default search action
Applied Mathematics and Computation, Volume 169
Volume 169, Number 1, October 2005
- Eun-Jun Yoon, Kee-Young Yoo:
On the security of Wu-Lin's robust key authentication scheme. 1-7 - Naimin Zhang, Yimin Wei:
A note on solving EP inconsistent linear systems. 8-15 - Tofigh Allahviranloo, T. Hajari:
Numerical methods for approximation of fuzzy data. 16-33 - B. Asady, Saeid Abbasbandy, M. Alavi:
Fuzzy general linear systems. 34-40 - Zhengtao Jiang, Xi Sun, Yumin Wang:
Security analysis and improvement of a double-trapdoor encryption scheme. 41-50 - Zhengtao Jiang, Mingsen Xiang, Yumin Wang:
A research on new public-key encryption schemes. 51-61 - Kyungah Shim, Young-Ran Lee:
Security flaws in authentication and key establishment protocols for mobile communications. 62-74 - Chu-Hsing Lin, Ruei-Hau Hsu, Lein Harn:
Improved DSA variant for batch verification. 75-81 - Naiyang Ma, R. P. King:
Fitting distribution-like data to exponential sums with genetic algorithms. 82-95 - Hiroyuki Kano, Hiroaki Nakata, Clyde F. Martin:
Optimal curve fitting and smoothing using normalized uniform B-splines: a tool for studying complex systems. 96-128 - Wenxing Zhu:
A class of filled functions for box constrained continuous global optimization. 129-145 - Turabi Geyikli, Dogan Kaya:
Comparison of the solutions obtained by B-spline FEM and ADM of KdV equation. 146-156 - Zhizhang Shen:
The impact of the apex node on routing inside a pyramid structure. 157-178 - Ling Zhu:
On the convergent condition of Durand-Kerner method in parallel circular iteration of multi-step. 179-191 - Je Hong Park, Bo Gyeong Kang, Jae Woo Han:
Cryptanalysis of Zhou et al.'s proxy-protected signature schemes. 192-197 - Wann-Yih Wu, Shuo-Pei Chen:
A prediction method using the grey model GMC(1, n) combined with the grey relational analysis: a case study on Internet access population forecast. 198-217 - Abdelouahed Hamdi:
Decomposition for structured convex programs with smooth multiplier methods. 218-241 - J. R. Sharma:
A composite third order Newton-Steffensen method for solving nonlinear equations. 242-246 - Dimitris G. Sotiropoulos, T. N. Grapsa:
Optimal centers in branch-and-prune algorithms for univariate global optimization. 247-277 - Qimin Zhang, Chongzhao Han:
Numerical analysis for stochastic age-dependent population equations. 278-294 - Eun-Jun Yoon, Kee-Young Yoo:
Weakness and solution of Yang et al.'s protected password changing scheme. 295-304 - Bing Liu, Lansun Chen, Yujuan Zhang:
The dynamics of a prey-dependent consumption model concerning impulsive control strategy. 305-320 - Abdul-Majid Wazwaz:
The tanh method for generalized forms of nonlinear heat conduction and Burgers-Fisher equations. 321-338 - Gülten Torun, Ibrahim Ethem Anar:
The electromagnetic scattering problem: the case of TE polarized waves. 339-354 - Qiang Sun:
Solving the Klein-Gordon equation by means of the homotopy analysis method. 355-365 - Y. C. Chen, L. Y. Tsai:
Blow-up solutions of nonlinear differential equations. 366-387 - Xinzhen Zhang, Fengming Ma, Yiju Wang:
A Newton-type algorithm for generalized linear complementarity problem over a polyhedral cone. 388-401 - Yonggui Zhu, Qianshun Chang, Shengchang Wu:
A new algorithm for calculating Adomian polynomials. 402-416 - Miodrag S. Petkovic, Dusan M. Milosevic:
Improved Halley-like methods for the inclusion of polynomial zeros. 417-436 - Xiangxue Li, Kefei Chen:
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. 437-450 - Alaeddin Malek, Hasan Ghasabi-Oskoei:
Numerical solutions for constrained quadratic problems using high-performance neural networks. 451-471 - Je Hong Park, Seongtaek Chee:
A note on digital signature scheme using a self-pairing map. 472-475 - Caixia Gao, Enmin Feng, Zongtao Wang, Zhilong Xiu:
Parameters identification problem of the nonlinear dynamical system in microbial continuous cultures. 476-484 - Miltiades Elliotis, Georgios C. Georgiou, Christos Xenophontos:
Solving Laplacian problems with boundary singularities: a comparison of a singular function boundary integral method with the p/hp version of the finite element method. 485-499 - Emad M. Abo-Eldahab, Ahmed F. Ghonaim:
Radiation effect on heat transfer of a micropolar fluid through a porous medium. 500-510 - Kyungah Shim:
Off-line password-guessing attacks on the generalized key agreement and password authentication protocol. 511-515 - Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen:
Cryptanalysis of large RSA exponent by using the LLL algorithm. 516-525 - E. F. Elshehawey, Abd El-Rahman El-Saman, Mostafa El-Shahed, Mohamed Dagher:
Peristaltic transport of a compressible viscous liquid through a tapered pore. 526-543 - Du Qikui, Tang Minxia:
Exact and approximate artificial boundary conditions for the hyperbolic problems in unbounded domains. 544-562 - G. M. Abd El-Latif:
An approximate solution treatment for non-linear problems. 563-575 - G. M. Abd El-Latif:
A homotopy technique and a perturbation technique for non-linear problems. 576-588 - Jianqin Mei, Hong-Qing Zhang:
New soliton-like and periodic-like solutions for the KdV equation. 589-599 - Levent Kula, Yusuf Yayli:
On slant helix and its spherical indicatrix. 600-607 - Wei-Guo Zhang, Zan Kan Nie:
On admissible efficient portfolio selection policy. 608-623 - Kokou Y. Abalo, Michael M. Kostreva:
Berge equilibrium: some recent results from fixed-point theorems. 624-638 - Abdul-Majid Wazwaz:
Travelling wave solutions of generalized forms of Burgers, Burgers-KdV and Burgers-Huxley equations. 639-656 - Gong-Nong Li:
Analysis for a homotopy path of complementarity problems based on mu-exceptional family. 657-670 - S. K. Tomar, Jaswant Singh:
Transmission of longitudinal waves through a plane interface between two dissimilar porous elastic solid half-spaces. 671-688 - Zhongdi Cen:
A hybrid difference scheme for a singularly perturbed convection-diffusion problem with discontinuous convection coefficient. 689-699 - Abdul-Majid Wazwaz:
Exact solutions of compact and noncompact structures for the KP-BBM equation. 700-712 - Abdul-Majid Wazwaz:
Compact and noncompact physical structures for the ZK-BBM equation. 713-725 - K. Vajravelu, S. Sreenadh, V. Ramesh Babu:
Peristaltic pumping of a Herschel-Bulkley fluid in a channel. 726-735
Volume 169, Number 2, October 2005
- Abdel Razzaq Mugdadi:
The least squares type estimation of the parameters in the power hazard function. 737-748 - Awartani Awartani, M. H. Hamdan:
Fully developed flow through a porous channel bounded by flat plates. 749-757 - Awartani Awartani, R. A. Ford, M. H. Hamdan:
Computational complexities and streamfunction coordinates. 758-777 - Ming-Han Lin, Chin-Tai Chen:
Study on the formation of Goertler vortices in natural convection flow over a rotating concave surface. 778-796 - Shui-Ching Chang, Tze Fen Li:
Estimation of component mean lifetimes of a masked system using unclassified system life data. 797-805 - Emad M. Abo-Eldahab, Ahmed M. Salem:
MHD free-convection flow of a non-Newtonian power-law fluid at a stretching surface with a uniform free-stream. 806-818 - Majid Jaberi Douraki, Mehdi Dehghan, A. Razavi:
On the global behavior of higher order recursive sequences. 819-831 - Sunil, Divya, R. C. Sharma:
Effect of dust particles on a ferromagnetic fluid heated and soluted from below saturating a porous medium. 832-853 - Shuicai Li, Shijun Liao:
An analytic approach to solve multiple solutions of a strongly nonlinear problem. 854-865 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, Ghasem Tohidi, Shabnam Razavyan:
The identification of nondominated and efficient paths on a network. 866-873 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, Ghasem Tohidi:
A method for generating all efficient solutions of 0-1 multi-objective linear programming problem. 874-886 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, Ghasem Tohidi, Shabnam Razavyan:
A one-model approach to classification and sensitivity analysis in DEA. 887-896 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, Masoud Sanei, Ghasem Tohidi:
Sensitivity and stability analysis in DEA. 897-904 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, Ghasem Tohidi, Shabnam Razavyan:
Sensitivity of efficiency classifications in the inverse DEA models. 905-916 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N. Shoja, Ghasem Tohidi, Shabnam Razavyan:
Undesirable inputs and outputs in DEA models. 917-925 - Miguel Ángel Hernández-Verón, M. Jóse Rubio, J. A. Ezquerro:
Solving a special case of conservative problems by Secant-like methods. 926-942 - Y. Ben Nakhi, Shyam L. Kalla:
On a generalized mixture distribution. 943-952 - Chengri Jin, Mingzhu Liu:
A new modification of Adomian decomposition method for solving a kind of evolution equation. 953-962 - Tzong-Mou Wu:
One-to-one mapping matrix. 963-970 - Turabi Geyikli, Dogan Kaya:
An application for a modified KdV equation by the decomposition method and finite element method. 971-981 - Yen-Cheng Chen, Lo-Yao Yeh:
An efficient nonce-based authentication scheme with key agreement. 982-994 - Weiming Wang:
An algorithm for solving nonlinear singular perturbation problems with mechanization. 995-1009 - Je Hong Park, Bo Gyeong Kang:
Security of Lu et al.'s proxy-protected signature scheme. 1010-1015 - Jonas Rimas:
On computing of arbitrary positive integer powers for one type of odd order symmetric circulant matrices - II. 1016-1027 - Zhenqing Li, Weiming Wang:
Mechanization for solving SPP by reducing order method. 1028-1037 - Caidi Zhao:
Algorithm and mechanization to Cauchy problem of parabolic equation. 1038-1044 - Dogan Kaya:
Parallel algorithms for reduction of a symmetric matrix to tridiagonal form on a shared memory multiprocessor. 1045-1062 - Jianhong Zhang, Yumin Wang:
On the security of a convertible authenticated encryption. 1063-1069 - Tzungher Chen, Wei-Bin Lee, Gwoboa Horng:
Remarks on some signature schemes based on factoring and discrete logarithms. 1070-1075 - Xing-Yang Guo, Chao-Jing Tang:
Identity based designated multi-confirmer signature: a new type signature. 1076-1085 - Noël Bonneuil, Patrick Saint-Pierre:
Population viability in three trophic-level food chains. 1086-1105 - Sophia R.-J. Jang, James Baglama:
Droop models of nutrient-plankton interaction with intratrophic predation. 1106-1128 - Shiyou Weng, Haiyin Gao, Renzhao Chen, Xuezhang Hou:
Penalty shifting method on calculation of optimal linewise control of dam-detouring osimotic system for concrete dams with heterogemous. 1129-1141 - Kourosh Heidari Shirazi:
Five points of accuracy synthesis of motion generator linkages using Maple-V. 1142-1171 - Judong Shen, Shing I. Chang, E. Stanley Lee, Youping Deng, Susan J. Brown:
Determination of cluster number in clustering microarray data. 1172-1185 - Shijun Liao:
Comparison between the homotopy analysis method and homotopy perturbation method. 1186-1194 - Chorng-Shyong Ong, Jih-Jeng Huang, Gwo-Hshiung Tzeng:
A novel hybrid model for portfolio selection. 1195-1210 - Jianhong Zhang, Yumin Wang:
Two provably secure k-out-of-n oblivious transfer schemes. 1211-1220 - Yimin Wei, Yanhua Cao, Hua Xiang:
A note on the componentwise perturbation bounds of matrix inverse and linear systems. 1221-1236 - Rongxing Lu, Zhenfu Cao:
Designated verifier proxy signature scheme with message recovery. 1237-1246 - M. Zubaer Hossain, S. Reaz Ahmed, M. Wahhaj Uddin:
Generalized mathematical model for the solution of mixed-boundary-value elastic problems. 1247-1275 - Min-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang:
A time-stamping protocol for digital watermarking. 1276-1284 - Jiqiang Lv, Xinmei Wang, Kwangjo Kim:
Practical convertible authenticated encryption schemes using self-certified public keys. 1285-1297 - M. A. Ahmed:
A characterization of the convergence of Picard iteration to a fixed point for a continuous mapping and an application. 1298-1304 - Bing Zheng, Ke Wang:
Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem. 1305-1323 - Henry Ker-Chang Chang, Erl-Huei Lu, Pin-Chang Su:
Fail-stop blind signature scheme design based on pairings. 1324-1331 - Zhong-Yun Liu, Han-Dong Cao, Hui-Jiong Chen:
A note on computing matrix-vector products with generalized centrosymmetric (centrohermitian) matrices. 1332-1345 - Wei Sun, Yao-Lin Jiang:
Runge-Kutta methods of dynamic iteration for index-2 differential-algebraic equations. 1346-1363 - Gui-qiong Xu, Zhi-bin Li:
PDEPtest: a package for the Painlevé test of nonlinear partial differential equations. 1364-1379 - Haiyong Bao, Zhenfu Cao, Rongxing Lu:
Proxy signature scheme using self-certified public keys. 1380-1389 - Jonas Rimas:
On computing of arbitrary positive integer powers for one type of odd order tridiagonal matrices with zero row - I. 1390-1394 - Weiming Wang, Zhenqing Li:
The distribution models of grazing animals between two grassland resource points. 1395-1404 - Okey Oseloka Onyejekwe:
A simplified Green element method solution for a the biharmonic equation and its application to Stokes flows. 1405-1418 - Haiyong Bao, Zhenfu Cao, Shengbao Wang:
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. 1419-1430 - Chou Chen Yang, Yuan-Liang Tang, Ren-Chiun Wang, Hung-Wen Yang:
A secure and efficient authentication protocol for anonymous channel in wireless communications. 1431-1439 - Reza Farzipoor Saen:
Developing a nondiscretionary model of slacks-based measure in data envelopment analysis. 1440-1447 - Xing-Yang Guo, Chao-Jing Tang:
Identity based group-oriented undeniable signature scheme. 1448-1457 - Tian-Shyr Dai, Guan-Shieng Huang, Yuh-Dauh Lyuu:
An efficient convergent lattice algorithm for European Asian options. 1458-1471
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.