Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–6 dari 6 artikel
Investigating a SMOTE-Tomek Boosted Stacked Learning Scheme for Phishing Website Detection: A Pilot Study
Ugbotu, Eferhire Valentine
; Emordi, Frances Uchechukwu
; Ugboh, Emeke
; Anazia, Kizito Eluemunor
; Odiakaose, Christopher Chukwufunaya
; Onoma, Paul Avwerosuoghene
; Idama, Rebecca Okeoghene
; Ojugo, Arnold Adimabua
; Geteloma, Victor Ochuko
; Oweimieotu, Amanda Enaodona
; Aghaunor, Tabitha Chukwudi
; Binitie, Amaka Patience
; Odoh, Anne
; Onochie, Chris Chukwudi
; Ezzeh, Peace Oguguo
; Eboka, Andrew Okonji
; Agboi, Joy
; Ejeh, Patrick Ogholuwarami
Journal of Computing Theories and Applications
Vol 3
, No 2
(2025)
The daily exchange of informatics over the Internet has both eased the widespread proliferation of resources to ease accessibility, availability and interoperability of accompanying devices. In addition, the recent widespread proliferation of smartphones alongside other computing devices has continued to advance features such as miniaturization, portability, data access ease, mobility, and other merits. It has also birthed adversarial attacks targeted at network infrastructures and aimed at expl...
Sumber Asli
Google Scholar
DOI
Effects of Data Resampling on Predicting Customer Churn via a Comparative Tree-based Random Forest and XGBoost
Ako, Rita Erhovwo
; Aghware, Fidelis Obukohwo
; Okpor, Margaret Dumebi
; Akazue, Maureen Ifeanyi
; Yoro, Rume Elizabeth
; Ojugo, Arnold Adimabua
; Setiadi, De Rosal Ignatius Moses
; Odiakaose, Chris Chukwufunaya
; Abere, Reuben Akporube
; Emordi, Frances Uche
; Geteloma, Victor Ochuko
; Ejeh, Patrick Ogholuwarami
Journal of Computing Theories and Applications
Vol 2
, No 1
(2024)
Customer attrition has become the focus of many businesses today – since the online market space has continued to proffer customers, various choices and alternatives to goods, services, and products for their monies. Businesses must seek to improve value, meet customers' teething demands/needs, enhance their strategies toward customer retention, and better monetize. The study compares the effects of data resampling schemes on predicting customer churn for both Random Forest (RF) and XGBoost ense...
Sumber Asli
Google Scholar
DOI
Enhancing the Random Forest Model via Synthetic Minority Oversampling Technique for Credit-Card Fraud Detection
Aghware, Fidelis Obukohwo
; Ojugo, Arnold Adimabua
; Adigwe, Wilfred
; Odiakaose, Christopher Chukwufumaya
; Ojei, Emma Obiajulu
; Ashioba, Nwanze Chukwudi
; Okpor, Margareth Dumebi
; Geteloma, Victor Ochuko
Journal of Computing Theories and Applications
Vol 1
, No 4
(2024)
Fraudsters increasingly exploit unauthorized credit card information for financial gain, targeting un-suspecting users, especially as financial institutions expand their services to semi-urban and rural areas. This, in turn, has continued to ripple across society, causing huge financial losses and lowering user trust implications for all cardholders. Thus, banks cum financial institutions are today poised to implement fraud detection schemes. Five algorithms were trained with and without the app...
Sumber Asli
Google Scholar
DOI
BEHeDaS: A Blockchain Electronic Health Data System for Secure Medical Records Exchange
Oladele, James Kolapo
; Ojugo, Arnold Adimabua
; Odiakaose, Christopher Chukwufunaya
; Emordi, Frances Uchechukwu
; Abere, Reuben Akporube
; Nwozor, Blessing
; Ejeh, Patrick Ogholuwarami
; Geteloma, Victor Ochuko
Journal of Computing Theories and Applications
Vol 1
, No 3
(2024)
Blockchain platforms propagate into every facet, including managing medical services with professional and patient-centered applications. With its sensitive nature, record privacy has become imminent with medical services for patient diagnosis and treatments. The nature of medical records has continued to necessitate their availability, reachability, accessibility, security, mobility, and confidentiality. Challenges to these include authorized transfer of patient records on referral, security ac...
Sumber Asli
Google Scholar
DOI
60 Sitasi
CoSoGMIR: A Social Graph Contagion Diffusion Framework using the Movement-Interaction-Return Technique
Ojugo, Arnold Adimabua
; Ejeh, Patrick Ogholuwarami
; Akazue, Maureen Ifeanyi
; Ashioba, Nwanze Chukwudi
; Odiakaose, Christopher Chukwufunaya
; Ako, Rita Erhovwo
; Nwozor, Blessing
; Emordi, Frances Uche
Journal of Computing Theories and Applications
Vol 1
, No 2
(2023)
Besides the inherent benefits of exchanging information and interactions between nodes on a social graph, they can also become a means for the propagation of knowledge. Social graphs have also become a veritable structure for the spread of disease outbreaks. These and its set of protocols are deployed as measures to curb its widespread effects as it has also left network experts puzzled. The recent lessons from the COVID-19 pandemic continue to reiterate that diseases will always be around. Noda...
Sumber Asli
Google Scholar
DOI
10 Sitasi
Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study
Ojugo, Arnold Adimabua
; Akazue, Maureen Ifeanyi
; Ejeh, Patrick Ogholuwarami
; Ashioba, Nwanze Chukwudi
; Odiakaose, Christopher Chukwufunaya
; Ako, Rita Erhovwo
; Emordi, Frances Uche
Journal of Computing Theories and Applications
Vol 1
, No 2
(2023)
The advent of the Internet as an effective means for resource sharing has consequently, led to proliferation of adversaries, with unauthorized access to network resources. Adversaries achieved fraudulent activities via carefully crafted attacks of large magnitude targeted at personal gains and rewards. With the cost of over $1.3Trillion lost globally to financial crimes and the rise in such fraudulent activities vis the use of credit-cards, financial institutions and major stakeholders must begi...
Sumber Asli
Google Scholar
DOI
20 Sitasi