Claim Missing Document
Check
Articles

Found 2 Documents
Search

ANALYZING STACK OVERFLOW DISCUSSIONS ON C, JAVA, AND PYTHON: A MIXED-METHOD STUDY ON QUESTION TYPES AND TOPICS Nugroho, Yusuf Sulistyo; Minalloh, Aldin Nasrun; Devi, Keke Rachma; Islam, Syful
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 6 (2024): JUTIF Volume 5, Number 6, Desember 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.6.4191

Abstract

The modern software development characteristic is significantly shaped by the evolution of programming languages. The increasing complexity of these languages demands effective tools and resources for learning and troubleshooting. As a result, forums such as Stack Overflow (SO) have become crucial for addressing technical issues that arise during program execution, especially for novice programmers. Although discussions on SO are common, there hasn't been a clear description of the question types and topics for the three main programming languages, i.e., C, Java, and Python. This gap is problematic as it limits the ability of educators, platform designers, and developers to effectively address the specific needs of users. Without such insights, novice programmers may struggle to find relevant guidance, potentially hindering their learning and slowing the adoption of best practices. To fill this gap, we conducted a qualitative and quantitative study on these three language-related discussions shared on SO. By utilizing a dataset of 4,499,718 questions extracted from SOTorrent, we applied a manual labeling method to classify questions into categories such as “How,” “What,” and “Why.” Furthermore, we implemented Latent Dirichlet Allocation (LDA) for topic modeling to understand the prevalent discussion topics. The results show that “How” questions dominate across all languages, particularly in Python (60.94%), reflecting a high demand for practical implementation guidance. Analysis of discussion topics indicates that C is centered on system programming and low-level operations, while Java discusses more on application development and object-oriented programming. In contrast, Python focuses more on data handling and structures. These insights suggest that while practical support is necessary for learners, a deeper understanding of programming concepts and the need for customized instructional resources to support developers are important. The findings contribute to the community and relevant fields by offering actionable insights to improve the usability of SO as a learning and problem-solving platform.
COMATS: a cuckoo-mimicking data anonymization scheme for preserving sensitive preferences in transaction data Gunawan, Dedi; Sulistyo Nugroho, Yusuf; Yasin Al Irsyadi, Fatah; Priyawati, Diah; Nur Rohmah, Arini; Sukoco, Bambang; Islam, Syful
Bulletin of Electrical Engineering and Informatics Vol 14, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i4.9113

Abstract

Sharing customer transaction data is becoming more perceived in e-commerce and retail industries. Even though the act derives benefits for companies, it may end up in certain privacy threats, such as sensitive personal preferences disclosure. Therefore, the data owner should take measures to minimize the threats. Data anonymization is one of the solutions that has been suggested to address the issue. However, there are still underlying problems, specifically in diminishing the amount of information loss and item loss, as well as maintaining data properties of the anonymized dataset. This paper proposes a unique data anonymization scheme called COMATS. It adopts the brood parasitism behavior of cuckoo birds in laying their eggs into host nests. The scheme incorporates item insertion technique and item suppression technique. The robustness of the proposed scheme lies in its strategy for selecting suppressed items and determining the inserted items. To ensure its efficacy, the proposed method is evaluated in several experiments. The experimental results suggest that the COMATS can guarantee privacy protection by reducing the probability of a successful attack. Additionally, it can also reduce the number of item losses and preserve better data utility in comparison to existing data anonymization schemes.