Log in || Register editor@ijlret.com

Vol. 05, No. 12 [December 2019]

Paper Title :: Hybrid Algorithm Improving Bisection, Regula Falsi, Dekker, Brent Algorithms for Roots of Non-linear Equations
Author Name :: Chaman Lal Sabharwal
Country :: USA
Page Number :: 01-15
Bisection Method for continuous functions and Newton-Raphson method for differentiable function are widely used for finding zeros of non-linear equations. Numerical techniques are explored when an analytic solution is not obvious. There is no single algorithm that works best for every function. We designed and implemented a new hybrid algorithm that is a dynamic blend of theBisectionand RegulaFalsialgorithms. The experimental results validate that the new algorithm outperforms Bisection,RegulaFalsi, Dekker’s and Brent’salgorithms with respect to computational iterations. The new algorithm is guaranteed to find a root and requires fewer computational iterations. It is also observed that the new hybrid algorithm performs better that the Secant algorithm and the Newton–Raphson algorithm.The new algorithm guarantees the reliability of Bisection method and speed of Secant method. The theoretical and empirical evidence shows that the computational complexity of the new algorithm is considerably less than that of the classical algorithms.
Keywords:Algorithm , Bisection,Brent, Dekker, Hybrid, Newton–Raphson, RegulaFalsi,Secant
[1]. Datta, B.N. Lecture Notes on Numerical Solution of Root Finding Problems. 2012. Available online: www.math.niu.edu/~dattab (accessed on 15 January 2019).
[2]. Calhoun, D. Available online: https://math.boisestate.edu/~calhoun/teaching/matlab-tutorials/lab_16/html/lab_16.html (accessed on 13 June 2019).
[3]. Thinzar, C.; Aye, N. Detection the storm movement by sub pixel registration approach of Newton Raphson method. Int. J. E Educ. E Bus. E Manag. E Learn. 2014, 4, 28–31.
[4]. T. J. Dekker and W. Hoffmann (part 2), Algol 60 Procedures in Numerical Algebra, Parts 1 and 2, Tracts 22 and 23, Mathematisch Centrum Amsterdam, 1968.
[5]. Dekker, T. J. (1969), "Finding a zero by means of successive linear interpolation", in Dejon, B.; Henrici, P. (eds.), Constructive Aspects of the Fundamental Theorem of Algebra, London: Wiley-Interscience, ISBN 978-0-471-20300-1https://en.wikipedia.org/wiki/Brent%27s_method#Dekker's_method


Paper Title :: Design and Implementation of Power Security Gateway Based on SSL VPN Technology
Author Name :: He Hui || Zhao Tianrui
Country :: China
Page Number :: 16-23
In order to improve the operation efficiency of electric power enterprises, improve staff flexibility and office quality, realize the safe access of mobile terminals to the intranet of electric power enterprises, and avoid interception, tampering and destruction of interactive information, this paper designs and implements a power security gateway based on SSL VPN technology according to the characteristics and requirements of information security construction in the electric power industry. The gateway is designed according to the national security standard. It can protect the interactive information by establishing a secure channel and controlling the access of users. At the same time, it can also authenticate the identity of the mobile terminal to ensure the safety and reliability of the terminal. It has certain practical significance for the information transmission and internal resource security protection of power enterprises.
Keywords: Electric Power Enterprise, Secure Access, Security Gateway, SSL VPN
[1] Wu Kehe, Cui Wenchao, He Jianping. Mobile Security Access Platform for Power Enterprises[J].Computer Sys-tems,2014,23(07):31-36.
[2] Duan Zhuoran. Design and Implementation of User Rights Management Module for SSL VPN System [D]. Beijing University of Posts and Telecommunications, 2008.
[3] Yang Yang, Hua Liang, Zhou Lu. Design and Implementation of Secure Access Platform Based on SSL VPN [J]. Information Security and Technology, 2013,4(09):34-36.
[4] Xia Yuanzhen, Wang Lei, Wang Lingmin. Application and Implementation of VPN System in Power Industry APP[J]. Information & Communica-tions,2016(03):113-114.
[5] He Bo. Design of Information Security for Distribution Network Field Operation System Based on Mobile Inter-net [D]. North China Electric Power University (Beijing), 2016.












Copyright © 2015 IJLRET. All Right Reseverd Home   Editorial Board   Current Issue   Contact Us