Sciweavers

AMC
2005
132views more  AMC 2005»
13 years 11 months ago
Higher order isoparametric finite element solution of Stokes flow
A finite element method of the penalization type, using higher order shape functions with rectangular elements, is presented for the solution of the Stokes flow. The fluid is visc...
R. Eid
AMC
2005
110views more  AMC 2005»
13 years 11 months ago
Three-dimensional finite element analysis of soil interaction with a rigid wheel
R. C. Chiroux, W. A. Foster Jr., C. E. Johnson, S....
AMC
2005
112views more  AMC 2005»
13 years 11 months ago
Time-accurate solutions of Korteweg-de Vries equation using wavelet Galerkin method
In this study we propose a space and time-accurate numerical method for Korteweg
B. V. Rathish Kumar, Mani Mehra
AMC
2005
154views more  AMC 2005»
13 years 11 months ago
An improvement of the Yang-Shieh password authentication schemes
Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-ba...
Chou Chen Yang, Ren-Chiun Wang, Ting Yi Chang
AMC
2005
125views more  AMC 2005»
13 years 11 months ago
A new symbolic computation for formal integration with exact power series
This paper describes a new symbolic algorithm for formal integration of a class of functions in the context of exact power series by using generalized hypergeometric series and co...
Onur Kiymaz, Seref Mirasyedioglu
AMC
2005
117views more  AMC 2005»
13 years 11 months ago
Teleonomic entropy: measuring the phase-space of end-directed systems
We introduce a novel way of measuring the entropy of a set of values undergoing changes. Such a measure becomes useful when analyzing the temporal development of an algorithm desi...
Alexander Pudmenzky
AMC
2005
116views more  AMC 2005»
13 years 11 months ago
An iterative method for functional differential equations
A suitable periodic boundary conditions for a functional differential equations _x
Mustapha Yebdri, Sidi Mohammed Bouguima, Ovide Ari...
AMC
2005
124views more  AMC 2005»
13 years 11 months ago
The security of a strong proxy signature scheme with proxy signer privacy protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. const...
Narn-Yih Lee, Ming-Feng Lee
AMC
2005
178views more  AMC 2005»
13 years 11 months ago
Color image segmentation based on three levels of texture statistical evaluation
In this paper a new and efficient supervised method for color image segmentation is presented. This method improves a part of the automatic extraction problem. The basic technique...
Juan B. Mena, José A. Malpica