cover
Contact Name
De Rosal Ignatius Moses Setiadi
Contact Email
moses@dsn.dinus.ac.id
Phone
-
Journal Mail Official
editorial.jcta@gmail.com
Editorial Address
H building, Dian Nuswantoro University Imam Bonjol street no. 207 Semarang, Central Java, Indonesia
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Computing Theories and Applications
ISSN : -     EISSN : 30249104     DOI : 10.62411/jcta
Core Subject : Science,
Journal of Computing Theories and Applications (JCTA) is a refereed, international journal that covers all aspects of foundations, theories and the practical applications of computer science. FREE OF CHARGE for submission and publication. All accepted articles will be published online and accessed for free. The review process is carried out rapidly, about two until three weeks, to get the first decision. The journal publishes only original research papers in the areas of, but not limited to: Artificial Intelligence Big Data Bioinformatics Biometrics Cloud Computing Computer Graphics Computer Vision Cryptography Data Mining Fuzzy Systems Game Technology Image Processing Information Security Internet of Things Intelligent Systems Machine Learning Mobile Computing Multimedia Technology Natural Language Processing Network Security Pattern Recognition Signal Processing Soft Computing Speech Processing Special emphasis is given to recent trends related to cutting-edge research within the domain. If you want to become an author(s) in this journal, you can start by accessing the About page. You can first read the Policies section to find out the policies determined by the JCTA. Then, if you submit an article, you can see the guidelines in the Author Guidelines or Author Guidelines section. Each journal submission will be made online and requires prospective authors to register and have an account to be able to submit manuscripts.
Articles 96 Documents
IMANoBAS: An Improved Multi-Mode Alert Notification IoT-based Anti-Burglar Defense System Omede, Edith Ugochi; Edje, Abel E; Akazue, Maureen Ifeanyi; Utomwen, Henry; Ojugo, Arnold Adimabua
Journal of Computing Theories and Applications Vol. 1 No. 3 (2024): JCTA 1(3) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.9541

Abstract

Burglary involves forced or unauthorized entry, which leads to damage or loss of property having monetary or emotional value and, more severely, puts lives at risk. The dire need for the safety of lives and properties has attracted so much research on burglary alert system using Internet of Things (IoT) technology. Most of the research focused on alerting the users of burglary attempts using any or a combination of two notification methods: SMS, call, and email. This study emphasizes three-mode notification that combines SMS, call, and email using the application of IoT technology in a burglary alert system, which uses a Passive Infrared (PIR) sensor for burglar detection to ensure that Homeowners or authorized personnel get alerts in events of imminent attempt to break-ins. The study also details the sensor integration with its supporting components, such as the central hub or microcontroller, buzzer, LED, and network interface in the development of the system. The software was developed to facilitate seamless integration with the hardware, ensuring timely and accurate event detection and subsequent alert generation using Arduino IDE programming language, a framework based on the C++ language. The system effected the 3-mode notification to ensure that users get notification in case of an imminent break-in since the failure of the three modes simultaneously is extremely rare. The system’s performance based on its responsiveness on the 3-mode notifications was evaluated, and an average of 83.56% responsiveness was obtained, indicating an acceptable response time.
Hybrid Quantum Key Distribution Protocol with Chaotic System for Securing Data Transmission Setiadi, De Rosal Ignatius Moses; Akrom, Muhamad
Journal of Computing Theories and Applications Vol. 1 No. 2 (2023): JCTA 1(2) 2023
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jcta.v1i2.9547

Abstract

This research proposes a combination of Quantum Key Distribution (QKD) based on the BB84 protocol with Improved Logistic Map (ILM) to improve data transmission security. This method integrates quantum key formation from BB84 with ILM encryption. This combination creates an additional layer of security, where by default, the operation on BB84 is only XOR-substitution, with the addition of ILM creating a permutation operation on quantum keys. Experiments are measured with several quantum measurements such as Quantum Bit Error Rate (QBER), Polarization Error Rate (PER), Quantum Fidelity (QF), Eavesdropping Detection (ED), and Entanglement-based detection (EDB), as well as classical cryptographic analysis such as Bit Error Ratio (BER), Entropy, Histogram Analysis, and Normalized Pixel Change Rate (NPCR) and Unified Average Changing Intensity (UACI). As a result, the proposed method obtained satisfactory results, especially perfect QF and BER, and EBD, which reached 0.999.
Music-Genre Classification using Bidirectional Long Short-Term Memory and Mel-Frequency Cepstral Coefficients Wijaya, Nantalira Niar; Setiadi, De Rosal Ignatius Moses; Muslikh, Ahmad Rofiqul
Journal of Computing Theories and Applications Vol. 1 No. 3 (2024): JCTA 1(3) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.9655

Abstract

Music genre classification is one part of the music recommendation process, which is a challenging job. This research proposes the classification of music genres using Bidirectional Long Short-Term Memory (BiLSTM) and Mel-Frequency Cepstral Coefficients (MFCC) extraction features. This method was tested on the GTZAN and ISMIR2004 datasets, specifically on the IS-MIR2004 dataset, a duration cutting operation was carried out, which was only taken from seconds 31 to 60 so that it had the same duration as GTZAN, namely 30 seconds. Preprocessing operations by removing silent parts and stretching are also performed at the preprocessing stage to obtain normalized input. Based on the test results, the performance of the proposed method is able to produce accuracy on testing data of 93.10% for GTZAN and 93.69% for the ISMIR2004 dataset.
A Comprehensive Study and Development of Unified Mobile-Based Admission System for GCC Universities Adwan, Ehab Juma; Al-Aradi, Yunes; Essa, Muneera; Malabari, Hadeel
Journal of Computing Theories and Applications Vol. 1 No. 2 (2023): JCTA 1(2) 2023
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.9793

Abstract

The Gulf Cooperation Council (GCC) region has experienced tremendous growth in the higher education sector with many public but internationally recognized universities, colleges, and programs. Annually, within and outside of the GCC zone, high school students and guardians undergo repeatable and time-consuming experiences for inhomogeneous university, college, and program admission and tracking processes. This research project aims to provide a unified management tool to manage the admission and tracking process to multiple accredited GCC universities, colleges, and programs through one unified central mobile-based application. The research project aimed to achieve two objectives: exploring the GCC university admission process phenomena and developing and evaluating a unified mobile-based university admission application (denoted by HEIM) for higher education institutes' mobile applications. An Agile-SDLC methodology was employed, entailing two phases; the Exploratory phase to the phenomena of the university admission process and the development and evaluation phase of the potential mobile application. The 1st phase was based on an interview with the Ministry of Education (MOE), employing SLR and CA techniques for articles and mobile applications collection and analysis, and 1st questionnaire to collect user requirements. The 2nd phase employed several design techniques, including DFD, ERD, etc., a 2nd questionnaire to collect system requirements and coding by .NET MAUI, C#, and XAML, and a 3rd questionnaire to evaluate the usability of HEIM based on Nielsen heuristics at which the empirical findings revealed 97.7% of usability.
A GCC Artificial Food Additives Management based Mobile Application Development Adwan, Ehab Juma; Adwan, Jana; Alwedaei, Entesar; Mohsen, Maryam
Journal of Computing Theories and Applications Vol. 1 No. 3 (2024): JCTA 1(3) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.9843

Abstract

Artificial food additives pose significant health risks to Gulf Cooperation Council (GCC) citizens despite regional authorities' extensive medical, legislative, and technological efforts. Literature highlights the detrimental impacts of these additives, including malnutrition, digestive disorders, respiratory problems, skin issues, hives, nausea, diarrhea, shortness of breath, allergic reactions, high blood pressure, and tumors. The research project at hand aims at becoming the first official and comprehensive mobile application of its own in the GCC region that manages the calculation and demonstration of an up-to-date health and legal knowledge base of the impacts of artificial additives, enhances the awareness, automatically recognizes the artificial additives, and provides alternative solutions, for both android and IOS mobile platforms. This research project introduces "Weqaya," a pioneering mobile application designed to manage, educate, and raise awareness about the effects of artificial additives. Weqaya provides real-time health and legal information, identifies additives, and suggests alternative solutions for Android and iOS platforms. The project employs an Agile-based SDLC model to explore, develop, and evaluate the food additive phenomena in Weqaya. The application's usability evaluation scores a promising 95.21%, indicating its potential utility for GCC health ministries, dietitians, academics, researchers, and food producers in enhancing knowledge and promoting non-artificial food options.
Machine Learning and Cryptanalysis: An In-Depth Exploration of Current Practices and Future Potential Singh, Ajeet; Sivangi, Kaushik Bhargav; Tentu, Appala Naidu
Journal of Computing Theories and Applications Vol. 1 No. 3 (2024): JCTA 1(3) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.9851

Abstract

The rapidly evolving landscape of cryptanalysis necessitates an urgent and detailed exploration of the high-degree non-linear functions that govern the relationships between plaintext, key, and encrypted text. Historically, the complexity of these functions has posed formidable challenges to cryptanalysis. However, the advent of deep learning, supported by advanced computational resources, has revolutionized the potential for analyzing encrypted data in its raw form. This is a crucial development, given that the core principle of cryptosystem design is to eliminate discernible patterns, thereby necessitating the analysis of unprocessed encrypted data. Despite its critical importance, the integration of machine learning, and specifically deep learning, into cryptanalysis has been relatively unexplored. Deep learning algorithms stand out from traditional machine learning approaches by directly processing raw data, thus eliminating the need for predefined feature selection or extraction. This research underscores the transformative role of neural networks in aiding cryptanalysts in pinpointing vulnerabilities in ciphers by training these networks with data that accentuates inherent weaknesses alongside corresponding encryption keys. Our study represents an investigation into the feasibility and effectiveness of employing machine learning, deep learning, and innovative random optimization techniques in cryptanalysis. Furthermore, it provides a comprehensive overview of the state-of-the-art advancements in this field over the past few years. The findings of this research are not only pivotal for the field of cryptanalysis but also hold significant implications for the broader realm of data security.
Exploring DQN-Based Reinforcement Learning in Autonomous Highway Navigation Performance Under High-Traffic Conditions Nugroho, Sandy; Setiadi, De Rosal Ignatius Moses; Islam, Hussain Md Mehedul
Journal of Computing Theories and Applications Vol. 1 No. 3 (2024): JCTA 1(3) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.9929

Abstract

Driving in a straight line is one of the fundamental tasks for autonomous vehicles, but it can become complex and challenging, especially when dealing with high-speed highways and dense traffic conditions. This research aims to explore the Deep-Q Networking (DQN) model, which is one of the reinforcement learning (RL) methods, in a highway environment. DQN was chosen due to its proficiency in handling complex data through integrated neural network approximations, making it capable of addressing high-complexity environments. DQN simulations were conducted across four scenarios, allowing the agent to operate at speeds ranging from 60 to nearly 100 km/h. The simulations featured a variable number of vehicles/obstacles, ranging from 20 to 80, and each simulation had a duration of 40 seconds within the Highway-Env simulator. Based on the test results, the DQN method exhibited excellent performance, achieving the highest reward value in the first scenario, 35.6117 out of a maximum of 40, and a success rate of 90.075%.
A Technical Review of the State-of-the-Art Methods in Aspect-Based Sentiment Analysis Yusuf, Kabir Kasum; Ogbuju, Emeka; Abiodun, Taiwo; Oladipo, Francisca
Journal of Computing Theories and Applications Vol. 1 No. 3 (2024): JCTA 1(3) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.9999

Abstract

With the advent and rapid advancement of text mining technology, a computer-based approach used to capture sentiment standpoints from data in textual form is increasingly becoming a promising field. Detailed information about sentiment can be provided using aspect-based sentiment analysis, which can be used in better decision-making. This study aims to study, observe, and classify previous methods used in aspect-based sentiment analysis. A systematic review is adopted as the method used to collect and review papers to achieve this research's aim. Papers focused on sentiment analysis, aspect extraction, and aspect aggregation from different academic databases such as Scopus, ScienceDirect, IEEE Explore, and Web of Science were gathered based on the inclusion and exclusion criteria of the study. The gathered papers were further reviewed to answer the stated research questions. The findings from the research show the most used methods for aspect extraction, sentiment analysis, and aspect aggregation in aspect-based sentiment analysis. This research offers a robust synthesis of evidence to guide further academic exploration in sentiment analysis.
Dataset Analysis and Feature Characteristics to Predict Rice Production based on eXtreme Gradient Boosting Wijayanti, Ella Budi; Setiadi, De Rosal Ignatius Moses; Setyoko, Bimo Haryo
Journal of Computing Theories and Applications Vol. 1 No. 3 (2024): JCTA 1(3) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10057

Abstract

Rice plays a vital role as the main food source for almost half of the global population, contributing more than 21% of the total calories humans need. Production predictions are important for determining import-export policies. This research proposes the XGBoost method to predict rice harvests globally using FAO and World Bank datasets. Feature analysis, removal of duplicate data, and parameter tuning were carried out to support the performance of the XGBoost method. The results showed excellent performance based on which reached 0.99. Evaluation of model performance using metrics such as MSE, and MAE measured by k-fold validation show that XGBoost has a high ability to predict crop yields accurately compared to other regression methods such as Random Forest (RF), Gradient Boost (GB), Bagging Regressor (BR) and K-Nearest Neighbor (KNN). Apart from that, an ablation study was also carried out by comparing the performance of each model with various features and state-of-the-art. The results prove the superiority of the proposed XGBoost method. Where results are consistent, and performance is better, this model can effectively support agricultural sustainability, especially rice production.
Enhancing Lung Cancer Classification Effectiveness Through Hyperparameter-Tuned Support Vector Machine Gomiasti, Fita Sheila; Warto, Warto; Kartikadarma, Etika; Gondohanindijo, Jutono; Setiadi, De Rosal Ignatius Moses
Journal of Computing Theories and Applications Vol. 1 No. 4 (2024): JCTA 1(4) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10106

Abstract

This research aims to improve the effectiveness of lung cancer classification performance using Support Vector Machines (SVM) with hyperparameter tuning. Using Radial Basis Function (RBF) kernels in SVM helps deal with non-linear problems. At the same time, hyperparameter tuning is done through Random Grid Search to find the best combination of parameters. Where the best parameter settings are C = 10, Gamma = 10, Probability = True. Test results show that the tuned SVM improves accuracy, precision, specificity, and F1 score significantly. However, there was a slight decrease in recall, namely 0.02. Even though recall is one of the most important measuring tools in disease classification, especially in imbalanced datasets, specificity also plays a vital role in avoiding misidentifying negative cases. Without hyperparameter tuning, the specificity results are so poor that considering both becomes very important. Overall, the best performance obtained by the proposed method is 0.99 for accuracy, 1.00 for precision, 0.98 for recall, 0.99 for f1-score, and 1.00 for specificity. This research confirms the potential of tuned SVMs in addressing complex data classification challenges and offers important insights for medical diagnostic applications.

Page 3 of 10 | Total Record : 96