•  
  •  
 

Applied Mathematics & Information Sciences

Mar. 2017

Articles

PDF

An Advanced Security Event Visualization Method for Identifying Real Cyber Attacks
Jungsuk Song, Takayuki Itoh, GilHa Park, and Hiroki Takakura

PDF

On a Functional Equation Arising from a Network Model
El-Sayed El-Hady, Wolfgang Forg-Rob, and Hamed Nassar

PDF

Some New Generalized Jensen and Hermite-Hadamard Inequalities for Operator h−Convex Functions
Miguel Vivas Cortez, Jorge E. Hern´andez H., and Luis Antonio Azocar

PDF

Numerical Model of Heat Transfer Coefficient in Hot Stamping Process
Mohd Ali Hanafiah Shaharudin and Zahari Taha

PDF

Blending Type Approximation by Bivariate BernsteinKantorovich operators
Sheetal Deshwal, Nurhayat Ispir, and P. N. Agrawal

PDF

A characterization of Jordan left ∗-centralizers in rings with involution
Adel Alahamdi, Husain Alhazmi, Shakir Ali, and Abdul Nadim Khan

PDF

Fuzzy Logic based Efficient Multipath Routing for Mobile Adhoc Networks
K. Vinoth Kumar, T. Jaya Sankar, M. Prabhakaran, and V. Srinivasan

PDF

A New Hybrid Multilevel Inverter Topology for Medium and High Voltage Applications
P. Vijayarajan, A. Shunmugalatha, and M. A. Jagabar Sathik

PDF

Some Contributions of Congruence Relations on Lattice of Fuzzy ℓ-ideals
P. Bharathi, J. Vimala, L. Vijayalakshmi, and Arockia Reeta

PDF

Investigation of High Temperature Cyclic Pressurization of Titanium Ducts
M. Karthigairajan, S. Mohanamurugan, P. K. Nagarajan, and R. Krishnaraj

PDF

Simulation Analysis of Temperature Field and Its Influence Factors of the New Structure Ladle
Bowen Luo, Gongfa Li, Jianyi Kong, Guozhang Jiang, Ying Sun, and Ze Liu

PDF

Simulation Analysis of Stress Distribution and Its Influence Factors of the New Structure Ladle
Wentao Cheng, Ying Sun, Gongfa Li, Jianyi Kong, Guozhang Jiang, and Zhe Li

PDF

Some Explicit Formulas for the Frobenius-Euler Polynomials of Higher Order
H. M. Srivastava, Mohamed Amine Boutiche, and Mourad Rahmani