نتایج جستجو برای: one point method

تعداد نتایج: 3621698  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Journal of Japan Society for Fuzzy Theory and Systems 1996

Journal: :international journal of mathematical modelling and computations 0
paria assari orcid id islamic azad university, hamedan branch iran, islamic republic of taher lotfi islamic azad university, hamedan branch iran, islamic republic of

in this study, we modify an iterative non-optimal without memory method, in such a way that is becomes optimal. therefore, we obtain convergence order eight with the some functional evaluations. to justify our proposed method, some numerical examples are given.

Journal: :bulletin of the iranian mathematical society 0
w. zhu college of management and economics‎, ‎tianjin university‎, ‎tianjin 300072‎, ‎china. s. ling college of management and economics‎, ‎tianjin university‎, ‎tianjin 300072‎, ‎china.

let $c$ be a nonempty closed convex subset of a real hilbert space $h$. let ${s_n}$ and ${t_n}$ be sequences of nonexpansive self-mappings of $c$, where one of them is a strongly nonexpansive sequence. k. aoyama and y. kimura introduced the iteration process $x_{n+1}=beta_nx_n+(1-beta_n)s_n(alpha_nu+(1-alpha_n)t_nx_n)$ for finding the common fixed point of ${s_n}$ and ${t_n}$, where $uin c$ is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید