Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–4 dari 4 artikel
Investigating a SMOTE-Tomek Boosted Stacked Learning Scheme for Phishing Website Detection: A Pilot Study
Ugbotu, Eferhire Valentine
; Emordi, Frances Uchechukwu
; Ugboh, Emeke
; Anazia, Kizito Eluemunor
; Odiakaose, Christopher Chukwufunaya
; Onoma, Paul Avwerosuoghene
; Idama, Rebecca Okeoghene
; Ojugo, Arnold Adimabua
; Geteloma, Victor Ochuko
; Oweimieotu, Amanda Enaodona
; Aghaunor, Tabitha Chukwudi
; Binitie, Amaka Patience
; Odoh, Anne
; Onochie, Chris Chukwudi
; Ezzeh, Peace Oguguo
; Eboka, Andrew Okonji
; Agboi, Joy
; Ejeh, Patrick Ogholuwarami
Journal of Computing Theories and Applications
Vol 3
, No 2
(2025)
The daily exchange of informatics over the Internet has both eased the widespread proliferation of resources to ease accessibility, availability and interoperability of accompanying devices. In addition, the recent widespread proliferation of smartphones alongside other computing devices has continued to advance features such as miniaturization, portability, data access ease, mobility, and other merits. It has also birthed adversarial attacks targeted at network infrastructures and aimed at expl...
Sumber Asli
Google Scholar
DOI
BEHeDaS: A Blockchain Electronic Health Data System for Secure Medical Records Exchange
Oladele, James Kolapo
; Ojugo, Arnold Adimabua
; Odiakaose, Christopher Chukwufunaya
; Emordi, Frances Uchechukwu
; Abere, Reuben Akporube
; Nwozor, Blessing
; Ejeh, Patrick Ogholuwarami
; Geteloma, Victor Ochuko
Journal of Computing Theories and Applications
Vol 1
, No 3
(2024)
Blockchain platforms propagate into every facet, including managing medical services with professional and patient-centered applications. With its sensitive nature, record privacy has become imminent with medical services for patient diagnosis and treatments. The nature of medical records has continued to necessitate their availability, reachability, accessibility, security, mobility, and confidentiality. Challenges to these include authorized transfer of patient records on referral, security ac...
Sumber Asli
Google Scholar
DOI
60 Sitasi
CoSoGMIR: A Social Graph Contagion Diffusion Framework using the Movement-Interaction-Return Technique
Ojugo, Arnold Adimabua
; Ejeh, Patrick Ogholuwarami
; Akazue, Maureen Ifeanyi
; Ashioba, Nwanze Chukwudi
; Odiakaose, Christopher Chukwufunaya
; Ako, Rita Erhovwo
; Nwozor, Blessing
; Emordi, Frances Uche
Journal of Computing Theories and Applications
Vol 1
, No 2
(2023)
Besides the inherent benefits of exchanging information and interactions between nodes on a social graph, they can also become a means for the propagation of knowledge. Social graphs have also become a veritable structure for the spread of disease outbreaks. These and its set of protocols are deployed as measures to curb its widespread effects as it has also left network experts puzzled. The recent lessons from the COVID-19 pandemic continue to reiterate that diseases will always be around. Noda...
Sumber Asli
Google Scholar
DOI
10 Sitasi
Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study
Ojugo, Arnold Adimabua
; Akazue, Maureen Ifeanyi
; Ejeh, Patrick Ogholuwarami
; Ashioba, Nwanze Chukwudi
; Odiakaose, Christopher Chukwufunaya
; Ako, Rita Erhovwo
; Emordi, Frances Uche
Journal of Computing Theories and Applications
Vol 1
, No 2
(2023)
The advent of the Internet as an effective means for resource sharing has consequently, led to proliferation of adversaries, with unauthorized access to network resources. Adversaries achieved fraudulent activities via carefully crafted attacks of large magnitude targeted at personal gains and rewards. With the cost of over $1.3Trillion lost globally to financial crimes and the rise in such fraudulent activities vis the use of credit-cards, financial institutions and major stakeholders must begi...
Sumber Asli
Google Scholar
DOI
20 Sitasi