Learn More
In this paper, two new families of eighth-order iterative methods for solving nonlinear equations are presented. These methods are developed by combining a class of optimal two-point methods and a modified Newton's method in the third step. Per iteration the presented methods require three evaluations of the function and one evaluation of its first(More)
The purpose of this study is to implement a new modification of the variational iteration method (H-S-VIM), which is a combination of spectral method and variational iteration method for heat transfer problems with high nonlinearity order. The merit of this method is that it does not require the solution of any linear or nonlinear system of equations unlike(More)
2 ABSTRACT— Considering an under supervised 3D space where a group of mobile devices with limited sensing and communicating capabilities are deployed, this paper aims at proposing a decentralized self-deployment algorithm for agents to get maximum connected coverage topology. The problem is modeled as maximization which is solved completely distributed. In(More)
Given a 3D space where should be supervised and a group of mobile sensor actor nodes with limited sensing and communicating capabilities, this paper aims at proposing a distributed self-deployment algorithm for agents to cover the space as much as possible by considering non-uniform sensing coverage degree constraint of environment while preserving(More)
In this paper, an effective direct method to determine the numerical solution of linear and nonlinear Fredholm and Volterra integral and integro-differential equations is proposed. The method is based on expanding the required approximate solution as the elements of Chebyshev cardinal functions. The operational matrices for the integration and product of(More)
In this paper, an efficient method is presented for solving two dimensional Fred-holm and Volterra integral equations of the second kind. Chebyshev polynomials are applied to approximate a solution for these integral equations. This method transforms the integral equation to algebraic equations with unknown Chebyshev coefficients. The high accuracy of this(More)
In 2012, Wang and Qin proposed an authentication mechanism in order to get access control for mobile pay-TV organization to enhance the Sun and Leu’s technique. Wang and Qin declared that their technique satisfies the security expectations or requirements intended for mobile pay-TV system. However, this work indicates that Wang and Qin’s scheme suffers from(More)