At the fourth ACM conference on electronic commerce (EC'03), S. Han, K.Y. Yeung and J. Wang proposed an ID-based confirmer signature scheme using pairings (actually, this is a...
In this paper, solving a cell formation (CF) problem in dynamic condition is going to be discussed by using some traditional metaheuristic methods such as genetic algorithm (GA), ...
Reza Tavakkoli-Moghaddam, M. B. Aryanezhad, Nima S...
In 2000, Sun proposed an efficient remote user authentication scheme using smart cards without requiring a password table. However, the password of a user is an un-human lengthy p...
In this paper, we present an application of 0-1 linear programming problem in the indentification of the nondominated paths on a network. To find efficient paths, an adaptationof t...
Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N...
The power hazard function is defined by h(t) = atk . In this investigation, we use the least squares type estimation to estimate the parameter a when k is known, the parameter k w...
We solve a Laplacian problem over an L-shaped domain using a singular function boundary integral method as well as the p/hp finite element method. In the former method, the soluti...
Financial options whose payoff depends critically on historical prices are called pathdependent options. Their prices are usually harder to calculate than options whose prices do ...