Claim Missing Document
Check
Articles

Found 3 Documents
Search

Predicting rainfall runoff in Southern Nigeria using a fused hybrid deep learning ensemble Ojugo, Arnold Adimabua; Ejeh, Patrick Ogholuwarami; Odiakaose, Christopher Chukwufunaya; Eboka, Andrew Okonji; Emordi, Frances Uchechukwu
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 13, No 1: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v13i1.pp108-115

Abstract

Rainfall as an environmental feat can change fast and yield significant influence in downstream hydrology known as runoff with a variety of implications such as erosion, water quality, and infrastructures. These, in turn impact the quality of life, sewage systems, agriculture, and tourism of a nation to mention a few. It chaotic, complex, and dynamic nature has necessitated studies in the quest for future direction of such runoff via prediction models. With little successes in use of knowledge driven models, many studies have now turned to data-driven models. Dataset is retrieved from Metrological Center in Lagos, Nigeria for the period 1999-2019 for the Benin-Owena River Basin. Data is split: 70% for train and 30% for test. Our study adapts a spatial-temporal profile hidden Markov trained deep neural network. Result yields a sensitivity of 0.9, specificity 0.19, accuracy of 0.74, and improvement rate of classification of 0.12. Other ensembles underperformed when compared to proposed model. The study reveals annual rainfall is an effect of variation cycle. Models will help simulate future floods and provide lead time warnings in flood management.
BEHeDaS: A Blockchain Electronic Health Data System for Secure Medical Records Exchange Oladele, James Kolapo; Ojugo, Arnold Adimabua; Odiakaose, Christopher Chukwufunaya; Emordi, Frances Uchechukwu; Abere, Reuben Akporube; Nwozor, Blessing; Ejeh, Patrick Ogholuwarami; Geteloma, Victor Ochuko
Journal of Computing Theories and Applications Vol. 1 No. 3 (2024): JCTA 1(3) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.9509

Abstract

Blockchain platforms propagate into every facet, including managing medical services with professional and patient-centered applications. With its sensitive nature, record privacy has become imminent with medical services for patient diagnosis and treatments. The nature of medical records has continued to necessitate their availability, reachability, accessibility, security, mobility, and confidentiality. Challenges to these include authorized transfer of patient records on referral, security across platforms, content diversity, platform interoperability, etc. These, are today – demystified with blockchain-based apps, which proffers platform/application services to achieve data features associated with the nature of the records. We use a permissioned-blockchain for healthcare record management. Our choice of permission mode with a hyper-fabric ledger that uses a world-state on a peer-to-peer chain – is that its smart contracts do not require a complex algorithm to yield controlled transparency for users. Its actors include patients, practitioners, and health-related officers as users to create, retrieve, and store patient medical records and aid interoperability. With a population of 500, the system yields a transaction (query and https) response time of 0.56 seconds and 0.42 seconds, respectively. To cater to platform scalability and accessibility, the system yielded 0.78 seconds and 063 seconds, respectively, for 2500 users.
Investigating a SMOTE-Tomek Boosted Stacked Learning Scheme for Phishing Website Detection: A Pilot Study Ugbotu, Eferhire Valentine; Emordi, Frances Uchechukwu; Ugboh, Emeke; Anazia, Kizito Eluemunor; Odiakaose, Christopher Chukwufunaya; Onoma, Paul Avwerosuoghene; Idama, Rebecca Okeoghene; Ojugo, Arnold Adimabua; Geteloma, Victor Ochuko; Oweimieotu, Amanda Enaodona; Aghaunor, Tabitha Chukwudi; Binitie, Amaka Patience; Odoh, Anne; Onochie, Chris Chukwudi; Ezzeh, Peace Oguguo; Eboka, Andrew Okonji; Agboi, Joy; Ejeh, Patrick Ogholuwarami
Journal of Computing Theories and Applications Vol. 3 No. 2 (2025): JCTA 3(2) 2025
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.14472

Abstract

The daily exchange of informatics over the Internet has both eased the widespread proliferation of resources to ease accessibility, availability and interoperability of accompanying devices. In addition, the recent widespread proliferation of smartphones alongside other computing devices has continued to advance features such as miniaturization, portability, data access ease, mobility, and other merits. It has also birthed adversarial attacks targeted at network infrastructures and aimed at exploiting interconnected cum shared resources. These exploits seek to compromise an unsuspecting user device cum unit. Increased susceptibility and success rate of these attacks have been traced to user's personality traits and behaviours, which renders them repeatedly vulnerable to such exploits especially those rippled across spoofed websites as malicious contents. Our study posits a stacked, transfer learning approach that seeks to classify malicious contents as explored by adversaries over a spoofed, phishing websites. Our stacked approach explores 3-base classifiers namely Cultural Genetic Algorithm, Random Forest, and Korhonen Modular Neural Network – whose output is utilized as input for XGBoost meta-learner. A major challenge with learning scheme(s) is the flexibility with the selection of appropriate features for estimation, and the imbalanced nature of the explored dataset for which the target class often lags behind. Our study resolved dataset imbalance challenge using the SMOTE-Tomek mode; while, the selected predictors was resolved using the relief rank feature selection. Results shows that our hybrid yields F1 0.995, Accuracy 0.997, Recall 0.998, Precision 1.000, AUC-ROC 0.997, and Specificity 1.000 – to accurately classify all 2,764 cases of its held-out test dataset. Results affirm that it outperformed bench-mark ensembles. Result shows the proposed model explored UCI Phishing Website dataset, and effectively classified phishing (cues and lures) contents on websites.