Applied Mathematics & Information Sciences
Mar. 2015
Articles
SPET Algorithm: Stop and Proximity Episodes in Trajectories
Francisco Moreno, Anderson Casta?o, and Francisco Javier de Cos Juez
Multiple Attacks on Authentication Protocols for Low-Cost RFID Tags
Zeeshan Bilal, Keith Martin, and Qasim Saeed
An Abductive Framework for Knowledge Base Dynamics
Radhakrishnan Delhibabu
An Alternative Solution Technique of the JIT Lot-Splitting Model for Supply Chain Management
Kun-Jen Chung, Tien-Yu Lin, and H. M. Srivastava
A Class of Extended One-Step Methods for Solving Delay Differential Equations
F. Ibrahim, A. A. Salama, and S. Turek
Stability Analysis of the Beddington Model with Allee Effect
Unal Ufuktepe, Sinan Kapçak, and Olcay Akman
An Axiomatic Characterization of Generalized Entropies under Analyticity Condition
Velimir M. Ilić and Miomir S. Stanković
Modeling of the Selecting Optimum Cross Section of Open Canals
E. A. Nysanov, S. D Kurakbayeva, Zh. R. Umarova, S. B. Botayeva, and Z. A. Makhanova
Towards Human-like Bimanual Movements in Anthropomorphic Robots: A Nonlinear Optimization Approach
E. Costa e Silva, M. F. Costa, J .P. Ara?jo, D. Machado, L. Louro, and W. Erlhagen
Conservation of the Cylindrical and Elliptic Cylindrical K-P Equations
Joseph Boon Zik Hong, K. Fakhar, S. Ahmad, and A. H. Kara
A Retrial Inventory System with Impatient Customers
V. S. S. Yadavalli, N. Anbazhaga, and K. Jeganathan
Kumaraswamy Modified Inverse Weibull Distribution: Theory and Application
Gokarna Aryal and Ibrahim Elbatal
Evolution of Translation Surfaces in Euclidean 3-Space E3
H. N. Abd-Ellah
PVIDSS: Developing a WSN-based Irrigation Decision Support System (IDSS) for Viticulture in Protected Area, Northern China
ZHANG Xiaoshuan, WEN Qian, TIAN Dong, and HU Jinyou
Research on Nonlinear Robust Control based on the Power Consumption Efficiency Model of Asynchronous Motor
Jiangyun Li and Rui Li
Noise Tracking Algorithm for Speech Enhancement
M. Kalamani, S. Valarmathy, and M. Krishnamoorthi
Solving Multiple Traveling Salesman Problem using the Gravitational Emulation Local Search Algorithm
Ali Shokouhi Rostami, Farahnaz Mohanna, Hengameh Keshavarz, and Ali Asghar Rahmani Hosseinabadi
Key Management Mechanism for Authentication Security in Wireless Sensor Network
Ying Wang, Xinguang Peng, and Jing Bian
Monte Carlo Simplification Model for Traveling Salesman Problem
Dong WANG and Dong-mei LIN
Modelling and Simulation of the Effect of Air Damping on the Frequency and Quality factor of a CMOS-MEMS Resonator
J. O. Dennis, A. Y. Ahmed, M. H. Md. Khir, and A. A. S. Rabih
Analysis and Control of a Three-Dimensional Autonomous Chaotic System
Abdollah Gholizadeh, Hassan Saberi Nik, and Amin Jajarmi
The Master Manipulator Control System in a Master-Slave Robot based on Trinocular Stereo Vision
Qiong Liu, LeiLei Cao, Jiang Chen, and ZhaoXia He
Divisible On-Line/Off-Line Proxy Re-Signature
Xiaodong Yang, Chunmei Li, Yan Li, Sian Zhou, and Caifen Wang
An Integrated Approach based on Markov Chain and Cellular Automata to Simulation of Urban Land Use Changes
Jiejun Huang, Yanyan Wu, Ting Gao, Yunjun Zhan, and Wei Cui
High Speed Motion Control System With Predictive Observer and Its Parameters Optimization
Lei Zhou, Jiangang Li, Zexiang Li, and Lanhui Fu
Neural Network PID Control based Scheduling Mechanism for Cloud Computing
Xiaoqi Xing, Bin Liu, and Dongyi Ling
Study on Traffic Current of Lane Reduction Bottleneck under Open Boundary Condition
Zhipeng Li, Run Zhang, Shangzhi Xu, and Yeqing Qian
Error Correcting Codes in Wireless Sensor Networks: An Energy Perspective
Nabil Ali Alrajeh, Umair Marwat, Bilal Shams, and Syed Saddam Hussain Shah
On Some Subclasses of Analytic Functions Defined by Fractional Derivative in the Conic Regions
Khalida Inayat Noor, Qazi Zahoor Ahmad, and Muhammad Aslam Noor
Applications of First Integral Method to Some Complex Nonlinear Evolution Systems
Marwan Alquran, Qutaibeh Katatbeh, and Banan Al-Shrida
Some Fixed Point Theorems for Symmetric Hausdorff Function on Hausdorff Spaces
Vishal Gupta, Hassen Aydi, and Naveen Mani
A Convenient Ready-to-Use Algorithm for a Conditional Quantile Estimator
Piotr Kulczycki, Małgorzata Charytanowicz, and Antoni Leon Dawidowicz
Complete Solutions for a Combinatorial Puzzle in Linear Time and Its Computer Implementation
Daxin Zhu, Yingjie Wu, Lei Wang, and Xiaodong Wang
A Framework and Decision Rules for Emergency Medical Service Scheduling DSS
Lu Zhen, Shaopu Sheng, Zhenhua Xie, and Kai Wang
VMs Placement Strategy based on Distributed Parallel Ant Colony Optimization Algorithm
Gaochao Xu, Yushuang Dong, and Xiaodong Fu
FL-LAB v2: Design and Development of an Easy-to-Use, Interactive Fuzzy Logic Control Software System
Utku Kose and Omer Deperlioglu
License Plate State Recognition based on Logo Matching and State Name String Classification
Zhongyan Liang, Sanyuan Zhang, and Xiuzi Ye
Computer Science Approach to Structural Meta Software Engineering and Operational Meta Software Engineering
Durgesh Samadhiya and Wen-Chih Chang
A Genetic Algorithm to Solve the Subset Sum Problem based on Parallel Computing
Lei Li, Kai Zhao, and Zuwen Ji
Thrust for Permanent Magnet Linear Synchronous Motor
Hengkun Liu and Hu Cheng
Model Updating and Damage Detection using Direct Mode Shape Expansion to Dealing with Spatial Incompleteness
Liu Fushun, Wang Weiying, and Wang Shuqing
Non-Standard Crank-Nicholson Method for Solving the Variable Order Fractional Cable Equation
N. H. Sweilam and T. A. Assiri
A Note on Certain Qualitative Properties of a Second Order Linear Differential System
Cemil TUNC and Osman TUNC
Estimating the Systemic Risk of China’s Banking Industries based on Merton Model
Yajie Wang, Xiaoliang Shan, and Junqiong Geng
A Real-Field Public Key Cryptosystem based on Sparse Recovery
Zaixing HE, Xinyue ZHAO, and Shuyou ZHANG
A Weighted-Path-Following Interior-Point Algorithm for Second-Order Cone Optimization
Jingyong Tang, Li Dong, Liang Fang, and Jinchuan Zhou
A Uniqueness Theorem for a Sturm-Liouville Equation with Spectral Parameter in Boundary Conditions
Khanlar R. Mamedov and F. Ayca Cetinkaya
Data Protection for Computer Forensics using Cryptographic Mechanisms
Tzong-Sun Wu and Han-Yu Lin
Fault Diagnosis of Power Transformers using Kernel based Extreme Learning Machine with Particle Swarm Optimization
Liwei Zhang and Jinsha Yuan
Numerical Simulation of Acoustic Problems with High Wavenumbers
Fuzhang Wang and Juan Zhang
Passive Forgery Detection for JPEG Compressed Image based on Block Size Estimation and Consistency Analysis
Cheng-Shian Lin and Jyh-Jong Tsay
Study on Optimum Line Configuration for Location Model in Computer Vision
Lijuan Qin, Ting Wang, Xiaofang Liu, Chen Yao, Yulan Hu, and Yue Huang
A Probabilistic Framework for Robust Face Detection
Mourad Ahmed, M. Hassaballah, Yasser Salama Hassan, A. H. Abd-Ellah, and A. S. Abdel Rady
Entropy based Redundancy Allocation in Series-Parallel Systems with Choices of a Redundancy Strategy and Component Type: A Multi-Objective Model
Roya Soltani, Seyed Jafar Sadjadi, and Reza Tavakkoli-Moghaddam
Transmitted Torque Analysis of a Magnetic Gear Mechanism with Rectangular Magnets
Yi-Chang Wu and Chih-Wen Wang
Modeling and Resource Scheduling of Real-Time Unsplittable Data Transfers
Mustafa Müjdat Atanak, Atakan Doğan, and Mustafa Bayram