期刊文献+

一种新的迭代收敛阶数的证明与推广 被引量:3

A New Proof of Convergence Order for an Iterative Method and Generlization
下载PDF
导出
摘要 迭代方法是求解非线性方程近似根的重要方法.本文基于隐函数存在定理,提出了一种新的迭代方法收敛性和收敛阶数的证明方法,并分别对牛顿(Newton)和柯西(Cauchy)迭代方法迭代收敛性和收敛阶数进行了证明.最后,利用本文提出的证明方法,证明了基于三次泰勒(Taylor)展式构成的迭代格式是收敛的,收敛阶数至少为4,并提出猜想,基于n次泰勒展式构成的迭代格式是收敛的,收敛阶数至少为(n+1). Iterative method is an important technique to solve the approximate root for nonlinear equations. In this article, with the implicit function theorem, we present a new method for proving the convergence and deriving the convergence order for an iterative method. With these new method, we demonstrate that the Newton iteration method and the Cauchy iteration method are convergent and their convergent order are at least 2 and 3 respectively. Then based on the Taylor expansion of degree of 3, we present a local convergent iteration method, which has the convergence order at least 4. At last, we propose a guess that the iteration method, based on the Taylor expansion of degree of n, is convergent and its convergence order is at least (n+ 1).
作者 张卷美
出处 《大学数学》 北大核心 2007年第6期135-139,共5页 College Mathematics
关键词 迭代收敛 迭代收敛阶数 泰勒(Taylor)展式 方程求根 convergence of iteration converging order, Taylor expansion root of equation
  • 相关文献

参考文献6

  • 1Wang D R, Wu Y J. Some modifications of the parallel Halley iteration method and their convergence[J]. Computing, 1987, 38(1) :75-87.
  • 2Ehrlieh L W. A modified Newton method for polynomials[J]. Comm. ACM, 1967, 10(2):107--108
  • 3Anourein Abdel Wahab M. An improvement on two iteration methods for simultaneous determination of zeros of a polynomial[J]. Internal. Comput. Math., 1977, 6(3):241--252.
  • 4张邦林,丑纪范,孙照渤.用前期大气环流预报中国夏季降水的EOF迭代方案[J].科学通报,1991,36(23):1797-1798. 被引量:40
  • 5孙志忠.计算方法典型例题分析[M].北京:科学出版社,2002:43-44.
  • 6黄正达.不精确牛顿方法的收敛性[J].浙江大学学报(理学版),2003,30(4):393-396. 被引量:2

二级参考文献8

共引文献40

同被引文献22

  • 1国家互联网应急中心.2013年我国互联网网络安全态势综述[J/OL].http://www.cert. org.cn.
  • 2ANDERSO J P. Computer Security Threat Monitoring and Surveil-lance [P]. USA: PA 19034,1980.4.
  • 3LI M. An approach to reliably identifying signs ofDDOS flood attacksbased on LRD traffic pattern recognition[Jj. Computers & Security,2004,23(7):549-558.
  • 4DEREK. S, GUAN Q, FU S. An anomaly detection framework forautonomic management of compute cloud systems[C]//ComputerSoftware and Applications Conference Workshops (COMPSACW).Seoul, c2010: 376-381.
  • 5GUAN Q, ZHANG Z M, FU S. Ensemble of Bayesian predictors anddecision trees for proactive failure management in cloud computingsystems[J]. Journal of Communications, 2012,7(1):52-61.
  • 6HUSANBIR S, LIU J G, GUAN Q. AFD: adaptive failure detectionsystem for cloud computing infrastructures[C]//Perrormance Computingand Communications Conference (IPCCC). Austin, TX, c2012: 71-80.
  • 7ZHU Q, TERESA T, XTE Q. Automatic fault diagnosis in cloud infra-slnicture[C]//Cloud Computing Technology and Science(CloudCom).Bristol, c2013: 467-474.
  • 8GUAN Q, FU S. Adaptive anomaly identification by exploring metricsubspace in cloud computing infrastructures[C]//Reliable DistributedSystems (SRDS). Braga, c2013: 205-214.
  • 9李乐,章毓晋.非负矩阵分解算法综述[J].电子学报,2008,36(4):737-743. 被引量:105
  • 10于明明,吴开谡,张妍.牛顿迭代法与几种改进格式的效率指数[J].数学的实践与认识,2008,38(18):154-159. 被引量:10

引证文献3

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部