Last update:
Thu Apr 25 10:07:09 MDT 2024
Stefano Innamorati The non-existence of certain large minimal blocking sets . . . . . . . . . 1--26 Mauro Zannetti Note on a characterization of projective planes . . . . . . . . . . . . . . . . . 27--28 Giuseppe Monaco and Antonio Monaco Development of a determinant in function of the differences among the elements of each line . . . . . . . . . . . . . . . 29--47 S. K. Prasad On fuzziness in a probability space . . 73--77 V. R. Kulli and B. Janakiram and Radha R. Iyer Split bondage numbers of a graph . . . . 79--84 Prem Nath and M. M. Kaur and Ranjeet Singh Some derivations of the Shannon entropy 85--100
R. Ameri and M. M. Zahedi Fuzzy direct sum and fuzzy (weakly) prime and primary subhypermodules . . . 101--116 Luigia Berardi and Fulvio Zuanni On minimal blocking sets in non-symmetric designs . . . . . . . . . 117--125 Osvaldo Ferri and Stefania Ferri Graphic characterization of quadric cones in a Galois space ${\rm PG}(3,q)$ 127--131 B. Basavanagoud Quasi-total graphs with crossing numbers 133--142
Biagio Palumbo Classes of arithmetical multiplicative functions and numerical derivative . . . 1--20 Lucia Gionfriddo On the parameter $m_2(h)$ for graphs . . 31--34 L. Maria Abatangelo and Manuela Erroi Uniform 20-sets of class $[0,2,3,4,5]$ in ${\rm AG}(2,7)$ . . . . . . . . . . . 35--44 Fernando di Gennaro and Salvatore Furneri On $C_\lambda$ and $F_\lambda$ multiplicative functions in Dirichlet ring . . . . . . . . . . . . . . . . . . 59--72 M. H. Al-Towaiq An improved algorithm for the iterative refinement method . . . . . . . . . . . 73--76 Nicola Teodori A characterization of irreducible configuration $(n_3)$ . . . . . . . . . 77--83
Giuseppe Monaco and Antonio Monaco Various genesis of permutations; determinants; square matrices as graphical schemes; generalization of Sarrus' rule and its historical precedents . . . . . . . . . . . . . . . 141--177 V. R. Kulli and B. Janakiram and Radha R. Iyer The cototal domination number of a graph 179--184 D. G. Akka and M. S. Patil $2$-minimally nonouterplanar semitotal-block graphs and total-block graphs . . . . . . . . . . . . . . . . . 185--196 Eugene Spiegel Algebraic radicals and incidence algebras . . . . . . . . . . . . . . . . 197--204
Guglielmo Morgari and Oscar Steila and Michele Elia On the linear complexity of product sequences of linear recurring sequences 1--9 H. Chandrashekhar and M. Nagaraj Key-lock pair mechanism for access control using tribes of Farey fractions 11--22 Kishore K. Das and Nibedita Bhattacharjee Some aspects of modified factorial series distributions . . . . . . . . . . 23--40 Michele Elia and J. Carmelo Interlando and Reginaldo Palazzo, Jr. Computing the reciprocal of units in Galois rings . . . . . . . . . . . . . . 41--55 Antonio Maturo Fuzzy events and their probability assessments . . . . . . . . . . . . . . 83--94 H. Chandrashekhar and M. Nagaraj Discrete quaternion Fourier transform in signal processing systems . . . . . . . 95--112 Ram Ratan and P. K. Saxena Image processing based techniques for securing documents . . . . . . . . . . . 113--129 S. Arumugam and J. Suresh Suseela On graphoidal graphs . . . . . . . . . . 131--137 V. Radhakrishnan and T. C. Venkatesan and K. Krithivasan Exact and approximate matching of matrix languages . . . . . . . . . . . . . . . 139--156 S. K. Pal and P. K. Saxena Enhancement of highly noisy speech signals . . . . . . . . . . . . . . . . 157--172 Md. Asim Uddin Khan The corruption prevention model . . . . 173--178 S. Mukhopadhyay A decision support system for medical diagnosis . . . . . . . . . . . . . . . 179--192 S. Mukhopadhyay and M. K. Singh An approximate solution of an unbalanced transportation problem . . . . . . . . . 193--202 Michael J. Ryan The distribution model the more for less (nothing) paradox and economies of scale and scope: some nonlinear extensions . . 203--211 Kun Soo Chang and Sunkyung Kim and Il Yoo Translation theorem of conditional Yeh--Wiener integrals . . . . . . . . . 213--225 H. M. Serag Distributed control for cooperative systems governed by Schrodinger operator 227--234 M. Bidkham and K. K. Dewan Some extremal problems of polynomials 235--242 A. Cambini and L. Martein Second order optimality conditions . . . 243--252 R. C. Mittal Orthogonal wavelets . . . . . . . . . . 253--262
A. Lourdusamy and S. Somasundaram Pebbling $C_5\times C_5$ using linear programming . . . . . . . . . . . . . . 1--15 M. M. Zahedi and M. R. Khorashadi-Zadeh Some categoric connections between fuzzy hypergraphs, subhypergroups, graphs, subgroups and subsets . . . . . . . . . 17--32 Franco Eugeni and Raffaele Mascella A note on generalized Fibonacci numbers 33--45 E. Foundas Some results of Black's permutations . . 47--55 V. R. Kulli and B. Janakiram and Radha. R. Iyer Regular number of a graph . . . . . . . 57--64 Francesco Fabris Sharpening the Gilbert--Varshamov bound in the finite case . . . . . . . . . . . 65--75 R. Murali and K. S. Harinath Laceability and distance graphs . . . . 77--86 Hakan Özakta\cs and Mustafa Ç. Pìnar and Mustafa Akgül and Tahsin Kurç and Cevdet Aykanat An algorithm with long steps for the simultaneous block projections approach for the linear feasibility problem . . . 87--108
V. R. Kulli and Nanda S. Warad On the total closed neighbourhood graph of a graph . . . . . . . . . . . . . . . 109--114 Kuang-hua Hsueh and Patrick S. Chen and Peter Chu and John Kwan-han Liu The procedure for synthesizing ratio judgements . . . . . . . . . . . . . . . 115--120 Franco Eugeni and Mauro Zannetti Generalized configurations . . . . . . . 121--131 Andrea Sgarro Blind coding: authentication frauds from the point of view of rate-distortion theory . . . . . . . . . . . . . . . . . 133--150 V. R. Kulli and M. S. Biradar The blict graph and blitact graph of a graph . . . . . . . . . . . . . . . . . 151--162 Yogesh Singh and C. S. Rai An information theoretic approach to blind source separation . . . . . . . . 163--175 Yanxun Chang and Giovanni Lo Faro and Hao Shen Support sizes of completely decomposable triple systems . . . . . . . . . . . . . 177--188 Iiro Honkala and Tero Laihonen On the probability of undetected error for binary codes used for combined correction and detection . . . . . . . . 189--197
Alicia Maccari and Olga Rueda and Vilma Viazzi A survey on edge reconstruction of graphs . . . . . . . . . . . . . . . . . 1--11 Ira Antonopoulou A user authentication protocol based on the intractability of the 3-coloring problem . . . . . . . . . . . . . . . . 17--21 Ta-Chung Chu Ranking fuzzy numbers by a ratio of relative areas . . . . . . . . . . . . . 23--34 Franco Eugeni and Daniela Tondini Klein's discrete model: the case of odd order . . . . . . . . . . . . . . . . . 35--41 Rosa Stangarone and Luisella Verdi Essentially $s$-fold secure authentication systems of level $l$ . . 43--50 Antonio Maturo and Mauro Zannetti Rédei blocking sets with two Rédei lines and quasigroups . . . . . . . . . . . . 51--62 Prem Nath On determining a representation for measures of entropy possessing branching property without assuming symmetry . . . 63--75 Yi-Shiung Yeh and Chu-Hsing Lin and Wei-Shen Lai Construct message authentication code with SHA and AEA . . . . . . . . . . . . 77--83 M. M. Zahedi and H. Moradi Kouchi (Anti-) fuzzy (normal) sub-$F$-polygroups and fuzzy $\alpha$-cosets . . . . . . . . . . . . 85--104
Cynthia Chi and Daniela Ferrero and Charles Hallford and Rebecca Williams On the edge sums of de Bruijn graphs . . 105--117 Giuseppe Gentile and Renato Migliorato Hypergroupoids and cryptosystems . . . . 119--138 Osvaldo Ferri and Stefania Ferri and Antonella Giallonardo On the elliptic quadrics of ${\rm PG}(2s+1,q)$ . . . . . . . . . . . . . . 139--143 S. Arumugam and Indra Rajasingh and P. Roushini Leely Pushpam A note on the graphoidal covering number of a graph . . . . . . . . . . . . . . . 145--150 Min-Shiang Hwang and Chao-Chen Yang and Shiang-Feng Tzeng Improved digital signature scheme based on factoring and discrete logarithms . . 151--155 Konstantinos G. Girtis and George A. Tsihrintzis Diffraction tomographic imaging algorithms. I. Data models and inversion 157--178 Y. P. Chu and W. C. Chiang and Y. H. Huang and C. L. Lee A generalized delay allocation model for rate-based packet scheduling algorithms 179--197 Chin Ching Chiu and Yi-Shiung Yeh A massively parallel algorithm based on DNA computations for constructing minimal spanning trees . . . . . . . . . 199--214
M. L. Aggarwal and Veena Budhraja On construction of some new symmetric and asymmetric orthogonal arrays . . . . 215--225 Stefania Ferri On some type $(1,m,n)_2$ sets of ${\rm PG}(3,q)$ . . . . . . . . . . . . . . . 227--230 Michel Mitton On maximally nonlinear and extremal balanced Boolean functions . . . . . . . 231--253 E. Foundas and G. Chondrocoukis Classifications and inferences of collective preferences . . . . . . . . . 255--280 Konstantinos G. Girtis and George A. Tsihrintzis Diffraction tomographic imaging algorithms. II. Random data inversion and super-resolution . . . . . . . . . . 281--301
T. W. Chen and J. Y. Lin Control design based on minimization of quadratic index with an observer-based structure . . . . . . . . . . . . . . . 1--19 S. Armeni and D. Christodulakis and I. Kostopoulos and Y. C. Stamatiou and M. Xenos Secure information hiding based on computationally intractable problems . . 21--33 M. L. Aggarwal and Seema Gupta Nested balanced incomplete block designs derivable from simplex codes . . . . . . 35--44 Chu-Hsing Lin and Yi-Shiung Yeh and Chen-Yu Lee Keyed/unkeyed SHA-2 . . . . . . . . . . 45--58 M. C. Bhandari and C. Durairajan On the covering radius of simplex codes 59--69 Stefania Ferri On the irreducible cubs containing the maximum number of points of a Fano plane 71--75 Mauro Zannetti A combinatorial characterization of quadric Veronesean . . . . . . . . . . . 77--82 D\uanu\ct Marcu A note on the balanced hypergraphs . . . 83--84 Hamamache Kheddouci A dual of $4$-regular graph for $G \times C_{2n}$ . . . . . . . . . . . . . 85--96 R. A. Borzooei and P. Corsini and M. M. Zahedi Some kinds of positive implicative hyper $K$-ideals . . . . . . . . . . . . . . . 97--108
R. Ameri On categories of hypergroups and hypermodules . . . . . . . . . . . . . . 121--132 Piergiulio Corsini On Chinese hyperstructures . . . . . . . 133--137 Daniel Hort A construction of hypergroups from ordered structures and their morphisms 139--150 Giuseppe Gentile A note on quasi-Steiner hypergroupoids 151--160 A. Iranmanesh and A. H. Babareza Transposition hypergroups and complement hypergroups . . . . . . . . . . . . . . 161--168 James Jantosciak and Christos G. Massouros Strong identities and fortification in transposition hypergroups . . . . . . . 169--193 Violeta Leoreanu Commutative hypergroups associated with arbitrary hypergroups . . . . . . . . . 195--198 A. Madanshekaf $H_v$-structures associated with $PQ$-hyperoperations . . . . . . . . . . 199--205 Gerasimos G. Massouros On the attached hypergroups of the order of an automation . . . . . . . . . . . . 207--215 Rita Procesi Ciampi and Rosaria Rota Polynomials over multiplicative hyperrings . . . . . . . . . . . . . . . 217--225 A. Rahnamai Barghi A class of hyperrings . . . . . . . . . 227--233 Thomas Vougiouklis The $h/v$-structures . . . . . . . . . . 235--243 Renato Migliorato Canonical $v$-hypergroups and $\omega$-hypergroups . . . . . . . . . . 245--256
Mauro Zannetti A combinatorial characterization of Baer subspaces . . . . . . . . . . . . . . . 1--3 Biagio Buccimazza and Bal Kishan Dass and Sapna Jain High-density-burst error detection . . . 5--21 Cheng-Fen Lu and Shiuh-Pyng Shieh Re-keying algorithms for symmetric cryptosystems . . . . . . . . . . . . . 23--27 Fernando Di Gennaro Which blocking sets are hypergroups? . . 29--36 Hannah Chung and Daniela Ferrero and Alan Taylor and Jeremy Warshauer Diameter of path graphs . . . . . . . . 49--54 Wei-Kuei Chen and Chun-I Fan Blind one-time signature and its applications . . . . . . . . . . . . . . 55--69 Yi-Shiung Yeh and Ta-Shan Tsui A concurrent multi-string matching from multi-text algorithm based on the algorithm of Hamiltonian path problem and DNA computation . . . . . . . . . . 71--96 R. Selvakumar and P. Balasubramani Kernel code and its controllability . . 97--101 M. Yamuna and N. Sridharan Every $\gamma$-excellent, $\gamma$-flexible graph is $\gamma_{\rm bi}$-excellent . . . . . . . . . . . . . 103--110 Ching-Hung Hsu and Ming-Chih Lai A new cipher scheme based on one-way hash function and IDEA . . . . . . . . . 111--120 Yuh-Min Tseng A cryptographic key assignment scheme for access control in a hierarchy with exceptions . . . . . . . . . . . . . . . 121--132
Konstantinos G. Girtis and George A. Tsihrintzis Diffraction tomographic imaging algorithms. III. Angularly limited data 133--159 Alberto Amato Intersections and parallelism in $P_3$-designs . . . . . . . . . . . . . 161--166 Partha P. Dey Exploring invariant linear codes through generators and centralizers . . . . . . 167--178 S. Arumugam and Indra Rajasingh and P. Roushini Leely Pushpam Graphs with unique minimum acyclic graphoidal cover. I . . . . . . . . . . 179--186 Stefania Ferri On some singular irreducible cubics of $\rm PG(2,2)$ . . . . . . . . . . . . . 203--208 J. Carmelo Interlando and Michele Elia On the effective computation of isomorphisms between $\sigma_{\mathbb{F}}(\germ O_{\mathbb{F}}/\germ p)$ and ${\rm GF}(N_{\mathbb{F}}(\germ p))$ . . . . . 209--225 Michel Mitton Theoretical upper bounds on the covering radii of Boolean functions . . . . . . . 237--248 Hera Antonopoulou On threshold properties . . . . . . . . 249--254
Sandro Rajola and Maria Scafati Tallini The sets of type $(0,n)$ and the Steiner triple systems in a finite affine plane 261--266 Stefania Ferri Addendum to: ``On some type $(1,m,n)_2$ sets of $\rm PG(3,q)$'' [J. Discrete Math. Sci. Cryptography 5 (2002), no. 3, 227--230; \refcno 1986732] . . . . . . . 267--269 Ta-Chung Chu and Kuo-Shi Huang and Tzu-Ming Chang COA defuzzification method for evaluating $C_{pk}$ under fuzzy environments . . . . . . . . . . . . . . 271--280 Lin-Chuan Wu and Yi-Shiung Yeh and Chun-I. Fan Fail-stop blind signature scheme based on the integer factorization . . . . . . 281--290 S. Georgiou and C. Koukouvinos New visual cryptographic schemes derived from orthogonal and mixed orthogonal arrays . . . . . . . . . . . . . . . . . 291--306 Ilias S. Kotsireas and Christos Koukouvinos Inequivalent Hadamard matrices with buckets . . . . . . . . . . . . . . . . 307--317 Marios Poulos and Maria Rangoussi and Vasilios Chrissikopoulos and Agelos Evangelou and Fotis Georgiacodis Comparative analysis of the computational geometry and neural network classification methods for person identification purposes via the EEG. I . . . . . . . . . . . . . . . . . 319--347 Najib A. Kofahi and Turki Al-Somani and Khalid Al-Zamil Performance study of some symmetric block cipher algorithms under Linux operating system . . . . . . . . . . . . 359--370
Shiuh-Jeng Wang Vowel-consonant addressing mode on hashing for English letter-oriented keys 1--25 Qassem M. Al-Hassan On inverses of tridiagonal matrices . . 49--58 P. Balasubramani and R. Viswanathan Characterizations of the $0$-distributive poset . . . . . . . . . 81--98 Prem Nath On the measurable solutions of some functional equations useful in information theory . . . . . . . . . . . 99--115 Brice Effantin and Hamamache Kheddouci Exact values for the $b$-chromatic number of a power complete $k$-ary tree 117--129
Willi Geiselmann and Rainer Steinwandt A key substitution attack on ${\rm SFLASH}^{v3}$ . . . . . . . . . . . . . 137--141 Rosanna Iembo and Massimo Squillante and Aldo Ventre Common fixed points for families of commutative transformations . . . . . . 175--188 C. Koukouvinos and P. Mantas Some combinatorial constructions for optimal mixed-level supersaturated designs . . . . . . . . . . . . . . . . 189--201 Michael Ratiner The method of S-box construction . . . . 203--215 V. Swaminathan and P. Jeyanthi On super vertex-magic labeling . . . . . 217--224 Luigia Berardi and Bal Kishan Dass and Sapna Jain Bound for solid burst error correction with Lee weight . . . . . . . . . . . . 225--235 Maurizio Lucci A combinatorial characterization of two skew lines . . . . . . . . . . . . . . . 237--239 Ilias S. Kotsireas and Christos Koukouvinos Genetic algorithms for the construction of Hadamard matrices with two circulant cores . . . . . . . . . . . . . . . . . 241--250 Abulimiti Yiming and Masami Yasuda A note on properties for a complementary graph and its tree graph . . . . . . . . 251--259 Stefania Ferri The cubic curves of ${\rm PG}(2,3)$ . . 261--266 Maurizio Lucci On $(q+1)^2$-sets of class $[0,1,m,n]_1$ in ${\rm PG}(4,q)$ . . . . . . . . . . . 267--270 Vu Dong Tô and Reihaneh Safavi-Naini and Yejing Wang $2$-secure codes from $2$-SFP codes . . 287--304
Ming-Hsin Chang and Yi-Shiung Yeh Proxy signature schemes with time limitation . . . . . . . . . . . . . . . 305--314 Michel Mitton An analysis and an improvement of iterative fast correlation attacks . . . 315--342 Yi-Shiung Yeh and I-Te Chen and Chan-Chi Wang Randomizing encryption mode . . . . . . 355--364 N. Shajareh-Pour Salavati On the generalized permutations . . . . 365--372 B. Basavanagoud and Veena N. Mathad Graph equations for line graphs, blitact graphs and blict graphs . . . . . . . . 373--379 Chen-Ming Fan and H. J. Shyr $\delta$-codes and $\delta$-languages 381--394 Ngo Dac Tan On the classification problem for tetravalent metacirculant graphs . . . . 403--412 N. Vijayarangan and R. Vijayasarathy Primitive polynomials testing methodology . . . . . . . . . . . . . . 427--435 Chih-Yao Lo The operation of the elliptic curve cryptology in IPv6 . . . . . . . . . . . 437--446 Raffaele Mascella and Luca G. Tallini Combinatorial properties of balanced codes over the complex $m$-th roots of unity and efficient coding algorithms 447--458 Raffaele Mascella and Luca G. Tallini On efficient high-order spectral-null codes over the $m$-ary alphabet . . . . 459--481 Brice Effantin The $b$-chromatic number of power graphs of complete caterpillars . . . . . . . . 483--502
A. Suganya and N. Vijayarangan Landau--Ramanujan keyed hash functions for message authentication . . . . . . . 1--8 Sucheta Chakrabarti and R. K. Khanna A new visual cryptography scheme for STS based access structures . . . . . . . . 9--23 Michele Elia Representation of primes as the sums of two squares in the golden section quadratic field . . . . . . . . . . . . 25--37 Matteo Gaeta and Gerardo Iovane and Enver Sangineto A $3$D geometric approach to face detection and facial expression recognition . . . . . . . . . . . . . . 39--53 Jinhua Wang The spectrum of nested group divisible designs of type $t^n$ . . . . . . . . . 55--65 S. Soma Sundaram and A. Nagarajan and M. Anantha Krishnan Path point cover . . . . . . . . . . . . 67--71 Doost Ali Mojdeh On the extending of $k$-regular graphs and their strong defining spectrum . . . 73--86 Yung-Tsang Chang and Jung-Hua Hsu and S. S. Yu A sublinear time string prefix square detection algorithm . . . . . . . . . . 87--95 T. Alderson Some generalizations of Rédei's theorem 97--106 H. Evangelaras and C. Koukouvinos New light on certain two level designs using Gröbner bases . . . . . . . . . . . 107--124 H. Evangelaras and C. Koukouvinos and E. Lappas An efficient algorithm for the identification of isomorphic orthogonal arrays . . . . . . . . . . . . . . . . . 125--132 Chin-Chen Chang and Jung-San Lee An anonymous and flexible $t$-out-of-$n$ electronic voting scheme . . . . . . . . 133--151 Cheng-Hsing Yang and Shiuh-Jeng Wang Weighted bipartite graph for locating optimal LSB substitution for secret embedding . . . . . . . . . . . . . . . 153--164 Yu-Kuang Zhao A characterization of prefix $n$-power words . . . . . . . . . . . . . . . . . 165--176 Doost Ali Mojdeh and Nader Jafari Rad Connected geodomination in graphs . . . 177--186 Raffaele Mascella and Luca G. Tallini Theory and design of $m$-ary balanced codes which are invariant under symbol permutation . . . . . . . . . . . . . . 187--200
M. M. Zahedi and L. Torkzadeh A classification of hyper $K$-algebras of order $3$ . . . . . . . . . . . . . . 201--213 Bala Shanthi Karunagaram and J. Paulraj Joseph On domination parameters and maximum degree of a graph . . . . . . . . . . . 215--223 H. Ahrabian and A. Nowzari-Dalini Parallel generation of $t$-ary trees with ballot-sequences . . . . . . . . . 225--234 Ngo Dac Tan and Chawalit Iamjaroen A necessary condition for maximal nonhamiltonian Burkard--Hammer graphs 235--252 M. Sethumadhavan and C. Yogha Lakxmie and C. Vijayagovindan A construction of $p$-ary balanced sequence with large $k$-error linear complexity . . . . . . . . . . . . . . . 253--261 Paul Manuel and Bharati Rajan and Indra Rajasingh and M. Chris Monica Landmarks in torus networks . . . . . . 263--271 Stefania Ferri The singular absolutely irreducible cubics of $\rm PG(2,3)$ . . . . . . . . 291--305 Shigeichi Hirasawa and Masao Kasahara Exponential error bounds and decoding complexity for block concatenated codes with tail biting trellis inner codes . . 307--320 Yi-Shiung Yeh and I-Te Chen and Ting-Yu Huang and Chan-Chi Wang Dynamic extended DES . . . . . . . . . . 321--330 S. Georgiou and C. Koukouvinos and E. Lappas Extremal doubly-even self-dual codes from Hadamard matrices . . . . . . . . . 331--339 H. Evangelaras and C. Koukouvinos Interaction detection in Latin and hyper-Latin squares . . . . . . . . . . 341--348 Laurent Poinsot Bent functions on a finite nonabelian group . . . . . . . . . . . . . . . . . 349--364 C. Koukouvinos and P. Mantas and S. Stylianou A block-stepwise method for analyzing a specific type of supersaturated designs 383--402
A. Anto Kinsley and S. Somasundaram Domination based algorithm to $k$-center problem . . . . . . . . . . . . . . . . 403--416 Michel Mitton On the Walsh--Fourier analysis of Boolean functions . . . . . . . . . . . 429--439 Ching-Jing Kung 32-bit multipliers for linear congruential random number generators 441--448 Shiuh-Jeng Wang and Pei-Shun Hu Key management for pay-TV broadcast systems in hierarchy . . . . . . . . . . 449--476 Andrea Sgarro and Luca Bortolussi Codeword distinguishability in minimum diversity decoding . . . . . . . . . . . 487--502 H. Evangelaras and C. Koukouvinos and K. Mylona On Hadamard embeddability . . . . . . . 503--512 Koduganti Venkata Rao and P. S. Avadhani Authentication based on wavelet transformations . . . . . . . . . . . . 513--521 Chin-Chen Chang and Jen-Ho Yang An efficient ID-based user identification scheme for mutual authentication in mobile environments 537--548 Ya-Fen Chang and Chin-Chen Chang and Chia-Lin Kao Comments on WLT attack on an enhanced timestamp-based password authentication scheme . . . . . . . . . . . . . . . . . 549--555 R. Butkote and K. Denecke Characterization of sets of discrete functions by algebraic identities . . . 557--572 Chin-Chen Chang and Jung-San Lee Security enhancement of Yang--Li hierarchical access control mechanism 573--582 C. S. Gan and V. C. Koo Enumerations of the maximum rectilinear crossing numbers of complete and complete multi-partite graphs . . . . . 583--590
Yi-Shiung Yeh and Ting-Yu Huang and I-Te Chen and Shih-Chin Chou Analyze SHA-1 in message schedule . . . 1--7 Jörn Quistorff Fundamentals of coding type problems . . 9--39 R. Ameri and H. Hedayati On $k$-hyperideals of semihyperrings . . 41--54 R. Ameri and H. Hedayati On $k$-hyperideals of semihyperrings . . 41--54 Yas Alsultanny Systematic approach for image partitioning and shuffling . . . . . . . 55--71 A. V. N. Krishna and S. N. N. Pandit and A. Vinaya Babu A generalized scheme for data encryption technique using a randomized matrix key 73--81 V. Barrera-Figueroa and J. Sosa-Pedroza and J. López-Bonilla Numerical approach to King's analytical study for circular loop antenna . . . . 83--92 Ya-Fen F. Chang and Chin-Chen C. Chang and Yi-Fang F. Cheng Robust non-interactive $t$-out-of-$n$ oblivious transfer based on the RSA cryptosystem . . . . . . . . . . . . . . 93--109 Mohamed Hussain Al-Ibrahim A designated verifier signature using secret sharing technique . . . . . . . . 111--123 Israt Jahan and Mohammad Zahidur Rahman A realistic divisible transferable electronic cash for general use . . . . 125--150
M. Borges-Quintana and M. A. Borges-Trenard and E. Mart\'ìnez-Moro On a Gröbner bases structure associated to linear codes . . . . . . . . . . . . 151--191 Chia-Chi C. Wu and Chin-Chen C. Chang Attacks on provably secure proxy-protected signature schemes based on factoring . . . . . . . . . . . . . . 193--204 J. Ratsaby Dimension and Boolean functions with long runs . . . . . . . . . . . . . . . 205--225 Joel Ratsaby On the VC-dimension and Boolean functions with long runs . . . . . . . . 205--225 Hsiao-Lih L. Jen and Tai-Chang C. Hsia and M. Babul Hasan A study of methods for construction of balanced incomplete block design . . . . 227--243 A. P. Santhakumaran Periphery with respect to cliques in graphs . . . . . . . . . . . . . . . . . 245--254 S. Georgiou and C. Koukouvinos and E. Lappas Self-dual codes over some prime fields constructed from skew-Hadamard matrices 255--266 Debdeep Mukhopadhyay and Dipanwita RoyChowdhury Fault based attack of the Rijndael cryptosystem . . . . . . . . . . . . . . 267--290 Meena Kumari Indices to measure the cryptographic strength of S-box . . . . . . . . . . . 291--312
Sotiria Antonopoulou and Yannis C. Stamatiou and Malvina Vamvakari An asymptotic expansion for the $q$-binomial series using singularity analysis for generating functions . . . 313--328 S. Antonopoulou and Y. C. Stamatiou and M. Vamvakari An asymptotic expansion for the $q$-binomial series using singularity analysis for generating functions . . . 313--328 M. Thiyagarajan and N. Sairam Verification of the correctness of compiler optimization using co-induction 329--349 Jung-San S. Lee and Chin-Chen C. Chang Security enhancement of key authentication schemes based on discrete logarithms . . . . . . . . . . . . . . . 351--358 S. J. Wang Information hiding at oblivious watermarking scheme upon alternative threshold in spatial domains . . . . . . 359--384 V. Longani An algorithm for finding the number of shortest routes on square lattices . . . 385--393 Vites Longani An algorithm for partitioning an integer $n$ as a sum of $k$ positive integers 395--399 Jorma Jormakka On finding Fermat's pairs . . . . . . . 401--413 A. P. Santhakumaran and J. John Edge geodetic number of a graph . . . . 415--432 Y. B. Maralabhavi and Venkanagouda M. Goudar Lict edge semientire graph of a planar graph . . . . . . . . . . . . . . . . . 433--438 G. Laccetti and G. Schmid Brute force attacks on hash functions 439--460
Paul Manuel and Kalim Qureshi and Albert William and Albert Muthumalai VLSI layout of Benes networks . . . . . 461--472 Jean-Lue L. Baril Hamiltonian paths for involutions in the square of a Cayley graph . . . . . . . . 473--484 Lila Kari and Kalpana Mahalingam $k$-involution codes and related sets 485--503 L. Kari and K. Mahalingam $k$-involution codes and related sets 485--503 B. Chaluvaraju and N. D. Soner Complementary total domination in graphs 505--516 A. P. Shanthini and A. Antonysamy and T. Tamil Chelvam User-friendly genetic algorithm . . . . 517--536 Aminu A. Ibrahim A counting scheme and some algebraic properties of a class of special permutation patterns . . . . . . . . . . 537--546 C. C. Lee and M. S. Hwang and C. W. Lin An efficient multi-round anonymous auction protocol . . . . . . . . . . . . 547--557 Stephanie Deacon and Eduardo Dueñez and José Iovino A public-key threshold crypto system based on residue rings . . . . . . . . . 559--571 Robert H.-J. Lin and Chih-Pin Yen and Peter S. Deng and K.-C. Fan and Jennifer Shu-Jen Lin and Peter Chu Analysis of the $\epsilon$-algorithm to accelerate the convergence . . . . . . . 573--580 Jean Dayantis and Jean-François F. Palierne A search for primes from lesser primes 581--602
Chin-Chen C. Chang and Chia-Yin Y. Lee and Yu-Wei W. Su A mutual authenticated key agreement scheme over insecure networks . . . . . 603--612 V. R. Kulli and R. R. Iyer Inverse total domination in graphs . . . 613--620 F. O. Ikpotokin and S. C. Chiemeke Mathematical derivation of the multi-peg Tower of Hanoi algorithm . . . . . . . . 621--636 M. R. Darafsheh and Y. Farjami Calculating the set of orders of elements in the finite linear groups . . 637--653 Hon-Chan C. Chen A simple optimal parallel algorithm for constructing a spanning tree of a trapezoid graph . . . . . . . . . . . . 655--660 B. Jaya Prasad and T. Tamizh Chelvam and S. Robinson Chellathurai Private domination number of a graph . . 661--666 T. Tamizh Chelvam and B. Jaya Prasad Common point domination number . . . . . 667--676 A. P. Santhakumaran and J. John The edge Steiner number of a graph . . . 677--696 P. Vasudeva Reddy and M. Padmavathamma An authenticated key exchange protocol in elliptic curve cryptography . . . . . 697--705 F. J. Ogwu and M. Talib and G. A. Aderounmu The performance of TCP/IP over wireless ATM network . . . . . . . . . . . . . . 707--720 R. Sweetly and J. Paulraj Joseph Radio number of graphs of diameter three 721--730
S. V. Sathyanarayana and M. Aswatha Kumar and K. N. Hari Bhat Generation of pseudorandom sequence over elliptic curve group and their properties . . . . . . . . . . . . . . . 731--747 K. S. Hsu and R. C. Soong and K. C. Chen and T. S. Lan A computerized approach to the design of automobile suspension system . . . . . . 749--761 Luigia Berardi and Manuela Romani On the size of a blocking set in a symmetric design . . . . . . . . . . . . 763--774 Osvaldo Ferri and Stefania Ferri A remark on the Segr\`e theorem . . . . 775--778 Jyoti Saxena and C. S. Rai and P. K. Bansal ICA based GSIC receiver for multirate DS-CDMA systems . . . . . . . . . . . . 779--792 Laurent Poinsot Perfect nonlinear S-boxes on the real-line . . . . . . . . . . . . . . . 793--813 M. Seenivasan and A. Lourdusamy and M. Ravi \@Ramasubramanian Triangular mean labeling of graphs . . . 815--822 Stefania Ferri On some graphic characterizations of cubic curves in ${\rm PG}(2, 2)$ and in ${\rm PG}(2, 3)$ . . . . . . . . . . . . 823--843 Anonymous Index of Volume 10 . . . . . . . . . . . 845--850
N. S. Babu On perfect codes in rank distance . . . 1--11 D. Marcu A generalization of a result of A. Renyi 13--17 D. Marcu A study on the $k$-ordered Hamiltonian graphs . . . . . . . . . . . . . . . . . 19--31 Y. F. Huang and K. L. Wen Weighting analysis by using grey method 33--58 H. Om and R. Patwa Affine transformation in cryptography 59--65 G. Ghiani and E. Manni and C. Triki The lane covering problem with time windows . . . . . . . . . . . . . . . . 67--81 G. Iovane and E. Sangineto LICoS: Landmark-based Identikit Composition and Suspect Retrieval . . . 83--98 C. I. Hou and C. Y. Lo and J. H. Leu A digital application of data encryption 99--111 E. Foundas and Ch. Lytras and C. Patsakis Improved algorithms for the calculation of Fibonacci numbers . . . . . . . . . . 113--120
R. H. J. Lin and G. Jung and J. S. J. Lin and P. Chu Further analysis on matrix operation of AHP . . . . . . . . . . . . . . . . . . 121--130 C. Hong-Song and Z. Jianyu and H. W. J. Lee A novel NP-based security scheme for AODV routing protocol . . . . . . . . . 131--145 A. Juarna and V. Vajnovszki Combinatorial isomorphism between Fibonacci classes . . . . . . . . . . . 147--158 A. A. Kanso Mixer --- a new stream cipher . . . . . 159--179 E. Foundas and C. Patsakis and G. Chondrocoukis Lucas permutations and some notes on Fibonacci permutations . . . . . . . . . 181--190 M. Mitton Boolean functions of $n$ variables and permutations on $F_n$ . . . . . . . . . 191--200 M. Mitton Minimal polynomial of Cayley graph adjacency matrix for Boolean functions 201--207 P. T. Artikis and C. T. Artikis Random sums of integral part models in computer systems operations . . . . . . 209--217 M. Sundaram and R. Ponraj and S. Somasundaram On graph labeling parameters . . . . . . 219--229 M. K. Viswanath and A. R. Deepti An improvised version of Hill's cipher 231--237 R. Ponraj and S. Somasundaram Mean labeling of graphs obtained by identifying two graphs . . . . . . . . . 239--252
T. L. Huang and C. W. Liu and C. C. Chao and K. T. Lee and T. Y. Hwang and C. M. Chung Upper core point detection using improved ant colony optimization algorithm . . . . . . . . . . . . . . . 253--265 M. I. Islam and M. Zulhasnine and M. R. Amin Performance evaluation of rake receiver of DS-CDMA under AWGN environments . . . 267--279 Y. S. Kim and J. H. Chang A proxy fail-stop signature scheme with proxy revocation . . . . . . . . . . . . 281--295 M. Sethumadhavan and M. Sindhu and C. Srinivasan and C. Kavitha An algorithm for $k$-error joint linear complexity of binary multisequences . . 297--304 H. Ibrahim and R. Ramli and M. H. Hassan Combinatorial design for a conference: constructing a balanced three-parallel session schedule . . . . . . . . . . . . 305--317 Y. Kumar and N. R. Pillai On shift sequences for interleaved construction of signal sets with low correlation . . . . . . . . . . . . . . 319--331 A. K. Das An unconditionally secure location-aware key management scheme for static sensor networks . . . . . . . . . . . . . . . . 333--355 S. Chakrabarti and S. K. Pal A new online extended visual cryptography scheme for STS access structures . . . . . . . . . . . . . . . 357--374
Y. S. Yeh and M. C. Kao and W. S. Lai The orthogonal signature . . . . . . . . 375--384 C. C. Wang and M. C. Kao and Y. S. Yeh Low information leakage random padding scheme for block encryption . . . . . . 385--391 A. K. Verma and M. Dave and R. C. Joshi DNA cryptography: a novel paradigm for secure routing in Mobile Ad hoc Networks (MANETs) . . . . . . . . . . . . . . . . 393--404 N. Glinos and Y. C. Stamatiou On the equivalence between random graph models . . . . . . . . . . . . . . . . . 405--419 J. J. Jesintha and G. Sethuraman A new class of graceful rooted trees . . 421--435 R. E. Atani and S. E. Atani and S. Mirzakuchaki Public key cryptography using semigroup actions and semirings . . . . . . . . . 437--445 R. Procesi and R. Rota Multiplicative HV-rings and complementary hyperstructures . . . . . 447--456 S. Ferri Graphic characterizations of twisted cubic in ${\rm PG}(3, q)$ . . . . . . . 457--460 D. Marcu An approximate chromatic number of a graph . . . . . . . . . . . . . . . . . 461--464 G. Ikorong A reformulation of the Goldbach conjecture . . . . . . . . . . . . . . . 465--469 S. Mathew and K. P. Jacob JERIM-320: a 320-bit hash function with dual applications --- a statistical analysis . . . . . . . . . . . . . . . . 471--482 L. Clark Ascents and descents in random trees . . 483--492 M. Basu and Md. M. Rahaman and S. Bagchi $3-(2m, 2m | 1, 2m | 2 | 1)$ design for first order Reed--Muller code $R(1,m)$ 493--500
N. Han and Z. Liang On the graceful permutation graphs conjecture . . . . . . . . . . . . . . . 501--526 H. Azanchiler Extension of line-splitting operation from graphs to binary matroids . . . . . 527--536 O. Khadir Algorithm for factoring some RSA and Rabin moduli . . . . . . . . . . . . . . 537--543 C. Y. Lee and W. S. Lai Extended DSA . . . . . . . . . . . . . . 545--550 S. Ferri On the non singular quartics of ${\rm PG}(2, 3)$ . . . . . . . . . . . . . . . 551--558 K. A. Germina and K. Abhishek and K. L. Princy Further results on set-valued graphs . . 559--566 P. H. Huang A study of applying parallel THBL algorithm to a fighter plane system . . 567--577 S. S. Dhenakaran and E. R. Naganathan and C. Ganesamoorthy Multiple symmetric keys using Banach fixed point theorem . . . . . . . . . . 579--587 P. Chandra and R. K. Singh and Y. Singh Generation of mutants for Boolean expression . . . . . . . . . . . . . . . 589--607 H. T. Chang Mathematical development and analysis to conflict resolution . . . . . . . . . . 609--618 Anonymous Errata: Volume 11 Number 5 . . . . . . . 619
P. P. Dey and M. Asifuzzaman A note on the code of projective plane of order four . . . . . . . . . . . . . 621--637 F. Guo and Y. Mu and Z. Chen Multi-identity management for identity-based cryptography . . . . . . 639--672 M. Sharma and M. K. Kowar and M. Sharma An improved evolutionary algorithm for secured image using adaptive genetic algorithm . . . . . . . . . . . . . . . 673--683 L. Cinque and G. Iovane and E. Sangineto Comparing SIFT and LDA based face recognition approaches . . . . . . . . . 685--704 S. Mou and Md. I. Islam and M. R. Amin Dynamic channel allocation in mobile cellular networks . . . . . . . . . . . 705--714 Ikorong Anouk Gilbert Nemron An original abstract over the twin primes, the Goldbach conjecture, the friendly numbers, the perfect numbers, the Mersenne composite numbers, and the Sophie Germain primes . . . . . . . . . 715--726 M. Seenivasan and A. Lourdusamy Vertex equitable labeling of graphs . . 727--735 L. Navaei and R. Dayanian Hidden message via hypothesis testing and information --- theoretic model . . 737--746 Anonymous Index of Volume 11 (2008) . . . . . . . 747--752
G. Iovane and G. Ingenito and M. Leone Motion tracking using fuzzy logic and consistent labeling for multiple objects in multiple cameras vision . . . . . . . 1--42 A. P. Kazemi Geodomination in graphs II . . . . . . . 43--50 Md. I. Islam and J. K. Das Performance comparison of two and three beam SDMA traffic in mobile cellular network . . . . . . . . . . . . . . . . 51--61 T. Sitthiwiratham and C. Promsakon Planarity of joined graphs . . . . . . . 63--69 V. Longani Applications of Polya's theorem to distribution problems and partitions of integers . . . . . . . . . . . . . . . . 71--77 Q. Al-Hassan On inverses of pentadiagonal matrices 79--91 A. N. Ghameshlou and S. M. Sheikholeslami Signed (total) domination numbers and Laplacian spectrum of graphs . . . . . . 93--99 S. Settepanella Blocking sets in the complement of hyperplane arrangements in projective space . . . . . . . . . . . . . . . . . 101--107 A. Lourdusamy and C. Muthulakshmi Generalized $t$-pebbling number of a graph . . . . . . . . . . . . . . . . . 109--120
A. Nitaj Application of ECM to a class of RSA keys . . . . . . . . . . . . . . . . . . 121--137 M. Saha and D. Roychowdhury Provably secure key establishment protocol using one-way functions . . . . 139--158 A. Lizzio and M. A. Munda Maximum embedding of a ${\rm E2}(v - w, 4, 1)$ into a ${\rm P}(v, 4, e)$ . . . . 159--166 M. Sattanathan and R. Kala Degree prime graph . . . . . . . . . . . 167--173 Y. Cengellenmis The gray image of the cyclic codes over ${IF2}[u] / u_2 - 1$ . . . . . . . . . . 175--178 T. T. Chelvam and S. R. Chellathurai A note on split domination number of a graph . . . . . . . . . . . . . . . . . 179--186 S. Ferri On class $[m, n]1k$-sets in ${\rm PG}(2, 3)$ . . . . . . . . . . . . . . . . . . 187--191 Y. S. Pawar and P. V. Patil Semiprime elements and relative annihilators in multiplicative lattices 193--204 C. T. Artikis and P. T. Artikis Integral part models in information systems and educational processes . . . 205--215 C. C. Wu and Y. L. Wu and P. C. Yang Multiple attribute decision making assessment on the notebook computer industry performance . . . . . . . . . . 217--237 Y. Cengellenmis On $(1 - u_2)$-cyclic and cyclic codes over ${\rm IF}p + u{\rm IF}p + u_2{\rm IF}p$ . . . . . . . . . . . . . . . . . 239--243 A. Elumalai and G. Sethuraman Gracefulness of union of cycle with parallel chords and complete bipartite graphs or paths . . . . . . . . . . . . 245--252
L. J. Rozario and Md. I. Islam Performance estimation of call admission control schemes based voice/data integrated wireless cellular network with customer retrials . . . . . . . . . 253--294 B. Basavanagoud and K. G. Mirajkar On permanent graphs . . . . . . . . . . 295--311 E. S. Ismail and N. M. F. Tahat and R. R. Ahmad A new signature scheme based on factoring and discrete logarithms . . . 313--318 N. J. Rad A note on $y L / t$-vertex critical graphs . . . . . . . . . . . . . . . . . 319--322 M. Mitton On Boolean bent functions . . . . . . . 323--333 C. T. Artikis and P. T. Artikis Discrete random sums in processes of systemics arising in cybernetics and informatics . . . . . . . . . . . . . . 335--345 Z. Liang and S. Yang On DRC covering --- a survey . . . . . . 347--351 R. Padmavathy and C. Bhagvati Performance analysis of index calculus method . . . . . . . . . . . . . . . . . 353--371 R. Kala and T. R. N. Vasantha Restrained bondage number of a graph . . 373--380
Z. Liang and J. Wang Constructions of optimal packing and covering of the complete multigraph with applications . . . . . . . . . . . . . . 381--410 S. Alikhani and Y. H. Peng Dominating sets of centipedes . . . . . 411--428 S. R. Hutsell and G. W. Greenwood Efficient algebraic representation of quantum circuits . . . . . . . . . . . . 429--449 H. Om and T. K. Sarkar Neural network based intrusion detection system for detecting changes in hardware profile . . . . . . . . . . . . . . . . 451--466 V. Vilfred and C. Jayasekaran Interchange similar self vertex switchings in graphs . . . . . . . . . . 467--480 B. D. Acharya and K. A. Germina and K. L. Princy and S. B. Rao Embedding and NP-completeness theorems for set-graceful, topologically set-graceful and set-sequential graphs 481--487 A. P. Kazemi On the domination number of some graphs 489--493 R. S. Lekshmi and R. Anitha Perfect matching dominating cycle --- a new dominating cycle . . . . . . . . . . 495--508
P. Freyre and N. Diaz and E. R. Morgado Some algorithms related to matrices with entries in a finite field . . . . . . . 509--519 H. Hedayati and Z. Jafari Connections between interval valued fuzzy graphs and fuzzy groups with $(S, T)$-norms . . . . . . . . . . . . . . . 521--531 P. Freyre and N. Diaz and E. R. Morgado Fast algorithm for the multiplication of a row vector by a randomly selected matrix $A$ . . . . . . . . . . . . . . . 533--549 J. Dayantis and J.-F. Palierne Complementary results on the search of primes from lesser primes . . . . . . . 551--559 Ikorong Anouk Gilbert Nemron A simplification of the difficult part of the Berge last conjecture . . . . . . 561--569 Ikorong Anouk Gilbert Nemron A simple dissertation around the Berge problem and the Hadwiger conjecture . . 571--593 C. C. Lee and K. Y. Huang and S. Y. Huang On-line password guessing attack on Lu--Cao key agreement protocol for secure authentication . . . . . . . . . 595--598 N. Daili Some probabilistic approaches to some asymptotic prime numbers formulae . . . 599--614 C. Koukouvinos and E. Lappas and D. E. Simos Encryption schemes using orthogonal arrays . . . . . . . . . . . . . . . . . 615--628
G. W. Helmy and M. A. Ahmed and M. N. El-Derini Using co-operating agents for partial results protection in mobile agent paradigm . . . . . . . . . . . . . . . . 629--647 M. C. Chiu and L. J. Yeh and C. H. Yeh The development of tactile testing machine on tact switch . . . . . . . . . 649--669 R. U. Rani A novel single source shortest path algorithm . . . . . . . . . . . . . . . 671--680 Y. Talebi and M. S. Esmaeilifar and S. Azizpour A kind of intersection graph of vector space . . . . . . . . . . . . . . . . . 681--689 Md. I. Islam and J. K. Das and M. R. Amin Call admission scheme of mixed traffic for mobile cellular networks . . . . . . 691--705 M. Zannetti A combinatorial characterization of parabolic quadrics . . . . . . . . . . . 707--715 J. C. Huang and W. T. Pan Performing stock closing price prediction through the use of principle component regression in association with general regression neural network . . . 717--728 R. Sweetly and J. Paulraj Joseph The radio number of $(W_n \colon 2)$ graphs . . . . . . . . . . . . . . . . . 729--736 R. Stangarone and L. Verdi Cryptosystems involving one factorizations of graphs . . . . . . . . 737--743 D. Poulakis A public key encryption scheme based on factoring and discrete logarithm . . . . 745--752 Anonymous Index of Volume 12 (2009) . . . . . . . 753--758 Anonymous Contents --- Volume 12 Number 6 (2009) A--A
H. B. Bahar and M. Sokouti and B. Sokouti A first study of improving transposition cryptosystem . . . . . . . . . . . . . . 1--9 S. Ferri Combinatorial characterizations of $(2q + 1)$-caps in ${\rm PG}(r, q)$ . . . . . 11--15 K. Y. Lin and J. C. Lin and J. M. Chen and T. C. Wu Defense automatic malicious tools based on navigation behavior . . . . . . . . . 17--27 R. Padmavathy and C. Bhagvati Ephemeral key recovery using index calculus method . . . . . . . . . . . . 29--43 M. S. Mulaudzi and O. Akinyemi $q$-Enumeration of alternating permutations of odd length . . . . . . . 45--67 M. Mitton Convolution and generalized difference sets . . . . . . . . . . . . . . . . . . 69--83 N. Kobayashi and T. Matsushima and S. Hirasawa An accurate density evolution analysis for a finite-state Markov channel . . . 85--97 G. Shobhalatha and K. Suresh Lattice properties in dioids . . . . . . 99--104
S. Hirasawa and M. Kasahara A note on performance of generalized tail biting trellis codes . . . . . . . 105--122 H. Hedayati $t$-Implication-based fuzzy interior hyperideals of semihypergroups . . . . . 123--140 A. K. Mohapatra and N. Prakash Wired equivalent privacy reinvestigated 141--151 L. Cinque and G. Iovane and M. Manzo and E. Sangineto Face recognition using SIFT features and a region-based ranking . . . . . . . . . 153--170 L. Berardi and R. Rota A construction of a key exchange protocol . . . . . . . . . . . . . . . . 171--174 B. D. Sharma and N. Sookoo Eigenvalues of the difference matrices of the Lee partition . . . . . . . . . . 175--183 A. Kouadri and L. Chiter and M. Zelmat A radial basis function neural network optimized through modified DIRECT algorithm based-model for a three interconnected water tank . . . . . . . 185--200 Anonymous Table of Contents --- Volume 13 Number 2 A--A
Y. Feng $p$-Fuzzy quasi-hypergroups obtained from fuzzy binary relations . . . . . . 201--208 C. Porkodi and R. Arumuganathan and K. Vidya Single authority electronic voting based on elliptic curves . . . . . . . . . . . 209--217 S. J. Hwang and C. H. Chao An efficient non-interactive deniable authentication protocol with anonymous sender protection . . . . . . . . . . . 219--231 S. K. Pal and S. Kapoor and A. Arora and R. Chaudhary and J. Khurana Design of strong cryptographic schemes based on Latin Squares . . . . . . . . . 233--256 B. Saxena and S. K. Pal Some new concepts in fuzzy arithmetic 257--270 R. Li Eigenvalues, Laplacian eigenvalues, and Hamiltonian connectivity of graphs . . . 271--275 R. Vasuki and A. Nagarajan On the construction of new classes of super mean graphs . . . . . . . . . . . 277--290 C. M. Fan and C. C. Huang A note of solutions to the morphic involution language equations . . . . . 291--298 M. J. Lee and M. K. Kuo and Y. R. Chen An antimagic labeling in $K2n,2n | nC4$ 299--304 Anonymous Contents --- Volume 13 Number 03 June 2010 . . . . . . . . . . . . . . . . . . A--A
S. Swapna and A. D. Dileep and C. C. Sekhar and S. Kant Block cipher identification using support vector classification and regression . . . . . . . . . . . . . . . 305--318 S. Nagireddy and H. A. Murthy and S. Kant Identification of Encryption Method for Block Ciphers using Histogram Method . . 319--328 S. Kant and V. Sharma and N. Verma and B. K. Dass Identification scheme for romanized Indian languages from their plain and ciphered bit stream . . . . . . . . . . 329--345 S. Kant and R. K. Asthana and B. L. Jangid Comparative performance of the classifiers for cryptosystem identification . . . . . . . . . . . . . 347--368 T. Saito and T. Matsushima and S. Hirasawa A note on automatic construction algorithms for orthogonal designs of experiments using error correcting codes 369--381 T. Suko and T. Matsushima and S. Hirasawa Asymptotic property of universal lossless coding for independent piecewise identically distributed sources . . . . . . . . . . . . . . . . 383--391 Hui-Chin Tang and K. H. Hsieh and Hwapeng Chang A 4217th-order multiple recursive random number generator with modulus $2^{31} - 69$ . . . . . . . . . . . . . . . . . . 393--398 Anonymous Book Reviews . . . . . . . . . . . . . . 399--405 Anonymous Contents --- Volume 13 (04 August 2010) A--A
S. Pal and P. Bhowmick Cubic approximation of curve-shaped objects in $Z_2$: a generalized approach based on discrete curvature . . . . . . 407--427 H. Po-Hsian A weight-based data hiding method for binary image using selective binary numeral system . . . . . . . . . . . . . 429--444 N. Vijayarangan Hard problems in elliptic curve scalar multiplication . . . . . . . . . . . . . 445--452 B. D. Acharya and K. A. Germina Vertex-graceful graphs . . . . . . . . . 453--463 N. Daili About binomial densities: some applications in number theory . . . . . 465--472 O. Ferri and S. Ferri Graphic characterizations of the $k$-caps and $k$-arcs in ${\rm PG}(r, q)$ . . . . . . . . . . . . . . . . . . 473--477 Hui-Chin Tang and Kuang-Hang Hsieh and Hwapeng Chang A 32-bit linear congruential random number generator with prime modulus . . 479--486 P. V. Reddy and B. U. Rao and T. Gowri ID-based directed proxy signature scheme from bilinear pairings . . . . . . . . . 487--500 Anonymous Contents --- Volume 13 Number 05 October 2010 . . . . . . . . . . . . . . . . . . A--A
G. Iovane and P. Giordano and G. Ingenito and M. Leone and A. Nocerino Biometric watermarking via wavelet approach, reverse engineering in infosecurity and dematerialization of public administration . . . . . . . . . 501--542 M. Kures The composition of polynomials by the substitution principle . . . . . . . . . 543--552 B. D. Acharya Signed intersection graphs . . . . . . . 553--569 L. Poinsot Doubly perfect nonlinear Boolean permutations . . . . . . . . . . . . . . 571--582 A. P. Kazemi Every $K1,7$ and $K1,3$-free, $3$-vertex critical graph of even order has a perfect matching . . . . . . . . . . . . 583--591 Hui-Chin Tang and K. H. Hsieh and T. L. Chao A backward heuristic algorithm for two-term multiple recursive random number generators . . . . . . . . . . . 593--600 B. Basavanagoud and P. V. Patil A criterion for (non-)planarity of the transformation graph $G(xyz)$ when $xyz = - + +$ . . . . . . . . . . . . . . . . 601--610 Anonymous Index of Volume 13 (2010) . . . . . . . 611--616 Anonymous Contents --- Volume 13 Number 06 December 2010 . . . . . . . . . . . . . A--A
T. T. Chelvam and T. Asir A note on total graph of $Z(n)$ . . . . 1--7 M. H. Al-Towaiq and H. K. Al-Bzoor An efficient algorithm for the solution of second order PDE's using Taylor expansion polynomials . . . . . . . . . 9--31 T. G. Jaíyé\colá On three cryptographic identities in left universal Osborn loops . . . . . . 33--50 Z. Liang Coverings and packings of complete directed graphs by odd circuits . . . . 51--75 N. Begum and M. Alam and Md. I. Islam Fingerprint detection based on DWT a new approach . . . . . . . . . . . . . . . . 77--87 S. J. Peter and S. P. Victor An integrated approach for local outlier detection using dynamic minimum spanning tree . . . . . . . . . . . . . . . . . . 89--106 Anonymous Contents --- Vol. 14 # 01 February 2011 A
E. Elsheh and A. Youssef Cryptanalysis of a public key cryptosystem based on boolean permutations . . . . . . . . . . . . . . 107--115 C. L. Chin and C. C. Huang Some properties of involution codes . . 117--127 E. Syahrul and J. Dubois and V. Vajnovszki Combinatorial transforms: Applications in lossless image compression . . . . . 129--147 S. J. Peter Minimum spanning tree based clustering for outlier detection . . . . . . . . . 149--166 S. J. Peter Structural similarity clustering for detection of outliers and hubs using minimum spanning tree . . . . . . . . . 167--183 T. C. Kao and H. C. Tang An exhaustive analysis of two-term multiple recursive random number generators with double precision floating point restricted multipliers 185--191 R. Vasuki and A. Nagarajan Further results on super mean graphs . . 193--206 Anonymous Contents --- Vol. 14 # 02 April 2011 . . A
G. Iovane and L. Puccio and G. Lamponi and A. Amorosia Electronic access key based on innovative Information Fusion technique involving prime numbers and biometric data . . . . . . . . . . . . . . . . . . 207--225 S. J. Peter Structural similarity micro clustering algorithm for local outliers and hubs using dynamic minimum spanning tree . . 227--247 J. John and A. Vijayan and S. Sujitha The forcing edge covering number of a graph . . . . . . . . . . . . . . . . . 249--259 J. Bhaumik and D. Roy Chowdhury Nimix: An involutary nonlinear vectorial boolean function . . . . . . . . . . . . 261--277 M. K. A. Jebitha and J. P. Joseph Domination in transformation graph $G-+-$ . . . . . . . . . . . . . . . . . 279--303 Anonymous Contents --- Vol. 14 # 03 June 2011 . . A
G. A. M. Abdelhady and F. S. Helail and A. A. Elkouny New DES based on elliptic curves . . . . 305--315 R. Amutha Performance analysis of $64$-ary triangular quadrature amplitude modulation . . . . . . . . . . . . . . . 317--332 D. R. Stoddart The groups H3 and H4 of a class of certain cyclically presented groups are $2$-generated . . . . . . . . . . . . . 333--340 H. C. Tang and K. H. Hsieh and C. J. Wang A partial exhaustive search for good two-term third-order multiple recursive random number generators . . . . . . . . 341--348 T. Karthikeyan and S. J. Peter and S. Chidambaranathan Meta clusters through minimum spanning tree based clustering for performance analysis of students . . . . . . . . . . 349--367 S. Das and D. Roy Chowdhury On usage of cellular automata in strengthening stream ciphers . . . . . . 369--390 N. Vijayarangan Communication protocols based on CAAA attributes . . . . . . . . . . . . . . . 391--404 Anonymous Contents --- Vol. 14 # 04 August 2011 A
S. J. Peter A novel dynamic minimum spanning tree based clustering method for image mining 405--419 S. Arumugam and L. Martin Degrees and degree sequence of $k$-edge $d$-critical graphs . . . . . . . . . . 421--429 J. Dayantis Generalised Arnold numbers and series 431--444 F. A. Eteme and J. A. Tsimi A modal $[.\,.]$-valent approach of the notion of code . . . . . . . . . . . . . 445--473 S. J. Peter Detection of outliers and hubs using minimum spanning tree based on analytical perspective of degree numbers 475--488 S. J. Peter Nonparametric search algorithm for outliers and hubs using minimum spanning tree . . . . . . . . . . . . . . . . . . 489--502 Anonymous Contents --- Vol. 14 # 05 October 2011 A
B. D. Sharma and N. Sookoo Generalized Krawtchouk polynomials and the complete weight enumerator of the dual code . . . . . . . . . . . . . . . 503--514 H. Antonopoulou and N. Glinos and Y. C. Stamatiou An identity derived from the solution of a class of differential equations for the evolution of a key agreement protocol . . . . . . . . . . . . . . . . 515--520 D. Ferrero and S. Varghese and A. Vijayakumar Power domination in honeycomb networks 521--529 R. Li A note on the average distance of a graph . . . . . . . . . . . . . . . . . 531--536 C. K. Chen Relation between the releasing strategy and the domestic rentals on the U.S. Major Film . . . . . . . . . . . . . . . 537--558 Fidéle Ayissi Etémé and Jean Arnaud Tsimi A $m \Theta$ approach of the algebraic theory of linear codes . . . . . . . . . 559--581 S. J. Peter and S. Chidambaranathan An efficient divisive-agglomerative hierarchical clustering algorithm using minimum spanning tree . . . . . . . . . 583--595 K. Zhao and Z. Li and D. Chen New sufficient condition and Hamiltonian and traceable . . . . . . . . . . . . . 597--602 Anonymous Index of Volume 14 (2011) . . . . . . . 603--606 Anonymous Contents --- Vol. 14 # 06 December 2011 A