Research Journal of Mathematics and Computer Science


Double Lipschitz Stability for Nonlinearly neutral Differential Systems with Multiple Delay

Research Article of Research Journal of Mathematics and Computer Science Double Lipschitz Stability for Nonlinearly neutral Differential Systems with Multiple Delay Huo Ran1, Wang Xiaoli2* 1College of Science Inner Mongolia Agricultural University, Huhhot, 010018,China. 2College of Statistics and Mathematics, Inner Mongolia University of Finance and Economics, Huhhot, 010070, China. In this paper, first we proves a class of time-delay differential inequalities. And then, the nonlinear differential systems with time delay are considered and it is obtained that the trivial solution of the nonlinear systems with time delay has uniform stability and uniform exponential Lipschitz asymptotic stability with respect to partial variable. Keywords: Nonlinear systems; Partial variable stability; Lipschitz asymptotic stability; Differential inequality ...

Phishing Detection Model for Emails Using Classification Algorithm

Research Article of Research Journal of Mathematics and Computer Science Phishing Detection Model for Emails Using Classification Algorithm Adekunle Yinka, *Olu-Oshadare Olumide Department of Computer Science, Babcock University, Nigeria Anti-Phishing Working Group (APWG) is a contributing member that report, and study the ever-evolving nature and techniques of cybercrime. The APWG tracks the number of unique phishing emails and web sites, a primary measure of phishing across the globe. A single phishing site may be advertised as thousands of customized features, all leading to basically the same attack destination. This work aims to design a machine learning model using a hybrid of two classification algorithms which include Random Forests and Support Vector Machine (SVM). Also perform feature selection on the obtained phishing dataset to select a subset of highly predictive features and evaluate the model against other classification algorithms and existing solutions with the following metrics: False Positive Rate (FPR), Accuracy, Area Under the Receiver Operating Characteristic Curve (AUCROC) and Weighted Averages. It is expected that upon evaluation of this model much improved efficiency would be recorded as against other existing models. Keywords: Phishing Detection Model, Emails, Classification Algorithm ...

A Mathematical Model for Analyzing the Impact of the Ban on Foreign Garbage in China

Research Article of Research Journal of Mathematics and Computer Science A Mathematical Model for Analyzing the Impact of the Ban on Foreign Garbage in China Jiaying Yan1*, Gaozhen Ni1 1College of Electrical Engineering & New Energy, China Three Gorges University, Yichang, 443002, China. Focusing on the issue of the ban on foreign garbage, this paper analyzes the impact of the ban on China from both qualitative and quantitative perspectives. By collecting before and after the trash ban of China, China’s imports of scrap metal, waste paper, waste plastics data and related producer price index. it is concluded by granger causality test model that under the 5% confidence interval, the waste imports less, the higher the related product producer price index; Secondly, based on nemero pollution evaluation model, this paper finds that the nemero score of water quality in China has decreased by 0.026 and the water quality has improved to some extent. The two models established in this paper are of great significance for analyzing the impact of the ban on foreign garbage on China and specifying corresponding measures. Keywords: Foreign garbage ban; Granger causality test; Neme-ro pollution evaluation ...

A New approach in One Time Pad key management

Research Article of Research Journal of Mathematics and Computer Science A New approach in One Time Pad key management Gilda R. Bansimba, Regis F. Babindamana, Peter A. G. Kidoudou Université Marien Ngouabi, Faculté des Sciences et Techniques, BP: 69, Brazzaville, Congo Let (P,C,K,ε_k,D_k) be the One Time Pad cryptosystem. We consider P=C=K. In this paper, we improve the key management with introduction of the concept of mathematical key footprint to ensure the uniqueness of every generated key without storing it. We also combine the default operating system’s randomness Application Programming Interface (API) CSPRNG , with some further local system entropy parameters mainly the micro level of noise and environment brightness to enhance key generation randomness using any personal device. we introduce the use of negative keys to enlarge the key space K and give related algorithms. Keywords:one time pad, random number generator, key management, key-footprint, security, cryptography, unbreakable cipher ...

Manuscript Title: The title should be a brief phrase.

Author Information: List full names and affiliation of all authors, including Emails and phone numbers of corresponding author.

Abstract: The abstract should be less than 500 words. Following abstract, a list of keywords and abbreviations should be added. The keywords should be no more than 10. Abbreviation are only used for non standard and long terms.

Introduction: The introduction should included a clear statement of current problems.

Materials and Methods: This section should be clearly described.

Results and discussion: Authors may put results and discussion into a single section or show them separately.

Acknowledgement: This section includes a brief acknowledgment of people, grant details, funds

References: References should be listed in a numbered citation order at the end of articles. DOIs and links to referenced articles should be added if available. Abstracts and talks for conferences or papers not yet accepted should not be cited.

Tables and figures: Tables should be used at a minimum with a short descriptive title. The preferred file formats for Figures/Graphics are GIF, TIFF, JPEG or PowerPoint.

Online Publication: One of our goals is to minimize the publication time. We will publish an accepted article shortly (we may put the proof of accepted manuscript onlinefirst and then replace it later with the final version).

Open Access: We follow Open Access and the CC BY 4.0. Authors hold the copyright and retain publishing rights without restrictions. We do not charge any submission fees, but authors are required to pay publication fees after their manuscripts are accepted. We may grant discount/waiver to certain authors. For authors who receive our invitations, please send us the invitation code with your submission. 

Withdrawal Policy: When you want to withdraw/retract an article, please send us a written request including reasons by the correspondence email. We will withdraw/retract it from our system after reviewing the request.

Terms of Use/ Privacy Policy/ Disclaimer/Other Policies: By using the site/services, you are agreeing to our Terms of Use/Privacy Policy/Disclaimer/Other Policies. For more details, please click here .

About the journal
Our aim is to provide a platform that encourages publications of the most recent research/reviews for authors of all countries.


About the publisher
eSciPub LLC is a publisher to support Open Access initiative located in Texas, USA. It is a member of the largest community of professional publishers in the United States: the Independent Book Publishers Association. It hosts Open Access journals in Medicine, Business, Economics, Agriculture, Biological Sciences, Chemistry, Education, Physical Sciences, Sociology, Engineering.


Rapid Response Team
Please feel free to contact us if you have any questions. Our customer representative will answer your questions shortly.

Research Journal of Mathematics and Computer Science

Loading