Pilot Study on Enhanced Detection of Cues over Malicious Sites Using Data Balancing on the Random Forest Ensemble
(Margaret Dumebi Okpor, Fidelis Obukohwo Aghware, Maureen Ifeanyi Akazue, Andrew Okonji Eboka, Rita Erhovwo Ako, Arnold Adimabua Ojugo, Christopher Chukwufunaya Odiakaose, Amaka Patience Binitie, Victor Ochuko Geteloma, Patrick Ogholuwarami Ejeh)
DOI : 10.62411/faith.2024-14
- Volume: 1,
Issue: 2,
Sitasi : 0 07-Sep-2024
| Abstrak
| PDF File
| Resource
| Last.31-Jul-2025
Abstrak:
The digital revolution frontiers have rippled across society today – with various web content shared online for users as they seek to promote monetization and asset exchange, with clients constantly seeking improved alternatives at lowered costs to meet their value demands. From item upgrades to their replacement, businesses are poised with retention strategies to help curb the challenge of customer attrition. The birth of smartphones has proliferated feats such as mobility, ease of accessibility, and portability – which, in turn, have continued to ease their rise in adoption, exposing user device vulnerability as they are quite susceptible to phishing. With users classified as more susceptible than others due to online presence and personality traits, studies have sought to reveal lures/cues as exploited by adversaries to enhance phishing success and classify web content as genuine and malicious. Our study explores the tree-based Random Forest to effectively identify phishing cues via sentiment analysis on phishing website datasets as scrapped from user accounts on social network sites. The dataset is scrapped via Python Google Scrapper and divided into train/test subsets to effectively classify contents as genuine or malicious with data balancing and feature selection techniques. With Random Forest as the machine learning of choice, the result shows the ensemble yields a prediction accuracy of 97 percent with an F1-score of 98.19% that effectively correctly classified 2089 instances with 85 incorrectly classified instances for the test-dataset.
|
0 |
2024 |
Effects of Data Resampling on Predicting Customer Churn via a Comparative Tree-based Random Forest and XGBoost
(Rita Erhovwo Ako, Fidelis Obukohwo Aghware, Margaret Dumebi Okpor, Maureen Ifeanyi Akazue, Rume Elizabeth Yoro, Arnold Adimabua Ojugo, De Rosal Ignatius Moses Setiadi, Chris Chukwufunaya Odiakaose, Reuben Akporube Abere, Frances Uche Emordi, Victor Ochuko Geteloma, Patrick Ogholuwarami Ejeh)
DOI : 10.62411/jcta.10562
- Volume: 2,
Issue: 1,
Sitasi : 0 27-Jun-2024
| Abstrak
| PDF File
| Resource
| Last.31-Jul-2025
Abstrak:
Customer attrition has become the focus of many businesses today – since the online market space has continued to proffer customers, various choices and alternatives to goods, services, and products for their monies. Businesses must seek to improve value, meet customers' teething demands/needs, enhance their strategies toward customer retention, and better monetize. The study compares the effects of data resampling schemes on predicting customer churn for both Random Forest (RF) and XGBoost ensembles. Data resampling schemes used include: (a) default mode, (b) random-under-sampling RUS, (c) synthetic minority oversampling technique (SMOTE), and (d) SMOTE-edited nearest neighbor (SMOTEEN). Both tree-based ensembles were constructed and trained to assess how well they performed with the chi-square feature selection mode. The result shows that RF achieved F1 0.9898, Accuracy 0.9973, Precision 0.9457, and Recall 0.9698 for the default, RUS, SMOTE, and SMOTEEN resampling, respectively. Xgboost outperformed Random Forest with F1 0.9945, Accuracy 0.9984, Precision 0.9616, and Recall 0.9890 for the default, RUS, SMOTE, and SMOTEEN, respectively. Studies support that the use of SMOTEEN resampling outperforms other schemes; while, it attributed XGBoost enhanced performance to hyper-parameter tuning of its decision trees. Retention strategies of recency-frequency-monetization were used and have been found to curb churn and improve monetization policies that will place business managers ahead of the curve of churning by customers.
|
0 |
2024 |
IMANoBAS: An Improved Multi-Mode Alert Notification IoT-based Anti-Burglar Defense System
(Edith Ugochi Omede, Abel E Edje, Maureen Ifeanyi Akazue, Henry Utomwen, Arnold Adimabua Ojugo)
DOI : 10.62411/jcta.9541
- Volume: 1,
Issue: 3,
Sitasi : 0 09-Feb-2024
| Abstrak
| PDF File
| Resource
| Last.31-Jul-2025
Abstrak:
Burglary involves forced or unauthorized entry, which leads to damage or loss of property having monetary or emotional value and, more severely, puts lives at risk. The dire need for the safety of lives and properties has attracted so much research on burglary alert system using Internet of Things (IoT) technology. Most of the research focused on alerting the users of burglary attempts using any or a combination of two notification methods: SMS, call, and email. This study emphasizes three-mode notification that combines SMS, call, and email using the application of IoT technology in a burglary alert system, which uses a Passive Infrared (PIR) sensor for burglar detection to ensure that Homeowners or authorized personnel get alerts in events of imminent attempt to break-ins. The study also details the sensor integration with its supporting components, such as the central hub or microcontroller, buzzer, LED, and network interface in the development of the system. The software was developed to facilitate seamless integration with the hardware, ensuring timely and accurate event detection and subsequent alert generation using Arduino IDE programming language, a framework based on the C++ language. The system effected the 3-mode notification to ensure that users get notification in case of an imminent break-in since the failure of the three modes simultaneously is extremely rare. The system’s performance based on its responsiveness on the 3-mode notifications was evaluated, and an average of 83.56% responsiveness was obtained, indicating an acceptable response time.
|
0 |
2024 |
UNMASKING FRAUDSTERS: Ensemble Features Selection to Enhance Random Forest Fraud Detection
(Maureen Ifeanyi Akazue, Irene Alamarefa Debekeme, Abel Efe Edje, Clive Asuai, Ufuoma John Osame)
DOI : 10.33633/jcta.v1i2.9462
- Volume: 1,
Issue: 2,
Sitasi : 0 25-Dec-2023
| Abstrak
| PDF File
| Resource
| Last.31-Jul-2025
Abstrak:
Fraud detection is used in various industries, including banking institutes, finance, insurance, government agencies, etc. Recent increases in the number of fraud attempts make fraud detection crucial for safeguarding financial information that is confidential or personal. Many types of fraud problems exist, including card-not-present fraud, fake Marchant, counterfeit checks, stolen credit cards, and others. An ensemble feature selection technique based on Recursive feature elimination (RFE), Information gain (IG), and Chi-Squared (X2) in concurrence with the Random Forest algorithm, was proposed to give research findings and results on fraud detection and prevention. The objective was to choose the essential features for training the model. The Receiver Operating Characteristic (ROC) Score, Accuracy, F1 Score, and Precision are used to evaluate the model's performance. The findings show that the model can differentiate between fraudulent transactions and those that are not, with an ROC Score of 95.83% and an Accuracy of 99.6%. The F1 Score of 99.6%% and precision of 100% further sustain the model's ability to detect fraudulent transactions with the least false positives correctly. The ensemble feature selection technique reduced training time and did not compromise the model's performance, making it a valuable tool for businesses in preventing fraudulent transactions.
|
0 |
2023 |
CoSoGMIR: A Social Graph Contagion Diffusion Framework using the Movement-Interaction-Return Technique
(Arnold Adimabua Ojugo, Patrick Ogholuwarami Ejeh, Maureen Ifeanyi Akazue, Nwanze Chukwudi Ashioba, Christopher Chukwufunaya Odiakaose, Rita Erhovwo Ako, Blessing Nwozor, Frances Uche Emordi)
DOI : 10.33633/jcta.v1i2.9355
- Volume: 1,
Issue: 2,
Sitasi : 0 06-Dec-2023
| Abstrak
| PDF File
| Resource
| Last.31-Jul-2025
Abstrak:
Besides the inherent benefits of exchanging information and interactions between nodes on a social graph, they can also become a means for the propagation of knowledge. Social graphs have also become a veritable structure for the spread of disease outbreaks. These and its set of protocols are deployed as measures to curb its widespread effects as it has also left network experts puzzled. The recent lessons from the COVID-19 pandemic continue to reiterate that diseases will always be around. Nodal exposure, adoption/diffusion of disease(s) among interacting nodes vis-a-vis migration of nodes that cause further spread of contagion (concerning COVID-19 and other epidemics) has continued to leave experts bewildered towards rejigging set protocols. We model COVID-19 as a Markovian process with node targeting, propagation and recovery using migration-interaction as a threshold feat on a social graph. The migration-interaction design seeks to provision the graph with minimization and block of targeted diffusion of the contagion using seedset(s) nodes with a susceptible-infect policy. The study results showed that migration and interaction of nodes via the mobility approach have become an imperative factor that must be added when modeling the propagation of contagion or epidemics.
|
0 |
2023 |
Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study
(Arnold Adimabua Ojugo, Maureen Ifeanyi Akazue, Patrick Ogholuwarami Ejeh, Nwanze Chukwudi Ashioba, Christopher Chukwufunaya Odiakaose, Rita Erhovwo Ako, Frances Uche Emordi)
DOI : 10.33633/jcta.v1i2.9259
- Volume: 1,
Issue: 2,
Sitasi : 0 12-Oct-2023
| Abstrak
| PDF File
| Resource
| Last.31-Jul-2025
Abstrak:
The advent of the Internet as an effective means for resource sharing has consequently, led to proliferation of adversaries, with unauthorized access to network resources. Adversaries achieved fraudulent activities via carefully crafted attacks of large magnitude targeted at personal gains and rewards. With the cost of over $1.3Trillion lost globally to financial crimes and the rise in such fraudulent activities vis the use of credit-cards, financial institutions and major stakeholders must begin to explore and exploit better and improved means to secure client data and funds. Banks and financial services must harness the creative mode rendered by machine learning schemes to help effectively manage such fraud attacks and threats. We propose HyGAMoNNE – a hybrid modular genetic algorithm trained neural network ensemble to detect fraud activities. The hybrid, equipped with knowledge to altruistically detect fraud on credit card transactions. Results show that the hybrid effectively differentiates, the benign class attacks/threats from genuine credit card transaction(s) with model accuracy of 92%.
|
0 |
2023 |