{"title":"OPTIMIZATION ALGORITHMS FOR PROJECTILE MOTION: MAXIMIZING RANGE AND DETERMINING OPTIMAL LAUNCH ANGLE","authors":"A. Alridha","doi":"10.14710/jfma.v6i2.20750","DOIUrl":"https://doi.org/10.14710/jfma.v6i2.20750","url":null,"abstract":"In this paper, we undertake an in-depth exploration of the optimization of parameters governing the trajectory of a projectile. Our primary objective is the determination of the optimal launch angle and initial velocity that yield the maximum achievable range for the projectile. To accomplish this, we leverage five distinct optimization methodologies, specifically the Nelder-Mead, Powell, L-BFGS-B, TNC, and SLSQP algorithms, in pursuit of our research goals. This paper offers a comprehensive analysis of the optimization procedures, shedding light on the impact of these diverse algorithms on the resultant outcomes. For each set of optimized parameters, the manuscript conducts extensive simulations of the projectile’s trajectory, presenting visual depictions of the paths traversed by the projectile. Additionally, our study incorporates comparative charts to emphasize the performance distinctions among various algorithms with respect to both maximum range and launch angle.","PeriodicalId":359074,"journal":{"name":"Journal of Fundamental Mathematics and Applications (JFMA)","volume":"120 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139232112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Manaqib, Ayu Kinasih Yuliawati, Dhea Urfina Zulkifli
{"title":"MATHEMATICAL MODEL OF MEASLES DISEASE SPREAD WITH TWO-DOSE VACCINATION AND TREATMENT","authors":"Muhammad Manaqib, Ayu Kinasih Yuliawati, Dhea Urfina Zulkifli","doi":"10.14710/jfma.v6i2.20091","DOIUrl":"https://doi.org/10.14710/jfma.v6i2.20091","url":null,"abstract":"This study developed a model for the spread of measles based on the SEIR model by adding the factors of using the first dose of vaccination, the second dose of vaccination, and treatment. Making this model begins with making a compartment diagram of the spread of the disease, which consists of seven subpopulations, namely susceptible subpopulations, subpopulations that have received the first dose of vaccination, subpopulations that have received the second dose vaccination, exposed subpopulations, infected subpopulations, subpopulations that have received treatment, and subpopulations healed. After the model is formed, the disease-free equilibrium point, endemic equilibrium point, and basic reproduction number (R_0) are obtained. Analysis of the stability of the disease-for equilibrium point was locally asymptotically stable when (R_0)<1. The backward bifurcation analysis occurs when (R_C) is present and R_C<R_0. Numerical simulations of disease-free and endemic equilibrium points are carried out to provide an overview of the results analyzed with parameter values from several sources. The results of the numerical simulation are in line with the analysis carried out. From the model analysis, the disease will disappear more quickly when the level of vaccine used and individuals who carry out treatment are enlarged.","PeriodicalId":359074,"journal":{"name":"Journal of Fundamental Mathematics and Applications (JFMA)","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139229727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FROZEN INITIAL LIABILITY METHOD TO DETERMINE NORMAL COST OF PENSION FUND WITH VASICEK INTEREST RATE MODEL","authors":"Sulma Sulma, Nur Ahniyanti Rasyid, I. N. Widana","doi":"10.14710/jfma.v6i2.20150","DOIUrl":"https://doi.org/10.14710/jfma.v6i2.20150","url":null,"abstract":"Civil servants have an important role in national development, so increasing their productivity is needed. The pension fund program is given as a form of effort by government agencies to ensure employee welfare when entering retirement. This research discusses the normal cost of the defined benefit pension program using one of the actuarial valuation methods, namely Frozen Initial Liability (FIL), by taking into account the stochastic interest rate following the Vasicek model. The data used in this study are lecturers majoring in MIPA, Faculty of Science and Technology, Universitas Jambi, consisting of 8 people of female gender with the status of being a participant since 2022. Based on the calculation results obtained that in the period 0-30 years, the normal cost for each group member is constant, namely per year or per month. When the working period entered 31 years, one by one the participants began to enter their retirement period, which resulted in a change in the normal cost value. At 38 years of service, there was only one participant with a normal cost of per year or by per month. Changes in normal cost tend to decrease when retirement program participants also decrease. In the period of more than 38 years, all participants have retired so that normal cost payments are stopped.","PeriodicalId":359074,"journal":{"name":"Journal of Fundamental Mathematics and Applications (JFMA)","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139229771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EXPLORING PHYSICS-INFORMED NEURAL NETWORKS FOR SOLVING BOUNDARY LAYER PROBLEMS","authors":"Muchamad Harry Yudha Pratama, Agus Yodi Gunawan","doi":"10.14710/jfma.v6i2.20084","DOIUrl":"https://doi.org/10.14710/jfma.v6i2.20084","url":null,"abstract":"In this paper, we explore a cutting-edge technique called as Physics- Informed Neural Networks (PINN) to tackle boundary layer problems. We here examine four different cases of boundary layers of second-order ODE: a linear ODEwith constant coefficients, a nonlinear ODE with homogeneous boundary conditions, an ODE with non-constant coefficients, and an ODE featuring multiple boundary layers. We adapt the line of PINN technique for handling those problems, and our results show that the accuracy of the resulted solutions depends on how we choose the most reliable and robust activation functions when designing the architecture of the PINN. Beside that, through our explorations, we aim to improve our understanding on how the PINN technique works better for boundary layer problems. Especially, the use of the SiLU (Sigmoid-Weighted Linear Unit) activation function in PINN has proven to be particularly remarkable in handling our boundary layer problems.","PeriodicalId":359074,"journal":{"name":"Journal of Fundamental Mathematics and Applications (JFMA)","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139233456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuli Sri Afrianti, Fadhil Hanif Sulaiman, Sandy Vantika
{"title":"FLOWER POLLINATION ALGORITHM (FPA): COMPARING SWITCH PROBABILITY BETWEEN CONSTANT 0.8 AND DOUBLE EXPONENTGUNAKAN DOUBLE EXPONENT","authors":"Yuli Sri Afrianti, Fadhil Hanif Sulaiman, Sandy Vantika","doi":"10.14710/jfma.v6i2.18996","DOIUrl":"https://doi.org/10.14710/jfma.v6i2.18996","url":null,"abstract":". Flower Pollination Algorithm (FPA) is an optimization method that adopts the way flower pollination works by selecting switch probabilities to determine the global or local optimization process. The choice of switch probability value will influence the number of iterations required to reach the optimum value. In several previous literatures, the switch probability value was always chosen as 0.8 because naturally the global probability is greater than local. In this article, comparison is studied to determine the switch probability by using the Double Exponent rule. The results are analyzed using Hypothesis Testing to test whether there is a significant difference between the optimization results. The study involved ten testing functions, and results showed that the 0.8 treatment is significantly different from the Double Exponent. However, in general no treatment is better than the other.","PeriodicalId":359074,"journal":{"name":"Journal of Fundamental Mathematics and Applications (JFMA)","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139231390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TOPOLOGY OF QUASI-PSEUDOMETRIC SPACES AND CONTINUOUS LINEAR OPERATOR ON ASYMMETRIC NORMED SPACES","authors":"Klatenia Selawati, Christiana Rini Indrati","doi":"10.14710/jfma.v6i2.18504","DOIUrl":"https://doi.org/10.14710/jfma.v6i2.18504","url":null,"abstract":". In this paper, we will discuss about topological properties of quasi-pseudometric spaces and properties of linear operators in asymmetric normed spaces. The topological properties of quasi-pseudometric spaces will be given consisting of open and closed set properties in quasi-pseudometric spaces. The discussion about properties of linear operator on asymmetric normed spaces is focus on the uniform boundedness principle. The uniform boundedness theorem is proved by utilizing completeness properties and characteristic of closed sets on quasi-pseudometric spaces.","PeriodicalId":359074,"journal":{"name":"Journal of Fundamental Mathematics and Applications (JFMA)","volume":"357 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139230683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IDEMPOTENT ELEMENTS IN MATRIX RING OF ORDER 2 OVER POLYNOMIAL RING $mathbb{Z}_{p^2q}[x]$","authors":"Muchammad Choerul Arifin, Iwan Ernanto","doi":"10.14710/jfma.v6i2.19307","DOIUrl":"https://doi.org/10.14710/jfma.v6i2.19307","url":null,"abstract":"An idempotent element in the algebraic structure of a ring is an element that, when multiplied by itself, yields an outcome that remains unchanged and identical to the original element. Any ring with a unity element generally has two idempotent elements, 0 and 1, these particular idempotent elements are commonly referred to as the trivial idempotent elements However, in the case of rings $mathbb{Z}_n$ and $mathbb{Z}_n[x]$ it is possible to have non-trivial idempotent elements. In this paper, we will investigate the idempotent elements in the polynomial ring $mathbb{Z}_{p^2q}[x]$ with $p,q$ different primes. Furthermore, the form and characteristics of non-trivial idempotent elements in $M_2(mathbb{Z}_{p^2q}[x])$ will be investigated. The results showed that there are 4 idempotent elements in $mathbb{Z}_{p^2q}[x]$ and 7 idempotent elements in $M_2(mathbb{Z}_{p^2q}[x])$.","PeriodicalId":359074,"journal":{"name":"Journal of Fundamental Mathematics and Applications (JFMA)","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139234797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joshua Erlangga Sakti, Muhammad Arzaki, G. S. Wulandari
{"title":"A BACKTRACKING APPROACH FOR SOLVING PATH PUZZLES","authors":"Joshua Erlangga Sakti, Muhammad Arzaki, G. S. Wulandari","doi":"10.14710/jfma.v6i2.18155","DOIUrl":"https://doi.org/10.14710/jfma.v6i2.18155","url":null,"abstract":"We study algorithmic aspects of the Path puzzle--a logic puzzle created in 2013 and confirmed NP-complete (Non-deterministic Polynomial-time-complete) in 2020. We propose a polynomial time algorithm for verifying an arbitrary Path puzzle solution and a backtracking-based method for finding a solution to an arbitrary Path puzzle instance.To our knowledge, our study is the first rigorous investigation of an imperative algorithmic approach for solving Path puzzles. We prove that the asymptotic running time of our proposed method in solving an arbitrary Path puzzle instance of size $m times n$ is $O(3^{mn})$. Despite this exponential upper bound, experimental results imply that a C++ implementation of our algorithm can quickly solve $6 times 6$ Path puzzle instances in less than 30 milliseconds with an average of 3.02 milliseconds for 26 test cases. We finally prove that an $m times n$ Path puzzle instance without row and column constraints is polynomially solvable in $O(max{m,n})$ time.","PeriodicalId":359074,"journal":{"name":"Journal of Fundamental Mathematics and Applications (JFMA)","volume":"102 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139229563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CLUSTERING LARGE APPLICATION USING METAHEURISTICS (CLAM) FOR GROUPING DISTRICTS BASED ON PRIMARY SCHOOL DATA ON THE ISLAND OF SUMATRA","authors":"Naura Ghina As-shofa, Vemmie Nastiti Lestari","doi":"10.14710/jfma.v6i1.16468","DOIUrl":"https://doi.org/10.14710/jfma.v6i1.16468","url":null,"abstract":". K-medoids is one of the partitioning methods with the medoid as its center cluster, where medoid is the most centrally located object in a cluster, which is robust to outliers. The k-medoids algorithm used in this study is Clustering Large Application Using Metaheuristics (CLAM), where CLAM is a development of the Clustering Large Application based on Randomized Search (CLARANS) algorithm in improving the quality of cluster analysis by using hybrid metaheuristics between Tabu Search (TS) and Variable Neighborhood Search (VNS). In the case study, the best cluster analysis method for classifying sub-districts on the island of Sumatra based on elementary school availability and elementary school process standards is the CLAM method with k=6, num local = 2, max neighbor = 154, tls = 50 and set radius = 100-10:5. It can be seen that based on the overall average silhouette width value, the CLAM method is better than the CLARANS method.","PeriodicalId":359074,"journal":{"name":"Journal of Fundamental Mathematics and Applications (JFMA)","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139364333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A PYTHON CODE FOR GENERATING ALL PROPER SUBGROUPS OF DIHEDRAL GROUP","authors":"A. G. Syarifudin, Verrel Rievaldo Wijaya","doi":"10.14710/jfma.v6i1.15939","DOIUrl":"https://doi.org/10.14710/jfma.v6i1.15939","url":null,"abstract":"The dihedral group of order 2n denoted by D_2n is the symmetry group of a regular -polygon consisting of rotation and reflection elements and the composition of both elements. Like any other group, the dihedral group also have a subgroup whose numbers differs depending on the value of n. This research is conducted by studying past literature and explore a new development to a theory. In this paper, all the form of proper subgroups of D_2n will be given and all of these proper subgroups of D_2n will be generated and counted with the help of Python program.","PeriodicalId":359074,"journal":{"name":"Journal of Fundamental Mathematics and Applications (JFMA)","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139364335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}