Journal: Applied Mathematics and Computation

Volume 167, Issue 2

741 -- 806Jong-Wuu Wu, Wen-Chuan Lee, Sheau-Chiann Chen. Prediction intervals of future observation from one-parameter exponential distribution based on multiply type II censored samples
807 -- 819Jong-Wuu Wu, Chin-Chuan Wu, Mei-Huei Tsai. Optimal parameter estimation of the two-parameter bathtub-shaped lifetime distribution based on a type II right censored sample
820 -- 832Ya-Fen Chang, Chin-Chen Chang. Authentication schemes with no verification table
833 -- 839Eun-Kyung Ryu, Jae-Yuel Im, Kee-Young Yoo. Security of Tseng-Jan s conference key distribution system
840 -- 848Liao-Jun Pang, Yu-Min Wang. A new (t, n) multi-secret sharing scheme based on Shamir s secret sharing
849 -- 869Hassan N. A. Ismail, Kamal R. Raslan, Ghada S. E. Salem, Aziza A. Abd Rabboh. Comparison study between restrictive Taylor, restrictive Padé approximations and Adomian decomposition method for the solitary wave solution of the General KdV equation
870 -- 881Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su. An efficient signcryption scheme with forward secrecy based on elliptic curve
882 -- 890Chien-Lung Hsu. Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem
891 -- 900Tseng-Kuei Li. Cycle embedding in star graphs with edge faults
901 -- 918Li-Hong Cui, Zheng-xing Cheng. A method of construction for biorthogonal multiwavelets system with 2r multiplicity
919 -- 929Yong Chen, Qi Wang. A new general algebraic method with symbolic computation to construct new doubly-periodic solutions of the (2 + 1)-dimensional dispersive long wave equation
930 -- 956Yong-Lin Chen, Xue-Yuan Tan. Semiconvergence criteria of iterations and extrapolated iterations and constructive methods of semiconvergent iteration matrices
957 -- 963Caidi Zhao. Algorithmization formula and mechanization to Cauchy problem of high dimensional wave equation
964 -- 975Afrah Saad Mahmood, Luis Casasús, Waleed Al-Hayani. The decomposition method for stiff systems of ordinary differential equations
976 -- 995Din-Yuen Chan, Cheng-Yuan Ku. Finite-precision arithmetic coding via index-splitting and probability-fitting
996 -- 1003Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo. Efficient verifier-based key agreement protocol for three parties without server s public key
1004 -- 1025Yi-Qin Lin. Implicitly restarted global FOM and GMRES for nonsymmetric matrix equations and Sylvester equations
1026 -- 1040Xianfu Zhang, Zhaolin Cheng. Output feedback stabilization of nonlinear systems with delays in the input
1041 -- 1061Ali Vahidian Kamyad, Hamed Hashemi Mehne, Akbar Hashemi Borzabadi. The best linear approximation for nonlinear systems
1062 -- 1079J. J. Zhao, Y. Xu, M. Z. Liu. Stability analysis of numerical methods for linear neutral Volterra delay-integro-differential system
1080 -- 1089A. Shidfar, M. Djalalvand, M. Garshasbi. A numerical scheme for solving special class of nonlinear diffusion-convection equation
1090 -- 1100M. Hadizadeh, M. Asgary. An efficient numerical approximation for the linear class of mixed integral equations
1101 -- 1118K. R. Raslan. A computational method for the regularized long wave (RLW) equation
1119 -- 1129Y. Mahmoudi. Wavelet Galerkin method for numerical solution of nonlinear integral equation
1130 -- 1149Jinlin Shi, Aizhi Weng, Jiyang Chen. The calculation for characteristic multiplier of Hill s equation in case q(t) < 0
1150 -- 1155E. Babolian, A. R. Vahidi, G. H. Asadi Cordshooli. Solving differential equations by decomposition method
1156 -- 1161Abdalah A. Badr. Numerical solution of Fredholm-Volterra integral equation in one dimension with time dependent
1162 -- 1178Abdul-Majid Wazwaz. Generalized Boussinesq type of equations with compactons, solitons and periodic solutions
1179 -- 1195Abdul-Majid Wazwaz. The tanh and the sine-cosine methods for compact and noncompact solutions of the nonlinear Klein-Gordon equation
1196 -- 1210Abdul-Majid Wazwaz. The tanh method: exact solutions of the sine-Gordon and the sinh-Gordon equations
1211 -- 1220Khaled M. Furati, Nasser-eddine Tatar. Uniform boundedness and stability for a viscoelastic problem
1221 -- 1235Mohamed Medjden, Nasser-eddine Tatar. Asymptotic behavior for a viscoelastic problem with not necessarily decreasing kernel
1236 -- 1248Ravi P. Agarwal, Donal O Regan, V. Lakshmikantham, S. Leela. Nonresonant singular boundary value problems with sign changing nonlinearities
1249 -- 1266Mahir Rasulov. Numerical solution of one dimensional filtration of three phase compressible fluid through porous medium in a class of discontinuous functions
1267 -- 1280T. Candan, R. S. Dahiya. Oscillation behavior of higher order neutral differential equations
1281 -- 1303K. L. Boey, Patricia J. Y. Wong. Two-point right focal eigenvalue problems on time scales
1304 -- 1310M. Kirane, Y. Laskri. Nonexistence of global solutions to a hyperbolic equation with a space-time fractional damping
1311 -- 1330J. I. Ramos. Exponentially-fitted methods on layer-adapted meshes
1331 -- 1338J. I. Ramos. Equivalence of C:::0::: and C:::1::: methods for ODE s
1339 -- 1349Salah M. El-Sayed, Dogan Kaya. Exact and numerical traveling wave solutions of Whitham-Broer-Kaup equations
1350 -- 1372Weiming Wang. An algorithm for solving DAEs with mechanization
1373 -- 1382Jianhong Zhang, YuMin Wang. On the security of Miyaji et al. group signature scheme
1383 -- 1399Haibo Zhao, Chuguang Zheng, Minghou Xu. Multi-Monte Carlo method for particle coagulation: description and validation
1400 -- 1411Rais Ahmad, Fabián Flores Bazán. An iterative algorithm for random generalized nonlinear mixed variational inclusions for random fuzzy mappings
1412 -- 1417Ebrahim A. Youness. Level set algorithm for solving convex multiplicative programming problems
1418 -- 1429S. Shahmorad. Numerical solution of the general form linear Fredholm-Volterra integro-differential equations by the Tau method with an error estimation
1430 -- 1450Reza Tavakkoli-Moghaddam, G. Moslehi, M. Vasei, Amir Azaron. Optimal scheduling for a single machine to minimize the sum of maximum earliness and tardiness considering idle insert
1451 -- 1456Iwan M. Duursma, Hyang-Sook Lee. A group key agreement protocol from pairings
1457 -- 1474Pradeep Kumar Gudla, Ranjan Ganguli. An automated hybrid genetic-conjugate gradient algorithm for multimodal optimization problems

Volume 167, Issue 1

1 -- 15Prasada Rao, Miguel Angel Medina. A multiple domain algorithm for modeling one-dimensional transient contaminant transport flows
16 -- 27Rafael Álvarez, Joan-Josep Climent, Leandro Tortosa, Antonio Zamora. An efficient binary sequence generator with cryptographic applications
28 -- 45Mehdi Dehghan. Numerical approximations for solving a time-dependent partial differential equation with non-classical specification on four boundaries
46 -- 67Mehdi Dehghan. Quasi-implicit and two-level explicit finite-difference procedures for solving the one-dimensional advection equation
68 -- 75Dariush Shadman, Bahman Mehri. A non-homogeneous Hill s equation
76 -- 80G. A. Afrouzi. On positive mountain pass solutions for a semilinear elliptic boundary value problem
81 -- 93Yong Ding, Kwok-Wo Wong, Yu-Min Wang. A w-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography
94 -- 107Zhen-Jun Shi, Jie Shen. Convergence of descent method without line search
108 -- 117Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih. Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation
118 -- 124Ming-Hsin Chang, Yi-Shiung Yeh. Improving Lamport one-time signature scheme
125 -- 142R. Barrio, J. M. Peña. Evaluation of the derivative of a polynomial in Bernstein form
143 -- 152Zuhua Shao. A new key authentication scheme for cryptosystems based on discrete logarithms
153 -- 166Tariq Aziz, Arshad Khan, Jalil Rashidinia. Spline methods for the solution of fourth-order parabolic partial differential equations
167 -- 178E. E. Ammar. On computational solution of vector maximum problem
179 -- 197S. H. Saker. Oscillation of continuous and discrete diffusive delay Nicholson s blowflies models
198 -- 211A. Malek, A. Yari. Primal-dual solution for the linear programming problems using neural networks
212 -- 224Z. Merdan, M. Bayirli. The effect of the increase of linear dimensions on exponents obtained by finite-size scaling relations for the six-dimensional Ising model on the Creutz cellular automaton
225 -- 236Rajesh K. Bawa. Spline based computational technique for linear singularly perturbed boundary value problems
237 -- 251H. Saberi Najafi, S. Kordrostami, M. Esmaeilzadeh. Computational Quartic c:::3:::-spline and Quintic c:::2:::-spline algorithms for solving second-order initial value problems
252 -- 273Ying-Ming Wang, Jian-Bo Yang, Dong-Ling Xu. Interval weight generation approaches based on consistency test and interval comparison matrices
274 -- 280Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. Improvement of Fan et al. s deniable authentication protocol based on Diffie-Hellman algorithm
281 -- 285Shin-Jia Hwang, Hao-Chih Liao. Security of Hsu-Wu s authenticated encryption scheme with (t, n) shared verification
286 -- 298Dragan Jukic, Rudolf Scitovski. Least squares fitting Gaussian type curve
316 -- 323M. Tavassoli Kajani, B. Asady, A. Hadi Vencheh. An iterative method for solving dual fuzzy nonlinear equations
324 -- 344Yongkun Li, Linghong Lu. Positive periodic solutions of discrete n-species food-chain systems
345 -- 354Andrés Barrea, Cristina Turner. A numerical analysis of a model of growth tumor
355 -- 361Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo. Efficient nonce-based remote user authentication scheme using smart cards
362 -- 371Yuan-Lung Yu, Tzer-Shyong Chen. An efficient threshold group signature scheme
372 -- 382Teresa Diogo, John T. Edwards, Neville J. Ford, Sophy M. Thomas. Numerical analysis of a singular integral equation
383 -- 418Shan Zhao, G. W. Wei. Option valuation by using discrete singular convolution
419 -- 434Luther White, Yiqi Luo. Model-based data assessment for terrestrial carbon processes: implications for sampling strategy in FACE experiments
435 -- 453Saffet Ayasun, Chika O. Nwankpa, Harry G. Kwatny. An efficient method to compute singularity induced bifurcations of decoupled parameter-dependent differential-algebraic power system model
454 -- 476Zhong-hua Yang, Qian Guo. Bifurcation analysis of delayed logistic equation
477 -- 495Blanca Pérez-Gladish, Mar Arenas Parra, Amelia Bilbao-Terol, Maria Victoria Rodríguez Uría. Management of surgical waiting lists through a Possibilistic Linear Multiobjective Programming problem
496 -- 507Mahmoud H. Alrefaei. A simulated annealing applied for optimizing a voice-multihop radio network
508 -- 515Ching-Ter Chang. Fractional programming with absolute-value functions: a fuzzy goal programming approach
516 -- 527R. M. Faye, S. Sawadogo, Félix Mora-Camino. Flexible management of water resource systems
528 -- 538M. Fernández, D. P. Atherton. Analysis of insulin sensitivity estimates from linear models of glucose disappearance
539 -- 560George E. Tsekouras. A fuzzy vector quantization approach to image compression
561 -- 571S. Saha Ray, R. K. Bera. An approximate solution of a nonlinear fractional differential equation by Adomian decomposition method
572 -- 575Da-Zhi Sun, Zhen-Fu Cao, Yu Sun. Remarks on a new key authentication scheme based on discrete logarithms
576 -- 591Lihong Feng. Review of model order reduction methods for numerical simulation of nonlinear circuits
592 -- 606Tadeusz Platkowski, Joanna Stachowska-Pietka. ESSs in n-player mixed games
607 -- 615Ming Gen Cui, Li Hong Yang. The exact solutions of a kind of nonlinear operator equations
616 -- 621E. Ahmed, M. El-Alem. On multiobjective optimization in portfolio management
622 -- 634Zong-Yi Lee. Applying the double side method of weighted residual to the solution of shell deformation problem
635 -- 649Patricia Mariela Morillas. Dykstra's algorithm with strategies for projecting onto certain polyhedral cones
650 -- 669Kyungsoo Kim, Dokkyun Yi, Sungyun Lee. Mortar method for nonconforming finite elements
670 -- 676Erdal Karaduman. On determinants of matrices with general Fibonacci numbers entries
677 -- 694Pu-yan Nie. A filter method for solving nonlinear complementarity problems
695 -- 710Nurullah Ankaralioglu, Hüseyin Aydin, Inci Gültekin. Computation of abstract groups S((d + 1)/2, d) and torus knots K(d, 2)
711 -- 715Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. Improvement of Chien-Jan s authenticated multiple-key agreement protocol without using conventional one-way function
716 -- 728Shaohua Pan, Xingsi Li. An efficient algorithm for the Euclidean r-centrum location problem
729 -- 739Yuh-Dauh Lyuu, Ming-Luen Wu. Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes