首页 > 最新文献

Jurnal Riset Mahasiswa Matematika最新文献

英文 中文
Metode Fuzzy TOPSIS Sebagai Sistem Pendukung Keputusan dalam Menentukan Pegawai Berprestasi 模糊的TOPSIS方法作为对优秀员工决策的支持系统
Pub Date : 2023-09-01 DOI: 10.18860/jrmm.v2i6.22024
Fairuz Nadhif Izdhihar, Evawati Alisah, Abdussakir Abdussakir
Fuzzy TOPSIS as a decision support system is a mathematical method with the best alternative concept chosen not only to have the shortest distance to the positive ideal solution, but also to have the longest distance to the negative ideal solution. The use of Fuzzy TOPSIS as a decision support system can minimize the weaknesses that exist in the TOPSIS method. The purpose of this study is to apply the Fuzzy TOPSIS method as a Decision Support System (SPK) to determine outstanding employees at the Batu City Population and Civil Registration Office. The Human Resources (HR) Division has the task of validating the value and processing the value of employee work goals and work behavior using the Fuzzy TOPSIS implementing into recommendations for outstanding employees. Data processing is carried out fuzzy, while calculations are carried out by the TOPSIS method. The output of this calculation is in the form of ranking the value of preferences and recommendations available for all employees. The calculation results obtained the highest preference value, namely by the first alternative with a value of 1. The alternative occupied a position as an outstanding employee at the Batu City Population and Civil Registration Office.
模糊TOPSIS作为一种决策支持系统,是一种选择最佳备选概念的数学方法,它不仅要与正理想解的距离最短,而且要与负理想解的距离最长。使用模糊TOPSIS作为决策支持系统可以最大限度地减少TOPSIS方法存在的弱点。本研究的目的是运用模糊TOPSIS方法作为决策支持系统(SPK)来确定拔都市人口与民事登记办公室的优秀员工。人力资源(HR)部门的任务是验证员工工作目标和工作行为的价值,并利用模糊TOPSIS实现为优秀员工提供建议。数据处理采用模糊处理,计算采用TOPSIS法。此计算的输出形式是对所有员工可用的偏好和建议的价值进行排序。计算结果获得了最高的偏好值,即第一个选择值为1。另一个人在巴图市人口和民事登记办公室担任杰出雇员。
{"title":"Metode Fuzzy TOPSIS Sebagai Sistem Pendukung Keputusan dalam Menentukan Pegawai Berprestasi","authors":"Fairuz Nadhif Izdhihar, Evawati Alisah, Abdussakir Abdussakir","doi":"10.18860/jrmm.v2i6.22024","DOIUrl":"https://doi.org/10.18860/jrmm.v2i6.22024","url":null,"abstract":"Fuzzy TOPSIS as a decision support system is a mathematical method with the best alternative concept chosen not only to have the shortest distance to the positive ideal solution, but also to have the longest distance to the negative ideal solution. The use of Fuzzy TOPSIS as a decision support system can minimize the weaknesses that exist in the TOPSIS method. The purpose of this study is to apply the Fuzzy TOPSIS method as a Decision Support System (SPK) to determine outstanding employees at the Batu City Population and Civil Registration Office. The Human Resources (HR) Division has the task of validating the value and processing the value of employee work goals and work behavior using the Fuzzy TOPSIS implementing into recommendations for outstanding employees. Data processing is carried out fuzzy, while calculations are carried out by the TOPSIS method. The output of this calculation is in the form of ranking the value of preferences and recommendations available for all employees. The calculation results obtained the highest preference value, namely by the first alternative with a value of 1. The alternative occupied a position as an outstanding employee at the Batu City Population and Civil Registration Office.","PeriodicalId":270235,"journal":{"name":"Jurnal Riset Mahasiswa Matematika","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116974090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penerapan Metode Fuzzy Simple Additive Weigting Pada Interpretasi Hasil Penilaian Promosi Jabatan Pegawai Negeri Sipil 简单的附加方法的应用是对公务员晋升评估结果的解释
Pub Date : 2023-06-30 DOI: 10.18860/jrmm.v2i5.22004
Tre Hayu Ria Reta, Evawati Alisah, M. N. Jauhari
The Fuzzy Simple Additive Weighting (FSAW) method is a mechanism that can be used to support decision making. This method was chosen because a ranking process was carried out to determine the weight value of each attribute, which would select employees who were worthy of occupying the promoted position. This study aims to determine the results of the application of the FSAW method in the assessment of civil servant promotion at the Malang City Education and Culture Office to increase objectivity and fairness in the assessment of employee promotion. Some problems that often occur in employee evaluation are the employee evaluation process which is still conventional so that it is less effective in calculation. The solution to overcome this problem is to use a Fuzzy Multi Attribute Decision Making (FMADM) decision support system with the FSAW method. This method requires a process to normalize the decision matrix (X) against a scale that can be compared with all available alternative values.  After each attribute has been determined its weight value, the ranking process is used to select the best alternative for this study.  The criteria used in this decision support system are SKP score, length of service, class, and education. The membership function used is the Triangular Fuzzy Number (TFN) representation. The results of the ranking calculation or the best value show the highest value, namely 1 from alternative 1 (employee 1) who is entitled to a promotion. It is expected that by using the FSAW method, the task of selectors will be able to more quickly and precisely identify employees who are worthy of occupying positions promoted based on the desired conditions.
模糊简单加性加权法(FSAW)是一种支持决策的机制。之所以选择这种方法,是因为进行了一个排序过程来确定每个属性的权重值,这将选择值得占据晋升职位的员工。本研究旨在确定FSAW方法在玛琅市教育文化办公室公务员晋升评估中的应用结果,以提高员工晋升评估的客观性和公平性。在员工评价中经常出现的问题是员工评价的过程仍然是传统的,计算效率不高。解决这一问题的方法是使用模糊多属性决策支持系统,并结合模糊多属性决策支持方法。这种方法需要一个过程来对决策矩阵(X)进行标准化,使其与所有可用的替代值进行比较。在确定了每个属性的权重值后,使用排序过程来选择本研究的最佳选项。在这个决策支持系统中使用的标准是SKP分数、服务年限、班级和教育。所使用的隶属函数是三角模糊数(TFN)表示。排名计算的结果或最佳值显示最高值,即有权获得晋升的选项1(雇员1)中的1。期望通过使用FSAW方法,选择者的任务能够根据期望的条件更快速、准确地识别出值得担任晋升职位的员工。
{"title":"Penerapan Metode Fuzzy Simple Additive Weigting Pada Interpretasi Hasil Penilaian Promosi Jabatan Pegawai Negeri Sipil","authors":"Tre Hayu Ria Reta, Evawati Alisah, M. N. Jauhari","doi":"10.18860/jrmm.v2i5.22004","DOIUrl":"https://doi.org/10.18860/jrmm.v2i5.22004","url":null,"abstract":"The Fuzzy Simple Additive Weighting (FSAW) method is a mechanism that can be used to support decision making. This method was chosen because a ranking process was carried out to determine the weight value of each attribute, which would select employees who were worthy of occupying the promoted position. This study aims to determine the results of the application of the FSAW method in the assessment of civil servant promotion at the Malang City Education and Culture Office to increase objectivity and fairness in the assessment of employee promotion. Some problems that often occur in employee evaluation are the employee evaluation process which is still conventional so that it is less effective in calculation. The solution to overcome this problem is to use a Fuzzy Multi Attribute Decision Making (FMADM) decision support system with the FSAW method. This method requires a process to normalize the decision matrix (X) against a scale that can be compared with all available alternative values.  After each attribute has been determined its weight value, the ranking process is used to select the best alternative for this study.  The criteria used in this decision support system are SKP score, length of service, class, and education. The membership function used is the Triangular Fuzzy Number (TFN) representation. The results of the ranking calculation or the best value show the highest value, namely 1 from alternative 1 (employee 1) who is entitled to a promotion. It is expected that by using the FSAW method, the task of selectors will be able to more quickly and precisely identify employees who are worthy of occupying positions promoted based on the desired conditions.","PeriodicalId":270235,"journal":{"name":"Jurnal Riset Mahasiswa Matematika","volume":"60 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115131314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modifikasi Vigenere Cipher Menggunakan Grup Simetri untuk Mengamankan Pesan Teks Vigenere密码修改使用组对称性来保护文本
Pub Date : 2023-06-30 DOI: 10.18860/jrmm.v2i5.16791
Niken Dwi Cahyanti, Turmudi Turmudi, Muhammad Khudzaifah
Cryptography is widely used to overcome information security problems that are exchanged on the internet network. One of the algorithms in cryptography is the Vigenere Cipher, the algorithm is known as a robust method and is not easily solved. However, the Vigenere Cipher algorithm has a weakness, namely the key is short and is used repeatedly. Therefore, it is necessary to modify the Vigenere Cipher. The purpose of this study is to determine the modification of the Vigenere Cipher using a symmetric group and also to determine the level of security of the encryption results of Vigenere Cipher modification when compared to the Vigenere Cipher. The results obtained from this research is a new algorithm of the modification process of the Vigenere Cipher using symmetric groups. The modified Vigenere Cipher algorithm is proven to be stronger than the Vigenere Cipher. This is because the plaintext is scrambled first using a symmetric group encoding, so that the actual plaintext is safe against attacks by the Kasiski method and exhaustive key search. In addition, the resulting new algorithm also supports the use of capital letters, lowercase letters, numbers, and symbols.
密码学被广泛应用于解决在互联网上交换的信息安全问题。密码学中的一种算法是Vigenere密码,该算法被称为鲁棒方法,不易求解。但是,Vigenere密码算法存在密钥短、重复使用的缺点。因此,有必要对Vigenere密码进行修改。本研究的目的是确定使用对称组对Vigenere Cipher进行修改,并确定Vigenere Cipher修改的加密结果与Vigenere Cipher相比的安全级别。本文的研究结果是利用对称群对Vigenere密码进行修改的一种新算法。改进的Vigenere密码算法被证明比Vigenere密码算法更强。这是因为明文首先使用对称组编码进行加密,因此实际的明文是安全的,不会受到Kasiski方法和穷举式密钥搜索的攻击。此外,生成的新算法还支持使用大写字母、小写字母、数字和符号。
{"title":"Modifikasi Vigenere Cipher Menggunakan Grup Simetri untuk Mengamankan Pesan Teks","authors":"Niken Dwi Cahyanti, Turmudi Turmudi, Muhammad Khudzaifah","doi":"10.18860/jrmm.v2i5.16791","DOIUrl":"https://doi.org/10.18860/jrmm.v2i5.16791","url":null,"abstract":"Cryptography is widely used to overcome information security problems that are exchanged on the internet network. One of the algorithms in cryptography is the Vigenere Cipher, the algorithm is known as a robust method and is not easily solved. However, the Vigenere Cipher algorithm has a weakness, namely the key is short and is used repeatedly. Therefore, it is necessary to modify the Vigenere Cipher. The purpose of this study is to determine the modification of the Vigenere Cipher using a symmetric group and also to determine the level of security of the encryption results of Vigenere Cipher modification when compared to the Vigenere Cipher. The results obtained from this research is a new algorithm of the modification process of the Vigenere Cipher using symmetric groups. The modified Vigenere Cipher algorithm is proven to be stronger than the Vigenere Cipher. This is because the plaintext is scrambled first using a symmetric group encoding, so that the actual plaintext is safe against attacks by the Kasiski method and exhaustive key search. In addition, the resulting new algorithm also supports the use of capital letters, lowercase letters, numbers, and symbols.","PeriodicalId":270235,"journal":{"name":"Jurnal Riset Mahasiswa Matematika","volume":"82 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120818290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Membangun Super Enkripsi untuk Mengamankan Pesan 建立超级加密来保护消息
Pub Date : 2023-06-30 DOI: 10.18860/jrmm.v2i5.21036
Laura Agustina, Imam Sujarwo, Muhammad Khudzaifah
The issue of message security or an information is very important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipherand Bifid Cipher algorithms to secure messages. The message encryption process is using the VigenereCipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for thesecondencryptionprocess.Theencryptionprocessisdonetheotherwayaround,startingfromthebackoftheencryptionprocess.Thecombinationofthesetwoalgorithmsresultsinmoresecuremessagesecurity.
消息或信息的安全问题是非常重要的。一门研究使用密码保护信息机密性的科学被称为密码学。为了提高安全性,将两种算法组合起来保护消息。超级加密是使用两种或多种替换和置换(换位)加密技术的组合来获得更难以破解的算法的概念。首先要做的是使用替换技术(Cipher substitution)加密消息,然后使用置换技术(Cipher Transposition)重新加密消息。在本研究中,两种加密算法将结合使用Vigenere Cipherand Bifid Cipher算法来构建超级加密,以保护消息。消息加密过程在第一个加密过程中使用VigenereCipher算法,然后在第二个加密过程中继续使用Bifid Cipher算法。加密过程反过来做,从加密过程的后面开始。这两种算法的组合产生更安全的消息安全性。
{"title":"Membangun Super Enkripsi untuk Mengamankan Pesan","authors":"Laura Agustina, Imam Sujarwo, Muhammad Khudzaifah","doi":"10.18860/jrmm.v2i5.21036","DOIUrl":"https://doi.org/10.18860/jrmm.v2i5.21036","url":null,"abstract":"The issue of message security or an information is very important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipherand Bifid Cipher algorithms to secure messages. The message encryption process is using the VigenereCipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for thesecondencryptionprocess.Theencryptionprocessisdonetheotherwayaround,startingfromthebackoftheencryptionprocess.Thecombinationofthesetwoalgorithmsresultsinmoresecuremessagesecurity.","PeriodicalId":270235,"journal":{"name":"Jurnal Riset Mahasiswa Matematika","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136065457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penerapan Graf Berarah dan Berbobot untuk Mengetahui Inluencer yang Paling Berpengaruh dalam Penyebaran Informasi pada Twitter 为了确定推特上信息传播的最重要因素,使用广谱和重量
Pub Date : 2023-06-30 DOI: 10.18860/jrmm.v2i5.16810
Aisyah Rafi' Addani, Turmudi Turmudi, Imam Sujarwo
A graph is a non-empty set whose members are vertices and edges, where the edges connect several pairs of these vertices; likewise, social media connects users with each other through interests, relationships, likes and dislikes. The rapid development of technology in the era of globalization has made social media a more effective source of information, one of them is Twitter which has been used by 280 million people in the world. This research involves 100 Twitter users who are classified as Influencers in Indonesia who have more than 10,000 followers by visualizing their relationship with other users followed by them with a directed and weighted graph. First, the data is filtered using the Twecoll script in Python software, then the data is visualized using the Gephi software in the form of a directed and weighted graph. The centrality value is calculated to determine the influential influencers in spreading information on the network. Based on the results of the study, it was found that the network pattern of 100 Influencers that had been collected in the following list of @dearmyths accounts, there were 96 points and 1883 sides with the side having the highest weight being @detikcom, followed by @ivanlanin and @ernestprakasa through the results of centrality calculations as accounts that can disseminate information on the network.
图是一个非空集合,其成员是顶点和边,其中边连接了这些顶点的几对;同样,社交媒体通过兴趣、关系、好恶将用户彼此联系起来。全球化时代科技的飞速发展使得社交媒体成为了更有效的信息来源,其中之一就是Twitter,全世界有2.8亿人在使用它。这项研究涉及100名Twitter用户,他们被归类为印度尼西亚的影响者,拥有超过1万名粉丝,通过有向加权图可视化他们与其他用户的关系。首先,使用Python软件中的Twecoll脚本对数据进行过滤,然后使用Gephi软件以有向加权图的形式对数据进行可视化。计算中心性值以确定在网络上传播信息的有影响力的影响者。根据研究结果,通过中心性计算的结果发现,以下@dearmyths账户列表中收集的100位网红的网络模式,有96个点,1883个边,权重最高的边是@detikcom,其次是@ivanlanin和@ernestprakasa作为可以在网络上传播信息的账户。
{"title":"Penerapan Graf Berarah dan Berbobot untuk Mengetahui Inluencer yang Paling Berpengaruh dalam Penyebaran Informasi pada Twitter","authors":"Aisyah Rafi' Addani, Turmudi Turmudi, Imam Sujarwo","doi":"10.18860/jrmm.v2i5.16810","DOIUrl":"https://doi.org/10.18860/jrmm.v2i5.16810","url":null,"abstract":"A graph is a non-empty set whose members are vertices and edges, where the edges connect several pairs of these vertices; likewise, social media connects users with each other through interests, relationships, likes and dislikes. The rapid development of technology in the era of globalization has made social media a more effective source of information, one of them is Twitter which has been used by 280 million people in the world. This research involves 100 Twitter users who are classified as Influencers in Indonesia who have more than 10,000 followers by visualizing their relationship with other users followed by them with a directed and weighted graph. First, the data is filtered using the Twecoll script in Python software, then the data is visualized using the Gephi software in the form of a directed and weighted graph. The centrality value is calculated to determine the influential influencers in spreading information on the network. Based on the results of the study, it was found that the network pattern of 100 Influencers that had been collected in the following list of @dearmyths accounts, there were 96 points and 1883 sides with the side having the highest weight being @detikcom, followed by @ivanlanin and @ernestprakasa through the results of centrality calculations as accounts that can disseminate information on the network.","PeriodicalId":270235,"journal":{"name":"Jurnal Riset Mahasiswa Matematika","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penerapan Algoritma Floyd-Warshall pada Jalur Evakuasi Korban Kecelakaan di Boyolali 部署Floyd-Warshall算法到Boyolali的疏散路径上
Pub Date : 2023-06-30 DOI: 10.18860/jrmm.v2i5.22006
Fitri Nofita Sari, Juhari Juhari, Erna Herawati
The Floyd-Warshall algorithm is one of the algorithms that can be used to solve the shoetest route problem and is the easiests to apply because it can find all the shortest routes between each possible pair of position and is part of a dynamic program that is very efficient in solving optimal route promblems. The Floyd-Warshall algorithm works by comparing each possible path on the graph for each node pair and checking the resulting node combination. The problem of the shortest route in daily life is the evacuation of victims of traffic accidents in Boyolali, Central Java. For evacuation to be more effective, a nearby route to the nearest hospital is needed. Based on the results of the research that has been done, it can be concluded that the study produced reference matrix in the form of the shortest trajectory used to determine the shortest route to nearest hospital in Boyolali, Central Java.
Floyd-Warshall算法是可用于解决最短路径问题的算法之一,也是最容易应用的算法,因为它可以找到每个可能位置对之间的所有最短路径,并且是动态规划的一部分,在解决最优路径问题方面非常有效。Floyd-Warshall算法的工作原理是比较图上每个节点对的每个可能路径,并检查结果的节点组合。日常生活中最短路线的问题是在中爪哇的Boyolali疏散交通事故的受害者。为了更有效地疏散,需要一条就近的路线到最近的医院。根据已经完成的研究结果,可以得出结论,该研究以最短轨迹的形式产生了参考矩阵,用于确定中爪哇Boyolali最近医院的最短路线。
{"title":"Penerapan Algoritma Floyd-Warshall pada Jalur Evakuasi Korban Kecelakaan di Boyolali","authors":"Fitri Nofita Sari, Juhari Juhari, Erna Herawati","doi":"10.18860/jrmm.v2i5.22006","DOIUrl":"https://doi.org/10.18860/jrmm.v2i5.22006","url":null,"abstract":"The Floyd-Warshall algorithm is one of the algorithms that can be used to solve the shoetest route problem and is the easiests to apply because it can find all the shortest routes between each possible pair of position and is part of a dynamic program that is very efficient in solving optimal route promblems. The Floyd-Warshall algorithm works by comparing each possible path on the graph for each node pair and checking the resulting node combination. The problem of the shortest route in daily life is the evacuation of victims of traffic accidents in Boyolali, Central Java. For evacuation to be more effective, a nearby route to the nearest hospital is needed. Based on the results of the research that has been done, it can be concluded that the study produced reference matrix in the form of the shortest trajectory used to determine the shortest route to nearest hospital in Boyolali, Central Java.","PeriodicalId":270235,"journal":{"name":"Jurnal Riset Mahasiswa Matematika","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131572014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indeks Harmonik dan Indeks Gutman Graf Nilradikal pada Gelanggang Komutatif dengan Satuan
Pub Date : 2023-05-01 DOI: 10.18860/jrmm.v2i4.14902
Luluk Afifah, Imam Sujarwo, Muhammad Khudzaifah
Graph theory is a topic that is still an important subject to discuss. This is because until now graph theory has many practical applications in various disciplines, for example in biology, computer science, economics, informatics engineering, linguistics, mathematics, health, and social sciences. This study discusses the Gutman index of nilradical graphs in the commutative ring with unity.A nilradical graph whose vertices are non-zero nilpotent elements, when the domain is a commutative ring with units, it forms a complete graph only if the commutative ring with units we use is limited to a positive integer modulo n (Z_n). Where n is the square of the prime number p which is less than equal to 3. It is known that the general pattern of harmonic indices and Gutman indices of nilradical graphs in the commutative ring with unity are H(N(Z_(n=p^2 ) ))=((p-2)^2+(p -2))/2(p-2) and Gut(N(Z_(n=p^2 ) ))=(1/2 ((p-2)^2+(p-2))) (p- 2)^2 respectively. In its application, this general form can be used as a numerical parameter of a graph in chemical graph theory, molecular topology, and mathematical chemistry.
图论仍然是一个值得讨论的重要课题。这是因为到目前为止,图论在各个学科中都有许多实际应用,例如生物学、计算机科学、经济学、信息工程、语言学、数学、健康和社会科学。讨论了具有单位交换环上零根图的Gutman指数。一个顶点为非零幂零元的零根图,当定域是一个有单位的可交换环时,只有当我们使用的有单位的可交换环被限制为正整数模n (Z_n)时,它才构成完全图。其中n是小于等于3的质数p的平方。已知单位交换环上零根图的调和指数和古特曼指数的一般模式分别是H(N(Z_(N =p^2))=((p-2)^2+(p -2))/2(p-2)和Gut(N(Z_(N =p^2))=(1/2 ((p-2)^2+(p-2))) (p-2)^2。在化学图论、分子拓扑学和数学化学中,这种一般形式可以作为图的数值参数。
{"title":"Indeks Harmonik dan Indeks Gutman Graf Nilradikal pada Gelanggang Komutatif dengan Satuan","authors":"Luluk Afifah, Imam Sujarwo, Muhammad Khudzaifah","doi":"10.18860/jrmm.v2i4.14902","DOIUrl":"https://doi.org/10.18860/jrmm.v2i4.14902","url":null,"abstract":"Graph theory is a topic that is still an important subject to discuss. This is because until now graph theory has many practical applications in various disciplines, for example in biology, computer science, economics, informatics engineering, linguistics, mathematics, health, and social sciences. This study discusses the Gutman index of nilradical graphs in the commutative ring with unity.A nilradical graph whose vertices are non-zero nilpotent elements, when the domain is a commutative ring with units, it forms a complete graph only if the commutative ring with units we use is limited to a positive integer modulo n (Z_n). Where n is the square of the prime number p which is less than equal to 3. It is known that the general pattern of harmonic indices and Gutman indices of nilradical graphs in the commutative ring with unity are H(N(Z_(n=p^2 ) ))=((p-2)^2+(p -2))/2(p-2) and Gut(N(Z_(n=p^2 ) ))=(1/2 ((p-2)^2+(p-2))) (p- 2)^2 respectively. In its application, this general form can be used as a numerical parameter of a graph in chemical graph theory, molecular topology, and mathematical chemistry.","PeriodicalId":270235,"journal":{"name":"Jurnal Riset Mahasiswa Matematika","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122353323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementasi Algoritma Floyd Warshall dalam Pencarian Rute Terpendek Lokasi Tower Base Transceiver Station (BTS) pada PT Citra Akses Indonusa
Pub Date : 2023-05-01 DOI: 10.18860/jrmm.v2i4.16811
Bella Nafa Savitri, M. N. Jauhari, Evawati Alisah, Hisyam Fahmi
PT Citra Akes Indonusa is a company that operates on the expertise of information technology services in Banten Province. One of the services provided by the company requires the construction of a Base Transceiver Station (BTS) tower. The tower requires maintenance if there is damage to the network signal. As a result, the shortest route is needed to make it easier for employees to reach the tower location to be more effective. There are eight BTS tower locations in Tangerang Regency and three BTS tower locations in Tangerang City. The process of finding the shortest route in this study uses the Floyd Warshall algorithm, which is unique in finding the shortest route by comparing each edge of all edges that are passed. The process of testing the shortest route is done by selecting the starting point, then selecting several BTS tower locations. Next, the shortest route will be searched using the Floyd Warshall algorithm from each point of destination for the BTS tower location, then the BTS tower location will be selected first and so on until the last destination. The effectiveness of this shortest route search involves a comparison of the routes presented by Google Maps. Based on the results of 30 randomized trials on BTS tower locations, the average shortest route effectiveness was 25.54% compared to the route generated by Google Maps. This is due to the selection at each BTS tower destination location so as to make the route more effective.
PT Citra Akes Indonusa是一家在万丹省运营信息技术服务的专业公司。该公司提供的其中一项服务需要建设基站收发塔(BTS)。如果网络信号损坏,铁塔需要维护。因此,需要最短的路线,使员工更容易到达塔楼位置,从而提高效率。在坦格朗县有8个BTS发射塔,在坦格朗市有3个BTS发射塔。本研究中寻找最短路径的过程使用Floyd Warshall算法,该算法的独特之处在于通过比较所有经过的边的每条边来寻找最短路径。测试最短路线的过程是选择起始点,然后选择几个BTS塔的位置。接下来,将使用Floyd Warshall算法从BTS塔位置的每个目的地点搜索最短路线,然后首先选择BTS塔位置,以此类推,直到最后一个目的地。这种最短路线搜索的有效性包括对谷歌地图提供的路线进行比较。根据30个BTS发射塔位置的随机试验结果,与谷歌地图生成的路线相比,最短路线的平均有效性为25.54%。这是因为在每个BTS塔的目的地都进行了选择,以使路线更加有效。
{"title":"Implementasi Algoritma Floyd Warshall dalam Pencarian Rute Terpendek Lokasi Tower Base Transceiver Station (BTS) pada PT Citra Akses Indonusa","authors":"Bella Nafa Savitri, M. N. Jauhari, Evawati Alisah, Hisyam Fahmi","doi":"10.18860/jrmm.v2i4.16811","DOIUrl":"https://doi.org/10.18860/jrmm.v2i4.16811","url":null,"abstract":"PT Citra Akes Indonusa is a company that operates on the expertise of information technology services in Banten Province. One of the services provided by the company requires the construction of a Base Transceiver Station (BTS) tower. The tower requires maintenance if there is damage to the network signal. As a result, the shortest route is needed to make it easier for employees to reach the tower location to be more effective. There are eight BTS tower locations in Tangerang Regency and three BTS tower locations in Tangerang City. The process of finding the shortest route in this study uses the Floyd Warshall algorithm, which is unique in finding the shortest route by comparing each edge of all edges that are passed. The process of testing the shortest route is done by selecting the starting point, then selecting several BTS tower locations. Next, the shortest route will be searched using the Floyd Warshall algorithm from each point of destination for the BTS tower location, then the BTS tower location will be selected first and so on until the last destination. The effectiveness of this shortest route search involves a comparison of the routes presented by Google Maps. Based on the results of 30 randomized trials on BTS tower locations, the average shortest route effectiveness was 25.54% compared to the route generated by Google Maps. This is due to the selection at each BTS tower destination location so as to make the route more effective.","PeriodicalId":270235,"journal":{"name":"Jurnal Riset Mahasiswa Matematika","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125557972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Membangun Super Enkripsi untuk Mengamankan Pesan 建立超级加密来保护消息
Pub Date : 2023-05-01 DOI: 10.18860/jrmm.v2i4.14470
Laura Agustina, Imam Sujarwo, Muhammad Khudzaifah
The issue of message security or an information is particularly important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipherand Bifid Cipher algorithms to secure messages. The message encryption process is using the VigenereCipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for thesecondencryptionprocess.Theencryptionprocessisdonetheotherwayaround,startingfromthebackoftheencryptionprocess.Thecombinationofthesetwoalgorithmsresultsinmoresecuremessagesecurity.
消息或信息的安全问题尤为重要。一门研究使用密码保护信息机密性的科学被称为密码学。为了提高安全性,将两种算法组合起来保护消息。超级加密是使用两种或多种替换和置换(换位)加密技术的组合来获得更难以破解的算法的概念。首先要做的是使用替换技术(Cipher substitution)加密消息,然后使用置换技术(Cipher Transposition)重新加密消息。在本研究中,两种加密算法将结合使用Vigenere Cipherand Bifid Cipher算法来构建超级加密,以保护消息。消息加密过程在第一个加密过程中使用VigenereCipher算法,然后在第二个加密过程中继续使用Bifid Cipher算法。加密过程反过来做,从加密过程的后面开始。这两种算法的组合产生更安全的消息安全性。
{"title":"Membangun Super Enkripsi untuk Mengamankan Pesan","authors":"Laura Agustina, Imam Sujarwo, Muhammad Khudzaifah","doi":"10.18860/jrmm.v2i4.14470","DOIUrl":"https://doi.org/10.18860/jrmm.v2i4.14470","url":null,"abstract":"The issue of message security or an information is particularly important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two cryptographic algorithms will be combined to build super encryption using the Vigenere Cipherand Bifid Cipher algorithms to secure messages. The message encryption process is using the VigenereCipher algorithm for the first encryption process, then continued using the Bifid Cipher algorithm for thesecondencryptionprocess.Theencryptionprocessisdonetheotherwayaround,startingfromthebackoftheencryptionprocess.Thecombinationofthesetwoalgorithmsresultsinmoresecuremessagesecurity.","PeriodicalId":270235,"journal":{"name":"Jurnal Riset Mahasiswa Matematika","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136273479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penyelesaian Sistem Persamaan Hukum Laju Reaksi dengan Metode Transformasi Differensial 用不同的转化方法解反应速率方程系统
Pub Date : 2023-05-01 DOI: 10.18860/jrmm.v2i4.16805
Siti Maftuhah, Heni Widayani, A. Kusumastuti
This research is focused on solving the rate law equation by using the differential transformation method. The rate law equation describes the chemical reaction problem from the concentration of a reactant that produces a product. The differential transformation method is a semi-analytic numerical method that can provide approximate solutions in the form of a series because the method is obtained from the expansion of the Taylor series expansion. With the help of Maple software, a comparison of the solution plots of y_1 (t),y_2  (t) and y_3 (t), can be observed that the difference in computational results between the Runge-kutta method and the differential transformation depends on the order of k. The curve of the differential transformation method is getting closer to the curve of the Runge-Kutta method at a certain value of k for each y_1 (t),y_2  (t) and y_3 (t). The conclusion of this research is that the application of the differential transformation method has been successfully carried out in the case of a system of ordinary differential equations. For further research, the researcher suggests that the next research applies the method of differential transformation in cases and initial values that are more varied.
本文主要研究用微分变换法求解速率方程。速率定律方程描述了从生成产物的反应物浓度出发的化学反应问题。微分变换方法是由泰勒级数展开得到的,是一种半解析数值方法,可以提供级数形式的近似解。利用Maple软件,比较了y_1 (t)、y_2 (t)和y_3 (t)的解图。可以观察到计算结果的差异之间的龙格-库塔法和微分变换取决于k。微分变换方法的曲线接近龙格-库塔方法在某个值的曲线每个y_1的k (t) y_2 (t)和y_3 (t)本研究的结论是,微分变换方法已成功的应用在系统的情况下进行普通的吗微分方程。为了进一步的研究,研究者建议在接下来的研究中,对变化更大的情况和初值应用微分变换的方法。
{"title":"Penyelesaian Sistem Persamaan Hukum Laju Reaksi dengan Metode Transformasi Differensial","authors":"Siti Maftuhah, Heni Widayani, A. Kusumastuti","doi":"10.18860/jrmm.v2i4.16805","DOIUrl":"https://doi.org/10.18860/jrmm.v2i4.16805","url":null,"abstract":"This research is focused on solving the rate law equation by using the differential transformation method. The rate law equation describes the chemical reaction problem from the concentration of a reactant that produces a product. The differential transformation method is a semi-analytic numerical method that can provide approximate solutions in the form of a series because the method is obtained from the expansion of the Taylor series expansion. With the help of Maple software, a comparison of the solution plots of y_1 (t),y_2  (t) and y_3 (t), can be observed that the difference in computational results between the Runge-kutta method and the differential transformation depends on the order of k. The curve of the differential transformation method is getting closer to the curve of the Runge-Kutta method at a certain value of k for each y_1 (t),y_2  (t) and y_3 (t). The conclusion of this research is that the application of the differential transformation method has been successfully carried out in the case of a system of ordinary differential equations. For further research, the researcher suggests that the next research applies the method of differential transformation in cases and initial values that are more varied.","PeriodicalId":270235,"journal":{"name":"Jurnal Riset Mahasiswa Matematika","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114616190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Jurnal Riset Mahasiswa Matematika
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1