SlideShare a Scribd company logo
RUBEN DARIO ARISMENDI RUEDA
CHAPTER 4: ‘ROOTS OF EQUATIONS’
The roots of equations are the values of  x  that makes  f(x)=0.  There are many forms to obtain this values of  x,  but the most common is the quadratic formula. The other forms are mostly numerical methods and graphical methods that are used when is not to easy to find the root of the function.
There are some different kind of methods to find the roots of Equation: GRAPHICS OPEN METHODS CLOSE METHODS FIXED POINT NEWTON-RAPHSON SECANT FAKE POSITION BISECCION
http://s4.hubimg.com/u/351_f520.jpg f(x)=0
CLOSE METHODS. 1.  Biseccion
The objective of this Method consist in divide the interval to the half, looking forward for the change of sings. If F(x) is Real and continous in the interval that goes from X(inf) to X(sup) and  then there is at least 1 root  between  the intervals
 
THE ROOT WILL BE IN THE Inf. SEGMENT SO: Xi= STILL THE SAME Xs= THE LAST Xr THE ROOT WILL BE IN THE Sup. SEGMENT SO: Xi= THE LAST Xr Xs= STILL THE SAME
Example CALCULATE THE ROOT OF THE NEXT EQUATION. ERROR FOR THE NEW RESULT
In  the table, we can see that the value in the 7th iteration is 0,42578125 which is  approximate to the real value with an error of 0,00917431.

More Related Content

More from rubenarismendi

Iterative methods
Iterative methodsIterative methods
Iterative methods
rubenarismendi
 
Iterative methods
Iterative methodsIterative methods
Iterative methods
rubenarismendi
 
Iterative methods
Iterative methodsIterative methods
Iterative methods
rubenarismendi
 
Special methods
Special methodsSpecial methods
Special methods
rubenarismendi
 
Iterative methods
Iterative methodsIterative methods
Iterative methods
rubenarismendi
 
Direct sustitution methods
Direct sustitution methodsDirect sustitution methods
Direct sustitution methods
rubenarismendi
 
Roots of equations 1
Roots of equations 1Roots of equations 1
Roots of equations 1
rubenarismendi
 
Roots of equations 1
Roots of equations 1Roots of equations 1
Roots of equations 1
rubenarismendi
 
Roots of equations 1
Roots of equations 1Roots of equations 1
Roots of equations 1
rubenarismendi
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
rubenarismendi
 
Taylor
TaylorTaylor
Taylor
TaylorTaylor
Approximation and error
Approximation and errorApproximation and error
Approximation and error
rubenarismendi
 
Approximation and error
Approximation and errorApproximation and error
Approximation and error
rubenarismendi
 
Mathematical modeling
Mathematical modelingMathematical modeling
Mathematical modeling
rubenarismendi
 
Matrizinversa
MatrizinversaMatrizinversa
Matrizinversa
rubenarismendi
 

More from rubenarismendi (16)

Iterative methods
Iterative methodsIterative methods
Iterative methods
 
Iterative methods
Iterative methodsIterative methods
Iterative methods
 
Iterative methods
Iterative methodsIterative methods
Iterative methods
 
Special methods
Special methodsSpecial methods
Special methods
 
Iterative methods
Iterative methodsIterative methods
Iterative methods
 
Direct sustitution methods
Direct sustitution methodsDirect sustitution methods
Direct sustitution methods
 
Roots of equations 1
Roots of equations 1Roots of equations 1
Roots of equations 1
 
Roots of equations 1
Roots of equations 1Roots of equations 1
Roots of equations 1
 
Roots of equations 1
Roots of equations 1Roots of equations 1
Roots of equations 1
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Taylor
TaylorTaylor
Taylor
 
Taylor
TaylorTaylor
Taylor
 
Approximation and error
Approximation and errorApproximation and error
Approximation and error
 
Approximation and error
Approximation and errorApproximation and error
Approximation and error
 
Mathematical modeling
Mathematical modelingMathematical modeling
Mathematical modeling
 
Matrizinversa
MatrizinversaMatrizinversa
Matrizinversa
 

Recently uploaded

Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

Roots of equations 1

  • 2. CHAPTER 4: ‘ROOTS OF EQUATIONS’
  • 3. The roots of equations are the values of x that makes f(x)=0. There are many forms to obtain this values of x, but the most common is the quadratic formula. The other forms are mostly numerical methods and graphical methods that are used when is not to easy to find the root of the function.
  • 4. There are some different kind of methods to find the roots of Equation: GRAPHICS OPEN METHODS CLOSE METHODS FIXED POINT NEWTON-RAPHSON SECANT FAKE POSITION BISECCION
  • 6. CLOSE METHODS. 1. Biseccion
  • 7. The objective of this Method consist in divide the interval to the half, looking forward for the change of sings. If F(x) is Real and continous in the interval that goes from X(inf) to X(sup) and then there is at least 1 root between the intervals
  • 8.  
  • 9. THE ROOT WILL BE IN THE Inf. SEGMENT SO: Xi= STILL THE SAME Xs= THE LAST Xr THE ROOT WILL BE IN THE Sup. SEGMENT SO: Xi= THE LAST Xr Xs= STILL THE SAME
  • 10. Example CALCULATE THE ROOT OF THE NEXT EQUATION. ERROR FOR THE NEW RESULT
  • 11. In the table, we can see that the value in the 7th iteration is 0,42578125 which is approximate to the real value with an error of 0,00917431.