Claim Missing Document
Check
Articles

Found 7 Documents
Search

Construction of Key Echange Protocol over Max-Plus Algebra to Encrypt and Decrypt Arabic Documents Muanalifah, Any
Journal Of Natural Sciences And Mathematics Research Vol 1, No 2 (2015): Volume 1, Nomor 2, 2015
Publisher : Faculty of Science and Technology, State Islamic University Walisongo Central Java

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (361.245 KB) | DOI: 10.21580/jnsmr.2015.1.2.1601

Abstract

In this paper, we consider the operation of matrix in Max-plus Algebra to construct a key public to encrypt and decrypt arabic document. Matrix operation in max-plus algebra is slight different with matrix operation in classical. In this paper, we also use a modular 37 to translate it into arabic text (arabic letter with number and special character).
Construction of Key Echange Protocol over Max-Plus Algebra to Encrypt and Decrypt Arabic Documents Any Muanalifah
Journal of Natural Sciences and Mathematics Research Vol 1, No 2 (2015): December
Publisher : Faculty of Science and Technology, Universitas Islam Negeri Walisongo Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (361.245 KB) | DOI: 10.21580/jnsmr.2015.1.2.1601

Abstract

In this paper, we consider the operation of matrix in Max-plus Algebra to construct a key public to encrypt and decrypt arabic document. Matrix operation in max-plus algebra is slight different with matrix operation in classical. In this paper, we also use a modular 37 to translate it into arabic text (arabic letter with number and special character).
Algorithm Hill Cipher for Securing Arabic Text Documents Ulin Nihayah; Any Muanalifah; Aini Fitriyah
Journal of Natural Sciences and Mathematics Research Vol 3, No 2 (2017): December
Publisher : Faculty of Science and Technology, Universitas Islam Negeri Walisongo Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (429.204 KB) | DOI: 10.21580/jnsmr.2017.3.2.10950

Abstract

This research is an application of Hill Cipher cryptographic techniques in the process of encoding messages in the form of Arabic text. Hill Cipher is a classic cryptographic algorithm that uses modulo matrix and arithmetic in its application. The Arabic text used in the Hill Cipher cryptographic technique includes hijaiyyah letters ا, ب, , ي, أ, إ, ؤ, ئ, ى, ة, space , ., ،, ؟, !, and Arabic numbers 0, 1, 9, so the modulo used is                    . This study discusses the steps in encrypting messages with examples of their application in securing Arabic text documents.
A Generalization of Chio’s Condensation Method Muanalifah, Any; Sagita, Yuli; Nurwan, Nurwan; Fitriyah, Aini; Jr, Rosalio Artes
Pattimura International Journal of Mathematics (PIJMath) Vol 3 No 1 (2024): Pattimura International Journal of Mathematics (PIJMath)
Publisher : Pattimura University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30598/pijmathvol3iss1pp15-22

Abstract

The Chio condensation method is a method to compute the determinant of a matrix A where by reducing the order of the matrix to a matrix. In this paper, we will generalize the condition where can be equal to zero. To compute the determinant, we can choose any element of matrix A that is not equal to zero as a pivot element.
The tropical version of El Gamal Encryption Muanalifah, Any; Isnawati, Ayus Riana; Artes Jr., Rosalio; Nurwan, Nurwan
Journal of Natural Sciences and Mathematics Research Vol. 9 No. 2 (2023): December
Publisher : Faculty of Science and Technology, Universitas Islam Negeri Walisongo Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper, we consider the new version of tropical cryptography protocol, i.e the tropical version of El Gamal encryption.  We follow the ideas and modify the clasical El Gamal encryption using tropical matrices and matrix power in tropical algebra. Then we also provide a toy example for the reader’s understanding. 
The Comparison Results of Logit and Probit Regression on Factors of Woman Criminal Nisa, Eva Khoirun; Muanalifah, Any
JTAM (Jurnal Teori dan Aplikasi Matematika) Vol 5, No 2 (2021): October
Publisher : Universitas Muhammadiyah Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31764/jtam.v5i2.4150

Abstract

Logit and probit regression are statistical methods that have the same is to determine predictor variables affect the categorical response variable. From relevant studies, they have advantages and disadvantages on certain cases. Therefore, the logit and probit regression will be applied on factors of woman criminal considering women crime rate in Central Java is still relatively high. This study aims to compare the result of the two regression so that the best regression model is obtained to explain factors that influence woman criminal. The data type used is primary data obtained using a questionnaire and validated by non-empirical validation. The sample was taken using a quota sampling technique. The result showed that probit regression is the best model with the factors that influence woman criminal are the age of 17-25 years, 26-35 years, junior high school education level, married and ever married marital status.
Sifat-Sifat Matriks Normal dalam Aljabar Max-Plus Muanalifah, Any; Romadiastri, Yulia; Albab, Muhammad Ulil; Nurwan; Artes, Rosalio G.; Candra, Ainun Esti
Square : Journal of Mathematics and Mathematics Education Vol. 7 No. 2 (2025)
Publisher : UIN Walisongo Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dalam aljabar max-plus, matriks normal didefinisikan sebagai matriks persegi  dimana elemen pada diagonal utamanya adalah nol dan elemen non diagonal utamanya adalah bilangan real non positif. Struktur ini memberikan sifat keteraturan khusus terhadap operasi maksimum dan penjumlahan pada aljabar maxplus. Pada artikel ini akan di bahas review tentang matriks  normal dan perilaku stabil terhadap perpangkatan, termasuk kondisi tertentu yang menjamin sifat idempoten. Selain itu, diperoleh kriteria struktural yang memastikan kekomutatifan dua matriks normal terhadap perkalian max-plus.