نتایج جستجو برای: derivative methods

تعداد نتایج: 1929824  

Journal: :Applied Mathematics & Information Sciences 2014

Journal: :Hiroshima Mathematical Journal 1971

2012
Ali K. Ezzeddine Gholamreza Hojjati

Abstract: In this paper, we present a class of multistep methods for the numerical solution of stiff ordinary differential equations. In these methods the first, second and third derivatives of the solution are used to improve the accuracy and absolute stability regions of the methods. The constructed methods are A-stable up to order 6 and A(α)-stable up to order 8 so that, as it is shown in th...

1994
J. E. Dennis Virginia J. Torczon

There have been interesting recent developments in methods for solving optimization problems without making use of derivative (sensitivity) information. While calculus based methods that employ derivative information can be extremely eecient and very eeec-tive, they are not applicable to all MDO problems, for instance, when the function to be optimized is nondiierentiable, when sensitivity info...

Journal: :Math. Program. 2002
Stefano Lucidi Marco Sciandrone Paul Tseng

We propose feasible descent methods for constrained minimization that do not make explicit use of objective derivative information. The methods at each iteration sample the objective function value along a finite set of feasible search arcs and decrease the sampling stepsize if an improved objective function value is not sampled. The search arcs are obtained by projecting search direction rays ...

2010
G. K. Gupta G. K. GUPTA

Following the work of Enright [3] there has been interest in studying second derivative methods for solving stiff ordinary differential equations. Successful implementations of second derivative methods have been reported by Enright [3], Sacks-Davis [9], [10] and Addison[l]. Wallace and Gupta [13] have suggested a polynomial formulation of the usual first-derivative multistep methods. Recently ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

2006
Niki Pfeifer

Traditionally, syllogisms are arguments with two premises and one conclusion which are constructed by propositions of the form “All... are...” and “At least one... is...” and their respective negated versions. Unfortunately, the practical use of traditional syllogisms is quite restricted. On the one hand, the “All...” propositions are too strict, since a single counterexample suffices for falsi...

In this paper, we apply the local fractional Adomian decomposition and variational iteration methods to obtain the analytic approximate solutions of Fredholm integral equations of the second kind within local fractional derivative operators. The iteration procedure is based on local fractional derivative. The obtained results reveal that the proposed methods are very efficient and simple tools ...

Journal: :Computational Optimization and Applications 2022

Abstract In this paper, mixed-integer nonsmooth constrained optimization problems are considered, where objective/constraint functions available only as the output of a black-box zeroth-order oracle that does not provide derivative information. A new derivative-free linesearch-based algorithmic framework is proposed to suitably handle those problems. First, scheme for bound combines dense seque...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید