cover
Contact Name
Juhari
Contact Email
juhari@uin-malang.ac.id
Phone
+6281336397956
Journal Mail Official
jrmm@uin-malang.ac.id
Editorial Address
Jalan Gajayana 50 Malang, Jawa Timur, Indonesia 65144 Faximile (+62) 341 558933
Location
Kota malang,
Jawa timur
INDONESIA
Jurnal Riset Mahasiswa Matematika
ISSN : 28081552     EISSN : 28084926     DOI : https://doi.org/10.18860/jrmm
Core Subject : Education,
Jurnal Riset Mahasiswa Matematika (JRMM) publishes current research articles in any area of Mathematics Research such as graph labelings, modeling, statistics, actuaria, optimal network problems, metric dimension, graph coloring, rainbow connection and other related topics. JRMM is published six times a year, namely in February, April, June, August, October, December JRMM is published by the Association of Indonesian Islamic Religious University Mathematics Lecturers and Department of Mathematics Universitas Islam Negeri Maulana Malik Ibrahim Malang (UIN Malang). All papers will be refereed in the normal manner of mathematical journals to maintain the high standards. JRMM is an open access journal. Full-text access to all papers is available for free. Jurnal Riset Mahasiswa Matematika (JRMM) has been indexed by Google Scholar
Articles 173 Documents
Penerapan Algoritma Floyd-Warshall pada Jalur Evakuasi Korban Kecelakaan di Boyolali Fitri Nofita Sari; Juhari Juhari; erna Herawati
Jurnal Riset Mahasiswa Matematika Vol 2, No 5 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i5.22006

Abstract

The Floyd-Warshall algorithm is one of the algorithms that can be used to solve the shoetest route problem and is the easiests to apply because it can find all the shortest routes between each possible pair of position and is part of a dynamic program that is very efficient in solving optimal route promblems. The Floyd-Warshall algorithm works by comparing each possible path on the graph for each node pair and checking the resulting node combination. The problem of the shortest route in daily life is the evacuation of victims of traffic accidents in Boyolali, Central Java. For evacuation to be more effective, a nearby route to the nearest hospital is needed. Based on the results of the research that has been done, it can be concluded that the study produced reference matrix in the form of the shortest trajectory used to determine the shortest route to nearest hospital in Boyolali, Central Java.
Modifikasi Vigenere Cipher Menggunakan Grup Simetri untuk Mengamankan Pesan Teks Niken Dwi Cahyanti; Turmudi Turmudi; Muhammad Khudzaifah
Jurnal Riset Mahasiswa Matematika Vol 2, No 5 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i5.16791

Abstract

Cryptography is widely used to overcome information security problems that are exchanged on the internet network. One of the algorithms in cryptography is the Vigenere Cipher, the algorithm is known as a robust method and is not easily solved. However, the Vigenere Cipher algorithm has a weakness, namely the key is short and is used repeatedly. Therefore, it is necessary to modify the Vigenere Cipher. The purpose of this study is to determine the modification of the Vigenere Cipher using a symmetric group and also to determine the level of security of the encryption results of Vigenere Cipher modification when compared to the Vigenere Cipher. The results obtained from this research is a new algorithm of the modification process of the Vigenere Cipher using symmetric groups. The modified Vigenere Cipher algorithm is proven to be stronger than the Vigenere Cipher. This is because the plaintext is scrambled first using a symmetric group encoding, so that the actual plaintext is safe against attacks by the Kasiski method and exhaustive key search. In addition, the resulting new algorithm also supports the use of capital letters, lowercase letters, numbers, and symbols.
Membangun Super Enkripsi untuk Mengamankan Pesan Laura Agustina; Imam Sujarwo; Muhammad Khudzaifah
Jurnal Riset Mahasiswa Matematika Vol 2, No 5 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i5.21036

Abstract

The issue of message security or an information is very important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipherand Bifid Cipher algorithms to secure messages. The message encryption process is using the VigenereCipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for thesecondencryptionprocess.Theencryptionprocessisdonetheotherwayaround,startingfromthebackoftheencryptionprocess.Thecombinationofthesetwoalgorithmsresultsinmoresecuremessagesecurity.
Penerapan Graf Berarah dan Berbobot untuk Mengetahui Inluencer yang Paling Berpengaruh dalam Penyebaran Informasi pada Twitter Aisyah Rafi' Addani; Turmudi Turmudi; Imam Sujarwo
Jurnal Riset Mahasiswa Matematika Vol 2, No 5 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i5.16810

Abstract

A graph is a non-empty set whose members are vertices and edges, where the edges connect several pairs of these vertices; likewise, social media connects users with each other through interests, relationships, likes and dislikes. The rapid development of technology in the era of globalization has made social media a more effective source of information, one of them is Twitter which has been used by 280 million people in the world. This research involves 100 Twitter users who are classified as Influencers in Indonesia who have more than 10,000 followers by visualizing their relationship with other users followed by them with a directed and weighted graph. First, the data is filtered using the Twecoll script in Python software, then the data is visualized using the Gephi software in the form of a directed and weighted graph. The centrality value is calculated to determine the influential influencers in spreading information on the network. Based on the results of the study, it was found that the network pattern of 100 Influencers that had been collected in the following list of @dearmyths accounts, there were 96 points and 1883 sides with the side having the highest weight being @detikcom, followed by @ivanlanin and @ernestprakasa through the results of centrality calculations as accounts that can disseminate information on the network.
Penerapan Metode Fuzzy Simple Additive Weigting Pada Interpretasi Hasil Penilaian Promosi Jabatan Pegawai Negeri Sipil Tre Hayu Ria Reta; Evawati Alisah; Mohammad Nafie Jauhari
Jurnal Riset Mahasiswa Matematika Vol 2, No 5 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i5.22004

Abstract

The Fuzzy Simple Additive Weighting (FSAW) method is a mechanism that can be used to support decision making. This method was chosen because a ranking process was carried out to determine the weight value of each attribute, which would select employees who were worthy of occupying the promoted position. This study aims to determine the results of the application of the FSAW method in the assessment of civil servant promotion at the Malang City Education and Culture Office to increase objectivity and fairness in the assessment of employee promotion. Some problems that often occur in employee evaluation are the employee evaluation process which is still conventional so that it is less effective in calculation. The solution to overcome this problem is to use a Fuzzy Multi Attribute Decision Making (FMADM) decision support system with the FSAW method. This method requires a process to normalize the decision matrix (X) against a scale that can be compared with all available alternative values.  After each attribute has been determined its weight value, the ranking process is used to select the best alternative for this study.  The criteria used in this decision support system are SKP score, length of service, class, and education. The membership function used is the Triangular Fuzzy Number (TFN) representation. The results of the ranking calculation or the best value show the highest value, namely 1 from alternative 1 (employee 1) who is entitled to a promotion. It is expected that by using the FSAW method, the task of selectors will be able to more quickly and precisely identify employees who are worthy of occupying positions promoted based on the desired conditions.
Penyandian Pesan Hybrid dengan Myszkowski Cipher dan Rivest, Shamir, Adleman (RSA) Safitri, Sukmawati Indah; Khudzaifah, Muhammad; Jauhari, Mohammad Nafie
Jurnal Riset Mahasiswa Matematika Vol 2, No 6 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i6.22017

Abstract

Classical and modern cryptography have advantages and disadvantages in securing text messages. Hybrid algorithms can combine two algorithms to produce a higher level of message security when compared to one type of algorithm. This study discusses a hybrid algorithm that combines Myszkowski Cipher and RSA. The purpose of this research is to obtain ciphertext that is more difficult to crack by cryptanalysis. The hybrid algorithm process is done by encrypting text messages with the Myszkowski Cipher algorithm then the key used in the Myszkowski Cipher algorithm are encrypted using the RSA algorithm with the equation . Then the ciphertext and cipherkey will be obtained in numerical. The decryption process is done by decrypting the cipherkey by specifying the value of  as the private key so that  using the equation . Next is by trying the value of  until a  value is obtained, after which decryption to the equation , then the process of decrypting ciphertext using Myszkowski Cipher can be done. The benefit of this research is can improve the security of messages because it applies the advantages of each algorithm in its encoding.
Penerapan Metode Segmentasi Gabor Filter Dan Algoritma Support Vector Machine Untuk Pendeteksian Penyakit Daun Tomat Habibullah, Muhamad; Fahmi, Hisyam; Herawati, erna
Jurnal Riset Mahasiswa Matematika Vol 2, No 6 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i6.22023

Abstract

This research discusses about processing a formulation that we can give to diseased tomato leaves. Gabor Filter is a method used to detect textures using frequency and orientation parameters. The Support Vector Machine (SVM) algorithm is an algorithm that can be used classifying tomato leaf diseases. The purpose of this research is to determine the accuracy of the Gabor Filter segmentation and the Support Vector Machine Algorithm for detecting tomato leaf disease to facilitate farmers in analyzing diseases on tomato leaves. The input will go through pre-processing of RGB pixels to Greyscale ones before being processed using Gabor Filter. This Gabor Filter process segments the image to produce a magnitude value. The results of the image magnitude values here will be seen and will enter the classification process using SVM. The SVM algorithm aims to find the best hyperlane on tomato leaves that have been segmented to separate classes in the input space. The application of the SVM method with class classification of tomato leaves by calculating the energy value and entropy of the extraction results, assisted by 12 features, namely: CiriR, Feature G, FeatureB, Standard DeviationR, Standard DeviationG, Standard DeviationB, SkewnessR, SkewnessG, SkewnessB, Mean, Energy, Entropy are used to the simplity classification process with a high degree of accuracy. The process of classification of tomato leaf disease with test data of 600 images managed to get an accuracy value of 74.1667%. In order to facilitate the performance of farmers in predicting tomato leaf disease.
Metode Fuzzy TOPSIS Sebagai Sistem Pendukung Keputusan dalam Menentukan Pegawai Berprestasi Izdhihar, Fairuz Nadhif; Alisah, Evawati; Abdussakir, Abdussakir
Jurnal Riset Mahasiswa Matematika Vol 2, No 6 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i6.22024

Abstract

Fuzzy TOPSIS as a decision support system is a mathematical method with the best alternative concept chosen not only to have the shortest distance to the positive ideal solution, but also to have the longest distance to the negative ideal solution. The use of Fuzzy TOPSIS as a decision support system can minimize the weaknesses that exist in the TOPSIS method. The purpose of this study is to apply the Fuzzy TOPSIS method as a Decision Support System (SPK) to determine outstanding employees at the Batu City Population and Civil Registration Office. The Human Resources (HR) Division has the task of validating the value and processing the value of employee work goals and work behavior using the Fuzzy TOPSIS implementing into recommendations for outstanding employees. Data processing is carried out fuzzy, while calculations are carried out by the TOPSIS method. The output of this calculation is in the form of ranking the value of preferences and recommendations available for all employees. The calculation results obtained the highest preference value, namely by the first alternative with a value of 1. The alternative occupied a position as an outstanding employee at the Batu City Population and Civil Registration Office.
Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia Ludyawati, Ludyawati; Khudzaifah, Muhammad; Herawati, erna
Jurnal Riset Mahasiswa Matematika Vol 2, No 6 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i6.22041

Abstract

Vigènere Cipher is a symmetric cryptographic algorithm that uses the same type of key in the encryption and decryption process. The security of the Vigènere Cipher method lies in the modulo calculation used. ElGamal is an asymmetric cryptographic algorithm that uses two different types of keys in the encryption and decryption process. The security of the ElGamal algorithm lies in the complexity of calculating large prime numbers. The Vigènere Cipher and ElGamal have their advantages and disadvantages. The researchers are interested in combining the advantages of the two methods. In this study, two locks were carried out in the encryption and decryption process. The encryption process uses a public key and the decryption process uses a public key  and a secret key . The key used comes from key formation using the ElGamal algorithm. The key security formed from the ElGamal algorithm lies in the large prime , the primitive root  of the prime number , and the random integer  which comes from the last three digits of Student Number. The conclusion of this study is that the combination of the Vigènere Cipher and ElGamal methods can increase the security of  secret messages because it produces a ciphertext with twice the size ) of  the original message.
Penentuan Rute Terpendek Di Kantor Pos Kabupaten Blitar Dalam Pendistribusian Paket Menggunakan Algoritma Clarke And Wright Savings Puji Wianto, Wildan Faried Anshoriy; Juhari, Juhari; Nasichuddin, Achmad
Jurnal Riset Mahasiswa Matematika Vol 2, No 6 (2023): Jurnal Riset Mahasiswa Matematika
Publisher : Mathematics Department, Maulana Malik Ibrahim State Islamic University of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/jrmm.v2i6.22413

Abstract

Marketing strategy is a very important part in the execution of the overall corporate strategy, especially in a very tight competitor state. Route is a very important aspect considered by goods distribution companies. An effective and efficient distribution process is one of the factors whose conditions begin to align with other indicators in an effort to achieve customer satisfaction. The strategy that can be done is to involve calculating algorithms in contributing systematic and measurable solutions. The  Clarke and  Wright Savings algorithm is an effective method in determining the shortest route of distributing goods, because the Clarke and Wright Savings method  has its own heuristics which make savings in   the form of mileage or distribution time. This study aims to determine the shortest route at the Blitar checkpoint post office (KPRK) in distributing express service type bags to each branch post office point (KPC) using the Clarke and Wright Savings Algorithm.  The results of the discussion on the application of  the Clarke and Wright Savings  method to determine the shortest route for the service bag distribution fleet from the KPRK Blitar post office to KPC can be concluded that, there are two initial routes owned by the company with a total delivery distance of 189.7 km. After calculation, two routes with the shortest distance will be traveled with a total delivery distance of 171 km. Route group 1 is Blitar Post Office à KPC Garum à KPC Nglegokà KPC  Gandusarià KPC Talun KPC Wlingi à KPC Doko à KPC Kesamben à KPC Selopuroà KPC  Binangun à KPC  Kanigoro à KPC Lodoyo à  KPC Kademangan à Post Office with a distance of 116.7 km. As for route 2, namely the blitar  post office à KPC Sanan Kulon à KPC Ponggok à KPC Srengat à KPC Kademangan à KPC Udanawu à Blitar post office with a distance of 54.3 km. With the establishment of routes with the closest distance, the company can save mileage by 9.85%.

Page 6 of 18 | Total Record : 173