LSP-Jurnal Ilmiah Dosen: Recent submissions
Now showing items 1901-1920 of 7295
-
Karakteristik Individu dan Faktor Lingkungan Terhadap Kejadian ISPA (Studi pada Wilayah Pembuangan Limbah Cair Industri Pengolahan Ikan di Kecamatan Muncar Kabupaten Banyuwangi)
(Prosiding Nasional FORIKES 2022: Pembangunan Kesehatan Multidisiplin, 2022-10-01)Karakteristik individu yang meliputi usia, jenis kelamin, status gizi, kebiasaan merokok dan faktor lingkungan yang meliputi polutan udara (H2S, SO2, NH3), suhu, kelembaban merupakan risiko penyebab ISPA. Determinan faktor ... -
Application of Genetic Algorithm on Inclusive Labeling of a Graph
(Indonesian Journal of Pure and Applied Mathematics, 2022-05)As science developed, heuristic methods began to be used in graph coloring. Heuristic methods that have been used for graph coloring include Genetic Algorithm, Tabu Search, and Ant Colony Algorithm. A Genetic Algorithm ... -
On Max-Plus Algebra and Its Application on Image Steganography
(The Scientifc World Journal, 2018-05-15)We propose a new steganography method to hide an image into another image using matrix multiplication operations on max plus algebra. Tis is especially interesting because the matrix used in encoding or information disguises ... -
Pengamanan Polyalphabetic dengan Affine Cipher Berdasarkan Barisan Fibonacci
(Majalah Ilmiah Matematika dan Statistika, 2019)Affine cipher is a classic cryptographic algorithm substitution technique. Substitution technique is the encryption process for every character in the plaintext will be subtituted by another character. Affine cipher uses ... -
Image Encryption Based on Pixel Bit Modification
(Journal of Physics: Conference Series, 2017-11)There are currently some publications about image encoding without changing pixel values. One of them encodes the image by dividing the image into blocks and then creating permutations and combinations into block positions. ... -
Implementasi Algoritma Grey Wolf Optimizer (GWO) di Toko Citra Tani Jember (Implementation of the Grey Wolf Optimizer (GWO) Algorithm At Citra Tani Jember Store)
(Majalah Ilmiah Matematika dan Statistika, 2019-09-02)Generally, optimization is defined as the process of determining the minimum or maximum value that depends on the function of the goal, even now there are many problems regarding optimization. One of them is the ... -
Penerapan Dragonfly Optimization Algorithm (Doa) Pada Permasalahan Multiple Constraints Bounded Knapsack
(Majalah Ilmiah Matematika dan Statistika, 2019-03-01)Optimization is very useful in almost all fields in running a business effectively and efficiently to achieve the desired results. This study solves the problem of multiple constraints bounded knapsack by implementing ... -
Explanation Study of Agro-Industrial Firm Financial Performance Based on Capital Structure and Firm Strategy in the COVID-19 Pandemic
(Jurnal Riset Akuntansi dan Bisnis Airlangga, 2022-10-17)The purpose of this study was to examine the effect of corporate strategy on financial performance with capital structure as an intervening variable. The advantage of this research lies in taking the object of the company ... -
Pengamanan Image dengan Modifikasi Algoritma Electronic Code Book (ECB)
(Majalah Ilmiah Matematika dan Statistika, 2018-09-03)Cryptography is knowledge of encoding data to ensure the confidentiality, security, validity and integrity of data. Cryptography is divided into two namely classical cryptography and modern cryptography. One example ... -
Indonesia Diplomacy for Achieving UNESCO Global Geopark (UGG) Status
(Journal of Tourism and Creativity, 2022-01-03)This study analyzes Indonesia diplomatic efforts to achieve UNESCO Global Geopark (UGG) status for geopark tourism sites in Indonesia. Through qualitative descriptive research with secondary data sources derived ... -
Confirmatory Factor Analysis Immune Response (TNF-α) to Dust Exposure on Tulungagung Marble Craftsmen
(NeuroQuantology|, 2022-12-01)Background: As marble craftsmen, marble dust which may contain high levels of silica potentially exposed to the job, so workers have a risk of danger and can cause health problems. The purpose of this study is to determine ... -
Pengakuan Unesco Atas Batik Sebagai Warisan Budaya Tak Benda (WBTB)
(Dian Ilmu, 2020-04-02)This paper describes how the Indonesian government's efforts to make batik recognized as an Intangible Cultural Heritage by UNESCO. Through qualitative descriptive research with secondary data sources through ... -
Penentuan Lokasi ATM Bank Syariah Indonesia Menggunakan Metode Fuzzy C Means di Kabupaten Jember
(Jurnal Matematika Sains dan Teknologi, 2022-11-21)Bank Syariah Indonesia diresmikan pada tanggal 1 Februari 2021 yang merupakan gabungan dari BNI syariah, mandiri syariah, dan BRI syariah. Salah satu fasilitas kemudahan bertransaksi bagi nasabah menggunakan ATM (Anjungan ... -
Medical Image Encryption Using Dna Encoding and Modified Circular Shift
(BAREKENG: Jurnal Ilmu Matematika dan Terapan, 2022-03)This paper proposes a new encryption method for the encryption of medical images. The method is used to divide the image into several blocks and then scramble the image blocks using DNA chains and then shift the pixels ... -
Algoritma Elephant Herding Optimization: Permasalahan Multiple Constraints Knapsack 0-1
(Majalah Ilmiah Matematika dan Statistika, 2018)Optimization problems are often found in everyday life, such as when determining goods to be a limited storage media. This causes the need for the selection of goods in order to obtain profits with the requirements met. ... -
Kriptosistem Menezes Vanstone
(Majalah Ilmiah Matematika dan Statistika, 2015)Many kinds of cryptosystem models we have known. Generally if input of plaintext is alphabet so ciphertext is alphabet or real number that can be transform to alphabet. This paper will introduce a type of cryptosystem ... -
Otentikasi Image Berbasis Magic Square Orde 𝒏 (Image Authentication Based on Magic Square Order n)
(Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Jember, 2022-09-12)Image is a digital media that is easy to change, so it is susceptible to being used for crime. Image changes may be affected by the unstable internet during transmission or deliberate manipulation of images for specific ... -
Kombinasi Caesar Cipher dan Reverse Cipher Berdasarkan Cipher Block Chaining
(Majalah Ilmiah Matematika dan Statistika, 2021)Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it ... -
Digital Image Encryption by Using a Modified Hill Code
(Jurnal Ilmu Dasar, 2014-07-01)Data security is very important data needed to stay awake in strict confidence from hacker intrusion or criminals who want to steal the data. Data security methods that are used in this paper is a digital image encryption ... -
Super (a, d)-Edge Antimagic Total Labeling of Connected Ferris Wheel Graph
(Jurnal Ilmu Dasar, 2014-07-01)Let G be a simple graph of order p and size q. Graph G is called an (a,d)-edge-antimagic total if there exist a bijection f : V (G) ∪ E(G) → {1, 2,...,p + q} such that the edge-weights, w(uv) = f(u)+f(v)+f(uv); u, v ∈ V ...