Teguh Bharata Adji

Teguh Bharata Adji
Universitas Gadjah Mada | UGM · Department of Information Technology and Electrical Engineering

About

141
Publications
19,458
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
605
Citations
Additional affiliations
September 1995 - present
Universitas Gadjah Mada
Position
  • Lecturer

Publications

Publications (141)
Conference Paper
Full-text available
Empathy is the process of understanding andreacting to other people emotional expressions that involvecognitive and affective aspects. Empathy in education is veryimportant, because service experiences in student academicservices that are emotional and generate student affectiveresponses have an influence on student motivation andacademic achieveme...
Article
Full-text available
Developing a forecasting model for oilfield well production plays a significant role in managing mature oilfields as it can help to identify production loss earlier. It is very common that mature fields need more frequent production measurements to detect declining production. This study proposes a machine learning system based on a hybrid empirica...
Article
Full-text available
The discretization of continuous attributes in a dataset is an essential step before the Rough-Set-Theory (RST)-based classification process is applied. There are many methods for discretization, but not many of them have linked the RST instruments from the beginning of the discretization process. The objective of this research is to propose a meth...
Article
One of the well-known recommendation systems is memory-based collaborative filtering that utilizes similarity metrics. Recently, the similarity metrics have taken into account the user rating and user behavior scores. The user behavior score indicates the user preference in each product type (genre). The added user behavior score to the similarity...
Article
Full-text available
Recommender rystem (RS) is created to solve the problem by recommending some items among a huge selection of items that will be useful for the e-commerce users. RS prevents the users from being flooded by information that is irrelevant for them.Unlike information retrieval (IR) systems, the RS system's goal is to present information to the users th...
Article
Full-text available
Cloud di masa kini tidak hanya berfungsi sebagai media penyimpanan data, tetapi dapat digunakan juga sebagai media untuk mengelola ataupun menganalisis suatu data. Google menawarkan Google BigQuery sebagai platform yang mampu mengelola dan menganalisis data, sedangkan Elasticsearch merupakan mesin pencari dan analisis yang dapat digunakan untuk men...
Article
Full-text available
The recommendation system is a method for helping consumers to find products that fit their preferences. However, recommendations that are merely based on user preference are no longer satisfactory. Consumers expect recommendations that are novel, unexpected, and relevant. It requires the development of a serendipity recommendation system that matc...
Article
Full-text available
Collaborative filtering is one of the most widely used recommendation system approaches. One issue in collaborative filtering is how to use a similarity algorithm to increase the accuracy of the recommendation system. Most recently, a similarity algorithm that combines the user rating value and the user behavior value has been proposed. The user be...
Article
Full-text available
Twitter is one of the micro-blogging social media which emphasizes the speed of communication. In the 4.0 era, the government also promotes the distribution of information through social media to reach the community from various lines. In previous research, Social Network Analysis was used to see the relationship between actors in a work environmen...
Article
Full-text available
A cashier and spare parts warehouse application is an information system facilitating financial reporting and items inventory systems. This has become a necessity in almost all fields of large and small-scale businesses in every country. The information system that belongs to Surya Motor Shop does not have a display that can facilitate users in ope...
Article
Full-text available
Electroencephalogram (EEG) based motor imagery (MI) classification requires efficient feature extraction and consistent accuracy for reliable brain-computer interface (BCI) systems. Achieving consistent accuracy in EEG-MI classification is still big challenge according to the nature of EEG signal which is subject dependent. To address this problem,...
Article
Full-text available
The multi-class motor imagery based on Electroencephalogram (EEG) signals in Brain-Computer Interface (BCI) systems still face challenges, such as inconsistent accuracy and low classification performance due to inter-subject dependent. Therefore, this study aims to improve multi-class EEG-motor imagery using two-stage detection and voting scheme on...
Preprint
Full-text available
A recommendation system is a software used in the e-commerce field that provides recommendations for customers to choose the items they like. Several recommendation systems have been proposed; however, collaborative filtering is the most widely used approach. The main issue in collaborative filtering is how to implement a similarity algorithm that...
Preprint
Accurate diagnosis is required before performing proper treatments for coronary heart disease. Machine learning based approaches have been proposed by many researchers to improve the accuracy of coronary heart disease diagnosis. Ensemble learning and cascade generalization are among the methods which can be used to improve the generalization abilit...
Article
Full-text available
Weaknesses in the paper assessment process have been able to overcome using the Computer Assisted Assessment (CAA) objective question. The weakness that can be overcome is the reduction in time for correction and the process of handling thousands of participants simultaneously. However, the process of preparing objective questions is still constrai...
Article
Full-text available
Children are the future of the nation. All treatment and learning they get would affect their future. Nowadays, there are various kinds of social problems related to children. To ensure the right solution to their problem, social workers usually refer to the social-child-case (SCC) documents to find similar cases in the past and adapting the soluti...
Article
Full-text available
One of the challenges in the oil industry is to predict well production in the absence of frequent flow measurement. Many researches have been done to develop production forecasting in the petroleum area. One of the machine learning approach utilizing higher-order neural network (HONN) have been introduced in the previous study. In this study, rese...
Conference Paper
Full-text available
Abstrak Fuzzy vault adalah sebuah skema bio-enkripsi yang dapat digunakan sebagai pendukung keamanan kriptografi konvensional. Konsep utama dari fuzzy vault adalah menambahkan unsur otentifikasi biometrik pada kriptografi. Fuzzy vault menggunakan fitur-fitur biometrik untuk melakukan enkripsi ataupun dekripsi terhadap kunci rahasia, yang sebelumnya...
Article
Full-text available
The lack of training dataset availability is the most popular issue in the software defect prediction, especially when dealing with new project development. Adopting training dataset from other software projects probably will not be the best solution because of the software metrics heterogeneity issues across projects. Unsupervised approaches have...
Article
Full-text available
One indicator that a robust S-box is an ideal strict avalanche criterion value of 0.5. One method for applying the ideal strict avalanche criterion value is the selection of the precise irreducible polynomial and affine matrix. In this paper, we will discuss the robust S-boxes construction with the selected irreducible polynomial r ( x ) = x ⁸ + x...
Article
Full-text available
Area of interest The trend of current software inevitably leads to the big data era. There are much of large software developed from hundreds to thousands of modules. In software development projects, finding the defect proneness manually on each module in large software dataset is probably inefficient in resources. In this task, the use of a softw...
Article
Full-text available
Adaptive metacognitive scaffolding is developed to provide learning assistance on an as‐needed basis; thus, advances the effectiveness of computer‐based learning systems. Metacognitive scaffoldings have been developed for some science subjects; however, not for algorithm‐learning. The learning algorithm is different from learning science as it is m...
Article
CT imaging is widely used for a variety of diagnostic and therapeutic purposes. It is a best effective and efficient tool in kidney stones diagnostic and treatment strategies whenever contactless measurements of quality are necessary to examine different types of stones. Accurate segmentation is a key process in CT diagnostic imaging. But, there ar...
Article
This paper proposes a new attention mechanism for neural machine translation (NMT) based on convolutional neural networks (CNNs), which is inspired by the CKY algorithm. The proposed attention represents every possible combination of source words (e.g., phrases and structures) through CNNs, which imitates the CKY table in the algorithm. NMT, incorp...
Article
Full-text available
A text classification system is needed to address the problem of hate speech in social media. However, texts of hate speech are very hard to find in social media. This will make the distribution of training data to be unbalanced (imbalanced data). Classification with imbalanced data will make a poor performance. There are several methods to solve t...
Article
Full-text available
Incapability of relational database in handling large-scale data triggers the development of NoSQL database that becomes part of a big data ecosystem. NoSQL database has different characteristics compared to the relational database. However, NoSQL database requires data from the relational database as one of the structured data sources. Therefore,...
Article
Full-text available
The Automatic Short Answer Scoring (ASAS) system is one of the tools that can be used to conduct assessment process on e-learning system. One of the methods applied in the ASAS system is a method for measuring similarities between the reference and student answers. There are two issues to be considered in the assessment process using this method. F...
Article
Full-text available
The development of negative sites brings harm to users of the Internet, especially among teenagers. One way to block these sites is to provide a list of sites that are categorized as negative. However, the problem is that every day new sites appear that have not been listed yet. Therefore an intelligent system that can detect the content and can au...
Presentation
Full-text available
two class eeg based motor imagery classification using narrow window feature extraction and knn with voting scheme based on bci competition III-dataset IVa
Article
Research in the field of health, especially treatment of wart disease has been widely practiced. One of the research topics related to the treatment of wart disease is in order to provide the most appropriate treatment method recommendations. Doctors widely use treatment methods for the treatment of patients with wart disease that is the method of...
Article
Despite the surge of deep learning, deploying the deep learning-based pedestrian detection into the real system faces hurdles, mainly due to the huge resource usages. The classical feature-based detection system still becomes feasible option. There have been many efforts to improve the performance of pedestrian detection system. Among many feature...
Article
Full-text available
Substitution box (S-box) is a critical part of the data encryption and decryption procedures. The primary function of the S-box in advanced encryption standard algorithm is to randomize the 8-bit input into 8-bit output. This paper presents a novel approach to S-box construction based on the replacement of irreducible polynomial and affine mapping....
Article
Full-text available
In the original publication of the article, Tables 4 and 7 were incorrectly published.
Conference Paper
Diversity of leaves form a special feature in a plant that can be done research such as image segmentation. However, the thing that is the main issue is the quantity of labeled data. Through image synthesis or image segmentation we are able to add leaf shape needed to use Generative Adversarial Networks (GAN). To train the GAN requires the choice o...
Conference Paper
Location recommendation system always involves huge volumes of data, therefore causes the scalability issues which not only increased processing time but cause reduced accuracy as well. Various techniques of recommendation system were developed to overcome this problem. Collaborative filtering is a technique that has a high accuracy in the loc...
Conference Paper
The approach using Deep Learning method provides great results in various field implementations, especially in the field of Sentiment Analysis. One of Deep Learning methods is CNN which has the ability to provide great accuracy in some previous research. However, there are some parts of the training process which can be improved to upgrade the accu...