Wahyu Catur Wibowo

Wahyu Catur Wibowo
University of Indonesia | UI · Faculty of Computer Science

About

60
Publications
18,148
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
300
Citations

Publications

Publications (60)
Article
Full-text available
Jakarta as the capital city is viewed as the barometer of every city in Indonesia. The city preparedness to face VUCA (Volatility, Uncertainty, Complexity and Ambiguity) caused by Covid-19 pandemic is also in the national spotlight. One of the main solutions to face VUCA is Computational Thinking (CT). CT provides the ability to approach VUCA chara...
Article
Full-text available
Anonymity data for multiple sensitive attributes in microdata publishing is a growing field at present. This field has several models for anonymizing such as k-anonymity and l-diversity. Generalization and suppression became a common technique in anonymize data. But, the real problem in multiple sensitive attributes is sensitive value distribution....
Article
Full-text available
Anonymity data for multiple sensitive attributes in microdata publishing is a growing field at present. This field has several models for anonymizing such as k-anonymity and l-diversity. Generalization and suppression became a common technique in anonymize data. But, the real problem in multiple sensitive attributes is sensitive value distribution....
Article
Full-text available
The real research strength of an institution is important for establishing research priorities and developing an institutional research plan. It can also be used as a basis for SWOT analysis, developing vision-mission of an institution and also useful for research funder in distributing their research grants. Unfortunately, there was only a small n...
Article
Full-text available
The objective of this study is to develop a classification method based on convolutional neural network (CNN) and Sentinel-2 satellite imagery including the spectral feature, spectral index and spatial feature together as an input to answer forest monitoring problem. This research also used contextual information on Indonesia National Standard Agen...
Article
Full-text available
Investigation into privacy preserving data publishing with multiple sensitive attributes is performed to reduce probability of adversaries to guess the sensitive values. Masking the sensitive values is usually performed by anonymizing data by using generalization and suppression techniques. A successful anonymization technique should reduce informa...
Article
K-Means is a well known algorithms of clusteing. It generates some groups based on degree of similarity. Simplicity of implementation, ease of interpretation, adaptability to sparse data, linear complexity, speed of convergence, and versatile in almost every aspect are noble characteristics of this algorithm. However, this algorithm is very sensiti...
Article
Full-text available
An ontology-based system can currently logically reason through the Web Ontology Language Description Logic (OWL DL). To perform probabilistic reasoning, the system must use a separate knowledge base, separate processing, or third-party applications. Previous studies mainly focus on how to represent probabilistic information in ontologies and perfo...
Conference Paper
Full-text available
Software requirements are crucial. Tight relationship between functional and non-functional will determine the quality of requirements, in which ultimately determines the quality of the software being built. Non-Functional Requirements (NFR) often get less attention in the Requirements Engineering (RE) process. In NFR determination, it is necessary...
Conference Paper
Reverse engineering is the information extraction process on system by identifying and analyzing the components that are part of that system. We analyze existing research that related with reverse engineering process on software product line. There are two product line processes according to Software product line engineering framework they are doma...
Conference Paper
The increasing amount of spatial data provides us with more useful information, either explicitly or implicitly or both. To obtain the implicit information in spatial data, this paper uses a certain technique in Data Mining especially Spatial Data Mining since spatial data is used, it is Co-location Patterns Mining. An example in the application of...
Conference Paper
Since coined by a German researcher in 2011, Industry 4.0 has piqued the interests of many researchers. The number of scientific publications related to Industry 4.0 or Fourth Industrial Revolution increases tremendously. Unfortunately, 90% of those publications have not been reviewed thus hindering many to track the progress and trends of research...
Article
Full-text available
An effective knowledge transfer (KT) process is a key factor in achieving the competitive advantage that is critical for software development companies seeking to maintain their existence and improve their performance. However, there do exist obstacles to the achievement of effective knowledge transfer. Companies often face difficulties in identify...
Conference Paper
In our research, we found that there were no extensive study about library's collection in Indonesian language due to the lack of library of things metadata. As the consequence, the Government of Republic of Indonesia has no depiction of the output of Indonesian authors. The aim of this paper is to describe Indonesian bibliography by tools of visua...
Conference Paper
Full-text available
this paper aimed to present a formal representation design or classification concept to design relationships among real-world description into image description on a land cover domain using ontology approach. This paper focused on airport domain in Indonesia since detection of airport imagery features was an open challenge due to various features w...
Conference Paper
Full-text available
Expertise is specialized skills and knowledge. It can be shared or disseminated if stated explicitly using expertise representation. Since people have multi area/domain expertise, we need multi-domain expertise representation. Someone’s expertise can be recognized by his/her publication. In this article we proposed a new expertise representation by...
Article
Full-text available
Communicating in short messages, such as using microblogs, was becoming more popular currently. Twitter https://twitter. com supports microblogs and retrieval of the blogs by users. To retrieve Twitter documents, we need specific strategies due to its specific characteristics. One new strategy for improving the effectiveness of twitter document ret...
Article
Full-text available
Failures in many e-Governments implementation in various countries including in Indonesia are caused by various factors. So that, it is necessary to identify the factors that can determine the level of success of e-Government in the country. This study intends to propose factors that can determine the success rate of implementation of e-Hajj in Ind...
Article
Full-text available
Knowledge management is one of organizational strategy to improve the organizational competitive value. Align with presidential regulation No. 81 Year 2010 about bureaucratic reform and PERMENPAN&RB No. 20 year 2010 about bureaucratic reform roadmap declare that one bureaucratic reform objective are human capital development. This program is import...
Conference Paper
Government Human Capital Management is activities to manage government human capital based on their performance and competency. These processes were managed by three government institution (MENPAN, LAN, and BKN). These institutions should coordinate and collaborate to perform their duties and function. Knowledge management (KM) can enhance collabor...
Conference Paper
Knowledge management implementation in government human capital management aims to improve individual and organizational knowledge. These knowledge used by every organizational entities to do the government human capital management process. Organizational performance can be measured by looking at the level of customer satisfaction. There are many p...
Conference Paper
Government Human Capital Management (GHCM) is activities to manage civil servant as government resources and assets. These assets are used as much as possible to improve the achievement of government objectives. In 2014, the government appointed legally three ministries to manage all government human capital in Indonesia. They are KEMENPAN&RB, LAN,...
Article
Full-text available
Knowledge management is a strategic issue that is usually used for strategic planning of organizational development in order to reach organization competitiveness and retaining organization knowledge. It has also become a trend in Governmental institution for implementing knowledge management align with the regulation. Internal employee rotation, p...
Article
Full-text available
Organizational culture believed as an enabler's of knowledge management implementation. Others assumed that one of critical success factor of knowledge management can be seen from its culture. Generally organizational culture has positive impact to knowledge management. Type of organizational culture can be a guide to encourage the knowledge manage...
Article
Full-text available
Knowledge management (KM) as set of activities to create organizational competitive advantages which is enhanced organizational objectives through innovation and organizational services using organizational knowledge. These activities of KM are well known as KM process that consists of discovering, capturing, sharing and application process. This r...
Conference Paper
Knowledge management as people approach in information system is used to develop Knowledge Management System (KMS). KMS can be defined by aligning knowledge management process in organization. Analytical approaches to determine KMS are identifying knowledge management process, transferring knowledge management mechanism and applying knowledge manag...
Conference Paper
Ontology is widely used to represent knowledge in many software applications. By default, ontology languages such as OWL and RDF is built on discrete logic, so that it can not handle uncertain information about a domain. Various approaches have been made to represent uncertainty in ontology, one of which with a Bayesian approach. Currently, there a...
Article
Full-text available
Mining data from a web database becomes more challenging in recent years due to the exploding size of data, the rising of dynamic web, and the increasing performance of web security. Mining data from a web database differs from mining data from web sites because it is intended to collect specific data from a single web site. Collecting a very large...
Conference Paper
Full-text available
Pengelompokkan obyek dalam sejumlah grup (kelompok) dalam proses clustering tidak hanya memperhatikan algoritma clustering yang digunakan, namun juga indeks validitas clustering yang digunakan yang menunjukkan kualitas hasil clustering. Salah satu usaha untuk meningkatkan kualitas tersebut adalah membagi cluster hasil yang memiliki diameter terlalu...
Conference Paper
Full-text available
Clustering process aims to group all objects based on their proximity. K-Means is one of clustering algorithms which is categorized as center-based clustering algorithm. In this algorithm, the value of k is an input parameter that has no prior information. If the k is too small then there is one or more clusters in the result that have a big SSE. T...
Conference Paper
Classification is a technique in data mining for categorizing objects. Text Classification is re-challenged for classifying very short documents or text as shown in social media collection. This paper proposes a method to improve the performance of classification on short documents. In this work, we expand words in every document before the documen...
Conference Paper
Full-text available
Classification is a technique in data mining for categorizing objects. Text Classification is re-challenged for classifying very short documents or text as shown in social media collection. This paper proposes a method to improve the performance of classification on short documents. In this work, we expand words in every document before the documen...
Article
Clustering process aims to group all objects based on their proximity. K-Means is one of clustering algorithms which is categorized as center-based clustering algorithm. In this algorithm, the value of k is an input parameter that has no prior information. If the k is too small then there is one or more clusters in the result that has a big SSE. To...
Conference Paper
Full-text available
K-Means adalah salah satu algoritma clustering yang sangat popular karena kesederhanaan dan kemampuannya dalam menangani data dengan skala besar. Namun demikian algoritma ini sangat sensitif terhadap centroid awal. Perbedaan centroid awal akan memberikan perbedaan hasil clustering dan apabila centroid awal yang diberikan adalah centroid yang tidak...
Article
Full-text available
Dengue is one of the most common infectious diseases and an enormous public health problem in Indonesia. In this paper, we discuss the development of hierarchical conceptual schema for Dengue Hemorrhagic Fever Ontology (DHFO) which contains general information on DHF and epidemiological information that can help in the formulation of effective DHF...
Article
Full-text available
Categorisation of digital do ments is useful for organisation and retrieval. While do c mentcP egoriesc an be a set of unstruc turedc ategory labels, some do c mentc; egories are hierarc hicPRA stru c ured. This paper investigates automatic hierarc hicP c ategorisation and, spec; c;; , the role of features in the development of more e# ec ivec; ego...
Conference Paper
Categorisation of digital documents is useful for organisation and retrieval. While document categories can be a set of unstructured category labels, some document categories are hierarchically structured. This paper investigates automatic hierarchical categorisation and, specifically, the role of features in the development of more effective categ...
Conference Paper
On the Web, browsing and searching categories is a popular method of finding documents. Two well-known category-based search systems are the Yahoo!~and DMOZ hierarchies, which are maintained by experts who assign documents to categories. However, manual categorisation by experts is costly, subjective, and not scalable with the increasing volumes of...

Projects