Table of Contents
Articles
Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study
DOI : 10.33633/jcta.v1i2.9259
Arnold Adimabua Ojugo, Maureen Ifeanyi Akazue, Patrick Ogholuwarami Ejeh, Nwanze Chukwudi Ashioba, Christopher Chukwufunaya Odiakaose, Rita Erhovwo Ako, Frances Uche Emordi
|
50-60
|
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, Suyud Widiono, Md Kamruzzaman Sarker
|
61-77
|
Amina El Murabet, Anouar Abtoy
|
78-85
|
Design and Validation of Structural Causal Model: A Focus on EGRA Dataset
DOI : 10.33633/jcta.v1i2.9304
Gabriel Terna Ayem, Ozcan Asilkan, Aamo Iorliam
|
86-103
|
Electricity Generation Cost Optimization Based on Lagrange Function and Local Search
DOI : 10.33633/jcta.v1i2.9354
Thanh Van Nguyen
|
104-114
|
Butterflies Recognition using Enhanced Transfer Learning and Data Augmentation
DOI : 10.33633/jcta.v1i2.9443
Harish Trio Adityawan, Omar Farroq, Stefanus Santosa, Hussain Md Mehedul Islam, Md Kamruzzaman Sarker, De Rosal Ignatius Moses Setiadi
|
115-128
|
Solving the Green Economic Load Dispatch by Applying the Novel Meta-heuristic Algorithm
DOI : 10.33633/jcta.v1i2.9389
Nguyen Anh Tang, Nguyen Minh Duc Cuong
|
129-139
|
Generating Harmonious Colors through the Combination of n-Grams and K-means
DOI : 10.33633/jcta.v1i2.9470
Shreeniwas Sharma, Jyoti Tandukar, Rabindra Bista
|
140-150
|
Dynamic and Static Handwriting Assessment in Parkinson's Disease: A Synergistic Approach with C-Bi-GRU and VGG19
DOI : 10.33633/jcta.v1i2.9469
Sohaib Ali, Adeel Hashmi, Ali Hamza, Umar Hayat, Hamza Younis
|
151-162
|
CoSoGMIR: A Social Graph Contagion Diffusion Framework using the Movement-Interaction-Return Technique
DOI : 10.33633/jcta.v1i2.9355
Arnold Adimabua Ojugo, Patrick Ogholuwarami Ejeh, Maureen Ifeanyi Akazue, Nwanze Chukwudi Ashioba, Christopher Chukwufunaya Odiakaose, Rita Erhovwo Ako, Blessing Nwozor, Frances Uche Emordi
|
163-173
|
Evaluation of University Websites in Nigeria using the Web Content Accessibility Guidelines
DOI : 10.33633/jcta.v1i2.9381
Emeka Ogbuju, Olalekan Ihinkalu, Emmanuel Ajulo, Oluwayemisi Jaiyeoba, Victoria Yemi-Peters
|
174-187
|
Hybrid Quantum Key Distribution Protocol with Chaotic System for Securing Data Transmission
DOI : 10.33633/jcta.v1i2.9547
De Rosal Ignatius Moses Setiadi, Muhamad Akrom
|
188-200
|
UNMASKING FRAUDSTERS: Ensemble Features Selection to Enhance Random Forest Fraud Detection
DOI : 10.33633/jcta.v1i2.9462
Maureen Ifeanyi Akazue, Irene Alamarefa Debekeme, Abel Efe Edje, Clive Asuai, Ufuoma John Osame
|
201-211
|
A Comprehensive Study and Development of Unified Mobile-Based Admission System for GCC Universities
DOI : 10.62411/jcta.9793
Ehab Juma Adwan, Yunes Al-Aradi, Muneera Essa, Hadeel Malabari
|
212-230
|