Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP)
JMP is a an open access journal which publishes research articles, reviews, case studies, guest edited thematic issues and short communications/letters in all areas of mathematics, applied mathematics, applied commutative algebra and algebraic geometry, mathematical biology, physics and engineering, theoretical bioinformatics, experimental mathematics, theoretical computer science, numerical computation and applications of systems, partial differential and differential equations, integral and integral differential equations and mathematical modeling.
Articles
375 Documents
PENENTUAN KRITERIA PENGHENTIAN ITERASI PADA ALGORITMA STROBERI
Mutia Nur Estri;
Siti Rahmah Nurshiami;
Rina Reorita;
Muhammad Okky Ibrohim
Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP) Vol 10 No 1 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP)
Publisher : Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jmp.2018.10.1.2834
This paper discusses the application of two types of stopping criterion on the strawberry algorithm, which are stopping criteria based on iterative error and Cauchy criterion. Furthermore, the strawberry algorithm program is simulated on the optimization problem with the objective function is quadratic function. The simulation results on optimization problem with the objective function is quadratic function show that strawberry algorithm with stopping criterion based on Cauchy criterion has the best performance, when compared with stopping criterion based on iterative error and without stopping criterion
REKOMBINASI MOLEKUL DNA
Isah Aisah;
Litani Farin;
Hendra Mulyana
Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP) Vol 10 No 1 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP)
Publisher : Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jmp.2018.10.1.2836
Every living creature has unique genetic materials. These genetic materials are stored in a DNA molecule. In some cases, it is founda change in a normal DNA molecule into an abnormal one. Recombining DNA molecule is one way to solve this problem. In mathematical view, splicing system is a mathematical model of a system of a restriction enzyme’s action in recombining DNA molecule. Splicing language is a language constructed by splicing system.Result obtained from double-chained DNA molecule recombination process using uniform splicing system and uniform splicing language is a various language, which is depend on: (1) how we determine which DNA molecule that contains donor’s and recipient’s gen and (2) how we choose involved restriction enzyme. Apart from that, DNA molecule recombination can only be done on DNA molecule which has a DNA molecule’s partition a restriction enzyme could identify.
ANALISIS ANTRIAN SINGLE CHANNEL SINGLE SERVER DENGAN LAYANAN BERKELOMPOK PADA KONEKSI INTERNET DI UNIVERSITAS ISLAM INDONESIA
Karina Noraprilia;
Atina Ahdika
Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP) Vol 10 No 1 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP)
Publisher : Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jmp.2018.10.1.2837
Internet is very important to support students in getting knowledge. However, internet access in college is sometimes not proportional to the number of users. Current speed of wireless network connection in Universitas Islam Indonesia (UII), named UIIAccess, is also not proportional to the number of users. Based on these problems, this research was conducted to study UIIAccess performance in providing internet service. The analysis used is single channel single server queuing model with bulk service. The result shows that traffic intensity of the system is 0.9694 indicating that the intensity of UIIAccess service is very solid. The queue performance shows that the average number of users in the system and waiting in the queue are respectively 32 and 11 users per minute, the average time spent by a user in the system and in the queue are consecutively 10.45574 and 3.63663 minutes. It indicates that the queue on UIIAccess is very crowded because of the imbalance between access speed and the number of users
THE ANALYSIS OF MULTIDIMENSIONAL ANOMALOUS DIFFUSION EQUATION
Bambang Hendriya Guswanto
Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP) Vol 10 No 1 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP)
Publisher : Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jmp.2018.10.1.2838
We discuss the properties of the fundamental solution of multidimensional anomalous diffusion equation such as symmetric, decay, nonnegative, normality, and bounded in mathematical analysis approach.
REPRESENTASI KODE KERNEL PADA DNA
Isah Aisah;
Mochamad Suyudi
Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP) Vol 10 No 2 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP)
Publisher : Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jmp.2018.10.2.2839
Deoxyribonucleic acid (DNA) is built by several component such as group of deoxyribose sugar, group of phosphate, and group of nitrogen bases. Nitrogen bases’s set can be written as . Combination of three elements of N form triplet codes (codon) which later are translated into amino acid during protein synthesis process. During amino acid forming process, sometimes error can occurs and change something. This error is called gene mutation. There are several gene mutations, one of them is point mutation. This mutation is caused by one change of nitrogen base in a DNA sequence.Gene mutation can be represented by using several ways. One of them is using Kernel code’s representation. This representation is gained by constructing a homomorphism of cross product of group (DNA sequences’s group) to another comutative group. Kernel of this homomorphism is called kernel code, and its elements represent normal DNA sequences
PELABELAN TOTAL TAK REGULER PADA BEBERAPA GRAF
Nugroho Arif Sudibyo;
Siti Komsatun
Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP) Vol 10 No 2 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP)
Publisher : Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jmp.2018.10.2.2840
For a simple graph G with vertex set V (G) and edge set E(G), a labeling $\Phi:V(G)\cup U(G)\rightarrow\{1,2,...k\}$ is called a vertex irregular total k- labeling of G if for any two diferent vertices x and y, their weights wt(x) and wt(y) are distinct. The weight wt(x) of a vertex x in G is the sum of its label and the labels of all edges incident with the given vertex x. The total vertex irregularity strength of G, tvs(G), is the smallest positive integer k for which G has a vertex irregular total k-labeling. In this paper, we study the total vertex irregularity strength of some class of graph.
OPTIMASI PROSES PENGERINGAN KOPI DI PABRIK KOPI PTPN XII GUMITIR DENGAN MENGGUNAKAN MASON DRYER
Rusli Hidayat;
Firdaus Ubaidillah;
Hadi Siswanto
Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP) Vol 10 No 2 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP)
Publisher : Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jmp.2018.10.2.2841
Coffee Processing Plant of the PTPN XII Gumitir is a coffee drying factory that was built in 1910 using a giant barch dryer called Mason Dryer as many as four units, each of which has a capacity of 20 tons, so factory is capable of processing 80 tons for a single simultaneous process. The ambient temperature used is 120oC with a residency time of 18 hours and desirable level of reduction in water content of 9%. To optimize the process, a mathematical model of the process is needed to predict energy use, heat distribution (heat profile in coffe beans) and residency time (heat penetration time required by coffee beans). Existing process models are still limited to models for drying the coffe beans. To optimize the process, a heat transfer temperature from ambient temperature (heating temperature) is neededto enter the Mason Dryer which function as the ambient temperature of the coffee beans at each location/ position of the coffee beans in Mason Dryer. With the discoveryof the model for ambient temperaturewill complement the existing model.
KEMAMPUAN PENALARAN BERDASARKAN KEYAKINAN MATEMATIKA DALAM PEMBELAJARAN PBL MELALUI PENDEKATAN INTERAKSI DYADIC
Dyah Retno Kusumawardani
Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP) Vol 10 No 2 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP)
Publisher : Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jmp.2018.10.2.2842
The purposes of this research were (1) to describe the learning quality of PBL through dyadic interaction approach to mathematical reasoning ability of grade X students of IT Al Irsyad Purwokerto High School (2) to find pattern of students reasoning ability based on mathematical belief. This study uses a mixed method. Data analysis started from the analysis of test items. The analysis uses the prerequisite test and then hypothesis testing uses rara average (t-test), then the proportion of comparative tests (test-z) is to calculate the classical completeness. Further testing of determining the difference between the two classes uses different test average (t-test right side). Qualitative data analysis uses qualitative description. The results of quantitative research shows that learning class with PBL and dyadic interaction approach reached classical total 80%. The average difference test showed class’ results with PBL dyadic interaction approach better than a class activity with PBL. Subjects with very low belief can only fulfill 1 reasoning indicator well. Subjects with low belief can fulfill 3 reasoning indicators well and have not been able to fulfill 1 other indicator. Subjects with high belief can fulfill 4 indicators where 1 indicator is imperfect and subject with very high belief can fulfill all the indicators of reasoning well and complete.
PENENTUAN MODEL TERBAIK REGRESI RIDGE DAN TERAPANNYA
Sri Utami Zuliana
Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP) Vol 10 No 2 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP)
Publisher : Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jmp.2018.10.2.2843
Ridge regression is one of penalized regression methods. Penalized regression methods are usually used for solving the problem of multicollinearity. The best model in ridge regression has been chosen by some previous techniques. In the techniques there is bias-variance trade-off. In this paper, Schall algorithm will be applied for choosing the best model. Schall algorithm is faster because it only needs a few iteratives to be convergence.
PENYEMBUNYIAN CIPHERTEXT ALGORITMA GOST PADA CITRA KE DALAM AUDIO DENGAN METODE LEAST SIGNIFICANT BIT
Abduh Riski;
Heri Purwantoro;
Ahmad Kamsyakawuni
Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP) Vol 10 No 2 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika (JMP)
Publisher : Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jmp.2018.10.2.2844
Government Standard (GOST) is a 64-bit block cipher algorithm with 32 round, use a 256-bit key. The weakness of this algorithm is the keys so simple, than make cryptanalyst easy to break this algorithm. Least Significant Bit (LSB) use to insert message into another form without changing the form of the cover after insertion. This research does by hiding encrypted ciphertext to image and hiding image into audio. This research use grayscale and RBG image with BMP and PNG format. Audio using music with wav format. Security analysis using differential analysis NPCR and UACI. Security analysis aims to calculate percentage from cover after hiding the message. The smaller the NPCR and UACI values, the higher the level of security the message is hidden. The results of the analysis of concealment in the image obtained by the average values of NPCR and UACI were 99.98% and 3.46% respectively. While the results of the analysis of hiding in audio obtained the average value of NPCR and UACI were 83.78% and 12.66% respectively.