Editorial Board
A new super-memory gradient method with curve search rule
Numerical studies on the split-step finite difference method for nonlinear Schrödinger equations
A computer implementation of the Push-and-Pull algorithm and its computational comparison with LP simplex method
Numerical study of natural convection heat transfer with variable viscosity and thermal radiation from a cone and wedge in porous media
On numerical solutions of one-dimensional nonlinear Burgers’ equation and convergence of the decomposition method
A numerical method for solving a system of nonautonomous linear ordinary differential equations
A numerical solution of Burgers’ equation by time discretization of Adomian’s decomposition method
Cryptanalysis of some signature schemes with message recovery
Pseudospectral method for numerical solution of DAEs with an error estimation
Biomathematical analysis and extension of the new class of epidemic models proposed by Satsuma et al. (2004)
A user friendly remote authentication scheme with smart cards against impersonation attacks
Fuzzy stock selection using a new fuzzy ranking and weighting algorithm
Numerical analysis of dynamic problems: an alternative integration
A two-dimensional thermoelasticity problem for thermomechanical shock with two relaxation times
A hybrid method for solving stochastic job shop scheduling problems
An improvement on Yang et al.’s password authentication schemes
An iterative goal programming approach for solving fuzzy multiobjective integer linear programming problems
Cryptanalysis of Zhang-Xiao’s multisignature scheme for specified group of verifiers
On the numerical solution of stiff systems
Computations of multi-resultant with mechanization
An enhanced user authentication scheme for multi-server Internet services
Numerical solution of the generalized Burger’s equation via spectral/spline methods
Cryptanalysis of the modified authenticated key agreement scheme
Approximate solution of periodic Sturm–Liouville problems with Chebyshev collocation method
Computations of shallow water equations with high-order central-upwind schemes on triangular meshes
Numerical solution of Volterra integro-differential equations by the Tau method with the Chebyshev and Legendre bases
On the directional entropy of Z2-actions generated by additive cellular automata
The Camassa–Holm–KP equations with compact and noncompact travelling wave solutions
The tanh method for a reliable treatment of the K(n, n) and the KP(n, n) equations and its variants
Exponential methods for one-dimensional reaction–diffusion equations
Certain families of series associated with the Hurwitz–Lerch Zeta function
A high velocity plate penetration hole diameter relationship based on late time stagnation point flow concepts
New hysteresis operators with applications to counterterrorism
The method of angled derivatives
An E-based splitting method with a non-matching grid for eddy current equations with discontinuous coefficients
The qualitative behavior of solutions of a nonlinear difference equation
Models and algorithm for stochastic shortest path problem
Some sufficient conditions for exponential stability of linear neutral functional differential equations
The GN-authenticated key agreement
Oscillation results for matrix differential systems with damping
Non-negative solutions of ODEs
A two-step Adomian decomposition method
On the representation of k-generalized Fibonacci and Lucas numbers
The globally bi-3* and hyper bi-3* connectedness of the spider web networks
A new formula for computing implied volatility
DNA solution of integer linear programming
Vandermonde systems on Gauss–Lobatto Chebyshev nodes
Extended Newton’s method for a system of nonlinear equations by modified Adomian decomposition method
Converting normal DLP-based signatures into blind
One private-key for all DL-based cryptosystems
A low computational cost numerical method for solving mixed diffusion problems
Convergence of Gauss–Newton’s method and uniqueness of the solution
Numerical solutions of the classical Blasius flat-plate problem
An iterative method for the least squares symmetric solution of the linear matrix equation AXB = C
Security of Pon–Lu–Jeng’s Meta-He digital signature schemes
Erratum to “On stability of discrete-time interval matrices” [Applied Mathematics and Computation 152 (1) (2004) 163–167]