Skip to main content

Showing 1–3 of 3 results for author: Abah, J

.
  1. Exploring Gender Differences in Graduation Proficiency in Mathematics Education Using a Markov Chain Model: Implications for Economic Growth in Nigeria

    Authors: Clement Iji, Joshua Abah

    Abstract: This study employs an ex-post facto research design to explore the fluctuations of gender difference in academic achievement among graduating students of mathematics education. Graduation statistics for a total of 1106 graduating students of mathematics education (923 males and 183 females) from a University in North Central Nigeria were used to design a discrete-time Markov chain model for the mo… ▽ More

    Submitted 28 August, 2017; originally announced August 2017.

    Journal ref: International Journal of Educational Excellence International Journal of Educational Excellence, 2017, 3 (2), pp.75 - 86

  2. arXiv:1707.06359  [pdf

    math.HO cs.CY

    Recency Bias in the Era of Big Data: The Need to Strengthen the Status of History of Mathematics in Nigerian Schools

    Authors: Joshua Abah Abah

    Abstract: The amount of information available to the mathematics teacher is so enormous that the selection of desirable content is gradually becoming a huge task in itself. With respect to the inclusion of elements of history of mathematics in mathematics instruction, the era of Big Data introduces a high likelihood of Recency Bias, a hitherto unconnected challenge for stakeholders in mathematics education.… ▽ More

    Submitted 19 July, 2017; originally announced July 2017.

    Comments: 8 pages

    Journal ref: Advances in Multidisciplinary and Scientific Research Journal, 2(4), December 2016, 241-248

  3. A machine learning approach to anomaly-based detection on Android platforms

    Authors: Joshua Abah, Waziri O. V, Abdullahi M. B, Arthur U. M, Adewale O. S

    Abstract: The emergence of mobile platforms with increased storage and computing capabilities and the pervasive use of these platforms for sensitive applications such as online banking, e-commerce and the storage of sensitive information on these mobile devices have led to increasing danger associated with malware targeted at these devices. Detecting such malware presents inimitable challenges as signature-… ▽ More

    Submitted 13 December, 2015; originally announced December 2015.

    Comments: This is a 21 pages paper that reports research findings

    Journal ref: International Journal of Network Security & Its Applications, Vol.7,No.6, pp.15-35 (2015)