{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T17:07:34Z","timestamp":1726074454177},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030433055"},{"type":"electronic","value":"9783030433062"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43306-2_115","type":"book-chapter","created":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T02:02:52Z","timestamp":1584583372000},"page":"821-826","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Steffensen Type Method with Memory"],"prefix":"10.1007","author":[{"given":"Xiaofeng","family":"Wang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"115_CR1","first-page":"64","volume":"16","author":"JF Steffensen","year":"1933","unstructured":"Steffensen, J.F.: Remarks on iteration. Skand. Aktuarietidskr. 16, 64\u201372 (1933)","journal-title":"Skand. Aktuarietidskr."},{"key":"115_CR2","volume-title":"Iterative Method for the Solution of Equations","author":"JF Traub","year":"1964","unstructured":"Traub, J.F.: Iterative Method for the Solution of Equations. Prentice Hall, New York (1964)"},{"key":"115_CR3","first-page":"1887","volume":"217","author":"MS Petkovi\u0107","year":"2010","unstructured":"Petkovi\u0107, M.S., Ili\u0107, S., D\u017euni\u0107, J.: Derivative free two-point methods with and without memory for solving nonlinear equations. Appl. Math. Comput. 217, 1887\u20131895 (2010)","journal-title":"Appl. Math. Comput."},{"key":"115_CR4","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s11075-014-9846-8","volume":"68","author":"A Cordero","year":"2014","unstructured":"Cordero, A., Lotfi, T., Bakhtiari, P., Torregrosa, J.R.: An efficient two-parametric family with memory for nonlinear equations. Numerical Algorithms 68, 323\u2013335 (2014)","journal-title":"Numerical Algorithms"},{"key":"115_CR5","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1016\/j.cam.2013.05.013","volume":"255","author":"J D\u017euni\u0107","year":"2014","unstructured":"D\u017euni\u0107, J., Petkovi\u0107, M.S.: On generalized biparametric multipoint root finding methods with memory. J. Comput. Appl. Math. 255, 362\u2013375 (2014)","journal-title":"J. Comput. Appl. Math."},{"key":"115_CR6","first-page":"452","volume":"254","author":"F Soleymani","year":"2015","unstructured":"Soleymani, F., Lotfi, T., Tavakoli, E., Khaksar Haghani, F.: Several iterative methods with memory using self-accelerators. Appl. Math. Comput. 254, 452\u2013458 (2015)","journal-title":"Appl. Math. Comput."},{"issue":"2","key":"115_CR7","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s11075-014-9951-8","volume":"70","author":"X Wang","year":"2015","unstructured":"Wang, X., Zhang, T.: Efficient n-point iterative methods with memory for solving nonlinear equations. Numer. Algor. 70(2), 357\u2013375 (2015)","journal-title":"Numer. Algor."},{"key":"115_CR8","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1080\/00207160.2015.1056168","volume":"93","author":"X Wang","year":"2016","unstructured":"Wang, X., Zhang, T., Qin, Y.: Efficient two-step derivative-free iterative methods with memory and their dynamics. Int. J. Comput. Math. 93, 1423\u20131446 (2016)","journal-title":"Int. J. Comput. Math."},{"key":"115_CR9","first-page":"91","volume":"19","author":"X Wang","year":"2014","unstructured":"Wang, X., Zhang, T.: High-order Newton-type iterative methods with memory for solving nonlinear equations. Math. Commun. 19, 91\u2013109 (2014)","journal-title":"Math. Commun."},{"key":"115_CR10","first-page":"429","volume":"28","author":"J D\u017euni\u0107","year":"2013","unstructured":"D\u017euni\u0107, J.: Modified Newton\u2019s method with memory. Ser. Math. Inform 28, 429\u2013441 (2013)","journal-title":"Ser. Math. Inform"},{"key":"115_CR11","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.aml.2013.10.008","volume":"29","author":"TJ McDougall","year":"2014","unstructured":"McDougall, T.J., Wotherspoon, S.J.: A simple modification of Newton\u2019s method to achieve convergence of order 1\u2009+\u2009\u221a2. Appl. Math. Lett. 29, 20\u201325 (2014)","journal-title":"Appl. Math. Lett."},{"key":"115_CR12","first-page":"686","volume":"190","author":"A Cordero","year":"2007","unstructured":"Cordero, A., Torregrosa, J.R.: Variants of Newton\u2019s Method using fifth-order quadrature formulas. Appl. Math. Comput. 190, 686\u2013698 (2007)","journal-title":"Appl. Math. Comput."}],"container-title":["Advances in Intelligent Systems and Computing","Cyber Security Intelligence and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43306-2_115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T02:20:24Z","timestamp":1584584424000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43306-2_115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030433055","9783030433062"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43306-2_115","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Cyber Security Intelligence and Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 February 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 February 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csia2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/csia2020.com\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}