Vol 5, No 4 (2016)

Table of Contents


Some attacks of an encryption system based on the word problem in a monoid

Nacer Ghadbane, Douadi Mihoubi Pages: 158-161

DOI: 10.14419/ijamr.v5i4.6204

Preliminary test shrinkage estimators for the shape parameter of generalized exponential distribution

Abbas Najim Salman, Rana Hadi Pages: 162-166

DOI: 10.14419/ijamr.v5i4.6573

Cryptanalysis on prime power RSA modulus of the form \(N = p^r q\)

Muhammad Rezal Kamel Ariffin, Sadiq Shehu Pages: 167-175

DOI: 10.14419/ijamr.v5i4.6494

Fuzzy logic application in the evaluation of performance of a prototype vehicle powered from solar energy and water electrolysis process

Marcos dos Santos, Bruna Russo Bahiana, Marcone Freitas dos Reis, Ernesto Rademaker Martins, Fabrício da Costa Dias Pages: 176-181

DOI: 10.14419/ijamr.v5i4.6720

An improvement of H. Wang preconditioner for L-matrices

Hamideh Nasabzadeh Pages: 182-186

DOI: 10.14419/ijamr.v5i4.5371

Solving linear two-dimensional Fredholm integral equations system by triangular functions

Elias Hengamian Asl, Jafar Nadjafi Pages: 187-191

DOI: 10.14419/ijamr.v5i4.6174

Solving volterra integral equation via nonlinear programming

Jamal Othman Pages: 192-196

DOI: 10.14419/ijamr.v5i4.6724

On common fixed points in generalized Menger spaces

Salwa Abed, Hadeel Hussein Luaibi Pages: 197-201

DOI: 10.14419/ijamr.v5i4.6721

A numerical method based on explicit finite difference for solving fractional hyperbolic PDE’s

Abdulkafi Saeed Pages: 202-205

DOI: 10.14419/ijamr.v5i4.6887

Finite volume discretisation for the one-dimensional convection diffusion-dissipation equation

Bienvenu ONDAMI Pages: 206-208

DOI: 10.14419/ijamr.v5i4.6752

Copyright © 2022 Science Publishing Corporation Inc. All rights reserved.