Claim Missing Document
Check
Articles

Found 6 Documents
Search

Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study Ojugo, Arnold Adimabua; Akazue, Maureen Ifeanyi; Ejeh, Patrick Ogholuwarami; Ashioba, Nwanze Chukwudi; Odiakaose, Christopher Chukwufunaya; Ako, Rita Erhovwo; Emordi, Frances Uche
Journal of Computing Theories and Applications Vol. 1 No. 2 (2023): JCTA 1(2) 2023
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jcta.v1i2.9259

Abstract

The advent of the Internet as an effective means for resource sharing has consequently, led to proliferation of adversaries, with unauthorized access to network resources. Adversaries achieved fraudulent activities via carefully crafted attacks of large magnitude targeted at personal gains and rewards. With the cost of over $1.3Trillion lost globally to financial crimes and the rise in such fraudulent activities vis the use of credit-cards, financial institutions and major stakeholders must begin to explore and exploit better and improved means to secure client data and funds. Banks and financial services must harness the creative mode rendered by machine learning schemes to help effectively manage such fraud attacks and threats. We propose HyGAMoNNE – a hybrid modular genetic algorithm trained neural network ensemble to detect fraud activities. The hybrid, equipped with knowledge to altruistically detect fraud on credit card transactions. Results show that the hybrid effectively differentiates, the benign class attacks/threats from genuine credit card transaction(s) with model accuracy of 92%.
CoSoGMIR: A Social Graph Contagion Diffusion Framework using the Movement-Interaction-Return Technique Ojugo, Arnold Adimabua; Ejeh, Patrick Ogholuwarami; Akazue, Maureen Ifeanyi; Ashioba, Nwanze Chukwudi; Odiakaose, Christopher Chukwufunaya; Ako, Rita Erhovwo; Nwozor, Blessing; Emordi, Frances Uche
Journal of Computing Theories and Applications Vol. 1 No. 2 (2023): JCTA 1(2) 2023
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jcta.v1i2.9355

Abstract

Besides the inherent benefits of exchanging information and interactions between nodes on a social graph, they can also become a means for the propagation of knowledge. Social graphs have also become a veritable structure for the spread of disease outbreaks. These and its set of protocols are deployed as measures to curb its widespread effects as it has also left network experts puzzled. The recent lessons from the COVID-19 pandemic continue to reiterate that diseases will always be around. Nodal exposure, adoption/diffusion of disease(s) among interacting nodes vis-a-vis migration of nodes that cause further spread of contagion (concerning COVID-19 and other epidemics) has continued to leave experts bewildered towards rejigging set protocols. We model COVID-19 as a Markovian process with node targeting, propagation and recovery using migration-interaction as a threshold feat on a social graph. The migration-interaction design seeks to provision the graph with minimization and block of targeted diffusion of the contagion using seedset(s) nodes with a susceptible-infect policy. The study results showed that migration and interaction of nodes via the mobility approach have become an imperative factor that must be added when modeling the propagation of contagion or epidemics.
Enhancing the Random Forest Model via Synthetic Minority Oversampling Technique for Credit-Card Fraud Detection Aghware, Fidelis Obukohwo; Ojugo, Arnold Adimabua; Adigwe, Wilfred; Odiakaose, Christopher Chukwufumaya; Ojei, Emma Obiajulu; Ashioba, Nwanze Chukwudi; Okpor, Margareth Dumebi; Geteloma, Victor Ochuko
Journal of Computing Theories and Applications Vol. 1 No. 4 (2024): JCTA 1(4) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10323

Abstract

Fraudsters increasingly exploit unauthorized credit card information for financial gain, targeting un-suspecting users, especially as financial institutions expand their services to semi-urban and rural areas. This, in turn, has continued to ripple across society, causing huge financial losses and lowering user trust implications for all cardholders. Thus, banks cum financial institutions are today poised to implement fraud detection schemes. Five algorithms were trained with and without the application of the Synthetic Minority Over-sampling Technique (SMOTE) to assess their performance. These algorithms included Random Forest (RF), K-Nearest Neighbors (KNN), Naïve Bayes (NB), Support Vector Machines (SVM), and Logistic Regression (LR). The methodology was implemented and tested through an API using Flask and Streamlit in Python. Before applying SMOTE, the RF classifier outperformed the others with an accuracy of 0.9802, while the accuracies for LR, KNN, NB, and SVM were 0.9219, 0.9435, 0.9508, and 0.9008, respectively. Conversely, after the application of SMOTE, RF achieved a prediction accuracy of 0.9919, whereas LR, KNN, NB, and SVM attained accuracies of 0.9805, 0.9210, 0.9125, and 0.8145, respectively. These results highlight the effectiveness of combining RF with SMOTE to enhance prediction accuracy in credit card fraud detection.
AQuamoAS: unmasking a wireless sensor-based ensemble for air quality monitor and alert system Geteloma, Victor Ochuko; Aghware, Fidelis Obukohwo; Adigwe, Wilfred; Odiakaose, Chukwufunaya Chris; Ashioba, Nwanze Chukwudi; Okpor, Margareth Dumebi; Ojugo, Arnold Adimabua; Ejeh, Patrick Ogholuwarami; Ako, Rita Erhovwo; Ojei, Emmanuel Obiajulu
Applied Engineering and Technology Vol 3, No 2 (2024): August 2024
Publisher : ASCEE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/aet.v3i2.1409

Abstract

The increased awareness by residents of their environment to maintain safe health states has consequently, birthed the integration of info tech to help resolve societal issues. These, and its adopted approaches have become critical and imperative in virtualization to help bridge the lapses in human mundane tasks and endeavors. Its positive impacts on society cannot be underestimated. Study advances a low-cost wireless sensor-based ensemble to effectively manage air quality tasks. Thus, we integrate an IoT framework to effectively monitors environment changes via microcontrollers, sensors, and blynk to assist users to monitor temperature, humidity, detect the presence of harmful gases in/out door environs. The blynk provides vital knowledge to the user. Our AQuaMoAS algorithm makes for an accurate and user-friendly mode using cloud services to ease monitor and data visualization. The system was tested at 3 different stages of rainy, sunny and heat with pollutant via alpha est method. For all functions at varying conditions, result revealed 70.7% humidity, 29.5OC, and 206 ppm on a sunny day. 51.5% humidity, 20.4OC and 198ppm on a rainy, and 43.1 humidity, 45.6OC, 199ppm air quality on heat and 66.5% humidity, 30.2 OC and 363 ppm air quality on application of air pollutant were observed
Enhanced data augmentation for predicting consumer churn rate with monetization and retention strategies: a pilot study Geteloma, Victor Ochuko; Aghware, Fidelis Obukohwo; Adigwe, Wilfred; Odiakaose, Chukwufunaya Chris; Ashioba, Nwanze Chukwudi; Okpor, Margareth Dumebi; Ojugo, Arnold Adimabua; Ejeh, Patrick Ogholuwarami; Ako, Rita Erhovwo; Ojei, Emmanuel Obiajulu
Applied Engineering and Technology Vol 3, No 1 (2024): April 2024
Publisher : ASCEE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/aet.v3i1.1408

Abstract

Customer retention and monetization have since been the pillar of many successful firms and businesses as keeping an old customer is far more economical than gaining a new one – which, in turn, reduce customer churn rate. Previous studies have focused on the use of single heuristics as well as provisioned no retention strategy. To curb this, our study posits the use of the recen-cy-frequency-monetization framework as strategy for customer retention and monetization impacts. With dataset retrieved from Kaggle, and partitioned into train and test dataset/folds to ease model construction and training. Study adopt a tree-based Random Forest ensemble with synthetic minority oversampling technique edited nearest neighbor (SMOTEEN). Various benchmark models were trained to asssess how well each performs against our proposed ensemble. The application was tested using an application programming interface Flask and integrated using streamlit into a device. Our RF-ensemble resulted in a 0.9902 accuracy prior to applying SMOTEENN; while, LR, KNN, Naïve Bayes and SVM yielded an accuracy of 0.9219, 0.9435, 0.9508 and 0.9008 respectively. With SMOTEENN applied, our ensemble had an accuracy of 0.9919; while LR, KNN, Naïve Bayes, and SVM yielded an accuracy of 0.9805, 0.921, 0.9125, and 0.8145 respectively. RF has shown it can be implemented with SMOTEENN to yield enhanced prediction for customer churn prediction using Python
Enhanced n-party Diffie Hellman key exchange algorithm using the divide and conquer algorithm Ashioba, Nwanze Chukwudi; Ejeh, Patrick Ogholorunwalomi; Maduabuchuku, Azaka
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i2.pp438-445

Abstract

Cryptographic algorithms guarantee data and information security via a communication system against unauthorized users or intruders. Numerous encryption techniques have been employed to safeguard this data and information from hackers. By supplying a distinct shared secret key, the n-party Diffie Hellman key exchange approach has been used to protect data from hackers. Using a quadratic time complexity, the n-party Diffie-Hellman method is slow when multiple users use the cryptographic key interchange system. To solve this issue, the researchers created an effective shared hidden key for the n-party Diffie Hellman key exchange of a cryptographic system using the divide-and-conquer strategy. The current research recommends the use of the divide and conquer algorithm, which breaks down the main problem into smaller subproblems until it reaches the base solution, which is then merged to generate the solution of the main problem. The comparative analysis indicates that the developed system generates a shared secret key faster than the current n-party Diffie Hellman system.