Abstract: Distance sampling with line transect method has been applied by many researchers to monitor and observe varied animals and plants with the aim to estimating population density and/or abundance. The detection and detectabilities of plants and animals with line transect methodology appear to be described as seen in the application software DISTANCE by some four specific models or mathematical ... PubDate: Wed, 31 Jan 2018 00:00:00 +010

Abstract: Deleanu, Frei and Hilton have developed the notion of generalized Adams completion in a categorical context. In this paper, the symmetric algebra of a given algebra is shown to be the Adams completion of the algebra by considering a suitable set of morphisms in a suitable category. Key words: Category of fraction, calculus of left fraction, symmetric algebra, tensor algebra, Adams comple... PubDate: Thu, 30 Nov 2017 00:00:00 +010

Abstract: The Galerkin method is used to numerically solve the exterior boundary value problem for the radiosity equation for the spherical quatrefoil. The radiosity equation is a mathematical model for the brightness of a collection of one or more surfaces when their reflectivity and emissivity are given. On planet Mars the surface emissivity is closely related to its surface temperature. The radiosi... PubDate: Tue, 31 Oct 2017 00:00:00 +010

Abstract: In this article, Hes homotopy perturbation method was applied in a variant way to solve the system of Volterra integral equations of first kind. The results reveal that the proposed approach is very efficient for handling such system of integral equations. Some examples are given to show the ability of the proposed modification. Key words: Integral equations, Volterra integral equat... PubDate: Thu, 31 Aug 2017 00:00:00 +010

Abstract: In this study, some definitions and features related to fuzzy continuity, fuzzy membership functions and fuzzy continuous functions are examined. Using these definitions and properties, some theorems about fuzzy continuous functions have been proved. Key words: Fuzzy continuity, fuzzy function, fuzzy set. PubDate: Mon, 31 Jul 2017 00:00:00 +010

Abstract: Based on the energy balance method (EBM), a more accurate analytical solution of the pendulum equation with rotating support was presented. The results were compared with those obtained by the differential transformation method (DTM) and Hes improved energy balance method. It was shown that the results are more accurate than the said methods. Key words: Energy balance method, approximate... PubDate: Fri, 30 Jun 2017 00:00:00 +010

Abstract: This paper proposes a multi-algorithm strategy for card fraud detection. Various techniques in data mining have been used to develop fraud detection models; it was however observed that existing works produced outputs with false positives that wrongly classified legitimate transactions as fraudulent in some instances; thereby raising false alarms, mismanaged resources and forfeit customers t... PubDate: Fri, 30 Jun 2017 00:00:00 +010

Abstract: In this paper, we prove the existence of at least one solution for Volterra- Hammerstein integral equation (V-HIE) of the second kind, under certain conditions, in the space, is the domain of integration and T is the time. The kernel of Hammerstein integral term has a singularity, while the kernel of Volterra is continuous in time. Using a quadratic numerical method with respect to time, we... PubDate: Fri, 30 Sep 2016 00:00:00 +010

Abstract: Let n 1 be an integer. Define ϕ2(n) to be the number of positive integers x, 1 x n, for which both 6x1 and 6x+1 are relatively prime to 6n. The primary goal of this study is to show that ϕ2 is a multiplicative function, that is, if gcd(m, n) = 1, then ϕ2(mn) = ϕ2(m)ϕ2(n). Key words: Euler phi-function, multiplicative function. PubDate: Sun, 31 Jul 2016 00:00:00 +010

Abstract: Due to rapid growth of the use of online auctions, fraudsters have taken advantage of these platforms to participate in their own auctions in order to raise prices (a practice called shilling). Innocent bidders have been forced to pay higher prices than they were willing to offer. This has resulted in the need to design and implement a shill detection algorithm. To eliminate this shilling pr... PubDate: Sun, 31 Jan 2016 00:00:00 +010