Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Algorithms  /  Vol: 16 Par: 12 (2023)  /  Artículo
ARTÍCULO
TITULO

Construction of Two-Derivative Runge?Kutta Methods of Order Six

Zacharoula Kalogiratou and Theodoros Monovasilis    

Resumen

Two-Derivative Runge?Kutta methods have been proposed by Chan and Tsai in 2010 and order conditions up to the fifth order are given. In this work, for the first time, we derive order conditions for order six. Simplifying assumptions that reduce the number of order conditions are also given. The procedure for constructing sixth-order methods is presented. A specific method is derived in order to illustrate the procedure; this method is of the sixth algebraic order with a reduced phase-lag and amplification error. For numerical comparison, five well-known test problems have been solved using a seventh-order Two-Derivative Runge?Kutta method developed by Chan and Tsai and several Runge?Kutta methods of orders 6 and 8. Diagrams of the maximum absolute error vs. computation time show the efficiency of the new method.

 Artículos similares

       
 
Hugo Silva, Vítor Duque, Mário Macedo and Mateus Mendes    
The International Classification of Diseases, 10th edition (ICD-10), has been widely used for the classification of patient diagnostic information. This classification is usually performed by dedicated physicians with specific coding training, and it is ... ver más
Revista: Algorithms

 
Aravind Kolli, Qi Wei and Stephen A. Ramsey    
In this work, we explored computational methods for analyzing a color digital image of a wound and predicting (from the analyzed image) the number of days it will take for the wound to fully heal. We used a hybrid computational approach combining deep ne... ver más
Revista: Computation

 
Max Schrötter, Andreas Niemann and Bettina Schnor    
Over the last few years, a plethora of papers presenting machine-learning-based approaches for intrusion detection have been published. However, the majority of those papers do not compare their results with a proper baseline of a signature-based intrusi... ver más
Revista: Information

 
Diego Sánchez-Moreno, Vivian F. López Batista, María Dolores Muñoz Vicente, Ángel Luis Sánchez Lázaro and María N. Moreno-García    
Information from social networks is currently being widely used in many application domains, although in the music recommendation area, its use is less common because of the limited availability of social data. However, most streaming platforms allow for... ver más
Revista: Information

 
Agnieszka Dutkowska-Zuk, Joe Bourne, Chengyuan An, Xuan Gao, Oktay Cetinkaya, Peter Novitzky, Gideon Ogunniye, Rachel Cooper, David De Roure, Julie McCann, Jeremy Watson, Tim Watson and Eleri Jones    
This systematic literature review explores the scholarly debate around public perceptions and behaviors in the context of cybersecurity in connected places. It reveals that, while many articles highlight the importance of public perceptions and behaviors... ver más
Revista: Information