Understanding Brent's root finding method

  • Thread starter Thread starter phantomvommand
  • Start date Start date
AI Thread Summary
The discussion centers on the logic behind checking the difference between b-1 and b-2 when bisect_flag is set to False. The main point raised is whether the goal should be to assess the halving of the interval between the best guesses b, suggesting that the focus should be on abs(b - b-1) instead. A reference to Brent's original publication indicates that unnecessary bisections could slow down convergence for well-behaved functions, highlighting the balance between optimizing performance in typical scenarios while managing potential failures in edge cases. The conversation also notes that this topic is more suited for the Programming and Computer Science forum.
phantomvommand
Messages
287
Reaction score
39
TL;DR Summary
I am unsure about the conditions for rejecting the secant or IQI method in favour of bisection
Screenshot 2025-07-13 at 3.31.49 PM.webp


I am unsure about why in the case where bisect_flag == False, we should check b-1 - b-2. Is the objective not to check that we are halving the interval between our best guesses b, so it should be abs(b - b-1), regardless of whether the previous step was a bisection or not?
 
Technology news on Phys.org
phantomvommand said:
I am unsure about why in the case where bisect_flag == False, we should check b-1 - b-2. Is the objective not to check that we are halving the interval between our best guesses b, so it should be abs(b - b-1), regardless of whether the previous step was a bisection or not?

According to p.50 of Brent's original publication (it is available on archive.org): "practical tests show that this [would slow down] convergence for well-behaved functions by performing unnecessary bisections".

Like many practical algorithms this is a compromise between optimizing performance in the majority of situations whilst avoiding poor performance (or even failure) in pathological cases.

Note that this question probably belongs in the Programming and Computer Science forum. I'll get it moved.
 
Last edited:
  • Like
Likes jim mcnamara, Baluncore and berkeman
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...

Similar threads

Back
Top