•  
  •  
 

Applied Mathematics & Information Sciences

Sep. 2014

Articles

PDF

Securing Databases by using Diagonal-based Order Preserving Symmetric Encryption
Santi Mart?nez, Josep M. Miret, Rosana Tom?s, and Magda Valls

PDF

Solitons, Cnoidal Waves, Snoidal Waves and Other Solutions to Whitham-Broer-Kaup System
A. H. Bhrawy, M. A. Abdelkawy, E. M. Hilal, A. A. Alshaery, and A. Biswas

PDF

Optimum Design of Parallelogram Five-bar Manipulator for Dexterous Workspace by using ELEMAEF in Differential Evolution
Miguel G. Villarreal-Cervantes, Daniel De la Cruz-Muci?o, and Edgar A. Portilla-Flores

PDF

Fixed Points of Fuzzy Soft Mappings
Mujahid Abbas, Asma Khalid, and Salvador Romaguera

PDF

Extracting Trajectories with the Map Cube Operator
Francisco Moreno, Juan Camilo Alzate, and Jes?s Hern?ndez

PDF

Derivative-Free Iterative Methods for Solving Nonlinear Equations
Farooq Ahmed Shah, Muhammad Aslam Noor, and Moneeza Batool

PDF

A Study of a Fractional-Order Cholera Model
Mohammad Javidi and Bashir Ahmad

PDF

Power Usage Effectiveness Metrics to Measure Efficiency and Performance of Data Centers
Mueen Uddin, Raed Alsaqour, Asadullah Shah, and Tanzila Saba

PDF

HFM: Hybrid File Mapping Algorithm for SSD Space Utilization
Jaechun No, Soo-Mi Choi, Sung-Soon Park, and Cheol-Su Lim

PDF

Unsteady Drainage of Electrically Conducting Power Law Fluid
K. N. Memon, Sher Afzal Khan, S. Islam, Nazir Ahmad Zafar, Syed Feroz Shah, and A. M. Siddiqui

PDF

Soft Semi Compactness via Soft Ideals
A. Kandil, O. A. E. Tantawy, S. A. El-Sheikh, and A. M. Abd El-latif

PDF

On Ideal Convergence of Sequences of Functions in Intuitionistic Fuzzy Normed Spaces
Vatan KARAKAYA, Necip ŞİMŞEK, Müzeyyen ERTURK, and Faik GURSOY

PDF

A Secure Visual Secret Checking of Meaningful Sharing Images
Chin-Ling Chen, Wen-Hu Chen, Chih-Cheng Chen, Yeong-Lin Lai, and Kuo-Kun Tseng

PDF

Relative Homology Groups of Digital Images
Ozgur Ege, Ismet Karaca, and Meltem Erden Ege

PDF

A Hybrid Defense Technique for ISP Against the Distributed Denial of Service Attacks
Young Hoon Moon, Suk Bong Choi, Huy Kang Kim, and Changsok Yoo

PDF

Continuous Turing Machine: Real Function Computability and Iteration Issues
Xiaoliang Chen, Wen Song, Zexia Huang, and Mingwei Tang

PDF

Computing Higher Dimensional Digital Homotopy Groups
Elif Tugce Meric, Tane Vergili, and Ismet Karaca

PDF

Higher Order Close-to-Convex Functions related with Conic Domain
Khalida Inayat Noor and Muhammad Aslam Noor

PDF

Design for Several Hydraulic Parameters of a Quadruped Robot
Xuewen Rong, Yibin Li, Jian Meng, and Bin LI

PDF

Robust Detection and Tracking Algorithm of Multiple Objects in Complex Scenes
Hong-Yu Hu, Zhao-Wei Qu, Zhi-Hui Li, and Qing-Nian Wang

PDF

Developing Acceptance Sampling Plans based on Incapability Index Cpp
Liang-Chyau Sheu, Chi-Huang Yeh, Ching-Ho Yen, and Chia-Hao Chang

PDF

Research on Comprehensive Performance Evaluation of Cultivation Machinery for Tea Garden
Xiao Hongru, Mei Song, Song Zhiyu, Ding Wenqin, and Han Yu

PDF

Topic Model based Collaborative QoS Prediction
Jian Wu, Lichuan Ji, Tingting Liang, and Liang Chen

PDF

A Secure Anonymous E-Voting System based on Discrete Logarithm Problem
Chin-Ling Chen, Yu-Yi Chen, Jinn-Ke Jan, and Chih-Cheng Chen

PDF

Hexi McEliece Public Key Cryptosystem
K. Ilanthenral and K. S. Easwarakumar