Back to Main Page

 

Better view with the program Acrobat Reader 5.0 or newer (installation included in this CD-ROM). By pressing CONTROL+F you can search for any scientific topic searching in the titles of the papers as well as in the keywords of the papers.  As one can see, the direction of the search is "down" (by default), but can also be determined the inverse one ("up").

542    Domain decomposition for a singularly perturbed problem with parabolic layers

pp. 5421-5426

       by :   Igor Boglaev, Vic Duoba

Keywords: - Singular perturbation, Convection-diffusion problem, Domain decomposition method, Uniform convergence, Parallel computing


547    sub-Gaussian techniques in proving some strong limit theorems

pp. 5471-5475

       by :   Abolghasem Bozorgnia, Mohammad Amini Dehak

Keywords: - Sub-Gaussian, negative dependence, Strong law of large numbers, Weighted sums, Martingale


548    Simulation Studies on the Performance Characteristics of Multi Priority Dual Queue (MPDQ) with Finite Waiting Room and Non-Preemptive Scheduling

pp. 5481-5486

       by :   Anthony Bedford, Panlop Zeephongsekul

Keywords: - Dual queue, Simulation, Finite queue, Non-preemptive priority under different service regimes, Loss, Utilisation


549    Simulation Studies of Waiting Time Approximation for the Multi Priority Dual Queue (MPDQ) with Finite Waiting Room and Non-Preemptive Scheduling

pp. 5491-5496

       by :   Anthony Bedford, Panlop Zeephongsekul

Keywords: - Dual queue, Simulation, Finite queue, Waiting times, Distribution fits


551    Spectral Theory for Systems of Matrices

pp. 5511-5515

       by :   Brian Jefferies

Keywords: - Eigenvalue, Joint Spectrum, Functional Calculus, Symmetric Hyperbolic System, Clifford Analysis


552    Convergence of Weighted Sums of Random Variables

pp. 5521-5524

       by :   Mohammad-Amini Dehak, Abolghasem Bozorgnia

Keywords: - Weighted sums, Strong law of large numbers, Negative dependence


554    A Formal Model and an Algorithm for Generating the Permutations of a Multiset

pp. 5541-5546

       by :   Vincenzo De Florio, Geert Deconinck

Keywords: - Computational Combinatorics, Algorithms, Number Theory


560    An automatic integration of infinite range integrals involving Bessel functions

pp. 5601-5606

       by :   Feng Su, Takemitsu Hasegawa, Avram Sidi

Keywords: - Automatic integration, Infinite oscillatory integral, Bessel function, Hankel transform, Modified W-transformation, Chebyshev expansion, FFT


562    Exact controllability of Klein-Gordon systems with a time-varying parameter

pp. 5621-5625

       by :   Iwan Pranoto

Keywords: - Exact control, Distributed parameter system, Hilbert uniqueness method, Klein-Gordon


566    Binary distillation control by decoupling controller

pp. 5661-5666

       by :   Sutanto Hadisupadmo, R. J. Widodo, Tatang Hernas Soerawijaya, Harijono A. Tjokronegoro

Keywords: - Distillation control, Computer simulation, Multivariable system, Interactions, Decoupling controller


567    New method for constructing polyphase ZCZ sequence sets

pp. 5671-5675

       by :   Hideyuki Torii, Makoto Nakamura, Naoki Suehiro

Keywords: - Zero correlation zone, Polyphase ZCZ sequences, Perfect sequences, Orthogonal sequences


569    Periodic Sequences Derived from Self-Orthogonal Finite-Length Sequences

pp. 5691-5696

       by :   Yoshihiro Tanada

Keywords: - Self-orthogonal, Finite-length sequence, Periodic sequence, DFT, Convolution, Aperiodic correlation, Even correlation, Odd correlation, Fast signal processing


570    Numerical Approximating the Two Component Becker-Doring Equations

pp. 5701-5706

       by :   Ali Reza Soheili

Keywords: - Coagulation - fragmentation, Becker - Doring


572    An efficient satellite CAS using password-based protocol

pp. 5721-5724

       by :   Youngsoo Kim, Jungchan Na, Seungwon Sohn

Keywords: - Conditional access system, Password-based protocol, Password guessing attack, Session key, Authorization


573    A secure method for transferring active packets

pp. 5731-5734

       by :   Youngsoo Kim, Jungchan Na, Seungwon Sohn

Keywords: - Active networks, Active packets, Active nodes, Executable code, Cryptosystem


574    Optimising Student Learning Through Effective Use of Technology

pp. 5741-5746

       by :   Julie Saunders, Bill Blyth

Keywords: - Teaching, Learning, Technology, Maple, Survey, Response, Attitude


575    A novel approach for radionuclide transport in inhomogeneous crystalline rocks using wavelet Galerkin method

pp. 5751-5756

       by :   Hesham Nasif, Atsushi Neyama, Hiroyuki Umeki, Atsuyuki Suzuki

Keywords: - Wavelets, Geological disposal, Connection coefficients, Compactly supported, Crystalline rock, Engineered barrier system


576    Combined Methods for Approximating Hankel Matrix

pp. 5761-5767

       by :   Suliman Al-Homidan

Keywords: - Alternating projections, Hankel matrix, Filters SQP method least distance functions, Nonsmooth optimization, Positive semi-definite matrix


581    A New Analysis of the AVL Tree Insertion Algorithm

pp. 5811-5816

       by :   Ningping Sun, Ryozo Nakamura, Wenling Sun, Hongbing Zhu, Akio Tada

Keywords: - Analysis of algorithm, AVL tree insertion algorithm, The number of the AVL tree with a given number of nodes and height, Single rotation and double rotation, Rebalancing probability


582    An Analysis of Two Open Problems of AVL Tree Insertion Algorithm

pp. 5821-5826

       by :   Ningping Sun, Ryozo Nakamura, Wenling Sun, Akio Tada

Keywords: - Analysis of algorithm, AVL tree and permutation, AVL tree insertion algorithm, Expected height of tree, Rebalancing probability


583    Solution of bifurcation equations for formation of patterns in the visual cortex of the brain

pp. 5831-5836

       by :   Algis Garliauskas

Keywords: - Bifurcation equation, Stability, Group theory, Visual cortex


584    The strong law of large numbers for pairwise negatively dependent random variables

pp. 5841-5846

       by :   Hamid Reza Nili Sani, Abolghassem Bozorgnia

Keywords: - Strong laws of large numbers, Pairwise negatively dependent, Cesaro uniformly integrable


585    Applications Wavelets in Industry - Patenting Trends

pp. 5851-5856

       by :   Mei Kobayashi

Keywords: - Wavelets, Wavelet Transform, Time-Frequency Analysis, Multiresolution Analysis


586    Quantitative and Qualitative Analysis of Wavelet Galerkin Approach to Solve RadioNuclide Transport in Inhomogeneous Crystalline Rocks

pp. 5861-5866

       by :   Atsushi Neyama, Hesham Nasif, Hiroyuki Umeki, Atsuyuki Suzuki

Keywords: - Wavelet, Geological disposal, Geosphere, Parallel plate, pathways


588    Operators on Lorentz Sequence Space II

pp. 5881-5887

       by :   Rahmatollah Lashkaripour

Keywords: - Operators, Lorentz sequence, Matrix Operators


590    Multilattices via Multisemilattices

pp. 5901-5911

       by :   J. Martínez, G. Gutiérrez, I. P. De Guzman, P. Cordero

Keywords: - Poset, Non-deterministic operators, Multisemilattice, Multilattice, Universal Algebra


592    Algebraic condition for integrable numerical algorithms

pp. 5921-5926

       by :   Toshiaki Itoh

Keywords: - Algebraic finite difference equation, Coherent sheaf, Analytic space, Integrability


593    Stability analysis of discrete time fuzzy systems based on piecewise Lyapunov functions

pp. 5931-5936

       by :   Louis Wang, Gang Feng

Keywords: - Discrete time, Fuzzy systems, Linear matrix inequality, Piecewise Lyapunov function, Stability


594    Controller synthesis of discrete time fuzzy systems based on piecewise Lyapunov functions

pp. 5941-5946

       by :   Louis Wang, Gang Feng

Keywords: - Discrete time, Fuzzy systems, Linear matrix inequality, Piecewise Lyapunov function, Controller synthesis


595    On the independent set of de Bruijn graphs

pp. 5951-5956

       by :   Yosuke Kikuchi, Yukio Shibata

Keywords: - De Bruijn digraphs, Independent set, Cover, Chromatic number, Line graph, Cycle decomposition


596    The security system for response within the border router of the local network that the attacker belongs to

pp. 5961-5963

       by :   Minho Han, Jungchan Na, Sungwon Sohn

Keywords: - Active network, Active packet, Active node, IDS, packet filtering, Detection, Tracing, Response


598    Models Encompassing Hydraulic Jumps in Radial Flows Over a Horizontal Plate

pp. 5981-5986

       by :   A. J. Roberts, D. V. Strunin

Keywords: - Radial Fluid Flow, Hydraulic Jump, Centre Manifold


604    Estimating 3D fibre process anisotropy

pp. 6041-6046

       by :   Marcela Hlawiczkova, Petr Ponizil, Ivan Saxl

Keywords: - Anisotropy, Rose of directions, Zonotope, Fibre process, Prohorov distance


606    An improved nearest neighbour search algorithm based on LAESA

pp. 6061-6065

       by :   Kazuaki Yamaguchi, Yoichi Kondo

Keywords: - Nearest neighbor search, Branch and bound, LAESA, mvp-tree, Distance axiom


607    Discrete Sliding-Mode Adaptive Algorithm For Adaptive Filtering

pp. 6071-6074

       by :   Kah Phooi Seng, Zhihong Man, H. R. Wu

Keywords: - Adaptive filtering, Sliding-mode, Signal processing, Lyapunov stability theory


608    A Complex Lyapunov Theory-based Adaptive Algorithm For Complex Signal Processing

pp. 6081-6084

       by :   Kah Phooi Seng, Zhihong Man, H. R. Wu

Keywords: - Adaptive filtering, Complex signal processing, Lyapunov stability theory


609    Innovations in On-Line Mathematics Education

pp. 6091-6095

       by :   Graham Clarke

Keywords: - On Line Open Learning Discrete Mathematics Education


610    Regular Filter Space

pp. 6101-6106

       by :   Nandita Rath

Keywords: - Filter spaces, C-regular, C-separated, Regular completion, Strict completion


611    Neural-MOS Threshold Gate as a Way to Design On-Chip Learning Neuron Structures

pp. 6111-6115

       by :   Rafail Lashevsky

Keywords: - Neural-MOS structures, nMOS transistors, Artificial neural networks, Analog voltage weight representation, Deviation tolerance


612    The Q method for the Second Order Cone Programming

pp. 6121-6126

       by :   Farid Alizadeh Yu Xia

Keywords: - Second order cone programming, Semidefinite programming, Interior point methods, Jordan algebra


613    How bad a pairing heap might be

pp. 6131-6136

       by :   Amr Elmasry

Keywords: - Algorithms, Data structures, Self-adjusting structures, Trees, Heaps


614    An Algebraic Analysis of Linear Hybrid Systems

pp. 6141-6146

       by :   Zhenyu Yang

Keywords: - Linear hybrid systems, Controllability, Fault-tolerance, Reconfigurability


615    Source Selection in a Distributed Search System

pp. 6151-6156

       by :   Vitaliy Kluev

Keywords: - Search Engine, Distributed System, Metasearch, Query Propagation


616    Applied programming on web-based environment

pp. 6161-6166

       by :   Alexander Vazhenin, Dmitry Vazhenin

Keywords: - WWW-applications, Client/server technology, Visualization of computations and data, Portability, Template manipulating subsystem


617    A fast scheduling algorithm in AND-OR graphs

pp. 6171-6176

       by :   George M. Adelson-Velsky, Alexander Gelbukh, Eugene Levner

Keywords: - Graph theory, AND-OR graphs, Scheduling, Routing, Polynomial algorithms, Complexity


618    A Geometry Curriculum Featuring the Use of Dynamic Computer Software

pp. 6181-6190

       by :   Zhonghong Jiang, Azita Manouchehri, Mary Enderson

Keywords: - Geometry, Technology, Computer, Dynamic software, Preservice mathematics teachers, Mathematical reasoning, Real world application


619    Holistic discretisation illuminates and enhances the numerical modelling of differential equations

pp. 6191-6199

       by :   A. J. Roberts

Keywords: - Subgrid structure, Finite elements, Numerical discretisation, Dynamical systems, Initial conditions, Boundary conditions, Centre manifold theory


620    Monotone Iterative Method and Adaptive Finite Volume Method for Parallel Numerical Simulation of Submicron MOSFET Devices

pp. 6201-6206

       by :   Yiming Li, Cheng-Kai Chen, Pu Chen

Keywords: - Monotone Iterative Method, Finite Volume Method, Adaptive Refinement, Triangular Mesh, Cluster Computing, Drift Diffusion Equations, MOSFET


624    Construction of alpha-valuations of special classes of 2-regular graphs

pp. 6241-6257

       by :   Kourosh Eshghi, Michael Carter

Keywords: - Graph labeling, Graceful labeling, alpha-valuation


627    On the problem of distributing objects in cells with different capacities

pp. 6271-6273

       by :   Ahmad Khonsari, Hamid Sarbazi-Azad

Keywords: - Combinatorics, Distributing objects in cells, Cells with different capacities


632    A new proof for the sequential access theorem for splay trees

pp. 6321-6325

       by :   Amr Elmasry

Keywords: - Algorithms, Data structures, Splay trees, Amortized analysis, Combinatorial problems, Self-adjusting structures


633    A comparison of two teaching methods

pp. 6331-6334

       by :   Alfredo Mendez, Nieves Garcia

Keywords: - Teaching methods, Computers packages, Exploratory Data Analysis, Graphical procedures


634    An experimental study on the use of computers in schools

pp. 6341-6344

       by :   Alfredo Mendez, Carmen Ortiz

Keywords: - Learning styles, Computer assisted learning, Exploratory Data Analysis


635    Wavelet based noise detection and filtering

pp. 6351-6354

       by :   D. S. Bormane, T. R. Sontakke

Keywords: - De-noising, Thresholding, Rejective-filter, Shrinkage, Discretization


640    Intelligent Multi-Agent System for Power System Restoration

pp. 6401-6406

       by :   G. Lambert-Torres, L. E. Borges da Silva, M. A. B. Sobral

Keywords: - Intelligent systems, Power system operation, Restoration, Multi-agents, Multilevel Flow Modeling


641    Modification and Efficient Implementation of the SKHNE Algorithm for Adaptive Data Protection

pp. 6411-6414

       by :   Mairtin O' Droma, Ivan Ganchev

Keywords: - SKHNE algorithm, BCH codes, Error protection, Archives, CD-ROM, DVD


642    Protein folding by hydration aided search of minimum energy

pp. 6421-6426

       by :   Jarmo T. Alander

Keywords: - Fitness landscape, Optimization, Protein folding, Search, Lattice model


643    Evaluation of ZCZ sets on inter-cell interference for cellular AS-CDMA systems

pp. 6431-6436

       by :   Shinya Matsufuji, Kenji Takatsukasa, Noriyoshi Kuroyanagi, Suehiro Naoki

Keywords: - Sequence design, Sequence, Code, Spread spectrum, CDMA, Cellular mobile communication, Interference, Correlation


644    Matrix computations for detecting and visualizing outlier clusters

pp. 6441-6446

       by :   Masaki Aono, Hironori Takeuchi, Hikaru Samukawa, Mei Kobayashi

Keywords: - Cluster, Outlier, Information Retrieval, Data Mining, Covariance Matrix


645    Quantum cohomology ring for hermitian symmetric spaces of type DIII

pp. 6451-6456

       by :   Yasunori Nishimori, Yoshihiro Ohnita

Keywords: - Quantum cohomology, Gromov-witten invariant, Intersection number, Rational curve, Cell decomposition, Hermitian symmetric space


646    Modelling and analysis of push caching

pp. 6461-6467

       by :   Rohan De Silva

Keywords: - Web caching, Server pushing, Dynamic objects, Staleness, Push radius, Pull radius


649    Multi-level Halftone Image Generation with Genetic Algorithms

pp. 6491-6496

       by :   Tomoya Umemura, Hernan Aguirre, Kiyoshi Tanaka

Keywords: - Multi-level image halftoning technique, Genetic algorithms, Optimization


651    A Monotone Iterative Method for Semiconductor Device Drift Diffusion Equations

pp. 6511-6516

       by :   Yiming Li

Keywords: - Drift Diffusion Model, Semiconductor Device, Monotone Iterative Method