462 Scopus Citations from 327 Scopus Documents since August 2023 (last update October, 31 2025)
Google Scholar Citations
If you have problems regarding submission or user registration for submission, don't hesitate to contact the Editorial team at email editorial.jcta@gmail.com.
You can also submit via this email, however please add authors data (complete name, affiliation, and email)
All submissions to the Journal must be in English and uploaded to the JCTA OJS, where previously, the Author had to register with OJS.
Manuscripts must be submitted as a single Word file, including the full title of the article, author names, affiliations, addresses, all text, figures, tables, references, and other relevant content. Each submitted paper should follow the margins, fonts, captions, and general formatting of the A4 template (Template for MS Word). While following the template is recommended, it is not mandatory; authors who experience difficulties may use a free-format layout, provided that the manuscript is prepared in a single-column format.
JCTA accepts research or review articles with no strict minimum or maximum page limit; however, the ideal length is 12–20 pages for research papers and 20–30 pages for review papers. JCTA also accepts submissions that have been previously posted as preprints. The authors are required to include the URL, DOI, or other identifier of the original preprint in the Acknowledgement section.
The author must be identified. He must also provide his email, geographic postal code, city, and country. Since Volume 3 Issue 3 (2026), at least the corresponding author must have an ORCID.
References must follow the IEEE style. We highly recommend preparing references with a bibliography software package like Mendeley, EndNote, or Zotero to avoid typos and duplicate entries. All references must include a DOI or other persistent identifier whenever available. If a reference does not have a DOI or identifier, authors are required to provide a valid URL to ensure that the cited work is accessible and verifiable online. Below is an example of a bibliography:
[1] D. R. I. M. Setiadi, S. Rustad, P. N. Andono, and G. F. Shidik, “Digital image steganography survey and investigation (goal, assessment, method, development, and dataset),” Signal Processing, vol. 206, p. 108908, May 2023, doi: 10.1016/j.sigpro.2022.108908.
[2] D. R. I. M. Setiadi, T. Sutojo, E. H. Rachmawanto, and C. A. Sari, “Fast and efficient image watermarking algorithm using discrete tchebichef transform,” in 2017 5th International Conference on Cyber and IT Service Management (CITSM), Aug. 2017, pp. 1–5. doi: 10.1109/CITSM.2017.8089229.
[3] A. Vyas, S. Yu, and J. Paik, “Fundamentals of Digital Image Processing,” in A John Wiley & Sons, 2018, pp. 3–11. doi: 10.1007/978-981-10-7272-7_1.
[4] ICCC FBI, “Internet Crime Report 2021,” 2022. [Online]. Available: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf
[5] USC Viterbi School of Engineering, “SIPI Image Database.” http://sipi.usc.edu/database/ (accessed Mar. 27, 2019).
Before sending to review
Before a manuscript is sent for peer review, the editorial team will verify that it complies with the journal’s Similarity Policy and topic suitability.
Authors must ensure their manuscripts meet the similarity and originality requirements outlined on the Similarity Policy page, including limits on similarity index, self-citation rate, AI acknowledgement, and proper handling of figures and copyrighted materials.
Please review the full guidelines here: Similarity Policy & AI Tools Acknowledgement.
Revision Stage
The author must respond to the reviewer for revisions and/or rebuttal at the revision stage.
In addition, improvements must be marked with highlights, and the highlighted document files must be uploaded with the revised manuscript in the supplementary material for review.
The response template can be downloaded here.
After Acceptance
No Article Processing Charge (APC) applies, except for authors affiliated with institutions in Indonesia without any co-author from outside Indonesia. For these authors, an APC will be charged starting in May 2025, and payment must be made before the production process begins, see here for more details.
Once a manuscript is accepted, the corresponding author must first upload the reference list in .bib or .ris format, either through the OJS system or by sending it directly to editorial.jcta@gmail.com. The reference list should be exported from a reference management tool such as Mendeley, Zotero, or EndNote.
After this file is received, the manuscript will proceed to the layout and production editing stage, managed by the journal’s production team. A proof version will then be sent to the corresponding author for final verification.
The author is expected to thoroughly review the layout, check for any formatting or content issues, and confirm their approval for publication. Minor corrections may be requested at this stage.
Once the proof is approved by the author, a DOI will be assigned, and the article will be published online, either in the Early Access section or as part of a specific issue.
Withdrawal Policy
Archiving
A LOCKSS license will appear in About the Journal under Archiving: LOCKSS License. This enables LOCKSS to store and distribute journal content at participating libraries via a LOCKSS Publisher Manifest page.
Repository Policy
The journal allows authors to deposit versions of their work in institutional repositories, ResearchGate, or other repositories of their choice. Authors are encouraged to share their accepted manuscripts (post-print) or published versions, provided that proper credit is given to the journal, and the DOI link to the official version is included.
Retraction Policy
The Journal of Computing Theories and Applications (JCTA) is dedicated to upholding academic integrity and ensuring the reliability of published research. Articles may be retracted in cases where significant ethical violations or errors are identified after publication.
Reasons for Retraction:
1. Plagiarism or Duplication: The article contains substantial overlap with other works without proper attribution or has been published elsewhere without disclosure.
2. Data Issues: Fabricated, falsified, or manipulated data undermines the validity of the findings.
3. Ethical Violations: Breaches of ethical standards, such as unauthorized use of copyrighted materials or undisclosed conflicts of interest.
4. Critical Errors: Major methodological or analytical mistakes that invalidate the conclusions.
Retraction Process:
1. Investigation: The editorial team reviews complaints or identified issues. Authors are contacted and given an opportunity to respond.
2. Decision: Based on evidence, the editorial board decides whether to retract the article or issue a correction.
3. Retraction Notice: A notice is published explaining the reason for retraction. The original article remains accessible but is marked as "RETRACTED."
4. Post-retraction: The DOI of the original article remains active to ensure proper citation and traceability of the retraction.
Retractions are conducted in accordance with Committee on Publication Ethics (COPE) guidelines. Retraction notices are linked to the original article and indexed in relevant databases.
Authors responsible for ethical breaches may face consequences, including restrictions on future submissions and notifications to their institutions.
462 Scopus Citations from 327 Scopus Documents since August 2023 (last update October, 31 2025)
Google Scholar Citations
Journal of Computing Theories and Applications published by Dian Nuswantoro University Semarang Indonesia
collaborates with the Intelligent System Research (IntSys) Lab and is supported by Future Techno Science Foundation.
![]() |
![]() |
![]() |
![]() |
Indexed by:
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|
| This journal is licensed under a Creative Commons Attribution 4.0 International License. | ||||||||
ISSN: 3024-9104