Jurnal Riset Mahasiswa Matematika
Jurnal Riset Mahasiswa Matematika (JRMM) publishes current research articles in any area of Mathematics Research such as graph labelings, modeling, statistics, actuaria, optimal network problems, metric dimension, graph coloring, rainbow connection and other related topics. JRMM is published six times a year, namely in February, April, June, August, October, December JRMM is published by the Association of Indonesian Islamic Religious University Mathematics Lecturers and Department of Mathematics Universitas Islam Negeri Maulana Malik Ibrahim Malang (UIN Malang). All papers will be refereed in the normal manner of mathematical journals to maintain the high standards. JRMM is an open access journal. Full-text access to all papers is available for free. Jurnal Riset Mahasiswa Matematika (JRMM) has been indexed by Google Scholar
Articles
173 Documents
Pengamanan Pesan Menggunakan Algoritma One Time Pad dengan Linear Congruential Generator sebagai Pembangkit Kunci
Jamilatul Maghfiroh;
Turmudi Turmudi;
Elly Susanti
Jurnal Riset Mahasiswa Matematika Vol 2, No 3 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i3.16770
Cryptography is one method that can be used to secure a message by hiding the original text. This study uses the One Time Pad (OTP) algorithm to secure a message and the Linear Congruential Generator (LCG) algorithm as a key generator. The purpose of this study is to describe the key generation process using the LCG algorithm, the encryption and decryption process of messages using the OTP algorithm. The process of encrypting and decrypting messages using the OTP algorithm requires a key as long as the original message and must be random. Therefore, a random number generation process is carried out using the LCG algorithm before encoding the message. The results of this study are the LCG algorithm is able to build dynamic keys with the condition that the length of the period must be greater than or equal to the length of the plaintext. The process of encoding messages using the OTP algorithm has a high level of security because the number of characters used is more and the process of sending messages is easier. The resulting ciphertext is a very random and unreadable message that is difficult to decipher.
Membangun Super Enkripsi untuk Mengamankan Pesan
Laura Agustina;
Imam Sujarwo;
Muhammad Khudzaifah
Jurnal Riset Mahasiswa Matematika Vol 2, No 3 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i3.16335
The issue of message security or an information is very important. A science that studies about securing the confidentiality of messages using passwords is called cryptography. To enhance security, two algorithms are combined to secure messages. Super encryption is a concept that uses a combination of two or more substitution and permutation (transposition) cryptography techniques to obtain an algorithm that is more difficult to crack. The first thing to do is to encrypt the message using a substitution technique (Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In this study, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipher and Bifid Cipher algorithms to secure messages. The message encryption process is using the Vigenere Cipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for the second encryption process. The encryption process is done the other way around, starting from the back of the encryption process. The combination of these two algorithms results in more secure message security.
Analisis Model Epidemi SEIR Menggunakan Metode Runge-Kutta Orde 4 pada Penyebaran COVID-19 di Indonesia
Anis Putri Rahmadhani;
Ari Kusumastuti;
Juhari Juhari
Jurnal Riset Mahasiswa Matematika Vol 2, No 3 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i3.16355
This study discusses the analysis of the Susceptible-Exposed-Infected-Recovered (SEIR) epidemic model using the fourth-order Runge-Kutta method on the spread of COVID-19 in Indonesia by taking into account the factors limiting community interaction and the percentage of vaccination as model parameters. The purpose of this study was to determine the application of the Susceptible–Exposed–Infected–Recovered (SEIR) model using the fourth-order Runge-Kutta method in dealing with COVID-19 in Indonesia. The steps in analyzing the model are to determine the stability of the model that produces local asymptotic stability, then carry out the implementation as well as simulation using the fourth-order Runge-Kuta method in dealing with COVID-19 in Indonesia. The calculation results show the effect of limiting community interaction and vaccination in reducing cases of COVID-19 infection. Where, when limiting public interaction, the number of cases of COVID-19 infection is lower than before the restrictions on community interaction were carried out, and the higher percentage of vaccinations also resulted in more sloping infection cases. This study provides information that if restrictions on community interaction continue to be carried out by continuing to increase the percentage of vaccinations, it is estimated that the daily graph of positive cases of COVID-19 will be increasingly sloping and close to zero. Thus, the addition of new cases will decrease and it is hoped that the COVID-19 pandemic will end soon.
Analisis Sentimen Mahasiswa Terhadap Perkuliahan Dalam Jaringan Menggunakan Metode Naïve Bayes Classifier
Bagus Aziz Rahmatullah;
Imam Sujarwo;
Erna Herawati
Jurnal Riset Mahasiswa Matematika Vol 2, No 3 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i3.16415
Since the pandemic of Covid-19 was happened in Indonesia, the government shared the letter of The Ministry of Education and Higher Culture Education Directorate No.1, year 2020 about prevention of the spread of Corona Virus Disease (Covid-19) in higher education. Through the letter, The Ministry of Education and Culture gave an instruction for college to organize online learning and suggested students to study at their home. Online learning which was considered as a strategy then became a controversy because it needed adaption. This sudden change from normal learning to online learning caused many responses from students. The aim of this research was to analyze student sentiment or responses on online learning in this pandemic era of Covid-19 in Indonesia by using data which had been collected using questionnaire and processed using naïve bayes classifier method. This research was case study descriptive quantitative research. The research was done by collecting the data first. The data was collected through questionnaire with the question about their opinion on online learning in this pandemic Covid-19 era. The data was 157 student’s data opinion on online learning. After the data was collected, the data was cleaned first from question mark and the words which didn’t give an effect in sentiment analysis. After the data was cleaned, then the result of the classification will be showed as well as the accuracy which the model earned. The result showed that online learning had negative sentiment more than positive sentiment. The height of negative sentiment was caused by discomfort of student in online learning. The word which frequently showed was ‘tidak efektif’, ‘susah’, and ‘tugas’. The accuracy of this model was 75% when the result of this accuracy was good result in classification.
Analisis Dinamik Model Infeksi Mikrobakterium Tuberkulosis Dengan Dua Lokasi Pengobatan
Ummul Aulia KT;
Heni Widayani;
Ari Kusumastuti
Jurnal Riset Mahasiswa Matematika Vol 2, No 3 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i3.16753
Tuberculosis is an infectious disease caused by Mycobacterium tuberculosis. The disease is considered dangerous because it infects the lungs and other organs of the body and can lead to death. This study discusses a mathematical model for the spread of tuberculosis with two treatment sites as an effort to reduce the transmission rate of TB cases. Treatment for TB patients can be done at home and in hospitals. The purpose of this study was to construct a mathematical model and analyze the qualitative behavior of the TB spread model. The construction of the model uses the SEIR epidemic model which is divided into five subpopulations, namely susceptible subpopulations, latent subpopulations, infected subpopulations receiving treatment at home, and infected subpopulations receiving treatment at the hospital, and cured subpopulations. The analysis of qualitative behavior in the model includes determining the local and global equilibrium and stability points. The results of the analysis shows that the model has two equilibrium points, namely a disease-free equilibrium point and the endemic equilibrium point. The existence of endemic equilibrium point and the local and global stability of the two equilibrium points depend on the basic reproduction number denoted by . If , there is only disease-free equilibrium point. If , there are two equilibrium points, namely the disease-free equilibrium point and the endemic equilibrium point. Stability analysis shows that the disease-free equilibrium point is locally and globally asymptotically stable if . While, if , the endemic equilibrium point will be asymptotically stable locally and globally.
Membangun Super Enkripsi untuk Mengamankan Pesan
Laura Agustina;
Imam Sujarwo;
Muhammad Khudzaifah
Jurnal Riset Mahasiswa Matematika Vol 2, No 4 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i4.14470
The issue of message security or an information is particularly important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipherand Bifid Cipher algorithms to secure messages. The message encryption process is using the VigenereCipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for thesecondencryptionprocess.Theencryptionprocessisdonetheotherwayaround,startingfromthebackoftheencryptionprocess.Thecombinationofthesetwoalgorithmsresultsinmoresecuremessagesecurity.
Indeks Harmonik dan Indeks Gutman Graf Nilradikal pada Gelanggang Komutatif dengan Satuan
Luluk Afifah;
Imam Sujarwo;
Muhammad Khudzaifah
Jurnal Riset Mahasiswa Matematika Vol 2, No 4 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i4.14902
Graph theory is a topic that is still an important subject to discuss. This is because until now graph theory has many practical applications in various disciplines, for example in biology, computer science, economics, informatics engineering, linguistics, mathematics, health, and social sciences. This study discusses the Gutman index of nilradical graphs in the commutative ring with unity.A nilradical graph whose vertices are non-zero nilpotent elements, when the domain is a commutative ring with units, it forms a complete graph only if the commutative ring with units we use is limited to a positive integer modulo n (Z_n). Where n is the square of the prime number p which is less than equal to 3. It is known that the general pattern of harmonic indices and Gutman indices of nilradical graphs in the commutative ring with unity are H(N(Z_(n=p^2 ) ))=((p-2)^2+(p -2))/2(p-2) and Gut(N(Z_(n=p^2 ) ))=(1/2 ((p-2)^2+(p-2))) (p- 2)^2 respectively. In its application, this general form can be used as a numerical parameter of a graph in chemical graph theory, molecular topology, and mathematical chemistry.
Penyelesaian Sistem Persamaan Hukum Laju Reaksi dengan Metode Transformasi Differensial
Siti Maftuhah;
Heni Widayani;
Ari Kusumastuti
Jurnal Riset Mahasiswa Matematika Vol 2, No 4 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i4.16805
This research is focused on solving the rate law equation by using the differential transformation method. The rate law equation describes the chemical reaction problem from the concentration of a reactant that produces a product. The differential transformation method is a semi-analytic numerical method that can provide approximate solutions in the form of a series because the method is obtained from the expansion of the Taylor series expansion. With the help of Maple software, a comparison of the solution plots of y_1 (t),y_2 (t) and y_3 (t), can be observed that the difference in computational results between the Runge-kutta method and the differential transformation depends on the order of k. The curve of the differential transformation method is getting closer to the curve of the Runge-Kutta method at a certain value of k for each y_1 (t),y_2 (t) and y_3 (t). The conclusion of this research is that the application of the differential transformation method has been successfully carried out in the case of a system of ordinary differential equations. For further research, the researcher suggests that the next research applies the method of differential transformation in cases and initial values that are more varied.
Perbandingan Uji Akurasi Fuzzy Time Series Model Cheng Dan Lee Dalam Memprediksi Perkembangan Harga Cabai Rawit
Dewi Ismiarti;
Jami'atu Sholichati Nafisah;
Evawati Alisah;
Imam Sujarwo
Jurnal Riset Mahasiswa Matematika Vol 2, No 4 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i4.16808
Fuzzy Time Series is a method used to predict data. Fuzzy Time Series is a development of time series analysis, where Fuzzy Time Series uses the concept of fuzzy sets as the basis for its calculations. In addition, Fuzzy Time Series has various methods such as Cheng and Lee Fuzzy Time Series. In this study, Fuzzy Time Series is used to predict data on the price development of cayenne pepper in Indonesia. By using these two methods, an analysis of the level of accuracy is then carried out using several methods. So that the results obtained in this study are the MAE value of the Cheng method 669,162 and the Lee method 502,285, the MSE value of the Cheng method 1.261.393 and the Lee method 699.030.1, the MPE value of the Cheng method 0,01% and the Lee method -0,02%, and The MAPE value of the Cheng method is 1,24% and the Lee method is 0.92%. The Lee method has a smaller error value than the Cheng method, so that the Lee method is declared to be better than the Cheng method.
Implementasi Algoritma Floyd Warshall dalam Pencarian Rute Terpendek Lokasi Tower Base Transceiver Station (BTS) pada PT Citra Akses Indonusa
Bella Nafa Savitri;
Mohammad Nafie Jauhari;
Evawati Alisah;
Hisyam Fahmi
Jurnal Riset Mahasiswa Matematika Vol 2, No 4 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.18860/jrmm.v2i4.16811
PT Citra Akes Indonusa is a company that operates on the expertise of information technology services in Banten Province. One of the services provided by the company requires the construction of a Base Transceiver Station (BTS) tower. The tower requires maintenance if there is damage to the network signal. As a result, the shortest route is needed to make it easier for employees to reach the tower location to be more effective. There are eight BTS tower locations in Tangerang Regency and three BTS tower locations in Tangerang City. The process of finding the shortest route in this study uses the Floyd Warshall algorithm, which is unique in finding the shortest route by comparing each edge of all edges that are passed. The process of testing the shortest route is done by selecting the starting point, then selecting several BTS tower locations. Next, the shortest route will be searched using the Floyd Warshall algorithm from each point of destination for the BTS tower location, then the BTS tower location will be selected first and so on until the last destination. The effectiveness of this shortest route search involves a comparison of the routes presented by Google Maps. Based on the results of 30 randomized trials on BTS tower locations, the average shortest route effectiveness was 25.54% compared to the route generated by Google Maps. This is due to the selection at each BTS tower destination location so as to make the route more effective.