Abstract: Based on the energy balance method (EBM), a more accurate analytical solution of the pendulum equation with rotating support was presented. The results were compared with those obtained by the differential transformation method (DTM) and Hes improved energy balance method. It was shown that the results are more accurate than the said methods. Key words: Energy balance method, approximate... PubDate: Fri, 30 Jun 2017 00:00:00 +010

Abstract: This paper proposes a multi-algorithm strategy for card fraud detection. Various techniques in data mining have been used to develop fraud detection models; it was however observed that existing works produced outputs with false positives that wrongly classified legitimate transactions as fraudulent in some instances; thereby raising false alarms, mismanaged resources and forfeit customers t... PubDate: Fri, 30 Jun 2017 00:00:00 +010

Abstract: In this paper, we prove the existence of at least one solution for Volterra- Hammerstein integral equation (V-HIE) of the second kind, under certain conditions, in the space, is the domain of integration and T is the time. The kernel of Hammerstein integral term has a singularity, while the kernel of Volterra is continuous in time. Using a quadratic numerical method with respect to time, we... PubDate: Fri, 30 Sep 2016 00:00:00 +010

Abstract: Let n 1 be an integer. Define ϕ2(n) to be the number of positive integers x, 1 x n, for which both 6x1 and 6x+1 are relatively prime to 6n. The primary goal of this study is to show that ϕ2 is a multiplicative function, that is, if gcd(m, n) = 1, then ϕ2(mn) = ϕ2(m)ϕ2(n). Key words: Euler phi-function, multiplicative function. PubDate: Sun, 31 Jul 2016 00:00:00 +010

Abstract: Due to rapid growth of the use of online auctions, fraudsters have taken advantage of these platforms to participate in their own auctions in order to raise prices (a practice called shilling). Innocent bidders have been forced to pay higher prices than they were willing to offer. This has resulted in the need to design and implement a shill detection algorithm. To eliminate this shilling pr... PubDate: Sun, 31 Jan 2016 00:00:00 +010

Abstract: In this study, Adomian Decomposition Method (ADM), Modified Decomposition Method (MD) and Laplace Decomposition Method (LDM) were used in solving nonlinear Klein-Gordon equation. It can be easily concluded that these three methods yielded exactly the same results. Key words: Adomian Decomposition Method, Modified Decomposition Method, Laplace Decomposition Method, Klein-Gordon equat... PubDate: Fri, 24 Jul 2015 00:00:00 +010

Abstract: In this paper, a two-stage fuzzy random programming for a management problem in terms of water resources allocation having fuzzy random variable coefficients and decision vector of random variables is studied. The first results show the fact that a fuzzy pseudorandom optimal solution of a two-stage fuzzy random programming may be resolved into a two of pseudorandom optimal solutions of relat... PubDate: Tue, 30 Jun 2015 00:00:00 +010

Abstract: Every business entitys primary objective is to maximize profit and satisfy its customers (end users). Since businesses are an integral part of our environment, their operations will be restricted by the environmental factors associated with it. The study seeks to model NAAZO Peki distribution in Tamale Metropolis (TM) as a network flow problem, and to determine the minimum cost of Peki soft ... PubDate: Thu, 30 Apr 2015 00:00:00 +010

Abstract: In this paper, union, and intersection of generalised fuzzy soft sets are introduced and some of their basic properties are studied. The objective of this paper is to introduce the generalised fuzzy soft topology over a soft universe with a fixed set of parameters. Generalised fuzzy soft points, generalised fuzzy soft closure, generalised fuzzy soft neighbourhood, generalised fuzzy soft inte... PubDate: Sat, 31 Jan 2015 00:00:00 +010

Abstract: In this paper we discuss possible applications of ig, dg and bg- closed type sets in topological ordered spaces. Key words: dg-closed, bg-closed, ig*-closed, dg*-closed, bg*-closed sets, Closed type sets, topological ordered spaces PubDate: Sat, 31 Jan 2015 00:00:00 +010