In this paper, first we proves a class of time-delay differential inequalities. And then, the nonlinear differential systems with time delay are considered and it is obtained that the trivial solution of the nonlinear systems with time delay has uniform stability and uniform exponential Lipschitz asymptotic stability with respect to partial variable.
Anti-Phishing Working Group (APWG) is a contributing member that report, and study the ever-evolving nature and techniques of cybercrime. The APWG tracks the number of unique phishing emails and web sites, a primary measure of phishing across the globe. A single phishing site may be advertised as thousands of customized features, all leading to basically the same attack destination. This work aims to design a machine learning model using a hybrid of two classification algorithms which include Random Forests and Support Vector Machine (SVM). Also perform feature selection on the obtained phishing dataset to select a subset of highly predictive features and evaluate the model against other classification algorithms and existing solutions with the following metrics: False Positive Rate (FPR), Accuracy, Area Under the Receiver Operating Characteristic Curve (AUCROC) and Weighted Averages. It is expected that upon evaluation of this model much improved efficiency would be recorded as against other existing models.
Focusing on the issue of the ban on foreign garbage, this paper analyzes the impact of the ban on China from both qualitative and quantitative perspectives. By collecting before and after the trash ban of China, China’s imports of scrap metal, waste paper, waste plastics data and related producer price index. it is concluded by granger causality test model that under the 5% confidence interval, the waste imports less, the higher the related product producer price index; Secondly, based on nemero pollution evaluation model, this paper finds that the nemero score of water quality in China has decreased by 0.026 and the water quality has improved to some extent. The two models established in this paper are of great significance for analyzing the impact of the ban on foreign garbage on China and specifying corresponding measures.
Let (P,C,K,ε_k,D_k) be the One Time Pad cryptosystem. We consider P=C=K. In this paper, we improve the key management with introduction of the concept of mathematical key footprint to ensure the uniqueness of every generated key without storing it. We also combine the default operating system’s randomness Application Programming Interface (API) CSPRNG , with some further local system entropy parameters mainly the micro level of noise and environment brightness to enhance key generation randomness using any personal device. we introduce the use of negative keys to enlarge the key space K and give related algorithms.
The prevalencWe talk about random when it is not possible to determine a pattern on the observed out-comes. A computer follows a sequence of ﬁxed instructions to give any of its output, hence the diﬃculty of choosing numbers randomly from algorithmic approaches. However, some algorithms like the Linear Congruential algorithm and the Lagged Fibonacci generator appear to produce “true” random sequences to anyone who does not know the secret initial input . Up to now, we cannot rigorously answer the question on the randomness of prime numbers [2, page 1] and this highlights a connection between random number generator and the distribution of primes. From  and  one sees that it is quite naive to expect good random reproduction with prime numbers. We are, however, interested in the properties underlying the distribution of prime numbers, which emerge as suﬃcient or insuﬃcient arguments to conclude a proof by contradiction which tends to show that prime numbers are not randomly distributed. To achieve this end, we use prime gap sequence variation. Our algorithm makes possible to deduce, in a binary choice case, a uniform behavior in the individual consecutive occurrence of primes, and no uniformity trait when the occurrences are taken collectively.
The prevalence of Cybercrime the World over threatens to destroy the very fabric of peace. From financial fraud to theft identity, the ways in which this act continue to evolve and penetrate the most secure of digital entities calls for worry. A more disturbing trend is the perception of Nigerians being the purveyor of such acts. This study therefore seeks to find out what young Nigerians actually know about cybercrimes in order to gain an insight into what actually drives it and if possible, to discourage such acts from a tender age. Results show the perception of the World is not unfounded and recommendations that may go a long way in making this venture unattractive is highlighted.
Present panorama of the sequence of operators classes with their associated functional calculi , relevant in semigroup theory : the sequence of operators of halfplane , strip ,sector and parabola-type . It is shown that the basic results in the theory of C0-semigroup (the Hille-Yosida and the Trotter-kato theorem) follow easily from general functional calculus principles by Markus Haase  . The introduction of parabola-type sequence of operators allows to treat cosine the sequence of operators functions by functional calculus methods .
Soyabean is an important legume crop, extensively cultivated for food on which low-income population highly depend because of its proteineous nutrient on daily basis for food.The efforts of farmers to specifically identify the specific pests responsible for damaging of plants segment such as petioles, roots, stem, pod and leaves still remain vague and imprecise to many farmers. In this work, a neuro-fuzzy system will be built with MATLAB version 8 with 100 rules on five input parameters as linguistic variables or symptoms into the system to determine the disease type either as fungi or bacteria or virus, and to also determine intensity rate as the output in form of a crisp. The output of the system will produce results for the decision maker to provide solution regarding the treatment of the infected plant for bountiful and quality harvest.
Chaotic sequences, have being widely used in mobile communications and cyberspace security. Using the sequences, various stochastic analysis schemes are developed. The Tent map is one of the widely used chaotic maps with good ergodic uniformity. In this paper, the variant maps are used to illustrate the Tent chaotic sequence under different lengths and control parameters to show the statistical characteristics of sequences. Results are shown that when the control parameter of Tent map is close to 0.5, the generated sequences have the symmetrical distribution, that is more stable if the sequence is longer.
Orthogonal Sequences (as M-Sequences, Walsh Sequences, …) are used widely at the forward links of communication channels to mix the information on connecting to and at the backward links of these channels to sift through this information is transmitted to reach the receivers this information in a correct form, especially in the pilot channels, the Sync channels, and the Traffic channel. This research is useful to generate new sets of orthogonal sequences (with the bigger lengths and the bigger minimum distance that assists to increase secrecy of these information and increase the possibility of correcting mistakes resulting in the channels of communication) from quotient rings Z/pmZ, where Z is the integers and p is prime, replacing each event number by zero and replacing each odd number by one.