The Optimal q-Homotopy Analysis Method (Oq-HAM)
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 8
Abstract
In this paper, an optimal q-homotopy analysis method (Oq-HAM) is proposed. We present some examples to show the reliability and efficiency of the method. It is compared with the one-step optimal homotopy analysis method. The results reveal that the Oq-HAM has more accuracy to determine the convergence-control parameter than the one-step optimal HAM.
Authors and Affiliations
Shaheed N Huseen, Said R. Grace, Magdy A. El-Tawil
Implementation and Evaluation of Rule Induction Algorithm with Association Rule Mining: A study in life insurance
Data Mining: extracting useful insights from large and detailed collections of data. With the increased possibilities in modern society for companies and institutions to gather data cheaply and efficiently, this subject...
An Adaptive and Interactive Agent Based ITS for Cognitive Skill Prediction and Improvement
This paper proposes an adaptive and interactive agent based intelligent tutoring system for cognitive ability realization and improvement (ITSCARE - Intelligent Tutoring System for Cognitive Ability Realization and Impro...
Descriptive statistical analysis based on patients EEG energy in coma and quasi-brain-death state
In this paper, measure of descriptive statistical analysis based on EEG (electroencephalography) energy was proposed to evaluate coma and quasi-brain-death patients EEG. Firstly, 36 cases of EEG (coma: 19; quasi-br...
A Study Paper on Performance Degradation due to Excessive Garbage Collection in Java Based Applications using Profiler
Applications are becoming more complex, more larger and demand high quality. Application Server is the component on which most of the applications are hosted. It acts in the middle tier providing lot of functionalities l...
Security of Web Services: Methods and Contrivance
The increasing use of web services, the proved advantages of service-oriented architectures and continuously appliedattacks to them require utilization of given secure mechanisms that ensure the security at different lev...