- Inicio
- RESULTADOS DE INVESTIGACIÓN
- Artículos Científicos WOS y SCOPUS
- Listar Artículos Científicos WOS y SCOPUS por autor
Listar Artículos Científicos WOS y SCOPUS por autor "Argyros, Michael I"
Mostrando ítems 1-4 de 4
-
Ball comparison between frozen Potra and Schmidt-Schwetlick schemes with dynamical analysis
Argyros, Michael I; Argyros, Ioannis K; González, Daniel; Magreñán, Á. Alberto; Moysi, Alejandro; Sarría, Íñigo (Computational and Mathematical Methods, 2021)In this article, we propose a new research related to the convergence of the frozen Potra and Schmidt-Schwetlick schemes when we apply to equations. The purpose of this study is to introduce a comparison between two solutions ... -
Local and Semi-local convergence for Chebyshev two point like methods with applications in different fields
Argyros, Christopher I.; Argyros, Michael I; Argyros, Ioannis K; Magreñán, Á. Alberto; Sarría, Íñigo (Journal of Computational and Applied Mathematics, 2023)The convergence is developed for a large class of Chebyshev-two point-like methods for solving Banach space valued equations. Both the local as well as the semi-local convergence is provided for these methods under general ... -
Local convergence comparison between frozen Kurchatov and Schmidt–Schwetlick–Kurchatov solvers with applications
Moysi, Alejandro; Argyros, Michael I; Argyros, Ioannis K; Magreñán, Á. Alberto ; Sarría, Íñigo ; González Sánchez, Daniel (Journal of Computational and Applied Mathematics, 04/2022)In this work we are going to use the Kurchatov–Schmidt–Schwetlick-like solver (KSSLS) and the Kurchatov-like solver (KLS) to locate a zero, denoted by x∗ of operator F. We define F as F:D⊆B1⟶B2 where B1 and B2 stand for ... -
On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications
Mateo Tudela, Francesc ; Bermejo Higuera, Juan Ramón ; Bermejo-Higuera, Javier ; Sicilia, Juan Antonio ; Argyros, Michael I (Applied Sciences-Basel, 12/2020)The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they ...