Applied Mathematics & Information Sciences
Mar. 2014
Articles
First-Level Transitivity Rule Method for Filling in Incomplete Pair-Wise Comparison Matrices in the Analytic Hierarchy Process
Bojan Srdjevic, Zorica Srdjevic, and Bosko Blagojevic
A Thermostatted Kinetic Framework with Particle Refuge for the Modeling of Tumors Hiding
Carlo Bianca, Christian Dogbe, and Luca Guerrini
Solitons, Shock Waves and Conservation Laws of Rosenau-KdV-RLW Equation with Power Law Nonlinearity
Polina Razborova, Bouthina Ahmed, and Anjan Biswas
On Global Attractors for a Class of Parabolic Problems
Rodiak Figueroa-L?pez and German Lozada-Cruz
Hill Cipher Modification based on Pseudo-Random Eigenvalues
Ahmed Mahmoud and Alexander Chefranov
Point Multiplication using Integer Sub-Decomposition for Elliptic Curve Cryptography
Ruma Kareem K. Ajeena and Hailiza Kamarulhaili
Some Classes of k-Uniformly Functions with Bounded Radius Rotation
Khalida Inayat Noor, Rabia Fayyaz, and Muhammad Aslam Noor
A Chebyshev-Gauss-Radau Scheme For Nonlinear Hyperbolic System Of First Order
E. H. Doha, A. H. Bhrawy, R. M. Hafez, and M. A. Abdelkawy
Design for Generating Chaos from a Class of Switching Linear Systems
Zhang Yuping, Zhu Hong, and Zeng Yong
Improved Approach to Global Localization based on Odometry Error Modeling for Mobile Robots
Jingdong Yang and Jinghui Yang
Decoupled Nominal 2-D Direction-of -Arrival Estimation Algorithm for Coherently Distributed Source
Yinghua Han, Jinkuan Wang, and Qiang Zhao
Identification Recovery Scheme using Quick Response (QR) Code and Watermarking Technique
Ji-Hong Chen, Wen-Yuan Chen, and Chin-Hsing Chen
Sensor Node Deployment in Wireless Sensor Networks based on Ionic Bond-Directed Particle Swarm Optimization
Haiping Huang
Geometrically Relative Convex Functions
Muhammad Aslam Noor, Khalida Inayat Noor, and Muhammad Uzair Awan
EEMD-Based Speaker Automatic Emotional Recognition in Chinese Mandarin
Yuqiang Qin and Yudong Qi
Research on Effective and Intelligent Resource Management in Internet Computing
FuFang Li, Dongqing Xie, Deyu Qi, Guowen Xie, Wenbin Chen, and Lingxi Peng
Efficient Chosen-Ciphtertext Secure Public Key Encryption Scheme From Lattice Assumption
Fenghe Wang, Chunxiao Wang, and Yupu Hu
Enhancing MLP Performance in Intrusion Detection using Optimal Feature Subset Selection based on Genetic Principal Components
Iftikhar Ahmad
An Expansion Method Dealing with Spatial Incompleteness of Measured Mode Shapes of Beam Structures
Liu Fushun, Chen Wenwen, and Wang Weiying
A Novel Approach to Generate the Property for Web Service Verification from Threat-Driven Model
Yonghua Zhu and Honghao Gao
Soft Generalized Closed Sets with Respect to an Ideal in Soft Topological Spaces
H. I. Mustafa and F. M. Sleim
Generalized Upper Bound of Agreement Probability for Extracting Common Random Bits From Correlated Sources
Young-Sik Kim and Dae-Woon Lim
Recognition of Concurrent Control Chart Patterns by Integrating ICA and SVM
Chi-Jie Lu, Yuehjen E. Shao, and Chin-Chan Li
An Analytical Security Model for Existing Software Systems
Ayaz Isazadeh, Islam Elgedawy, Jaber Karimpour, and Habib Izadkhah
A New Optimized Symmetric Embedded Predictor- Corrector Method (EPCM) for Initial-Value Problems with Oscillatory Solutions
G. A. Panopoulos and T. E. Simos
Characterizations of Regular Semigroups
Bingxue Yao
Feature of Statistical Projection Algorithm-based Image Retrieval
Xiaofei Zheng, Zhe Gao, and Wei Luo
Enhancement of Atom-Field Transfer of Coherence in a Two-Photon Micromaser Assisted by a Classical Field
A. F. Gomes and A. Vidiella-Barranco
Towards a UML Profile to Relational Database Modeling
Chih-Min Lo and Hsiu-Yen Hung
Image Retrieval based on the Multiwavelets Texture-Spatial Features
An Zhiyong, Li jinjiang, Zhao feng, and Guo jie
Artificial Immune Algorithm for Solving Fixed Charge Transportation Problem
Khalid M. Altassan, Mahmoud M. El-Sherbiny, and Ahmed D. Abid
The Effect Evaluation of Density Estimation through Non-Gaussian Measurement
Feng Zhao, Zhiyong An, and Hailan Jiang
Image Sand Style Painting Algorithm
Fan Hui, Chen Zheng, and Li Jinjiang
Analysis of Stakeholders’ Behaviour Depending on Time in Virtual Learning Environment
Michal Munk and Martin Drl?k
Applied Study on Image Retrievals based on Statistics Projection Algorithm and Robert Algorithm
Xiaofei Zheng, Zhe Gao, and Enping Liu
Weight Analysis based on ANP and QFD in Software Quality Evaluation
Kewen Li, Yu Zhang, and Wenying Liu
MCR-Miner: Maximal Confident Association Rules Miner Algorithm for Up/Down-Expressed Genes
Wael Zakaria, Yasser Kotb, and Fayed Ghaleb
The DEA Game Cross-efficiency Model for Supplier Selection Problem under Competition
Ruimin Ma, Lifei Yao, Maozhu Jin, and Peiyu Ren
An Effective Heuristic Algorithm for Robust Supply Chain Network Design under Uncertainty
Maozhu Jin, Ruimin Ma, Lifei Yao, and Peiyu Ren
Optimal Degree Estimation of the Determinant of a Polynomial Matrix
Dimitris Varsamis and Nicholas Karampetakis
An Information Security Threat Assessment Model based on Bayesian Network and OWA Operator
Kehe Wu and Shichao Ye
A Novel Fractal Block Coding Method by Using New Shape-based Descriptor
Hsiao-Wen Tin, Shao-Wei Leu, Hiroyuki Sasaki, and Shun-Hsyung Chang
TIN-DS/AHP: An Intelligent Method for Group Multiple Attribute Decision Making
Yuanwei Du, Chen Han, Youguo Jing, and Jing Liu
A New Synchronization Algorithm for Grid-Connected Inverters
Xiaorui Guo and Jifeng Guo
Reliability-Aware Energy Optimization Algorithm for Network-on-Chip with Voltage-Scalable Links
Xiaona Xie, Qingxin Zhu, and Zhengwei Chang
Convergence Rate of Coefficient Regularized Kernel-based Learning Algorithms
Sheng Baohuai, Ye Peixin, and Yu Wangke
CO-OFDM Technology Long Distance Transmission System
Feng Xianjie and Li Yinfeng
Recognition of Acoustic Emission Signal based on the Algorithms of TDNN and GMM
Aidong Deng, Hao Cao, Hang Tong, Li Zhao, and Kang Qin
Multivariate Analysis of Variance Applied to 3G Mobile Market Segmentation : The Innovator Theory
Ying-Chiang Cho and Jen-Yi Pan
Fuzzy Soft Gamma Semigroups
Muhammad Akram, J. Kavikumar, and Azme Bin Khamis