cover
Contact Name
De Rosal Ignatius Moses Setiadi
Contact Email
moses@dsn.dinus.ac.id
Phone
-
Journal Mail Official
editorial.jcta@gmail.com
Editorial Address
H building, Dian Nuswantoro University Imam Bonjol street no. 207 Semarang, Central Java, Indonesia
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Computing Theories and Applications
ISSN : -     EISSN : 30249104     DOI : https://doi.org/10.33633/jcta
Core Subject : Science,
Journal of Computing Theories and Applications (JCTA) is a refereed, international journal that covers all aspects of foundations, theories and the practical applications of computer science. FREE OF CHARGE for submission and publication. All accepted articles will be published online and accessed for free. The review process is carried out rapidly, about two until three weeks, to get the first decision. The journal publishes only original research papers in the areas of, but not limited to: Artificial Intelligence Big Data Bioinformatics Biometrics Cloud Computing Computer Graphics Computer Vision Cryptography Data Mining Fuzzy Systems Game Technology Image Processing Information Security Internet of Things Intelligent Systems Machine Learning Mobile Computing Multimedia Technology Natural Language Processing Network Security Pattern Recognition Signal Processing Soft Computing Speech Processing Special emphasis is given to recent trends related to cutting-edge research within the domain. If you want to become an author(s) in this journal, you can start by accessing the About page. You can first read the Policies section to find out the policies determined by the JCTA. Then, if you submit an article, you can see the guidelines in the Author Guidelines or Author Guidelines section. Each journal submission will be made online and requires prospective authors to register and have an account to be able to submit manuscripts.
Articles 3 Documents
Search results for , issue "Vol 1, No 2 (2023): (in Process)" : 3 Documents clear
Image Encryption using Half-Inverted Cascading Chaos Cipheration De Rosal Ignatius Moses Setiadi; Robet Robet; Octara Pribadi; Suyud Widiono; Md Kamruzzaman Sarker
Journal of Computing Theories and Applications Vol 1, No 2 (2023): (in Process)
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jcta.v1i2.9388

Abstract

This research introduces an image encryption scheme combining several permutations and substitution-based chaotic techniques, such as Arnold Chaotic Map, 2D-SLMM, 2D-LICM, and 1D-MLM. The proposed method is called Half-Inverted Cascading Chaos Cipheration (HIC3), designed to increase digital image security and confidentiality. The main problem solved is the image's degree of confusion and diffusion. Extensive testing included chi-square analysis, information entropy, NCPCR, UACI, adjacent pixel correlation, key sensitivity and space analysis, NIST randomness testing, robustness testing, and visual analysis. The results show that HIC3 effectively protects digital images from various attacks and maintains their integrity. Thus, this method successfully achieves its goal of increasing security in digital image encryption
Methodologies of the Validation of Software Architectures Amina El Murabet; Anouar Abtoy
Journal of Computing Theories and Applications Vol 1, No 2 (2023): (in Process)
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jcta.v1i2.9332

Abstract

Software architecture validation is the process of assessing whether a software architecture meets its intended requirements and goals. It is an important step in the software development process, as it can help to identify and address potential problems early on before they become more costly and difficult to fix. There are a variety of different methodologies that can be used to validate software architecture. Some of the most common methodologies include Architectural evaluation methods, Architecture tests and reviews, and Model-based validation. This paper will provide an overview of the different methodologies that can be used to validate software architecture. Apart from that, it also analyzes and summarizes the strengths and weaknesses of each method so that it can guide determining the most appropriate methodology for a particular case.
Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study Arnold Adimabua Ojugo; Maureen Ifeanyi Akazue; Patrick Ogholuwarami Ejeh; Nwanze Chukwudi Ashioba; Christopher Chukwufunaya Odiakaose; Rita Erhovwo Ako; Frances Uche Emordi
Journal of Computing Theories and Applications Vol 1, No 2 (2023): (in Process)
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jcta.v1i2.9259

Abstract

The advent of the Internet as an effective means for resource sharing has consequently, led to proliferation of adversaries, with unauthorized access to network resources. Adversaries achieved fraudulent activities via carefully crafted attacks of large magnitude targeted at personal gains and rewards. With the cost of over $1.3Trillion lost globally to financial crimes and the rise in such fraudulent activities vis the use of credit-cards, financial institutions and major stakeholders must begin to explore and exploit better and improved means to secure client data and funds. Banks and financial services must harness the creative mode rendered by machine learning schemes to help effectively manage such fraud attacks and threats. We propose HyGAMoNNE – a hybrid modular genetic algorithm trained neural network ensemble to detect fraud activities. The hybrid, equipped with knowledge to altruistically detect fraud on credit card transactions. Results show that the hybrid effectively differentiates, the benign class attacks/threats from genuine credit card transaction(s) with model accuracy of 92%.

Page 1 of 1 | Total Record : 3