A note on the improved derivative free root-solvers
نویسندگان
چکیده
منابع مشابه
A Class of Three-Step Derivative-Free Root Solvers with Optimal Convergence Order
A class of three-step eighth-order root solvers is constructed in this study. Our aim is fulfilled by using an interpolatory rational function in the third step of a three-step cycle. Each method of the class reaches the optimal efficiency index according to the Kung-Traub conjecture concerning multipoint iterative methods without memory. Moreover, the class is free from derivative calculation ...
متن کاملA note on the security of two improved RFID protocols
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
متن کاملEfficient Sixth-Order Nonlinear Equation Solvers Free from Derivative
The construction of some without memory efficient sixth-order iterative schemes for solving univariate nonlinear equations is presented. Per iteration, the novel methods comprise four evaluations of the function, while they are free from derivative calculations. The application of such iterative methods is appeared, when the cost of derivative evaluation is expensive. We analytically show the s...
متن کاملA Note on ScaLAPACK's Banded System Solvers
We suggest modiications in the local computations of the ScaLAPACK subroutines for solving diagonally dominant and arbitrary narrow-banded linear systems. The modiications concern the way auxiliary variables are stored. The numerical properties of the algorithms are not aaected. However, as the way the memory is accessed is changed the performance of the solvers is signiicantly improved. We dis...
متن کاملa note on the security of two improved rfid protocols
recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computational and Applied Mathematics
سال: 2009
ISSN: 0377-0427
DOI: 10.1016/j.cam.2007.12.008