default search action
Applied Mathematics and Computation, Volume 168
Volume 168, Number 1, September 2005
- Jinbao Jian, Haiyan Zheng, Qingjie Hu, Chun-Ming Tang:
A new norm-relaxed method of strongly sub-feasible direction for inequality constrained optimization. 1-28 - Jianzhou Wang, Zhixin Ma, Lian Li:
Detection, mining and forecasting of impact load in power load forecasting. 29-39 - Pin-Chang Su, Erl-Huei Lu, Henry Ker-Chang Chang:
A knapsack public-key cryptosystem based on elliptic curve discrete logarithm. 40-46 - Yingjie Wang, Jianhua Li, Ling Tie:
Security analysis and improvement of a user-friendly remote authentication protocol. 47-50 - Mohammad Masjed-Jamei, M. R. Eslahchi, Mehdi Dehghan:
On numerical improvement of Gauss-Radau quadrature rules. 51-64 - Mahmoud M. El-Borai, Khairia El-Said El-Nadi, Osama L. Mostafa, Hamdy M. Ahmed:
Numerical methods for some nonlinear stochastic differential equations. 65-75 - Mustafa Gülsu, Mehmet Sezer:
The approximate solution of high-order linear difference equations with variable coefficients in terms of Taylor polynomials. 76-88 - Yanjun Wang, Peiping Shen, Zhian Liang:
A branch-and-bound algorithm to globally solve the sum of several linear ratios. 89-101 - Khosrow Maleknejad, M. Karami:
Numerical solution of non-linear Fredholm integral equations by using multiwavelets in the Petrov-Galerkin method. 102-110 - Khosrow Maleknejad, Taher Lotfi:
Numerical expansion methods for solving integral equations by interpolation and Gauss quadrature rules. 111-124 - Ibrahim Çelik:
Approximate computation of eigenvalues with Chebyshev collocation method. 125-134 - Jun Shao, Zhenfu Cao:
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme. 135-140 - Khosrow Maleknejad, M. Karami, Nasser Aghazadeh:
Numerical solution of Hammerstein equations via an interpolation method. 141-145 - Ze-Mao Zhao, Feng-Yu Liu:
Method of constructing elliptic curve authenticated encryption scheme. 146-151 - Siraj-ul-Islam, Muhammad Azam Khan, Syed Ikram A. Tirmizi, Edward H. Twizell:
Non polynomial spline approach to the solution of a system of third-order boundary-value problems. 152-163 - Sang-Keon Oh, Min-Soeng Kim, Tae-Dok Eom, Ju-Jang Lee:
Heterogeneous local model networks for time series prediction. 164-177 - André L. Moura, José R. Camacho, Sebastião C. Guimarães Jr., Carlos H. Salerno:
A functional language to implement the divide-and-conquer Delaunay triangulation algorithm. 178-191 - Hasan Akin:
On the ergodic properties of certain additive cellular automata over Zm. 192-197 - (Withdrawn) Quartic spline collocation methods for elliptic partial differential equations. 198-221
- Zuhua Shao:
Improvement of efficient proxy signature schemes using self-certified public keys. 222-234 - Weidong Qiu, Kefei Chen:
Identity oriented signature scheme based on quadratic residues. 235-242 - Abubakr Muhammad, Magnus Egerstedt:
Connectivity graphs as models of local interactions. 243-269 - A. Esen:
A numerical solution of the equal width wave equation by a lumped Galerkin method. 270-282 - Moustafa S. Abou-Dina, F. M. Hassan:
Approximate determination of the transmission and reflection coefficients for water-wave flow over a topography. 283-304 - Chien-Lung Hsu, Tzong-Sun Wu:
Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack. 305-319 - Gyurhan H. Nedzhibov:
An acceleration of iterative processes for solving nonlinear equations. 320-332 - Bahtiyar A. Mamedov, R. Tapramaz, Z. Merdan:
Calculation of generalized elliptic type integrals using the binomial expansion theorem. 333-341 - Hua Ke, Baoding Liu:
Project scheduling problem with stochastic activity duration times. 342-353 - Andreas U. Schmidt:
A model for prejudiced learning in noisy environments. 354-379 - Xiaofan Yang, David J. Evans, Graham M. Megson:
On a non-autonomous difference equation. 380-388 - Mohamad Radwan, M. K. Ahmed, Fawzy Ahmed Abd El-Salam:
The problem of close approach of two small masses in the field of massive oblate primary. 389-397 - Santanu Saha Ray, R. K. Bera:
Analytical solution of the Bagley Torvik equation by Adomian decomposition method. 398-410 - Nivaor Rodolfo Rigozo, Ezequiel Echer, Daniel Jean Roger Nordemann, Luís Eduardo Antunes Vieira, Heloisa Helena de Faria:
Comparative study between four classical spectral analysis methods. 411-430 - Mehdi Dehghan, M. Masjed-Jamei, M. R. Eslahchi:
On numerical improvement of the second kind of Gauss-Chebyshev quadrature rules. 431-446 - Woei-Jiunn Tsaur:
Several security schemes constructed using ECC-based self-certified public key cryptosystems. 447-464 - Jafar Pour-Mahmoud, Mohammad Y. Rahimi-Ardabili, Sedaghat Shahmorad:
Numerical solution of the system of Fredholm integro-differential equations by the Tau method. 465-478 - M. R. Eslahchi, Mehdi Dehghan, M. Masjed-Jamei:
The first kind Chebyshev-Newton-Cotes quadrature rules (closed type) and its numerical improvement. 479-495 - P. K. Mishra:
Optimal systolic array algorithms for tensor product. 496-518 - Zhibin Zhu:
A globally and superlinearly convergent feasible QP-free method for nonlinear programming. 519-539 - Abdollah Shidfar, G. R. Karamali:
Numerical solution of inverse heat conduction problem with nonstationary measurements. 540-548 - Vildan Gülkaç:
On the finite differences schemes for the numerical solution of two-dimensional moving boundary problem. 549-556 - Rafael Cortell Bataller:
A note on magnetohydrodynamic flow of a power-law fluid over a stretching sheet. 557-566 - Quan-Fang Wang:
Numerical solution for series sine-Gordon equations using variational method and finite element approximation. 567-599 - Li Cai, Jian-Hu Feng, Wen-Xian Xie:
A CWENO-type central-upwind scheme for ideal MHD equations. 600-612 - Alberto d'Onofrio:
Vaccination policies and nonlinear force of infection: generalization of an observation by Alexander and Moghadas (2004). 613-622 - Fabio Dercole, Stefano Maggi:
Detection and continuation of a border collision bifurcation in a forest fire model. 623-635 - Yingzhen Lin, Minggen Cui, Yi Zheng:
Representation of the exact solution for infinite system of linear equations. 636-650 - Silvia Bonettini, Emanuele Galligani, Valeria Ruggiero:
An inexact Newton method combined with Hestenes multipliers' scheme for the solution of Karush-Kuhn-Tucker systems. 651-676 - Ling Zhu:
On the convergent condition of Newton-like method in parallel circular iteration for simultaneously finding all multiple zeros of a polynomial, II. 677-685 - N. M. Apaolaz, Jesus R. Artalejo:
On the time to reach a certain orbit level in multi-server retrial queues. 686-703 - R. K. Mohanty, Navnit Jha:
A class of variable mesh spline in compression methods for singularly perturbed two point singular boundary value problems. 704-716 - Shin-Jia Hwang, Hao-Chih Liao:
Security of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems. 717-721 - Yanjun Wang, Zhian Liang:
A deterministic global optimization algorithm for generalized geometric programming. 722-737
Volume 168, Number 2, September 2005
- Peiping Shen, Yanjun Wang:
A new pruning test for finding all global minimizers of nonsmooth functions. 739-755 - Mehdi Dehghan, Majid Jaberi Douraki, Marjan Jaberi Douraki:
Dynamics of a rational difference equation using both theoretical and computational approaches. 756-775 - Qi Xie:
Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers. 776-782 - Jonas Rimas:
On computing of arbitrary positive integer powers for one type of symmetric tridiagonal matrices of even order. 783-787 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme. 788-794 - Kamal R. Raslan:
Collocation method using quartic B-spline for the equal width (EW) equation. 795-805 - J. Rashidinia, Mohammad Zarebnia:
Numerical solution of linear integral equations by using Sinc-collocation method. 806-822 - Deng Shan Wang, Yi Fang Liu, Hong-Qing Zhang:
Symbolic computation and families of Jacobi elliptic function solutions of the (2 + 1)-dimensional Nizhnik-Novikov-Veselov equation. 823-847 - P. Ossipov:
Simple heuristic algorithm for profile reduction of arbitrary sparse matrix. 848-857 - Jeong Ok Kwon, Jung Yeon Hwang, Changwook Kim, Dong Hoon Lee:
Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme. 858-865 - Tofigh Allahviranloo:
Romberg integration for fuzzy functions. 866-876 - Sohrab Effati, A. R. Nazemi:
A new method for solving a system of the nonlinear equations. 877-894 - Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Forward-secure multisignature and blind signature schemes. 895-908 - Ji-Huan He, Jie Tang:
Rebuild of King Fang 40 BC musical scales by He's inequality. 909-914 - Dogan Kaya, Ibrahim E. Inan:
A numerical application of the decomposition method for the combined KdV-MKdV equation. 915-926 - Da-Zhi Sun, Zhen-Fu Cao:
Improved public key authentication scheme for non-repudiation. 927-932 - Henry Ker-Chang Chang, Erl-Huei Lu, Pin-Chang Su:
Design of traceable security system. 933-944 - Alberto d'Onofrio:
Periodically varying antiviral therapies: conditions for global stability of the virus free state. 945-953 - Rongxing Lu, Zhenfu Cao:
A new deniable authentication protocol from bilinear pairings. 954-961 - Luming Zhang:
A finite difference scheme for generalized regularized long-wave equation. 962-972 - S. J. Yang, Bao Shi, D. C. Zhang, M. J. Gai:
Counterexamples to the article "Oscillation and global attractivity in hematopoiesis model with delay time". 973-980 - You-Hui Su, Wan-Tong Li:
Global asymptotic stability of a second-order nonlinear difference equation. 981-989 - Qi Duan, Liqiu Wang, Edward H. Twizell:
A new weighted rational cubic interpolation and its approximation. 990-1003 - Abdellatif Agouzal, Karam Allali, Khalid Najib:
Non-conforming finite element discretisations of a class of non-Newtonian flows. 1004-1019 - Fuyong Lin:
A new multi-resolution theory based on orthogonal spline. 1020-1030 - Liping Wen, Shoufu Li:
Nonlinear stability of linear multistep methods for stiff delay differential equations in Banach spaces. 1031-1044 - Woei-Jiunn Tsaur, Chih-Ho Chou:
Efficient algorithms for speeding up the computations of elliptic curve cryptosystems. 1045-1064 - Zhenya Yan:
Numerical doubly periodic solution of the KdV equation with the initial condition via the decomposition method. 1065-1078 - Ming-Heng Zhang, QianSheng Cheng:
An approach to VaR for capital markets with Gaussian mixture. 1079-1085 - Y. G. Sun, S. H. Saker:
Existence of positive periodic solutions of nonlinear discrete model exhibiting the Allee effect. 1086-1097 - A. Sjöberg, Fazal Mahmood Mahomed:
The association of non-local symmetries with conservation laws: applications to the heat and Burger's equations. 1098-1108 - Carmelo Clavero, Jose L. Gracia:
High order methods for elliptic and time dependent reaction-diffusion singularly perturbed problems. 1109-1127 - Jingjun Zhao, Yang Xu, S. Y. Dong, M. Z. Liu:
Stability of the Rosenbrock methods for the neutral delay differential-algebraic equations. 1128-1144 - Aytac Arikoglu, Ibrahim Özkol:
Solution of boundary value problems for integro-differential equations by using differential transform method. 1145-1158 - S. Kutluay:
Numerical schemes for one-dimensional Stefan-like problems with a forcing term. 1159-1168 - Tzong-Mou Wu:
A study of convergence on the Newton-homotopy continuation method. 1169-1174 - Tzong-Mou Wu, Cha'o-Kuang Chen:
Computer-aided curvature analyses of planar four-bar linkage mechanism. 1175-1188 - Yong Chen, Qi Wang:
A new general algebraic method with symbolic computation to construct new travelling wave solution for the (1 + 1)-dimensional dispersive long wave equation. 1189-1204 - Y. G. Sun, S. H. Saker:
Oscillatory and asymptotic behavior of positive periodic solutions of nonlinear discrete model exhibiting the allee effect. 1205-1218 - Ruyun Ma:
Existence of positive solutions of a fourth-order boundary value problem. 1219-1231 - Jafar Biazar:
Solution of systems of integral-differential equations by Adomian decomposition method. 1232-1238 - Zhenya Yan:
Controlling hyperchaos in the new hyperchaotic Chen system. 1239-1250 - Mamdouh M. El-Kady, A. Abd El-Shafy:
Error estimation problem of nonlinear integral equations in the space Lp(p >= 1). 1251-1257 - Hamed Hashemi Mehne, Mohammad Hadi Farahi, Javad Abolfazli Esfahani:
Slot nozzle design with specified pressure in a given subregion by using embedding method. 1258-1272 - Shaher Momani:
A numerical scheme for the solution of Sivashinsky equation. 1273-1280 - Robert K. McCormack, Linda J. S. Allen:
Disease emergence in deterministic and stochastic models for host and pathogen. 1281-1305 - Basem S. Attili:
The Adomian decomposition method for computing eigenelements of Sturm-Liouville two point boundary value problems. 1306-1316 - Amir Azaron, Cahit Perkgoz, Masatoshi Sakawa:
A genetic algorithm approach for the time-cost trade-off in PERT networks. 1317-1339 - Vejdi I. Hasanov, Ivan Ganchev Ivanov:
On the matrix equation X - A*X-nA = I. 1340-1356 - Ling Wang, Ling-Lai Li, Fang Tang:
Optimal reduction of models using a hybrid searching strategy. 1357-1369 - Sohrab Effati, Mojtaba Baymani:
A new nonlinear neural network for solving convex nonlinear programming problems. 1370-1379 - Metin Demiralp:
Critical value calculations for the screening parameter of Hulthen potential. 1380-1399 - Abdollah Shidfar, R. Pourgholi:
Application of finite difference method to analysis an ill-posed problem. 1400-1408 - Yuelin Gao, Honggang Xue, Peiping Shen:
A new rectangle branch-and-reduce approach for solving nonconvex quadratic programming problems. 1409-1418 - Pedro M. Reyes:
Logistics networks: A game theory application for solving the transshipment problem. 1419-1431 - Predrag M. Rajkovic, Sladjana D. Marinkovic, Miomir S. Stankovic:
On q-Newton-Kantorovich method for solving systems of equations. 1432-1448 - Hakan F. Öztop:
Numerical study of flow and heat transfer in curvilinear ducts: applications of elliptic grid generation. 1449-1460 - Emin Kasap, Ismail Aydemir, Nuri Kuruoglu:
Erratum to: "Ruled surfaces with timelike rulings" [Appl. Math. Comput. 147 (2004) 241-248]. 1461-1468 - K. Yamaç:
Erratum to "An algorithm for stability of discrete-time interval matrices". 1469
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.