Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 40 matches
- 2020
- Taher Abualrub, Nuh Aydin, Ismail Aydogdu:
Optimal binary codes derived from $$\mathbb {F}_{2} \mathbb {F}_4$$-additive cyclic codes. J. Appl. Math. Comput. 64(1-2): 71-87 (2020) - Mohammad Hossein Akrami, Ali Atabaigi:
Hopf and forward bifurcation of an integer and fractional-order SIR epidemic model with logistic growth of the susceptible individuals. J. Appl. Math. Comput. 64(1-2): 615-633 (2020) - Yanning An, Wenjun Liu:
Existence of solutions for nonlinear fractional differential equations with non-homogenous boundary conditions. J. Appl. Math. Comput. 64(1-2): 195-214 (2020) - Md Abu Talhamainuddin Ansary, Geetanjali Panda:
A Sequential Quadratic Programming Method for Constrained Multi-objective Optimization Problems. J. Appl. Math. Comput. 64(1-2): 379-397 (2020) - Vinod Baniya, Ram Keval:
The influence of vaccination on the control of JE with a standard incidence rate of mosquitoes, pigs and humans. J. Appl. Math. Comput. 64(1-2): 519-550 (2020) - Dipesh Barman, Jyotirmoy Roy, Shariful Alam:
Trade-off between fear level induced by predator and infection rate among prey species. J. Appl. Math. Comput. 64(1-2): 635-663 (2020) - Mohamed Moumen Bekkouche, Hamza Guebbai, Muhammet Kurulay:
On the solvability fractional of a boundary value problem with new fractional integral. J. Appl. Math. Comput. 64(1-2): 551-564 (2020) - Julieta Bollati, Claudia M. Gariboldi, Domingo A. Tarzia:
Explicit solutions for distributed, boundary and distributed-boundary elliptic optimal control problems. J. Appl. Math. Comput. 64(1-2): 283-311 (2020) - Lina Chang, Hanze Liu, Xiangpeng Xin:
Lie symmetry analysis, bifurcations and exact solutions for the (2+1)-dimensional dissipative long wave system. J. Appl. Math. Comput. 64(1-2): 807-823 (2020) - Siyu Chen, Zhijun Liu, Lianwen Wang, Jing Hu:
Stability of a delayed competitive model with saturation effect and interval biological parameters. J. Appl. Math. Comput. 64(1-2): 1-15 (2020) - Avijit Das, Srinivasan Natesan:
SDFEM for singularly perturbed boundary-value problems with two parameters. J. Appl. Math. Comput. 64(1-2): 591-614 (2020) - Mohamed El Fatini, Roger Pettersson, Idriss Sekkak, Regragui Taki:
A stochastic analysis for a triple delayed SIQR epidemic model with vaccination and elimination strategies. J. Appl. Math. Comput. 64(1-2): 781-805 (2020) - Faouzi Haddouchi:
Positive solutions of nonlocal fractional boundary value problem involving Riemann-Stieltjes integral condition. J. Appl. Math. Comput. 64(1-2): 487-502 (2020) - Manh Tuan Hoang:
On the global asymptotic stability of a predator-prey model with Crowley-Martin function and stage structure for prey. J. Appl. Math. Comput. 64(1-2): 765-780 (2020) - Robert Jajcay, Primoz Potocnik, Steve Wilson:
Half-cyclic, dihedral and half-dihedral codes. J. Appl. Math. Comput. 64(1-2): 691-708 (2020) - Weiming Ji:
On a population model with Allee effects and environmental perturbations. J. Appl. Math. Comput. 64(1-2): 749-764 (2020) - Manpreet Kaur, Munish Kansal:
An efficient class of iterative methods for computing generalized outer inverse $${M_{T,S}{(2)}}$$. J. Appl. Math. Comput. 64(1-2): 709-736 (2020) - Subhash D. Kendre, S. I. Unhale:
On existence, uniqueness and Ulam's stability results for boundary value problems of fractional iterative integrodifferential equations. J. Appl. Math. Comput. 64(1-2): 503-517 (2020) - Mohamed Amine Kerker, Elbahi Hadidi, Abdelouahab Salmi:
Qualitative behavior of a higher-order nonautonomous rational difference equation. J. Appl. Math. Comput. 64(1-2): 399-409 (2020) - Bouchaib Khajji, Driss Kada, Omar Balatif, Mostafa Rachik:
A multi-region discrete time mathematical modeling of the dynamics of Covid-19 virus propagation using optimal control. J. Appl. Math. Comput. 64(1-2): 255-281 (2020) - Shanta Khatun, Md. Haider Ali Biswas:
Mathematical analysis and optimal control applied to the treatment of leukemia. J. Appl. Math. Comput. 64(1-2): 331-353 (2020) - Behrouz Kheirfam, Masoumeh Haghighi:
A wide neighborhood interior-point algorithm based on the trigonometric kernel function. J. Appl. Math. Comput. 64(1-2): 119-135 (2020) - Ziyu Liu, Jingyong Tang:
A new smoothing-type algorithm for nonlinear weighted complementarity problem. J. Appl. Math. Comput. 64(1-2): 215-226 (2020) - Somayeh Madani, Ali Reza Ashrafi:
Symmetry and two symmetry measures for the web and spider web graphs. J. Appl. Math. Comput. 64(1-2): 737-748 (2020) - Todsapol Mankean, Somphong Jitman:
Optimal binary and ternary linear codes with hull dimension one. J. Appl. Math. Comput. 64(1-2): 137-155 (2020) - Tayebeh Dehghan Niri, Mohammad Heydari, Mohammad Mahdi Hosseini:
Two nonmonotone trust region algorithms based on an improved Newton method. J. Appl. Math. Comput. 64(1-2): 179-194 (2020) - Chakradhar Padamutham, Venkata Subba Reddy Palagiri:
Algorithmic aspects of Roman domination in graphs. J. Appl. Math. Comput. 64(1-2): 89-102 (2020) - Rajendra Pant, Chibueze Christian Okeke, Chinedu Izuchukwu:
Modified viscosity implicit rules for proximal split feasibility and fixed point problems. J. Appl. Math. Comput. 64(1-2): 355-378 (2020) - Sharada Nandan Raw, Barkha Tiwari, Purnedu Mishra:
Dynamical complexities and pattern formation in an eco-epidemiological model with prey infection and harvesting. J. Appl. Math. Comput. 64(1-2): 17-52 (2020) - Mehmet Giyas Sakar, Onur Saldir:
A novel iterative solution for time-fractional Boussinesq equation by reproducing kernel method. J. Appl. Math. Comput. 64(1-2): 227-254 (2020)
skipping 10 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-09 12:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint