cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota surabaya,
Jawa timur
INDONESIA
International Journal of Computing Science and Applied Mathematics
ISSN : -     EISSN : 24775401     DOI : -
Core Subject : Science, Education,
(IJCSAM) International Journal of Computing Science and Applied Mathematics is an open access journal publishing advanced results in the fields of computations, science and applied mathematics, as mentioned explicitly in the scope of the journal. The journal is geared towards dissemination of original research and practical contributions by both scientists and engineers, from both academia and industry.
Arjuna Subject : -
Articles 155 Documents
Safety Verification of SEITR Epidemic Model on Recombination HIV and Hepatitis B Virus using Taylor Model Asmudik, Asmudik; Adzkiya, Dieky; Mardlijah, Mardlijah; Hariyanto, Hariyanto
(IJCSAM) International Journal of Computing Science and Applied Mathematics Vol 7, No 1 (2021)
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24775401.v7i1.7691

Abstract

Human Immunodeficiency Virus (HIV) is an AIDS (Acquired Immuno Deficiency Syndrome) virus that attacks the immune system for which there is no cure. When the immune system has decreased, it is prone to diseases such as Hepatitis B disease. To reduce the error value of the number of subpopulations, we use an interval approximation. One of the simulation calculations that the number of variables initially intervals is Taylor model. Taylor's model can be used to verify that the number of people infected with HIV and Hepatitis B will not exceed the specified number of unsafe sets. To calculate the set of states that are reached by the system over a certain period of time, given the initial conditions and parameters. The initial condition is divided into three scenarios, an affordable set of states, safety verification can be done. As a result of the safety verification of the three scenarios provided there is no set of states that are not safe, so the results of all three scenarios are safe.
Digital Option Pricing Approach Using A Homotopy Perturbation Method Amirul Hakam; Islachiyatul Ummah; Frida Akbar Rani; Nur Asiyah; Endah RM Putri
(IJCSAM) International Journal of Computing Science and Applied Mathematics Vol 7, No 2 (2021)
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24775401.v7i2.9776

Abstract

An option is a financial contract between buyers and sellers. The Black-Scholes equation is the most popular mathematical equation used to analyze the option pricing. The exact solution of the Black-Scholes equation can be approached by several approximation methods, one of the method is a Homotopy Perturbation Method (HPM). The simplest type of option, digital options were analyzed using the HPM. The digital option pricing approach using the HPM is in a power series form, which in this paper is presented the solution in the fourth power. This solution is compared with the exact solution of the Black-Scholes equation for digital options. The results show that the approach using HPM is very accurate.
Analysis Mathematical Model of Radicalization S(Susceptible) E(Extremists) R(Recruiters) I(Immunity) with Optimal Control Dauliyatu Achsina; Mardlijah Mardlijah
(IJCSAM) International Journal of Computing Science and Applied Mathematics Vol 7, No 2 (2021)
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24775401.v7i2.4605

Abstract

Radicalization is a process when people come to adopt increasingly extreme political or religious ideologies, radicalization almost occurs in almost all countries in the world. Seeing a number of cases in recent times, radicalization has become a major concern for the world, especially in the field of national security. Radicalization has become one of the focuses in the national security sector because it leads to acts of extremism, violence and terrorism. The level of radicalization is high in each year and continues to increase so special supervision is needed to control it because it causes huge financial losses. Therefore a preventive effort is needed to overcome this. Efforts to prevent radical movements have been widely used, ranging from direct or indirect, in addition some things have also been done directly by the government. So far it has not been seen how effective these efforts are. Radicalization is formed because of the influence of extremists and the recruiters group. Many individuals are affected and enter the group because they are influenced by the people in the group who are within their scope. To overcome these problems, a control is needed as an effort to prevent radicalism. Prevention efforts are in the form of strict sanctions given to recruiters. Next to find out how the influence of controls on individual groups of recruiters is needed a tool to represent the tool is a model. The mathematical model that is suitable for representing the appropriate problems of radicalization is the Susceptible (S) , Extremists (E) Recruiters (R), Immunity (I) model.
Front Cover Vol.7 No.2 2021 Ijcsam Editor
(IJCSAM) International Journal of Computing Science and Applied Mathematics Vol 7, No 2 (2021)
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24775401.v7i2.11395

Abstract

Accelerated Numerical Method for Singularly Perturbed Differential Difference Equations Habtamu Garoma Debela; Gemechis File Duressa; Masho Jima Kebeto
(IJCSAM) International Journal of Computing Science and Applied Mathematics Vol 7, No 2 (2021)
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24775401.v7i2.6859

Abstract

In this paper, accelerated finite difference method for solving singularly perturbed delay reaction-diffusion equations is presented. First, the solution domain is discretized. Then, the derivatives in the given boundary value problem are replaced by finite difference approximations and the numerical scheme that provides algebraic systems of equations is obtained, which can easily be solved by Thomas algorithm. The consistency, stability and convergence of the method have been established. To increase the accuracy of our established scheme we used Richardson's extrapolation techniques. To validate the applicability of the proposed method, four model examples have been considered and solved for different values of perturbation parameters and mesh sizes. The numerical results have been presented in tables and graphs to illustrate; the present method approximates the exact solution very well. Moreover, the present method gives better accuracy than the existing numerical methods mentioned in the literature.
Ijcsam Editors Ijcsam Editor
(IJCSAM) International Journal of Computing Science and Applied Mathematics Vol 7, No 2 (2021)
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24775401.v7i2.11396

Abstract

Identification of The Phases of The Spread of Covid-19 in Maluku Province with Richards Curve Nanang Ondi; Yopi Andry Lesnussa; Francis Yunito Rumlawang
(IJCSAM) International Journal of Computing Science and Applied Mathematics Vol 7, No 2 (2021)
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24775401.v7i2.10925

Abstract

Richards Curve is an extension of the Logistics Curve which was first discovered in 1959 and is a type of sigmoid curve where in the sigmoid curve there are 3 growth phases, namely the logarithmic phase, the linear phase and the aging phase. This research aims to identify and determine the phase of the spread of COVID-19 in Maluku province with the Richards curve. From the calculation results obtained that the initial phase of the spread occurred on March 23 - July 5 2020, the peak phase of the spread occurred on July 6 - October 22 2020, the final phase of the peak of the spread occurred on October 23, 2020 - April 14, 2021 and began to enter the final phase of the spread on April 15, 2021.
Effect of Fear in Leslie-Gower Predator-Prey Model with Beddington-DeAngelis Functional Response Incorporating Prey Refuge Adin Lazuardy Firdiansyah
(IJCSAM) International Journal of Computing Science and Applied Mathematics Vol 7, No 2 (2021)
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24775401.v7i2.8718

Abstract

In the present paper, we study the effect of antipredator behavior due to fear of predation on a modified Leslie-Gower predator-prey model incorporating prey refuge which predation rate of predators follows Beddington-DeAngelis functional response. The biological justification of the model is demonstrated through non-negativity, boundedness, and permanence. Next, we perform the analysis of equilibrium and local stability. We obtain four equilibrium points where two points are locally asymptotically stable and other points are unstable. Besides, we show the effect of the fear in the model and obtain a conclusion that the increased rate of fear can decrease the density of both populations, and prey populations become extinct. Meanwhile, for the case with a constant rate of fear, the prey refuge helpful to the existence of both populations. However, for the case with the fear effect is large, prey refuge cannot cause the extinction of predators. Several numerical simulations are performed to support our analytical results.
An Application of Binary Cuckoo Search Algorithm to Orienteering Problem Alberto, Giovano; Tan, Alfian
(IJCSAM) International Journal of Computing Science and Applied Mathematics Vol 7, No 2 (2021)
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24775401.v7i2.8663

Abstract

This research applies the cuckoo search metaheuristics model to find solutions to the Orienteering Problem (OP). The OP formulation is useful to model a situation in which someone wants to determine an optimal city route that is subject to a specified time constraint. OP can be categorized into NP Hard Problem which takes a very long time to analytically find the optimal solution as the number of entities involved increases. Therefore, metaheuristics often become an option to deal with this situation. A cuckoo search model based algorithm is developed in this research. An adjustment for discrete combinatorial problem is performed by adopting an idea of binary cuckoo search method. In addition, three types of local search methods are considered to improve the searching performance. This algorithm can eventually find better solutions for some of the 18 cases than two other benchmarked algorithms. Furthermore, experiment on model parameters shows that the worse nest fraction (P_alpha) affects the quality of solutions obtained.
Texture-Based Woven Image Classification using Fuzzy C-Means Algorithm Soetrisno Soetrisno; Dwi Ratna Sulistyaningrum; Isi Bifawa’idati
(IJCSAM) International Journal of Computing Science and Applied Mathematics Vol 8, No 1 (2022)
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24775401.v8i1.9588

Abstract

There are a lot of texture-based image data stored in the storage media Internet. Most of these data portray the cultural fabric texture results from a State. Because of the many variants of the existing texture, the data need to be easily accessible through the Internet. Moreover, the area of origin of weaving the surface is easily known. Therefore, it is necessary to develop a classification system based on woven image data. The texture of the image data stored in a database on the Internet can be grouped/clustered well, making it easy to access. This study examines a texture-based woven image classification using fuzzy c-means algorithm. This method combines extraction methods Gabor filter, fuzzy c-means algorithm and Euclid distance similarity measure. An experiment was done using the system as many as 60 woven images from Bali, NTT and Central Java areas, each taken as many as 25 images weaving. The test results stated that testing using the test images taken from the images in the database generates a 100% accuracy rate, and testing using test images taken from outside the database produces an accuracy rate of 94%.

Page 9 of 16 | Total Record : 155