Pub Date : 2022-09-23DOI: 10.12962/j24775401.v8i2.13414
Muhammad Arzaki
{"title":"Elementary Analysis of the Communication Complexity of Divide-and-Conquer Diffie-Hellman Key Agreement Protocol","authors":"Muhammad Arzaki","doi":"10.12962/j24775401.v8i2.13414","DOIUrl":"https://doi.org/10.12962/j24775401.v8i2.13414","url":null,"abstract":"","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123480750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-23DOI: 10.12962/j24775401.v8i2.7364
Vera Devani, M. I. H. Umam, Yulia Aiza, S. Sarbaini
{"title":"Optimization of Tire Production Planning Using The Goal Programming Method and Sensitivity Analysis","authors":"Vera Devani, M. I. H. Umam, Yulia Aiza, S. Sarbaini","doi":"10.12962/j24775401.v8i2.7364","DOIUrl":"https://doi.org/10.12962/j24775401.v8i2.7364","url":null,"abstract":"","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126109903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-21DOI: 10.12962/j24775401.v8i1.10817
Elda Safitri, P. John, D. R. Silaban
—Let F , G , and H be simple graphs. The graph F arrows ( G, H ) if for any red-blue coloring on the edge of F , we find either a red-colored graph G or a blue-colored graph H in F . The Ramsey number r ( G, H ) is the smallest positive integer r such that a complete graph K r arrows ( G, H ) . The restricted size Ramsey number r ∗ ( G, H ) is the smallest positive integer r ∗ such that there is a graph F , of order r ( G, H ) and with the size r ∗ , satisfying F arrows ( G, H ) . In this paper we give the restricted size Ramsey number for a matching of two edges versus tree and triangle unicyclic graphs of order six.
{"title":"Restricted Size Ramsey Number for Matching versus Tree and Triangle Unicyclic Graphs of Order Six","authors":"Elda Safitri, P. John, D. R. Silaban","doi":"10.12962/j24775401.v8i1.10817","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.10817","url":null,"abstract":"—Let F , G , and H be simple graphs. The graph F arrows ( G, H ) if for any red-blue coloring on the edge of F , we find either a red-colored graph G or a blue-colored graph H in F . The Ramsey number r ( G, H ) is the smallest positive integer r such that a complete graph K r arrows ( G, H ) . The restricted size Ramsey number r ∗ ( G, H ) is the smallest positive integer r ∗ such that there is a graph F , of order r ( G, H ) and with the size r ∗ , satisfying F arrows ( G, H ) . In this paper we give the restricted size Ramsey number for a matching of two edges versus tree and triangle unicyclic graphs of order six.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129219009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-21DOI: 10.12962/j24775401.v8i1.9588
S. Soetrisno, D. Sulistyaningrum, Isi Bifawa’idati
—There are a lot of texture-based image data stored in the storage media Internet. Most of these data portray the cultural fabric texture results from a State. Because of the many variants of the existing texture, the data need to be easily accessible through the Internet. Moreover, the area of origin of weaving the surface is easily known. Therefore, it is necessary to develop a classification system based on woven image data. The texture of the image data stored in a database on the Internet can be grouped/clustered well, making it easy to access. This study examines a texture-based woven image classification using fuzzy c-means algorithm. This method combines extraction meth- ods Gabor filter, fuzzy c-means algorithm and Euclid distance similarity measure. An experiment was done using the system as many as 60 woven images from Bali, NTT and Central Java areas, each taken as many as 25 images weaving. The test results stated that testing using the test images taken from the images in the database generates a 100% accuracy rate, and testing using test images taken from outside the database produces an accuracy rate of 94%.
{"title":"Texture-Based Woven Image Classification using Fuzzy C-Means Algorithm","authors":"S. Soetrisno, D. Sulistyaningrum, Isi Bifawa’idati","doi":"10.12962/j24775401.v8i1.9588","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.9588","url":null,"abstract":"—There are a lot of texture-based image data stored in the storage media Internet. Most of these data portray the cultural fabric texture results from a State. Because of the many variants of the existing texture, the data need to be easily accessible through the Internet. Moreover, the area of origin of weaving the surface is easily known. Therefore, it is necessary to develop a classification system based on woven image data. The texture of the image data stored in a database on the Internet can be grouped/clustered well, making it easy to access. This study examines a texture-based woven image classification using fuzzy c-means algorithm. This method combines extraction meth- ods Gabor filter, fuzzy c-means algorithm and Euclid distance similarity measure. An experiment was done using the system as many as 60 woven images from Bali, NTT and Central Java areas, each taken as many as 25 images weaving. The test results stated that testing using the test images taken from the images in the database generates a 100% accuracy rate, and testing using test images taken from outside the database produces an accuracy rate of 94%.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114706202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-21DOI: 10.12962/j24775401.v8i1.10922
Mohammad Ghani, Wahyuni Ningsih, N. Izzati
—In this paper, we study the existence and stability of advection-diffusion equation involving square-root. We first change the original equation into the traveling wave by using ansatz transformation. Then, we apply the appropriate perturbation to establish the energy estimate under small perturbation and large wave amplitude. These results of energy estimates are used to prove the stability of traveling wave solutions.
{"title":"Stability Analysis of Traveling Waves to Advection-Diffusion Equation Involving Square-root","authors":"Mohammad Ghani, Wahyuni Ningsih, N. Izzati","doi":"10.12962/j24775401.v8i1.10922","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.10922","url":null,"abstract":"—In this paper, we study the existence and stability of advection-diffusion equation involving square-root. We first change the original equation into the traveling wave by using ansatz transformation. Then, we apply the appropriate perturbation to establish the energy estimate under small perturbation and large wave amplitude. These results of energy estimates are used to prove the stability of traveling wave solutions.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116889542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-21DOI: 10.12962/j24775401.v8i1.6467
Shanti Wulansari, M. Purnomo
—The bank’s business processes target business plans for the next year. Existing conditions, the business plan is based on the growth asset portfolio every year, so that the purchase of productive assets awaits issuers’ offers. This condition will cause a portfolio not to be measured and the inaccuracy of portfolio selection. Asset Liability Management (ALM) is the management of the structure of assets and liabilities to achieve profit. Banking books and trading books are bank portfolios to earn income. In selecting each portfolio, it contains liquidity risk, market risk and, credit risk. The level of profit is reflected in returns, while returns and risks are a trade-off so that calculations require mathematical and simulation models. Each bank needs an overview of the composition of productive assets, as short-term, medium-term and, long-term assets must be measured risk and target achievement. Linear programming method will allocate productive assets as the bank’s leading source of income, to achieve optimization of profit on the risks received. The problem with this research is that there are 830 variables as banking assets and 19 constraints as indicators of risk. In the seventh iteration of mathematical models, return 1,803 Trillyun from 11 banking book assets.
{"title":"Modeling Portfolio Based on Linear Programming for Bank Business Development Project Plan","authors":"Shanti Wulansari, M. Purnomo","doi":"10.12962/j24775401.v8i1.6467","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.6467","url":null,"abstract":"—The bank’s business processes target business plans for the next year. Existing conditions, the business plan is based on the growth asset portfolio every year, so that the purchase of productive assets awaits issuers’ offers. This condition will cause a portfolio not to be measured and the inaccuracy of portfolio selection. Asset Liability Management (ALM) is the management of the structure of assets and liabilities to achieve profit. Banking books and trading books are bank portfolios to earn income. In selecting each portfolio, it contains liquidity risk, market risk and, credit risk. The level of profit is reflected in returns, while returns and risks are a trade-off so that calculations require mathematical and simulation models. Each bank needs an overview of the composition of productive assets, as short-term, medium-term and, long-term assets must be measured risk and target achievement. Linear programming method will allocate productive assets as the bank’s leading source of income, to achieve optimization of profit on the risks received. The problem with this research is that there are 830 variables as banking assets and 19 constraints as indicators of risk. In the seventh iteration of mathematical models, return 1,803 Trillyun from 11 banking book assets.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127857666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-21DOI: 10.12962/j24775401.v8i1.5053
Vina Ayumi, Ida Nurhaida, Handrie Noprisson
{"title":"Implementation of Convolutional Neural Networks for Batik Image Dataset","authors":"Vina Ayumi, Ida Nurhaida, Handrie Noprisson","doi":"10.12962/j24775401.v8i1.5053","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.5053","url":null,"abstract":"","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-21DOI: 10.12962/j24775401.v8i1.9087
Deny Murdianto
—Hybrid Petri nets are modeling framework for a system that contains discrete and continuous states. In this paper, we construct a model of water treatment plant using Hybrid Petri nets. We choose hybrid Petri nets because the water treatment plant contains discrete and continuous parts. The discrete part consists of the state of pumps and the continuous part consists of water volume in each processing unit. The Petri Nets obtained were further simplified to facilitate simulation. Through simulation we can determine the amount of water production with certain specifications.
{"title":"Modeling of Water Treatment Plant using Hybrid Petri Nets","authors":"Deny Murdianto","doi":"10.12962/j24775401.v8i1.9087","DOIUrl":"https://doi.org/10.12962/j24775401.v8i1.9087","url":null,"abstract":"—Hybrid Petri nets are modeling framework for a system that contains discrete and continuous states. In this paper, we construct a model of water treatment plant using Hybrid Petri nets. We choose hybrid Petri nets because the water treatment plant contains discrete and continuous parts. The discrete part consists of the state of pumps and the continuous part consists of water volume in each processing unit. The Petri Nets obtained were further simplified to facilitate simulation. Through simulation we can determine the amount of water production with certain specifications.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132669547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-17DOI: 10.12962/j24775401.v7i2.4605
Dauliyatu Achsina, M. Mardlijah
—Radicalization is a process when people come to adopt increasingly extreme political or religious ideologies, radicalization almost occurs in almost all countries in the world. Seeing a number of cases in recent times, radicalization has become a major concern for the world, especially in the field of national security. Radicalization has become one of the focuses in the national security sector because it leads to acts of extremism, violence and terrorism. The level of radicalization is high in each year and continues to increase so special supervision is needed to control it because it causes huge financial losses. Therefore a preventive effort is needed to overcome this. Efforts to prevent radical movements have been widely used, ranging from direct or indirect, in addition some things have also been done directly by the government. So far it has not been seen how effective these efforts are. Radicalization is formed because of the influence of extremists and the recruiters group. Many individuals are affected and enter the group because they are influenced by the people in the group who are within their scope. To overcome these problems, a control is needed as an effort to prevent radicalism. Prevention efforts are in the form of strict sanctions given to recruiters. Next to find out how the influence of controls on individual groups of recruiters is needed a tool to represent the tool is a model. The mathematical model that is suitable for representing the appropriate problems of radicalization is the Susceptible (S) , Extremists (E) Recruiters (R), Immunity (I) model.
{"title":"Analysis Mathematical Model of Radicalization S(Susceptible) E(Extremists) R(Recruiters) I(Immunity) with Optimal Control","authors":"Dauliyatu Achsina, M. Mardlijah","doi":"10.12962/j24775401.v7i2.4605","DOIUrl":"https://doi.org/10.12962/j24775401.v7i2.4605","url":null,"abstract":"—Radicalization is a process when people come to adopt increasingly extreme political or religious ideologies, radicalization almost occurs in almost all countries in the world. Seeing a number of cases in recent times, radicalization has become a major concern for the world, especially in the field of national security. Radicalization has become one of the focuses in the national security sector because it leads to acts of extremism, violence and terrorism. The level of radicalization is high in each year and continues to increase so special supervision is needed to control it because it causes huge financial losses. Therefore a preventive effort is needed to overcome this. Efforts to prevent radical movements have been widely used, ranging from direct or indirect, in addition some things have also been done directly by the government. So far it has not been seen how effective these efforts are. Radicalization is formed because of the influence of extremists and the recruiters group. Many individuals are affected and enter the group because they are influenced by the people in the group who are within their scope. To overcome these problems, a control is needed as an effort to prevent radicalism. Prevention efforts are in the form of strict sanctions given to recruiters. Next to find out how the influence of controls on individual groups of recruiters is needed a tool to represent the tool is a model. The mathematical model that is suitable for representing the appropriate problems of radicalization is the Susceptible (S) , Extremists (E) Recruiters (R), Immunity (I) model.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-17DOI: 10.12962/j24775401.v7i2.10925
Nanang Ondi, Y. A. Lesnussa, F. Y. Rumlawang
—Richards Curve is an extension of the Logistics Curve which was first discovered in 1959 and is a type of sigmoid curve where in the sigmoid curve there are 3 growth phases, namely the logarithmic phase, the linear phase and the aging phase. This research aims to identify and determine the phase of the spread of COVID-19 in Maluku province with the Richards curve. From the calculation results obtained that the initial phase of the spread occurred on March 23 - July 5 2020, the peak phase of the spread occurred on July 6 - October 22 2020, the final phase of the peak of the spread occurred on October 23, 2020 April 14, 2021 and began to enter the final phase of the spread on April 15, 2021.
{"title":"Identification of The Phases of The Spread of Covid-19 in Maluku Province with Richards Curve","authors":"Nanang Ondi, Y. A. Lesnussa, F. Y. Rumlawang","doi":"10.12962/j24775401.v7i2.10925","DOIUrl":"https://doi.org/10.12962/j24775401.v7i2.10925","url":null,"abstract":"—Richards Curve is an extension of the Logistics Curve which was first discovered in 1959 and is a type of sigmoid curve where in the sigmoid curve there are 3 growth phases, namely the logarithmic phase, the linear phase and the aging phase. This research aims to identify and determine the phase of the spread of COVID-19 in Maluku province with the Richards curve. From the calculation results obtained that the initial phase of the spread occurred on March 23 - July 5 2020, the peak phase of the spread occurred on July 6 - October 22 2020, the final phase of the peak of the spread occurred on October 23, 2020 April 14, 2021 and began to enter the final phase of the spread on April 15, 2021.","PeriodicalId":357596,"journal":{"name":"International Journal of Computing Science and Applied Mathematics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132053757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}