cover
Contact Name
De Rosal Ignatius Moses Setiadi
Contact Email
moses@dsn.dinus.ac.id
Phone
-
Journal Mail Official
editorial.jcta@gmail.com
Editorial Address
H building, Dian Nuswantoro University Imam Bonjol street no. 207 Semarang, Central Java, Indonesia
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Computing Theories and Applications
ISSN : -     EISSN : 30249104     DOI : 10.62411/jcta
Core Subject : Science,
Journal of Computing Theories and Applications (JCTA) is a refereed, international journal that covers all aspects of foundations, theories and the practical applications of computer science. FREE OF CHARGE for submission and publication. All accepted articles will be published online and accessed for free. The review process is carried out rapidly, about two until three weeks, to get the first decision. The journal publishes only original research papers in the areas of, but not limited to: Artificial Intelligence Big Data Bioinformatics Biometrics Cloud Computing Computer Graphics Computer Vision Cryptography Data Mining Fuzzy Systems Game Technology Image Processing Information Security Internet of Things Intelligent Systems Machine Learning Mobile Computing Multimedia Technology Natural Language Processing Network Security Pattern Recognition Signal Processing Soft Computing Speech Processing Special emphasis is given to recent trends related to cutting-edge research within the domain. If you want to become an author(s) in this journal, you can start by accessing the About page. You can first read the Policies section to find out the policies determined by the JCTA. Then, if you submit an article, you can see the guidelines in the Author Guidelines or Author Guidelines section. Each journal submission will be made online and requires prospective authors to register and have an account to be able to submit manuscripts.
Articles 96 Documents
A Comprehensive Approach to Protocols and Security in Internet of Things Technology Ntayagabiri, Jean Pierre; Bentaleb, Youssef; Ndikumagenge, Jeremie; EL Makhtoum, Hind
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.11660

Abstract

The exponential growth of the Internet of Things (IoT) introduces a multitude of security challenges, as a vast number of connected devices often operate with inadequate protection measures. This vulnerability heightens the risk of cyberattacks, data breaches, and hacking, exposing systems and sensitive information to increased threats. Ensuring security in the IoT ecosystem while considering this rapidly expanding technology's physical limitations and specific requirements is a complex task. This article comprehensively analyzes the primary vulnerabilities and risks associated with IoT, exploring innovative strategies and effective solutions to strengthen its security framework. The article highlights the critical role of secure device authentication, data encryption, regular updates, and continuous monitoring by addressing the intricacies of communication protocols and emphasizing the need for standardization. Ultimately, this work advocates for a holistic approach to IoT security, where robust, adaptable solutions are developed to safeguard against the evolving landscape of cyber threats.
Sentiment Analysis for Political Debates on YouTube Comments using BERT Labeling, Random Oversampling, and Multinomial Naïve Bayes Angdresey, Apriandy; Sitanayah, Lanny; Tangka, Ignatius Lucky Henokh
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.11668

Abstract

The 2024 Indonesian Presidential Election marked the fifth general election in the country, aimed at electing a new President and Vice President for the 2024–2029 term. Candidates competed to succeed the outgoing president, who had served two constitutional terms. A key aspect of this election was the candidate debates, where each candidate presented their vision, allowing the public to assess their policies. These debates were broadcast on platforms like YouTube, giving the public a space to comment. However, analyzing YouTube comments presents challenges due to the volume of data, language diversity, and informal expressions. Sentiment analysis, crucial for understanding public opinion, uses algorithms such as Naïve Bayes, which is based on Bayes' Theorem and assumes feature independence. Naïve Bayes is widely used in text analysis for its speed and simplicity. When applied to YouTube comments from the 2024 debates, the algorithm demonstrated its effectiveness, especially with a balanced dataset through random oversampling. It achieved 85.155% accuracy, high precision, recall, and an AUC of 96.8% on an 80:20 data split. Its fast classification time (0.000998 seconds) makes it suitable for real-time sentiment analysis, validating its use for political events. Future applications may incorporate advanced techniques like BERT for more sophisticated analysis.
Classifying School Scope Using Deep Neural Networks Based on Students' Surrounding Living Environments Karyudi, Mochammad Daffa Putra; Zubair, Anis
Journal of Computing Theories and Applications Vol. 2 No. 2 (2024): JCTA 2(2) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.11739

Abstract

This research investigates school scope classification using Deep Neural Networks (DNN), focusing on students living environments and educational opportunities. By addressing the interplay of socioeconomic and educational factors, the study aims to develop an analytical framework for understanding how environmental contexts shape academic trajectories. The research provides a nuanced understanding of the importance of features in educational classification by developing DNN models based on Spearman's Rank Correlation Coefficient (SRCC). The methodology employs machine learning techniques, integrating data wrangling, exploratory analysis, and multiple DNN models with K-fold cross-validation. The study analyzes 677 student records from two schools. The research examined multiple model configurations. Results show that the 'All Data' model achieved 83.08% accuracy, the 'Top 5' model 81.54%, and the 'Non-Top 5' model 79.23%. The SRCC-based approach revealed that while top correlated features are important, additional variables significantly contribute to model performance. The study highlights the profound impact of family background, social environment, and educational contexts on school selection. Furthermore, it demonstrates DNN's capability to uncover intricate, non-linear relationships, offering actionable insights for policymakers to leverage machine learning's potential in developing targeted educational strategies.
A Quantum Circuit Learning-based Investigation: A Case Study in Iris Benchmark Dataset Binary Classification Akrom, Muhamad; Herowati, Wise; Setiadi, De Rosal Ignatius Moses
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.11779

Abstract

This study presents a Quantum Machine Learning (QML) architecture for perfectly classifying the Iris flower dataset. The research addresses improving classification accuracy using quantum models in machine-learning tasks. The objective is to demonstrate the effectiveness of QML approaches, specifically the Variational Quantum Circuit (VQC), Quantum Neural Network (QNN), and Quantum Support Vector Machine (QSVM), in achieving high performance on the Iris dataset. The proposed methods result in perfect classification, with all models attaining accuracy, precision, recall, and an F1-score of 1.00. The main finding is that the QML architecture successfully achieves flawless classification, contributing significantly to the field. These results underscore the potential of QML in solving complex classification problems and highlight its promise for future applications across various domains. The study concludes that QML techniques can offer transformative solutions in machine learning tasks, particularly those leveraging VQC, QNN, and QSVM.
Enhanced Diagnosis of Skin Cancer from Dermoscopic Images Using Alignment Optimized Convolutional Neural Networks and Grey Wolf Optimization Mazhar, Faheem; Aslam, Naeem; Naeem, Ahmad; Ahmad, Haroon; Fuzail, Muhammad; Imran, Muhammad
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.11954

Abstract

Skin cancer (SC) is a highly serious kind of cancer that, if not addressed swiftly, might result in the patient’s demise. Early detection of this condition allows for more effective therapy and prevents disease development. Deep Learning (DL) approaches may be used as an effective and efficient tool for SC detection (SCD). Several DL-based algorithms for automated SCD have been reported. However, more efficient models are needed to improve accuracy. As a result, this paper introduces a new strategy for SCD based on Grey Wolf optimization (GWO) methodologies and CNN. The proposed methodology has four stages: preprocessing, segmentation, feature extraction, and classification. The proposed method utilizes a Convolutional Neural Network (CNN) to extract features from Regions of Interest (ROIs). CNN is employed for feature categorization, whereas the GWO approach enhances accuracy by refining edge detection and segmentation. This technique utilizes a probabilistic model to accelerate the convergence of the GWO algorithm. Employing the GWO model to optimize the structure and weight vectors of CNNs can enhance diagnostic accuracy by a minimum of 5%, based on evaluation outcomes. The application of the proposed strategy and its performance comparison with other methods indicate that the proposed method with GWO predicted SC with an average accuracy of 95.11% and without GWO an Accuracy of 92.66%, respectively, enhancing accuracy by a minimum of 2.5% when we train our model with GWO.
A Comparative Analysis of Supervised Machine Learning Algorithms for IoT Attack Detection and Classification Ntayagabiri, Jean Pierre; Bentaleb, Youssef; Ndikumagenge, Jeremie; El Makhtoum, Hind
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.11901

Abstract

The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, necessitating robust attack detection mechanisms. This study presents a comprehensive comparative analysis of ten supervised learning algorithms for IoT attack detection and classification, addressing the critical challenge of balancing detection accuracy with practical deployment constraints. Using the CICIoT2023 dataset, encompassing data from 105 IoT devices and 33 attack types, we evaluate Naive Bayes, Artificial Neural Networks (ANN), Logistic Regression (LR), k-NN, XGBoost, Random Forest (RF), LightGBM, GRU, LSTM, and CNN algorithms based on some performance metrics. The comparative test results show superior performance to the traditional ensemble approach, with RF achieving 99.29% accuracy and leading precision (82.30%), followed closely by XGBoost with 99.26% accuracy and 79.60% precision. Deep learning approaches also demonstrate strong capabilities, with CNN achieving 98.33% accuracy and 71.18% precision, though these metrics indicate ongoing challenges with class imbalance. The analysis of confusion matrices reveals varying success across different attack types, with some algorithms showing perfect detection rates for certain attacks while struggling with others. The study highlights a crucial distinction in IoT security: while high precision remains important, the potentially catastrophic impact of missed attacks necessitates equal attention to recall metrics, as evidenced by the varying recall rates across algorithms (RF: 72.19%, XGBoost: 71.69%, CNN: 64.72%). These findings provide vital insights for developing balanced, context-aware intrusion detection systems for IoT environments, emphasizing the need to consider performance metrics and practical deployment constraints.
Improving Credit Card Fraud Detection with Ensemble Deep Learning-Based Models: A Hybrid Approach Using SMOTE-ENN Bonde, Lossan; Bichanga, Abdoul Karim
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.12021

Abstract

Advances in information and internet technologies have significantly transformed the business environment, including the financial sector. The COVID-19 pandemic has further accelerated this digital adoption, expanding the e-commerce industry and highlighting the necessity for secure online transactions. Credit Card Fraud Detection (CCFD) stands critical as the prevalence of fraudulent activities continues to rise with the increasing volume of online transactions. Traditional methods for detecting fraud, such as rule-based systems and basic machine learning models, tend to fail to keep pace with fraudsters' evolving tactics. This study proposes a novel ensemble deep learning-based approach that combines Convolutional Neural Networks (CNN), Gated Recurrent Units (GRU), and Multilayer Perceptron (MLP) with the Synthetic Minority Oversampling Technique and Edited Nearest Neighbors (SMOTE-ENN) to address class imbalance and improve detection accuracy. The methodology integrates CNN for feature extraction, GRU for sequential transaction analysis, and Multilayer Perceptron (MLP) as a meta-learner in a stacking framework. By leveraging SMOTE-ENN, the proposed approach enhances data balance and prevents overfitting. With synthetic data, the robustness and accuracy of the model have been improved, particularly in scenarios where fraudulent examples are scarce. The experiments conducted on real-world credit card transaction datasets have established that our approach outperforms existing methods, achieving higher metrics performance.
A Low-Cost Hydroponic Monitoring System with Internet of Things and Fuzzy Logic Sitanayah, Lanny; Joseph, Hizkia R.M.; Sanger, Junaidy B.
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.12059

Abstract

The need for urban communities to consume vegetables is increasing. This has caused people to start cultivating vegetables using hydroponic techniques. However, due to their busy activities, they do not have enough time to monitor and control hydroponics, which must always be in ideal conditions. This paper designs and implements an Internet of Things-based monitoring system to help hydroponic owners monitor their hydroponics anywhere and anytime. The built system requires a monitoring device assembled using a NodeMCU ESP8266 microcontroller, a pH detection detector sensor, and a DHT22 temperature and humidity sensor. This system uses the Mamdani Fuzzy Logic algorithm to determine warnings to be displayed on the application interface when the water pH, temperature, and humidity are in certain conditions. The Mamdani Fuzzy Logic algorithm can interpret environmental data into a warning that humans can easily understand, even if they lack technical expertise. In addition to being able to help monitor, this system also allows owners to find out what elements need to be added or changed for their hydroponic place. Our evaluation results show that the defuzzification stage in the application has high accuracy, which is 99.92%, compared to Matlab’s results.
Human Action Recognition in Military Obstacle Crossing Using HOG and Region-Based Descriptors Kolawole, Adeola O.; Irhebhude, Martins E.; Odion , Philip O.
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.12195

Abstract

Human action recognition involves recognizing and classifying actions performed by humans. It has many applications, including sports, healthcare, and surveillance. Challenges such as a limited number of classes of activities and variations within inter and intra-class groups lead to high misclassification rates in some of the intelligent systems developed. Existing studies focused mainly on using public datasets with little focus on real-life action datasets, with limited research on HAR for military obstacle-crossing activities.  This paper focuses on recognizing human actions in an obstacle-crossing competition video sequence where multiple participants are performing different obstacle-crossing activities. This study proposes a feature descriptor approach that combines a Histogram of Oriented Gradient and Region Descriptors (HOGReG) for human action recognition in a military obstacle crossing competition. The dataset was captured during military trainees’ obstacle-crossing exercises at a military training institution to achieve this objective. Images were segmented into background and foreground using a Grabcut-based segmentation algorithm, and thereafter, features were extracted and used for classification. The features were extracted using a Histogram of Oriented Gradient (HOG) and region descriptors from segmented images. The extracted features are presented to a neural network classifier for classification and evaluation. The experimental results recorded 63.8%, 82.6%, and 86.4% recognition accuracies using the region descriptors HOG and HOGReG, respectively. The region descriptor gave a training time of 5.6048 seconds, while HOG and HOGReG reported 32.233 and 31.975 seconds, respectively. The outcome shows how effectively the suggested model performed.
Feature Fusion with Albumentation for Enhancing Monkeypox Detection Using Deep Learning Models Pratama, Nizar Rafi; Setiadi, De Rosal Ignatius Moses; Harkespan, Imanuel; Ojugo, Arnold Adimabua
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.12255

Abstract

Monkeypox is a zoonotic disease caused by Orthopoxvirus, presenting clinical challenges due to its visual similarity to other dermatological conditions. Early and accurate detection is crucial to prevent further transmission, yet conventional diagnostic methods are often resource-intensive and time-consuming. This study proposes a deep learning-based classification model by integrating Xception and InceptionV3 using feature fusion to enhance performance in classifying Monkeypox skin lesions. Given the limited availability of annotated medical images, data augmentation was applied using Albumentation to improve model generalization. The proposed model was trained and evaluated on the Monkeypox Skin Lesion Dataset (MSLD), achieving 85.96% accuracy, 86.47% precision, 85.25% recall, 78.43% specificity, and an AUC score of 0.8931, outperforming existing methods. Notably, data augmentation significantly improved recall from 81.23% to 85.25%, demonstrating its effectiveness in enhancing sensitivity to positive cases. Ablation studies further validated that augmentation increased overall accuracy from 82.02% to 85.96%, emphasizing its role in improving model robustness. Comparative analysis with other models confirmed the superiority of our approach. This research enhances automated Monkeypox detection, offering a robust and efficient tool for low-resource clinical settings. The findings reinforce the potential of feature fusion and augmentation in improving deep learn-ing-based medical image classification, facilitating more reliable and accessible disease identification.

Page 7 of 10 | Total Record : 96