| Publication | Date of Publication | Type |
|---|
A comparative study of unsteady MHD Falkner-Skan wedge flow for non-Newtonian nanofluids considering thermal radiation and activation energy Chinese Journal of Physics (Taipei) | 2024-05-21 | Paper |
Analysis of bio-convective MHD Blasius and Sakiadis flow with Cattaneo-Christov heat flux model and chemical reaction Chinese Journal of Physics (Taipei) | 2024-05-21 | Paper |
Suboptimal control for nonlinear slow-fast coupled systems using reinforcement learning and Takagi-Sugeno fuzzy methods International Journal of Adaptive Control and Signal Processing | 2024-04-29 | Paper |
Slepian-Wolf coding with quantum side information Quantum Information Processing | 2024-01-16 | Paper |
Source coding with quantum side information at several decoders Quantum Information Processing | 2023-06-13 | Paper |
Novel finite point approach for solving time-fractional convection-dominated diffusion equations Advances in Difference Equations | 2022-03-07 | Paper |
| Construction of generalized fuzzy regular filters and generalized fuzzy congruence relations of interval set non-commutative remaining lattice | 2021-09-29 | Paper |
Global tracking of myocardial motion in ultrasound sequence images: a feasibility study Mathematical Biosciences and Engineering | 2021-08-13 | Paper |
| scientific article; zbMATH DE number 7366038 (Why is no real title available?) | 2021-07-01 | Paper |
| Non-convex combination algorithm for a family of split pseudomonotone equilibrium problems in Hilbert space | 2020-12-31 | Paper |
| Existence of positive solutions for a class of Kirchhoff type systems | 2019-06-21 | Paper |
| A new iterative algorithm for generalized split equilibrium problem in Hilbert spaces | 2018-03-29 | Paper |
| A new iterative algorithm for generalized split equilibrium problem in Hilbert spaces | 2018-03-29 | Paper |
| A characteristic stabilized nonconforming finite element method for the unsteady incompressible Navier-Stokes equations | 2015-06-29 | Paper |
Computing maximum non-crossing matching in convex bipartite graphs Discrete Applied Mathematics | 2015-06-10 | Paper |
An improved implicit re-initialization method for the level set function applied to shape and topology optimization of fluid Journal of Computational and Applied Mathematics | 2015-02-11 | Paper |
An adaptive finite element method for stationary incompressible thermal flow based on projection error estimation Mathematical Problems in Engineering | 2014-10-13 | Paper |
| An iterative method for a different constrained least square solution of linear matrix equations | 2014-06-30 | Paper |
| scientific article; zbMATH DE number 6311825 (Why is no real title available?) | 2014-06-30 | Paper |
| An iterative method to find symmetric solutions of a two-variable Riccati matrix equation | 2014-06-30 | Paper |
An iterative method for different constrained solution and different constrained least squares solution of linear matrix equation Applied Mathematics. Series A (Chinese Edition) | 2013-11-19 | Paper |
| A modified conjugate gradient method for a different constrained least square solution of two-variables linear matrix equations | 2013-06-20 | Paper |
The Riemann problem for the nonlinear degenerate wave equations Acta Mathematica Scientia. Series B. (English Edition) | 2012-10-05 | Paper |
An MCG method for a different constrained least squares solution of two-variables linear matrix equations for recurrent event data Acta Mathematicae Applicatae Sinica | 2012-10-05 | Paper |
Computing maximum non-crossing matching in convex bipartite graphs Frontiers in Algorithmics and Algorithmic Aspects in Information and Management | 2012-07-16 | Paper |
| scientific article; zbMATH DE number 6001662 (Why is no real title available?) | 2012-01-27 | Paper |
Fast secure computation of set intersection Lecture Notes in Computer Science | 2010-09-10 | Paper |
Private Mutual Authentication and Conditional Oblivious Transfer Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes Applied Cryptography and Network Security | 2009-03-10 | Paper |
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection Theory of Cryptography | 2009-03-03 | Paper |
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials Automata, Languages and Programming | 2008-08-19 | Paper |
| scientific article; zbMATH DE number 2065856 (Why is no real title available?) | 2004-05-18 | Paper |
Two-dimensional numerical analysis of stress-wave-amplifier Applied Mathematics and Mechanics. (English Edition) | 1985-01-01 | Paper |