Learn More
In this paper, two new families of eighth-order iterative methods for solving nonlinear equations are presented. These methods are developed by combining a class of optimal two-point methods and a modified Newton's method in the third step. Per iteration the presented methods require three evaluations of the function and one evaluation of its first(More)
The purpose of this study is to implement a new modification of the variational iteration method (H-S-VIM), which is a combination of spectral method and variational iteration method for heat transfer problems with high nonlinearity order. The merit of this method is that it does not require the solution of any linear or nonlinear system of equations unlike(More)
2 ABSTRACT— Considering an under supervised 3D space where a group of mobile devices with limited sensing and communicating capabilities are deployed, this paper aims at proposing a decentralized self-deployment algorithm for agents to get maximum connected coverage topology. The problem is modeled as maximization which is solved completely distributed. In(More)
In 2012, Wang and Qin proposed an authentication mechanism in order to get access control for mobile pay-TV organization to enhance the Sun and Leu’s technique. Wang and Qin declared that their technique satisfies the security expectations or requirements intended for mobile pay-TV system. However, this work indicates that Wang and Qin’s scheme suffers from(More)
Optimal operation of water resources in multiple and multipurpose reservoirs is very complicated. This is because of the number of dams, each dam's location (Series and parallel), conflict in objectives and the stochastic nature of the inflow of water in the system. In this paper, performance optimization of the system of Karun and Dez reservoir dams have(More)
In this paper, a new algorithm is presented to approximate the solution of a singularly perturbed boundary value problem with left-layer based on the homotopy perturbation technique and applying the Laplace transformation. The convergence theorem and the error bound of the proposed method are proved. The method is examined by solving two examples. The(More)