Publication Title Dependable Community-Cloud Framework for Smartphones
Publication Type journal
Publisher American Journal of Networks and Communications
Paper Link American Journal of Networks and Communications 4(4 4):95-103 DOI:10.11648/j.ajnc.20150404.13
Publication Authors Arnold Adimabua Ojugo, Fidelis Aghware, Rume Yoro, Oluwatoyin Yerokun
Year Published 2015-07-01
Abstract Cloud computing enable users to access ubiquitous, on-demand, convenient and shared resource (apps and storage) – as rapidly released by a provider with minimal managed effort. The increased growth of user access to mobile smartphones from 42.5% in 2013 to 78.9% by 2013 and the advent of Androids has made smartphones a preferred choice over PCs due to its design, portability, speed, functionality and Internet access ease – all of which continues to pose significant risk to user data security with high vulnerability to attacks. With its implication to work related functions and biz issues, it exposes sensitive data to adversaries. The study thus, describes a support tool named PushCloud that lets users account the ability to sign-in and perform backup functions on contacts, messages, picture files, documents, videos and recorded voice amongst others. Its other benefit is in the fact that it pools together cloud service providers and allows users a cross platform with minimal price difference. The system helps address security related issue from a user's end via AES-256 encryption on an integrated cloud model, explores its storage capability to guarantee data recovery with a remote server (BDC) for back-and front-end data storage ease.
Publication Title Assessing contributor features to phishing susceptibility amongst students of petroleum resources varsity in Nigeria
Publication Type journal
Publisher Journal homepage: http://ijece.iaescore.com
Paper Link DOI: 10.11591/ijece.v13i2.pp1922-1931
Publication Authors Rume Elizabeth Yoro, Fidelis Obukohwo Aghware, Bridget Ogheneovo Malasowe, Obinna Nwankwo, Arnold Adimabua Ojugo
Year Published 1-01
Abstract In this observational quasi-experimental study, we recruited 200 participants
during the Federal University of Petroleum Resources Effurun’s (FUPRE)
orientation, who were exposed to socially engineered (phishing) attacks over
nine months. Attacks sought to extract participants’ data and/or entice them
to click (compromised) links. The study aims to determine phishing
exposure and risks among undergraduates in FUPRE (Nigeria) by observing
their responses to socially-engineered attacks and exploring their attitudes to
cybercrime risks before and after phishing attacks. The study primed all
students in place of cybercrime awareness to remain vigilant to scams and
explored the various scam types with their influence on gender, age, status,
and their perceived safety on susceptibility to scams. Results show that
contrary to public beliefs, these factors have all been found to be associated
with scam susceptibility and vulnerability of the participants.
Publication Title Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian
Publication Type journal
Publisher Journal homepage: http://ijece.iaescore.com
Paper Link DOI: 10.11591/ijece.v13i2.pp1943-1953
Publication Authors Rume Elizabeth Yoro, Fidelis Obukohwo Aghware, Maureen Ifeanyi Akazue, Ayei Egu Ibor, Arnold Adimabua Ojugo
Year Published 0-18
Abstract Access ease, mobility, portability, and improved speed have continued to
ease the adoption of computing devices; while, consequently proliferating
phishing attacks. These, in turn, have created mixed feelings in increased
adoption and nosedived users’ trust level of devices. The study recruited
480-students, who were exposed to socially-engineered attack directives.
Attacks were designed to retrieve personal data and entice participants to
access compromised links. We sought to determine the risks of cybercrimes
among the undergraduates in selected Nigerian universities, observe
students’ responses and explore their attitudes before/after each attack.
Participants were primed to remain vigilant to all forms of scams as we
sought to investigate attacks’ influence on gender, students’ status, and age
to perceived safety on susceptibility to phishing. Results show that contrary
to public beliefs, age, status, and gender were not among the factors
associated with scam susceptibility and vulnerability rates of the
participants. However, the study reports decreased user trust levels in the
adoption of these new, mobile computing devices.
Publication Type journal
Publisher www.ijaem.net ISSN: 2395-5252
Paper Link DOI: 10.35629/5252-04041725
Publication Authors Ogala Justin Onyarin, Aghware, Obukohwo Fidelis
Year Published 4-04
Abstract Malware is a malicious code, program, or piece of
software. It refers to a program that is introduced
into a system, often invisibly (covertly), to
jeopardize the secrecy, integrity, or accessibility of
the victim's information, data, applications,
software, or operating system (OS), as well as
obstruct the victim's system's proper function and
obstructing a good user experience. They are
frequently constructed to carry out numerous
delicious and criminal activities in such a way that
their very existence at least when first introduced
into the victim's system, is an act of utter neglect.
Before 2000, malware infestations and prevention
concentrated on system attacks, denial of service,
and other methods. Individuals, corporations, and
governments have been involved in malicious code
design and spread for distributed network collapse
and cyberwars since the year 2000. Individuals and
businesses have suffered massive losses due to
widespread ignorance regarding the nature of
malware generation and spreading. With new
Malware appearing daily to add to the hundreds
already in existence, it is clear that the virus
problem is not going away anytime soon. This
document covers the history of Malware and its
various classifications and obfuscation tactics,
detection, and prevention tips for all computer
users.
Publication Type journal
Publisher Published online August 3, 2015 (http://www.sciencepublishinggroup.com/j/ajnc)
Paper Link doi: 10.11648/j.ajnc.20150404.13
Publication Authors Arnold Adimabua Ojugo, Fidelis Obukowho Aghware, Rume Elizabeth Yoro, Mary Oluwatoyin Yerokun, Andrew Okonji Eboka, Christiana Nneamaka Anujeonye, Fidelia Ngozi Efozia
Year Published 8-03
Abstract Cloud computing enable users to access ubiquitous, on-demand, convenient and shared resource (apps and storage)
– as rapidly released by a provider with minimal managed effort. The increased growth of user access to mobile smartphones
from 42.5% in 2013 to 78.9% by 2013 and the advent of Androids has made smartphones a preferred choice over PCs due to its
design, portability, speed, functionality and Internet access ease – all of which continues to pose significant risk to user data
security with high vulnerability to attacks. With its implication to work related functions and biz issues, it exposes sensitive data
to adversaries. The study thus, describes a support tool named PushCloud that lets users account the ability to sign-in and perform
backup functions on contacts, messages, picture files, documents, videos and recorded voice amongst others. Its other benefit is
in the fact that it pools together cloud service providers and allows users a cross platform with minimal price difference. The
system helps address security related issue from a user’s end via AES-256 encryption on an integrated cloud model, explores its
storage capability to guarantee data recovery with a remote server (BDC) for back- and front-end data storage ease.
Publication Type conferenceproceeding
Publisher World Congress on Engineering and Computer Science
Publication Authors Fidelis O. Aghware, Member, IAENG and Emeka O. Egbuna
Year Published 8-08
Abstract Information and Communication Technology
(ICT) has become an agent of change in this 21st century. The
deployment of information and communication technologies in
tackling national issues has manifested a great profit in notable
areas of human endeavor and national economies. However, in
some other areas the trend has been dared by numerous fast
growing socio - economic challenges infringing unexpectedly on
the Nations’ information security. This paper therefore
addresses the people issues affecting Information Security (IS)
in organizations and corporate bodies (CB), and discusses the
critical business needs for security; a comprehensive view of
the ecological security risks and human related security
threats; a discussion of the consequences of human neglect for
security; a discussion of recommended security strategies;
descriptive-interpretative data revealing security professionals’
perceptions about organizational security issue. In this paper, a
people centered Information security model is designed using
American Encryption Standard for sending
messaging/information across networks.
Publication Type journal
Publisher SciRes.
Paper Link doi:10.4236/ijcns.2011.411090 Published Online November 2011 (http://www.SciRP.org/journal/ijcns)
Publication Authors Aghware Fidelis Obukohwo
Year Published 9-30
Abstract Traditionally, the analysis of sector interdependencies has involved the characterization of all infrastructure-to-infrastructure interconnections and some of the main infrastructure integrals that, once lost or be
tampered with, will compromise the performance and security issues with the other interconnected infrastructures. Therefore, the paper dwells much on the security implications which may be associated with these
infrastructure sector interdependencies. This paper also discusses some of the major risk considerations,
analytical approaches, researches and the necessary developments needed as well as the interdisciplinary
ranges through which the necessary skills are required in the construction of comprehensive sector interdependencies.
Publication Title SOCIAL CHALLENGES AND SOCIETAL IMPLICATIONS OF HUMAN-COMPUTER INTERACTION (HCI) IN RESEARCH AND DEVELOPMENT
Publication Type journal
Publisher Jour. of Inst oflvtdematics & Comptrter Scierrces
Paper Link Jour. of Inst oflvtdematics & Comptrter Scierrces (Comprner Scimce Ser.) Vol.2t, No.l (2010) l7_21
Publication Authors Aghware, Fidelis Obukohwo, Egbuna Emeka, Aghware, Ann U., Ojugo Arnold A.
Year Published 4-01
Abstract computer and other high Technology (CHT) have come a long way in revolutionizing the world where humans duel from from generation to generation, usage of the computer High Tech var though, but the impact of Human-Computer Interaction (HCL) amongst users around the globe is questionable. Therefore, in this paper, we examine the radical social challenges of Human-Computer Interaction (HCL) amongst some array of users of these innovations on research and development (R&D)
Publication Title INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) INNOVATION IN TEACHING STUDENTS WITH DYSLEXIA
Publication Type journal
Publisher University of Delta Journal of contemporary studies in Education
Publication Authors Fidelis OLrukohwo Aghware, and Odirin Omiegbe
Year Published 9-01
Abstract Each teacher's intention is for college
students to apprehend and master what they
have found and be capable of observing it
in situations they want. However, some
scholars have issues remembering and
retaining what they have discovered.
Gaining knowledge of disability is a
situation defined as "difficulty in getting to know, and learning about a particular
mission." Agnosia, dysgraphia,
dyscalculia, and dyslexia are examples of
gaining knowledge of disabilities that can be seen in students. Diagnostic Prescriptive
Teaching (DPT); computer Assisted
Instructions (CAI) -Drill and practice
(DAP); prognosis, making plans,
implementation, assessment, change
(DMPIAC); educate -take a look at -teach;
individualized coaching, and project
evaluation are some of the coaching
strategies that can help college students
triumph over those situations. Researchers
have discovered that using Information and
Communication Technology, (lCT) to
educate people with learning disabilities is
a success. As a result, in this paper, the
researchers have implemented ICT
innovations using the Smart Text to
Speech/Enhanced Speech to Text (ST2S-ES2T)
Application. This advanced Android
platform can be used by teachers using one or more teaching techniques, particularly
drill and practice, to assist dyslexic
students in conquering dyslexia.
Publication Type Published Research
Publisher kraft Books Limited
Paper Link kraftbooks@yahoo.com
Publication Authors F. O. Aghware
Year Published 3-30
Abstract ..
Publication Type journal
Publisher Association of Nigeria Academics (ANA)
Paper Link ..
Publication Authors AGHWARE F.O.; OJUGO, A.A.; & OKONTA, E.O.
Year Published 4-20
Abstract Nigeria has been aspiring and looking forward to the day when it
become a scientifically and technologically developed nation. However,
through quality education and effective utilization of the laboratory it is possible to reach this goal. The objective of this paper is to look at
factors militating against the attainment of this goal, to identify the sources of instructional materials in tertiary institutions and their utilization, and also to proffer strategies for improving utilization of laboratory resources.
Publication Title THE BORDERLESS WORLD-INFORMATION AND COMMUNICATION TECHNOLOGY (GREEN); BRIDGING DIGITAL GAP IN EDUCATION.
Publication Type conferenceproceeding
Publisher Association for Digital Education and Communications Technology
Publication Authors AGHWARE F. O. (PHD); MALASOWE B. O. (PHD); AND OJIE D. V..
Year Published 2021-06-01
Abstract A colossal causatum of the COVID-19 sudden happening is the radical global embrace of Information and Communication Technology (ICT) in all spheres of the education sector especially in developed economies regardless the preparedness. Going by the new normal kind of, irrespective of the imminent challenges of its prior ubiquitous adoption, there is now a swift resultant ICT inclusion in which the economy is wholly driven by ICT. Notably in education, the COVID -19 disruption scaled up ICT as an instantaneous apparatus to subsist the teaching and learning sector during the universal lockdown which ravaged the whole world between 2019 through 2020 of which the impact still evident. Again, the out break of the Pandemic revealed to many world leaders in many developing countries that they had no choice than to embrace an ICT instrument propelling the development of national knowledge-base. Regardless the superficial hitches in ICT integration in teaching and learning, the effects of the COVID-19 pandemic fast tracked ICT penetration hence today, teachers and students in Nigeria and in deed worldwide had no choice than to work online notwithstanding their preparedness in terms of knowledge, skills and resources for the implemetation ICT in teaching and learning. In as much as ICT has come to stay in bridging the gaps in the education sector to in today bortherless world, the place of Green Information Technology must be acknowledged. This research paper addresed how ICT instantaneously bridged the educational gaps in a pandemic inclusive lockdown; and addressing Green IT as it affects our ecosystem. The research has provided the necessary information and details why there should be compulsory implementation of ICT in education to truely bridge the digital gap that existed in the education sector in our today botherless world thus proffering how best to deploy the ICT tools in securing the ecosystem.
Publication Title DeLClustE: Protecting Users from Credit-Card Fraud Transaction via the Deep-Learning Cluster Ensemble
Publication Type journal
Publisher www.ijacsa.thesai.org
Paper Link www.ijacsa.thesai.org
Publication Authors Fidelis Obukohwo Aghware1, Rume Elizabeth Yoro2, Patrick Ogholoruwami Ejeh3, Christopher Chukwufunaya Odiakaose4, Frances Uche Emordi5, Arnold Adimabua Ojugo6
Year Published 2023-06-01
Abstract Fraud is the unlawful acquisition of valuable assets gained via intended misrepresentation. It is a crime committed by either an internal/external user, and associated with acts of theft, embezzlement, and larceny. The proliferation of credit cards to aid financial inclusiveness has its usefulness alongside it attracting malicious attacks for gains. Attempts to classify fraudulent credit card transactions have yielded formal taxonomies as these attacks seek to evade detection. We propose a deep learning ensemble via a profile hidden Markov model with a deep neural network, which is poised to effectively classify credit-card fraud with a high degree of accuracy, reduce errors, and timely fashion. The result shows the ensemble effectively classified benign transactions with a precision of 97 percent. Thus, we posit a new scheme that is more logical, intuitive, reusable, exhaustive, and robust in classifying such fraudulent transactions based on the attack source, cause(s), and attack time gap.
Publication Title Sentiment Analysis in Detecting Sophistication and Degradation Cues in Malicious Web Content
Publication Type journal
Publisher KZYJC
Publication Authors Fidelis Obukohwo Aghware1, Rume Elizabeth Yoro2, Patrick Ogholoruwami Ejeh3, Christopher Chukwufunaya Odiakaose4, Frances Uche Emordi5, Arnold Adimabua Ojugo6
Year Published 2023-06-13
Abstract Mobility, ease of accessibility, and portability have continued to grant ease in the adoption rise of smartphones; while, also proliferating the vulnerability of users that are often susceptible to phishing. With some users classified to be more susceptible than others resulting from media presence and personality traits, many studies seek to unveil lures and cues as employed by these attacks that make them more successful. Web content has often been classified as genuine and malicious. The study seeks to effectively identify cues and lures that will help users classify content as malicious in phishing attacks using sentiment analysis. The machine learning of choice is the XGBoost. Results show that the ensemble yields a prediction accuracy of 97 percent.
Publication Title Assessing contributor features to phishing susceptibility amongst students of petroleum resources varsity in Nigeria
Publication Type journal
Publisher Journal homepage: http://ijece.iaescore.com
Paper Link DOI: 10.11591/ijece.v13i2.pp1922-1931
Publication Authors Rume Elizabeth Yoro1, Fidelis Obukohwo Aghware2, Bridget Ogheneovo Malasowe2, Obinna Nwankwo3, Arnold Adimabua Ojugo4
Year Published 2023-04-14
Abstract In this observational quasi-experimental study, we recruited 200 participants during the Federal University of Petroleum Resources Effurun’s (FUPRE) orientation, who were exposed to socially engineered (phishing) attacks over nine months. Attacks sought to extract participants’ data and/or entice them to click (compromised) links. The study aims to determine phishing exposure and risks among undergraduates in FUPRE (Nigeria) by observing their responses to socially-engineered attacks and exploring their attitudes to cybercrime risks before and after phishing attacks. The study primed all students in place of cybercrime awareness to remain vigilant to scams and explored the various scam types with their influence on gender, age, status, and their perceived safety on susceptibility to scams. Results show that contrary to public beliefs, these factors have all been found to be associated with scam susceptibility and vulnerability of the participants.
Publication Title Adaptive Learner-CBT with Secured Fault-Tolerant and Resumption Capability for Nigerian Universities
Publication Type journal
Publisher The Science and Information (SAI) Organization, Summit House, Woodland Park, Bradford Road, Cleckheaton, BD19 6BW, United Kingdom
Publication Authors 1: Bridget Ogheneovo MalasoweAuthor 2: Maureen Ifeanyi AkazueAuthor 3: Ejaita Abugor OkpakoAuthor 4: Fidelis Obukohwo AghwareAuthor 5: Deborah Voke OjieAuthor 6: Arnold Adimabua Ojugo
Year Published 2023-09-14
Abstract The post covid-19 studies have reported significant negative impact witnessed on global education and learning with the closure of schools’ physical infrastructure from 2020 to 2022. Its effects today continues to ripple across the learning processes even with advances in e-learning or media literacy. The adoption and integration therein of e-learning on the Nigerian frontier is yet to be fully harnessed. From traditional to blended learning, and to virtual learning – Nigeria must rise, and develop new strategies to address issues with her educational theories as well as to bridge the gap and negative impact of the post covid-19 pandemic. This study implements a virtual learning framework that adequately fuses the alternative delivery asynchronous-learning with traditional synchronous learning for adoption in the Nigerian Educational System. Result showcases improved cognition in learners, engaged qualitative learning, and a learning scenario that ensures a power shift in the educational structure that will further equip learners to become knowledge producer, help teachers to emancipate students academically, in a framework that measures quality of engaged student’s learning.
Publication Title Genetic Algorithm Rule-Based Intrusion Detection System (GAIDS)
Publication Type journal
Publisher
Publication Authors 1 A.A. Ojugo, 2 A.O. Eboka, 3 O.E. Okonta, 4 R.E Yoro (Mrs), 5 F.O. Aghware
Year Published 2012-08-30
Abstract This study examines the detection of attacks or network intrusion by users referred to as hackers (whose aim is to gain illegal entry as well as access to a network system and resources. Network and data security has become a pertinent issue with the advent of the Internet; though the Internet comes with a lot of merits on its own. Traditional used methods for data security includes the use of passwords, cryptography to mention few. The approach considered here is Intrusion Detection System, which is a software, driver or device used to prevent an unauthorized or illegal access to data in a networked system. Most of the existing IDS are implemented via rule-based systems where new attacks are not detectable. This study thus, presents a genetic algorithm based approach (with its driver implementation), which employs a set of classification rule derived from network audit data and the support-confidence framework, utilized as fitness function to judge the quality of each rule. The software implementation is aimed at improving system security in networked settings allowing for confidentiality, integrity and availability of system resources.
Publication Title Evolutionary Model for Virus Propagation on Networks
Publication Type journal
Publisher Science Publishing Group
Paper Link doi: 10.11648/j.acis.20150304.12
Publication Authors Arnold Adimabua Ojugo, Fidelis Obukowho Aghware, Rume Elizabeth Yoro, Mary Oluwatoyin Yerokun, Andrew Okonji Eboka, Christiana Nneamaka Anujeonye,Fidelia Ngozi Efozia
Year Published 2015-07-15
Abstract The significant research activity into the logarithmic analysis of complex networks will yield engines that will minimize virus propagation over networks. This task of virus propagation is a recurring subject and design of complex models will yield solutions used in a number of events not limited to and include its propagation, network immunization, resource management, capacity service distribution, dataflow, adoption of viral marketing amongst others. Machine learning, stochastic models are successfully employed to predict virus propagation and its effects on networks. This study employs SI-models for independent cascade and the dynamic models with Enron dataset (of e-mail addresses) and presents comparative result using varied machine models. It samples 25,000 e-mails of Enron dataset with Entropy and Information Gain computed to address issues of blocking, targeting and extent of virus spread on graphs. Study addressed the problem of the expected spread immunization and the expected epidemic spread minimization; but not the epidemic threshold (for space constraint).
Publication Title AQuamoAS: unmasking a wireless sensor-based ensemble for air quality monitor and alert system
Publication Type journal
Publisher Association for Scientic Computing Electronics and Engineering (ASCEE)
Paper Link DOI: 10.31763/aet.v3i2.1409
Publication Authors Victor Geteloma, Fidelis Aghware, Wilfred Adigwe, Obiajulu Ojei et al.
Year Published 2024-08-01
Abstract Abstract
The increased awareness by residents of their environment to maintain safe health states has consequently, birthed the integration of info tech to help resolve societal issues. These, and its adopted approaches have become critical and imperative in virtualization to help bridge the lapses in human mundane tasks and endeavors. Its positive impacts on society cannot be underestimated. Study advances a low-cost wireless sensor-based ensemble to effectively manage air quality tasks. Thus, we integrate an IoT framework to effectively monitors environment changes via microcontrollers, sensors, and blynk to assist users to monitor temperature, humidity, detect the presence of harmful gases in/out door environs. The blynk provides vital knowledge to the user. Our AQuaMoAS algorithm makes for an accurate and user-friendly mode using cloud services to ease monitor and data visualization. The system was tested at 3 different stages of rainy, sunny and heat with pollutant via alpha est method. For all functions at varying conditions, result revealed 70.7% humidity, 29.5OC, and 206 ppm on a sunny day. 51.5% humidity, 20.4OC and 198ppm on a rainy, and 43.1 humidity, 45.6OC, 199ppm air quality on heat and 66.5% humidity, 30.2 OC and 363 ppm air quality on application of air pollutant were observed
Publication Title AQuamoAS: unmasking a wireless sensor-based ensemble for air quality monitor and alert system
Publication Type journal
Publisher Association for Scientic Computing Electronics and Engineering (ASCEE)
Paper Link DOI: 10.31763/aet.v3i2.1409
Publication Authors Victor Geteloma, Fidelis Aghware, Wilfred Adigwe, Obiajulu Ojei et al.
Year Published 2024-08-01
Abstract Abstract
The increased awareness by residents of their environment to maintain safe health states has consequently, birthed the integration of info tech to help resolve societal issues. These, and its adopted approaches have become critical and imperative in virtualization to help bridge the lapses in human mundane tasks and endeavors. Its positive impacts on society cannot be underestimated. Study advances a low-cost wireless sensor-based ensemble to effectively manage air quality tasks. Thus, we integrate an IoT framework to effectively monitors environment changes via microcontrollers, sensors, and blynk to assist users to monitor temperature, humidity, detect the presence of harmful gases in/out door environs. The blynk provides vital knowledge to the user. Our AQuaMoAS algorithm makes for an accurate and user-friendly mode using cloud services to ease monitor and data visualization. The system was tested at 3 different stages of rainy, sunny and heat with pollutant via alpha est method. For all functions at varying conditions, result revealed 70.7% humidity, 29.5OC, and 206 ppm on a sunny day. 51.5% humidity, 20.4OC and 198ppm on a rainy, and 43.1 humidity, 45.6OC, 199ppm air quality on heat and 66.5% humidity, 30.2 OC and 363 ppm air quality on application of air pollutant were observed
Publication Title Enhanced data augmentation for predicting consumer churn rate with monetization and retention strategies: a pilot study
Publication Type journal
Publisher Association for Scientic Computing Electronics and Engineering (ASCEE)
Paper Link DOI https://doi.org/10.31763/aet.v3i1.1408
Publication Authors Victor Ochuko Geteloma a,1,* , Fidelis Obukohwo Aghware b,2 , Wilfred Adigwe c,3 , Chukwufunaya Chris Odiakaose d,4 , Nwanze Chukwudi Ashioba d,5 , Margareth Dumebi Okpor c,6 , Arnold Adimabua Ojugo a,7 , Patrick Ogholuwarami Ejeh d,8 , Rita Erhovwo Ako a,9 , Emmanuel Obiajulu Ojei c,10
Year Published 2024-04-01
Abstract Abstract
Customer retention and monetization have since been the pillar of many successful firms and businesses as keeping an old customer is far more economical than gaining a new one – which, in turn, reduce customer churn rate. Previous studies have focused on the use of single heuristics as well as provisioned no retention strategy. To curb this, our study posits the use of the recen-cy-frequency-monetization framework as strategy for customer retention and monetization impacts. With dataset retrieved from Kaggle, and partitioned into train and test dataset/folds to ease model construction and training. Study adopt a tree-based Random Forest ensemble with synthetic minority oversampling technique edited nearest neighbor (SMOTEEN). Various benchmark models were trained to asssess how well each performs against our proposed ensemble. The application was tested using an application programming interface Flask and integrated using streamlit into a device. Our RF-ensemble resulted in a 0.9902 accuracy prior to applying SMOTEENN; while, LR, KNN, Naïve Bayes and SVM yielded an accuracy of 0.9219, 0.9435, 0.9508 and 0.9008 respectively. With SMOTEENN applied, our ensemble had an accuracy of 0.9919; while LR, KNN, Naïve Bayes, and SVM yielded an accuracy of 0.9805, 0.921, 0.9125, and 0.8145 respectively. RF has shown it can be implemented with SMOTEENN to yield enhanced prediction for customer churn prediction using Python
Publication Title BloFoPASS: A blockchain food palliatives tracer support system for resolving welfare distribution crisis in Nigeria
Publication Type journal
Publisher Journal homepage: http://ijict.iaescore.com
Paper Link DOI: 10.11591/ijict.v13i2.pp178-187
Publication Authors Fidelis Obukohwo Aghware1 , Margaret Dumebi Okpor2 , Wilfred Adigwe3 , Christopher Chukwufunaya Odiakaose4 , Arnold Adimabua Ojugo5 , Andrew Okonji Eboka5 , Patrick Ogholorunwalomi Ejeh6 , Onate Egerton Taylor7 , Rita Erhovwo Ako4 , Victor Ochuko Geteloma4
Year Published 2024-08-01
Abstract With population rising to approximately 200 million Nigerians – fast-paced,
urbanization has continued to advent food insecurity with maladministration,
corruption, internal rife, and starvation. These, threatened the nation's unity
with the lockdown of 2020; and consequently, have now become the trend.
Nigeria must as a nation, re-examine her methods in the administration of
palliatives (in lieu of food and relief) distribution – as the above-listed issues
have become of critical need in the equitable distribution of reliefs, both
from the humanitarian agency view, and the Government (State and
Federal). They have noticed non-transparency, corruption, and data
inadequacies, as major drawbacks in its management. Our study presents a
blockchain ensemble for the administration of food palliatives distribution in
Nigeria that first ensures, that all beneficiaries be registered, and the food
palliatives are sensor-tagged and recorded on the blockchain. Results show
the number of transactions per second and page retrieval abilities for the
proposed chain were quite low with 30-TPS and 0.38seconds respectively –
as compared to public blockchain. Proposed ensemble eliminates fraud that
is herein rippled across the existing system, minimizes corrupt practices via
sensor-based model, provides insight for stakeholders, and minimize the
error in reported data on the supply chain.
Publication Title Enhancing the Random Forest Model via Synthetic Minority Oversampling Technique for Credit-Card Fraud Detection
Publication Type journal
Publisher Journal of Computing Theories and Applications published by Dian Nuswantoro University Semarang Indonesia
Paper Link DOI: https://doi.org/10.62411/jcta.10323
Publication Authors Fidelis Obukohwo Aghware, Arnold Adimabua Ojugo, Wilfred Adigwe, Christopher Chukwufumaya Odiakaose, Emma Obiajulu Ojei, Nwanze Chukwudi Ashioba, Margareth Dumebi Okpor, Victor Ochuko Geteloma
Year Published 2024-03-26
Abstract Abstract
Fraudsters increasingly exploit unauthorized credit card information for financial gain, targeting un-suspecting users, especially as financial institutions expand their services to semi-urban and rural areas. This, in turn, has continued to ripple across society, causing huge financial losses and lowering user trust implications for all cardholders. Thus, banks cum financial institutions are today poised to implement fraud detection schemes. Five algorithms were trained with and without the application of the Synthetic Minority Over-sampling Technique (SMOTE) to assess their performance. These algorithms included Random Forest (RF), K-Nearest Neighbors (KNN), Naïve Bayes (NB), Support Vector Machines (SVM), and Logistic Regression (LR). The methodology was implemented and tested through an API using Flask and Streamlit in Python. Before applying SMOTE, the RF classifier outperformed the others with an accuracy of 0.9802, while the accuracies for LR, KNN, NB, and SVM were 0.9219, 0.9435, 0.9508, and 0.9008, respectively. Conversely, after the application of SMOTE, RF achieved a prediction accuracy of 0.9919, whereas LR, KNN, NB, and SVM attained accuracies of 0.9805, 0.9210, 0.9125, and 0.8145, respectively. These results highlight the effectiveness of combining RF with SMOTE to enhance prediction accuracy in credit card fraud detection.
Publication Title INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) INNOVATION IN TEACHING STUDENTS WITH DYSLEXIA
Publication Type journal
Publisher University of Delta Journal of Contemporary Studies in Education
Publication Authors Fidelis Obukohwo Aghware 1; Odirin Omiegbe2
Year Published 2022-01-01
Abstract Each teacher's intention is for college
students to apprehend and master what they
have found and be capable of observing it in
situations they want. However, some
scholars have issues remembering and
retaining what they have discovered.
Gaining knowledge of disability is a
situation defined as "difficulty in getting to
know and learning about a particular
mission." Agnosia, dysgraphia, dyscalculia,
and dyslexia are examples of gaining
knowledge of disabilities that can be seen in
students. Diagnostic Prescriptive Teaching
(DPT); computer Assisted Instructions
(CAI)-Drill and Practice (DAP); prognosis,
making plans, implementation, assessment,
change (DMPIAC); educate-take a look atteach; individualized coaching; and project
evaluation are some of the coaching
strategies that can help college students
triumph over those situations. Researchers
have discovered that using Information and
Communication Technology (ICT) to
educate people with learning disabilities is a
success. As a result, in this paper, the
researchers have implemented ICT
innovations using the Smart Text to
Speech/Enhanced Speech to Text (ST2SES2T) Application. This advanced Android
platform can be used by teachers using one
or more teaching techniques, particularly
drill and practice, to assist dyslexic students
in conquering dyslexia.
Publication Type journal
Publisher Dutse Journal of Pure and Applied Sciences (DUJOPAS)
Paper Link https://dx.doi.org/10.4314/dujopas.v10i1b.16
Publication Authors F.O Aghware1*, D.V Ojie2, B.O Malasowe1
Year Published 2024-03-31
Abstract From a global perspective, the number of cars using our roads around-the-clock has increased dramatically, and this has tremendously amplified the insecurity on our roads. This has become a key subject, especially in Nigeria. Consequently, automobile trailing schemes are gradually becoming evident amongst common users in the transport sector in most major metropolises. This paper aims to showcase a developed Android-based application system for vehicle trailing schemes that integrates Google Maps real-time features, the “Global Positioning System (GPS), and employs the Global System for Mobile Communication (GSM)” technology. The GPS component is a space-based navigation system that runs on location and time data at all times, irrespective of place and time on the globe, provided there is a line of sight to any of the four or more GPS satellites. The time and location are displayed, utilising Google Maps, which serves as an interface with the application so that the user will be able to constantly monitor moving vehicles via the smartphone. Presented here are the designed model and the experimental outcome of the automobile trailing system that verifies the possibility of the system trailing the movement of vehicles from one location to another at any given time, as well as an interactive Graphical User Interface (GUI) for the Smartphone application.
Publication Title Comparative Data Resample to Predict Subscription Services Attrition Using Tree-based Ensembles
Publication Type journal
Publisher Journal of Fuzzy Systems and Control
Paper Link DOI: 10.59247/jfsc.v2i2.213
Publication Authors Margaret Dumebi Okpor 1, , Fidelis Obukohwo Aghware 2, , Maureen Ifeanyi Akazue 3, , Arnold Adimabua Ojugo 4,* , Frances Uche Emordi 5, , Christopher Chukwufunaya Odiakaose 6, , Rita Erhovwo Ako 7, , Victor Ochuko Geteloma 8,
Year Published 2024-01-01
Abstract Abstract—The digital market today, is rippled with a variety of goods/services that promote monetization and asset exchange with clients constantly seeking improved alternatives at lowered cost to meet their value demands. From item upgrades to their replacement, businesses are poised with retention strategies to help curb the challenge of customer attrition. Such strategies include the upgrade of goods and services at lesser cost and targeted improved value chains to meet client needs. These are found to improve client retention and better monetization. The study predicts customer churn via tree-based ensembles with data resampling such as the random-under-sample, synthetic minority oversample (SMOTE), and SMOTE-edited nearest neighbor (SMOTEEN). We chose three (3) tree-based ensembles namely: (a) decision tree, (b) random forest, and (c) extreme gradient boosting – to ensure we have single and ensemble classifier(s) to assess how well bagging and boosting modes perform on consumer churn prediction. With chi-square feature selection mode, the Decision tree model yields an accuracy of 0.9973, F1 of 0.9898, a precision of 0.9457, and a recall of 0.9698 respectively; while Random Forest yields an accuracy of 0.9973, F1 of 0.9898, precision 0.9457, and recall 0.9698 respectively. The XGBoost outperformed both Decision tree and Random Forest classifiers with an accuracy of 0.9984, F1 of 0.9945, Precision of 0.9616, and recall of 0.9890 respectively – which is attributed to its use of hyper-parameter tuning on its trees. We also note that SMOTEEN data balancing outperforms other data augment schemes with retention of a 30-day moratorium period for our adoption of the recency-frequency-monetization to improve monetization and keep business managers ahead of the consumer attrition curve
Publication Title Comparative Data Resample to Predict Subscription Services Attrition Using Tree-based Ensembles
Publication Type journal
Publisher Journal of Fuzzy Systems and Control
Paper Link DOI: 10.59247/jfsc.v2i2.213
Publication Authors Margaret Dumebi Okpor 1, , Fidelis Obukohwo Aghware 2, , Maureen Ifeanyi Akazue 3, , Arnold Adimabua Ojugo 4,* , Frances Uche Emordi 5, , Christopher Chukwufunaya Odiakaose 6, , Rita Erhovwo Ako 7, , Victor Ochuko Geteloma 8,
Year Published 2024-01-01
Abstract Abstract—The digital market today, is rippled with a variety of goods/services that promote monetization and asset exchange with clients constantly seeking improved alternatives at lowered cost to meet their value demands. From item upgrades to their replacement, businesses are poised with retention strategies to help curb the challenge of customer attrition. Such strategies include the upgrade of goods and services at lesser cost and targeted improved value chains to meet client needs. These are found to improve client retention and better monetization. The study predicts customer churn via tree-based ensembles with data resampling such as the random-under-sample, synthetic minority oversample (SMOTE), and SMOTE-edited nearest neighbor (SMOTEEN). We chose three (3) tree-based ensembles namely: (a) decision tree, (b) random forest, and (c) extreme gradient boosting – to ensure we have single and ensemble classifier(s) to assess how well bagging and boosting modes perform on consumer churn prediction. With chi-square feature selection mode, the Decision tree model yields an accuracy of 0.9973, F1 of 0.9898, a precision of 0.9457, and a recall of 0.9698 respectively; while Random Forest yields an accuracy of 0.9973, F1 of 0.9898, precision 0.9457, and recall 0.9698 respectively. The XGBoost outperformed both Decision tree and Random Forest classifiers with an accuracy of 0.9984, F1 of 0.9945, Precision of 0.9616, and recall of 0.9890 respectively – which is attributed to its use of hyper-parameter tuning on its trees. We also note that SMOTEEN data balancing outperforms other data augment schemes with retention of a 30-day moratorium period for our adoption of the recency-frequency-monetization to improve monetization and keep business managers ahead of the consumer attrition curve
Publication Title Pilot Study on Webometric for Assessing User Footprint, Satisfaction and Experience on Academic Website: A Case of the University of Delta Agbor
Publication Type journal
Publisher Scientific Information, Documentation and Publishing Office at FUPRE Journal
Paper Link http://fupre.edu.ng/journal
Publication Authors MALASOWE, B. 1,* , AGHWARE, F.2 , EDIM, E. B
Year Published 2024-04-20
Abstract Webometric assesses the user convenience and experience while interacting with web-based
system. Businesses use websites to present their deliverables to a larger audience. The aim
of which is to refocus and reshape a user’s image of about a business. This has today, been
extended to facilitate activities like recruitment etc. We investigate usability of the
University of Delta Agbor (UniDEL) website with other select Nigerian varsities using
expert review guideline, and to compare the achieved criterion scores against the selected
varsities websites. The adopted methodology is the expert review guideline that is available
by the World Ranking of Universities. Result shows the overall performance with UniDEL
website performing poorly against the selected websites. These are based on the unique
strengths and unique gaps. Unique features showed that selected websites successfully
ensured that her trust/credibility section and homepages received highest scores. The
UniDEL's website was found to struggle for good search usability, and data entry criteria
among other flaws in her web design. Findings suggest UniDEL website needs to be
reworked with home-pages, search, trust and content features in mind to ensure greater
visibility and user experience.
Publication Title COMMUNICATION AND INFORMATION DISSEMINATION FOR SERVICE DELIVERY IMPROVEMENT IN DELTA STATE'S SENIOR SECONDARY SCHOOLS
Publication Type journal
Publisher UDJCSE
Publication Authors Obukohwo Fidelis Aghware1 ; Justin Onyarin Ogala 2
Year Published 2023-03-08
Abstract This study aimed to investigate the role of
effective communication and information
dissemination in promoting sustainable,
high-quality service delivery in public senior
secondary schools in Delta State, Nigeria.
The study employed an analytical-descriptive
survey design, with a sample size of 549
participants (167 principals and 382
teachers) selected through proportionate
stratified random sampling from a
population of 286 principals and 8452
teachers. A modified 4-point Likert scale
tool, with a Cronbach Alpha reliability index
of 0.85, was used to measure communication
and information dissemination efficiency for
delivering high-quality services over the long
term. The study used means, standard
deviations, and the Z-test at a significance
level 0.05 to evaluate the hypotheses. Results
showed tat effective communication could be
achieved through idea exchange, efficient
staff meeting management, clear message
comprehension, and weekly goal
communication. Effective information
dissemination could be achieved through topto-bottom information flow, mobile phone
and SMS usage, face-to-face interaction, and
email communication. The study identified
significant differences between principals
and teachers regarding their perceptions of
effective information dissemination for longterm, high-quality service delivery. The study
recommends ongoing training for principals
in communication and interpersonal skills to
enhance information dissemination and
delivery of quality services. Furthermore,
seamless information distribution channels
should be explored to position schools in the
21st-century information age context
Publication Type journal
Publisher (http://www.sciencepublishinggroup.com/j/ajnc)
Paper Link doi: 10.11648/j.ajnc.20130205.12
Publication Authors A. A. Ojugo.1 , R. E. Yoro.2 , D. Oyemade.1 , M. O. Yerokun.3 , A. O. Eboka3 , E. Ugboh3 , F. O. Aghware3
Year Published 2013-11-10
Abstract The paper identifies the state of telecommunication’s services and its growth cum economic relevance in Nigeria,
while proffering a cost-effective and less problematic telephone network that is readily affordable and available to the
poverty-stricken populace predominant in rural areas. The design and implementation of an efficient, robust network based
on existing Global Satellite for Mobile communication) cum Code Division Multiple Access, as means to cater and provide
for telecommunications in rural Delta State in Nigeria. A major hinderance to the provision of such services/facilities in rural
area for decades, has been the high operational cost and little profit margins. Thus, the robust network aims to create an
effective, affordable option for such rural and semi-urban settler; while on the part of operators, a system with minimal cost to
implement, deploy and maintain for Delta State Senatorial District in Delta State, Nigeria, is used as the case study to test-run
the analysis and design of such a novel cellular network.
Publication Title Empirical Evaluation of Hybrid Cultural Genetic Algorithm Trained Modular Neural Network Ensemble for Credit-Card Fraud Detection
Publication Type journal
Publisher https://www.researchgate.net/publication/369899323
Paper Link DOI: 10.35629/5252-050315161524
Publication Authors Fidelis Obukohwo Aghwarea,*, Bridget Ogheneovo Malasoweb
Year Published 2023-03-30
Abstract ABSTRACT
The increasing need for e-commerce, online
marketing, and the ineffective vigilance of
sellers/buyers often constitutes the fact that
criminals are steps ahead of biz owners and users
of these products – at all times. Pre-empting fraud
before its occurrence is quite possible in traditional
non-automated tasks cum transactions owing to the
natural intelligence of a seller/buyer. Advances in
computing with improved methods and intelligence
– are yet to proffer procedures to whollyrestraint
fraud. The routine of smart systems,though, is on
the upsurge for fraud recognition – nevertheless, it
is still demonstratingfutile. Thus, the need to design
a predictive intelligent system to monitor, detect
and prevent fraudulent activities – especially in
regards to credit/smart card transactions. The study
suggests a spectral-clustering amalgam of
aninherentalgorithm-trainedintegrated neural
system to perceive fraud in credit card businesses.
The hybrid collaborative seeks to equip credit-card
operators with a scheme and procedure whose
information will selflesslyspot frauds on credit
cards. Consequently, the model
excellentlydistinguishesbetween benign and
genuine credit card dealings with a prototypical
accuracy of 74%.
Publication Title Effects of Data Resampling on Predicting Customer Churn via a Comparative Tree-based Random Forest and XGBoost
Publication Type journal
Publisher https://publikasi.dinus.ac.id/index.php/jcta/index
Paper Link DOI : 10.62411/jcta.10562
Publication Authors Rita Erhovwo Ako1,*, Fidelis Obukohwo Aghware2 , Margaret Dumebi Okpor3 , Maureen Ifeanyi Akazue4 , Rume Elizabeth Yoro5 , Arnold Adimabua Ojugo1 , De Rosal Ignatius Moses Setiadi6 , Chris Chukwufunaya Odiakaose7 , Reuben Akporube Abere1 , Frances Uche Emordi5 , Victor Ochuko Geteloma1 , and Patrick Ogholuwarami Ejeh7
Year Published 2024-06-27
Abstract Customer attrition has become the focus of many businesses today – since the online market
space has continued to proffer customers, various choices and alternatives to goods, services, and
products for their monies. Businesses must seek to improve value, meet customers' teething demands/needs, enhance their strategies toward customer retention, and better monetize. The study
compares the effects of data resampling schemes on predicting customer churn for both Random
Forest (RF) and XGBoost ensembles. Data resampling schemes used include: (a) default mode, (b)
random-under-sampling RUS, (c) synthetic minority oversampling technique (SMOTE), and (d)
SMOTE-edited nearest neighbor (SMOTEEN). Both tree-based ensembles were constructed and
trained to assess how well they performed with the chi-square feature selection mode. The result shows
that RF achieved F1 0.9898, Accuracy 0.9973, Precision 0.9457, and Recall 0.9698 for the default, RUS,
SMOTE, and SMOTEEN resampling, respectively. Xgboost outperformed Random Forest with F1
0.9945, Accuracy 0.9984, Precision 0.9616, and Recall 0.9890 for the default, RUS, SMOTE, and
SMOTEEN, respectively. Studies support that the use of SMOTEEN resampling outperforms other
schemes; while, it attributed XGBoost enhanced performance to hyper-parameter tuning of its decision trees. Retention strategies of recency-frequency-monetization were used and have been found to
curb churn and improve monetization policies that will place business managers ahead of the curve of
churning by customers.
Publication Title Pilot Study on Enhanced Detection of Cues over Malicious Sites Using Data Balancing on the Random Forest Ensemble
Publication Type journal
Publisher Future Techno Science
Paper Link DOI : 10.62411/faith.2024-14
Publication Authors Margaret Dumebi Okpor 1,*, Fidelis Obukohwo Aghware 2 , Maureen Ifeanyi Akazue 3 , Andrew Okonji Eboka 4 , Rita Erhovwo Ako 5 , Arnold Adimabua Ojugo 5 , Chris Chukwufunaya Odiakaose 6 , Amaka Patience Binitie 4 , Victor Ochuko Geteloma 5 , and Patrick Ogholuwarami Ejeh 6
Year Published 2024-09-07
Abstract The digital revolution frontiers have rippled across society today – with various web content
shared online for users as they seek to promote monetization and asset exchange, with clients constantly seeking improved alternatives at lowered costs to meet their value demands. From item upgrades to their replacement, businesses are poised with retention strategies to help curb the challenge
of customer attrition. The birth of smartphones has proliferated feats such as mobility, ease of accessibility, and portability – which, in turn, have continued to ease their rise in adoption, exposing user
device vulnerability as they are quite susceptible to phishing. With users classified as more susceptible
than others due to online presence and personality traits, studies have sought to reveal lures/cues as
exploited by adversaries to enhance phishing success and classify web content as genuine and malicious.
Our study explores the tree-based Random Forest to effectively identify phishing cues via sentiment
analysis on phishing website datasets as scrapped from user accounts on social network sites. The
dataset is scrapped via Python Google Scrapper and divided into train/test subsets to effectively classify contents as genuine or malicious with data balancing and feature selection techniques. With Random Forest as the machine learning of choice, the result shows the ensemble yields a prediction accuracy of 97 percent with an F1-score of 98.19% that effectively correctly classified 2089 instances with
85 incorrectly classified instances for the test-dataset.
Publication Title Techniques and Best Practices for Handling Cybersecurity Risks in Educational Technology Environment (EdTech)
Publication Type journal
Publisher Journal of Science and Technology Research
Paper Link https://doi.org/10.5281/zenodo.12617068
Publication Authors 1Malasowe, Bridget Ogheneovo, 2Aghware, Fidelis Obukohwo, 3Okpor, Margaret Dumebi, 4Edim, Edim Bassey, 5Rita Erhovwo Ako, 6Arnold Adimabua Ojugo
Year Published 2024-06-30
Abstract In order to effectively manage the risk and hazards associated
with the online environment, there is a growing demand for cyber
security awareness due to the rising use of the Internet and the
concerning rise in cyberattacks. The types of cybersecurity risks,
best practices and current approaches for controlling
cybersecurity threats in educational technology settings are
examined in this paper and, we also examined effective
cybersecurity case studies. The results show that a variety of
cybersecurity threats are faced by educational institutions. These
threats include phishing, ransomware attacks, insider threats,
malware, social engineering, Distributed Denial of Service
(DDoS), vulnerabilities, credential theft, IoT , man-in-the-middle,
third-party vendor risks among others. Institutions must
implement proactive, effective cybersecurity strategies in order to
reduce these risks. These strategies include risk assessments, the
creation of strong cybersecurity governance frameworks, multifactor authentication (MFA), frequent software updates and patch
management, robust access controls, data encryption, frequent
backups, incident response plans, network segmentation,
monitoring, and logging, cyber insurance, and the deployment of
access controls and encryption mechanisms. The integration of
several cybersecurity strategies, including as vulnerability
management, incident response planning, security awareness
training, and continuing training programs, is highlighted in the
successful case studies. Educational institutions may secure
sensitive data, defend against cyberattacks, and guarantee the
public's access to secure, continuous education by putting
comprehensive cybersecurity strategies and best practices into
place. The outcomes of this investigation offer significant
perspectives and suggestions for academic establishments and
interested parties about the handling of cybersecurity hazards in
EdTech settings.
Publication Title Pilot Study on Web Server HoneyPot Integration Using Injection Approach for Malware Intrusion Detection
Publication Type journal
Publisher Computing, Information Systems, Development Informatics & Allied Research Journal
Paper Link DOI: 10.22624/AIMS/CISDI/V15N1P2
Publication Authors 1Malasowe Bridget, 2Aghware Fidelis & 3Edim, Bassey Edim
Year Published 2024-03-31
Abstract The digital world is rapidly coming together as well as transforming a lot of our valued data onto digital
forms. Its consequent dissemination eased via the advent of the Internet has also encountered many
attacks due to predictable responses from many users – leading up to social engineering and exploits
on trust-level of users. The use of deception is now playing a very prominent role in enhancing data
security. Several approaches abound to discourage and redirect challenges (via the use of honeypot),
and to detect such intrusive activities (via an intrusion detection systems). These have been
successfully used to minimize security breaches. We explore a deep learning deception-based
honeypot to minimize breaches by adversaries. Used on web servers, it is equipped with identification
capabilities as the system learns and defends a user system against intrusive actions. Our confusion
matrix shows model has sensitivity of 0.81, specificity 0.08, and prediction accuracy of 0.991 with an
improvement rate of 0.39 for data that were not originally used to train.
Publication Type journal
Publisher Dutse Journal of Pure and Applied Sciences (DUJOPAS)
Paper Link https://dx.doi.org/10.4314/dujopas.v10i3b.32
Publication Authors F.O Aghware, 1* J.O Ogala 2
Year Published 2024-09-30
Abstract Wireless networks, especially 5G and IoT networks, are vulnerable to intentional interference or
jamming. Jamming attacks can cause severe disruption to network operations and compromise the
confidentiality and integrity of transmitted data. Therefore, effective anti-jamming techniques are
essential for ensuring the reliability and security of these networks. This paper presents a comprehensive
survey of state-of-the-art anti-jamming solutions for 5G and IoT networks. The paper covers the
different types of jamming attacks, their impact on network performance, and the various anti-jamming
techniques such as frequency hopping, spread spectrum techniques, beamforming, multi-antenna
systems, and physical layer security. The paper also includes an experimental evaluation of antijamming techniques and provides practical implications and recommendations. The findings of this
study can help network engineers and researchers to design more secure and resilient wireless networks
in the 5G and IoT era.