Claim Missing Document
Check
Articles

Found 5 Documents
Search

Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study Ojugo, Arnold Adimabua; Akazue, Maureen Ifeanyi; Ejeh, Patrick Ogholuwarami; Ashioba, Nwanze Chukwudi; Odiakaose, Christopher Chukwufunaya; Ako, Rita Erhovwo; Emordi, Frances Uche
Journal of Computing Theories and Applications Vol. 1 No. 2 (2023): JCTA 1(2) 2023
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jcta.v1i2.9259

Abstract

The advent of the Internet as an effective means for resource sharing has consequently, led to proliferation of adversaries, with unauthorized access to network resources. Adversaries achieved fraudulent activities via carefully crafted attacks of large magnitude targeted at personal gains and rewards. With the cost of over $1.3Trillion lost globally to financial crimes and the rise in such fraudulent activities vis the use of credit-cards, financial institutions and major stakeholders must begin to explore and exploit better and improved means to secure client data and funds. Banks and financial services must harness the creative mode rendered by machine learning schemes to help effectively manage such fraud attacks and threats. We propose HyGAMoNNE – a hybrid modular genetic algorithm trained neural network ensemble to detect fraud activities. The hybrid, equipped with knowledge to altruistically detect fraud on credit card transactions. Results show that the hybrid effectively differentiates, the benign class attacks/threats from genuine credit card transaction(s) with model accuracy of 92%.
CoSoGMIR: A Social Graph Contagion Diffusion Framework using the Movement-Interaction-Return Technique Ojugo, Arnold Adimabua; Ejeh, Patrick Ogholuwarami; Akazue, Maureen Ifeanyi; Ashioba, Nwanze Chukwudi; Odiakaose, Christopher Chukwufunaya; Ako, Rita Erhovwo; Nwozor, Blessing; Emordi, Frances Uche
Journal of Computing Theories and Applications Vol. 1 No. 2 (2023): JCTA 1(2) 2023
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jcta.v1i2.9355

Abstract

Besides the inherent benefits of exchanging information and interactions between nodes on a social graph, they can also become a means for the propagation of knowledge. Social graphs have also become a veritable structure for the spread of disease outbreaks. These and its set of protocols are deployed as measures to curb its widespread effects as it has also left network experts puzzled. The recent lessons from the COVID-19 pandemic continue to reiterate that diseases will always be around. Nodal exposure, adoption/diffusion of disease(s) among interacting nodes vis-a-vis migration of nodes that cause further spread of contagion (concerning COVID-19 and other epidemics) has continued to leave experts bewildered towards rejigging set protocols. We model COVID-19 as a Markovian process with node targeting, propagation and recovery using migration-interaction as a threshold feat on a social graph. The migration-interaction design seeks to provision the graph with minimization and block of targeted diffusion of the contagion using seedset(s) nodes with a susceptible-infect policy. The study results showed that migration and interaction of nodes via the mobility approach have become an imperative factor that must be added when modeling the propagation of contagion or epidemics.
Effects of Data Resampling on Predicting Customer Churn via a Comparative Tree-based Random Forest and XGBoost Ako, Rita Erhovwo; Aghware, Fidelis Obukohwo; Okpor, Margaret Dumebi; Akazue, Maureen Ifeanyi; Yoro, Rume Elizabeth; Ojugo, Arnold Adimabua; Setiadi, De Rosal Ignatius Moses; Odiakaose, Chris Chukwufunaya; Abere, Reuben Akporube; Emordi, Frances Uche; Geteloma, Victor Ochuko; Ejeh, Patrick Ogholuwarami
Journal of Computing Theories and Applications Vol. 2 No. 1 (2024): JCTA 2(1) 2024
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.10562

Abstract

Customer attrition has become the focus of many businesses today – since the online market space has continued to proffer customers, various choices and alternatives to goods, services, and products for their monies. Businesses must seek to improve value, meet customers' teething demands/needs, enhance their strategies toward customer retention, and better monetize. The study compares the effects of data resampling schemes on predicting customer churn for both Random Forest (RF) and XGBoost ensembles. Data resampling schemes used include: (a) default mode, (b) random-under-sampling RUS, (c) synthetic minority oversampling technique (SMOTE), and (d) SMOTE-edited nearest neighbor (SMOTEEN). Both tree-based ensembles were constructed and trained to assess how well they performed with the chi-square feature selection mode. The result shows that RF achieved F1 0.9898, Accuracy 0.9973, Precision 0.9457, and Recall 0.9698 for the default, RUS, SMOTE, and SMOTEEN resampling, respectively. Xgboost outperformed Random Forest with F1 0.9945, Accuracy 0.9984, Precision 0.9616, and Recall 0.9890 for the default, RUS, SMOTE, and SMOTEEN, respectively. Studies support that the use of SMOTEEN resampling outperforms other schemes; while, it attributed XGBoost enhanced performance to hyper-parameter tuning of its decision trees. Retention strategies of recency-frequency-monetization were used and have been found to curb churn and improve monetization policies that will place business managers ahead of the curve of churning by customers.
Comparative Data Resample to Predict Subscription Services Attrition Using Tree-based Ensembles Okpor, Margaret Dumebi; Aghware, Fidelis Obukohwo; Akazue, Maureen Ifeanyi; Ojugo, Arnold Adimabua; Emordi, Frances Uche; Odiakaose, Christopher Chukwufunaya; Ako, Rita Erhovwo; Geteloma, Victor Ochuko; Binitie, Amaka Patience; Ejeh, Patrick Ogholuwarami
Journal of Fuzzy Systems and Control Vol. 2 No. 2 (2024): Vol. 2, No. 2, 2024
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v2i2.213

Abstract

The digital market today, is rippled with a variety of goods/services that promote monetization and asset exchange with clients constantly seeking improved alternatives at lowered cost to meet their value demands. From item upgrades to their replacement, businesses are poised with retention strategies to help curb the challenge of customer attrition. Such strategies include the upgrade of goods and services at lesser cost and targeted improved value chains to meet client needs. These are found to improve client retention and better monetization. The study predicts customer churn via tree-based ensembles with data resampling such as the random-under-sample, synthetic minority oversample (SMOTE), and SMOTE-edited nearest neighbor (SMOTEEN). We chose three (3) tree-based ensembles namely: (a) decision tree, (b) random forest, and (c) extreme gradient boosting – to ensure we have single and ensemble classifier(s) to assess how well bagging and boosting modes perform on consumer churn prediction. With chi-square feature selection mode, the Decision tree model yields an accuracy of 0.9973, F1 of 0.9898, a precision of 0.9457, and a recall of 0.9698 respectively; while Random Forest yields an accuracy of 0.9973, F1 of 0.9898, precision 0.9457, and recall 0.9698 respectively. The XGBoost outperformed both Decision tree and Random Forest classifiers with an accuracy of 0.9984, F1 of 0.9945, Precision of 0.9616, and recall of 0.9890 respectively – which is attributed to its use of hyper-parameter tuning on its trees. We also note that SMOTEEN data balancing outperforms other data augment schemes with retention of a 30-day moratorium period for our adoption of the recency-frequency-monetization to improve monetization and keep business managers ahead of the consumer attrition curve.
Phishing Website Detection via a Transfer Learning based XGBoost Meta-learner with SMOTE-Tomek Agboi, Joy; Emordi, Frances Uche; Odiakaose, Christopher Chukwufunaya; Idama, Rebecca Okeoghene; Jumbo, Evans Fubara; Oweimieotu, Amanda Enaodona; Ezzeh, Peace Oguguo; Eboka, Andrew Okonji; Odoh, Anne; Ugbotu, Eferhire Valentine; Onoma, Paul Avwerosuoghene; Ojugo, Arnold Adimabua; Aghaunor, Tabitha Chukwudi; Binitie, Amaka Patience; Onochie, Christopher Chukwudi; Ejeh, Patrick Ogholuwarami; Nwozor, Blessing Uche
Journal of Fuzzy Systems and Control Vol. 3 No. 3 (2025): Vol. 3 No. 3 (2025)
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v3i3.325

Abstract

The widespread proliferation of smartphones has advanced portability, data access ease, mobility, and other merits; it has also birthed adversarial targeting of network resources that seek to compromise unsuspecting user devices. Increased susceptibility was traced to user's personality, which renders them repeatedly vulnerable to exploits. Our study posits a stacked learning model to classify malicious lures used by adversaries on phishing websites. Our hybrid fuses 3-base learners (i.e. Genetic Algorithm, Random Forest, Modular Net) with its output sent as input to the XGBoost. The imbalanced dataset was resolved via SMOTE-Tomek with predictors selected using a relief rank feature selection. Our hybrid yields F1 0.995, Accuracy 1.000, Recall 0.998, Precision 1.000, MCC 1.000, and Specificity 1.000 – to accurately classify all 3,316 cases of its held-out test dataset. Results affirm that it outperformed benchmark ensembles. The study shows that our proposed model, as explored on the UCI Phishing Website dataset, effectively classified phishing (cues and lures) contents on websites.