Author of the publication

Correction of trust region method with a new modified Newton method.

, , and . Int. J. Comput. Math., 97 (5): 1118-1132 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improvement of adaptive cubic regularization method for unconstrained optimization problems., , and . Int. J. Comput. Math., 98 (2): 271-287 (2021)Correction of trust region method with a new modified Newton method., , and . Int. J. Comput. Math., 97 (5): 1118-1132 (2020)Graph Representation Learning Towards Patents Network Analysis., and . CoRR, (2023)Analysis of Persian News Agencies on Instagram, A Words Co-occurrence Graph-based Approach., and . CoRR, (2024)Known unknowns: Indeterminacy in authentication in IoT., , , , and . Future Gener. Comput. Syst., (2020)Uncertainty-Aware Authentication Model for IoT., , , , , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 224-237. Springer, (2019)A Location-Aware Authentication Model to Handle Uncertainty in IoT., , , , , and . IoTSMS, page 43-50. IEEE, (2019)Analysis of ResearchGate, A Community Detection Approach., and . CoRR, (2020)Analysis of Insect-Plant Interactions Affected by Mining Operations, A Graph Mining Approach., , and . CoRR, (2023)Convolutional Neural Networks Towards Facial Skin Lesions Detection., , and . CoRR, (2024)