Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–6 dari 6 artikel
Investigating a SMOTE-Tomek Boosted Stacked Learning Scheme for Phishing Website Detection: A Pilot Study
Ugbotu, Eferhire Valentine
; Emordi, Frances Uchechukwu
; Ugboh, Emeke
; Anazia, Kizito Eluemunor
; Odiakaose, Christopher Chukwufunaya
; Onoma, Paul Avwerosuoghene
; Idama, Rebecca Okeoghene
; Ojugo, Arnold Adimabua
; Geteloma, Victor Ochuko
; Oweimieotu, Amanda Enaodona
; Aghaunor, Tabitha Chukwudi
; Binitie, Amaka Patience
; Odoh, Anne
; Onochie, Chris Chukwudi
; Ezzeh, Peace Oguguo
; Eboka, Andrew Okonji
; Agboi, Joy
; Ejeh, Patrick Ogholuwarami
Journal of Computing Theories and Applications
Vol 3
, No 2
(2025)
The daily exchange of informatics over the Internet has both eased the widespread proliferation of resources to ease accessibility, availability and interoperability of accompanying devices. In addition, the recent widespread proliferation of smartphones alongside other computing devices has continued to advance features such as miniaturization, portability, data access ease, mobility, and other merits. It has also birthed adversarial attacks targeted at network infrastructures and aimed at expl...
Sumber Asli
Google Scholar
DOI
Integrating Hybrid Statistical and Unsupervised LSTM-Guided Feature Extraction for Breast Cancer Detection
Setiadi, De Rosal Ignatius Moses
; Ojugo, Arnold Adimabua
; Pribadi, Octara
; Kartikadarma , Etika
; Setyoko, Bimo Haryo
; Widiono, Suyud
; Robet, Robet
; Aghaunor, Tabitha Chukwudi
; Ugbotu, Eferhire Valentine
Journal of Computing Theories and Applications
Vol 2
, No 4
(2025)
Breast cancer is the most prevalent cancer among women worldwide, requiring early and accurate diagnosis to reduce mortality. This study proposes a hybrid classification pipeline that integrates Hybrid Statistical Feature Selection (HSFS) with unsupervised LSTM-guided feature extraction for breast cancer detection using the Wisconsin Diagnostic Breast Cancer (WDBC) dataset. Initially, 20 features were selected using HSFS based on Mutual Information, Chi-square, and Pearson Correlation. To addres...
Sumber Asli
Google Scholar
DOI
Assessment of Abiotic Factors for Sea Turtle Nesting Suitability in Coastal Bays
Advance Sustainable Science, Engineering and Technology
Vol 6
, No 4
(2024)
Cilacap Bays, critical nesting areas for sea turtles, face growing habitat disturbances from tourism. However, studies on nesting suitability in these regions remain scarce. This research assesses the abiotic factors influencing sea turtle nesting in Cilacap Regency, Indonesia, across eight observation stations. Key ecological parameters—land surface temperature (28°C - 36.3°C), pH (mean 6.8), sand particle size (0.212-0.500 mm), beach slope (11.50%-20.99%), and beach width (28.8m-81.8m)—were ev...
Sumber Asli
Google Scholar
DOI
3 Sitasi
Enhancing the Random Forest Model via Synthetic Minority Oversampling Technique for Credit-Card Fraud Detection
Aghware, Fidelis Obukohwo
; Ojugo, Arnold Adimabua
; Adigwe, Wilfred
; Odiakaose, Christopher Chukwufumaya
; Ojei, Emma Obiajulu
; Ashioba, Nwanze Chukwudi
; Okpor, Margareth Dumebi
; Geteloma, Victor Ochuko
Journal of Computing Theories and Applications
Vol 1
, No 4
(2024)
Fraudsters increasingly exploit unauthorized credit card information for financial gain, targeting un-suspecting users, especially as financial institutions expand their services to semi-urban and rural areas. This, in turn, has continued to ripple across society, causing huge financial losses and lowering user trust implications for all cardholders. Thus, banks cum financial institutions are today poised to implement fraud detection schemes. Five algorithms were trained with and without the app...
Sumber Asli
Google Scholar
DOI
CoSoGMIR: A Social Graph Contagion Diffusion Framework using the Movement-Interaction-Return Technique
Ojugo, Arnold Adimabua
; Ejeh, Patrick Ogholuwarami
; Akazue, Maureen Ifeanyi
; Ashioba, Nwanze Chukwudi
; Odiakaose, Christopher Chukwufunaya
; Ako, Rita Erhovwo
; Nwozor, Blessing
; Emordi, Frances Uche
Journal of Computing Theories and Applications
Vol 1
, No 2
(2023)
Besides the inherent benefits of exchanging information and interactions between nodes on a social graph, they can also become a means for the propagation of knowledge. Social graphs have also become a veritable structure for the spread of disease outbreaks. These and its set of protocols are deployed as measures to curb its widespread effects as it has also left network experts puzzled. The recent lessons from the COVID-19 pandemic continue to reiterate that diseases will always be around. Noda...
Sumber Asli
Google Scholar
DOI
10 Sitasi
Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study
Ojugo, Arnold Adimabua
; Akazue, Maureen Ifeanyi
; Ejeh, Patrick Ogholuwarami
; Ashioba, Nwanze Chukwudi
; Odiakaose, Christopher Chukwufunaya
; Ako, Rita Erhovwo
; Emordi, Frances Uche
Journal of Computing Theories and Applications
Vol 1
, No 2
(2023)
The advent of the Internet as an effective means for resource sharing has consequently, led to proliferation of adversaries, with unauthorized access to network resources. Adversaries achieved fraudulent activities via carefully crafted attacks of large magnitude targeted at personal gains and rewards. With the cost of over $1.3Trillion lost globally to financial crimes and the rise in such fraudulent activities vis the use of credit-cards, financial institutions and major stakeholders must begi...
Sumber Asli
Google Scholar
DOI
20 Sitasi