Claim Missing Document
Check
Articles

Found 6 Documents
Search
Journal : Journal of Fuzzy Systems and Control (JFSC)

Comparative Data Resample to Predict Subscription Services Attrition Using Tree-based Ensembles Okpor, Margaret Dumebi; Aghware, Fidelis Obukohwo; Akazue, Maureen Ifeanyi; Ojugo, Arnold Adimabua; Emordi, Frances Uche; Odiakaose, Christopher Chukwufunaya; Ako, Rita Erhovwo; Geteloma, Victor Ochuko; Binitie, Amaka Patience; Ejeh, Patrick Ogholuwarami
Journal of Fuzzy Systems and Control Vol. 2 No. 2 (2024): Vol. 2, No. 2, 2024
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v2i2.213

Abstract

The digital market today, is rippled with a variety of goods/services that promote monetization and asset exchange with clients constantly seeking improved alternatives at lowered cost to meet their value demands. From item upgrades to their replacement, businesses are poised with retention strategies to help curb the challenge of customer attrition. Such strategies include the upgrade of goods and services at lesser cost and targeted improved value chains to meet client needs. These are found to improve client retention and better monetization. The study predicts customer churn via tree-based ensembles with data resampling such as the random-under-sample, synthetic minority oversample (SMOTE), and SMOTE-edited nearest neighbor (SMOTEEN). We chose three (3) tree-based ensembles namely: (a) decision tree, (b) random forest, and (c) extreme gradient boosting – to ensure we have single and ensemble classifier(s) to assess how well bagging and boosting modes perform on consumer churn prediction. With chi-square feature selection mode, the Decision tree model yields an accuracy of 0.9973, F1 of 0.9898, a precision of 0.9457, and a recall of 0.9698 respectively; while Random Forest yields an accuracy of 0.9973, F1 of 0.9898, precision 0.9457, and recall 0.9698 respectively. The XGBoost outperformed both Decision tree and Random Forest classifiers with an accuracy of 0.9984, F1 of 0.9945, Precision of 0.9616, and recall of 0.9890 respectively – which is attributed to its use of hyper-parameter tuning on its trees. We also note that SMOTEEN data balancing outperforms other data augment schemes with retention of a 30-day moratorium period for our adoption of the recency-frequency-monetization to improve monetization and keep business managers ahead of the consumer attrition curve.
Stacked Learning Anomaly Detection Scheme with Data Augmentation for Spatiotemporal Traffic Flow Binitie, Amaka Patience; Odiakaose , Christopher Chukwufunaya; Okpor, Margaret Dumebi; Ejeh, Patrick Ogholuwarami; Eboka, Andrew Okonji; Ojugo, Arnold Adimabua; Setiadi, De Rosal Ignatius Moses; Ako, Rita Erhovwo; Aghaunor, Tabitha Chukwudi; Geteloma, Victor Ochuko; Afotanwo, Anderson
Journal of Fuzzy Systems and Control Vol. 2 No. 3 (2024): Vol. 2, No. 3, 2024
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v2i3.267

Abstract

The digital revolution births transformation in many facets of today’s society. Its adoption in transportation to curb traffic congestion in major cities globally advances smart-city initiatives. Challenges of population growth, lack of datasets, and aging infrastructure have necessitated the need for traffic analytics. Studies have estimated an associated global annual loss of $583 billion to traffic congestion for 2023. This, caused fuel wastage, loss of time, and increased costs across congested areas. With the cost of building more road networks, cities must advance new ways to improve traffic flow via anomaly detection as an early warning in the flow pattern. Our study posits stacked learning with extreme gradient boost as a meta-learner to help address imbalanced datasets, yield faster model construction, and ensure improved performance via enhanced anomalous data detection.
Investigating an Anomaly-based Intrusion Detection via Tree-based Adaptive Boosting Ensemble Onoma, Paul Avweresuo; Agboi, Joy; Geteloma, Victor Ochuko; Max-Egba, Asuobite ThankGod; Eboka, Andrew Okonji; Ojugo, Arnold Adimabua; Odiakaoase, Christopher Chukwufunaya; Ugbotu, Eferhire Valentine; Aghaunor, Tabitha Chukwudi; Binitie, Amaka Patience
Journal of Fuzzy Systems and Control Vol. 3 No. 1 (2025): Vol. 3, No. 1, 2025
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v3i1.279

Abstract

The eased accessibility, mobility, and portability of smartphones have caused the consequent rise in the proliferation of users' vulnerability to a variety of phishing attacks. Some users are more vulnerable due to factors like personality behavioral traits, media presence, and other factors. Our study seeks to reveal cues utilized by successful attacks by identifying web content as genuine and malicious data. We explore a sentiment-based extreme gradient boost learner with data collected over social platforms, scraped using the Python Google Scrapper. Our results show AdaBoost yields a prediction accuracy of 0.9989 to correctly classify 2148 cases with incorrectly classified 25 cases. The result shows the tree-based AdaBoost ensemble can effectively identify phishing cues and efficiently classify phishing lures against unsuspecting users from access to malicious content.
Voice-based Dynamic Time Warping Recognition Scheme for Enhanced Database Access Security Onoma, Paul Avweresuo; Ugbotu, Eferhire Valentine; Aghaunor, Tabitha Chukwudi; Agboi, Joy; Ojugo, Arnold Adimabua; Odiakaose, Christopher Chukwufunaya; Max-Egba, Asuobite ThankGod; Niemogha, Star Umiyemeromesu; Binitie, Amaka Patience; Abdullahi, Mustapha Barau
Journal of Fuzzy Systems and Control Vol. 3 No. 1 (2025): Vol. 3, No. 1, 2025
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v3i1.293

Abstract

Rapid transformation with database security has remained imperative as unauthorized access exposes sensitive data to adversaries. To curb this, we suggest using a secured dynamic time-warp scheme to improve access to the database schemas. The study integrates voice biometrics with two-factor authentication to yield a robust, user-friendly platform, which utilizes time-warping to authenticate voice patterns against the variability in utterance speed. Results showcase high accuracy and resiliency in its usage against spoofing attacks as compared to state-of-the-art voice recognition systems. The model ensures the minimal possibility of credential theft by binding the access of databases to the voice features of authorized users. The study shows the system's architecture, implementation, and performance evaluation, highlighting its potential to revolutionize database security in various applications. The findings underscore the importance of leveraging advanced biometric techniques to safeguard critical information systems.
Phishing Website Detection via a Transfer Learning based XGBoost Meta-learner with SMOTE-Tomek Agboi, Joy; Emordi, Frances Uche; Odiakaose, Christopher Chukwufunaya; Idama, Rebecca Okeoghene; Jumbo, Evans Fubara; Oweimieotu, Amanda Enaodona; Ezzeh, Peace Oguguo; Eboka, Andrew Okonji; Odoh, Anne; Ugbotu, Eferhire Valentine; Onoma, Paul Avwerosuoghene; Ojugo, Arnold Adimabua; Aghaunor, Tabitha Chukwudi; Binitie, Amaka Patience; Onochie, Christopher Chukwudi; Ejeh, Patrick Ogholuwarami; Nwozor, Blessing Uche
Journal of Fuzzy Systems and Control Vol. 3 No. 3 (2025): Vol. 3 No. 3 (2025)
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v3i3.325

Abstract

The widespread proliferation of smartphones has advanced portability, data access ease, mobility, and other merits; it has also birthed adversarial targeting of network resources that seek to compromise unsuspecting user devices. Increased susceptibility was traced to user's personality, which renders them repeatedly vulnerable to exploits. Our study posits a stacked learning model to classify malicious lures used by adversaries on phishing websites. Our hybrid fuses 3-base learners (i.e. Genetic Algorithm, Random Forest, Modular Net) with its output sent as input to the XGBoost. The imbalanced dataset was resolved via SMOTE-Tomek with predictors selected using a relief rank feature selection. Our hybrid yields F1 0.995, Accuracy 1.000, Recall 0.998, Precision 1.000, MCC 1.000, and Specificity 1.000 – to accurately classify all 3,316 cases of its held-out test dataset. Results affirm that it outperformed benchmark ensembles. The study shows that our proposed model, as explored on the UCI Phishing Website dataset, effectively classified phishing (cues and lures) contents on websites.
EcoSMEAL: Energy Consumption with Optimization Strategy via a Secured Smart Monitor-Alert Ensemble Aghaunor, Tabitha Chukwudi; Agboi, Joy; Ugbotu, Eferhire Valentine; Onoma, Paul Avweresuoghene; Ojugo, Arnold Adimabua; Odiakaose, Christopher Chukwufunaya; Eboka, Andrew Okonji; Ezzeh, Peace Oguguo; Geteloma, Victor Ochuko; Binitie, Amaka Patience; Orobor, Anderson Ise; Nwozor, Blessing Uche; Ejeh, Patrick Ogholuwarami; Onochie, Christopher Chukwudi
Journal of Fuzzy Systems and Control Vol. 3 No. 3 (2025): Vol. 3 No. 3 (2025)
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v3i3.319

Abstract

The global demand for automation that seeks the efficient consumption and usage of energy via the adoption of embedded-fit management solutions that yield improved performance with reduced consumption has become the new norm. These explore sensor-based units in their own right with eco-friendly platforms that raise germane environmental, health, and consumption regulation(s) concerns that have today become a global issue, even when they proffer improved life standards that replace traditional solutions. Our study posits an embedded sensor design to observe environmental conditions associated with energy consumption by residential or home appliances. It utilizes a machine learning scheme and algorithm to analyze the total energy consumed by each appliance and delivers optimal consumption that reduces energy waste. The system was tested across multiple parameters and found to yield desired effectiveness, reliability, and efficiency. Our utilization of the ESP8266 and ThingSpeak is able to handle extensive inputs without significant delays or data losses. Results affirms the system ability to maintain stable performance even with more devices connected to the unit.
Co-Authors Abdullahi, Mustapha Barau Abere, Reuben Akporube Achmad Nuruddin Safriandono Adigwe, Wilfred Afotanwo, Anderson Agboi, Joy Aghaunor, Tabitha Chukwudi Aghware, Fidelis Obukohwo Ajib Susanto Akazue, Maureen Ifeanyi Akhmad Dahlan Ako, Rita Erhovwo Anazia, Kizito Eluemunor Ashioba, Nwanze Chukwudi Binitie, Amaka Patience Budi Widjajanto De Rosal Ignatius Moses Setiadi Dian Kristiawan Nugroho Eboka, Andrew Okonji Edim, Edim Bassey Edje, Abel E Efetobore Edje, Abel Ejeh, Patrick Ogholorunwalomi Ejeh, Patrick Ogholuwarami Emordi, Frances Uche Emordi, Frances Uchechukwu Ezzeh, Peace Oguguo Farah Zakiyah Rahmanti Gan, Hong-Seng Geteloma, Victor Ochuko Ibor, Ayei Egu Idama, Rebecca Okeoghene Ifeanyi Akazue, Maureen Ilodigwe, Solomon Ebuka Imanuel Harkespan Iwan Setiawan Wibisono Jumbo, Evans Fubara Jutono Gondohanindijo, Jutono Kartikadarma , Etika Max-Egba, Asuobite ThankGod Muhamada, Keny Muslikh, Ahmad Rofiqul Niemogha, Star Umiyemeromesu Nwankwo, Obinna Nwozor, Blessing Nwozor, Blessing Uche Obruche, Chris Obaro Octara Pribadi Odiakaoase, Christopher Chukwufunaya Odiakaose , Christopher Chukwufunaya Odiakaose, Chris Chukwufunaya Odiakaose, Christopher Chukufunaya Odiakaose, Christopher Chukwufumaya Odiakaose, Christopher Chukwufunaya Odiakaose, Chukwufunaya Chris Odoh, Anne Ojei, Emma Obiajulu Ojei, Emmanuel Obiajulu Okpako, Ejaita Abugor Okpor, Margaret Dumebi Okpor, Margareth Dumebi Oladele, James Kolapo Omede, Edith Ugochi Omoruwou, Felix Onochie, Chris Chukwudi Onochie, Christopher Chukwudi Onoma, Paul Avweresuo Onoma, Paul Avweresuoghene Onoma, Paul Avwerosuoghene Onyemenem, Innocent Sunny Orobor, Anderson Ise Otakore, Oghenevwede Debby Oweimieotu, Amanda Enaodona Pratama, Nizar Rafi Robet Robet Setyoko, Bimo Haryo Stefanus Santosa Sudibyo, Usman Suyud Widiono Syahroni Wahyu Iriananda, Syahroni Wahyu Taylor, Onate Egerton Ugboh, Emeke Ugbotu, Eferhire Valentine Utomwen, Henry Warto - Yoro, Rume Elizabeth Zuama, Leygian Reyhan