Search
Now showing items 31-40 of 263
New tellurite glass: Optical properties
(
Elsevier
, 2008 , Article)
The refractive index and UV spectra of the quaternary tellurite glass system of the form 80TeO2-5TiO2-(15 - x) WO3-xAnOm where AnOm is Nb2O5, Nd2O3 and Er2O3, x = 0.01, 1, 3 and 5 mol% for Nb2O5 and x = 0.01, 0.1, 1, 3, 5 ...
Homotopy analysis method for fractional IVPs
(
Elsevier
, 2007 , Article)
In this paper, the homotopy analysis method is applied to solve linear and nonlinear fractional initial-value problems (fIVPs). The fractional derivatives are described by Caputo’s sense. Exact and/or approximate analytical ...
A new approach of clustering based machine-learning algorithm
(
Elsevier B.V.
, 2005 , Article)
Machine-learning research is to study and apply the computer modeling of learning processes in their multiple manifestations, which facilitate the development of intelligent system. In this paper, we have introduced a ...
Numerical comparison of methods for solving a special fourth-order boundary value problem
(
Elsevier Inc.
, 2007 , Article)
In this paper, we implement relatively new analytical techniques, the differential transform method, Adomian decomposition, and homotopy perturbation method, for solving a fourth-order boundary value problem. In these ...
Genetic algorithm-based multi-objective model for scheduling of linear construction projects
(
Elsevier Ltd
, 2007 , Article)
This paper presents a genetic algorithm-based multi-objective optimization model for the scheduling of linear construction projects. The model allows construction planners to generate and evaluate optimal/near-optimal ...
An efficient technique for finding the eigenvalues of fourth-order Sturm–Liouville problems
(
Elsevier
, 2009 , Article)
In this paper, we will develop a numerical technique for finding the eigenvalues of fourth-order non-singular Sturm–Liouville problems. We used the variational iteration methods as a basis for this technique. Numerical ...
A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study
(
IEEE
, 2009 , Article)
In mobile ad hoc networks (MANETs), many applications require group-oriented computing among a large number of nodes in an adversarial environment. To deploy these large-scale cooperative applications, secure multicast ...
Neural-Networks-Based Feedback Linearization versus Model Predictive Control of Continuous Alcoholic Fermentation Process
(
WILEY-VCH Verlag GmbH & Co.
, 2005 , Article)
In this work advanced nonlinear neural networks based control system design algorithms are adopted to control a mechanistic model for an ethanol fermentation process. The process model equations for such systems are highly ...
Guest Editorial: Special Issue on: WiMAX security and applications
(
John Wiley & Sons, Ltd.
, 2009 , Article)
Complex-impedance response of an Ag/TeO2-V2O5/Ag structure
(
Elsevier
, 2009 , Article)
The ac conductivity of glass samples of composition 50 mol% TeO2 and 50 mol% V2O5 has been analyzed. The samples were prepared by the usual melt-quench method. The electrical conductance and capacitance were measured over ...