Applied Mathematics & Information Sciences
Jul. 2013
Articles
AND-NOT logic framework for steady state analysis of Boolean network models
Alan Veliz-Cuba, Kristina Buschur, Rose Hamershock, Ariel Kniss, Esther Wolff, and Reinhard Laubenbacher
Creating Unorganised Machines from Memristors
Gerard Howard, Larry Bull, Ben de lacy Costello, and Andrew Adamatzky
Security Analysis of Order Preserving Symmetric Cryptography
Santi Mart?nez, Josep M. Miret, Rosana Tomàs, and Magda Valls
Forecasting meteorological time series using soft computing methods: an empirical study
Elena Bautu and Alina Barbulescu
A Recurrence Relation of Hypergeometric Series Through Record Statistics and a Characterization
M. Mohsin and Jürgen Pilz
Equivalence between mirror-field-atom and ion-laser interactions
R. Ju?rez-Amaro, A. Z??iga-Segundo, F. Soto-Eguibar, and H.M. Moya-Cessa
Optimization of Transverse Load Factor of Helical and Spur Gears Using Genetic Algorithm
Marija Milojevi´c
Singular solitons and bifurcation analysis of quadratic nonlinear Klein-Gordon equation
Ming Song, Zhengrong Liu, Essaid Zerrad, and Anjan Biswas
The Taylor Matrix Method for Approximate Solution of Lane-Emden Equation with index-n
Coskun Guler, Ibrahim Emiroglu, Fatih Tasci, and Mustafa Sivri
Simulation of Join Cardinalities in Random Databases Using Poisson Stochastic Processes
Letiția Velcescu
Approximates Method for Solving an Elasticity Problem of Settled of the Elastic Ground with Variable Coefficients
Mustafa Bayram and Kenan Yildirim
Adaptive Control Based on Incremental Hierarchical Sliding Mode for Overhead Crane Systems
Dianwei Qian, Shiwen Tong, and Jianqiang Yi
A novel remote user authentication and key agreement scheme for mobile client-server environment
Haiyan Sun, Qiaoyan Wen, Hua Zhang, and Zhengping Jin
Direct Solution of the 7 parameters transformation problem
Amir Hashemi, Mahzad Kalantari, and Michel Kasser
Cryptanalysis of a certificateless aggregate signature scheme for mobile computation
Muhammad Khurram Khan and Debiao He
Perfect Snapping: An Accurate and Efficient Interactive Image segmentation Algorithm
Qingsong Zhu, Guanzheng Liu, Zhanyong Mei, Qi Li, Yaoqin Xie, and Lei Wang
Observation, Characterization and Modeling of Memristor Current Spikes
Ella Gale, Ben de Lacy Costello, and Andrew Adamatzky
Absolute Tauberian constants for H-J Hausdorff matrices
F. Aydin Akgun and B. E. Rhoades
Chaos synchronization of complex R?ssler system
Ahmed A. M. Farghaly
Semilinear hyperbolic boundary value problem for linear elasticity equations
Rahmoune Abita and Benabderrahmane Benyattou
A Characterization of the Class of Statistically Pre-Cauchy Double Sequences of Fuzzy Numbers
Hemen Dutta
Series Solutions of Magnetohydrodynamic Peristaltic Flow of a Jeffrey Fluid in Eccentric Cylinders
R. Ellahi, A. Riaz, S. Nadeem, and M. Mushtaq
A Comparative Study on the Algorithms for a Generalized Josephus Problem
Lei Wang and Xiaodong Wang
Applying Residual Control Charts to Identify the False Alarms in a TFT-LCD Manufacturing Process
Yuehjen E. Shao and Yini Lin
A Fuzzy Collaborative Forecasting Approach for WIP Level Estimation in a Wafer Fabrication Factory
Toly Chen et al
Enhanced Rule Induction Algorithm for Customer Relationship Management
Prabha Dhandayudam and Ilango Krishnamurthi
Real-time Subsurface Scattering for Particle-based fluids using Finite Volume Method
Kyung-Kyu Kang and Dongho Kim
A Combined MLE and Generalized P Chart Approach to Estimate the Change Point of a Multinomial Process
Chia-Ding Hou, Yuehjen E. Shao, and Sheng Huang
Study the Behavior of Vortex-Antivortex Bundles in He II
Sultan Z. Alamri
A Multilevel Control Iterative Method for Nonlinear Partial Different Equations
Xiaoyan Deng and Hong Gao
SLOWING LIGHT CONTROL FOR A SOLITON-PAIR
N. Boutabba and H. Eleuch
Identity Concealment of Brain Images by Masking
Ruoyu Du and Hyo Jong Lee
Modeling of a Power Amplifier for Digital Pre-distortion Applications using Simplified Complex Memory Polynomial
Ruchi Pasricha and Sanjay Sharma
A Parameter-uniform Method for Two Parameters Singularly Perturbed Boundary Value Problems via Asymptotic Expansion
D. Kumar, A. S. Yadaw, and M. K. Kadalbajoo
Mathematical Models Of Polimerization Processes
Aiman Ospanova,; Meruyert Berdiyeva; and Tamara Zhukabayeva
Global exponential stability for a class of impulsive BAM neural networks with distributed delays
I. M. Stamova, G. Tr. Stamov, and J. O. Alzabut
Some New Classes of Quasi Split Feasibility Problems
Muhammad Aslam Noor and Khalida Inayat Noor
Large Scale Linear Programming in the Windows and Linux computer operating systems
Saeed Ketabchi, Hossein Moosaei, Hossein Sahleh, and Mohammad Hedayati
Global Error Minimization method for nonlinear oscillators with highly nonlinearity
Muhammad Aslam Noor, Waseem Asghar Khan, and Muhammad Arif
Fuzzy Ontology for Distributed Document Clustering based on Genetic Algorithm
M. Thangamani and P. Thangaraj
Fractional Riccati Equation Rational Expansion Method For Fractional Differential Equations
Yongfeng Zhang and Qinghua Feng
Cryptanalysis of a Password-based Group Key Exchange Protocol Using Secret Sharing
Ruxandra F. Olimid
Robust FHPD Features from Speech Harmonic Analysis for Speaker Identification
Shuiping Wang, Zhenmin Tang, Ye Jiang, and Ying Chen
Modeling and Simulation of the Artificial Stock Market Trading System
Jinchuan Ke and Yuan Chen
Distributed Video Coding Based on Multiple-source Correlation Model
Linbo Qing, Xianfeng Ou, Xiaohai He, and Rui Lv
Guaranteed Cost Control for Nonlinear Singular System with Time Delays Using T-S Fuzzy Model
Junsheng Ren and Xianku Zhang
Description of System Fault Behavior Model Based on Polychromatic Sets
Guangyan Zhao, Gang Zhao, Yufeng Sun, and Weiwei Hu