top of page
Recent Posts
Archive
Tags
Journal of Advances in Mathematics and Computer Science
In this paper, exact determinants and inverses of skew symmetric generalized Loeplitz matricesare given by constructing the special...
The Role of Information and Communication Technology (ICT) in the Academic Performance of the Univer
Student performance has several elements, but most significant is the role the information and communication technology plays. The...
Relationship between Financial Literacy and Its Component: A Research on Working Women
Developing countries, such as Malaysia, are in need of working women to help to improve the country's economy. Thus, it is of immense...
Aspects of the Fourier-Stieltjes Transform of C*-algebra Valued Measures
This paper deals with the Fourier-Stieltjes transform of C∗-algebra valued measures. We construct an involution on the space of such...
An Updated Algorithm for Moderate Censoring in Time-to-Event Data Using Rank-based Regression
Aim: To propose an updated algorithm with an extra step added to the Newton-type algorithm used in robust rank based non-parametric...
Credit Card Fraud Detection Using Autoencoder Model in Unbalanced Datasets
Fraudulent credit card transaction is still one of problems that face the companies and banks sectors; it causes them to lose billions of...
Estimation of Non-smooth Functionals in Hilbert Sample Space Using the Edgeworth Expansions
An arbitrary non-smooth functional is estimated using a nonparametric set-up. Exploratory data analysis methods are relied on to come up...
Analytical Hierarchy Process (AHP) Model for Prioritizing Alternative Strategies for Malaria Control
Aim: “This study Analytical Hierarchy Process (AHP) Model for Malaria Control” was aimed at using analytical hierarchy process model to...
Almost Periodic Sequence in a Discrete Logistic Equation
This paper is concerned with an almost periodic discrete logistic equation. By using thecontinuation theorem of Mawhin’s coincidence...
A Comparative Analysis of Selected Fisher Linear Discriminant Based Algorithms in Human Faces
One of the most reliable biometrics when issues of access control and security is been considered is face recognition. An integral part...
Blog: Blog
bottom of page