Kiswara Agung Santoso
Jurusan Matematika FMIPA Universitas Jember

Published : 18 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 18 Documents
Search

DESAIN MOTIF MOZAIK PADA REGULER DECAGON BERBASIS GOLDEN TRIANGLE Rosyadi, Itaniza; Kusno, K; Santoso, Kiswara Agung
KadikmA Vol 3, No 3: Desember 2012
Publisher : KadikmA

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (708.809 KB)

Abstract

Abstract. Decagonal Penrose Mosaic is a decagonal interior design constructed by applying the basic of golden triangle Penrose tile. There are several techniques to design the mosaic, some of them are as follows: (1) constructing Penrose tile on the fifth iterations constructed from isosceles triangles which on each triangle is defined by decagon sector; (2) stating  Penrose symmetry base as the mosaic design base;  (3) dividing each Penrose tile golden triangle into 3 zone; (4) stating Penrose symmetry base to fill in Penrose tile golden triangle in each zone; (5) coloring the interior  Penrose symmetry base and the backgrounds. The formed design has been found several Penrose mosaic models in full symmetry, not fully symmetry, similar and overlap, which each models has natural motive and symmetry characteristics. By using the different coloring techniques it has been formed some coloring pattern on the centre, homogenous distribution, or spreading. This would enrich the varieties of mosaic design forms. Key Words : decagonal golden triangle Penrose tile, Penrose mosaic
Desain Mozaik Pada Interior Persegi Berkarakter Barisan Geometri Murihani, Endang; Kusno, Kusno; Santoso, Kiswara Agung
Prosiding Seminar Matematika dan Pendidikan Matematik Vol 1, No 1 (2014): Prosiding Seminar Nasional Matematika 2014
Publisher : Prosiding Seminar Matematika dan Pendidikan Matematik

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mosaic is a creation that arranging pieces of geometric in a space. This mosaic design which has geometric line character enrich the varieties of mosaic designs more attractive and various. The result of research found that to develop the mosaic design in rectangle interior for geometric line character needed some steps as follows: (1) constructing pieces of rectangle that the size is arranged in geometric line form through spot among each side, (2) fill in each pieces in the result of step (1) with filling curve permanently or exchanging by using the rotation or dilatation, (3) combaining some rectangles as the result of step (2) and coloring the background or filling curve.
Digital Image Encryption by Using a Modified Hill Code Prasetiya, Sochif; Hasan, Mohammad; Santoso, Kiswara Agung
Jurnal ILMU DASAR Vol 15 No 2 (2014)
Publisher : Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (399.02 KB) | DOI: 10.19184/jid.v15i2.524

Abstract

Data security is very important data needed to stay awake in strict confidence from hacker intrusion or criminals who want to steal the data. Data security methods that are used in this paper is a digital image encryption by using a modified Hill’s code which is done by changing the way of encryption. If we are using Hill’s code then matrix pixel multiplied is the key matrix while on the modification Hill’s code before the key matrix then the matrix is multiplied pixels must be added to the results of the main diagonal elements of the matrix times key. The results obtained in the process of digital image encoding indicating that the image is encoded with password modification results of modified Hill's code more mixed reviews when compared to the image that was encoded with password Hill so that more effective in securing data in the form of a digital image. The size of the image file using the encoding results in a modification password Hill is smaller than ordinary password Hill with a percentage decrease of 4.6 % so more ease in delivery through electronic media Keyword: Digital image, modified Hill code, encryption, description  
DESAIN MOTIF MOZAIK PADA REGULER DECAGON BERBASIS GOLDEN TRIANGLE Rosyadi, Itaniza; Kusno, K; Santoso, Kiswara Agung
KadikmA Vol 3 No 3 (2012): Desember 2012
Publisher : Department of Mathematics Education , University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/kdma.v3i3.1012

Abstract

Abstract. Decagonal Penrose Mosaic is a decagonal interior design constructed by applying the basic of golden triangle Penrose tile. There are several techniques to design the mosaic, some of them are as follows: (1) constructing Penrose tile on the fifth iterations constructed from isosceles triangles which on each triangle is defined by decagon sector; (2) stating  Penrose symmetry base as the mosaic design base;  (3) dividing each Penrose tile golden triangle into 3 zone; (4) stating Penrose symmetry base to fill in Penrose tile golden triangle in each zone; (5) coloring the interior  Penrose symmetry base and the backgrounds. The formed design has been found several Penrose mosaic models in full symmetry, not fully symmetry, similar and overlap, which each models has natural motive and symmetry characteristics. By using the different coloring techniques it has been formed some coloring pattern on the centre, homogenous distribution, or spreading. This would enrich the varieties of mosaic design forms. Key Words : decagonal golden triangle Penrose tile, Penrose mosaic
PENGAMANAN IMAGE DENGAN MODIFIKASI ALGORITMA ELECTRONIC CODE BOOK (ECB) Asti, Melinda; Kamsyakawuni, Ahmad; Santoso, Kiswara Agung
Majalah Ilmiah Matematika dan Statistika Vol 18 No 2 (2018): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v18i2.17252

Abstract

Cryptography is knowledge of encoding data to ensure the confidentiality, security, validity and integrity of data. Cryptography is divided into two namely classical cryptography and modern cryptography. One example of modern cryptography is the Electronic Code Book (ECB). Electronic Code Book (ECB) is a modern cryptographic method used to encrypt and decrypt text, images and more. The image is formed from several pixels which consist of several bits in a pixel. Bits are divided into two namely Least Significant Bit (LSB) and Most Significant Bit (MSB).LSB is the four rightmost bits while MSB is the leftmost four bits of a pixel. The purpose of this study is to compare the level of security of Electronic Code Book (ECB) image security results with the results of securing an Electronic Code Book (ECB) modified image. The data used in this study are 8 RGB and Greyscale images also a key in the form of one ASCII character. The results obtained show that securing images with modified Electronic Code Book (ECB) is safer than securing images with Electronic Code Book (ECB) based on histogram analysis, differential analysis and correlation coefficients. Keywords: ASCII, Electronic Code Book (ECB), Most Significant Bit (MSB)
PENDETEKSIAN CITRA DAUN TANAMAN MENGGUNAKAN METODE BOX COUNTING Juwitarty, Novita Anggraini; Purnomo, Kosala Dwidja; Santoso, Kiswara Agung
Majalah Ilmiah Matematika dan Statistika Vol 20 No 1 (2020): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v20i1.17221

Abstract

Different types of plants make identification difficult. Therefore, we need a system that can identify the similarity of the leaves based on a reference leaf. Extraction can be done by taking one part of the plant and the most easily obtained part is the leaf part. Natural objects such as leaves have irregular shapes and are difficult to measure, but this can be overcome by using fractal dimensions. In this research, image detection of plant leaves will be carried out using the box counting method. The box counting method is a method of calculating fractal dimensions by dividing images into small boxes in various sizes. Image detection using fractal dimension values, we know which leaves the match with the reference. In this study,10 species of leave were tested, with each species 10 samples of plant leaves. Image testing of plant leaves uses a variety of r box size, namely 1/2 ,1/4 , 1/8 , 1/16 ,1/32 , 1/64 , 128which obtain an average match accuracy of 44%. Keywords: Box Counting, Fractal dimension
PENGAMANAN POLYALPHABETIC DENGAN AFFINE CIPHER BERDASARKAN BARISAN FIBONACCI Astuti, Lestari Fidi; Santoso, Kiswara Agung; Kamsyakawuni, Ahmad
Majalah Ilmiah Matematika dan Statistika Vol 19 No 2 (2019): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v19i2.17274

Abstract

Affine cipher is a classic cryptographic algorithm substitution technique. Substitution technique is the encryption process for every character in the plaintext will be subtituted by another character. Affine cipher uses two types of keys. Each character of plaintext to be encrypted substituted by the same key. This research discusses about modify one of the key affine cipher, to produce a different key that will be substituted with each plaintext character. Key modifications are made by the Fibonacci sequence rules. This study also compares affine cipher and key modification affine cipher by finding corelation coeffiecient values. The results obtained from the comparison of the two algorithms, encryption that uses affine cipher key modification is better than affine cipher. Keywords: Cryptography, Affine Cipher, Fibonacci, Correlation Value
Algoritma Elephant Herding Optimization: Permasalahan Multiple Constraints Knapsack 0-1 Regita, Yulia Dewi; Santoso, Kiswara Agung; Kamsyakawuni, Ahmad
Majalah Ilmiah Matematika dan Statistika Vol 18 No 1 (2018): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v18i1.17241

Abstract

Optimization problems are often found in everyday life, such as when determining goods to be a limited storage media. This causes the need for the selection of goods in order to obtain profits with the requirements met. This problem in mathematics is usually called a knapsack. Knapsack problem itself has several variations, in this study knapsack type used is multiple constraints knapsack 0-1 which is solved using the Elephant Herding Optimization (EHO) algorithm. The aim of this study is to obtain an optimal solution and study the effectiveness of the algorithm comparing it to the Simplex method in Microsoft Excel. This study uses two data, consisting of primary and secondary data. Based on the results of parameter testing, the proven parameters are nClan, nCi,α,β and MaxGen have a significant effect. The final simulation results have also shown a comparison of the EHO algorithm with the Simplex method having a very small percentage deviation. This shows that the EHO algorithm is effective for completing optimization multiple constraints knapsack 0-1. Keywords: EHO Algorithm, Multiple Constraints Knapsack 0-1 Problem.
POLINOMIAL KROMATIK PADA GRAF KIPAS Maulana, Nur Ridwan; Wijaya, Kristiana; Santoso, Kiswara Agung
Majalah Ilmiah Matematika dan Statistika Vol 18 No 2 (2018): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v18i2.17248

Abstract

A chromatic polynomial of a graph G is a special function that describes the number of ways we can achieve a proper coloring on the vertices of G given k colors. In this paper, we determine a chromatic polynomial of a fan graph. Keywords: Proper coloring, chromatic polynomial, fan graph.
PENERAPAN DRAGONFLY OPTIMIZATION ALGORITHM (DOA) PADA PERMASALAHAN MULTIPLE CONSTRAINTS BOUNDED KNAPSACK Nilasari, Laylatul Febriana; Santoso, Kiswara Agung; Riski, Abduh
Majalah Ilmiah Matematika dan Statistika Vol 19 No 1 (2019): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v19i1.17264

Abstract

Optimization is very useful in almost all fields in running a business effectively and efficiently to achieve the desired results. This study solves the problem of multiple constraints bounded knapsack by implementing DOA. The problem of multiple constraints bounded knapsack has more than ones constraint with objects that are entered into the storage media, the dimensions can be partially or completely included, but the number of objects is limited. The purpose of this study is to determine the results of using DOA to solve multiple constraits bounded knapsack and the effectiveness of DOA compared to the results of the Simplex method. The data used in this study are primary data. There are ten parameters to be tested, namely population parameters, maximum iteration, s, a, c, f, e and range. The trial results of the ten parameters show that the best value of the parameters is neither too large nor too small. If the best value is too large then the position of the dragonfly will be randomized so that it is not clear the position of the dragonfly and if it is too small the best value then the change is not visible. In addition, based on the results of the final experiment it can be seen that DOA is less effective in solving multiple constraints bounded knapsack problems, because of many experiments there is no solution similar to Simplex. DOA approach to optimal, seen from a small deviation. Keywords: DOA, Knapsack, Multiple constraints bounded knapsack problem.