Journal of Computing Theories and Applications https://publikasi.dinus.ac.id/index.php/jcta <div style="border: 3px #086338 Dashed; padding: 10px; background-color: #ffffff; text-align: left;"> <ol> <li><strong>Journal Title </strong>: Journal of Computing Theories and Applications</li> <li><strong>Online ISSN </strong>: <a href="https://portal.issn.org/resource/ISSN/3024-9104">3024-9104</a> </li> <li><strong>Frequency </strong>: Quarterly (February, May, August, and November) </li> <li><strong>DOI Prefix</strong>: 10.62411/jcta</li> <li><strong>Publisher </strong>: Universitas Dian Nuswantoro</li> </ol> </div> <div id="focusAndScope"> <p>Journal of Computing Theories and Applications (JCTA) is a refereed, international journal that covers all aspects of foundations, theories and the practical applications of computer science. <strong>FREE OF CHARGE</strong> for submission and publication. All accepted articles will be published online, get <strong>DOI CROSSREF</strong> and <strong>OPEN ACCESS</strong>. The rapid peer-reviewed process takes approximately two to four weeks for the first decision. The journal publishes only original research papers in the areas of, but not limited to.</p> <p>Artificial Intelligence<br />Big Data<br />Bioinformatics<br />Biometrics<br />Cloud Computing<br />Computer Graphics<br />Computer Vision<br />Cryptography<br />Data Mining<br />Fuzzy Systems<br />Game Technology<br />Image Processing<br />Information Security<br />Internet of Things<br />Intelligent Systems<br />Machine Learning<br />Mobile Computing<br />Multimedia Technology<br />Natural Language Processing<br />Network Security<br />Pattern Recognition<br />Quantum Informatics<br />Signal Processing<br />Soft Computing<br />Speech Processing</p> <p><br />Special emphasis is given to recent trends related to cutting-edge research within the domain.</p> </div> <div id="peerReviewProcess"> </div> <div id="sponsors"> <p> </p> </div> en-US editorial.jcta@dinus.id (JTCA Editorial) editorial.jcta@gmail.com (JTCA Editorial Support Team) Fri, 28 Feb 2025 00:00:00 +0000 OJS 3.2.1.4 http://blogs.law.harvard.edu/tech/rss 60 Leveraging Variational Quantum-Classical Algorithms for Enhanced Lung Cancer Prediction https://publikasi.dinus.ac.id/index.php/jcta/article/view/10424 <p>This work explores the potential of PennyLane and variational quantum-classical algorithms (VQCA) to forecast lung cancer using a structured dataset. The VQCA model performs exceptionally well, with flawless training, validation, and test accuracies of 1.0, demonstrating its capacity to identify patterns in the dataset and provide reliable predictions successfully. Contrarily, the accuracy of the quantum neural network (QNN) and classical neural network (NN) models is lower, demonstrating the benefits of utilizing quantum computing methods for enhanced predictive modeling. We provide a complete examination of the data, stressing the better performance of the VQCA model and its promise in correctly predicting lung cancer. The results highlight the importance of quantum-classical algorithms and help us understand the benefits and drawbacks of various strategies for predicting lung cancer. The study highlights the potential applications of quantum computing techniques in advancing the field of healthcare analytics. It shows the capability of the VQCA model to predict lung cancer using a tabular dataset accurately. Further research in this area is needed to explore scalability and practical implementation aspects. In summary, this study showcases the potential of VQCA and PennyLane in predicting lung cancer and underscores the benefits of quantum computing techniques in healthcare analytics.</p> Philip Omoniyi Adebayo, Frederick Basaky, Edgar Osaghae Copyright (c) 2024 Philip Omoniyi Adebayo, Frederick Basaky, Edgar Osaghae3 https://creativecommons.org/licenses/by/4.0 https://publikasi.dinus.ac.id/index.php/jcta/article/view/10424 Fri, 06 Dec 2024 00:00:00 +0000 A Comprehensive Approach to Protocols and Security in Internet of Things Technology https://publikasi.dinus.ac.id/index.php/jcta/article/view/11660 <p>The exponential growth of the Internet of Things (IoT) introduces a multitude of security challenges, as a vast number of connected devices often operate with inadequate protection measures. This vulnerability heightens the risk of cyberattacks, data breaches, and hacking, exposing systems and sensitive information to increased threats. Ensuring security in the IoT ecosystem while considering this rapidly expanding technology's physical limitations and specific requirements is a complex task. This article comprehensively analyzes the primary vulnerabilities and risks associated with IoT, exploring innovative strategies and effective solutions to strengthen its security framework. The article highlights the critical role of secure device authentication, data encryption, regular updates, and continuous monitoring by addressing the intricacies of communication protocols and emphasizing the need for standardization. Ultimately, this work advocates for a holistic approach to IoT security, where robust, adaptable solutions are developed to safeguard against the evolving landscape of cyber threats.</p> Jean Pierre Ntayagabiri, Youssef Bentaleb, Jeremie Ndikumagenge, Hind EL Makhtoum Copyright (c) 2024 Jean Pierre Ntayagabiri, Youssef Bentaleb, Jeremie Ndikumagenge, Hind EL Makhtoum https://creativecommons.org/licenses/by/4.0 https://publikasi.dinus.ac.id/index.php/jcta/article/view/11660 Tue, 24 Dec 2024 00:00:00 +0000 Sentiment Analysis for Political Debates on YouTube Comments using BERT Labeling, Random Oversampling, and Multinomial Naïve Bayes https://publikasi.dinus.ac.id/index.php/jcta/article/view/11668 <p>The 2024 Indonesian Presidential Election marked the fifth general election in the country, aimed at electing a new President and Vice President for the 2024–2029 term. Candidates competed to succeed the outgoing president, who had served two constitutional terms. A key aspect of this election was the candidate debates, where each candidate presented their vision, allowing the public to assess their policies. These debates were broadcast on platforms like YouTube, giving the public a space to comment. However, analyzing YouTube comments presents challenges due to the volume of data, language diversity, and informal expressions. Sentiment analysis, crucial for understanding public opinion, uses algorithms such as Naïve Bayes, which is based on Bayes' Theorem and assumes feature independence. Naïve Bayes is widely used in text analysis for its speed and simplicity. When applied to YouTube comments from the 2024 debates, the algorithm demonstrated its effectiveness, especially with a balanced dataset through random oversampling. It achieved 85.155% accuracy, high precision, recall, and an AUC of 96.8% on an 80:20 data split. Its fast classification time (0.000998 seconds) makes it suitable for real-time sentiment analysis, validating its use for political events. Future applications may incorporate advanced techniques like BERT for more sophisticated analysis.</p> Apriandy Angdresey, Lanny Sitanayah, Ignatius Lucky Henokh Tangka Copyright (c) 2025 Apriandy Angdresey, Lanny Sitanayah, Ignatius Lucky Henokh Tangka https://creativecommons.org/licenses/by/4.0 https://publikasi.dinus.ac.id/index.php/jcta/article/view/11668 Wed, 01 Jan 2025 00:00:00 +0000 A Quantum Circuit Learning-based Investigation: A Case Study in Iris Benchmark Dataset Binary Classification https://publikasi.dinus.ac.id/index.php/jcta/article/view/11779 <p>This study presents a Quantum Machine Learning (QML) architecture for perfectly classifying the Iris flower dataset. The research addresses improving classification accuracy using quantum models in machine-learning tasks. The objective is to demonstrate the effectiveness of QML approaches, specifically the Variational Quantum Circuit (VQC), Quantum Neural Network (QNN), and Quantum Support Vector Machine (QSVM), in achieving high performance on the Iris dataset. The proposed methods result in perfect classification, with all models attaining accuracy, precision, recall, and an F1-score of 1.00. The main finding is that the QML architecture successfully achieves flawless classification, contributing significantly to the field. These results underscore the potential of QML in solving complex classification problems and highlight its promise for future applications across various domains. The study concludes that QML techniques can offer transformative solutions in machine learning tasks, particularly those leveraging VQC, QNN, and QSVM.</p> Muhamad Akrom, Wise Herowati, De Rosal Ignatius Moses Setiadi Copyright (c) 2025 Muhamad Akrom, Wise Herowati, De Rosal Ignatius Moses Setiadi https://creativecommons.org/licenses/by/4.0 https://publikasi.dinus.ac.id/index.php/jcta/article/view/11779 Sun, 05 Jan 2025 00:00:00 +0000 Enhanced Diagnosis of Skin Cancer from Dermoscopic Images Using Alignment Optimized Convolutional Neural Networks and Grey Wolf Optimization https://publikasi.dinus.ac.id/index.php/jcta/article/view/11954 <p>Skin cancer (SC) is a highly serious kind of cancer that, if not addressed swiftly, might result in the patient’s demise. Early detection of this condition allows for more effective therapy and prevents disease development. Deep Learning (DL) approaches may be used as an effective and efficient tool for SC detection (SCD). Several DL-based algorithms for automated SCD have been reported. However, more efficient models are needed to improve accuracy. As a result, this paper introduces a new strategy for SCD based on Grey Wolf optimization (GWO) methodologies and CNN. The proposed methodology has four stages: preprocessing, segmentation, feature extraction, and classification. The proposed method utilizes a Convolutional Neural Network (CNN) to extract features from Regions of Interest (ROIs). CNN is employed for feature categorization, whereas the GWO approach enhances accuracy by refining edge detection and segmentation. This technique utilizes a probabilistic model to accelerate the convergence of the GWO algorithm. Employing the GWO model to optimize the structure and weight vectors of CNNs can enhance diagnostic accuracy by a minimum of 5%, based on evaluation outcomes. The application of the proposed strategy and its performance comparison with other methods indicate that the proposed method with GWO predicted SC with an average accuracy of 95.11% and without GWO an Accuracy of 92.66%, respectively, enhancing accuracy by a minimum of 2.5% when we train our model with GWO.</p> Faheem Mazhar, Naeem Aslam, Ahmad Naeem, Haroon Ahmad, Muhammad Fuzail, Muhammad Imran Copyright (c) 2025 Faheem Mazhar, Naeem Aslam, Ahmad Naeem, Haroon Ahmad, Muhammad Fuzail, Muhammad Imran https://creativecommons.org/licenses/by/4.0 https://publikasi.dinus.ac.id/index.php/jcta/article/view/11954 Wed, 15 Jan 2025 00:00:00 +0000 Improving Credit Card Fraud Detection with Ensemble Deep Learning-Based Models: A Hybrid Approach Using SMOTE-ENN https://publikasi.dinus.ac.id/index.php/jcta/article/view/12021 <p>Advances in information and internet technologies have significantly transformed the business environment, including the financial sector. The COVID-19 pandemic has further accelerated this digital adoption, expanding the e-commerce industry and highlighting the necessity for secure online transactions. Credit Card Fraud Detection (CCFD) stands critical as the prevalence of fraudulent activities continues to rise with the increasing volume of online transactions. Traditional methods for detecting fraud, such as rule-based systems and basic machine learning models, tend to fail to keep pace with fraudsters' evolving tactics. This study proposes a novel ensemble deep learning-based approach that combines Convolutional Neural Networks (CNN), Gated Recurrent Units (GRU), and Multilayer Perceptron (MLP) with the Synthetic Minority Oversampling Technique and Edited Nearest Neighbors (SMOTE-ENN) to address class imbalance and improve detection accuracy. The methodology integrates CNN for feature extraction, GRU for sequential transaction analysis, and Multilayer Perceptron (MLP) as a meta-learner in a stacking framework. By leveraging SMOTE-ENN, the proposed approach enhances data balance and prevents overfitting. With synthetic data, the robustness and accuracy of the model have been improved, particularly in scenarios where fraudulent examples are scarce. The experiments conducted on real-world credit card transaction datasets have established that our approach outperforms existing methods, achieving higher metrics performance.</p> Lossan Bonde, Abdoul Karim Bichanga Copyright (c) 2025 Lossan Bonde, Abdoul Karim Bichanga https://creativecommons.org/licenses/by/4.0 https://publikasi.dinus.ac.id/index.php/jcta/article/view/12021 Wed, 12 Feb 2025 00:00:00 +0000 A Comparative Analysis of Supervised Machine Learning Algorithms for IoT Attack Detection and Classification https://publikasi.dinus.ac.id/index.php/jcta/article/view/11901 <p>The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, necessitating robust attack detection mechanisms. This study presents a comprehensive comparative analysis of ten supervised learning algorithms for IoT attack detection and classification, addressing the critical challenge of balancing detection accuracy with practical deployment constraints. Using the CICIoT2023 dataset, encompassing data from 105 IoT devices and 33 attack types, we evaluate Naive Bayes, Artificial Neural Networks (ANN), Logistic Regression (LR), k-NN, XGBoost, Random Forest (RF), LightGBM, GRU, LSTM, and CNN algorithms based on some performance metrics. The comparative test results show superior performance to the traditional ensemble approach, with RF achieving 99.29% accuracy and leading precision (82.30%), followed closely by XGBoost with 99.26% accuracy and 79.60% precision. Deep learning approaches also demonstrate strong capabilities, with CNN achieving 98.33% accuracy and 71.18% precision, though these metrics indicate ongoing challenges with class imbalance. The analysis of confusion matrices reveals varying success across different attack types, with some algorithms showing perfect detection rates for certain attacks while struggling with others. The study highlights a crucial distinction in IoT security: while high precision remains important, the potentially catastrophic impact of missed attacks necessitates equal attention to recall metrics, as evidenced by the varying recall rates across algorithms (RF: 72.19%, XGBoost: 71.69%, CNN: 64.72%). These findings provide vital insights for developing balanced, context-aware intrusion detection systems for IoT environments, emphasizing the need to consider performance metrics and practical deployment constraints.</p> Jean Pierre Ntayagabiri, Youssef Bentaleb, Jeremie Ndikumagenge, Hind El Makhtoum Copyright (c) 2025 Jean Pierre Ntayagabiri, Youssef Bentaleb, Jeremie Ndikumagenge, Hind El Makhtoum https://creativecommons.org/licenses/by/4.0 https://publikasi.dinus.ac.id/index.php/jcta/article/view/11901 Thu, 13 Feb 2025 00:00:00 +0000 Human Action Recognition in Military Obstacle Crossing Using HOG and Region-Based Descriptors https://publikasi.dinus.ac.id/index.php/jcta/article/view/12195 <p>Human action recognition involves recognizing and classifying actions performed by humans. It has many applications, including sports, healthcare, and surveillance. Challenges such as a limited number of classes of activities and variations within inter and intra-class groups lead to high misclassification rates in some of the intelligent systems developed. Existing studies focused mainly on using public datasets with little focus on real-life action datasets, with limited research on HAR for military obstacle-crossing activities. This paper focuses on recognizing human actions in an obstacle-crossing competition video sequence where multiple participants are performing different obstacle-crossing activities. This study proposes a feature descriptor approach that combines a Histogram of Oriented Gradient and Region Descriptors (HOGReG) for human action recognition in a military obstacle crossing competition. The dataset was captured during military trainees’ obstacle-crossing exercises at a military training institution to achieve this objective. Images were segmented into background and foreground using a Grabcut-based segmentation algorithm, and thereafter, features were extracted and used for classification. The features were extracted using a Histogram of Oriented Gradient (HOG) and region descriptors from segmented images. The extracted features are presented to a neural network classifier for classification and evaluation. The experimental results recorded 63.8%, 82.6%, and 86.4% recognition accuracies using the region descriptors HOG and HOGReG, respectively. The region descriptor gave a training time of 5.6048 seconds, while HOG and HOGReG reported 32.233 and 31.975 seconds, respectively. The outcome shows how effectively the suggested model performed.</p> Adeola O. Kolawole, Martins E. Irhebhude, Philip O. Odion Copyright (c) 2025 Adeola O. Kolawole, Martins E. Irhebhude, Philip O. Odion https://creativecommons.org/licenses/by/4.0 https://publikasi.dinus.ac.id/index.php/jcta/article/view/12195 Fri, 21 Feb 2025 00:00:00 +0000 Feature Fusion with Albumentation for Enhancing Monkeypox Detection Using Deep Learning Models https://publikasi.dinus.ac.id/index.php/jcta/article/view/12255 <p class="abstractJCTA">Monkeypox is a zoonotic disease caused by Orthopoxvirus, presenting clinical challenges due to its visual similarity to other dermatological conditions. Early and accurate detection is crucial to prevent further transmission, yet conventional diagnostic methods are often resource-intensive and time-consuming. This study proposes a deep learning-based classification model by integrating Xception and InceptionV3 using feature fusion to enhance performance in classifying Monkeypox skin lesions. Given the limited availability of annotated medical images, data augmentation was applied using Albumentation to improve model generalization. The proposed model was trained and evaluated on the Monkeypox Skin Lesion Dataset (MSLD), achieving 85.96% accuracy, 86.47% precision, 85.25% recall, 78.43% specificity, and an AUC score of 0.8931, outperforming existing methods. Notably, data augmentation significantly improved recall from 81.23% to 85.25%, demonstrating its effectiveness in enhancing sensitivity to positive cases. Ablation studies further validated that augmentation increased overall accuracy from 82.02% to 85.96%, emphasizing its role in improving model robustness. Comparative analysis with other models confirmed the superiority of our approach. This research enhances automated Monkeypox detection, offering a robust and efficient tool for low-resource clinical settings. The findings reinforce the potential of feature fusion and augmentation in improving deep learn-ing-based medical image classification, facilitating more reliable and accessible disease identification.</p> Nizar Rafi Pratama, De Rosal Ignatius Moses Setiadi, Imanuel Harkespan, Arnold Adimabua Ojugo Copyright (c) 2025 Nizar Rafi Pratama, De Rosal Ignatius Moses Setiadi, Imanuel Harkespan, Arnold Adimabua Ojugo https://creativecommons.org/licenses/by/4.0 https://publikasi.dinus.ac.id/index.php/jcta/article/view/12255 Fri, 21 Feb 2025 00:00:00 +0000 A Low-Cost Hydroponic Monitoring System with Internet of Things and Fuzzy Logic https://publikasi.dinus.ac.id/index.php/jcta/article/view/12059 <p>The need for urban communities to consume vegetables is increasing. This has caused people to start cultivating vegetables using hydroponic techniques. However, due to their busy activities, they do not have enough time to monitor and control hydroponics, which must always be in ideal conditions. This paper designs and implements an Internet of Things-based monitoring system to help hydroponic owners monitor their hydroponics anywhere and anytime. The built system requires a monitoring device assembled using a NodeMCU ESP8266 microcontroller, a pH detection detector sensor, and a DHT22 temperature and humidity sensor. This system uses the Mamdani Fuzzy Logic algorithm to determine warnings to be displayed on the application interface when the water pH, temperature, and humidity are in certain conditions. The Mamdani Fuzzy Logic algorithm can interpret environmental data into a warning that humans can easily understand, even if they lack technical expertise. In addition to being able to help monitor, this system also allows owners to find out what elements need to be added or changed for their hydroponic place. Our evaluation results show that the defuzzification stage in the application has high accuracy, which is 99.92%, compared to Matlab’s results.</p> Lanny Sitanayah, Hizkia R.M. Joseph, Junaidy B. Sanger Copyright (c) 2025 Lanny Sitanayah, Hizkia R.M. Joseph, Junaidy B. Sanger https://creativecommons.org/licenses/by/4.0 https://publikasi.dinus.ac.id/index.php/jcta/article/view/12059 Fri, 28 Feb 2025 00:00:00 +0000