Journal: Applied Mathematics and Computation

Volume 168, Issue 2

739 -- 755Peiping Shen, Yanjun Wang. A new pruning test for finding all global minimizers of nonsmooth functions
756 -- 775Mehdi Dehghan, Majid Jaberi Douraki, Marjan Jaberi Douraki. Dynamics of a rational difference equation using both theoretical and computational approaches
776 -- 782Qi Xie. Improvement of Tzeng et al. s nonrepudiable threshold proxy signature scheme with known signers
783 -- 787Jonas Rimas. On computing of arbitrary positive integer powers for one type of symmetric tridiagonal matrices of even order
788 -- 794Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. Cryptanalysis and further improvement of Peinado s improved LHL-key authentication scheme
795 -- 805K. R. Raslan. Collocation method using quartic B-spline for the equal width (EW) equation
806 -- 822J. Rashidinia, M. Zarebnia. Numerical solution of linear integral equations by using Sinc-collocation method
823 -- 847Deng Shan Wang, Yi Fang Liu, Hong-Qing Zhang. Symbolic computation and families of Jacobi elliptic function solutions of the (2 + 1)-dimensional Nizhnik-Novikov-Veselov equation
848 -- 857P. Ossipov. Simple heuristic algorithm for profile reduction of arbitrary sparse matrix
858 -- 865Jeong Ok Kwon, Jung Yeon Hwang, Changwook Kim, Dong-Hoon Lee. Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme
866 -- 876Tofigh Allahviranloo. Romberg integration for fuzzy functions
877 -- 894S. Effati, A. R. Nazemi. A new method for solving a system of the nonlinear equations
895 -- 908Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow. Forward-secure multisignature and blind signature schemes
909 -- 914Ji-Huan He, Jie Tang. Rebuild of King Fang 40 BC musical scales by He s inequality
915 -- 926Dogan Kaya, Ibrahim E. Inan. A numerical application of the decomposition method for the combined KdV-MKdV equation
927 -- 932Da-Zhi Sun, Zhen-Fu Cao. Improved public key authentication scheme for non-repudiation
933 -- 944Henry Ker-Chang Chang, Erl-Huei Lu, Pin-Chang Su. Design of traceable security system
945 -- 953Alberto d Onofrio. Periodically varying antiviral therapies: conditions for global stability of the virus free state
954 -- 961Rongxing Lu, Zhenfu Cao. A new deniable authentication protocol from bilinear pairings
962 -- 972Luming Zhang. A finite difference scheme for generalized regularized long-wave equation
973 -- 980S.-J. Yang, B. Shi, D. C. Zhang, M. J. Gai. Counterexamples to the article Oscillation and global attractivity in hematopoiesis model with delay time
981 -- 989You-Hui Su, Wan-Tong Li. Global asymptotic stability of a second-order nonlinear difference equation
990 -- 1003Qi Duan, Liqiu Wang, Edward H. Twizell. A new weighted rational cubic interpolation and its approximation
1004 -- 1019A. Agouzal, K. Allali, K. Najib. Non-conforming finite element discretisations of a class of non-Newtonian flows
1020 -- 1030Fuyong Lin. A new multi-resolution theory based on orthogonal spline
1031 -- 1044Liping Wen, Shoufu Li. Nonlinear stability of linear multistep methods for stiff delay differential equations in Banach spaces
1045 -- 1064Woei-Jiunn Tsaur, Chih-Ho Chou. Efficient algorithms for speeding up the computations of elliptic curve cryptosystems
1065 -- 1078Zhenya Yan. Numerical doubly periodic solution of the KdV equation with the initial condition via the decomposition method
1079 -- 1085Ming-Heng Zhang, QianSheng Cheng. An approach to VaR for capital markets with Gaussian mixture
1086 -- 1097Y. G. Sun, S. H. Saker. Existence of positive periodic solutions of nonlinear discrete model exhibiting the Allee effect
1098 -- 1108A. Sjöberg, F. M. Mahomed. The association of non-local symmetries with conservation laws: applications to the heat and Burger s equations
1109 -- 1127C. Clavero, J. L. Gracia. High order methods for elliptic and time dependent reaction-diffusion singularly perturbed problems
1128 -- 1144J. J. Zhao, Y. Xu, S. Y. Dong, M. Z. Liu. Stability of the Rosenbrock methods for the neutral delay differential-algebraic equations
1145 -- 1158Aytac Arikoglu, Ibrahim Ozkol. Solution of boundary value problems for integro-differential equations by using differential transform method
1159 -- 1168S. Kutluay. Numerical schemes for one-dimensional Stefan-like problems with a forcing term
1169 -- 1174Tzong-Mou Wu. A study of convergence on the Newton-homotopy continuation method
1175 -- 1188Tzong-Mou Wu, Cha o-Kuang Chen. Computer-aided curvature analyses of planar four-bar linkage mechanism
1189 -- 1204Yong Chen, Qi Wang. A new general algebraic method with symbolic computation to construct new travelling wave solution for the (1 + 1)-dimensional dispersive long wave equation
1205 -- 1218Y. G. Sun, S. H. Saker. Oscillatory and asymptotic behavior of positive periodic solutions of nonlinear discrete model exhibiting the allee effect
1219 -- 1231Ruyun Ma. Existence of positive solutions of a fourth-order boundary value problem
1232 -- 1238J. Biazar. Solution of systems of integral-differential equations by Adomian decomposition method
1239 -- 1250Zhenya Yan. Controlling hyperchaos in the new hyperchaotic Chen system
1251 -- 1257M. El-kady, A. Abd El-Shafy. Error estimation problem of nonlinear integral equations in the space L::p::(p >= 1)
1258 -- 1272Hamed Hashemi Mehne, M. H. Farahi, J. A. Esfahani. Slot nozzle design with specified pressure in a given subregion by using embedding method
1273 -- 1280Shaher Momani. A numerical scheme for the solution of Sivashinsky equation
1281 -- 1305Robert K. McCormack, Linda J. S. Allen. Disease emergence in deterministic and stochastic models for host and pathogen
1306 -- 1316Basem S. Attili. The Adomian decomposition method for computing eigenelements of Sturm-Liouville two point boundary value problems
1317 -- 1339Amir Azaron, Cahit Perkgoz, Masatoshi Sakawa. A genetic algorithm approach for the time-cost trade-off in PERT networks
1340 -- 1356Vejdi I. Hasanov, Ivan G. Ivanov. On the matrix equation X - A:::*:::X:::-n:::A = I
1357 -- 1369Ling Wang, Ling-Lai Li, Fang Tang. Optimal reduction of models using a hybrid searching strategy
1370 -- 1379S. Effati, M. Baymani. A new nonlinear neural network for solving convex nonlinear programming problems
1380 -- 1399Metin Demiralp. Critical value calculations for the screening parameter of Hulthen potential
1400 -- 1408A. Shidfar, R. Pourgholi. Application of finite difference method to analysis an ill-posed problem
1409 -- 1418Yuelin Gao, Honggang Xue, Peiping Shen. A new rectangle branch-and-reduce approach for solving nonconvex quadratic programming problems
1419 -- 1431Pedro M. Reyes. Logistics networks: A game theory application for solving the transshipment problem
1432 -- 1448Predrag M. Rajkovic, Sladjana D. Marinkovic, Miomir S. Stankovic. On q-Newton-Kantorovich method for solving systems of equations
1449 -- 1460Hakan F. Öztop. Numerical study of flow and heat transfer in curvilinear ducts: applications of elliptic grid generation
1461 -- 1468Emin Kasap, Ismail Aydemir, Nuri Kuruoglu. Erratum to: Ruled surfaces with timelike rulings [Appl. Math. Comput. 147 (2004) 241-248]

Volume 168, Issue 1

1 -- 28Jinbao Jian, Haiyan Zheng, Qingjie Hu, Chunming Tang. A new norm-relaxed method of strongly sub-feasible direction for inequality constrained optimization
29 -- 39Jianzhou Wang, Zhixin Ma, Lian Li. Detection, mining and forecasting of impact load in power load forecasting
40 -- 46Pin-Chang Su, Erl-Huei Lu, Henry Ker-Chang Chang. A knapsack public-key cryptosystem based on elliptic curve discrete logarithm
47 -- 50Yingjie Wang, J. H. Li, L. Tie. Security analysis and improvement of a user-friendly remote authentication protocol
51 -- 64Mohammad Masjed-Jamei, M. R. Eslahchi, Mehdi Dehghan. On numerical improvement of Gauss-Radau quadrature rules
65 -- 75Mahmoud M. El-Borai, Khairia El-Said El-Nadi, Osama L. Mostafa, Hamdy M. Ahmed. Numerical methods for some nonlinear stochastic differential equations
76 -- 88Mustafa Gülsu, Mehmet Sezer. The approximate solution of high-order linear difference equations with variable coefficients in terms of Taylor polynomials
89 -- 101Wang Yanjun, Shen Peiping, Liang Zhian. A branch-and-bound algorithm to globally solve the sum of several linear ratios
102 -- 110Khosrow Maleknejad, M. Karami. Numerical solution of non-linear Fredholm integral equations by using multiwavelets in the Petrov-Galerkin method
111 -- 124Khosrow Maleknejad, Taher Lotfi. Numerical expansion methods for solving integral equations by interpolation and Gauss quadrature rules
125 -- 134Ibrahim Çelik. Approximate computation of eigenvalues with Chebyshev collocation method
135 -- 140Jun Shao, Zhenfu Cao. A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
141 -- 145Khosrow Maleknejad, M. Karami, N. Aghazadeh. Numerical solution of Hammerstein equations via an interpolation method
146 -- 151Ze-Mao Zhao, Feng-Yu Liu. Method of constructing elliptic curve authenticated encryption scheme
152 -- 163Siraj-Ul-Islam, Muhammad Azam Khan, Syed Ikram A. Tirmizi, Edward H. Twizell. Non polynomial spline approach to the solution of a system of third-order boundary-value problems
164 -- 177Sang-Keon Oh, Min-Soeng Kim, Tae-Dok Eom, Ju-Jang Lee. Heterogeneous local model networks for time series prediction
178 -- 191André L. Moura, José R. Camacho, Sebastião C. Guimarães Jr, Carlos H. Salerno. A functional language to implement the divide-and-conquer Delaunay triangulation algorithm
192 -- 197Hasan Akin. On the ergodic properties of certain additive cellular automata over Z::m::
198 -- 221H. M. El-Hawary, E. A. Zanaty, E. El-Sanousy. RETRACTED: Quartic spline collocation methods for elliptic partial differential equations
222 -- 234Zuhua Shao. Improvement of efficient proxy signature schemes using self-certified public keys
235 -- 242Weidong Qiu, Kefei Chen. Identity oriented signature scheme based on quadratic residues
243 -- 269Abubakr Muhammad, Magnus Egerstedt. Connectivity graphs as models of local interactions
270 -- 282A. Esen. A numerical solution of the equal width wave equation by a lumped Galerkin method
283 -- 304Moustafa S. Abou-Dina, F. M. Hassan. Approximate determination of the transmission and reflection coefficients for water-wave flow over a topography
305 -- 319Chien-Lung Hsu, Tzong-Sun Wu. Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
320 -- 332Gyurhan H. Nedzhibov. An acceleration of iterative processes for solving nonlinear equations
333 -- 341B. A. Mamedov, R. Tapramaz, Z. Merdan. Calculation of generalized elliptic type integrals using the binomial expansion theorem
342 -- 353Hua Ke, Baoding Liu. Project scheduling problem with stochastic activity duration times
354 -- 379Andreas U. Schmidt. A model for prejudiced learning in noisy environments
380 -- 388Xiaofan Yang, David J. Evans, Graham M. Megson. On a non-autonomous difference equation
389 -- 397Mohamad Radwan, M. K. Ahmed, F. A. Abd El-Salam. The problem of close approach of two small masses in the field of massive oblate primary
398 -- 410S. Saha Ray, R. K. Bera. Analytical solution of the Bagley Torvik equation by Adomian decomposition method
411 -- 430Nivaor Rodolfo Rigozo, Ezequiel Echer, Daniel Jean Roger Nordemann, Luís Eduardo Antunes Vieira, Heloisa Helena de Faria. Comparative study between four classical spectral analysis methods
431 -- 446Mehdi Dehghan, M. Masjed-Jamei, M. R. Eslahchi. On numerical improvement of the second kind of Gauss-Chebyshev quadrature rules
447 -- 464Woei-Jiunn Tsaur. Several security schemes constructed using ECC-based self-certified public key cryptosystems
465 -- 478J. Pour-Mahmoud, M. Y. Rahimi-Ardabili, S. Shahmorad. Numerical solution of the system of Fredholm integro-differential equations by the Tau method
479 -- 495M. R. Eslahchi, Mehdi Dehghan, M. Masjed-Jamei. The first kind Chebyshev-Newton-Cotes quadrature rules (closed type) and its numerical improvement
496 -- 518P. K. Mishra. Optimal systolic array algorithms for tensor product
519 -- 539Zhibin Zhu. A globally and superlinearly convergent feasible QP-free method for nonlinear programming
540 -- 548A. Shidfar, G. R. Karamali. Numerical solution of inverse heat conduction problem with nonstationary measurements
549 -- 556Vildan Gülkaç. On the finite differences schemes for the numerical solution of two-dimensional moving boundary problem
557 -- 566Rafael Cortell Bataller. A note on magnetohydrodynamic flow of a power-law fluid over a stretching sheet
567 -- 599Quan-Fang Wang. Numerical solution for series sine-Gordon equations using variational method and finite element approximation
600 -- 612Li Cai, Jian-Hu Feng, Wen-Xian Xie. A CWENO-type central-upwind scheme for ideal MHD equations
613 -- 622Alberto d Onofrio. Vaccination policies and nonlinear force of infection: generalization of an observation by Alexander and Moghadas (2004)
623 -- 635Fabio Dercole, Stefano Maggi. Detection and continuation of a border collision bifurcation in a forest fire model
636 -- 650Lin Yingzhen, Cui Minggen, Zheng Yi. Representation of the exact solution for infinite system of linear equations
651 -- 676Silvia Bonettini, Emanuele Galligani, Valeria Ruggiero. An inexact Newton method combined with Hestenes multipliers scheme for the solution of Karush-Kuhn-Tucker systems
677 -- 685Ling Zhu. On the convergent condition of Newton-like method in parallel circular iteration for simultaneously finding all multiple zeros of a polynomial, II
686 -- 703N. M. Apaolaza, Jesus R. Artalejo. On the time to reach a certain orbit level in multi-server retrial queues
704 -- 716R. K. Mohanty, Navnit Jha. A class of variable mesh spline in compression methods for singularly perturbed two point singular boundary value problems
717 -- 721Shin-Jia Hwang, Hao-Chih Liao. Security of Tzeng-Hwang s authenticated encryption scheme based on elliptic curve discrete logarithm problems
722 -- 737Yanjun Wang, Zhian Liang. A deterministic global optimization algorithm for generalized geometric programming