Claim Missing Document
Check
Articles

Hypertension Detection via Tree-Based Stack Ensemble with SMOTE-Tomek Data Balance and XGBoost Meta-Learner Odiakaose, Christopher Chukwufunaya; Aghware, Fidelis Obukohwo; Okpor, Margaret Dumebi; Eboka, Andrew Okonji; Binitie, Amaka Patience; Ojugo, Arnold Adimabua; Setiadi, De Rosal Ignatius Moses; Ibor, Ayei Egu; Ako, Rita Erhovwo; Geteloma, Victor Ochuko; Ugbotu, Eferhire Valentine; Aghaunor, Tabitha Chukwudi
Journal of Future Artificial Intelligence and Technologies Vol. 1 No. 3 (2024): December 2024
Publisher : Future Techno Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/faith.3048-3719-43

Abstract

High blood pressure (or hypertension) is a causative disorder to a plethora of other ailments – as it succinctly masks other ailments, making them difficult to diagnose and manage with a targeted treatment plan effectively. While some patients living with elevated high blood pressure can effectively manage their condition via adjusted lifestyle and monitoring with follow-up treatments, Others in self-denial leads to unreported instances, mishandled cases, and in now rampant cases – result in death. Even with the usage of machine learning schemes in medicine, two (2) significant issues abound, namely: (a) utilization of dataset in the construction of the model, which often yields non-perfect scores, and (b) the exploration of complex deep learning models have yielded improved accuracy, which often requires large dataset. To curb these issues, our study explores the tree-based stacking ensemble with Decision tree, Adaptive Boosting, and Random Forest (base learners) while we explore the XGBoost as a meta-learner. With the Kaggle dataset as retrieved, our stacking ensemble yields a prediction accuracy of 1.00 and an F1-score of 1.00 that effectively correctly classified all instances of the test dataset.
Stacked Learning Anomaly Detection Scheme with Data Augmentation for Spatiotemporal Traffic Flow Binitie, Amaka Patience; Odiakaose , Christopher Chukwufunaya; Okpor, Margaret Dumebi; Ejeh, Patrick Ogholuwarami; Eboka, Andrew Okonji; Ojugo, Arnold Adimabua; Setiadi, De Rosal Ignatius Moses; Ako, Rita Erhovwo; Aghaunor, Tabitha Chukwudi; Geteloma, Victor Ochuko; Afotanwo, Anderson
Journal of Fuzzy Systems and Control Vol. 2 No. 3 (2024): Vol. 2, No. 3, 2024
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v2i3.267

Abstract

The digital revolution births transformation in many facets of today’s society. Its adoption in transportation to curb traffic congestion in major cities globally advances smart-city initiatives. Challenges of population growth, lack of datasets, and aging infrastructure have necessitated the need for traffic analytics. Studies have estimated an associated global annual loss of $583 billion to traffic congestion for 2023. This, caused fuel wastage, loss of time, and increased costs across congested areas. With the cost of building more road networks, cities must advance new ways to improve traffic flow via anomaly detection as an early warning in the flow pattern. Our study posits stacked learning with extreme gradient boost as a meta-learner to help address imbalanced datasets, yield faster model construction, and ensure improved performance via enhanced anomalous data detection.
Pilot study on deploying a wireless sensor-based virtual-key access and lock system for home and industrial frontiers Eboka, Andrew Okonji; Aghware, Fidelis Obukohwo; Okpor, Margaret Dumebi; Odiakaose, Christopher Chukufunaya; Okpako, Ejaita Abugor; Ojugo, Arnold Adimabua; Ako, Rita Erhovwo; Binitie, Amaka Patience; Onyemenem, Innocent Sunny; Ejeh, Patrick Ogholuwarami; Geteloma, Victor Ochuko
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp287-297

Abstract

The rise in data processing activities vis-à-vis the consequent rise in adoption and adaptation of information and communication tech related approaches to resolve societal challenges has become both critical and imperative. Virtualization have become the order of the day to bridge various lapses of human mundane tasks and endeavors. Its positive impacts on society cannot be underestimated. This study advances a virtual wireless sensor-based key-card access system with cost-effective solution to manage access to restricted areas within a facility. We seek to integrate virtual key card access, web-access control, solenoid lock integration, and ESP32- controller to create a dependable internet of things (IoT)-enabled access control system. Results show system benefit includes improved security, improved convenience, privacy, efficiency with real-time control capabilities that will allows building administrators to track and manage access to the facility remotely.
Outlier Detection Using Gaussian Mixture Model Clustering to Optimize XGBoost for Credit Approval Prediction Setiadi, De Rosal Ignatius Moses; Muslikh, Ahmad Rofiqul; Iriananda, Syahroni Wahyu; Warto, Warto; Gondohanindijo, Jutono; Ojugo, Arnold Adimabua
Journal of Computing Theories and Applications Vol. 2 No. 2 (2024): JCTA 2(2) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.11638

Abstract

Credit approval prediction is one of the critical challenges in the financial industry, where the accuracy and efficiency of credit decision-making can significantly affect business risk. This study proposes an outlier detection method using the Gaussian Mixture Model (GMM) combined with Extreme Gradient Boosting (XGBoost) to improve prediction accuracy. GMM is used to detect outliers with a probabilistic approach, allowing for finer-grained anomaly identification compared to distance- or density-based methods. Furthermore, the data cleaned through GMM is processed using XGBoost, a decision tree-based boosting algorithm that efficiently handles complex datasets. This study compares the performance of XGBoost with various outlier detection methods, such as LOF, CBLOF, DBSCAN, IF, and K-Means, as well as various other classification algorithms based on machine learning and deep learning. Experimental results show that the combination of GMM and XGBoost provides the best performance with an accuracy of 95.493%, a recall of 91.650%, and an AUC of 95.145%, outperforming other models in the context of credit approval prediction on an imbalanced dataset. The proposed method has been proven to reduce prediction errors and improve the model's reliability in detecting eligible credit applications.
High-Performance Face Spoofing Detection using Feature Fusion of FaceNet and Tuned DenseNet201 Zuama, Leygian Reyhan; Setiadi, De Rosal Ignatius Moses; Susanto, Ajib; Santosa, Stefanus; Gan, Hong-Seng; Ojugo, Arnold Adimabua
Journal of Future Artificial Intelligence and Technologies Vol. 1 No. 4 (2025): March 2025
Publisher : Future Techno Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/faith.3048-3719-62

Abstract

Face spoofing detection is critical for biometric security systems to prevent unauthorized access. This study proposes a deep learning-based approach integrating FaceNet and DenseNet201 to enhance face spoofing detection performance. FaceNet generates identity-based embeddings, ensuring robust facial feature representation, while DenseNet201 extracts complementary texture-based features. These features are fused using the Concatenate function to form a more comprehensive representation for im-proved classification. The proposed method is evaluated on two widely used face spoofing datasets, NUAA Photograph Imposter and LCC-FASD, achieving 100% accuracy on NUAA and 99% on LCC-FASD. Ablation studies reveal that data augmentation does not always enhance performance, particularly on high-complexity datasets such as LCC-FASD, where augmentation increases the False Rejection Rate (FRR). Conversely, DenseNet201 benefits more from augmentation, while the proposed method performs best without augmentation. Comparative analysis with previous studies further confirms the superiority of the proposed approach in reducing error rates, particularly Half Total Error Rate (HTER), False Acceptance Rate (FAR), and FRR. These findings indicate that combining identity-based embeddings and texture-based feature extraction significantly improves spoofing detection and enhances model robustness across different attack scenarios. This study advances biometric security by introducing an efficient feature fusion strategy that strengthens deep learning-based spoof detection. Future research may explore further optimization strategies and evaluate the approach on more diverse datasets to enhance generalization.
Feature Fusion with Albumentation for Enhancing Monkeypox Detection Using Deep Learning Models Pratama, Nizar Rafi; Setiadi, De Rosal Ignatius Moses; Harkespan, Imanuel; Ojugo, Arnold Adimabua
Journal of Computing Theories and Applications Vol. 2 No. 3 (2025): JCTA 2(3) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.12255

Abstract

Monkeypox is a zoonotic disease caused by Orthopoxvirus, presenting clinical challenges due to its visual similarity to other dermatological conditions. Early and accurate detection is crucial to prevent further transmission, yet conventional diagnostic methods are often resource-intensive and time-consuming. This study proposes a deep learning-based classification model by integrating Xception and InceptionV3 using feature fusion to enhance performance in classifying Monkeypox skin lesions. Given the limited availability of annotated medical images, data augmentation was applied using Albumentation to improve model generalization. The proposed model was trained and evaluated on the Monkeypox Skin Lesion Dataset (MSLD), achieving 85.96% accuracy, 86.47% precision, 85.25% recall, 78.43% specificity, and an AUC score of 0.8931, outperforming existing methods. Notably, data augmentation significantly improved recall from 81.23% to 85.25%, demonstrating its effectiveness in enhancing sensitivity to positive cases. Ablation studies further validated that augmentation increased overall accuracy from 82.02% to 85.96%, emphasizing its role in improving model robustness. Comparative analysis with other models confirmed the superiority of our approach. This research enhances automated Monkeypox detection, offering a robust and efficient tool for low-resource clinical settings. The findings reinforce the potential of feature fusion and augmentation in improving deep learn-ing-based medical image classification, facilitating more reliable and accessible disease identification.
Investigating an Anomaly-based Intrusion Detection via Tree-based Adaptive Boosting Ensemble Onoma, Paul Avweresuo; Agboi, Joy; Geteloma, Victor Ochuko; Max-Egba, Asuobite ThankGod; Eboka, Andrew Okonji; Ojugo, Arnold Adimabua; Odiakaoase, Christopher Chukwufunaya; Ugbotu, Eferhire Valentine; Aghaunor, Tabitha Chukwudi; Binitie, Amaka Patience
Journal of Fuzzy Systems and Control Vol. 3 No. 1 (2025): Vol. 3, No. 1, 2025
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v3i1.279

Abstract

The eased accessibility, mobility, and portability of smartphones have caused the consequent rise in the proliferation of users' vulnerability to a variety of phishing attacks. Some users are more vulnerable due to factors like personality behavioral traits, media presence, and other factors. Our study seeks to reveal cues utilized by successful attacks by identifying web content as genuine and malicious data. We explore a sentiment-based extreme gradient boost learner with data collected over social platforms, scraped using the Python Google Scrapper. Our results show AdaBoost yields a prediction accuracy of 0.9989 to correctly classify 2148 cases with incorrectly classified 25 cases. The result shows the tree-based AdaBoost ensemble can effectively identify phishing cues and efficiently classify phishing lures against unsuspecting users from access to malicious content.
Voice-based Dynamic Time Warping Recognition Scheme for Enhanced Database Access Security Onoma, Paul Avweresuo; Ugbotu, Eferhire Valentine; Aghaunor, Tabitha Chukwudi; Agboi, Joy; Ojugo, Arnold Adimabua; Odiakaose, Christopher Chukwufunaya; Max-Egba, Asuobite ThankGod; Niemogha, Star Umiyemeromesu; Binitie, Amaka Patience; Abdullahi, Mustapha Barau
Journal of Fuzzy Systems and Control Vol. 3 No. 1 (2025): Vol. 3, No. 1, 2025
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v3i1.293

Abstract

Rapid transformation with database security has remained imperative as unauthorized access exposes sensitive data to adversaries. To curb this, we suggest using a secured dynamic time-warp scheme to improve access to the database schemas. The study integrates voice biometrics with two-factor authentication to yield a robust, user-friendly platform, which utilizes time-warping to authenticate voice patterns against the variability in utterance speed. Results showcase high accuracy and resiliency in its usage against spoofing attacks as compared to state-of-the-art voice recognition systems. The model ensures the minimal possibility of credential theft by binding the access of databases to the voice features of authorized users. The study shows the system's architecture, implementation, and performance evaluation, highlighting its potential to revolutionize database security in various applications. The findings underscore the importance of leveraging advanced biometric techniques to safeguard critical information systems.
Integrating Hybrid Statistical and Unsupervised LSTM-Guided Feature Extraction for Breast Cancer Detection Setiadi, De Rosal Ignatius Moses; Ojugo, Arnold Adimabua; Pribadi, Octara; Kartikadarma , Etika; Setyoko, Bimo Haryo; Widiono, Suyud; Robet, Robet; Aghaunor, Tabitha Chukwudi; Ugbotu, Eferhire Valentine
Journal of Computing Theories and Applications Vol. 2 No. 4 (2025): JCTA 2(4) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.12698

Abstract

Breast cancer is the most prevalent cancer among women worldwide, requiring early and accurate diagnosis to reduce mortality. This study proposes a hybrid classification pipeline that integrates Hybrid Statistical Feature Selection (HSFS) with unsupervised LSTM-guided feature extraction for breast cancer detection using the Wisconsin Diagnostic Breast Cancer (WDBC) dataset. Initially, 20 features were selected using HSFS based on Mutual Information, Chi-square, and Pearson Correlation. To address class imbalance, the training set was balanced using the Synthetic Minority Over-sampling Technique (SMOTE). Subsequently, an LSTM encoder extracted non-linear latent features from the selected features. A fusion strategy was applied by concatenating the statistical and latent features, followed by re-selection of the top 30 features. The final classification was performed using a Support Vector Machine (SVM) with RBF kernel and evaluated using 5-fold cross-validation and a held-out test set. Experimental results showed that the proposed method achieved an average training accuracy of 98.13%, F1-score of 98.13%, and AUC-ROC of 99.55%. On the held-out test set, the model reached an accuracy of 99.30%, precision of 100%, and F1-score of 99.05%, with an AUC-ROC of 0.9973. The proposed pipeline demonstrates improved generalization and interpretability compared to existing methods such as LightGBM-PSO, DHH-GRU, and ensemble deep networks. These results highlight the effectiveness of combining statistical selection and LSTM-based latent feature encoding in a balanced classification framework.
Investigating a SMOTE-Tomek Boosted Stacked Learning Scheme for Phishing Website Detection: A Pilot Study Ugbotu, Eferhire Valentine; Emordi, Frances Uchechukwu; Ugboh, Emeke; Anazia, Kizito Eluemunor; Odiakaose, Christopher Chukwufunaya; Onoma, Paul Avwerosuoghene; Idama, Rebecca Okeoghene; Ojugo, Arnold Adimabua; Geteloma, Victor Ochuko; Oweimieotu, Amanda Enaodona; Aghaunor, Tabitha Chukwudi; Binitie, Amaka Patience; Odoh, Anne; Onochie, Chris Chukwudi; Ezzeh, Peace Oguguo; Eboka, Andrew Okonji; Agboi, Joy; Ejeh, Patrick Ogholuwarami
Journal of Computing Theories and Applications Vol. 3 No. 2 (2025): JCTA 3(2) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.14472

Abstract

The daily exchange of informatics over the Internet has both eased the widespread proliferation of resources to ease accessibility, availability and interoperability of accompanying devices. In addition, the recent widespread proliferation of smartphones alongside other computing devices has continued to advance features such as miniaturization, portability, data access ease, mobility, and other merits. It has also birthed adversarial attacks targeted at network infrastructures and aimed at exploiting interconnected cum shared resources. These exploits seek to compromise an unsuspecting user device cum unit. Increased susceptibility and success rate of these attacks have been traced to user's personality traits and behaviours, which renders them repeatedly vulnerable to such exploits especially those rippled across spoofed websites as malicious contents. Our study posits a stacked, transfer learning approach that seeks to classify malicious contents as explored by adversaries over a spoofed, phishing websites. Our stacked approach explores 3-base classifiers namely Cultural Genetic Algorithm, Random Forest, and Korhonen Modular Neural Network – whose output is utilized as input for XGBoost meta-learner. A major challenge with learning scheme(s) is the flexibility with the selection of appropriate features for estimation, and the imbalanced nature of the explored dataset for which the target class often lags behind. Our study resolved dataset imbalance challenge using the SMOTE-Tomek mode; while, the selected predictors was resolved using the relief rank feature selection. Results shows that our hybrid yields F1 0.995, Accuracy 0.997, Recall 0.998, Precision 1.000, AUC-ROC 0.997, and Specificity 1.000 – to accurately classify all 2,764 cases of its held-out test dataset. Results affirm that it outperformed bench-mark ensembles. Result shows the proposed model explored UCI Phishing Website dataset, and effectively classified phishing (cues and lures) contents on websites.
Co-Authors Abdullahi, Mustapha Barau Abere, Reuben Akporube Achmad Nuruddin Safriandono Adigwe, Wilfred Afotanwo, Anderson Agboi, Joy Aghaunor, Tabitha Chukwudi Aghware, Fidelis Obukohwo Ajib Susanto Akazue, Maureen Ifeanyi Akhmad Dahlan Ako, Rita Erhovwo Anazia, Kizito Eluemunor Ashioba, Nwanze Chukwudi Binitie, Amaka Patience Budi Widjajanto De Rosal Ignatius Moses Setiadi Dian Kristiawan Nugroho Eboka, Andrew Okonji Edim, Edim Bassey Edje, Abel E Efetobore Edje, Abel Ejeh, Patrick Ogholorunwalomi Ejeh, Patrick Ogholuwarami Emordi, Frances Uche Emordi, Frances Uchechukwu Ezzeh, Peace Oguguo Farah Zakiyah Rahmanti Gan, Hong-Seng Geteloma, Victor Ochuko Ibor, Ayei Egu Idama, Rebecca Okeoghene Ifeanyi Akazue, Maureen Ilodigwe, Solomon Ebuka Imanuel Harkespan Iwan Setiawan Wibisono Jumbo, Evans Fubara Jutono Gondohanindijo, Jutono Kartikadarma , Etika Max-Egba, Asuobite ThankGod Muhamada, Keny Muslikh, Ahmad Rofiqul Niemogha, Star Umiyemeromesu Nwankwo, Obinna Nwozor, Blessing Nwozor, Blessing Uche Obruche, Chris Obaro Octara Pribadi Odiakaoase, Christopher Chukwufunaya Odiakaose , Christopher Chukwufunaya Odiakaose, Chris Chukwufunaya Odiakaose, Christopher Chukufunaya Odiakaose, Christopher Chukwufumaya Odiakaose, Christopher Chukwufunaya Odiakaose, Chukwufunaya Chris Odoh, Anne Ojei, Emma Obiajulu Ojei, Emmanuel Obiajulu Okpako, Ejaita Abugor Okpor, Margaret Dumebi Okpor, Margareth Dumebi Oladele, James Kolapo Omede, Edith Ugochi Omoruwou, Felix Onochie, Chris Chukwudi Onochie, Christopher Chukwudi Onoma, Paul Avweresuo Onoma, Paul Avweresuoghene Onoma, Paul Avwerosuoghene Onyemenem, Innocent Sunny Orobor, Anderson Ise Otakore, Oghenevwede Debby Oweimieotu, Amanda Enaodona Pratama, Nizar Rafi Robet Robet Setyoko, Bimo Haryo Stefanus Santosa Sudibyo, Usman Suyud Widiono Syahroni Wahyu Iriananda, Syahroni Wahyu Taylor, Onate Egerton Ugboh, Emeke Ugbotu, Eferhire Valentine Utomwen, Henry Warto - Yoro, Rume Elizabeth Zuama, Leygian Reyhan