cover
Contact Name
De Rosal Ignatius Moses Setiadi
Contact Email
moses@dsn.dinus.ac.id
Phone
-
Journal Mail Official
editorial.jcta@gmail.com
Editorial Address
H building, Dian Nuswantoro University Imam Bonjol street no. 207 Semarang, Central Java, Indonesia
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Computing Theories and Applications
ISSN : -     EISSN : 30249104     DOI : 10.62411/jcta
Core Subject : Science,
Journal of Computing Theories and Applications (JCTA) is a refereed, international journal that covers all aspects of foundations, theories and the practical applications of computer science. FREE OF CHARGE for submission and publication. All accepted articles will be published online and accessed for free. The review process is carried out rapidly, about two until three weeks, to get the first decision. The journal publishes only original research papers in the areas of, but not limited to: Artificial Intelligence Big Data Bioinformatics Biometrics Cloud Computing Computer Graphics Computer Vision Cryptography Data Mining Fuzzy Systems Game Technology Image Processing Information Security Internet of Things Intelligent Systems Machine Learning Mobile Computing Multimedia Technology Natural Language Processing Network Security Pattern Recognition Signal Processing Soft Computing Speech Processing Special emphasis is given to recent trends related to cutting-edge research within the domain. If you want to become an author(s) in this journal, you can start by accessing the About page. You can first read the Policies section to find out the policies determined by the JCTA. Then, if you submit an article, you can see the guidelines in the Author Guidelines or Author Guidelines section. Each journal submission will be made online and requires prospective authors to register and have an account to be able to submit manuscripts.
Articles 107 Documents
Hybrid Real-time Framework for Detecting Adaptive Prompt Injection Attacks in Large Language Models Prakash, Chandra; Lind, Mary; De La Cruz, Elyson
Journal of Computing Theories and Applications Vol. 3 No. 3 (2026): JCTA 3(3) 2026
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.15254

Abstract

Prompt injection has emerged as a critical security threat for Large Language Models (LLMs), exploiting their inability to separate instructions from data within application contexts reliably. This paper provides a structured review of current attack vectors, including direct and indirect prompt injection, and highlights the limitations of existing defenses, with particular attention to the fragility of Known-Answer Detection (KAD) against adaptive attacks such as DataFlip. To address these gaps, we propose a novel, hybrid, multi-layered detection framework that operates in real-time. The architecture integrates heuristic pre-filtering for rapid elimination of obvious threats, semantic analysis using fine-tuned transformer embeddings for detecting obfuscated prompts, and behavioral pattern recognition to capture subtle manipulations that evade earlier layers. Our hybrid model achieved an accuracy of 0.974, precision of 1.000, recall of 0.950, and an F1 score of 0.974, indicating strong and balanced detection performance. Unlike prior siloed defenses, the framework proposes coverage across input, semantic, and behavioral dimensions. This layered approach offers a resilient and practical defense, advancing the state of security for LLM-integrated applications.
A Lightweight Maize Leaf Disease Recognition Using PCA-Compressed MobileNetV2 Features and RBF-SVM Abubakar, Mustapha; Ibrahim, Yusuf; Ajayi, Ore-Ofe; Saminu, Sani Saleh
Journal of Computing Theories and Applications Vol. 3 No. 3 (2026): JCTA 3(3) 2026
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.15675

Abstract

The integration of Artificial Intelligence (AI) into precision agriculture has significantly improved plant disease recognition; however, many existing deep learning models remain computationally expensive and feature-redundant, limiting their deployment on low-power and edge devices. To address these limitations, this study proposes a lightweight framework for maize leaf disease recognition based on serial deep feature extraction, dimensionality reduction, and machine-learning–based classification. A pre-trained MobileNetV2 network is employed as a fixed feature extractor to obtain discriminative visual representations, while Principal Component Analysis (PCA) is applied to reduce feature dimensionality by approximately 76%, retaining 95% of the original variance and improving computational efficiency. The compressed features are subsequently classified using a Radial Basis Function Support Vector Machine (RBF-SVM), optimized via grid search and cross-validation. Experiments conducted on a four-class maize leaf disease dataset (Northern Leaf Blight, Common Rust, Gray Leaf Spot, and Healthy), with class imbalance handled during training, demonstrate that the proposed MobileNetV2–PCA–SVM pipeline achieves 97.58% accuracy, 96.60% precision, 96.59% recall, and 96.59% F1-score, outperforming the DenseNet201 + Bayesian-optimized SVM baseline (94.60%, 94.40%, 94.40%, and 94.40%, respectively). This improvement corresponds to a 2.98% accuracy gain, a 55% reduction in error rate, an 86% reduction in model parameters (20.31M to 2.75M), and an 85% reduction in model size (81 MB to 12 MB). These results indicate that the proposed framework provides a compact and efficient solution with strong potential for deployment in resource-constrained agricultural environments.
Immersive Interventions for Dementia: A Narrative Review of Virtual Reality's Role in Therapy, Well-Being, and Future Care Models Samarasekara, Prathibha; Karunanayaka, Kasun; Gunathilaka, Sanjani
Journal of Computing Theories and Applications Vol. 3 No. 3 (2026): JCTA 3(3) 2026
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.15310

Abstract

Dementia is a progressive neurocognitive disorder often accompanied by behavioral and psychological symptoms such as agitation, anxiety, and depression. Pharmacological treatments provide only modest benefits while introducing significant risks, which highlights the need for safer, non-pharmacological alternatives. This literature review examines the role of virtual reality in dementia care, with a focus on its integration with therapies such as music, reminiscence, sensory stimulation, and cognitive training. Evidence from prior research suggests that virtual reality can enhance cognitive functions, reduce symptoms, and improve emotional well-being while also strengthening patient–caregiver interaction. However, challenges related to usability, accessibility, cost, and long-term effectiveness continue to limit adoption. Gaps in research, including limited cultural diversity, inconsistent reporting of intervention design, and a lack of large-scale longitudinal trials, emphasize the need for future work exploring cross-cultural feasibility and AI-driven personalization. Overall, virtual reality represents a promising and evolving non-pharmacological intervention that has the potential to transform dementia care by improving quality of life and reducing reliance on medication.
Harnessing Artificial Intelligence for Early Disease Detection: Opportunities and Challenges in Modern Healthcare Egbunu, Achile Solomon; Okedoye, Akindele Michael
Journal of Computing Theories and Applications Vol. 3 No. 3 (2026): JCTA 3(3) 2026
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.15367

Abstract

Artificial Intelligence (AI) is increasingly recognized as a transformative enabler of early disease detection, with the potential to improve diagnostic accuracy, support predictive risk stratification, and advance preventive healthcare. Despite rapid methodological progress, many existing reviews remain performance-centric, offering limited insight into generalizability, ethical governance, and real-world implementation constraints. This paper presents a narrative and integrative review with an adoption-focused, translational perspective, synthesizing recent developments in AI-driven early disease detection across oncology, cardiology, neurology, and infectious disease surveillance. Drawing on peer-reviewed literature published primarily between 2016 and 2025, the review examines reported performance gains alongside persistent limitations related to data heterogeneity, population bias, explainability, and regulatory fragmentation. Through cross-sectional synthesis, we identify three recurring gaps in prior reviews: (i) overgeneralization of AI’s diagnostic superiority, (ii) insufficient consideration of ethical and legal accountability, and (iii) a lack of actionable guidance for scalable clinical implementation. Integrating technical, ethical, and policy dimensions into a unified conceptual framework, this review demonstrates that while AI systems can consistently enhance diagnostic accuracy and early risk stratification in well-defined tasks, sustained clinical adoption depends on aligning technical performance with governance readiness, interpretability, and workflow integration. The analysis further highlights how implementation mechanisms—such as explainable AI, continuous post-deployment monitoring, and clinician-centered deployment strategies—mediate the translation of algorithmic innovation into real-world healthcare impact. Overall, this review provides a critical reference for researchers, clinicians, and policymakers seeking to translate AI innovation into safe, equitable, and trustworthy clinical practice.
An Attention-Enhanced CNN–RBF Framework for Network Intrusion Detection in Imbalanced Traffic Kabura, Fabrice; Nsabimana, Thierry
Journal of Computing Theories and Applications Vol. 3 No. 3 (2026): JCTA 3(3) 2026
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.15419

Abstract

The increasing complexity and scale of modern network traffic driven by IoT and cloud-based infrastructures have made accurate intrusion detection a critical challenge. Conventional network intrusion detection systems (NIDS) and many deep learning–based approaches struggle to reliably detect minority and stealthy attacks due to severe class imbalance and limited discrimination of subtle traffic patterns. To address these limitations, this study proposes a hybrid CNN–RBF–Attention framework for network intrusion detection. The proposed model integrates three complementary components: (i) a convolutional neural network for hierarchical feature extraction from network flow data, (ii) a radial basis function (RBF) network for localized nonlinear classification using prototype-based decision regions, and (iii) an attention mechanism that adaptively weights RBF activations to emphasize discriminative traffic patterns. SMOTE is applied exclusively to the training data to mitigate class imbalance. The framework is evaluated on the widely used CICIDS2017 and CICIDS2018 benchmark datasets in both binary and multiclass settings, using recall, precision, F1-score, confusion matrices, and ROC analysis. Experimental results demonstrate that the proposed hybrid model consistently outperforms standalone CNN and RBF baselines, particularly in terms of recall and F1-score. On the CICIDS2018 dataset, the model achieves 99.81% accuracy and 99.81% F1-score in binary classification, and 99.54% accuracy and 99.54% F1-score in multiclass classification. On CICIDS2017, it achieves 98.12% accuracy and 98.12% F1-score in binary classification, and 98.92% accuracy and 98.92% F1-score in multiclass classification. Confusion matrix and ROC analyses further show strong class separability and reliable performance in low–false-positive-rate regions, which is critical for real-world IDS deployment. These results confirm that combining deep hierarchical feature learning, localized prototype-based classification, and attention-guided refinement yields a robust, operationally reliable intrusion detection framework for highly imbalanced network environments.
A Graph-Augmented Isolation Forest Using Node2Vec and GraphSAGE for Mobile User Behavior Anomaly Detection Binitie, Amaka Patience; Onyemenem, Sunny Innocent; Anujeonye, Nneamaka Christiana; Ojugo, Arnold Adimabua; Egbokhare, Francesca Avwuru; Aghaunor, Tabitha Chukwudi
Journal of Computing Theories and Applications Vol. 3 No. 3 (2026): JCTA 3(3) 2026
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.15494

Abstract

This study presents a Graph-Augmented Isolation Forest (GAIF), an unsupervised anomaly-detection framework for analyzing mobile user behavior. The proposed framework represents users and behavioral attributes as a user–feature bipartite graph, enabling the capture of relational dependencies that are not explicitly modeled in conventional vector-based approaches. Low-dimensional user representations are learned through Node2Vec and Graph Sample and Aggregate (GraphSAGE), and the resulting embeddings are subsequently processed by an Isolation Forest to produce anomaly scores. Experiments are conducted on a Mobile Device Usage and User Behavior dataset comprising 700 user profiles derived from application-level behavioral indicators. The dataset is treated as a behavioral abstraction rather than as a malware classification benchmark. A consistent 80:20 stratified train–test split is employed, with all learning-capable operations restricted to the training data to mitigate information leakage. Detection performance is evaluated post hoc using precision, recall, F1-score, and area under the curve (AUC) metrics. Under the evaluated setting, GAIF achieves an F1-score of 0.94 and an AUC of 0.97, demonstrating improved anomaly detection effectiveness relative to representative unsupervised baseline methods. These results are obtained on a static, proxy dataset and should not be interpreted as evidence of real-time deployment capability. Model interpretability is supported through post-hoc Uniform Manifold Approximation and Projection (UMAP) visualizations of the learned embeddings, providing structural insights into anomalous user behavior. Overall, the findings indicate that integrating graph-based representation learning with isolation-based anomaly scoring constitutes a computationally efficient approach for unsupervised mobile user behavior anomaly detection within the scope of this study.
Investigating Security Enhancement in Hybrid Clouds via a Blockchain-Fused Privacy Preservation Strategy: Pilot Study Aghaunor, Tabitha Chukwudi; Ugbotu, Eferhire Valentine; Ugboh, Emeke; Onoma, Paul Avwerosuoghene; Emordi, Frances Uchechukwu; Ojugo, Arnold Adimabua; Geteloma, Victor Ochuko; Idama, Rebecca Okeoghene; Ezzeh, Peace Oguguo
Journal of Computing Theories and Applications Vol. 3 No. 4 (2026): JCTA 3(4) 2026
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.15508

Abstract

The proliferation of cloud infrastructures has intensified concerns regarding data security, integrity, identity and access management, and user privacy. Despite recent advances, existing solutions often lack comprehensive integration of privacy-preserving mechanisms, dynamic trust management, and cross-provider interoperability. This study proposes an AI-enabled, zero-trust, blockchain-fused identity management framework for secure, privacy-preserving multi-cloud environments. The framework integrates homomorphic encryption with differential privacy for aggregate-level protection and secure multi-party computation for collaborative data processing. The proposed system was validated in a simulated multi-cloud environment using CloudSim, Ethereum blockchain, and AWS EC2. Experimental results indicate homomorphic encryption latency of approximately 450ms per operation and statistically significant security improvements (t(128) = 12.47, p < 0.001), privacy (t(95) = 8.93, p < 0.001), and throughput (t(156) = 15.21, p < 0.001). The framework achieved differential privacy with ε = 0.1 while retaining 99.2% data utility, and demonstrated a 34% improvement in processing speed over conventional differential privacy approaches. In addition, the implementation was observed to be 2.3× faster than BGV-based configurations, with 45% lower memory consumption than CKKS and a 67% reduction in ciphertext size relative to baseline implementations. From an operational perspective, the framework shows a 23% reduction in security management costs, a 31% improvement in resource utilization efficiency, and an 18% decrease in compliance audit expenses. The model further indicates a 27% reduction in total cost of ownership (TCO) compared with multi-vendor security solutions, a projected return on investment (ROI) within 14 months, and an 89% reduction in security incident response costs under the evaluated conditions.

Page 11 of 11 | Total Record : 107