cover
Contact Name
De Rosal Ignatius Moses Setiadi
Contact Email
moses@dsn.dinus.ac.id
Phone
-
Journal Mail Official
editorial.jcta@gmail.com
Editorial Address
H building, Dian Nuswantoro University Imam Bonjol street no. 207 Semarang, Central Java, Indonesia
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Computing Theories and Applications
ISSN : -     EISSN : 30249104     DOI : 10.62411/jcta
Core Subject : Science,
Journal of Computing Theories and Applications (JCTA) is a refereed, international journal that covers all aspects of foundations, theories and the practical applications of computer science. FREE OF CHARGE for submission and publication. All accepted articles will be published online and accessed for free. The review process is carried out rapidly, about two until three weeks, to get the first decision. The journal publishes only original research papers in the areas of, but not limited to: Artificial Intelligence Big Data Bioinformatics Biometrics Cloud Computing Computer Graphics Computer Vision Cryptography Data Mining Fuzzy Systems Game Technology Image Processing Information Security Internet of Things Intelligent Systems Machine Learning Mobile Computing Multimedia Technology Natural Language Processing Network Security Pattern Recognition Signal Processing Soft Computing Speech Processing Special emphasis is given to recent trends related to cutting-edge research within the domain. If you want to become an author(s) in this journal, you can start by accessing the About page. You can first read the Policies section to find out the policies determined by the JCTA. Then, if you submit an article, you can see the guidelines in the Author Guidelines or Author Guidelines section. Each journal submission will be made online and requires prospective authors to register and have an account to be able to submit manuscripts.
Articles 96 Documents
Explainable Bayesian Network Recommender for Personalized University Program Selection Kikunda, Philippe Boribo; Ndikumagenge, Jérémie; Ndayisaba, Longin; Nsabimana, Thierry
Journal of Computing Theories and Applications Vol. 3 No. 1 (2025): JCTA 3(1) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.12720

Abstract

In a context where students face increasingly complex academic choices, this work proposes a recommendation system based on Bayesian networks to guide new baccalaureate holders in their university choices. Using a dataset containing variables such as secondary school section, gender, type of school, percentage obtained, age, and first-year honors, we have constructed a probabilistic model capturing the dependencies between these characteristics and the option chosen. The data is collected at the Catholic University of Bukavu, the Official University of Bukavu, and the Higher Institute of Education of Bukavu, preprocessed and then used to learn the structure via the hill-climbing algorithm with the BIC score using R's bnlearn tool. The model enables us to estimate the probability that a candidate will choose a given stream, depending on their profile. The approach has been validated using metrics such as BIC, cross-validation, and bootstrap and offers a good compromise between interpretability and predictive performance. The results highlight the potential of Bayesian networks in constructing explainable recommendation systems in the field of academic guidance. The system produces orientation probability maps for each candidate, which can be used by enrollment service advisers, as well as an ordered list of options relevant to the candidate's profile. With a remarkable performance on a test sample of precision@k=0.85, recall@k=0.61, ndcg=0.8, and Map=0.88, it constitutes an effective lever for reducing the risk of being misdirected in universities in South-Kivu, in the Democratic Republic of Congo
A Novel Clustering Solution Based on Energy Threshold for Energy Efficiency Purposes in Wireless Sensor Networks Vu, Thang C.; Do, Binh D.; Nguyen, Mui D.; Nguyen, Dung T.; Nguyen, Tao V.; Dinh, Long Q.; Nguyen, Hung T.; Nguyen, Minh T.
Journal of Computing Theories and Applications Vol. 3 No. 1 (2025): JCTA 3(1) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.13022

Abstract

In many wireless sensor network (WSN) applications, nodes are randomly deployed and self-organize into a wireless network to perform tasks. In practice, recharging the batteries of network nodes after deployment is often difficult. Network nodes often operate autonomously, so the main focus is on increasing the node lifetime. Data redundancy is another limitation that makes nodes inefficient. In most cases, densely deployed nodes in a monitoring area will have redundant data from neighboring nodes. Therefore, we propose a clustering technique to select the Cluster Head (CH) node in small-scale WSNs. Since transmission consumes more energy than data collection, this protocol enables reactive routing, where transmission occurs only when a certain threshold is reached. In addition, based on their heterogeneous energy levels, nodes can be grouped into three categories: Normal, Intermediate, and Advanced. Simulation results in MATLAB/Simulink show that, after approximately 3000 rounds, the proposed method successfully transmitted about 3.1 × 104 packets to the base station, compared to 2.3 × 104 packets for the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. In addition, the time when the last node died was approximately 3,500 rounds, whereas the LEACH protocol only maintained about 1,500 rounds. The results have shown the effectiveness of this technique in reducing the dead node rate and increasing packet transmission efficiency.
An Integrated Framework for Optimizing Customer Retention Budget using Clustering, Classification, and Mathematical Optimization Prashanthan, Amirthanathan
Journal of Computing Theories and Applications Vol. 3 No. 1 (2025): JCTA 3(1) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.13194

Abstract

The study presents a comprehensive framework for optimizing customer retention budget by integrating clustering, classification, and mathematical optimization techniques. The study begins with the IBM Telco dataset, which is prepared through data cleansing, encoding, and scaling.  In the preliminary phase, customer segmentation is performed using K-Means clustering, with k = 3 and k = 4 identified as optimal based on the elbow method and Silhouette score. The configurations produced three (Premium, Standard, Low) and four (Premium, Standard Plus, Standard, Low) customer segments based on purchase preferences, which served as input features for churn prediction. In the second phase, the dataset was divided into training and test sets in an 80:20 ratio, followed by data balancing using the Synthetic Minority Over-sampling Technique (SMOTE) and Edited Nearest Neighbors (ENN). Multiple classification algorithms were evaluated, including Naive Bayes (NB), Random Forest (RF), Categorical Boosting (CatBoost), Light Gradient Boosting Machine (LightGBM), Extreme Gradient Boosting (XGBoost), Gradient Boosting (GB), Support Vector Machine (SVM), Logistic Regression (LR), K-Nearest Neighbors (KNN), and Multi-Layer Perceptron (MLP) using F1-score as the performance metric. CatBoost and LightGBM, with k values of 3 and 4, respectively, were the highest-performing classification models, with only minimal differences in performance.    Ultimately, customer segmentation established customer prioritization, whereas churn prediction assessed customer churn likelihood. Four distinct configurations were assessed utilizing mixed-integer linear programming (MILP) to optimise retention budget allocation within uniform budget constraints, discount amounts, and churn thresholds. In both the k=3 and k=4 scenarios, CatBoost surpassed LightGBM, with CatBoost at K=3 effectively discounting 66% of at-risk consumers across all three segments, hence improving the intervention's efficacy and budget allocation, making it the ideal choice for maximizing customer retention. The results demonstrate the importance of segmentation in enhancing retention budgeting and budget optimization, particularly concerning parameter sensitivity.
Indoor Positioning using Smartphones: An Improved Time-of-Arrival Technique Vu, Thang C.; Nguyen, Trung H.; Nguyen, Mui D.; Nguyen, Dung T.; Nguyen, Tao V.; Dinh, Long Q.; Nguyen, Minh T.
Journal of Computing Theories and Applications Vol. 3 No. 1 (2025): JCTA 3(1) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.13305

Abstract

Indoor positioning technology based on smartphones plays an important role in the current technological development context. Especially in applications such as warehouses, supermarkets, hospitals, or buildings. While the global positioning system (GNSS) is popular and effective outdoors, it has several limitations when operating in enclosed spaces, such as indoors, due to the complexity of these environments. Smartphones have many built-in sensors (such as light sensors, sound sensors, gyroscopes, accelerometers, and magnetic sensors) and support the connection of various types of wireless communication technologies such as Wi-Fi and Bluetooth. However, such sensors were not initially developed for positioning applications. This study addresses the positioning problem using the MUSIC technique in conjunction with the Time of Arrival (ToA) method. The effectiveness of the positioning solution is evaluated through the signal-to-noise ratio (SNR) index. The absolute error and squared error indices are evaluated through the cumulative distribution function (CDF) to indicate the effectiveness of the proposed solution. Additionally, we propose a Pedestrian Dead Reckoning method to determine a person's position in indoor environments continuously. Based on the segmentation of the moving process by turns, the direction measurements in each segment are processed using a Kalman filter, which is designed to enhance the results achieved by the system. We also discuss the challenges and some future research directions in the field of smartphone-based indoor positioning.
IoT-Based Home Electricity Monitoring and Consumption Forecasting using k-NN Regression for Efficient Energy Management Angdresey, Apriandy; Sitanayah, Lanny; Rumpesak, Zefanya Marieke Philia; Ooi, Jing-Quan
Journal of Computing Theories and Applications Vol. 3 No. 1 (2025): JCTA 3(1) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.13602

Abstract

Electricity has emerged as an essential requirement in modern life. As demand escalates, electricity costs rise, making wastefulness a drain on financial resources. Consequently, forecasting electricity usage can enhance our management of consumption. This study presents an IoT-based monitoring and forecasting system for electricity consumption. The system comprises two NodeMCU micro-controllers, a PZEM-004T sensor for collecting real-time power data, and three relays that regulate the current flow to three distinct electrical appliances. The data gathered is transmitted to a web application utilizing the k-Nearest Neighbor (k-NN) algorithm to forecast future electricity usage based on historical patterns. We evaluated the system's performance using four weeks of electricity consumption data. The results indicated that predictions were most accurate when the user’s daily consumption pattern remained stable, achieving a Mean Absolute Error (MAE) of approximately 1 watt and a Mean Absolute Percentage Error (MAPE) ranging from 1% to 1.7%. Additionally, predictions were notably precise during the early morning hours (3:00 AM to 8:00 AM) when k=6 was employed. This study demonstrates the effectiveness of integrating IoT-based systems with machine learning for real-time energy monitoring and forecasting. Furthermore, it emphasizes the application of data mining techniques within embedded IoT environments, providing valuable insights into the implementation of lightweight machine learning for smart energy systems.
Predicting First-Year Student Performance with SMOTE-Enhanced Stacking Ensemble and Association Rule Mining for University Success Profiling Kikunda, Philippe Boribo; Kasongo, Issa Tasho; Nsabimana, Thierry; Ndikumagenge, Jérémie; Ndayisaba, Longin; Mushengezi, Elie Zihindula; Kala, Jules Raymond
Journal of Computing Theories and Applications Vol. 3 No. 2 (2025): JCTA 3(2) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.14043

Abstract

This study examines the application of Educational Data Mining (EDM) to predict the academic per-formance of first-year students at the Catholic University of Bukavu and the Higher Institute of Edu-cation (ISP) in the Democratic Republic of Congo. The primary objective is to develop a model that can identify at-risk students early, providing the university with a tool to enhance student support and academic guidance. To address the challenges posed by data imbalance (where successful cases outnumber failures), the study adopts a hybrid methodological approach. First, the SMOTE algorithm was applied to balance the dataset. Then, a stacking classification model was developed to combine the predictive power of multiple algorithms. The variables used for prediction include the National Exam score (PEx), the secondary school track (Humanities), and the type of prior institution (public, private, or religious-affiliated schools), as well as age and sex. The results demonstrate that this approach is highly effective. The model is not only capable of predicting success or failure but also of forecasting students' performance levels (e.g., honors or distinctions). Moreover, the use of the Apriori association rule mining algorithm allowed the identification of faculty-specific success profiles, transforming prediction into an interpretable decision-support tool. This research makes several significant contributions. Practically, it provides the University of Bukavu with a tool for student orientation and early risk detection. Methodologically, it illustrates the effectiveness of a combined approach to EDM in an African context. However, the study acknowledges certain limitations, including the non-public nature of the data and the geographical specificity of the sample. It therefore proposes avenues for future research, such as the integration of Explainable AI (XAI) techniques for more refined and transparent analysis of the results.
Fake News Detection Using Bi-LSTM Architecture: A Deep Learning Approach on the ISOT Dataset Lawal, Maaruf M.; Abdulrauf, Abdulrashid
Journal of Computing Theories and Applications Vol. 3 No. 2 (2025): JCTA 3(2) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.14235

Abstract

The proliferation of fake news across digital platforms has raised critical concerns about information reliability. A notable example is the viral rumour falsely claiming that the Nigerian Minister of the Federal Capital Territory, Nyesom Wike, had collapsed at an event and was rushed to an undisclosed hospital an entirely fabricated claim that caused public confusion. While both traditional machine learning and deep learning approaches have been explored for automated fake news detection, many existing models have been limited to topic-specific datasets and often suffer from overfitting, especially on smaller datasets like ISOT. This study addresses these challenges by proposing a standalone Bidirectional Long Short-Term Memory (BiLSTM) model for fake news classification using the ISOT dataset. Unlike multi-modal frameworks such as the MM-FND model by state-of-the-art model, which achieved 96.3% accuracy, the proposed BiLSTM model achieved superior results with 98.98% accuracy, 98.22% precision, 99.65% recall, and a 98.93% F1-score. The model demonstrated balanced classification across both fake and real news and exhibited strong generalization capabilities. However, training and validation performance plots revealed signs of overfitting after epoch 2, suggesting the need for regularization in future work. This study contributes to the growing body of research on fake news detection by showcasing the efficacy of a focused, sequential deep learning model over more complex architectures, offering a practical, scalable, and robust solution to misinformation detection
Hybrid Dynamic Programming Healthcare Cloud-Based Quality of Service Optimization Sitlong, Nengak I.; Evwiekpaefe, Abraham E.; Irhebhude, Martins E.
Journal of Computing Theories and Applications Vol. 3 No. 2 (2025): JCTA 3(2) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.14455

Abstract

The integration of Internet of Things (IoT) with cloud computing has revolutionized healthcare systems, offering scalable and real-time patient monitoring. However, optimizing response times and energy consumption remains crucial for efficient healthcare delivery. This research evaluates various algorithmic approaches for workload migration and resource management within IoT cloud-based healthcare systems. The performance of the implemented algorithm in this research, Hybrid Dynamic Programming and Long Short-Term Memory (Hybrid DP+LSTM), was analyzed against other six key algorithms, namely Gradient Optimization with Back Propagation to Input (GOBI), Deep Reinforcement Learning (DRL), improved GOBI (GOBI2), Predictive Offloading for Network Devices (POND), Mixed Integer Linear Programming (MILP), and Genetic Algorithm (GA) based on their average response time and energy consumption. Hybrid DP+LSTM achieves the lowest response time (82.91ms) with an energy consumption of 2,835,048 joules per container. The outcome of the analysis showed that Hybrid DP+LSTM have significant response times improvement, with percentage increases of 89.3%, 79.0%, 83.8%, 97.0%, 99.8%, and 99.94% against GOBI, GOBI2, DRL, POND, MILP, and GA, respectively. In terms of energy consumption, Hybrid DP+LSTM outperforms other approaches, with GOBI2 (3,664,337 joules) consuming 29.3% more energy, DRL (2,973,238 joules) consuming 4.9% more, GOBI (4,463,010 joules) consuming 57.4% more, POND (3,310,966 joules) consuming 16.8% more, MILP (3,005,498 joules) consuming 6.0% more, and the GA (3,959,935 joules) consuming 39.7% more. The result of ablation of the Hybrid DP+LSTM model achieves a 47.05% improvement over DP-only (156.57ms) and a 70.64% improvement over LSTM-only (282.41ms) in response time. On the energy efficiency side, Hybrid DP+LSTM shows 22.80% improvement over LSTM-only (3,671,51 joules), but 7.34% underperformance compared to DP-only (2,640,93). These research findings indicate that the Hybrid DP+LSTM technique provides the best trade-off between response time and energy efficiency. Future research should further explore hybrid approaches to optimize these metrics in IoT cloud-based healthcare systems.
Investigating a SMOTE-Tomek Boosted Stacked Learning Scheme for Phishing Website Detection: A Pilot Study Ugbotu, Eferhire Valentine; Emordi, Frances Uchechukwu; Ugboh, Emeke; Anazia, Kizito Eluemunor; Odiakaose, Christopher Chukwufunaya; Onoma, Paul Avwerosuoghene; Idama, Rebecca Okeoghene; Ojugo, Arnold Adimabua; Geteloma, Victor Ochuko; Oweimieotu, Amanda Enaodona; Aghaunor, Tabitha Chukwudi; Binitie, Amaka Patience; Odoh, Anne; Onochie, Chris Chukwudi; Ezzeh, Peace Oguguo; Eboka, Andrew Okonji; Agboi, Joy; Ejeh, Patrick Ogholuwarami
Journal of Computing Theories and Applications Vol. 3 No. 2 (2025): JCTA 3(2) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.14472

Abstract

The daily exchange of informatics over the Internet has both eased the widespread proliferation of resources to ease accessibility, availability and interoperability of accompanying devices. In addition, the recent widespread proliferation of smartphones alongside other computing devices has continued to advance features such as miniaturization, portability, data access ease, mobility, and other merits. It has also birthed adversarial attacks targeted at network infrastructures and aimed at exploiting interconnected cum shared resources. These exploits seek to compromise an unsuspecting user device cum unit. Increased susceptibility and success rate of these attacks have been traced to user's personality traits and behaviours, which renders them repeatedly vulnerable to such exploits especially those rippled across spoofed websites as malicious contents. Our study posits a stacked, transfer learning approach that seeks to classify malicious contents as explored by adversaries over a spoofed, phishing websites. Our stacked approach explores 3-base classifiers namely Cultural Genetic Algorithm, Random Forest, and Korhonen Modular Neural Network – whose output is utilized as input for XGBoost meta-learner. A major challenge with learning scheme(s) is the flexibility with the selection of appropriate features for estimation, and the imbalanced nature of the explored dataset for which the target class often lags behind. Our study resolved dataset imbalance challenge using the SMOTE-Tomek mode; while, the selected predictors was resolved using the relief rank feature selection. Results shows that our hybrid yields F1 0.995, Accuracy 0.997, Recall 0.998, Precision 1.000, AUC-ROC 0.997, and Specificity 1.000 – to accurately classify all 2,764 cases of its held-out test dataset. Results affirm that it outperformed bench-mark ensembles. Result shows the proposed model explored UCI Phishing Website dataset, and effectively classified phishing (cues and lures) contents on websites.
EDANet: A Novel Architecture Combining Depthwise Separable Convolutions and Hybrid Attention for Efficient Tomato Disease Recognition Ibrahim, Yusuf; O. Momoh, Muyideen; O. Shobowale, Kafayat; Mukhtar Abubakar, Zainab; Yahaya, Basira
Journal of Computing Theories and Applications Vol. 3 No. 2 (2025): JCTA 3(2) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.14620

Abstract

Tomato crop yields face significant threats from plant diseases, with existing deep learning solutions often computationally prohibitive for resource-constrained agricultural settings; to address this gap, we propose Efficient Disease Attention Network (EDANet), a novel lightweight architecture combining depthwise separable convolutions with hybrid attention mechanisms for efficient Tomato disease recognition. Our approach integrates channel and spatial attention within hierarchical blocks to prioritize symptomatic regions while utilizing depthwise decomposition to reduce parameters to only 104,043 (multiple times smaller than MobileNet and EfficientNet). Evaluated on ten tomato disease classes from PlantVillage, EDANet achieves 97.32% accuracy and exceptional (~1.00) micro-AUC, with perfect recognition of Mosaic virus (100% F1-score) and robust performance on challenging cases like Early blight (93.2% F1) and Target Spot (93.6% F1). The architecture processes 128×128 RGB images in ~23ms on standard CPUs, enabling real-time field diagnostics without GPU dependencies. This work bridges laboratory AI and practical farm deployment by optimizing the accuracy-efficiency tradeoff, providing farmers with an accessible tool for early disease intervention in resource-limited environments.

Page 9 of 10 | Total Record : 96