Claim Missing Document
Check
Articles

Penerapan Algoritma Elephant Herding Optimization (EHO) pada Masalah Hybrid Flowshop Scheduling (HFS) Ahmad Kamsyakawuni; Khurnia Palupi; Agustina Pradjaningsih
Journal of Applied Informatics and Computing Vol 4 No 1 (2020): Juli 2020
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (717.361 KB) | DOI: 10.30871/jaic.v4i1.1834

Abstract

The industry is the driving force for the economy in Indonesia. One of the problems faced by industrial companies in the production process is determining the production schedule. The production schedule that is not according to the specified target can cause losses to the company. Scheduling is the allocation of resources to carry out a set of work at a specified time. The problem solved in this article is hybrid flowshop scheduling (HFS), it’s will be applied to companies engaged in bread making. A solution to solve the HFS problem using elephant herding optimization (EHO) algorithm. For the company to complete the production process by minimizing makespan, effective scheduling is needed, taking into account the number of parallel machines. The results of this article are 9 jobs and makespan 11.270 seconds using the MATLAB software.
PENYEMBUNYIAN CIPHERTEXT ALGORITMA GOST PADA CITRA KE DALAM AUDIO DENGAN METODE LEAST SIGNIFICANT BIT Abduh Riski; Heri Purwantoro; Ahmad Kamsyakawuni
Jurnal Ilmiah Matematika dan Pendidikan Matematika Vol 10 No 2 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika
Publisher : Jurusan Matematika FMIPA Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jmp.2018.10.2.2844

Abstract

Government Standard (GOST) is a 64-bit block cipher algorithm with 32 round, use a 256-bit key. The weakness of this algorithm is the keys so simple, than make cryptanalyst easy to break this algorithm. Least Significant Bit (LSB) use to insert message into another form without changing the form of the cover after insertion. This research does by hiding encrypted ciphertext to image and hiding image into audio. This research use grayscale and RBG image with BMP and PNG format. Audio using music with wav format. Security analysis using differential analysis NPCR and UACI. Security analysis aims to calculate percentage from cover after hiding the message. The smaller the NPCR and UACI values, the higher the level of security the message is hidden. The results of the analysis of concealment in the image obtained by the average values of NPCR and UACI were 99.98% and 3.46% respectively. While the results of the analysis of hiding in audio obtained the average value of NPCR and UACI were 83.78% and 12.66% respectively.
PENGAMANAN CITRA DENGAN ALGORITMA DIFFIE-HELLMAN DAN ALGORITMA SIMPLIFIED DATA ENCRYPTION STANDARD (S-DES) ahmad Kamsyakawuni; Ahmad Husnan Fanani; abduh Riski
Jurnal Ilmiah Matematika dan Pendidikan Matematika Vol 10 No 2 (2018): Jurnal Ilmiah Matematika dan Pendidikan Matematika
Publisher : Jurusan Matematika FMIPA Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jmp.2018.10.2.2846

Abstract

Simplified Data Encryption Standard (S-DES) is a cryptographic algorithm whose data-disguise process is simple and fast enough compared to other algorithms. Because of its simplicity, the S-DES algorithm is vulnerable to statistical attacks when applied to imagery, so this study tries to minimize S-DES weaknesses in image data by modifying S-DES keys with Diffie-Hellman. Diffie-Hellman is one of the key generating algorithms and key exchange. This research uses image data that is RGB image and grayscale image. A modified S-DES key with Diffie-Hellman is then used to encrypt the image. This study also analyzed the security level of S-DES algorithm that the key has been modified with Diffie-Hellman.
MEDICAL IMAGE ENCRYPTION USING DNA ENCODING AND MODIFIED CIRCULAR SHIFT Kiswara Agung Santoso; Ahmad Kamsyakawuni; Muhammad Seggaf
BAREKENG: Jurnal Ilmu Matematika dan Terapan Vol 16 No 1 (2022): BAREKENG: Jurnal Ilmu Matematika dan Terapan
Publisher : PATTIMURA UNIVERSITY

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1010.265 KB) | DOI: 10.30598/barekengvol16iss1pp233-240

Abstract

This paper proposes a new encryption method for the encryption of medical images. The method is used to divide the image into several blocks and then scramble the image blocks using DNA chains and then shift the pixels in a circle with certain rules. To provide a more secure result, the input key contains a DNA chain and is equipped with complementary rules, and is converted into a hexadecimal number using a DNA coding table. Experimental results and values of NPCR and UACI show that the scheme achieves good encryption and decryption results.
APPLICATION FUZZY MAMDANI TO DETERMINE THE RIPENESS LEVEL OF CRYSTAL GUAVA FRUIT Ahmad Kamsyakawuni; Abduh Riski; Anisa Binti Khumairoh
BAREKENG: Jurnal Ilmu Matematika dan Terapan Vol 16 No 3 (2022): BAREKENG: Jurnal Ilmu Matematika dan Terapan
Publisher : PATTIMURA UNIVERSITY

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (654.239 KB) | DOI: 10.30598/barekengvol16iss3pp1087-1096

Abstract

Crystal guava is one of Indonesia's flora diversity. The rind of the unripe crystal guava fruit is green, and the rind of the ripe crystal guava fruit is yellowish green. However, it is difficult to determine the ripeness of crystal guava due to the similar color of the fruit skin. Determining fruit ripeness is uncertain and therefore requires a way to deal with this uncertainty. One of the methods you can use is fuzzy Mamdani. In this study, the ripeness level of crystal guava is determined using fuzzy Mamdani. Crystal guava fruits fall into four ripeness categories: raw, half ripe, ripe, and very ripe. The data used is in the form of an RGB image separated from the background so that only crystal guava fruit objects are captured. The image of the fruit object was then extracted by looking for the median red, green, and blue at each pixel of the image. This value is used as input for the fuzzy Mamdani process. The fuzzy set and fuzzy rules that have been formed can be applied to determine the maturity level of crystal guava fruit by validating the results of 140 image data with an accuracy of 83,5%.
PENGKODEAN TEKS MENGGUNAKAN MODIFIKASI ALGORITMA ELECTRONIC CODE BOOK DAN MERKLE-HELLMAN KNAPSACK Innafajri Insyirah; Kiswara Agung Santoso; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data security needs to be maintained so that the messages sent to someone are not known by an unauthorized users. One of the data security techniques that can be applied is cryptography. Cryptography is a science and art to keep messages secure when messages are sent from one place to another. In this study, modification of Electronic Code Book and Merkle-Hellman Knapsack algorithms will be applied to secure messages. This research uses Matlab to create a program. The weaknesses of ECB and Merkle-Hellman Knapsack algorithms will be overcome by modifying key and XOR operations. The result of ciphertext is a random numbers which are difficult to understand by unauthorized users. In addition, the message pattern on the same plaintext no longer produces the same ciphertext. Ciphertext can be decrypted well even though the size is two times or longer than plaintext. This is proved by plaintext from the results of decryption is same as the original plaintext. Keywords: Cryptography, Electronic Code Book, Merkle-Hellman Knapsack.
PENGAMANAN TEKS MENGGUNAKAN ALGORITMA TRANSPOSISI DAN MODIFIKASI SANDI MORSE Rizki Gangsar Septiono; Kiswara Agung Santoso; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Humans as social beings communicate to exchange information. Information has many forms including text data, sound, images, and so on. Not all information is freely accessible. Information security is needed to prevent information from being misused by irresponsible parties. Cryptography studies how to convert information into a form that is unknown except for the sender and recipient of the information. Cryptography is divided into two, classical cryptography and modern cryptography. One form of cryptography that can be found around us is the use of Morse code in scouting. Classical cryptography and modern cryptography can be combined to increase the security of the algorithms used in hiding information. In this article, the transposition algorithm is applied in binary digits. Keys in the form of ASCII characters are converted into binary using modified Morse code and operated with plaintext. The results showed that the combination of transposition algorithm and Morse code modification adds complexity so that the proposed algorithm is difficult for cryptanalysts to solve. Keywords: Cryptography, Morse Code, Transposition Algorithm.
PENERAPAN JARINGAN SARAF TIRUAN BACKPROPAGATION UNTUK MEMPREDIKSI INDEKS HARGA SAHAM LQ45 Febia Zein Aziza; Abduh Riski; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Stock price movements are very volatile from time to time. The stock price movement is influenced by many factors, including company performance, dividend risk, the country’s economic conditions, and inflation rate. The existence of these complex factors makes stock price movements challenging to predict. Investors need stock price predictions to see the company’s stock investment prospects in the next period. The method that can predict stock prices is Backpropagation. The Backpropagation method is an algorithm that adopts a human mindset systematically to minimize the error rate by adjusting the weights based on differences in output and the desired target. This study uses historical stock index data for LQ45 from February 26, 2019 – February 26, 2021, namely the closing price as an input and the opening price as the target. The best network model from the Backpropagation method uses a binary sigmoid activation function with nine neurons in the hidden layer. The testing accuracy value is 95.2481% (MAPE), and the error value is 0.000266 (MSE). The error value shows that the prediction model results are excellent. Keywords: Backpropagation, index, prediction, stock.
Pembangkitan Pohon Fraktal Bercabang Menggunakan Metode Iterated Function System Retno Wulandari; Kosala Dwidja Purnomo; Ahmad Kamsyakawuni
Jurnal EurekaMatika Vol 10, No 2 (2022): Jurnal Eurekamatika
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17509/jem.v10i2.51210

Abstract

The Pythagorean tree is a flat fractal composed of squares. A Pythagorean tree with two branches developed into three components is called a fractal tree. In this article, the author generates a fractal tree that has been expanded to have n branches using the Iterated Function Systems (IFS) method. The fractal tree will be caused by the IFS method using affine transformations, namely dilation, translation, and rotation on a square as the initial geometric object. The generation of a fractal tree begins with determining the basic shape of the branching. The choice of the primary form of branching will affect the body and characteristics of the resulting fractal tree. There are two primary forms of branching to produce a fractal tree that has several variations in the selection of angles: the same angle, a different angle, and a random angle.Keywords: Affine Transformation, Fractal, Fractal Tree, Iterated Function System Method.AbstrakPohon Pythagoras adalah sebuah fraktal datar yang tersusun dari bujur sangkar. Pohon Pythagoras yang memiliki dua percabangan dikembangkan menjadi tiga percabangan disebut dengan istilah pohon fraktal. Pada artikel ini, penulis membangkitkan pohon fraktal yang dikembangkan jumlah cabangnya sampai sebanyak  menggunakan metode Iterated Function Systems (IFS). Pohon fraktal dibangkitkan dengan metode IFS menggunakan transformasi affine yaitu dilatasi, translasi, dan rotasi pada persegi sebagai objek geometri awal. Pembangkitan pohon fraktal dimulai dengan menentukan bentuk dasar percabangan. Pemilihan bentuk dasar percabangan akan berpengaruh pada bentuk dan karakteristik dari pohon fraktal yang dihasilkan. Ada dua macam bentuk dasar percabangan sehingga dapat menghasilkan pohon fraktal yang memiliki beberapa variasi pemilihan sudut yakni sudut sama, sudut berbeda, dan sudut random.
Application of Fuzzy TOPSIS Method as a Decision Support System for Achievement Student Selection Vani Krismo Anggoro; Abduh Riski; Ahmad Kamsyakawuni
Jurnal ILMU DASAR Vol 24 No 1 (2023)
Publisher : Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/jid.v24i1.16792

Abstract

Achievement student selection aims to appreciate students who have achieved an achievement, both in the academic and non-academic fields. This activity is carried out in stages, starting from departments, faculties, and universities, to the national level. In the selection process, several criteria were used: GPA, scientific work, presentation, English, and achievements were featured and involved several juries to avoid subjectivity in the assessment. This study aims to get the best results from the decision support system in Achievement student election in the Mathematics Department of Jember University. Therefore, we need the fuzzy TOPSIS method to avoid and minimize problems and to make multi-criteria decision-making easier. This study's ranking results were obtained from the fuzzy TOPSIS method and standardized assessment method (based on higher education guidelines). From the four candidates who participated in this selection, the two methods give different results in the last two ranks. The fuzzy TOPSIS method ranking shows the results sequentially for candidates B, C, A, and D. In contrast, and the standardized assessment method ranking shows the results sequentially for candidates B, C, D, and A. This difference is caused by the value of the criteria factor and the weight of the candidate criteria, but the fuzzy TOPSIS method is simpler than the standardized assessment method. So that it can be recommended for the next period achievement student election at the department, faculty, or university level.