infectious diseases. And also to stimulate the immune system and its ability to store and remember information about specific pathogens, leading to long-term protective immunity. The model equation for the Ebola virus vaccine in this study involves the concentration of the antigen which is a variable , by means of which the vaccine is inserted into the patient's body where it will attach to B memory cells which are variable , which will then be stimulated by the cells short-lived antibodies are denoted by variables or long-lived cells are denoted by variables , while antibodies will prove efficacy denoted by variables on the patient's immune response. The simulation of the exact solution for the Ebola vaccine uses the integration factor method which will later be compared with numerical simulations according to the parameter values from the research of Irene Balelli et al (2020). The simulation obtained has a very small calculation error value for each variable, which means that the exact value of the Ebola virus vaccination model shows that there is no significant difference to the numerical solution using the order 45 Rungge Kutta method, the largest resulting numerical error is 2.29640283510782×〖10〗^9.
Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia
Ludyawati, Ludyawati;
Khudzaifah, Muhammad;
Herawati, erna
Jurnal Riset Mahasiswa Matematika Vol 2, No 6 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i6.22041
Vigènere Cipher is a symmetric cryptographic algorithm that uses the same type of key in the encryption and decryption process. The security of the Vigènere Cipher method lies in the modulo calculation used. ElGamal is an asymmetric cryptographic algorithm that uses two different types of keys in the encryption and decryption process. The security of the ElGamal algorithm lies in the complexity of calculating large prime numbers. The Vigènere Cipher and ElGamal have their advantages and disadvantages. The researchers are interested in combining the advantages of the two methods. In this study, two locks were carried out in the encryption and decryption process. The encryption process uses a public key and the decryption process uses a public key and a secret key . The key used comes from key formation using the ElGamal algorithm. The key security formed from the ElGamal algorithm lies in the large prime , the primitive root of the prime number , and the random integer which comes from the last three digits of Student Number. The conclusion of this study is that the combination of the Vigènere Cipher and ElGamal methods can increase the security of secret messages because it produces a ciphertext with twice the size ) of the original message.
Penerapan Algoritma Floyd-Warshall pada Jalur Evakuasi Korban Kecelakaan di Boyolali
Sari, Fitri Nofita;
Juhari, Juhari;
Herawati, erna
Jurnal Riset Mahasiswa Matematika Vol 2, No 5 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i5.22006
The Floyd-Warshall algorithm is one of the algorithms that can be used to solve the shoetest route problem and is the easiests to apply because it can find all the shortest routes between each possible pair of position and is part of a dynamic program that is very efficient in solving optimal route promblems. The Floyd-Warshall algorithm works by comparing each possible path on the graph for each node pair and checking the resulting node combination. The problem of the shortest route in daily life is the evacuation of victims of traffic accidents in Boyolali, Central Java. For evacuation to be more effective, a nearby route to the nearest hospital is needed. Based on the results of the research that has been done, it can be concluded that the study produced reference matrix in the form of the shortest trajectory used to determine the shortest route to nearest hospital in Boyolali, Central Java.
Indeks Konektivitas Eksentrik Edis Pada Graf Annihilator dari Ring Bilangan Bulat Modulo
Amelia, Risma;
Jauhari, Mohammad Nafie;
Herawati, Erna
Jurnal Riset Mahasiswa Matematika Vol 4, No 3 (2025): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v4i2.30059
This study discusses how the general formula of the Ediz eccentric connectivity index (IKEE) in the annihilator graph of the ring of integers modulo. This study aims to determine the Ediz eccentric connectivity index on the annihilator graph of the ring of modular integers , with is a primer number for , and is a positif integer. The initial step in conducting this research is to form an annihilator graph from the ring of integers of the modul , then find the vertex degree and the eccentricity of the vertex on the annihilator graph which is used to calculate the Ediz eccentric connectivity index of each graph. After that, formulate a conjecture about the Ediz eccentric connectivity index on the annihilator graph of the ring of integers of the modul , and the last one proves the hypothesis obtained. The results of this study is general formula for the Ediz eccentric conductivity index on the Annihilator graph of the ring of integers modulo where p is a prime number and m is a positive integer.
Energi Detour pada Graf Invers dari Grup Quaternion Diperumum
Rohmah, Iftitahur;
Jauhari, Mohammad Nafie;
Herawati, Erna
Jurnal Riset Mahasiswa Matematika Vol 4, No 3 (2025): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v4i2.30060
A generalized quaternion group is a non-abelian group with a order constructed from the two elements that is denoted by defined as where the is the identity, . The inverse graph of a group is a graph which the vertices set are all elements of a finite group and two distinct vertices and are adjacent if and only if either or . Graph energy, especially detour energy, is an important aspect in graph theory that describes network stability and resistance. The method used in this research is a qualitative method. This study aims to determine the formula of the detour energy in the inverse graph of the quaternion group is announced with . Through algebra analysis methods and graph theory, it is found that detour energy can be calculated using the detour matrix and the resulting eigen value. The results showed that the detour energy formula in the inverse graph from the quaternion group was founded was for each .