[HTML][HTML] Optimal eighth-order multiple root finding iterative methods using bivariate weight function
In this contribution, a novel eighth-order scheme is presented for solving nonlinear
equations with multiple roots. The proposed scheme comprises of three steps with the …
equations with multiple roots. The proposed scheme comprises of three steps with the …
Development of optimal eighth order derivative-free methods for multiple roots of nonlinear equations
A number of higher order iterative methods with derivative evaluations are developed in
literature for computing multiple zeros. However, higher order methods without derivative for …
literature for computing multiple zeros. However, higher order methods without derivative for …
[HTML][HTML] A Steffensen type optimal eighth order multiple root finding scheme for nonlinear equations
F Zafar, S Iqbal, T Nawaz - Journal of Computational Mathematics and Data …, 2023 - Elsevier
In this study, we introduce a novel weight function-based eighth order derivative-free method
for locating repeated roots of nonlinear equations. It is a three-step Steffensen-type scheme …
for locating repeated roots of nonlinear equations. It is a three-step Steffensen-type scheme …
An excellent derivative-free multiple-zero finding numerical technique of optimal eighth order convergence
JR Sharma, S Kumar - ANNALI DELL'UNIVERSITA'DI FERRARA, 2022 - Springer
A number of higher order Newton-like methods (ie the methods requiring both function and
derivative evaluations) are available in literature for multiple zeros of a nonlinear function …
derivative evaluations) are available in literature for multiple zeros of a nonlinear function …
An excellent numerical technique for multiple roots
In recent times, some optimal eighth order iterative methods for computing multiple zeros of
nonlinear functions have been appeared in literature. Different from these existing optimal …
nonlinear functions have been appeared in literature. Different from these existing optimal …
The dynamical analysis of a uniparametric family of three-point optimal eighth-order multiple-root finders under the Möbius conjugacy map on the Riemann sphere
MY Lee, YI Kim - Numerical Algorithms, 2020 - Springer
In this paper, we present dynamical viewpoints under the Möbius conjugacy map on the
Riemann sphere for a uniparametric family of optimal eighth-order multiple-root finders …
Riemann sphere for a uniparametric family of optimal eighth-order multiple-root finders …
[HTML][HTML] Construction and efficiency of multipoint root-ratio methods for finding multiple zeros
MS Petković, LD Petković - Journal of Computational and Applied …, 2019 - Elsevier
Several root-ratio multipoint methods for finding multiple zeros of univariate functions were
recently presented. The characteristic of these methods is that they deal with m th root of …
recently presented. The characteristic of these methods is that they deal with m th root of …
Advancing Nonlinear Problem Solutions: Newton-Like Iterative Techniques for Varied Convergence Orders using Homotopy Perturbation
M Raza, D Toheed, NA Rehman - 2024 - researchsquare.com
In this paper, we develop Newton-like iterative methods of the convergence order three and
six to eight. These methods are developed by using homotopy perturbation technique and …
six to eight. These methods are developed by using homotopy perturbation technique and …
The gradient and the Newton iterative modelling methods for an operational amplifier circuit
L Xu - International Journal of Modelling, Identification and …, 2019 - inderscienceonline.com
In order to provide a new method to identify the mathematical model of circuit systems, this
paper studies modelling methods by combining the iterative strategy with the nonlinear …
paper studies modelling methods by combining the iterative strategy with the nonlinear …
[PDF][PDF] Results in Control and Optimization
Cybersecurity is one of the most important concerns associated with ever expanding internet
based technologies, products, services and networks. If cybersecurity is prevention then …
based technologies, products, services and networks. If cybersecurity is prevention then …