739 | -- | 755 | Peiping Shen, Yanjun Wang. A new pruning test for finding all global minimizers of nonsmooth functions |
756 | -- | 775 | Mehdi Dehghan, Majid Jaberi Douraki, Marjan Jaberi Douraki. Dynamics of a rational difference equation using both theoretical and computational approaches |
776 | -- | 782 | Qi Xie. Improvement of Tzeng et al. s nonrepudiable threshold proxy signature scheme with known signers |
783 | -- | 787 | Jonas Rimas. On computing of arbitrary positive integer powers for one type of symmetric tridiagonal matrices of even order |
788 | -- | 794 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. Cryptanalysis and further improvement of Peinado s improved LHL-key authentication scheme |
795 | -- | 805 | K. R. Raslan. Collocation method using quartic B-spline for the equal width (EW) equation |
806 | -- | 822 | J. Rashidinia, M. Zarebnia. Numerical solution of linear integral equations by using Sinc-collocation method |
823 | -- | 847 | Deng Shan Wang, Yi Fang Liu, Hong-Qing Zhang. Symbolic computation and families of Jacobi elliptic function solutions of the (2 + 1)-dimensional Nizhnik-Novikov-Veselov equation |
848 | -- | 857 | P. Ossipov. Simple heuristic algorithm for profile reduction of arbitrary sparse matrix |
858 | -- | 865 | Jeong Ok Kwon, Jung Yeon Hwang, Changwook Kim, Dong-Hoon Lee. Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme |
866 | -- | 876 | Tofigh Allahviranloo. Romberg integration for fuzzy functions |
877 | -- | 894 | S. Effati, A. R. Nazemi. A new method for solving a system of the nonlinear equations |
895 | -- | 908 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow. Forward-secure multisignature and blind signature schemes |
909 | -- | 914 | Ji-Huan He, Jie Tang. Rebuild of King Fang 40 BC musical scales by He s inequality |
915 | -- | 926 | Dogan Kaya, Ibrahim E. Inan. A numerical application of the decomposition method for the combined KdV-MKdV equation |
927 | -- | 932 | Da-Zhi Sun, Zhen-Fu Cao. Improved public key authentication scheme for non-repudiation |
933 | -- | 944 | Henry Ker-Chang Chang, Erl-Huei Lu, Pin-Chang Su. Design of traceable security system |
945 | -- | 953 | Alberto d Onofrio. Periodically varying antiviral therapies: conditions for global stability of the virus free state |
954 | -- | 961 | Rongxing Lu, Zhenfu Cao. A new deniable authentication protocol from bilinear pairings |
962 | -- | 972 | Luming Zhang. A finite difference scheme for generalized regularized long-wave equation |
973 | -- | 980 | S.-J. Yang, B. Shi, D. C. Zhang, M. J. Gai. Counterexamples to the article Oscillation and global attractivity in hematopoiesis model with delay time |
981 | -- | 989 | You-Hui Su, Wan-Tong Li. Global asymptotic stability of a second-order nonlinear difference equation |
990 | -- | 1003 | Qi Duan, Liqiu Wang, Edward H. Twizell. A new weighted rational cubic interpolation and its approximation |
1004 | -- | 1019 | A. Agouzal, K. Allali, K. Najib. Non-conforming finite element discretisations of a class of non-Newtonian flows |
1020 | -- | 1030 | Fuyong Lin. A new multi-resolution theory based on orthogonal spline |
1031 | -- | 1044 | Liping Wen, Shoufu Li. Nonlinear stability of linear multistep methods for stiff delay differential equations in Banach spaces |
1045 | -- | 1064 | Woei-Jiunn Tsaur, Chih-Ho Chou. Efficient algorithms for speeding up the computations of elliptic curve cryptosystems |
1065 | -- | 1078 | Zhenya Yan. Numerical doubly periodic solution of the KdV equation with the initial condition via the decomposition method |
1079 | -- | 1085 | Ming-Heng Zhang, QianSheng Cheng. An approach to VaR for capital markets with Gaussian mixture |
1086 | -- | 1097 | Y. G. Sun, S. H. Saker. Existence of positive periodic solutions of nonlinear discrete model exhibiting the Allee effect |
1098 | -- | 1108 | A. Sjöberg, F. M. Mahomed. The association of non-local symmetries with conservation laws: applications to the heat and Burger s equations |
1109 | -- | 1127 | C. Clavero, J. L. Gracia. High order methods for elliptic and time dependent reaction-diffusion singularly perturbed problems |
1128 | -- | 1144 | J. J. Zhao, Y. Xu, S. Y. Dong, M. Z. Liu. Stability of the Rosenbrock methods for the neutral delay differential-algebraic equations |
1145 | -- | 1158 | Aytac Arikoglu, Ibrahim Ozkol. Solution of boundary value problems for integro-differential equations by using differential transform method |
1159 | -- | 1168 | S. Kutluay. Numerical schemes for one-dimensional Stefan-like problems with a forcing term |
1169 | -- | 1174 | Tzong-Mou Wu. A study of convergence on the Newton-homotopy continuation method |
1175 | -- | 1188 | Tzong-Mou Wu, Cha o-Kuang Chen. Computer-aided curvature analyses of planar four-bar linkage mechanism |
1189 | -- | 1204 | Yong Chen, Qi Wang. A new general algebraic method with symbolic computation to construct new travelling wave solution for the (1 + 1)-dimensional dispersive long wave equation |
1205 | -- | 1218 | Y. G. Sun, S. H. Saker. Oscillatory and asymptotic behavior of positive periodic solutions of nonlinear discrete model exhibiting the allee effect |
1219 | -- | 1231 | Ruyun Ma. Existence of positive solutions of a fourth-order boundary value problem |
1232 | -- | 1238 | J. Biazar. Solution of systems of integral-differential equations by Adomian decomposition method |
1239 | -- | 1250 | Zhenya Yan. Controlling hyperchaos in the new hyperchaotic Chen system |
1251 | -- | 1257 | M. El-kady, A. Abd El-Shafy. Error estimation problem of nonlinear integral equations in the space L::p::(p >= 1) |
1258 | -- | 1272 | Hamed Hashemi Mehne, M. H. Farahi, J. A. Esfahani. Slot nozzle design with specified pressure in a given subregion by using embedding method |
1273 | -- | 1280 | Shaher Momani. A numerical scheme for the solution of Sivashinsky equation |
1281 | -- | 1305 | Robert K. McCormack, Linda J. S. Allen. Disease emergence in deterministic and stochastic models for host and pathogen |
1306 | -- | 1316 | Basem S. Attili. The Adomian decomposition method for computing eigenelements of Sturm-Liouville two point boundary value problems |
1317 | -- | 1339 | Amir Azaron, Cahit Perkgoz, Masatoshi Sakawa. A genetic algorithm approach for the time-cost trade-off in PERT networks |
1340 | -- | 1356 | Vejdi I. Hasanov, Ivan G. Ivanov. On the matrix equation X - A:::*:::X:::-n:::A = I |
1357 | -- | 1369 | Ling Wang, Ling-Lai Li, Fang Tang. Optimal reduction of models using a hybrid searching strategy |
1370 | -- | 1379 | S. Effati, M. Baymani. A new nonlinear neural network for solving convex nonlinear programming problems |
1380 | -- | 1399 | Metin Demiralp. Critical value calculations for the screening parameter of Hulthen potential |
1400 | -- | 1408 | A. Shidfar, R. Pourgholi. Application of finite difference method to analysis an ill-posed problem |
1409 | -- | 1418 | Yuelin Gao, Honggang Xue, Peiping Shen. A new rectangle branch-and-reduce approach for solving nonconvex quadratic programming problems |
1419 | -- | 1431 | Pedro M. Reyes. Logistics networks: A game theory application for solving the transshipment problem |
1432 | -- | 1448 | Predrag M. Rajkovic, Sladjana D. Marinkovic, Miomir S. Stankovic. On q-Newton-Kantorovich method for solving systems of equations |
1449 | -- | 1460 | Hakan F. Öztop. Numerical study of flow and heat transfer in curvilinear ducts: applications of elliptic grid generation |
1461 | -- | 1468 | Emin Kasap, Ismail Aydemir, Nuri Kuruoglu. Erratum to: Ruled surfaces with timelike rulings [Appl. Math. Comput. 147 (2004) 241-248] |