• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computational Mathematics Journas Latest Articles

Computational Mathematics Research Articles

On computing of arbitrary positive integer powers for one type of odd order symmetric circulant matrices-I
Fulltext Access 5 Pages 2005
Author Index to Volume 164
Fulltext Access 5 Pages 2005
A new blind signature based on the discrete logarithm problem for untraceability
Fulltext Access 5 Pages 2005
On the unlinkability of randomization-enhanced Chaum's blind signature scheme
Fulltext Access 5 Pages 2005
Author Index to Volume 160
Fulltext Access 5 Pages 2005
On a convection-diffusion problem with a weak layer
Fulltext Access 5 Pages 2005
An iterative method for functional differential equations
Fulltext Access 5 Pages 2005
Preliminary test estimation in the two parameter exponential distribution with time censored data
Fulltext Access 5 Pages 2005
Numerical implementation of Adomian decomposition method for linear Volterra integral equations of the second kind
Fulltext Access 5 Pages 2005
Maximum probability/entropy translating of contiguous categorical observations into frequencies
Fulltext Access 5 Pages 2005
A modified formula of ancient Chinese algorithm by the homotopy continuation technique
Fulltext Access 5 Pages 2005
On the traceability on RSA-based partially signature with low computation
Fulltext Access 5 Pages 2005
A note on the reducibility of special infinite series
Fulltext Access 5 Pages 2005
Efficient on-line electronic checks
Fulltext Access 5 Pages 2005
Improvement of Lee and Lee's authenticated key agreement scheme
Fulltext Access 5 Pages 2005
On a class of quadratically convergent iteration formulae
Fulltext Access 5 Pages 2005
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms
Fulltext Access 5 Pages 2005
On computing of arbitrary positive integer powers for one type of symmetric tridiagonal matrices of even order
Fulltext Access 5 Pages 2005
Jacobian elliptic functions as inverses of an integral
Fulltext Access 5 Pages 2005
Calendar of IMACS Events
Fulltext Access 5 Pages 2005
Author index of volume 67
Fulltext Access 5 Pages 2005
IMACS Calendar of Events
Fulltext Access 5 Pages 2005
IMACS Calendar of Events
Fulltext Access 5 Pages 2005
Five-point boundary value problems for third-order differential equations by solution matching
Fulltext Access 5 Pages 2005
Statistical cellular Gaussian scatter density channel model employing a directional antenna for mobile environments
Fulltext Access 5 Pages 2005
High impedance voltage- and current-mode multifunction filters
Fulltext Access 5 Pages 2005
Biography of Olav Njåstad
Fulltext Access 5 Pages 2005
Explicit solutions of the generalized KdV equations with higher order nonlinearity
Fulltext Access 5 Pages 2005
Note on starting the Numerov method more accurately by a hybrid formula of order four for an initial-value problem
Fulltext Access 5 Pages 2005
Accelerated convergence in Newton's method for approximating square roots
Fulltext Access 5 Pages 2005
Recurrence relations for the even and odd characteristic polynomials of a symmetric Toeplitz matrix
Fulltext Access 5 Pages 2005
Two new asymptotic expansions of the ratio of two gamma functions
Fulltext Access 5 Pages 2005
Lanczos' generalized derivative for higher orders
Fulltext Access 5 Pages 2005
A simple estimation for the spectral radius of (block) H-matrices
Fulltext Access 5 Pages 2005
A new semilocal convergence theorem for Newton's method involving twice Fréchet-differentiability at only one point
Fulltext Access 5 Pages 2005
The fundamental group of an oriented surface of genus n with k boundary surfaces
Fulltext Access 5 Pages 2005
On computing of arbitrary positive integer powers for one type of odd order tridiagonal matrices with zero row - I
Fulltext Access 5 Pages 2005
Numerical solutions of the classical Blasius flat-plate problem
Fulltext Access 5 Pages 2005
Cryptanalysis of the modified authenticated key agreement scheme
Fulltext Access 5 Pages 2005
Cryptanalysis of an authenticated encryption scheme using self-certified public keys
Fulltext Access 5 Pages 2005
Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function
Fulltext Access 5 Pages 2005
A composite third order Newton-Steffensen method for solving nonlinear equations
Fulltext Access 5 Pages 2005
Security of Hsu-Wu's authenticated encryption scheme with (t, n) shared verification
Fulltext Access 5 Pages 2005
Off-line password-guessing attacks on the generalized key agreement and password authentication protocol
Fulltext Access 5 Pages 2005
On positive mountain pass solutions for a semilinear elliptic boundary value problem
Fulltext Access 5 Pages 2005
Numerical solution of Hammerstein equations via an interpolation method
Fulltext Access 5 Pages 2005
Security of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems
Fulltext Access 5 Pages 2005
Author Index to Volume
Fulltext Access 5 Pages 2005
Festschrift in honor of Arnold Schönhage
Fulltext Access 5 Pages 2005
On the global asymptotic stability of the difference equation xn=xn-1xn-2+xn-3+axn-1+xn-2xn-3+a
Fulltext Access 5 Pages 2005
On the security of efficient user identification scheme
Fulltext Access 5 Pages 2005
Uniform persistence of asymptotically periodic multispecies competition predator-prey systems with Holling III type functional response
Fulltext Access 5 Pages 2005
Comment on traceability on RSA-based partially signature with low computation
Fulltext Access 5 Pages 2005
A method to construct reflectionless potentials
Fulltext Access 5 Pages 2005
Level set algorithm for solving convex multiplicative programming problems
Fulltext Access 6 Pages 2005
Solving differential equations by decomposition method
Fulltext Access 6 Pages 2005
A new approach to the solution of the prey and predator problem and comparison of the results with the Adomian method
Fulltext Access 6 Pages 2005
A modified goal programming approach for the mean-absolute deviation portfolio optimization model
Fulltext Access 6 Pages 2005
Numerical solution of Fredholm-Volterra integral equation in one dimension with time dependent
Fulltext Access 6 Pages 2005
Complex travelling wave solutions to the KdV and Burgers equations
Fulltext Access 6 Pages 2005
On multiobjective optimization in portfolio management
Fulltext Access 6 Pages 2005
A new computational algorithm for solving periodic tri-diagonal linear systems
Fulltext Access 6 Pages 2005
The admissibility of the LRT for the exponential family model
Fulltext Access 6 Pages 2005
A DEA approach for fair allocation of common revenue
Fulltext Access 6 Pages 2005
Solving second kind integral equations with hybrid Fourier and block-pulse functions
Fulltext Access 6 Pages 2005
A group key agreement protocol from pairings
Fulltext Access 6 Pages 2005
Immunology and immunity against infection: General rules
Fulltext Access 6 Pages 2005
Security of Lu et al.'s proxy-protected signature scheme
Fulltext Access 6 Pages 2005
Integrating first-order differential equations with Liouvillian solutions via quadratures: a semi-algorithmic method
Fulltext Access 6 Pages 2005
Comments on ID-based multi-signature with distinguished signing authorities
Fulltext Access 6 Pages 2005
Remarks on some signature schemes based on factoring and discrete logarithms
Fulltext Access 6 Pages 2005
A comparison theorem for the SOR iterative method
Fulltext Access 6 Pages 2005
A computation method for nonlinear vibration of axially accelerating viscoelastic strings
Fulltext Access 6 Pages 2005
Rebuild of King Fang 40 BC musical scales by He's inequality
Fulltext Access 6 Pages 2005
Improved public key authentication scheme for non-repudiation
Fulltext Access 6 Pages 2005
A study of convergence on the Newton-homotopy continuation method
Fulltext Access 6 Pages 2005
On practical stability of perturbed differential systems
Fulltext Access 6 Pages 2005
Author Index to Volume
Fulltext Access 6 Pages 2005
Superstability of systems
Fulltext Access 6 Pages 2005
A note on determining the number of outliers in a normal sample with unequal variances by least squares procedure
Fulltext Access 6 Pages 2005
New proxy multi-signature scheme
Fulltext Access 6 Pages 2005
Improvement of HWWM-authenticated key agreement protocol
Fulltext Access 6 Pages 2005
An improvement of the Yang-Shieh password authentication schemes
Fulltext Access 6 Pages 2005
On some variants of prisoner's dilemma dynamics
Fulltext Access 6 Pages 2005
Finding the piecewise linear frontier production function in data envelopment analysis
Fulltext Access 6 Pages 2005
Automatic calculation of the fundamental group of an oriented surface of genus n with k boundary surfaces
Fulltext Access 6 Pages 2005
Security of a multisignature scheme for specified group of verifiers
Fulltext Access 6 Pages 2005
On the ergodic properties of certain additive cellular automata over Zm
Fulltext Access 6 Pages 2005
Method of constructing elliptic curve authenticated encryption scheme
Fulltext Access 6 Pages 2005
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
Fulltext Access 6 Pages 2005
Meta-He digital signatures based on factoring and discrete logarithms
Fulltext Access 6 Pages 2005
The solution of two dimensional nonlinear differential equation by the Adomian decomposition method
Fulltext Access 6 Pages 2005
Undesirable factors in efficiency measurement
Fulltext Access 6 Pages 2005
An approximation to the solution of hyperbolic equations by Adomian decomposition method and comparison with characteristics method
Fulltext Access 6 Pages 2005
The security of a strong proxy signature scheme with proxy signer privacy protection
Fulltext Access 6 Pages 2005
Author Index to Volume 161
Fulltext Access 6 Pages 2005
Improvement of signature scheme based on factoring and discrete logarithms
Fulltext Access 6 Pages 2005
Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
Fulltext Access 6 Pages 2005
On computing of arbitrary positive integer powers for one type of even order tridiagonal matrices with zero row-I
Fulltext Access 6 Pages 2005
Exact solutions of multi-component nonlinear Schrödinger and Klein-Gordon equations
Fulltext Access 6 Pages 2005
<< < 571 572 573 574 575 > >>
Related Topics
Finite element method Articles
7439 Papers
Finite element analysis Articles
6203 Papers
Monte Carlo Articles
3162 Papers
Fuzzy logic Articles
2743 Papers
Finite elements Articles
2589 Papers
Complexity Articles
2296 Papers
Linear programming Articles
1748 Papers
Algorithm Articles
1719 Papers
Wavelet transform Articles
1516 Papers
Nonlinear Dynamics Articles
1314 Papers
Parallel computing Articles
1253 Papers
Computer simulations Articles
1253 Papers
Psychometrics Articles
1165 Papers
Cellular automata Articles
1124 Papers
Topology Articles
1108 Papers
Fourier transform Articles
1050 Papers
Markov chain Monte Carlo Articles
787 Papers
Dynamical systems Articles
780 Papers
Wavelet Articles
771 Papers
Deconvolution Articles
770 Papers
Information theory Articles
762 Papers
Laplace transform Articles
639 Papers
Genetic programming Articles
638 Papers
Petri nets Articles
625 Papers
Algebra and Number Theory Articles
Analysis Articles
Applied Mathematics Articles
Computational Mathematics Articles
Control and Optimization Articles
Discrete Mathematics and Combinatorics Articles
Geometry and Topology Articles
Logic Articles
Mathematical Physics Articles
Mathematics (General) Articles
Modelling and Simulation Articles
Numerical Analysis Articles
Statistics and Probability Articles
Theoretical Computer Science Articles
All Topics
Related Journals
Algebra and Number Theory Journals
Analysis Journals
Applied Mathematics Journals
Computational Mathematics Journals
Control and Optimization Journals
Discrete Mathematics and Combinatorics Journals
Geometry and Topology Journals
Logic Journals
Mathematical Physics Journals
Mathematics (General) Journals
Modelling and Simulation Journals
Numerical Analysis Journals
Statistics and Probability Journals
Theoretical Computer Science Journals
Journal of Symbolic Computation Journal
Computational Statistics & Data Analysis Journal
Journal of Algorithms Journal
AEU - International Journal of Electronics and Communications Journal
Computers & Mathematics with Applications Journal
Computer Methods in Applied Mechanics and Engineering Journal
Computers & Structures Journal
Engineering Analysis with Boundary Elements Journal
Finite Elements in Analysis and Design Journal
Computers & Fluids Journal
Mathematical and Computer Modelling Journal
Mathematics and Computers in Simulation Journal
Applied Mathematics Letters Journal
Nonlinear Analysis: Hybrid Systems Journal
Computational Toxicology Journal
Journal of Complexity Journal
Applied Mathematics and Computation Journal
Journal of Computational and Applied Mathematics Journal
Applied Numerical Mathematics Journal
Journal of the Nigerian Mathematical Society Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities