cover
Contact Name
Vita Kusumasari
Contact Email
jkma.journal@um.ac.id
Phone
-
Journal Mail Official
jkma.journal@um.ac.id
Editorial Address
Department of Mathematics, Universitas Negeri Malang Jln. Semarang 5, Malang Postal Code: 65145 (Gedung O7)
Location
Kota malang,
Jawa timur
INDONESIA
Jurnal Kajian Matematika dan Aplikasinya
ISSN : -     EISSN : 27227650     DOI : -
Core Subject : Education,
The aim of this journal publication is to disseminate research results and new theories that have been achieved in the area of mathematics. Jurnal Kajian Matematika dan Aplikasinya (JKMA) particularly focuses on the main issues in the development of the sciences of mathematics, in the fields of algebra, analysis, applied mathematics, combinatorics, computational sciences, geometry, and statistics.
Articles 3 Documents
Search results for , issue "Vol 4, No 1 (2023): JANUARY" : 3 Documents clear
LINEAR ALGEBRA APPLICATIONS TO DETECT THE EXISTENCE OF PLAGIARISM AND IN SEARCH ENGINE METHODOLOGY Nainggolan, Sahat Pandapotan; Solikhin, Mukhammad; Anwar, Andi Muhammad; Rizki, Nanda Arista
Jurnal Kajian Matematika dan Aplikasinya (JKMA) Vol 4, No 1 (2023): JANUARY
Publisher : UNIVERSITAS NEGERI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um055v4i12023p1-5

Abstract

The theory of algebra is highly beneficial and used in daily life. Identifying plagiarism is one of many activities that can be solved with the concept of linear algebra. Even today, plagiarism is still a crucial issue to discuss, preferably in academic scope, both in assignment papers and academic theses. Identifying plagiarism aims to provide a document as a vector. Even the basic concept of linear algebra can be applied in plagiarism detection applications. This paper proposed a modeling example of plagiarism checking on a document with a matrix representation and the calculation of angles among subspaces of each compared document. Finally, the results can be used as one of the considerations to determine the similarity index.Keywords: plagiarism, linear algebra, vector, matrix representation
PENERAPAN PEWARNAAN GRAF UNTUK MENINGKATKAN EFISIENSI PENJADWALAN MENGAJAR GURU DI MTS AL-KHOIRIYAH Hamid, Nur; Maghfirah, Hidayatul; Su'aibah, Siti; Jawad, Muhammad; Khoiruman, Muhammad; Hafiizh, Mochammad
Jurnal Kajian Matematika dan Aplikasinya (JKMA) Vol 4, No 1 (2023): JANUARY
Publisher : UNIVERSITAS NEGERI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um055v4i12023p6-14

Abstract

Scheduling subjects in a school often gives a conflicting schedule to some teachers. On the other hand, graph theory can help to solve. One of the methods to solve the problem is implementing a coloring graph. In this paper, we apply the coloring graph using the Welch-Powell algorithm for scheduling subjects in MTs Al-Khoiriyah.Keywords: Welch-Powell algorithm, Coloring graph.
IMPLEMENTASI MATRIKS ATAS GELANGGANG Z_p⨁Z_q⨁Z_r PADA KRIPTOGRAFI CIPHER HILL Ro'uf, Ikhsan Abdul; Solikhin, Mukhammad; Aeli, Lita Wulandari; Pahrany, Andi Daniah; Hasanah, Irmatul
Jurnal Kajian Matematika dan Aplikasinya (JKMA) Vol 4, No 1 (2023): JANUARY
Publisher : UNIVERSITAS NEGERI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17977/um055v4i12023p15-23

Abstract

Cryptography is a method for securing data or information from data leaks. In cryptography, there are two important processes, namely, the encryption and decryption processes. Encryption is the process of changing plaintext into ciphertext using certain keys and algorithms, while decryption is the process of changing ciphertext into plaintext using keys and algorithms that match the encryption. There is a cryptosystem that is well known, namely Cipher Hill. Cipher Hill uses a square matrix for the encryption and decryption process. In this research, an mxn-sized matrix will be used over the Direct Sum ring Z_p⨁Z_q⨁Z_r to expand the Cipher Hill algorithm. The author also uses the pseudoinverse concept to find the inverse of an mxn matrix. By using an mxn matrix, the encryption results allow the length of the plaintext to be different from the length of the ciphertext.Keywords: Cipher Hill, Cryptography, Decryption, Encryption, Direct Sum, Pseudoinvers

Page 1 of 1 | Total Record : 3