A. Sofro, Ika Nurwanitantya Wardani, K. N. Khikmah
{"title":"Covid-19 Data Analysis in Tarakan with Poisson Regression and Spatial Poisson Process","authors":"A. Sofro, Ika Nurwanitantya Wardani, K. N. Khikmah","doi":"10.18860/ca.v7i4.19653","DOIUrl":"https://doi.org/10.18860/ca.v7i4.19653","url":null,"abstract":"COVID-19 entered Indonesia in March 2020 and included North Kalimantan Province, Tarakan. COVID-19 cases have outspread in Tarakan. The cause of the outspread and the patterns were not known yet. One relevant approach was to use Generalized Linear Models. The two methods are Poisson Regression and Stochastic with Spatial Poisson Process. The variables used were rainfall, population density, and temperature in each village in Tarakan. The Poisson Regression analysis founds that only one factor affected temperature. Then, the results were refined with the Spatial Poisson Process, where in addition to the influencing factors also, the distribution patterns are obtained. The analysis showed that the pattern of case distribution was included in the non-homogeneous Poisson process criteria. Then the model of the case density intensity was obtained using regression. From the model, it was known that the covariate variables significantly influence rainfall and temperature. Compared with general Poisson regression analysis, the results showed that only the average temperature variables had a significant effect. Thus, a better method was used, namely the Spatial Poisson Process. It was also shown by the two models' AIC values, where the AIC value of the Spatial Poisson Process model was smaller than the Poisson Regression.","PeriodicalId":388519,"journal":{"name":"CAUCHY: Jurnal Matematika Murni dan Aplikasi","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114869743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Dominant Local Resolving Set of Vertex Amalgamation Graphs","authors":"R. Umilasari, L. Susilowati, S. Slamin, S. Prabhu","doi":"10.18860/ca.v7i4.18891","DOIUrl":"https://doi.org/10.18860/ca.v7i4.18891","url":null,"abstract":"Basically, the new topic of the dominant local metric dimension which be symbolized by Ddim_l (H) is a combination of two concepts in graph theory, they were called the local metric dimension and dominating set. There are some terms in this topic that is dominant local resolving set and dominant local basis. An ordered subset W_l is said a dominant local resolving set of G if W_l is dominating set and also local resolving set of G. While dominant local basis is a dominant local resolving set with minimum cardinality. This study uses literature study method by observing the local metric dimension and dominating number before detecting the dominant local metric dimension of the graphs. After obtaining some new results, the purpose of this research is how the dominant local metric dimension of vertex amalgamation product graphs. Some special graphs that be used are star, friendship, complete graph and complete bipartite graph. Based on all observation results, it can be said that the dominant local metric dimension for any vertex amalgamation product graph depends on the dominant local metric dimension of the copied graphs and how the terminal vertex is constructed","PeriodicalId":388519,"journal":{"name":"CAUCHY: Jurnal Matematika Murni dan Aplikasi","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127262386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhamad Sobari, Gede Nyoman, Mindra Jaya, B. N. Ruchjana
{"title":"Spatial Analysis of Dengue Disease in Jakarta Province","authors":"Muhamad Sobari, Gede Nyoman, Mindra Jaya, B. N. Ruchjana","doi":"10.18860/ca.v7i4.17423","DOIUrl":"https://doi.org/10.18860/ca.v7i4.17423","url":null,"abstract":"Dengue disease is a virus-borne illness spread by the bite of the female Aedes aegypti mosquito. Jakarta Province has a vulnerability to dengue disease due to high population density and percentage of urban slum households. This study applied a spatial autoregressive (SAR) model to identify the risk factors that affect the number of dengue disease cases in Jakarta Province. The spatial dependency was accounted for using the queen contiguity spatial weight matrix. The number of flood-prone points, the number of slum neighborhood associations, the population density, the number of hospitals and the number of public health centers per 1,000 population and spatial lag significantly impact the number of dengue disease cases in Jakarta Province. When dengue disease cases increase in one sub-district, the number of dengue disease cases in the sub-districts around it will increase as well because of the positive and significant spatial lag coefficient. Based on the direct impact, each addition of one percent of flood-prone points in one sub-district will increase the number of dengue disease cases in that sub-district by 3.86 cases","PeriodicalId":388519,"journal":{"name":"CAUCHY: Jurnal Matematika Murni dan Aplikasi","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131270486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Dafik, Riniatul Nur Wahidah, E. R. Albirri, S. Husain
{"title":"On the study of Rainbow Antimagic Coloring of Special Graphs","authors":"D. Dafik, Riniatul Nur Wahidah, E. R. Albirri, S. Husain","doi":"10.18860/ca.v7i4.17836","DOIUrl":"https://doi.org/10.18860/ca.v7i4.17836","url":null,"abstract":"Let be a connected graph with vertex set and edge set . The bijective function is said to be a labeling of graph where is the associated weight for edge . If every edge has different weight, the function is called an edge antimagic vertex labeling. A path in the vertex-labeled graph , with every two edges satisfies is said to be a rainbow path. The function is called a rainbow antimagic labeling of , if for every two vertices , there exists a rainbow path. Graph admits the rainbow antimagic coloring, if we assign each edge with the color of the edge weight . The smallest number of colors induced from all edge weights of edge antimagic vertex labeling is called a rainbow antimagic connection number of , denoted by . In this paper, we study rainbow antimagic connection numbers of octopus graph , sandat graph , sun flower graph , volcano graph and semi jahangir graph Jn.","PeriodicalId":388519,"journal":{"name":"CAUCHY: Jurnal Matematika Murni dan Aplikasi","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121100991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparing Several Missing Data Estimation Methods in Linear Regression;Real Data Example and A Simulation Study","authors":"A. Fitrianto, Jap Ee Jia, B. Susetyo, L. Rahman","doi":"10.18860/ca.v7i4.20548","DOIUrl":"https://doi.org/10.18860/ca.v7i4.20548","url":null,"abstract":"Analysis on incomplete could lead to biased estimation when using standard statistical procedure since it ignores the missing observations. The disadvantage of ignoring missing data is that the researcher might not have enough data to conduct an analysis. The main objective of the study is to compare the performance between listwise deletion (LD), mean substitution (MS) and multiple imputation (MI) method in estimating parameters. The performance will be measured through bias, standard error and 95% confidence interval of interested estimates for handling missing data with 10% missing observations. A complete empirical data set was used and assumed as population data. Ten percent of total observations in the population ere set as missing arbitrarily by generating random numbers from a uniform distribution, . Then, bias of parameter estimates and confidence interval of parameter estimates are calculated to compare the three methods. A Monte Carlo simulation was carried out to know the properties of missing data and investigated using simulated random numbers. Simulation of 1000 sampled data with 20, 50, and 100 observations and each sample is set to have 10% missing observations. Standard statistical analyses are run for each missing data and get the average of parameter estimates to calculate the bias and standard error of parameter estimates for every missing data method. The analysis was conducted by using SAS version 9.2. It was found that the MI method provided the smallest bias and standard error of parameter estimates and a narrower confidence interval compared to the LD and MS methods Meanwhile, the LD method gives a smaller bias of parameter estimates and standard error for small sample size of missing data. And, MS method is strongly recommended not to use for handling missing data because it will result in large bias and standard error of parameter estimates.","PeriodicalId":388519,"journal":{"name":"CAUCHY: Jurnal Matematika Murni dan Aplikasi","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125666921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fractional-Order Leslie-Gower Model with Fear and Allee Effect","authors":"Adin Lazuardy Firdiansyah, Dewi Rosikhoh","doi":"10.18860/ca.v7i4.17336","DOIUrl":"https://doi.org/10.18860/ca.v7i4.17336","url":null,"abstract":"In this manuscript, we investigate the dynamics behavior of a fractional-order Leslie-Gower model by considering fear effect in the prey and Allee effect in predators. Firstly, all possible equilibrium points are analyzed by identifying the conditions of their existence and local stability. Here, we find four equilibrium points, where two local stable points and two unstable points. Furthermore, we also investigate the stability changing caused by Hopf bifurcation when the order of derivative changes. Finally, we perform several simulations to support our analysis results. ","PeriodicalId":388519,"journal":{"name":"CAUCHY: Jurnal Matematika Murni dan Aplikasi","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126696298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic Literature Review on Adjustable Robust Shortest Path Problem","authors":"Wida Nurul Fauziyah, D. Chaerani, H. Napitupulu","doi":"10.18860/ca.v7i4.17648","DOIUrl":"https://doi.org/10.18860/ca.v7i4.17648","url":null,"abstract":"In real-world optimization problems, effective path planning is important. The Shortest Path Problem (SPP) model is a classical operations research that can be applied to determine an efficient path from the starting point to the end point in a plan. However, in the real world, uncertainty is often encountered and must be faced. Significant uncertainty factors in the problem of determining the shortest path are problems that are difficult to predict, therefore new criteria and appropriate models are needed to deal with uncertainty along with the required efficient solution. The uncertainty factor can be formulated using an uncertain SPP optimization model, assuming parameters that are not known with certainty but are in an uncertain set. Problems with uncertainty in mathematical optimization can be solved using Robust Optimization (RO). RO is a methodology in dealing with the problem of data uncertainty caused by errors in data measurement. The uncertainty in the linear optimization problem model can be formed by loading the uncertainty that only exists in the constraint function by assuming its uncertainty using the Robust Counterpart (RC) methodology. In this paper, we will review the literature on the two-stage optimization model for the SPP problem using an Adjustable Robust Counterpart (ARC).","PeriodicalId":388519,"journal":{"name":"CAUCHY: Jurnal Matematika Murni dan Aplikasi","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124123776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determination of Term Life Insurance Premiums with Varying Interest Rates Following The CIR Model and Varying Benefits Value","authors":"D. Puspita, I. Purnaba, D. Lesmana","doi":"10.18860/ca.v7i4.20542","DOIUrl":"https://doi.org/10.18860/ca.v7i4.20542","url":null,"abstract":"Term life insurance is an insurance that provides protection for a certain period that has been agreed upon in the policy. The policy is an agreement that contains the participant's obligation to pay premiums contributions to the insurance company and the insurance company's obligation to pay benefits in the event of a risk to the insurance participant as agreed in the policy. Interest rates will influence the calculation of premium value and benefits in the long term. So we need a model of interest rates that will change by time. One of the models that can be used is the CIR model. This research purposes to simulate the CIR model that will be carried out to determine interest rates for calculating term life insurance premiums for five years, with premiums paid at the beginning of the 1/m interval or monthly premium payments and benefits paid at the end of the 1/m interval when the participant dies. The case that will be discussed is when the benefit various. The results of this study are the CIR model can be applied to calculate the term life insurance premiums for five years and the premium calculation results show that the amount of the premium increase every year with varying benefits.","PeriodicalId":388519,"journal":{"name":"CAUCHY: Jurnal Matematika Murni dan Aplikasi","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133507884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. I. Kristiana, D. Dafik, Qurrotul A’yun, R. Adawiyah, R. Alfarisi
{"title":"On Irregular Colorings of Unicyclic Graph Family","authors":"A. I. Kristiana, D. Dafik, Qurrotul A’yun, R. Adawiyah, R. Alfarisi","doi":"10.18860/ca.v7i4.16917","DOIUrl":"https://doi.org/10.18860/ca.v7i4.16917","url":null,"abstract":"Irregular coloring is a proper coloring and each vertex on a graph must have a different code. The color code of a vertex v is where and is the number of vertices that are adjacent to v and colored i. The minimum k-color used in irregular coloring is called the irregular chromatic number and denoted by . In this paper, we discuss the irregular chromatic number for the bull graph, pan graph, sun graph, peach graph, and caveman graph. ","PeriodicalId":388519,"journal":{"name":"CAUCHY: Jurnal Matematika Murni dan Aplikasi","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130412698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages","authors":"Juhari Juhari, Mohamad Febry Andrean","doi":"10.18860/ca.v7i3.17358","DOIUrl":"https://doi.org/10.18860/ca.v7i3.17358","url":null,"abstract":"Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field used, one of which is the infinite field prima ( where ). Elliptic curve cryptography can be used for multiple protocol purposes, digital signatures, and encryption schemes.The purpose of this study is to determine the process of hiding encrypted messages using the Noiseless Steganography method as well as the generation of private keys and public keys and the process of verifying the validity of the Elliptic Curves Cryptography Digital Signature Algorithm (ECDSA). The result of this thesis is that a line graph is obtained that store or hides a message using the steganography method and a message authenticity from the process of key generation and verification of validity using the ECDSA method. By selecting three samples consisting of one test sample and two differentiating samples, a line graph, an MD5 hash value, and a value at the point are obtained different. Successively obtained values to message “Matematika 2018”, “MATEMATIKA 2018”, and “2018 matematika” are and . The discussion in this thesis only covers the elliptic curves on prime finite field. So, for the next thesis, the next researcher can do a discussion about the elliptic curve on the finite field or the application of elliptic curve cryptography and other steganographic methods","PeriodicalId":388519,"journal":{"name":"CAUCHY: Jurnal Matematika Murni dan Aplikasi","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117189583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}