Research Journal of Mathematics and Computer Science

Double Lipschitz Stability for Nonlinearly neutral Differential Systems with Multiple Delay

Research Article of Research Journal of Mathematics and Computer Science Double Lipschitz Stability for Nonlinearly neutral Differential Systems with Multiple Delay Huo Ran1, Wang Xiaoli2* 1College of Science Inner Mongolia Agricultural University, Huhhot, 010018,China. 2College of Statistics and Mathematics, Inner Mongolia University of Finance and Economics, Huhhot, 010070, China. In this paper, first we proves a class of time-delay differential inequalities. And then, the nonlinear differential systems with time delay are considered and it is obtained that the trivial solution of the nonlinear systems with time delay has uniform stability and uniform exponential Lipschitz asymptotic stability with respect to partial variable. Keywords: Nonlinear systems; Partial variable stability; Lipschitz asymptotic stability; Differential inequality ...

Phishing Detection Model for Emails Using Classification Algorithm

Research Article of Research Journal of Mathematics and Computer Science Phishing Detection Model for Emails Using Classification Algorithm Adekunle Yinka, *Olu-Oshadare Olumide Department of Computer Science, Babcock University, Nigeria Anti-Phishing Working Group (APWG) is a contributing member that report, and study the ever-evolving nature and techniques of cybercrime. The APWG tracks the number of unique phishing emails and web sites, a primary measure of phishing across the globe. A single phishing site may be advertised as thousands of customized features, all leading to basically the same attack destination. This work aims to design a machine learning model using a hybrid of two classification algorithms which include Random Forests and Support Vector Machine (SVM). Also perform feature selection on the obtained phishing dataset to select a subset of highly predictive features and evaluate the model against other classification algorithms and existing solutions with the following metrics: False Positive Rate (FPR), Accuracy, Area Under the Receiver Operating Characteristic Curve (AUCROC) and Weighted Averages. It is expected that upon evaluation of this model much improved efficiency would be recorded as against other existing models. Keywords: Phishing Detection Model, Emails, Classification Algorithm ...

A Mathematical Model for Analyzing the Impact of the Ban on Foreign Garbage in China

Research Article of Research Journal of Mathematics and Computer Science A Mathematical Model for Analyzing the Impact of the Ban on Foreign Garbage in China Jiaying Yan1*, Gaozhen Ni1 1College of Electrical Engineering & New Energy, China Three Gorges University, Yichang, 443002, China. Focusing on the issue of the ban on foreign garbage, this paper analyzes the impact of the ban on China from both qualitative and quantitative perspectives. By collecting before and after the trash ban of China, China’s imports of scrap metal, waste paper, waste plastics data and related producer price index. it is concluded by granger causality test model that under the 5% confidence interval, the waste imports less, the higher the related product producer price index; Secondly, based on nemero pollution evaluation model, this paper finds that the nemero score of water quality in China has decreased by 0.026 and the water quality has improved to some extent. The two models established in this paper are of great significance for analyzing the impact of the ban on foreign garbage on China and specifying corresponding measures. Keywords: Foreign garbage ban; Granger causality test; Neme-ro pollution evaluation ...

A New approach in One Time Pad key management

Research Article of Research Journal of Mathematics and Computer Science A New approach in One Time Pad key management Gilda R. Bansimba, Regis F. Babindamana, Peter A. G. Kidoudou Université Marien Ngouabi, Faculté des Sciences et Techniques, BP: 69, Brazzaville, Congo Let (P,C,K,ε_k,D_k) be the One Time Pad cryptosystem. We consider P=C=K. In this paper, we improve the key management with introduction of the concept of mathematical key footprint to ensure the uniqueness of every generated key without storing it. We also combine the default operating system’s randomness Application Programming Interface (API) CSPRNG , with some further local system entropy parameters mainly the micro level of noise and environment brightness to enhance key generation randomness using any personal device. we introduce the use of negative keys to enlarge the key space K and give related algorithms. Keywords:one time pad, random number generator, key management, key-footprint, security, cryptography, unbreakable cipher ...

Manuscript Title: The title should be a brief phrase.

Author Information: List full names and affiliation of all authors, including Emails and phone numbers of corresponding author.

Abstract: The abstract should be less than 500 words. Following abstract, a list of keywords and abbreviations should be added. The keywords should be no more than 10. Abbreviation are only used for non standard and long terms.

Introduction: The introduction should included a clear statement of current problems.

Materials and Methods: This section should be clearly described.

Results and discussion: Authors may put results and discussion into a single section or show them separately.

Acknowledgement: This section includes a brief acknowledgment of people, grant details, funds

References: References should be listed in a numbered citation order at the end of the manuscript. DOIs and links to referenced articles should be added if available. Abstracts and talks for conferences or papers not yet accepted should not be cited.

Tables and figures: Tables should be used at a minimum with a short descriptive title. The preferred file formats for Figures/Graphics are GIF, TIFF, JPEG or PowerPoint.

Publication fees: We do not charge any submission charges, but authors are required to pay publication fees after their manuscripts are accepted for publication. For authors who receive our invitations, please send us the invitation code.

Proofreading and Publication: A proof will be sent to the corresponding author. Authors should carefully read it to avoid any errors and return any comments. We will update and publish it shortly. One of our goals is to minimize our publication time. For authors who do not return comments of proofreading on time, we may put the proof onlinefirst and replace it later with the final version. 

Withdrawal Policy: When you want to withdraw a published article, please send us your written request by email. We will withdraw/retract it from our system after reviewing the request. Please allow us enough time to process it. 

Terms of Use/Privacy Policy/Disclaimer/Other Policies: you agree that by using or receiving our services, you have read, understood, and agreed to be bound by all of our terms of use/privacy policy/ disclaimer/ other policies(Click here for details).

About the journal
The journal is hosted by eSciPub LLC. Our aim is to provide a platform that encourages publication of the most recent research and reviews for authors from all countries.

About the publisher
eSciPub LLC is a publisher to support Open Access initiative located in Houston, Texas, USA. It is a member of the largest community of professional publishers in the United States: the Independent Book Publishers Association. It hosts more than 100 Open Access journals in Medicine, Business & Economics, Agriculture, Biological Sciences, Chemistry, Education, Physical Sciences, Sociology, and Engineering and Technology.

Rapid Response Team
Please feel free to contact our rapid response team if you have any questions. Our customer representative will answer your questions shortly.

Research Journal of Mathematics and Computer Science