Double Lipschitz Stability for Nonlinearly neutral Differential Systems with Multiple Delay
In this paper, first we proves a class of time-delay differential inequalities. And then, the nonlinear differential systems with time delay are considered and it is obtained that the trivial solution of the nonlinear systems with time delay has uniform stability and uniform exponential Lipschitz asymptotic stability with respect to partial variable.
Phishing Detection Model for Emails Using Classification Algorithm
Anti-Phishing Working Group (APWG) is a contributing member that report, and study the ever-evolving nature and techniques of cybercrime. The APWG tracks the number of unique phishing emails and web sites, a primary measure of phishing across the globe. A single phishing site may be advertised as thousands of customized features, all leading to basically the same attack destination. This work aims to design a machine learning model using a hybrid of two classification algorithms which include Random Forests and Support Vector Machine (SVM). Also perform feature selection on the obtained phishing dataset to select a subset of highly predictive features and evaluate the model against other classification algorithms and existing solutions with the following metrics: False Positive Rate (FPR), Accuracy, Area Under the Receiver Operating Characteristic Curve (AUCROC) and Weighted Averages. It is expected that upon evaluation of this model much improved efficiency would be recorded as against other existing models.
A Mathematical Model for Analyzing the Impact of the Ban on Foreign Garbage in China
Focusing on the issue of the ban on foreign garbage, this paper analyzes the impact of the ban on China from both qualitative and quantitative perspectives. By collecting before and after the trash ban of China, China’s imports of scrap metal, waste paper, waste plastics data and related producer price index. it is concluded by granger causality test model that under the 5% confidence interval, the waste imports less, the higher the related product producer price index; Secondly, based on nemero pollution evaluation model, this paper finds that the nemero score of water quality in China has decreased by 0.026 and the water quality has improved to some extent. The two models established in this paper are of great significance for analyzing the impact of the ban on foreign garbage on China and specifying corresponding measures.
A New approach in One Time Pad key management
Let (P,C,K,ε_k,D_k) be the One Time Pad cryptosystem. We consider P=C=K. In this paper, we improve the key management with introduction of the concept of mathematical key footprint to ensure the uniqueness of every generated key without storing it. We also combine the default operating system’s randomness Application Programming Interface (API) CSPRNG , with some further local system entropy parameters mainly the micro level of noise and environment brightness to enhance key generation randomness using any personal device. we introduce the use of negative keys to enlarge the key space K and give related algorithms.
An Algorithmic Random-Integer Generator based on the Distribution of Prime Numbers
The prevalencWe talk about random when it is not possible to determine a pattern on the observed out-comes. A computer follows a sequence of fixed instructions to give any of its output, hence the difficulty of choosing numbers randomly from algorithmic approaches. However, some algorithms like the Linear Congruential algorithm and the Lagged Fibonacci generator appear to produce “true” random sequences to anyone who does not know the secret initial input [1]. Up to now, we cannot rigorously answer the question on the randomness of prime numbers [2, page 1] and this highlights a connection between random number generator and the distribution of primes. From [3] and [4] one sees that it is quite naive to expect good random reproduction with prime numbers. We are, however, interested in the properties underlying the distribution of prime numbers, which emerge as sufficient or insufficient arguments to conclude a proof by contradiction which tends to show that prime numbers are not randomly distributed. To achieve this end, we use prime gap sequence variation. Our algorithm makes possible to deduce, in a binary choice case, a uniform behavior in the individual consecutive occurrence of primes, and no uniformity trait when the occurrences are taken collectively.
An Analysis of Cybercrime Awareness Amongst First Year Students in Nigerian Private University
The prevalence of Cybercrime the World over threatens to destroy the very fabric of peace. From financial fraud to theft identity, the ways in which this act continue to evolve and penetrate the most secure of digital entities calls for worry. A more disturbing trend is the perception of Nigerians being the purveyor of such acts. This study therefore seeks to find out what young Nigerians actually know about cybercrimes in order to gain an insight into what actually drives it and if possible, to discourage such acts from a tender age. Results show the perception of the World is not unfounded and recommendations that may go a long way in making this venture unattractive is highlighted.
The series of Semigroup Theory via Functional Calculus
Present panorama of the sequence of operators classes with their associated functional calculi , relevant in semigroup theory : the sequence of operators of halfplane , strip ,sector and parabola-type . It is shown that the basic results in the theory of C0-semigroup (the Hille-Yosida and the Trotter-kato theorem) follow easily from general functional calculus principles by Markus Haase [9] . The introduction of parabola-type sequence of operators allows to treat cosine the sequence of operators functions by functional calculus methods .
A Neuro-Fuzzy System For Diagnosis of Soya-Beans Diseases
Soyabean is an important legume crop, extensively cultivated for food on which low-income population highly depend because of its proteineous nutrient on daily basis for food.The efforts of farmers to specifically identify the specific pests responsible for damaging of plants segment such as petioles, roots, stem, pod and leaves still remain vague and imprecise to many farmers. In this work, a neuro-fuzzy system will be built with MATLAB version 8 with 100 rules on five input parameters as linguistic variables or symptoms into the system to determine the disease type either as fungi or bacteria or virus, and to also determine intensity rate as the output in form of a crisp. The output of the system will produce results for the decision maker to provide solution regarding the treatment of the infected plant for bountiful and quality harvest.
Chaotic Random Sequence Generated from Tent Map on Variant Maps
Chaotic sequences, have being widely used in mobile communications and cyberspace security. Using the sequences, various stochastic analysis schemes are developed. The Tent map is one of the widely used chaotic maps with good ergodic uniformity. In this paper, the variant maps are used to illustrate the Tent chaotic sequence under different lengths and control parameters to show the statistical characteristics of sequences. Results are shown that when the control parameter of Tent map is close to 0.5, the generated sequences have the symmetrical distribution, that is more stable if the sequence is longer.
Traffic Shaping for Congestion Control
The problem of congestion is not new to the field of telecommunications; its root can be traced back to the very foundations of the internet. Most, if not all networks, are currently faced with this problem. The distribution of resources on the network is very vital. The fact that resources are limited brought about major problem such that these limited resources would be shared among various workstations and nodes. As the network grows, and the number of workstations and nodes increases; resources become integral and if not properly managed no meaningful work will be done in such networks. Congestion control, which involved managing resources when the network utilization becomes so high, is of utmost importance so as to avoid congestion collapse. The complex calculations and computation carried out in the existing solutions, increase utilization as well as the problem of congestion. Traffic shaping algorithms provide solutions with little overhead and thus would be preferred to use in medium sized networks. This work proposes traffic shaping as a better solution for congestion control especially in medium size networks.