Comment on “ Application of ( G ′ G ) - expansion
نویسنده
چکیده
In a recent paper [Abazari R. Application of ( ′ G )-expansion method to travelling wave solutions of three nonlinear evolution equation. Computers & Fluids 2010;39:1957–1963], the (G/G)-expansion method was used to find travelling-wave solutions to three nonlinear evolution equations that arise in the mathematical modelling of fluids. The author claimed that the method delivers more general forms of solution than other methods. In this note we point out that not only is this claim false but that the delivered solutions are cumbersome and misleading. The extended tanh-function expansion method, for example, is not only entirely equivalent to the (G/G)-expansion method but is more efficient and user-friendly, and delivers solutions in a compact and elegant form.
منابع مشابه
Application of G'/G-expansion method to the (2+1)-dimensional dispersive long wave equation
In this work G'/G-expansion method has been employed to solve (2+1)-dimensional dispersive long wave equation. It is shown that G'/G-expansion method, with the help of symbolic computation, provides a very effective and powerful mathematical tool, for solving this equation.
متن کاملApplication of the new extended (G'/G) -expansion method to find exact solutions for nonlinear partial differential equation
In recent years, numerous approaches have been utilized for finding the exact solutions to nonlinear partial differential equations. One such method is known as the new extended (G'/G)-expansion method and was proposed by Roshid et al. In this paper, we apply this method and achieve exact solutions to nonlinear partial differential equations (NLPDEs), namely the Benjamin-Ono equation. It is est...
متن کاملMAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE
Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...
متن کاملMaximal Independent Sets for the Pixel Expansion of Graph Access Structure
Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...
متن کاملComment on “ Application of ( G ′ G ) -
In a recent paper [Abazari R. Application of ( ′ G )-expansion method to travelling wave solutions of three nonlinear evolution equation. Computers & Fluids 2010;39:1957–1963], the (G/G)-expansion method was used to find travelling-wave solutions to three nonlinear evolution equations that arise in the mathematical modelling of fluids. The author claimed that the method delivers more general fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017