Claim Missing Document
Check
Articles

Found 5 Documents
Search

Extended systematic clustering: Microdata protection by distributing semsitive values Widodo Widodo; Wahyu Catur Wibowo; Eko K. Budiardjo; Harry T. Y. Achsan
Bulletin of Electrical Engineering and Informatics Vol 9, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (591.025 KB) | DOI: 10.11591/eei.v9i4.1963

Abstract

Anonymity data for multiple sensitive attributes in microdata publishing is a growing field at present. This field has several models for anonymizing such as k-anonymity and l-diversity. Generalization and suppression became a common technique in anonymize data. But, the real problem in multiple sensitive attributes is sensitive value distribution. If sensitive values do not distribute evenly to each quasi identifier group, it is potentially revealed to sensitive value holder. This research investigated on how the high-sensitive values are distributed evenly into each group. We proposed a novel method/algorithm for distributing high-sensitive values when it forms groups. This method distributes high-sensitive values evenly and varies high-sensitive values in a group. We called our method as extended systematic clustering since it is an extension of systematic clustering method. Diversity metrics was used for evaluating our method. Experiment result showed our method outperformed systematic clustering with average diversity value 0.9719 while systematic clustering 0.3316. 
Pengembangan Sistem Pencarian Karya Akhir Berdasarkan Abstrak Menggunakan Full-Text Searching Di Sistem Informasi Perpustakaan Jurusan Teknik Elektro Universitas Negeri Jakarta Erna Selviyanti; Hamidillah Ajie; Widodo
JTIM : Jurnal Teknologi Informasi dan Multimedia Vol 1 No 2 (2019): August
Publisher : Puslitbang Sekawan Institute Nusa Tenggara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v1i2.8

Abstract

The research was conducted to develop a search system undergraduated thesis based on abstract using full-text searching in Library Information Systems Department of Electrical Engineering State University of Jakarta. The feature fulltext search system is developed to facilitate students in finding undergraduate thesis based on abstract. By using the select clause MATCH () ... Against, the data can be searched ordered by relevancy value. The research was conducted in the laboratory of multimedia Department of Electrical Engineering Faculty of Engineering, State University of Jakarta from September 2012 to December 2012. Development cycle of full-text search system conceptually consists of the design and analysis of systems, retrieval system development, integration of full-text search system to test SIPEL SIPEL 2013 and 2013. Full-text search system stores abstract 229 thesis abstract (undergraduate thesis, comprehensive, and TA) using XAMPP web server applications. Library Information Systems Department of Electrical Engineering State University of Jakarta (SIPEL 2013) has successfully integrated the SIPEL 2012 by adding databases and full-text search feature. The research use scripting language PHP and the MySQL database and worked on the Linux operating system by using a text editor Bluefish Editor and XAMPP as localhost server.
Design Analysis Achievement Target Database Information System at SEAMEO RECFON Dodi Suswandi; Ivan Hanfi; Widodo Widodo
Journal of Social Research Vol. 2 No. 11 (2023): Journal of Social Research
Publisher : International Journal Labs

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55324/josr.v2i11.1483

Abstract

SEAMEO Regional Center for Food and Nutrition (RECFON), is an organization of Southeast Asian Ministers of Education in the field of food and nutrition. The activities carried out by SEAMEO RECFON already have a fairly good system, but there are several problems SEAMEO RECFON actively conducts education, research, training, and community empowerment activities so the need for up-to-date information on food and nutrition topics and services and facilities support all these activities is very important. This important task must be supported by adequate facilities, including the procurement of data processing and communication devices capable of supporting RECFON's activities. For this reason, the author takes the title "Analysis and Design of the Target Achievement Database Information System System at SEAMEO RECFON " This SI / IT strategic planning is made using the Ward and Peppard framework with several analysis methods, namely value chain analysis, by mapping what are the main and supporter activities at SEAMEO RECFON and analyzing the problems of each activity. To see the strengths, weaknesses, opportunities, and threats, a SWOT (Strength, Weakness, Opportunity, Thread) analysis is used. Factors that are successful and can solve problems and needs are used in CSFs (Critical Success Factors) analysis. McFarlan Strategic Grid analysis is used to map existing applications in DPPKA Kampar based on categories, namely support, Key Operational, Strategic, and High Potential. The results achieved through this analysis method are recommendations in the form of 19 information systems, 10 information technologies, and 4 SI and IT management. The information system and information technology are made in the form of a roadmap that will be implemented over the next 3 years by SEAMEO RECFON
K-anonymity Menggunakan Simple Distribution of Sensitive Values dan Aggregation of Sensitive Values Widodo Widodo; Muhammad Ficky Duskarnaen; Murien Nugraheni
Jurnal Teknik Informatika dan Sistem Informasi Vol 10 No 2 (2024): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v10i2.8798

Abstract

Anonymizing microdata is a matter while the microdata is published or shared. The purpose of anonymization is sothat sensitive data will not be known by unauthorized parties either directly or indirectly. The technique that is widely used isgeneralization and suppression in the k-anonymity model, however, this technique has the disadvantage that the level of information loss is quite high. In addition, the generated microdata representation due to anonymization is too large, thus it needs to be simplified. In this research, an anonymity model is built using a sensitive attribute distribution technique, namely Simple Distribution of Sensitive Values (SDSV). The main purpose of this method is to reduce the probability of unauthorized parties guessing the owner of sensitive data. Meanwhile, to simplify the representation of the microdata, the aggregative of sensitive value (ASENVA) technique is applied. The result shows that the SDSV metho has less information loss compared to others, while the use of ASENVA simplifies the representation of anonymized tables to an average of 13.67% for aggregated quasi-identifier tables and 6.35% for sensitive tables.
PEMETAAN RISET TENTANG DETEKSI TOPIK PADA TWITTER DENGAN TEKNIK SYSTEMATIC LITERATURE REVIEW Sri Suhartini; Widodo; Bambang Prasetya Adhi
PINTER : Jurnal Pendidikan Teknik Informatika dan Komputer Vol. 5 No. 1 (2021): Jurnal PINTER
Publisher : PTIK Fakultas Teknik UNJ

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21009/pinter.5.1.5

Abstract

Twitter merupakan salah satu media sosial yang banyak digemari orang, mulai dari anak remaja hingga dewasa. Di twitter banyak informasi yang akan didapatkan oleh para pengguna. Masing-masing informasi memiliki kata kunci untuk dikelompokkan topik bahasannya. Kata kunci yang dimaksud adalah kata yang memiliki posisi yang istimewa dalam sebuah kalimat. Dari kata kunci ini maka topik akan lebih mudah untuk di deteksi. Terdapat berbagai macam metode untuk mendeteksi topik pada twitter. Penelitian ini bertujuan untuk membuat peta riset deteksi topik pada twitter dengan teknik systematic literature review. Literatur yang digunakan berasal dari beberapa digital library yaitu IEEE eXplore, Sciencedirect, Google Scholar dan Citeseerx . Selanjutnya proses penyaringan literatur berdasarkan relevansi judul didapat 50 judul literatur. Setelah itu menganalisis isi dari masing-masing literatur. Hasil analisis menunjukkan terdapat 39 jenis metode deteksi topik. Metode terbanyak yang digunakan ialah Latent Dirichlet Allocation (LDA). Dan metode dengan tingkat akurasi tertinggi yang digunakan ialah Random Forest (RF) dan Naives Bayes dengan tingkat akurasi 95,5%.