


default search action
Applied Mathematics and Computation, Volume 169
Volume 169, Number 1, October 2005
- Eun-Jun Yoon, Kee-Young Yoo:

On the security of Wu-Lin's robust key authentication scheme. 1-7 - Naimin Zhang, Yimin Wei

:
A note on solving EP inconsistent linear systems. 8-15 - Tofigh Allahviranloo

, T. Hajari:
Numerical methods for approximation of fuzzy data. 16-33 - B. Asady, Saeid Abbasbandy, M. Alavi:

Fuzzy general linear systems. 34-40 - Zhengtao Jiang, Xi Sun, Yumin Wang:

Security analysis and improvement of a double-trapdoor encryption scheme. 41-50 - Zhengtao Jiang, Mingsen Xiang, Yumin Wang:

A research on new public-key encryption schemes. 51-61 - Kyungah Shim, Young-Ran Lee:

Security flaws in authentication and key establishment protocols for mobile communications. 62-74 - Chu-Hsing Lin, Ruei-Hau Hsu, Lein Harn:

Improved DSA variant for batch verification. 75-81 - Naiyang Ma

, R. P. King:
Fitting distribution-like data to exponential sums with genetic algorithms. 82-95 - Hiroyuki Kano, Hiroaki Nakata, Clyde F. Martin:

Optimal curve fitting and smoothing using normalized uniform B-splines: a tool for studying complex systems. 96-128 - Wenxing Zhu:

A class of filled functions for box constrained continuous global optimization. 129-145 - Turabi Geyikli, Dogan Kaya:

Comparison of the solutions obtained by B-spline FEM and ADM of KdV equation. 146-156 - Zhizhang Shen

:
The impact of the apex node on routing inside a pyramid structure. 157-178 - Ling Zhu

:
On the convergent condition of Durand-Kerner method in parallel circular iteration of multi-step. 179-191 - Je Hong Park, Bo Gyeong Kang, Jae Woo Han:

Cryptanalysis of Zhou et al.'s proxy-protected signature schemes. 192-197 - Wann-Yih Wu, Shuo-Pei Chen:

A prediction method using the grey model GMC(1, n) combined with the grey relational analysis: a case study on Internet access population forecast. 198-217 - Abdelouahed Hamdi

:
Decomposition for structured convex programs with smooth multiplier methods. 218-241 - J. R. Sharma:

A composite third order Newton-Steffensen method for solving nonlinear equations. 242-246 - Dimitris G. Sotiropoulos

, T. N. Grapsa:
Optimal centers in branch-and-prune algorithms for univariate global optimization. 247-277 - Qimin Zhang, Chongzhao Han:

Numerical analysis for stochastic age-dependent population equations. 278-294 - Eun-Jun Yoon, Kee-Young Yoo:

Weakness and solution of Yang et al.'s protected password changing scheme. 295-304 - Bing Liu, Lansun Chen, Yujuan Zhang:

The dynamics of a prey-dependent consumption model concerning impulsive control strategy. 305-320 - Abdul-Majid Wazwaz:

The tanh method for generalized forms of nonlinear heat conduction and Burgers-Fisher equations. 321-338 - Gülten Torun

, Ibrahim Ethem Anar:
The electromagnetic scattering problem: the case of TE polarized waves. 339-354 - Qiang Sun

:
Solving the Klein-Gordon equation by means of the homotopy analysis method. 355-365 - Y. C. Chen, L. Y. Tsai:

Blow-up solutions of nonlinear differential equations. 366-387 - Xinzhen Zhang, Fengming Ma, Yiju Wang:

A Newton-type algorithm for generalized linear complementarity problem over a polyhedral cone. 388-401 - Yonggui Zhu, Qianshun Chang, Shengchang Wu:

A new algorithm for calculating Adomian polynomials. 402-416 - Miodrag S. Petkovic, Dusan M. Milosevic

:
Improved Halley-like methods for the inclusion of polynomial zeros. 417-436 - Xiangxue Li, Kefei Chen:

ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. 437-450 - Alaeddin Malek, Hasan Ghasabi-Oskoei:

Numerical solutions for constrained quadratic problems using high-performance neural networks. 451-471 - Je Hong Park, Seongtaek Chee:

A note on digital signature scheme using a self-pairing map. 472-475 - Caixia Gao, Enmin Feng, Zongtao Wang, Zhilong Xiu:

Parameters identification problem of the nonlinear dynamical system in microbial continuous cultures. 476-484 - Miltiades Elliotis

, Georgios C. Georgiou, Christos Xenophontos
:
Solving Laplacian problems with boundary singularities: a comparison of a singular function boundary integral method with the p/hp version of the finite element method. 485-499 - Emad M. Abo-Eldahab, Ahmed F. Ghonaim:

Radiation effect on heat transfer of a micropolar fluid through a porous medium. 500-510 - Kyungah Shim:

Off-line password-guessing attacks on the generalized key agreement and password authentication protocol. 511-515 - Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen

:
Cryptanalysis of large RSA exponent by using the LLL algorithm. 516-525 - E. F. Elshehawey, Abd El-Rahman El-Saman, Mostafa El-Shahed

, Mohamed Dagher:
Peristaltic transport of a compressible viscous liquid through a tapered pore. 526-543 - Du Qikui, Tang Minxia:

Exact and approximate artificial boundary conditions for the hyperbolic problems in unbounded domains. 544-562 - G. M. Abd El-Latif:

An approximate solution treatment for non-linear problems. 563-575 - G. M. Abd El-Latif:

A homotopy technique and a perturbation technique for non-linear problems. 576-588 - Jianqin Mei, Hong-Qing Zhang:

New soliton-like and periodic-like solutions for the KdV equation. 589-599 - Levent Kula

, Yusuf Yayli:
On slant helix and its spherical indicatrix. 600-607 - Wei-Guo Zhang, Zan Kan Nie:

On admissible efficient portfolio selection policy. 608-623 - Kokou Y. Abalo, Michael M. Kostreva:

Berge equilibrium: some recent results from fixed-point theorems. 624-638 - Abdul-Majid Wazwaz:

Travelling wave solutions of generalized forms of Burgers, Burgers-KdV and Burgers-Huxley equations. 639-656 - Gong-Nong Li:

Analysis for a homotopy path of complementarity problems based on mu-exceptional family. 657-670 - S. K. Tomar, Jaswant Singh:

Transmission of longitudinal waves through a plane interface between two dissimilar porous elastic solid half-spaces. 671-688 - Zhongdi Cen:

A hybrid difference scheme for a singularly perturbed convection-diffusion problem with discontinuous convection coefficient. 689-699 - Abdul-Majid Wazwaz:

Exact solutions of compact and noncompact structures for the KP-BBM equation. 700-712 - Abdul-Majid Wazwaz:

Compact and noncompact physical structures for the ZK-BBM equation. 713-725 - K. Vajravelu, S. Sreenadh, V. Ramesh Babu:

Peristaltic pumping of a Herschel-Bulkley fluid in a channel. 726-735
Volume 169, Number 2, October 2005
- Abdel Razzaq Mugdadi:

The least squares type estimation of the parameters in the power hazard function. 737-748 - Awartani Awartani, M. H. Hamdan:

Fully developed flow through a porous channel bounded by flat plates. 749-757 - Awartani Awartani, R. A. Ford, M. H. Hamdan:

Computational complexities and streamfunction coordinates. 758-777 - Ming-Han Lin, Chin-Tai Chen:

Study on the formation of Goertler vortices in natural convection flow over a rotating concave surface. 778-796 - Shui-Ching Chang, Tze Fen Li:

Estimation of component mean lifetimes of a masked system using unclassified system life data. 797-805 - Emad M. Abo-Eldahab, Ahmed M. Salem:

MHD free-convection flow of a non-Newtonian power-law fluid at a stretching surface with a uniform free-stream. 806-818 - Majid Jaberi Douraki, Mehdi Dehghan

, A. Razavi:
On the global behavior of higher order recursive sequences. 819-831 - Sunil

, Divya, R. C. Sharma:
Effect of dust particles on a ferromagnetic fluid heated and soluted from below saturating a porous medium. 832-853 - Shuicai Li, Shijun Liao

:
An analytic approach to solve multiple solutions of a strongly nonlinear problem. 854-865 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi

, N. Shoja, Ghasem Tohidi
, Shabnam Razavyan:
The identification of nondominated and efficient paths on a network. 866-873 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi

, N. Shoja, Ghasem Tohidi
:
A method for generating all efficient solutions of 0-1 multi-objective linear programming problem. 874-886 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi

, N. Shoja, Ghasem Tohidi
, Shabnam Razavyan:
A one-model approach to classification and sensitivity analysis in DEA. 887-896 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi

, N. Shoja, Masoud Sanei, Ghasem Tohidi
:
Sensitivity and stability analysis in DEA. 897-904 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi

, N. Shoja, Ghasem Tohidi
, Shabnam Razavyan:
Sensitivity of efficiency classifications in the inverse DEA models. 905-916 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi

, N. Shoja, Ghasem Tohidi
, Shabnam Razavyan:
Undesirable inputs and outputs in DEA models. 917-925 - Miguel Ángel Hernández-Verón

, M. Jóse Rubio
, J. A. Ezquerro
:
Solving a special case of conservative problems by Secant-like methods. 926-942 - Y. Ben Nakhi, Shyam L. Kalla:

On a generalized mixture distribution. 943-952 - Chengri Jin, Mingzhu Liu:

A new modification of Adomian decomposition method for solving a kind of evolution equation. 953-962 - Tzong-Mou Wu:

One-to-one mapping matrix. 963-970 - Turabi Geyikli, Dogan Kaya:

An application for a modified KdV equation by the decomposition method and finite element method. 971-981 - Yen-Cheng Chen, Lo-Yao Yeh:

An efficient nonce-based authentication scheme with key agreement. 982-994 - Weiming Wang:

An algorithm for solving nonlinear singular perturbation problems with mechanization. 995-1009 - Je Hong Park, Bo Gyeong Kang:

Security of Lu et al.'s proxy-protected signature scheme. 1010-1015 - Jonas Rimas:

On computing of arbitrary positive integer powers for one type of odd order symmetric circulant matrices - II. 1016-1027 - Zhenqing Li, Weiming Wang:

Mechanization for solving SPP by reducing order method. 1028-1037 - Caidi Zhao:

Algorithm and mechanization to Cauchy problem of parabolic equation. 1038-1044 - Dogan Kaya:

Parallel algorithms for reduction of a symmetric matrix to tridiagonal form on a shared memory multiprocessor. 1045-1062 - Jianhong Zhang, Yumin Wang:

On the security of a convertible authenticated encryption. 1063-1069 - Tzungher Chen

, Wei-Bin Lee, Gwoboa Horng
:
Remarks on some signature schemes based on factoring and discrete logarithms. 1070-1075 - Xing-Yang Guo, Chao-Jing Tang:

Identity based designated multi-confirmer signature: a new type signature. 1076-1085 - Noël Bonneuil, Patrick Saint-Pierre:

Population viability in three trophic-level food chains. 1086-1105 - Sophia R.-J. Jang, James Baglama

:
Droop models of nutrient-plankton interaction with intratrophic predation. 1106-1128 - Shiyou Weng, Haiyin Gao, Renzhao Chen, Xuezhang Hou:

Penalty shifting method on calculation of optimal linewise control of dam-detouring osimotic system for concrete dams with heterogemous. 1129-1141 - Kourosh Heidari Shirazi

:
Five points of accuracy synthesis of motion generator linkages using Maple-V. 1142-1171 - Judong Shen, Shing I. Chang

, E. Stanley Lee, Youping Deng, Susan J. Brown
:
Determination of cluster number in clustering microarray data. 1172-1185 - Shijun Liao

:
Comparison between the homotopy analysis method and homotopy perturbation method. 1186-1194 - Chorng-Shyong Ong, Jih-Jeng Huang

, Gwo-Hshiung Tzeng
:
A novel hybrid model for portfolio selection. 1195-1210 - Jianhong Zhang, Yumin Wang:

Two provably secure k-out-of-n oblivious transfer schemes. 1211-1220 - Yimin Wei

, Yanhua Cao, Hua Xiang:
A note on the componentwise perturbation bounds of matrix inverse and linear systems. 1221-1236 - Rongxing Lu, Zhenfu Cao

:
Designated verifier proxy signature scheme with message recovery. 1237-1246 - M. Zubaer Hossain, S. Reaz Ahmed, M. Wahhaj Uddin:

Generalized mathematical model for the solution of mixed-boundary-value elastic problems. 1247-1275 - Min-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang:

A time-stamping protocol for digital watermarking. 1276-1284 - Jiqiang Lv, Xinmei Wang, Kwangjo Kim:

Practical convertible authenticated encryption schemes using self-certified public keys. 1285-1297 - M. A. Ahmed:

A characterization of the convergence of Picard iteration to a fixed point for a continuous mapping and an application. 1298-1304 - Bing Zheng, Ke Wang:

Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem. 1305-1323 - Henry Ker-Chang Chang, Erl-Huei Lu, Pin-Chang Su:

Fail-stop blind signature scheme design based on pairings. 1324-1331 - Zhong-Yun Liu, Han-Dong Cao, Hui-Jiong Chen:

A note on computing matrix-vector products with generalized centrosymmetric (centrohermitian) matrices. 1332-1345 - Wei Sun, Yao-Lin Jiang:

Runge-Kutta methods of dynamic iteration for index-2 differential-algebraic equations. 1346-1363 - Gui-qiong Xu

, Zhi-bin Li:
PDEPtest: a package for the Painlevé test of nonlinear partial differential equations. 1364-1379 - Haiyong Bao, Zhenfu Cao

, Rongxing Lu:
Proxy signature scheme using self-certified public keys. 1380-1389 - Jonas Rimas:

On computing of arbitrary positive integer powers for one type of odd order tridiagonal matrices with zero row - I. 1390-1394 - Weiming Wang, Zhenqing Li:

The distribution models of grazing animals between two grassland resource points. 1395-1404 - Okey Oseloka Onyejekwe

:
A simplified Green element method solution for a the biharmonic equation and its application to Stokes flows. 1405-1418 - Haiyong Bao, Zhenfu Cao

, Shengbao Wang:
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. 1419-1430 - Chou Chen Yang, Yuan-Liang Tang, Ren-Chiun Wang, Hung-Wen Yang:

A secure and efficient authentication protocol for anonymous channel in wireless communications. 1431-1439 - Reza Farzipoor Saen

:
Developing a nondiscretionary model of slacks-based measure in data envelopment analysis. 1440-1447 - Xing-Yang Guo, Chao-Jing Tang:

Identity based group-oriented undeniable signature scheme. 1448-1457 - Tian-Shyr Dai, Guan-Shieng Huang, Yuh-Dauh Lyuu

:
An efficient convergent lattice algorithm for European Asian options. 1458-1471

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














