CAUCHY: Jurnal Matematika Murni dan Aplikasi
https://ejournal.uin-malang.ac.id/index.php/Math
<h3>CAUCHY: Jurnal Matematika Murni dan Aplikasi</h3><p><span lang="id"><span class="hps"><strong>p-ISSN: <a href="http://u.lipi.go.id/1255061534" target="_blank">2086-0382</a> | e-ISSN: <a href="http://u.lipi.go.id/1447468580" target="_blank">2477-3344</a></strong></span></span><strong></strong></p><p><strong><span lang="id"><span class="hps"><br /></span></span></strong><span id="result_box" lang="en"> <strong>CAUCHY: Jurnal Matematika Murni dan Aplikasi</strong> <span>is a</span> <span>mathematical international journal</span> <span>published</span> <span>twice a year</span> <span>in May</span> <span>and</span> <span>November</span> <span>by</span> <span>the Mathematics</span> Department, F<span>aculty of</span> <span>Science</span> <span>and</span> T<span>echnology, </span><span>Universitas Islam Negeri Maulana Malik Ibrahim Malang</span></span></p><p><span id="result_box" lang="en"><strong>CAUCHY: Jurnal Matematika Murni dan Aplikasi </strong><span><strong>has been accredited Second Grade " SINTA 2" Ministry of Research and Technology/National Agency for Research and Innovation, Republic of Indonesia</strong></span><strong> (<a title="SK Akreditasi Jurnal 2020" href="https://drive.google.com/open?id=1v2Hrnf5azymhkZJRR4Jdqy_CoNTjtyjS" target="_blank">SK: 85/M/KPT/2020) since April 1, 2020</a>.</strong></span></p><p><span lang="en">We welcome authors for original articles (research), review articles, interesting case reports, special articles illustrations that focus on the <strong>Pure and Applied <strong>Mathematics.</strong></strong></span></p><p>Subjects suitable for publication include, the following fields of:</p><ul><li>Fuzzy Systems and its Applications</li><li>Geometry Theories and its Applications</li><li>Graph Theories and its Applications</li><li>Real Analysis and its Applications </li><li>Operation Research and its Applications</li><li>Statistical Theories and its Applications</li><li>Dinamical Systems and its Applications</li><li>Mathematical Modeling and its Applications</li><li>Discrete Mathematics and its Applications</li><li>Computer Mathematics and its Applications</li><li>Actuarial Mathematics and its Applications</li></ul><p><span lang="en"><span><strong>Journal History</strong><br />CAUCHY: Jurnal Matematika Murni dan Aplikasi has several changes and updates in its history as follows: 1). On 2009-2012, the cover color was changed from yellow to purple; 2). On 2013-2015, it used two-column system for the layout; 3). From 2016, it uses one-column layout and each article submitted to CAUCHY has to be written in English.</span></span></p><strong><span lang="en"><span id="result_box" lang="en"><span id="result_box" lang="en"><span> <a href="http://s1153.photobucket.com/user/joehari1/media/new1.gif.html" target="_blank"><img src="http://i1153.photobucket.com/albums/p503/joehari1/new1.gif" alt=" photo new1.gif" border="0" /></a> </span></span></span><span id="result_box" lang="en"><span id="result_box" lang="en"><span>Starting from Vol</span><span>.</span> <span>4 No.</span> <span>2</span> <span>(2016)</span> <span>CAUCHY: Jurnal Matematika Murni dan Aplikasi</span> <span>use a new layout template</span></span><br /></span></span></strong><p>Registration and article submission guidelines can be downloaded <a href="https://goo.gl/crrzlC" target="_blank">here</a>.</p><p><span lang="id"><span class="hps"><br /></span></span></p>en-US<p>Authors who publish with this journal agree to the following terms:</p><ol><li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="https://creativecommons.org/licenses/by-sa/4.0/" target="_blank">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li><li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li><li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See <a href="http://opcit.eprints.org/oacitation-biblio.html" target="_new">The Effect of Open Access</a>).</li></ol>cauchy@uin-malang.ac.id (Juhari, M.Si)cauchy@uin-malang.ac.id (Juhari, M.Si)Tue, 01 Nov 2022 00:00:00 +0700OJS 2.4.8.5http://blogs.law.harvard.edu/tech/rss60Front-Matter
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/18973
Front Matter
Copyright (c) 2022 CAUCHY: Jurnal Matematika Murni dan Aplikasi
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/18973Tue, 11 Oct 2022 00:00:00 +0700Back-Matter
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/18974
Back Matter
Copyright (c) 2022 CAUCHY: Jurnal Matematika Murni dan Aplikasi
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/18974Tue, 11 Oct 2022 00:00:00 +0700A Monte Carlo Simulation Study to Assess Estimation Methods in CFA on Ordinal Data
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/14434
<p class="Abstract">Likert-type scale data are ordinal data and are commonly used to measure latent constructs in the educational, social, and behavioral sciences. The ordinal observed variables are often treated as continuous variables in factor analysis, which may cause misleading statistical inferences. Two robust estimators, i.e., unweighted least square (ULS) and diagonally weighted least square (DWLS) have been developed to deal with ordinal data in confirmatory factor analysis (CFA). Using synthetic data generated in a Monte Carlo experiment, we study the behavior of these methods (DWLS and ULS) and compare their performance with normal theory-based ML and GLS (generalized least square) under different levels of experimental conditions. The simulation results indicate that both DWLS and ULS yield consistently accurate parameter estimates across all conditions considered in this study. The Likert data can be treated as a continuous variable under ML or GLS when using at least five Likert scale points to produce trivial bias. However, these methods generally fail to provide a satisfactory fit. Empirical studies in the field of psychological measurement data are reported to present how theoretical and statistical instances have to be taken into consideration when ordinal data are used in the CFA model.</p><div><p class="Keywords"><strong>Keywords: </strong>confirmatory factor analysis, diagonally weighted least square, generalized least square, Likert data, maximum likelihood.</p></div>Nina Fitriyati, Madona Yunita Wijaya
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/14434Tue, 11 Oct 2022 01:38:59 +0700Comparisons between Resampling Techniques in Linear Regression: A Simulation Study
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/14550
The classic methods used in estimating the parameters in linear regression need to fulfill some assumptions. If the assumptions are not fulfilled, the conclusion is questionable. Resampling is one of the ways to avoid such problems. The study aims to compare resampling techniques in linear regression. The original data used in the study is clean, without any influential observations, outliers and leverage points. The ordinary least square method was used as the primary method to estimate the parameters and then compared with resampling techniques. The variance, p-value, bias, and standard error are used as a scale to estimate the best method among random bootstrap, residual bootstrap and delete-one Jackknife. After all the analysis took place, it was found that random bootstrap did not perform well while residual and delete-one Jackknife works quite well. Random bootstrap, residual bootstrap, and Jackknife estimate better than ordinary least square. Is was found that residual bootstrap works well in estimating the parameter in the small sample. At the same time, it is suggested to use Jackknife when the sample size is big because Jackknife is more accessible to apply than residual bootstrap and Jackknife works well when the sample size is big.Anwar Fitrianto, Punitha Linganathan
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/14550Tue, 11 Oct 2022 01:39:02 +0700η-Intuitionistic Fuzzy Soft Groups
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/14555
<p class="Abstract">In this research, we present the idea of the intuitionistic fuzzy soft group defined on the intuitionistic fuzzy soft set. The main purpose of this research is to create a new concept, which is an intuitionistic fuzzy group. To achieve this, we combine the concept of intuitionistic fuzzy group and intuitionistic fuzzy soft group. As the main result, we prove the correlation between the intuitionistic fuzzy soft group and intuitionistic fuzzy soft group along with some properties of intuitionistic fuzzy soft groups. Also, we prove some properties of a subgroup of an intuitionistic fuzzy soft group. An intuitionistic fuzzy soft homomorphism is also proved.</p>Mustika Ana Kurfia, Noor Hidayat, Corina Karim
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/14555Tue, 11 Oct 2022 01:39:03 +0700Actuarial Modeling of COVID-19 Insurance
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/14999
<p class="Abstract">In this article, we provide an actuarial model expected to be able to help financial arrangements to cover losses due to the outbreak of coronavirus disease (COVID-19). We construct the dynamical models of premium and benefit based on generalized SEIR (Susceptible-Exposed-Infected-Recovered). Based on its dynamical model, we formulate the premium and the premium reserves on hospitalization and death benefits of the COVID-19 insurance.</p>Mila Kurniawaty, Maulana Muhamad Arifin, Bagus Kurniawan, Sadam Laksamana Sukarno, Muhammad Teguh Prayoga
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/14999Tue, 11 Oct 2022 01:39:04 +0700Mathematics Model of COVID-19 with Two-Stage Vaccination, Symptomatic, Asymptomatic, and Quarantine Individuals
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15188
<p class="Abstract">This research developed a model of COVID-19 based on the SEIR model which was further developed by dividing the infected subpopulation into symptomatic and asymptomatic, adding quarantine of infected individuals and vaccination in two steps. Making this model begins with making a compartment diagram of the disease and then forming a system of differential equations. After the model is formed, the disease-free equilibrium point, endemic equilibrium point, and basic reproduction number (R<sub>0</sub>) are obtained. Analysis of the stability of the disease-free equilibrium point was locally asymptotically stable if R<sub>0</sub><1 and an endemic equilibrium point existed if R<sub>0</sub>>1. Numerical simulation for the model that has been made is in line with the analysis. Furthermore, the sensitivity analysis obtained that the parameters that have a significant effect on the spread of COVID-19 are the rate of the first dose vaccination, the rate of contact with symptomatic or asymptomatic individuals, and the rate of quarantine of symptomatic infected individuals.</p>Nur Inayah, Muhammad Manaqib, Muhammad Febry Fadillah
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15188Tue, 11 Oct 2022 01:39:06 +0700Bayesian Hurdle Poisson Regression for Assumption Violation
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15549
<p class="Abstract">Violation of the Poisson regression assumption can cause the model formed will produce an unbiased estimator. There is a good method for estimating parameters on small sample sizes and on all distributions, namely the Bayesian method. The number of death from chronic Filariasis data violates the Poisson regression assumption, so it is modeled with the Bayesian Hurdle Poisson Regression. With the Bayesian method, convergence is fullfilled when 300000 iterations and 7 thin are performed. The results showed that in the logit model only one predictor variable had a significant effect on the number of cases of death due to chronic Filiariasis in 34 Provinces in Indonesia . The Truncated Poisson model resulted in all predictor variables having a significant effect on the number of cases of death due to chronic Filariasis.</p>Nur Kamilah Sa'diyah, Ani Budi Astuti, Maria Bernadetha T. Mitakda
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15549Tue, 11 Oct 2022 01:39:07 +0700Levi Decomposition of Frobenius Lie Algebra of Dimension 6
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15656
In this paper, we study notion of the Lie algebra of dimension 6. The finite dimensional Lie algebra can be expressed in terms of decomposition between Levi subalgebra and the maximal solvable ideal. This form of decomposition is called Levi decomposition. The work aims to obtain Levi decomposition of Frobenius Lie algebra of dimension 6. To achieve this aim, we compute Levi subalgebra and the maximal solvable ideal (radical) of with respect to its basis. To obtain Levi subalgebra and the maximal solvable ideal, we apply literature reviews about Lie algebra and decomposition Levi in Dagli result. For future research, decomposition Levi for higher dimension of Frobenius Lie algebra is still an open problem.Henti Henti, Edi Kurniadi, Ema Carnia
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15656Tue, 11 Oct 2022 01:39:09 +0700C-Type Ops Transformation
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15749
Many indexes are involved on ordinary power series calculation. One of the most valuable discovery on previous research is Ops Transformation which able to simplify notations of ordinary power series to avoid some more complicated manipulations. The aim of this research is to generalize the concept of Ops Transformation to gain more benefit and wider applications. The main result of this research is a new formula of generalization of Ops Transformation which called C-Type Ops Transformation. Such transformation is able to solve some differential equations which involving Taylor seriesAhmad Lazwardi, Iin Ariyanti, Soraya Djamilah
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15749Tue, 11 Oct 2022 01:39:10 +0700Confidence Intervals for the Mean Function of a Compound Cyclic Poisson Process in the Presence of Power Function Trend
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15989
We consider the problem of estimating the mean function of a compound cyclic Poisson process in the presence of power function trend. The objectives of this paper are: (i) to construct confidence interval for the mean function of a compound cyclic Poisson process with significance level , (ii) to prove that the probability that the mean function contained in the confidence interval converges to , and (iii) to observe, using simulation study, that the probabilities of the mean function contained in the confidence intervals for bounded length of observation interval. The main results are a confidence interval for the mean function and a theorem about convergence of the probability that the mean function contained in confidence interval. The simulation study shows that the probability that the mean function contained in the confidence interval is in accordance with the theorem. The contribution of this study is to provide information for users regarding confidence interval for the mean function of a compound cyclic Poisson process in the presence of power function trend.Faisal Muhammad, I Wayan Mangku, Bib Paruhum Silalahi
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15989Tue, 11 Oct 2022 01:39:11 +0700Forecasting Population of Madiun Regency Using ARIMA Method
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/16156
<span lang="IN">The high population growth of the Madiun Regency can cause population density that can have implications for other problems, both in terms of social, economic, welfare, security, land availability, availability of clean water, and food needs. This study aims to predict the population growth of Madiun Regency using the ARIMA method. The ARIMA (Autoregressive Integrated Moving Average) method is popular for forecasting time series data, which is reliable because the calculation process is done gradually. This study uses annual population data of Madiun Regency from 1983 to 2021 and produces an ARIMA forecasting model (0,2,1) with a MAPE value of 8.42%. The results of this study are expected to be used as information from the Madiun Regency government in anticipating the emergence of problems caused by the population level of Madiun Regency in the future.</span>Yuniar Farida, Mayandah Farmita, Nurissaidah Ulinnuha, Dian Yuliati
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/16156Tue, 11 Oct 2022 01:39:11 +0700on Graceful Chromatic Number of Vertex amalgamation of Tree Graph Family
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/16334
Proper vertex coloring c of a graph G is a graceful coloring if c is a graceful k-coloring for k∈{1,2,3,…}. Definition graceful k-coloring of a graph G=(V,E) is a proper vertex coloring c:V(G)→{1,2,…,k);k≥2, which induces a proper edge coloring c':E(G)→{1,2,…,k-1} defined c'(uv)=|c(u)-c(v)|. The minimum vertex coloring from graph G can be colored with graceful coloring called a graceful chromatic number with notation χ<sub>g</sub> (G). In this paper, we will investigate the graceful chromatic number of vertex amalgamation of tree graph family with some graph is path graph, centipede graph, broom and E graph.Arika Indah Kristiana, Ahmad Aji, Edy Wihardjo, Deddy Setiawan
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/16334Tue, 11 Oct 2022 01:39:12 +0700Mathematical Model of Iteroparous and Semelparous Species Interaction
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/16447
A species can be categorized based on its reproductive strategy, including semelparous and iteroparous. Semelparous species is a species that reproduces only once in its lifetime shortly before dying, while iteroparous species is a species that reproduces in its lifetime more than once. In this paper, we examine multispecies growth dynamics involving both species categories focusing on one semelparous species and one iteroparous species influenced by density-dependent also harvesting in which there are two age classes each. We divided the study into two models comprising competitive and non-competitive models of both species. Competition in both species can consist of competition within the same species (intraspecific competition) and competition between different species (interspecific competition). Our results show that the level of competition both intraspecific and interspecific affects the co-existence equilibrium point and the local stability of the co-existence equilibrium point.Arjun Hasibuan, Asep Kuswandi Supriatna, Ema Carnia
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/16447Tue, 11 Oct 2022 01:39:12 +0700Optimalization Route to Tourism Places in West Java Using A-STAR Algorithm
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/17032
Various algorithms can be used in the problem of finding the optimal route, one of which is the A-STAR Algorithm. The characteristic for recording routes that have been evaluated is one of the advantages of the A-STAR Algorithm. This study focuses on finding the optimal route to tourism places in West Java Province. In the application of the A-STAR Algorithm, distance data and density data are used from each line segment in West Java Province. The heuristic values used are converted from density data. The A-STAR algorithm is implemented using Python so that the optimal route to tourism places in West Java Province is obtained.Muhammad Helambang Prakasa Yudha, Sudrajat Supian, Herlina Napitupulu
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/17032Tue, 11 Oct 2022 01:39:13 +0700A Mixed Integer Linear Programming Model of Order Allocation Involving Mass Customization Logistic Service (MCLS)
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15398
<div><p class="Keywords"><span lang="EN-US">In an </span><span lang="IN">increasing business competition, </span><span lang="EN-US">a </span><span lang="IN">company </span><span lang="EN-US">has</span><span lang="IN"> to improve its competitiveness</span><span lang="EN-US"> by </span><span lang="IN">focus more on supply chain management. </span><span lang="EN-US">One of the crucial</span><span lang="IN"> problem</span><span lang="EN-US">s in supply chain</span><span lang="EN-US"> </span><span lang="EN-US">deals with</span><span lang="IN"> the allocation of orders. More and more companies are starting to </span><span lang="EN-US">adopt</span><span lang="IN">Mass Customization Logistics Service (MCLS) mode</span><span lang="EN-US"> to determine the optimal allocations of order both from suppliers and to </span><span lang="IN">customized logistics services at </span><span lang="EN-US">the</span><span lang="EN-US"> </span><span lang="EN-US">possible </span><span lang="IN">lowe</span><span lang="EN-US">st</span><span lang="IN"> cost. For this </span><span lang="EN-US">purpose</span><span lang="IN">, a third party is needed, namely Logistic Service Integrator (LSI) in providing logistics services. However, </span><span lang="EN-US">since</span><span lang="IN"> LSI cannot meet all customer needs, LSI chooses to outsource logistics tasks to a Functional Logistics Service Provider (FLSP). This research was developed to help decision-makers </span><span lang="EN-US">of</span><span lang="IN">manufacturing companies </span><span lang="EN-US">in making optimal decision concerning order allocations</span><span lang="IN"> that minimize the total supply chain costs </span><span lang="EN-US">involving</span><span lang="IN"> Mass Customization Logistics Service (MCLS).</span></p></div>Cucuk Nur Rosyidi, Nina Salsabila Sulistiani, Pringgo Widyo Laksono
Copyright (c) 2022 CAUCHY
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/15398Tue, 11 Oct 2022 01:39:13 +0700On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/17358
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field used, one of which is the infinite field prima ( where ). Elliptic curve cryptography can be used for multiple protocol purposes, digital signatures, and encryption schemes.The purpose of this study is to determine the process of hiding encrypted messages using the <em>Noiseless Steganography</em> method as well as the generation of private keys and public keys and the process of verifying the validity of <em>the Elliptic Curves Cryptography Digital Signature Algorithm</em><em> </em>(ECDSA). The result of this thesis is that a line graph is obtained that store or hides a message using <em>the steganography </em>method and a message authenticity from the process of key generation and verification of validity using the ECDSA method. By selecting three samples consisting of one test sample and two differentiating samples, a line graph, an MD5 hash value, and a value at the point are obtained different. Successively obtained values to message “Matematika 2018”, “MATEMATIKA 2018”, and “2018 matematika” are and . The discussion in this thesis only covers the elliptic curves on prime finite field. So, for the next thesis, the next researcher can do a discussion about the elliptic curve on the finite field or the application of elliptic curve cryptography and other steganographic methodsJuhari Juhari, Mohamad Febry Andrean
Copyright (c) 2022 CAUCHY: Jurnal Matematika Murni dan Aplikasi
https://creativecommons.org/licenses/by-sa/4.0
https://ejournal.uin-malang.ac.id/index.php/Math/article/view/17358Tue, 11 Oct 2022 01:39:14 +0700