A CHAOTIC BAT ALGORITHM FOR SOLVING DEFINITE INTEGRAL
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 4
Abstract
In this paper, an Improved Bat Algorithm with Chaos (IBACH) is presented for solving definite integral. The IBACH satisfies the question of parallel calculating numerical integration in engineering and those segmentation points that are adaptive. Several numerical simulation results show that the algorithm offers an effective way to calculate numerical value of definite integrals; it has a high convergence rate, a high accuracy and robustness.
Authors and Affiliations
Khalil AL-Wagih
The Impact of UTAUT Model and ICT Theoretical Framework on University Academic Staff: Focus on Adamawa State University, Nigeria.
This paper examined the impact of UTAUT model and ICT theoretical framework on university academicians. The UTAUT model theory was verified using multiple regressions of the four constructs on behavioral intention to acc...
A Survey On Cloud Computing and Its Various Services
Cloud computing is a hot topic all over the world nowadays, through which customers can access information and computer power via a web browser. As the adoption and deployment of cloud computing increase, it is critical...
Enhanced Cloud Computing Framework to Improve the Educational Process in Higher Education: A case study of Helwan University in Egypt
Cloud Computing (CC) becames the most promising technology to reach the advanced educational services, because it essentially provides a huge computing and storage capacities. Cloud computing provides reliable and tailor...
EVOLVING INFORMATION TECHNOLOGY: OPPORTUNITIES AND CHALLENGES
The rapid Information technology evolution is fast becoming a change agent in the ways we conduct business and social interaction. Due to the increasing number of regulations and policies regarding information technology...
Prevention Techniques for Sybil Attack
Mobile ad-hoc network is a self-governing network, consists of group of nodes that communicates with each other through wireless links. As it is a wireless network, so it is subjected to various attacks. There is one att...