0096-3003

Applied Mathematics and Computation (AMC) - Volume 169, Issue 2 论文列表

本期论文列表
The least squares type estimation of the parameters in the power hazard function

Fully developed flow through a porous channel bounded by flat plates

Computational complexities and streamfunction coordinates

Study on the formation of Goertler vortices in natural convection flow over a rotating concave surface

Estimation of component mean lifetimes of a masked system using unclassified system life data

MHD free-convection flow of a non-Newtonian power-law fluid at a stretching surface with a uniform free-stream

On the global behavior of higher order recursive sequences

Effect of dust particles on a ferromagnetic fluid heated and soluted from below saturating a porous medium

An analytic approach to solve multiple solutions of a strongly nonlinear problem

The identification of nondominated and efficient paths on a network

A method for generating all efficient solutions of 0-1 multi-objective linear programming problem

A one-model approach to classification and sensitivity analysis in DEA

Sensitivity and stability analysis in DEA

Sensitivity of efficiency classifications in the inverse DEA models

Undesirable inputs and outputs in DEA models

Solving a special case of conservative problems by Secant-like methods

On a generalized mixture distribution

A new modification of Adomian decomposition method for solving a kind of evolution equation

One-to-one mapping matrix

An application for a modified KdV equation by the decomposition method and finite element method

An efficient nonce-based authentication scheme with key agreement

An algorithm for solving nonlinear singular perturbation problems with mechanization

Security of Lu et al.’s proxy-protected signature scheme

On computing of arbitrary positive integer powers for one type of odd order symmetric circulant matrices—II

Mechanization for solving SPP by reducing order method

Algorithm and mechanization to Cauchy problem of parabolic equation

Parallel algorithms for reduction of a symmetric matrix to tridiagonal form on a shared memory multiprocessor

On the security of a convertible authenticated encryption

Remarks on some signature schemes based on factoring and discrete logarithms

Identity based designated multi-confirmer signature: a new type signature

Population viability in three trophic-level food chains

Droop models of nutrient–plankton interaction with intratrophic predation

Penalty shifting method on calculation of optimal linewise control of dam-detouring osimotic system for concrete dams with heterogemous

Five points of accuracy synthesis of motion generator linkages using Maple-V

Determination of cluster number in clustering microarray data

Comparison between the homotopy analysis method and homotopy perturbation method

A novel hybrid model for portfolio selection

Two provably secure k-out-of-n oblivious transfer schemes

A note on the componentwise perturbation bounds of matrix inverse and linear systems

Designated verifier proxy signature scheme with message recovery

Generalized mathematical model for the solution of mixed-boundary-value elastic problems

A time-stamping protocol for digital watermarking

Practical convertible authenticated encryption schemes using self-certified public keys

A characterization of the convergence of Picard iteration to a fixed point for a continuous mapping and an application

Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem

Fail-stop blind signature scheme design based on pairings

A note on computing matrix–vector products with generalized centrosymmetric (centrohermitian) matrices

Runge–Kutta methods of dynamic iteration for index-2 differential–algebraic equations

PDEPtest: a package for the Painlevé test of nonlinear partial differential equations

Proxy signature scheme using self-certified public keys

On computing of arbitrary positive integer powers for one type of odd order tridiagonal matrices with zero row – I

The distribution models of grazing animals between two grassland resource points

A simplified Green element method solution for a the biharmonic equation and its application to Stokes flows

Improvement on Tzeng et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification

A secure and efficient authentication protocol for anonymous channel in wireless communications

Developing a nondiscretionary model of slacks-based measure in data envelopment analysis

Identity based group-oriented undeniable signature scheme

An efficient convergent lattice algorithm for European Asian options

Author Index to Volume