SlideShare a Scribd company logo
1 of 11
RUBEN DARIO ARISMENDI RUEDA
   CHAPTER 4: ‘ROOTS OF EQUATIONS’
The roots of equations are the values of x that makes f(x)=0. There are many forms to obtain this values of x, but the most common is the quadratic formula. The other forms are mostly numerical methods and graphical methods that are used when is not to easy to find the root of the function.
There are some different kind of methods to find the roots of Equation: OPEN METHODS CLOSE METHODS GRAPHICS FIXED POINT NEWTON-RAPHSON SECANT FAKE POSITION BISECCION
f(x)=0 http://s4.hubimg.com/u/351_f520.jpg
CLOSE METHODS. 1. Biseccion
Theobjective of thisMethodconsist in divide theintervaltothehalf, looking forward forthechange of sings. If F(x) is Real and continous in theintervalthatgoesfrom X(inf) to X(sup) and                                                                        thenthereis at least 1 root betweentheintervals
THE ROOT WILL BE IN THE Inf. SEGMENT SO: Xi= STILL THE SAME Xs= THE LAST Xr THE ROOT WILL BE IN THE Sup. SEGMENT SO: Xi= THE LAST Xr Xs= STILL THE SAME
ERROR FOR THE NEW RESULT Example CALCULATE THE ROOT OF THE NEXT EQUATION.
In  thetable, we can seethatthevalue in the 7th iterationis0,42578125 whichisapproximatetothe real valuewithan error of 0,00917431.

More Related Content

What's hot (9)

College Algebra 3.2
College Algebra 3.2College Algebra 3.2
College Algebra 3.2
 
Mayo Slides Meeting #2 (Phil 6334/Econ 6614): Part II Logic
Mayo Slides Meeting #2 (Phil 6334/Econ 6614): Part II LogicMayo Slides Meeting #2 (Phil 6334/Econ 6614): Part II Logic
Mayo Slides Meeting #2 (Phil 6334/Econ 6614): Part II Logic
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
MS2 Max and Min Points
MS2 Max and Min PointsMS2 Max and Min Points
MS2 Max and Min Points
 
Bisection
BisectionBisection
Bisection
 
3.1 Extreme Values of Functions
3.1 Extreme Values of Functions3.1 Extreme Values of Functions
3.1 Extreme Values of Functions
 
Asymptotes and holes 97
Asymptotes and holes 97Asymptotes and holes 97
Asymptotes and holes 97
 
Lesson 4.1 Extreme Values
Lesson 4.1 Extreme ValuesLesson 4.1 Extreme Values
Lesson 4.1 Extreme Values
 
Root Equations Methods
Root Equations MethodsRoot Equations Methods
Root Equations Methods
 

Viewers also liked

Choleskymethod
CholeskymethodCholeskymethod
Choleskymethod
uis
 
Tebaldini.pdf
Tebaldini.pdfTebaldini.pdf
Tebaldini.pdf
grssieee
 
Lesson 3 solving problems using algebra
Lesson 3   solving problems using algebraLesson 3   solving problems using algebra
Lesson 3 solving problems using algebra
Angela Phillips
 
Large-Scale Inverse Problems
Large-Scale Inverse ProblemsLarge-Scale Inverse Problems
Large-Scale Inverse Problems
Arvind Krishna
 
Discrete Signal Processing
Discrete Signal ProcessingDiscrete Signal Processing
Discrete Signal Processing
margretrosy
 

Viewers also liked (20)

This Presentation will Revolutionize News Feed E-commerce
This Presentation will Revolutionize News Feed E-commerceThis Presentation will Revolutionize News Feed E-commerce
This Presentation will Revolutionize News Feed E-commerce
 
Toeplitz (2)
Toeplitz (2)Toeplitz (2)
Toeplitz (2)
 
Choleskymethod
CholeskymethodCholeskymethod
Choleskymethod
 
linear system of solutions
linear system of solutionslinear system of solutions
linear system of solutions
 
Tebaldini.pdf
Tebaldini.pdfTebaldini.pdf
Tebaldini.pdf
 
Special methods
Special methodsSpecial methods
Special methods
 
Lesson 3 solving problems using algebra
Lesson 3   solving problems using algebraLesson 3   solving problems using algebra
Lesson 3 solving problems using algebra
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
 
Parameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its ApplicationsParameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its Applications
 
Large-Scale Inverse Problems
Large-Scale Inverse ProblemsLarge-Scale Inverse Problems
Large-Scale Inverse Problems
 
REDES NEURONALES Performance Optimization
REDES NEURONALES Performance OptimizationREDES NEURONALES Performance Optimization
REDES NEURONALES Performance Optimization
 
Vectors
VectorsVectors
Vectors
 
Inverse Planning
Inverse PlanningInverse Planning
Inverse Planning
 
Lecture123
Lecture123Lecture123
Lecture123
 
Dsp U Lec01 Real Time Dsp Systems
Dsp U   Lec01 Real Time Dsp SystemsDsp U   Lec01 Real Time Dsp Systems
Dsp U Lec01 Real Time Dsp Systems
 
Dsp U Lec04 Discrete Time Signals & Systems
Dsp U   Lec04 Discrete Time Signals & SystemsDsp U   Lec04 Discrete Time Signals & Systems
Dsp U Lec04 Discrete Time Signals & Systems
 
Matrices 1
Matrices 1Matrices 1
Matrices 1
 
Importance of Maths in Engineering
Importance of Maths in EngineeringImportance of Maths in Engineering
Importance of Maths in Engineering
 
Discrete Signal Processing
Discrete Signal ProcessingDiscrete Signal Processing
Discrete Signal Processing
 
direct and inverse variations
direct and inverse variationsdirect and inverse variations
direct and inverse variations
 

Similar to Roots of equations

Similar to Roots of equations (6)

Zeroes and roots
Zeroes and rootsZeroes and roots
Zeroes and roots
 
Roots equation
Roots equationRoots equation
Roots equation
 
Roots of equations 1
Roots of equations 1Roots of equations 1
Roots of equations 1
 
Roots equation
Roots equationRoots equation
Roots equation
 
Roots of equations 1
Roots of equations 1Roots of equations 1
Roots of equations 1
 
Chapter 3: Roots of Equations
Chapter 3: Roots of EquationsChapter 3: Roots of Equations
Chapter 3: Roots of Equations
 

More from rubenarismendi

More from rubenarismendi (13)

Iterative methods
Iterative methodsIterative methods
Iterative methods
 
Iterative methods
Iterative methodsIterative methods
Iterative methods
 
Iterative methods
Iterative methodsIterative methods
Iterative methods
 
Iterative methods
Iterative methodsIterative methods
Iterative methods
 
Direct sustitution methods
Direct sustitution methodsDirect sustitution methods
Direct sustitution methods
 
Roots of equations 1
Roots of equations 1Roots of equations 1
Roots of equations 1
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Taylor
TaylorTaylor
Taylor
 
Taylor
TaylorTaylor
Taylor
 
Approximation and error
Approximation and errorApproximation and error
Approximation and error
 
Approximation and error
Approximation and errorApproximation and error
Approximation and error
 
Mathematical modeling
Mathematical modelingMathematical modeling
Mathematical modeling
 
Matrizinversa
MatrizinversaMatrizinversa
Matrizinversa
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Roots of equations

  • 2. CHAPTER 4: ‘ROOTS OF EQUATIONS’
  • 3. The roots of equations are the values of x that makes f(x)=0. There are many forms to obtain this values of x, but the most common is the quadratic formula. The other forms are mostly numerical methods and graphical methods that are used when is not to easy to find the root of the function.
  • 4. There are some different kind of methods to find the roots of Equation: OPEN METHODS CLOSE METHODS GRAPHICS FIXED POINT NEWTON-RAPHSON SECANT FAKE POSITION BISECCION
  • 6. CLOSE METHODS. 1. Biseccion
  • 7. Theobjective of thisMethodconsist in divide theintervaltothehalf, looking forward forthechange of sings. If F(x) is Real and continous in theintervalthatgoesfrom X(inf) to X(sup) and thenthereis at least 1 root betweentheintervals
  • 8.
  • 9. THE ROOT WILL BE IN THE Inf. SEGMENT SO: Xi= STILL THE SAME Xs= THE LAST Xr THE ROOT WILL BE IN THE Sup. SEGMENT SO: Xi= THE LAST Xr Xs= STILL THE SAME
  • 10. ERROR FOR THE NEW RESULT Example CALCULATE THE ROOT OF THE NEXT EQUATION.
  • 11. In thetable, we can seethatthevalue in the 7th iterationis0,42578125 whichisapproximatetothe real valuewithan error of 0,00917431.