cover
Contact Name
De Rosal Ignatius Moses Setiadi
Contact Email
moses@dsn.dinus.ac.id
Phone
-
Journal Mail Official
editorial.jcta@gmail.com
Editorial Address
H building, Dian Nuswantoro University Imam Bonjol street no. 207 Semarang, Central Java, Indonesia
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Computing Theories and Applications
ISSN : -     EISSN : 30249104     DOI : 10.62411/jcta
Core Subject : Science,
Journal of Computing Theories and Applications (JCTA) is a refereed, international journal that covers all aspects of foundations, theories and the practical applications of computer science. FREE OF CHARGE for submission and publication. All accepted articles will be published online and accessed for free. The review process is carried out rapidly, about two until three weeks, to get the first decision. The journal publishes only original research papers in the areas of, but not limited to: Artificial Intelligence Big Data Bioinformatics Biometrics Cloud Computing Computer Graphics Computer Vision Cryptography Data Mining Fuzzy Systems Game Technology Image Processing Information Security Internet of Things Intelligent Systems Machine Learning Mobile Computing Multimedia Technology Natural Language Processing Network Security Pattern Recognition Signal Processing Soft Computing Speech Processing Special emphasis is given to recent trends related to cutting-edge research within the domain. If you want to become an author(s) in this journal, you can start by accessing the About page. You can first read the Policies section to find out the policies determined by the JCTA. Then, if you submit an article, you can see the guidelines in the Author Guidelines or Author Guidelines section. Each journal submission will be made online and requires prospective authors to register and have an account to be able to submit manuscripts.
Articles 10 Documents
Search results for , issue "Vol. 2 No. 1 (2024): JCTA 2(1) 2024" : 10 Documents clear
An Intelligent Telediagnosis of Acute Lymphoblastic Leukemia using Histopathological Deep Learning Khan Tusar, Md. Taufiqul Haque; Islam, Md. Touhidul; Sakil, Abul Hasnat; Khandaker, M N Huda Nahid; Hossain, Md. Monir
Journal of Computing Theories and Applications Vol. 2 No. 1 (2024): JCTA 2(1) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10358

Abstract

Leukemia, a global health challenge characterized by malignant blood cell proliferation, demands innovative diagnostic techniques due to its increasing incidence. Among leukemia types, Acute Lymphoblastic Leukemia (ALL) emerges as a particularly aggressive form affecting diverse age groups. This study proposes an advanced mechanized system utilizing Deep Neural Networks for detecting ALL blast cells in microscopic blood smear images. Achieving a remarkable accuracy of 97% using MobileNetV2, our system demonstrates high sensitivity and specificity in identifying multiple ALL sub-types. Furthermore, we introduce cutting-edge telediagnosis software facilitating real-time support for clinicians in promptly and accurately diagnosing various ALL subtypes from microscopic blood smear images. This research aims to enhance leukemia diagnosis efficiency, which is crucial for the timely intervention and managing this life-threatening condition.
Integrating Convolutional Neural Network and Weighted Moving Average for Enhanced Human Fall Detection Performance Pyar, Kyi
Journal of Computing Theories and Applications Vol. 2 No. 1 (2024): JCTA 2(1) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10428

Abstract

This study proposes an approach for human fall classification utilizing a combination of Weighted Moving Average (WMA) and Convolutional Neural Networks (CNN) on the SisFall dataset. Falls among elderly individuals pose a significant public health concern, necessitating effective automated detection systems for timely intervention and assistance. The SisFall dataset, comprising accelerometer data collected during simulated falls and activities of daily living, serves as the basis for training and evaluating the proposed classification system. The proposed method begins by preprocessing accelerometer data using a WMA technique to enhance signal quality and reduce noise. Subsequently, the preprocessed data are fed into a CNN architecture optimized for feature extraction and fall classification. The CNN leverages its ability to automatically learn discriminative features from raw sensor data, enabling robust and accurate classification of fall and non-fall events. Experimental results demonstrate the efficacy of the proposed approach in accurately distinguishing between fall and non-fall activities, achieving high classification performance metrics such as accuracy, precision, recall, and F1-score. Comparative analysis with existing methods showcases the WMA-CNN hybrid approach's superiority in classification accuracy and robustness. Overall, the proposed methodology presents a promising framework for real-time human fall classification using sensor data, offering potential applications in wearable devices, ambient assisted living systems, and healthcare monitoring technologies to enhance safety and well-being among elderly individuals.
A Comprehensive Study on Applications of Blockchain in Wireless Sensor Networks for Security Purposes Nguyen, Mui Duc; Nguyen, Minh Tuan; Vu, Thang Chien; Ta, Tien Minh; Tran, Quang Anh; Nguyen, Dung The
Journal of Computing Theories and Applications Vol. 2 No. 1 (2024): JCTA 2(1) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10486

Abstract

The paper evaluates potential applications of blockchain technology in enhancing the security and reliability of Wireless Sensor Networks (WSNs). The existing vulnerabilities in WSNs, such as concerns regarding data integrity and security, demand innovative security solutions. Through systematic analysis, this paper provides valuable insights to expand understanding of WSNs security, explaining the feasibility and benefits of deploying blockchain technology. Possible attacks in the networks are classified to point out either risks or potential solusions to protect the networks. By exploring the integration of Blockchain within WSNs, the paper highlights its potential to minimize various security risks. In addition, this work discusses the challenges and considerations associated with implementing Blockchain in WSNs. Overall, this paper contributes on securing WSNs and underscores the role of blockchain technology as a promising way for enhancing security of WSNs.
Development of a Model to Classify Skin Diseases using Stacking Ensemble Machine Learning Techniques Jaiyeoba, Oluwayemisi; Ogbuju, Emeka; Yomi, Owolabi Temitope; Oladipo, Francisca
Journal of Computing Theories and Applications Vol. 2 No. 1 (2024): JCTA 2(1) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10488

Abstract

Skin diseases are highly prevalent and transmissible. It has been one of the major health problems that most people face. The diseases are dangerous to the skin and tend to spread over time. A patient can be cured of these skin diseases if they are detected on time and treated early. However, it is difficult to identify these diseases and provide the right medications. This study's research objectives involve developing an ensemble machine learning based model for classifying Erythemato-Squamous Diseases (ESD). The ensemble techniques combine five different classifiers, Naïve Bayes, Support Vector Classifier, Decision Tree, Random Forest, and Gradient Boosting, by merging their predictions and utilizing them as input features for a meta-classifier during training. We tested and validated the ensemble model using the dataset from the University of California, Irvine (UCI) repository to assess its effectiveness. The Individual classifiers achieved different accuracies: Naïve Bayes (85.41%), Support Vector Machine (98.61%), Random Forest (97.91%), Decision Tree (95.13%), Gradient Boosting (95.83%). The stacking method yielded a higher accuracy of 99.30% and a precision of 1.00, recall of 0.96, F1 score of 0.97, and specificity of 1.00 compared to the base models. The study confirms the effectiveness of ensemble learning techniques in classifying ESD.
Integrating Structural Causal Model Ontologies with LIME for Fair Machine Learning Explanations in Educational Admissions Igoche, Bern Igoche; Matthew, Olumuyiwa; Bednar, Peter; Gegov, Alexander
Journal of Computing Theories and Applications Vol. 2 No. 1 (2024): JCTA 2(1) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10501

Abstract

This study employed knowledge discovery in databases (KDD) to extract and discover knowledge from the Benue State Polytechnic (Benpoly) admission database and used a structural causal model (SCM) ontological framework to represent the admission process in the Nigerian polytechnic education system. The SCM ontology identified important causal relations in features needed to model the admission process and was validated using the conditional independence test (CIT) criteria. The SCM ontology was further employed to identify and constrain input features causing bias in the local interpretable model-agnostic explanations (LIME) framework applied to machine learning (ML) black-box predictions. The ablation process produced more stable LIME explanations devoid of fairness bias compared to LIME without ablation, with higher prediction accuracy (91% vs. 89%) and F1 scores (95% vs. 94%). The study also compared the performance of different ML models, including Gaussian Naïve Bayes, Decision Trees, and Logistic Regression, before and after ablation. The limitation is that the SCM ontology is qualitative and context-specific, so the fair-LIME framework can only be extrapolated to similar contexts. Future work could compare other explanation frameworks like Shapley on the same dataset. Overall, this study demonstrates a novel approach to enforcing fairness in ML explanations by integrating qualitative SCM ontologies with quantitative ML/LIME methods.
Adversarial Convolutional Neural Network for Predicting Blood Clot Ischemic Stroke Hambali, Moshood A.; Agwu, Paul A.
Journal of Computing Theories and Applications Vol. 2 No. 1 (2024): JCTA 2(1) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10516

Abstract

Digital Pathology Image Analysis (DPIA) is one of the areas where deep learning (DL) techniques offer modern, cutting-edge functionality. Convolutional Neural Network (CNN) technology outperforms the competition in classification, segmentation, and detection tasks while being just one of numerous DL techniques. Classification, segmentation, and detection methods can often be used to address DPIA concerns. Some difficulties can also be resolved using pre- and post-processing techniques. However, other CNN models have been investigated for use in addressing DPIA-related issues. Furthermore, the research seeks to explore how susceptible the model is to adversarial attacks and suggest strategies to counteract them. To predict ischemic strokes caused by blood clots, the authors of this study developed CNN with a pixel brightness transformation (PBT) technique for image enhancement and developed several approaches of image augmentation techniques to increase and provide the learning model with more diverse features. Also, adversarial training was integrated into CNN models to train the model with perturbed data in order to assess the impact of adversarial noise at different stages of training. Several metrics, including precision, F1-score, accuracy, and recall, are utilized to assess the experiments' effectiveness. The research findings indicate that employing transfer learning with a deep learning model achieved an accuracy of up to 97% using the ReLU activation function. Also, data augmentation helps improve the accuracy of the model.
Top-Heavy CapsNets Based on Spatiotemporal Non-Local for Action Recognition Ha, Manh-Hung
Journal of Computing Theories and Applications Vol. 2 No. 1 (2024): JCTA 2(1) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10551

Abstract

To effectively comprehend human actions, we have developed a Deep Neural Network (DNN) that utilizes inner spatiotemporal non-locality to capture meaningful semantic context for efficient action identification. This work introduces the Top-Heavy CapsNet as a novel approach for video analysis, incorporating a 3D Convolutional Neural Network (3DCNN) to apply the thematic actions of local classifiers for effective classification based on motion from the spatiotemporal context in videos. This DNN comprises multiple layers, including 3D Convolutional Neural Network (3DCNN), Spatial Depth-Based Non-Local (SBN) layer, and Deep Capsule (DCapsNet). Firstly, the 3DCNN extracts structured and semantic information from RGB and optical flow streams. Secondly, the SBN layer processes feature blocks with spatial depth to emphasize visually advantageous cues, potentially aiding in action differentiation. Finally, DCapsNet is more effective in exploiting vectorized prominent features to represent objects and various action features for the ultimate label determination. Experimental results demonstrate that the proposed DNN achieves an average accuracy of 97.6%, surpassing conventional DNNs on the traffic police dataset. Furthermore, the proposed DNN attains average accuracies of 98.3% and 80.7% on the UCF101 and HMDB51 datasets, respectively. This underscores the applicability of the proposed DNN for effectively recognizing diverse actions performed by subjects in videos.
Effects of Data Resampling on Predicting Customer Churn via a Comparative Tree-based Random Forest and XGBoost Ako, Rita Erhovwo; Aghware, Fidelis Obukohwo; Okpor, Margaret Dumebi; Akazue, Maureen Ifeanyi; Yoro, Rume Elizabeth; Ojugo, Arnold Adimabua; Setiadi, De Rosal Ignatius Moses; Odiakaose, Chris Chukwufunaya; Abere, Reuben Akporube; Emordi, Frances Uche; Geteloma, Victor Ochuko; Ejeh, Patrick Ogholuwarami
Journal of Computing Theories and Applications Vol. 2 No. 1 (2024): JCTA 2(1) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10562

Abstract

Customer attrition has become the focus of many businesses today – since the online market space has continued to proffer customers, various choices and alternatives to goods, services, and products for their monies. Businesses must seek to improve value, meet customers' teething demands/needs, enhance their strategies toward customer retention, and better monetize. The study compares the effects of data resampling schemes on predicting customer churn for both Random Forest (RF) and XGBoost ensembles. Data resampling schemes used include: (a) default mode, (b) random-under-sampling RUS, (c) synthetic minority oversampling technique (SMOTE), and (d) SMOTE-edited nearest neighbor (SMOTEEN). Both tree-based ensembles were constructed and trained to assess how well they performed with the chi-square feature selection mode. The result shows that RF achieved F1 0.9898, Accuracy 0.9973, Precision 0.9457, and Recall 0.9698 for the default, RUS, SMOTE, and SMOTEEN resampling, respectively. Xgboost outperformed Random Forest with F1 0.9945, Accuracy 0.9984, Precision 0.9616, and Recall 0.9890 for the default, RUS, SMOTE, and SMOTEEN, respectively. Studies support that the use of SMOTEEN resampling outperforms other schemes; while, it attributed XGBoost enhanced performance to hyper-parameter tuning of its decision trees. Retention strategies of recency-frequency-monetization were used and have been found to curb churn and improve monetization policies that will place business managers ahead of the curve of churning by customers.
Learning through Simulation: A Role-Based Learning Exercise to Equip Students in Big Data Requirement Elicitation Skills and Challenges Asanka, PPG Dinesh; Mahanama, Thilini V.
Journal of Computing Theories and Applications Vol. 2 No. 1 (2024): JCTA 2(1) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10847

Abstract

Bridging the gap between theoretical knowledge and practical application remains challenging in big data education. Our paper proposes a platform where students actively participate in a role-based learning (RBL) exercise designed to simulate real-world big data projects. This RBL exercise assigns each student participant to a business analyst role tasked with eliciting requirements or a customer role that provides those big data requirements. We conducted RBL sessions for postgraduate and undergraduate students learning big data analytics/data warehousing. Through role-playing in a collaborative environment, students face challenges such as unclear objectives, data privacy concerns, and evolving requirements. We evaluated the effectiveness of RBL simulations through brainstorming sessions, which verified that the students achieved the learning outcomes through RBL exercises. We also collected students’ feedback through a survey and found the RBL experience helped us understand the big data requirement elicitation skills, highlighting the significance of communication and collaboration skills. Further, we have evaluated students through a final exam question, and identified that students who participated in the RBL exercise outperformed in the big data requirement elicitation question. In summary, our research demonstrates that this RBL approach offers a valuable learning experience by enabling students to directly experience the complexities of big data requirement elicitation and identify the future requirements or challenges that encourage them to acquire the required skills.
Application of Tiny Machine Learning in Predicative Maintenance in Industries Ooko, Samson O.; Karume, Simon M.
Journal of Computing Theories and Applications Vol. 2 No. 1 (2024): JCTA 2(1) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10929

Abstract

The continued advancements in Internet of Things (IoT) and Machine Learning (ML) technologies have led to their adoption in various domains including in industries for predictive maintenance among other applications. Given the resource constraints of IoT devices, they cannot process the resource-intensive ML algorithms hence data collected by the devices are first sent to the cloud where the algorithms are hosted for processing and inference with the results being sent back to the devices for action and/or notifications. The need to transmit data to the cloud for processing leads to increased costs, energy consumption, and high latencies affecting the implementation of the solution. Interestingly with Tiny Machine Learning (TinyML), it is possible to develop algorithms enabling edge inference on resource-constrained devices. From existing review papers, the researchers were not able to find, a comprehensive review with a focus on this area showing the need for a targeted review that can shed light on how TinyML can be tailored for predictive maintenance tasks in industries. This study therefore presents a systematic literature review of the application of TinyML in predictive maintenance in industrial settings. TinyML overview and its benefits are presented, a TinyML process flow is proposed and various use cases and their classifications have been presented. Through this exploration, the study shows the critical need for TinyML-driven solutions in predictive maintenance, identifies the existing challenges, and proposes a roadmap for future research.

Page 1 of 1 | Total Record : 10