Research Journal of Mathematics and Computer Science


Application of the Discrete Geometrical Invariants to the Quantitative Monitoring of the Electrochemical Background

Research Article of Research Journal of Mathematics and Computer Science Application of the Discrete Geometrical Invariants to the Quantitative Monitoring of the Electrochemical Background R. R. Nigmatullin1, H. C. Budnikov2, A. V. Sidelnikov3, E. I. Maksyutova3 1Radioelectronic and Informative-Measurements Techniques Department, Kazan National Research Technical University (KNRTU-KAI)K. Marx str. 10. , 420011, Kazan, Tatarstan, Russian Federation; 2A.M. Butlerov Institute of Chemistry, Kazan Federal University (KFU), Kazan, Russian Federatio; 3Chemistry Department, Bashkir State University, Ufa, Russian Federation In this paper, we apply the statistics of the fractional moments (SFM) and discrete geometrical sets/invariants (DGI) for explain of the temporal evolution of the electrochemical background. For analysis of this phenomenon, we apply the internal correlation factor (ICF) and proved that integral curves expressed in the form of voltammograms (VAGs) are more sensitive in comparison with their derivatives. For analysis of the VAGs (integral curves), we propose the set of the quantitative parameters that form the invariant DGI curves of the second and the fourth orders, correspondingly. The method of their calculation based on the generalization of the well-known Pythagor’s theorem is described. The quantitative parameters that determine these DGI allow monitoring the background of the electrochemical solution covering the period of 1-1000 measurements for two types of electrode (Pt and C) and notice the specific peculiarities that characterize each electrode material. The total set of 1000 measurements was divided on 9 parts (1-100, 101-200, 201-300, …, 901-1000) and the duration of each hundred set was 1300 sec. The proposed algorithm is sensitive and has a “universal” character. It can be applied for a wide set of random curves (experimental measurements) that are needed to be compared in terms of a limited number of the integer moments. The qualitative peculiarities of the background behavior for two types of electrodes (Pt and C) based ...

An Implementation of a One-Time Pad Encryption Algorithm for Data Security in Cloud Computing Environment

Research Article of Research Journal of Mathematics and Computer Science An Implementation of a One-Time Pad Encryption Algorithm for Data Security in Cloud Computing Environment Omotunde Ayokunle A*1, Faith Adekogbe2, Onuiri Ernest3, Precious Uchendu4 1Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria. 2Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria 3Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria 4Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria The cloud is a computing model used by many consumers which include individuals and organizations for data storage which hitherto demands that adequate security measures be put in place to protect the confidentiality and integrity of that information. In cases where these security measures are inefficient or in some cases non-existent, client data is prone to a number of unauthorized violations which include breach of privacy, loss of data, compromised data integrity, and data manipulation among others. This therefore necessitates the demand for efficient security measures. Encryption is a security technique adopted by many for data protection which entails concealing the information content of a message in a way that only the intended recipient can make use of it. This research paper discusses the concept of encryption, a review of different encryption schemes that have been discussed over the years, and proposes a one-time pad encryption (OTP) algorithm (FAPE’s OTP). FAPE’s OTP implements the one time pad using a key expansion process that transforms a 512 bit key to the length of the plaintext. This research was carried out through a comprehensive study of encryption and cloud processes to understand both concepts independently and determine how they can be interleaved while sustaining optimum delivery. Furthermore, our findings indicate that FAPE’s OTP has a faster speed of operation in comparison to the Advanced Encryption Standard. Keywords: Data Storage, Security, Encryption, One-Time ...

Expert System Model for Diagnosing Legume Diseases

Research Article of Research Journal of Mathematics and Computer Science Expert System Model for Diagnosing Legume Diseases Rahmon,I.A,Adebola_Akinsanya and Eze M.,. Computer Science Department Babcock University, Ilishan, Ogun State. There is a current surge in designing expert systems to solve problems like humans in different domains of research but there presently exist dearth of models that can guide designers of expert systems that can be used to accurately diagnose Soya beans diseases. Soya bean is a leguminous plant that is commonly grown in sub Saharan region and it is currently one of the legumes with high Gross Domestic Product (GDP) in the Nigerian economy, but farmers of this product are faced with serious challenges from legume ravaging diseases that are usually similar in symptoms and very difficult to diagnose by the few practising botanist available. Most models available cannot be used to guide designers who are interested in developing secured and reliable expert systems that can accurately classify, identify, diagnose and recommend treatments for Soya beans diseases. The main aim of this paper is to review existing models that are currently being used in designing expert systems and identify their limitations in other to come up with a better, more reliable and secured model. In other to identify inherent gaps from other models, research review method was adopted to critically investigate the weak points in few related and current expert models for classifying and diagnosing legumes diseases. Keywords: expert system model, diagnosing legume diseases ...

A Conceptual Design and Evaluation Framework for Mobile Persuasive Health Technologies (Usability Approach)

Research Article of Research Journal of Mathematics and Computer Science A Conceptual Design and Evaluation Framework for Mobile Persuasive Health Technologies (Usability Approach) Kasali, F. A.1, Awodele, O.2, Kuyoro, S.3, Akinsanya, A.4, Eze, M.5 1,2,3,4,5Department of Computer Science and Information Technology, Babcock University, Ogun State, Nigeria Persuasive techniques are recently being explored by computer science researchers as an effective strategy towards creating applications that are aimed at positive attitudinal changes especially in the health domain but finding effective evaluation approaches for these technologies remain an herculean task for all stakeholders involved and in order to overcome this limitation, the Persuasive System Design (PSD) model was designed but researchers claim that the model is too theoretical in nature and some of its design principles are too subjective as they cannot be measured quantitatively. Hence, the focus of this paper is to critically review the PSD model and popular models currently being used to evaluate the usability of information systems as usability has been identified as an important requirement currently used to evaluate the overall success of persuasive technologies. To achieve the stated objectives, the systematic review method of research was done to objectively analyze the PSD model, its applicability as an evaluation tool was tested on a popular mobile health application installed on the Samsung Galaxy Tablet using android Operation system. Exhaustive evaluation of the application was performed by 5 software usability researchers using the method of cognitive walkthrough. From the analysis, it was realized that the PSD model is a great tool at designing persuasive technologies but as an evaluation tool, it is too theoretical in nature, its evaluation strategies are too subjective in nature and the 28 principles described in it overlap with one another. As a result, the PSD model was extended with an integrated usability model and ...

Manuscript Title: The title should be a brief phrase.

Author Information: List full names and affiliation of all authors, including Emails and phone numbers of corresponding author.

Abstract: The abstract should be less than 500 words. Following abstract, a list of keywords and abbreviations should be added. The keywords should be no more than 10. Abbreviation are only used for non standard and long terms.

Introduction: The introduction should included a clear statement of current problems.

Materials and Methods: This section should be clearly described.

Results and discussion: Authors may put results and discussion into a single section or show them separately.

Acknowledgement: This section includes a brief acknowledgment of people, grant details, funds

References: References should be listed in a numbered citation order at the end of the manuscript. DOIs and links to referenced articles should be added if available. Abstracts and talks for conferences or papers not yet accepted should not be cited.

Tables and figures: Tables should be used at a minimum with a short descriptive title. The preferred file formats for Figures/Graphics are GIF, TIFF, JPEG or PowerPoint.

Publication fees: We do not charge any submission charges, but authors are required to pay publication fees after their manuscripts are accepted for publication. For authors who receive our invitations, please send us the invitation code.

Proofreading and Publication: A proof will be sent to the corresponding author. Authors should carefully read it to avoid any errors and return any comments. We will update and publish it shortly. One of our goals is to minimize our publication time. For authors who do not return comments of proofreading on time, we may put the proof onlinefirst and replace it later with the final version. 

Withdrawal/retraction Policy: When you want to withdraw/retract a published article, please send us your written request by email. We will withdraw/retract it from our system after reviewing the request. Please allow us enough time to process it. 

Terms of Use/Privacy Policy/Disclaimer/Other Policies: eSciPub LLC is a publisher to support Open Access initiative located in Houston, Texas, USA. We are a member of the largest community of professional publishers in the United States: the Independent Book Publishers Association. All journals are solely owned by eSciPub LLC and have no affiliation/relationship with any other(s). You agree that by using or receiving our services, you have read, understood, and agreed to be bound by all of our terms of use/privacy policy/ disclaimer/ other policies(Click here for details).

About the journal
The journal is solely owned and hosted by eSciPub LLC and has no affiliation/relationship with any other(s). Our aim is to provide a platform that encourages publications of the most recent research/reviews for authors of all countries.


About the publisher
eSciPub LLC is a publisher to support Open Access initiative located in Houston, Texas, USA. It is a member of the largest community of professional publishers in the United States: the Independent Book Publishers Association. It hosts more than 100 Open Access journals in Medicine, Business, Economics, Agriculture, Biological Sciences, Chemistry, Education, Physical Sciences, Sociology, Engineering.


Rapid Response Team
Please feel free to contact our rapid response team if you have any questions. Our customer representative will answer your questions shortly.

Research Journal of Mathematics and Computer Science

Loading