


default search action
Applied Mathematics and Computation, Volume 170
Volume 170, Number 1, November 2005
- Zhen-Jun Shi, Jie Shen:

A new super-memory gradient method with curve search rule. 1-16 - Hanquan Wang:

Numerical studies on the split-step finite difference method for nonlinear Schrödinger equations. 17-35 - Hossein Arsham, G. Cimperman, Nadja Damij, Talib Damij, Janez Grad:

A computer implementation of the Push-and-Pull algorithm and its computational comparison with LP simplex method. 36-63 - Saleh M. Al-Harbi:

Numerical study of natural convection heat transfer with variable viscosity and thermal radiation from a cone and wedge in porous media. 64-75 - Mustafa Inç:

On numerical solutions of one-dimensional nonlinear Burgers' equation and convergence of the decomposition method. 76-85 - Luis Lara:

A numerical method for solving a system of nonautonomous linear ordinary differential equations. 86-94 - Saeid Abbasbandy, Mohammad Taghi Darvishi

:
A numerical solution of Burgers' equation by time discretization of Adomian's decomposition method. 95-102 - Zhenfeng Zhang, Dengguo Feng:

Cryptanalysis of some signature schemes with message recovery. 103-114 - M. M. Hosseini:

Pseudospectral method for numerical solution of DAEs with an error estimation. 115-124 - Alberto d'Onofrio

:
Biomathematical analysis and extension of the new class of epidemic models proposed by Satsuma et al. (2004). 125-134 - Chien-Lung Hsu:

A user friendly remote authentication scheme with smart cards against impersonation attacks. 135-143 - Fatma Tiryaki, Mehmet Ahlatçioglu

:
Fuzzy stock selection using a new fuzzy ranking and weighting algorithm. 144-157 - Rafael Cortell:

Numerical analysis of dynamic problems: an alternative integration. 158-171 - Nasser M. El-Maghraby, Hamdy M. Youssef

:
A two-dimensional thermoelasticity problem for thermomechanical shock with two relaxation times. 172-184 - Reza Tavakkoli-Moghaddam

, Fariborz Jolai
, F. Vaziri, P. K. Ahmed, Amir Azaron:
A hybrid method for solving stochastic job shop scheduling problems. 185-206 - Kee-Won Kim

, Jun-Cheol Jeon, Kee-Young Yoo:
An improvement on Yang et al.'s password authentication schemes. 207-215 - Omar M. Saad:

An iterative goal programming approach for solving fuzzy multiobjective integer linear programming problems. 216-225 - Eun-Jun Yoon, Kee-Young Yoo:

Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers. 226-229 - Nuran Guzel, Mustafa Bayram

:
On the numerical solution of stiff systems. 230-236 - Weiming Wang, Xinze Lian:

Computations of multi-resultant with mechanization. 237-257 - Woei-Jiunn Tsaur, Chia Chun Wu, Wei-Bin Lee:

An enhanced user authentication scheme for multi-server Internet services. 258-266 - H. M. El-Hawary, Essam O. Abdel-Rahman

:
Numerical solution of the generalized Burger's equation via spectral/spline methods. 267-279 - Keon-Jik Lee, Byeong-Jik Lee:

Cryptanalysis of the modified authenticated key agreement scheme. 280-284 - Ibrahim Çelik

, Guzin Gokmen:
Approximate solution of periodic Sturm-Liouville problems with Chebyshev collocation method. 285-295 - Wen-Xian Xie, Li Cai, Jian-Hu Feng, Wei Xu:

Computations of shallow water equations with high-order central-upwind schemes on triangular meshes. 296-313 - Jafar Pour-Mahmoud, Mohammad Y. Rahimi-Ardabili, Sedaghat Shahmorad:

Numerical solution of Volterra integro-differential equations by the Tau method with the Chebyshev and Legendre bases. 314-338 - Hasan Akin

:
On the directional entropy of Z2-actions generated by additive cellular automata. 339-346 - Abdul-Majid Wazwaz:

The Camassa-Holm-KP equations with compact and noncompact travelling wave solutions. 347-360 - Abdul-Majid Wazwaz:

The tanh method for a reliable treatment of the K(n, n) and the KP(n, n) equations and its variants. 361-379 - Juan I. Ramos

:
Exponential methods for one-dimensional reaction-diffusion equations. 380-398 - Junesang Choi, H. M. Srivastava

:
Certain families of series associated with the Hurwitz-Lerch Zeta function. 399-409 - Lawrence J. De Chant:

A high velocity plate penetration hole diameter relationship based on late time stagnation point flow concepts. 410-424 - S. A. Belbas:

New hysteresis operators with applications to counterterrorism. 425-439 - Brian J. McCartin:

The method of angled derivatives. 440-461 - Tong Kang, Kwang Ik Kim:

An E-based splitting method with a non-matching grid for eddy current equations with discontinuous coefficients. 462-484 - Majid Jaberi Douraki, Mehdi Dehghan

, Mohsen Razzaghi:
The qualitative behavior of solutions of a nonlinear difference equation. 485-502 - Xiaoyu Ji:

Models and algorithm for stochastic shortest path problem. 503-514 - Pham Huu Anh Ngoc, Byung-Soo Lee:

Some sufficient conditions for exponential stability of linear neutral functional differential equations. 515-530 - George Stephanides, Nicolae Constantinescu

:
The GN-authenticated key agreement. 531-544 - Yuan Gong Sun, Fan Wei Meng:

Oscillation results for matrix differential systems with damping. 545-555 - Lawrence F. Shampine, Skip Thompson, Jacek Kierzenka, George D. Byrne:

Non-negative solutions of ODEs. 556-569 - Xing-Guo Luo:

A two-step Adomian decomposition method. 570-583 - Ahmet Ali Öcal, Naim Tuglu, Ercan Altinisik

:
On the representation of k-generalized Fibonacci and Lucas numbers. 584-596 - Shin-Shin Kao, Lih-Hsing Hsu:

The globally bi-3* and hyper bi-3* connectedness of the spider web networks. 597-610 - Steven Li:

A new formula for computing implied volatility. 611-625 - Shiying Wang, Aimin Yang:

DNA solution of integer linear programming. 626-632 - Alfredo Eisinberg, Giuseppe Fedele

:
Vandermonde systems on Gauss-Lobatto Chebyshev nodes. 633-647 - Saeid Abbasbandy:

Extended Newton's method for a system of nonlinear equations by modified Adomian decomposition method. 648-656 - Weidong Qiu:

Converting normal DLP-based signatures into blind. 657-665 - Shun-Fu Pon

, Erl-Huei Lu, Albert B. Jeng:
One private-key for all DL-based cryptosystems. 666-672 - Lucas Jódar

, L. A. Caudillo-Mata:
A low computational cost numerical method for solving mixed diffusion problems. 673-685 - Jinhai Chen, Weiguo Li:

Convergence of Gauss-Newton's method and uniqueness of the solution. 686-705 - Rafael Cortell:

Numerical solutions of the classical Blasius flat-plate problem. 706-710 - Zhen-Yun Peng:

An iterative method for the least squares symmetric solution of the linear matrix equation AXB = C. 711-723 - Haifeng Qian, Zhenfu Cao

, Haiyong Bao:
Security of Pon-Lu-Jeng's Meta-He digital signature schemes. 724-730
Volume 170, Number 2, November 2005
- A. S. V. Ravi Kanth, Y. N. Reddy:

Cubic spline for a class of singular two-point boundary value problems. 733-740 - M. R. Mokhtarzadeh, A. Golbabaee, R. Mokhtary, N. G. Chegini:

Suitable iterative methods for solving the linear system arising in the three fields domain decomposition method. 741-751 - G. L. Silver:

Analysis of three-dimensional grids: Cubic equations for nine-point prismatic arrays. 752-760 - Reza Tavakkoli-Moghaddam

, Mir-Bahador Aryanezhad, Nima Safaei, Amir Azaron:
Solving a dynamic cell formation problem using metaheuristics. 761-780 - I. A. Hassanien, A. A. Salama, Hany A. Hosham

:
Fourth-order finite difference method for solving Burgers' equation. 781-800 - A. A. El-Bary:

Computational treatment of free convection effects on perfectly conducting viscoelastic fluid. 801-820 - M. S. Osman, Mahmoud A. Abo-Sinna, Abd Allah A. Mousa

:
A combined genetic algorithm-fuzzy logic controller (GA-FLC) in nonlinear programming. 821-840 - Lin Chen, Xiaoqin Huang, Jinyuan You:

Group signature schemes with forward secure properties. 841-849 - Yang Shu Min, Shao Dong Guo, Luo Yang Jie:

A novel evolution strategy for multiobjective optimization problem. 850-873 - Tofigh Allahviranloo

, Mahmood Otadi:
Gaussian quadratures for approximate of fuzzy integrals. 874-885 - Samir Karaa:

An accurate LOD scheme for two-dimensional parabolic problems. 886-894 - E. N. Aksan:

A numerical solution of Burgers' equation by finite element method constructed on the method of discretization in time. 895-904 - Jianhong Zhang, Yumin Wang:

An improved signature scheme without using one-way Hash functions. 905-908 - Hernán A. González, Nelson O. Moraga:

On predicting unsteady non-Newtonian blood flow. 909-923 - Farhad Kianfar:

A numerical method to approximate optimal production and maintenance plan in a flexible manufacturing system. 924-940 - Shin-Jia Hwang, Chia-Wei Huang:

Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curves. 941-947 - Mustafa Bayram

, Necmettin Yildirim:
Metabolic control analysis of trio enzymes system. 948-957 - Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang:

Cryptanalysis of Rijndael S-box and improvement. 958-975 - Zuhua Shao:

Security of meta-He digital signature scheme based on factoring and discrete logarithms. 976-984 - Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi

, Majid Zohrehbandian
:
Finding the efficiency score and RTS characteristic of DMUs by means of identifying the efficient frontier in DEA. 985-993 - Fengying Wei, Ke Wang:

Uniform persistence of asymptotically periodic multispecies competition predator-prey systems with Holling III type functional response. 994-998 - Ting Wu, Jin-Rong Wang:

Comment: A new blind signature based on the discrete logarithm problem for untraceability. 999-1005 - Wenbin Lin

, Narayan Kovvali, Lawrence Carin
:
Direct algorithm for computation of derivatives of the Daubechies basis functions. 1006-1013 - Jianwei Ma:

Towards artifact-free characterization of surface topography using complex wavelets and total variation minimization. 1014-1030 - María del Mar Rueda

, Antonio Arcos
, Sergio Martínez Puertas, María Dolores Martínez Miranda
, Yolanda Román-Montoya, Sergio Martínez Puertas
:
Ratio methods to the mean estimation with known quantiles. 1031-1044 - Mehdi Dehghan

, Majid Jaberi Douraki:
On the recursive sequence xn+1 = (a + bxn-k+1gxn-2k+1) / (Bxn-k+1 + Cxn-2k+1). 1045-1066 - Amer Kaabi

, Asghar Kerayechian, Faezeh Toutounian:
Approximate inverse preconditioner by computing approximate solution of Sylvester equation. 1067-1076 - George E. Antoniou

:
n-Order linear state space systems: Computing the transfer function using the DFT. 1077-1084 - Muhammed I. Syam

, Basem S. Attili:
Numerical solution of singularly perturbed fifth order two point boundary value problem. 1085-1094 - Yuan Gong Sun:

Oscillation and non-oscillation for second-order linear difference equations. 1095-1103 - Muhammed I. Syam

:
Nonlinear optimization exclusion tests for finding all solutions of nonlinear equations. 1104-1116 - Mahmoud E. M. Ouaf

:
Exact solution of thermal radiation on MHD flow over a stretching porous sheet. 1117-1125 - Shaher Momani

:
Analytic and approximate solutions of the space- and time-fractional telegraph equations. 1126-1134 - Feng Cheng Chang:

Matrix formulation of vector operations. 1135-1165 - Fangguo Zhang

, Reihaneh Safavi-Naini, Willy Susilo
:
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03. 1166-1169 - Yuying Shi

, Qianshun Chang:
Remark on convergence of algebraic multigrid in the form of matrix decomposition. 1170-1184 - Da-Zhi Sun, Ji-Dong Zhong, Yu Sun:

Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme. 1185-1193 - Hai-Ping Hu:

Mixed convection turbulent film condensation on a sphere. 1194-1208 - Denis M. Filatov

:
Splitting as an approach to constructing local exact artificial boundary conditions. 1209-1242 - Sanjeet Singh

, Pankaj Gupta, Davinder Bhatia:
Multiparametric sensitivity analysis of the constraint matrix in linear-plus-linear fractional programming problem. 1243-1260 - F. S. Felber:

New exact solutions of differential equations derived by fractional calculus. 1261-1270 - Kamel Al-Khaled

:
Numerical solutions of the Laplace's equation. 1271-1283 - Hung-Yu Chien:

Comments on ID-based multi-signature with distinguished signing authorities. 1284-1289 - Victor R. L. Shen, Tzer-Shyong Chen

, Kai-Quan Shai:
A novel cryptosystem based on grey system theory and genetic algorithm. 1290-1302 - Fawzy Ahmed Abd El-Salam:

Optimization out-of-orbit plane changes using aeroassisted maneuvers. 1303-1313 - Damodar Maity:

A novel far-boundary condition for the finite element analysis of infinite reservoir. 1314-1328 - Ling Wang

:
A hybrid genetic algorithm-neural network strategy for simulation optimization. 1329-1343 - Lin-Chuan Wu, Yi-Shiung Yeh:

Comment on traceability on RSA-based partially signature with low computation. 1344-1348 - Wenhui Zhou:

Performance analysis of discrete-time queue GI/G/1 with negative arrivals. 1349-1355 - Ángel Martín del Rey, J. Pereira Mateus, Gerardo Rodríguez Sánchez

:
A secret sharing scheme based on cellular automata. 1356-1364 - Mohan K. Kadalbajoo, Kapil K. Sharma

, Ashish Awasthi:
A parameter-uniform implicit difference scheme for solving time-dependent Burgers' equations. 1365-1393 - Jing-Bo Chen:

A multisymplectic integrator for the periodic nonlinear Schrödinger equation. 1394-1417 - Akbar Hashemi Borzabadi, Ali Vahidian Kamyad

, Mohammad Hadi Farahi, Hamed Hashemi Mehne
:
Solving some optimal path planning problems using an approach based on measure theory. 1418-1435 - Ching-Ter Chang:

On the mixed integer signomial programming problems. 1436-1451 - Fengde Chen

:
Global asymptotic stability in n-species non-autonomous Lotka-Volterra competitive systems with infinite delays and feedback control. 1452-1468

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














