Latest Articles
Mathematical modelling of the impact of HIV prevention strategies among female sex workers on public health in Burkina Faso
This article presents a mathematical model designed to simulate the impact of targeted interventions aimed at preventing HIV transmission among female sex workers (FSWs) and their clients, while also analyzing their effects on the health of the general population. The compartmental model distinguishes between high-risk populations (FSWs and their clients) and low-risk populations (sexually active men and women in the...
Residual Sets and the Density of Binary Goldbach Representations
A residual-set framework is introduced for analyzing additive prime conjectures, with particular emphasis on the Strong Goldbach Conjecture (SGC). For each even integer En≥4, the residual set ℛ(En)={En−p∣ p<En,p∈ℙ} is defined, and the universal residual set ℛE=∪Enℛ(En) is constructed. It is shown that ℛE contains infinitely many primes. A nontrivial constructive lower bound is derived, establishing that the number of...
Modelling Population Growth Prognosis
Logistic growth model and its variants have been adjudged to be the most appropriate model for forecasting human population. However, in this article, we estimated the carrying capacity of Abuja using the logistic model. Then, we presented the parameters used to ascertain that the logistic model has the best fit in modelling population growth of Abuja over time. Meanwhile, a...
Constructability and Rigor of Angles Multiples of 3 in Euclidean Geometry
This paper investigates the constructability of angles multiples of 3 within the framework of Euclidean geometry. It makes a significant contribution by presenting the first geometric construction for all such angles, offering a rigorous solution to a longstanding geometric problem. The paper reaffirms the efficacy of Euclidean geometry in providing precise constructions and robust proofs for these angles, demonstrating the...
Combined Techniques of Hill Cipher and Transposition Cipher
Encryption is a method of encoding data so that only authorized parties can read or access that data. With the fast improvement of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. In this paper, the authors work on improving the security of data using a combination of Hill cipher and...
Mathematical Modeling of the Price Volatility of Maize and Sorghum between 1960 and 2022
The price of grains like maize and sorghum is subject to significant fluctuations, which can have a significant impact on a country's economy and food security. The aim of the study is to model sorghum and maize price volatility in Nigeria. The data utilized in the study was extracted from World Bank Commodity Price Data (WBCPD), 2022. The data consists...
Search Articles
Popular Articles
Aims & Scope
Aims and Scope
The Journal of Mathematics Letters publishes concise, high-impact contributions across all areas of mathematics. The journal emphasizes rapid dissemination of significant results, novel methods, and important observations in mathematical sciences.
Scope includes:
- Pure mathematics: algebra, analysis, geometry, topology
- Applied mathematics and modeling
- Computational mathematics and numerical analysis
- Statistics and probability theory
- Discrete mathematics and combinatorics
- Mathematical logic and foundations
- Differential equations and dynamical systems
- Optimization and operations research
- Mathematical physics
- Interdisciplinary mathematical applications
The journal welcomes short original papers, brief reviews, and letters that present significant mathematical advances with clarity and precision.
Author Guidelines
Please prepare your manuscript according to our standard guidelines. For detailed instructions, please contact the editorial office.
Ready to Submit Your Research?
Join our community of authors and share your discoveries with the world
Submit Manuscript