Mathematical Sciences and Applications Journal
https://mail.online-journal.unja.ac.id/msa
<p><span class="value">Mathematical Sciences and Applications (MSA) Journal is a peer-reviewed journal in the field of mathematics and applied mathematics, published by Department of Mathematics, Faculty of Science and Technology, Universitas Jambi, Jambi, Indonesia. Since 2020, this journal publishes biannually in April and Oktober. The criteria of the submitted article covers the following types of article: first, the article presents the results of research in certain topic in Mathematics and Applied Mathematics; second, the review article and last, Communication (Based on Editor's Invitation).</span></p> <p>The scope of this journal including:</p> <ul> <li>Real Analysis</li> <li>Algebra</li> <li>Applied mathematics</li> <li>Computational Mathematics</li> <li>Applied Statistics</li> <li>Actuarial and others</li> </ul>Department of Mathematics, Faculty of Science and Technology Universitas Jambien-USMathematical Sciences and Applications Journal2988-6481Aplikasi Algoritma Euclidean dalam Produksi Jagung di Pulau Jawa
https://mail.online-journal.unja.ac.id/msa/article/view/38080
<p>Corn farming on the island of Java plays a crucial role in meeting the nation's food needs. However, variations in land conditions across provinces in Java result in differing production levels. This disparity affects the supply of corn in the market, and the selling price often does not align with farmers' expectations. Therefore, this article aims to determine the optimal timing for distributing corn, particularly on the island of Java, using the Euclidean algorithm. The Euclidean algorithm is used to calculate the greatest common divisor (gcd), which in turn is applied to determine the least common multiple (lcm). The lcm results can serve as a reference for identifying the best time to sell corn to prevent price declines. Additionally, a comparison of production levels across provinces is presented to help corn farmers understand when and where to distribute their produce to achieve maximum profit.</p>Ade Ripki SetiawanEdi KurniadiAnita TriskaSisilia Sylviani
Copyright (c) 2024 Mathematical Sciences and Applications Journal
2024-12-312024-12-31511610.22437/msa.v5i1.38080Analisis Sistem Antrean pada Customer Service Representative (CSR) Plasa Telkom Cilacap menggunakan Model Multi Channel Single Phase
https://mail.online-journal.unja.ac.id/msa/article/view/37490
<p>Plasa Telkom Cilacap is one of the branch offices of PT. Telekomunikasi Indonesia Tbk. (Telkom) engaged in information and communication technology (ICT) services and telecommunication networks in Indonesia. Plasa Telkom Cilacap plays a crucial role in fulfilling customer service needs. With the increasing number of customers who want to serve immediately, it is worrying that it will cause long queues, causing Customer Service Representative (CSR) services to customer needs to be not optimal. This study analyzed the queuing system at Plasa Telkom Cilacap using a queuing system analysis based on queuing performance and costs to know the optimal number of CSR needed at Plasa Telkom Cilacap. At the moment, Plasa Telkom Cilacap uses the Multi-Channel Single Phase queuing model with 3 CSRs. The data used in this study are the number of arrivals, length of service, and salary data. Based on the result, the optimal number of CSRs is 2 CSRs.</p>Desti SetiawatiBryan Pudji HartonoMizan Ahmad
Copyright (c) 2024 Mathematical Sciences and Applications Journal
2024-12-312024-12-315171310.22437/msa.v5i1.37490Kombinasi Algoritma Sandi Caesar dan Algoritma RSA untuk Pengamanan Pesan Teks
https://mail.online-journal.unja.ac.id/msa/article/view/38104
<p>This article combines a simple cryptographic algorithm, Caesar Cipher, with a more complex algorithm, RSA, in order to increase the security of encrypted text messages. Text messages are first encrypted with the Caesar Cipher algorithm, which is then re-encrypted using the RSA algorithm. By utilizing number theory, specifically about integers and modulo arithmetic in the RSA algorithm, a public key and a secret key are obtained that will increase the security of the encryption process in this article. Due to the increased security of the text message, uninvolved parties cannot read the actual text message.</p>Alifa Raida AlamsyahEdi KurniadiAnita TriskaSisilia Sylviani
Copyright (c) 2024 Mathematical Sciences and Applications Journal
2024-12-312024-12-3151142010.22437/msa.v5i1.38104Efektivitas Aplikasi Wordwall pada Materi Statistika di SMKN 1 Jabon
https://mail.online-journal.unja.ac.id/msa/article/view/37538
<p>Along with the advancement of technology, digital-based learning media are increasingly used in the educational process. One of the learning media that can be utilized is the Wordwall application. This study aims to assess the effectiveness of using the Wordwall application in teaching Statistics at Vocational High School 1 Jabon. The Wordwall application was used as an interactive tool to motivate students and enhance their understanding of the subject matter. This research employed a descriptive quantitative method, involving 11th-grade students of the Creative Batik and Textile Crafts class 1 as the research sample. The instruments used included teacher ability observation sheets, student activity observation sheets, learning outcome tests, and student response questionnaires. The results showed that the teacher's ability to manage learning using Wordwall was categorized as very good, student activities were highly active, and student learning mastery reached 91%. Additionally, students' responses to the use of Wordwall were generally positive, with a percentage of \(>=\)70%. Based on these findings, it can be concluded that the use of the Wordwall application is effective in improving students' understanding and motivation in learning Statistics.</p>Mohammad SolichuddinRisdiana Chandra DhewyDewi Sukriyah
Copyright (c) 2024 Mathematical Sciences and Applications Journal
2024-12-312024-12-3151212610.22437/msa.v5i1.37538Metode Pemecahan Sistem Kongruensi Linear
https://mail.online-journal.unja.ac.id/msa/article/view/38085
<p>A linear congruence system is a system that has more than one linear congruence. The solution of linear congruence systems has an important role in the concept of number theory. Various ways of settlement can be applied in different cases. This study discusses the problem solving of linear congruence systems with the Chinese Remainder Theorem, Intelligent Inspection Algorithm type-I and II and its application.</p>Muhammad Arief BudimanEdi KurniadiSukono SukonoSisilia Sylviani
Copyright (c) 2024 Mathematical Sciences and Applications Journal
2024-12-312024-12-3151273310.22437/msa.v5i1.38085Aplikasi Teorema Fermat dalam Kriptografi
https://mail.online-journal.unja.ac.id/msa/article/view/38094
<p>Cryptography is the science and technique of disguising messages in a unique form so that they can only be read and processed by the intended recipient. Many studies have been conducted to develop algorithms that can be used to encode information in a way that is difficult to crack and cannot be recognized by adversaries. One example of the most popular algorithms is the Rivest-Shamir-Adleman (RSA), which uses different key pairs for the encryption and decryption process of messages, usually known as the public key and private key. In public key-based encryption systems such as RSA, Fermat's theorem plays an important role because it enables modular exponential calculations on key pairs to be performed efficiently and provides a security basis for the RSA algorithm. Thus, this research aims to describe the application of Fermat's theorem in the RSA algorithm, where the encryption and decryption process involves modular exponentiation with public and private keys. As a result, using the properties of modular exponentiation in Fermat's theorem, this system ensures information remains secure from attacks by third parties without access to the private key, even if they succeed in intercepting encrypted messages. It can be concluded that Fermat's theorem plays a crucial role in establishing a solid mathematical foundation for creating secure and efficient cryptographic systems.</p>Hanifah Al AffianiMuhammad Deni JohansyahSisilia Sylviani
Copyright (c) 2024 Mathematical Sciences and Applications Journal
2024-12-312024-12-3151344210.22437/msa.v5i1.38094