- Privacy, Security, and Data Protection
- Advanced Text Analysis Techniques
- Edcuational Technology Systems
- Topic Modeling
- Data Mining Algorithms and Applications
- Data Mining and Machine Learning Applications
- Digital and Cyber Forensics
- Advanced Malware Detection Techniques
- Natural Language Processing Techniques
- Software Engineering Research
- Data Quality and Management
- Medical Coding and Health Information
- Educational Technology and Assessment
- Information and Cyber Security
- Sentiment Analysis and Opinion Mining
- Business Process Modeling and Analysis
- Recommender Systems and Techniques
- Hate Speech and Cyberbullying Detection
- Biomedical Text Mining and Ontologies
- User Authentication and Security Systems
- Linguistics and Language Analysis
- Imbalanced Data Classification Techniques
- Islamic Finance and Communication
- Digital Mental Health Interventions
- Educational Assessment and Pedagogy
Universitas Gadjah Mada
2017-2024
University of Vienna
2021-2024
Privacy requirements engineering acts as a role to systematically elicit privacy from system and legal such the GDPR. Many methodologies have been proposed, but majority of them are focused on waterfall approach, making adopting in agile software development difficult. The other major issue is that process currently high degree manual. This paper focuses closing these gaps through machine learning-based approach for identifying an environment, employing natural language processing (NLP)...
Hate speeches are defined as utterances, writings, actions, or performances that intended to incite violence prejudice against a person on the basis of characteristics particular group he she is representing, such race, ethnicity. In this study, we built hate speech classification model using word representation with continous bag words (CBOW) and fastText algorithm. This algorithms was chosen, because it able achieve good performance, specially in case rare by making use character level...
The presence of experts, such as a data protection officer (DPO) and privacy engineer is essential in Privacy Requirements Engineering. This task carried out various forms including threat modeling impact assessment. knowledge required for performing can be serious challenge novice engineer. We aim to bridge this gap by developing an automated approach via machine learning that able detect privacy-related entities the user stories. relevant include (1) Data Subject, (2) Processing, (3)...
Online forums are platforms for gathering, sharing information, and discussing between users on a particular topic. Users in online can ask questions about topic, then other who experts that question would answer the question. However, because various ways, sometimes they have previously asked. Therefore, model is needed to detect semantic similarity of forums. In this study, we using Convolutional Neural Networks (CNN) questions. To capture questions, Glove pre-trained word embeddings. This...
The negation handling has not been the main focus in Bahasa Indonesia sentiment analysis so that sentence's polarity word cannot be determined automatically. This study aimed to analyze effect of using First Sentiment Word (FSW), Rest Sentence (ROS) and Fixed Window Length (FWL) with n = 1-5. FSW will change first after word, RoS entire FWL words exist scope its window size. Results from this indicate sentence optimally, compared absence handling. have an average accuracy increase by 2.43%,...
This paper presents UKARA, a fast and simple automatic short-answer scoring system for Bahasa Indonesia. Automatic holds an important role in speeding up assessment process. Although this area has been widely explored, only very limited number of previous work have studied One the major challenges field is different type questions which require assessments. We are addressing problem by implementing combination Natural Language Processing (NLP) supervised machine learning techniques. Our...
Privacy by design requires that developers address privacy concerns from the early stage of software development life cycle. It encourages them to take a proactive approach engineering identifying personal data, creating conceptual data flow diagrams, and threats. We argue providing tool automates some steps can reduce burden on teams. develop called PrivacyStory, including an end-to-end requirement generation set user stories. The provides automation, utilizing current state-of-the art...
While the software engineering community at large has embraced empirical studies of source code, architecture are lacking. In order to increase possibility and relevance into architecture, an infrastructure for sharing data on is essential. This paper contributes by discussing needs challenges in architecture. Based lessons learned we propose CoSARI - a community-wide research
The rapid development of the internet has led to creation many online news. Competition between publishers usually will lead making interesting and often misleading titles that are not conveyed content news itself. To overcome this problem, we have developed a text summarization extracts keyword from content, then used produce summary. This research combines Maximal Marginal Relevance (MMR) Nonnegative Matrix Factorization (NMF) build automatic extractive summarized. MMR summarize...
Twitter is a social media that allows users to send various information including about traffic conditions. This can be utilized map the condition in city at certain given time. Research regarding extraction Bahasa Indonesia has been done previously by using rule-based method. method weakness required more effort make rules and Out of Vocabulary (OOV) Rules (OOR) problem. In this research, we propose an methods from tweet. implemented tweet classification, Named Entity Recognition (NER),...
Privacy requirements engineering is a crucial aspect of privacy engineering. It aims to integrate principles into organizational and technical processes throughout the software development lifecycle. This specialized field involves various strategies, including compliance with regulatory frameworks, asset analysis, system diagram for threat modeling. The wide range approaches, while beneficial in providing different perspectives, presents significant challenge novice engineer or developer...
The World Wide Web is now the primary source for information discovery. A user visits websites that provide and browse on particular in accordance with their topic interest. Through navigational process, visitors often had to jump over menu find right content. Recommendation system can help content immediately. In this study, we propose a two-level recommendation system, based association rule similarity. We generate by applying Apriori algorithm. dataset mining session of topics made...
This paper proposed processing framework in essay answer for Automatic Scoring System based on computational. Framework is built with the initial process by normalizing through stop words removal, building case homogeneous, stemming, common spelling mistakes correction, and acronym abbreviation analysis. The next step to examine similarity carrying out classification that has been using reference answers as references will be examined question. Similarities are matched features generated...
Hate speech develops along with the rapid development of social media. is often issued due to a lack public awareness difference between criticism and statements that might contribute this crime. Therefore, it very important do early detection sentences will be written before causing criminal act ignorance. In paper, we use advancement deep neural networks predict whether sentence contains hate abusive tone. We demonstrate robustness different word contextual embedding represent semantic...
Saat ini konten informasi dalam bentuk berita dihasilkan dengan jumlah besar dari berbagai sumber setiap harinya. Banyaknya yang menuntut organisasi baik agar pencarian diinginkan dapat dilakukan mudah. Organisasi dan manajemen efisien terhadap elektronik menginspirasi penelitian mengenai document clustering. Pada dirancang sebuah metode clustering melakukan kombinasi pemodelan topik latent dirichlet allocation (LDA) ward hierarchical LDA digunakan sebagai representasi vektor dokumen berupa...
Along with the development of technology in field bioinformatics, cost DNA sequencing from year to is getting cheaper. This causes growth genetic database rise beyond Moore's Law. The rapid databases one main obstacles conducting sequence alignment. Multiple alignment (MSA) important method analyzing or protein. One popular MSA methods among practitioners Clustal. In sequential programming process large data, it certainly takes a long time. addition, has limited memory, so can cause stack...
Latar Belakang: Di salah satu RSUD X DIY masih terdapat potensi duplikasi nomor rekam medis dan diharapkan untuk segera dilakukan identifikasi menangani masalah tersebut. Diperlukan sebuah mekanisme standar yang digunakan melakukan kesamaan data pasien di rumah sakit bertujuan menghilangkan medis. Mekanisme tersebut dituangkan dalam framework mendeteksi diberi nama ”RESIK”.Tujuan: Menerapakan ”RESIK” mengidentifikasi terjadinya medis.Metode: Metode menggunakan pairwise comparison. Kriteria...
<ns3:p><ns3:bold>Background:</ns3:bold> Drug resistance and multi drugs tuberculosis (DR/MDR-TB) are associated with patients' low adherence to undergoing complex treatment. Driven by the increasing use penetration of a smartphone End TB Strategy that seeks for digital health solution, Center Tropical Medicine Universitas Gadjah Mada has developed TOMO, an Android-based app improving medication in MDR-TB.</ns3:p><ns3:p> <ns3:bold>Objective:</ns3:bold> This paper aims present sequential steps...
Malaria is an infectious disease in tropical countries including Indonesia which causes serious clinical manifestations and even death. Ministry of Health targets that malaria eliminated from this country by 2030. In Java, targeted to be 2015. However, elimination has not been achieved because some areas, Kulon Progo, Daerah Istimewa Yogyakarta still experience outbreaks (Kejadian Luar Biasa) recent years. As microscopic diagnosis a gold standard for malaria, thus accurate examination...