Numerical Methods

Total Page:16

File Type:pdf, Size:1020Kb

Numerical Methods Numerical Methods Andrew Kobin Fall 2014 Contents Contents Contents 1 Introduction and Background 1 1.1 Basic Calculus . .1 1.2 Floating Point Numbers . .5 1.3 Absolute and Relative Error . .6 1.4 Finite Digit Arithmetic . .7 2 Solving Equations 9 2.1 The Bisection Method . .9 2.2 Fixed Point Iteration . 10 2.3 Newton's Method . 12 2.4 The Secant Method . 13 2.5 Convergence of Iterative Algorithms . 14 3 Interpolation and Approximation 16 3.1 Lagrange Interpolating Polynomials . 16 3.2 Chebyshev Nodes . 23 3.3 Hermite Interpolation . 24 3.4 Splines . 25 4 Numerical Differentiation and Integration 28 4.1 Numerical Derivatives . 28 4.2 Richardson's Process . 31 4.3 Numerical Integration . 32 4.4 Round-Off Error . 36 4.5 Romberg Integration . 37 5 Numerical Linear Algebra 38 5.1 Linear Systems of Equations . 38 5.2 Iterative Methods for Solving Linear Systems . 39 5.3 Norms of Vectors and Matrices . 41 5.4 Convergence of Iterative Methods . 44 5.5 Least Squares Solutions . 45 5.6 Estimating Functions . 49 5.7 The Chebyshev Polynomials . 54 i 1 Introduction and Background 1 Introduction and Background These notes are taken from a course taught by Dr. Matt Mastin at Wake Forest University in the fall of 2014. The main text used for the course is Numerical Analysis, 9th ed., by Burden and Faires. The main topics covered in this course are: Review calculus Floating point arithmetic and rounding error Convergence of algorithms Solving equations Interpolation and approximation Numerical derivatives and integrals Numerical linear algebra 1.1 Basic Calculus A primary tool in calculus is Theorem 1.1.1 (Taylor). Suppose a function f has n continuous derivatives and a (not necessarily continuous) (n + 1)-st derivative on an interval [a; b]. Let x0 2 [a; b]. Then for every x 2 (a; b) there exists a number ξ(x) between x and x0 such that we can write f(x) = Pn(x) + Rn(x) where Pn(x) is a polynomial and Rn(x) is called the error term. In particular, for x0 2 [a; b], f 00(x ) f (n)(x ) P (x) = f(x ) + f 0(x )(x − x ) + 0 (x − x )2 + ::: + 0 (x − x )n: n 0 0 0 2! 0 n! 0 f (n+1)ξ(x) and R (x) = (x − x )n+1, where ξ(x) is the value chosen above. n (n + 1)! 0 A goal will be to further understand the error term Rn(x). In nontechnical terms, if we fix an x0 2 [a; b], then for any x sufficiently close to x0 the value of f(x) will look like a polynomial. Example 1.1.2. Suppose we want to compute the diagonal of a right triangle. α β 1 1.1 Basic Calculus 1 Introduction and Background If we only know α and β with some error of ≤ ", what is the error in a computation of the hypotenuse? In a perfect world, this length would be exactly pα2 + β2, but in the real world our measurements aren't quite so precise. The thing we would actually compute is p(α ± ")2 + (β ± ")2: Then the question becomes: How does this estimate compare (in terms of ") to the `ideal' pα2 + β2? To answer this, note that p p(α + ")2 + (β + ")2 = α2 + 2α" + "2 + β2 + 2β" + "2 = p(α2 + β2) + 2"(α + β) + 2"2 which shows what our hypotenuse `function' looks like a little bit away from (α; β). Wep can use Taylor's Theorem (1.1.1) to estimate in terms of α and β, using the function f(x) = x, where x = α2 + β2 + 2"(α + β) + 2"2. Let's try with n = 1: 2 2 0 2 2 2 f(x) = f(α + β ) + f (α + β )(2"(α + β) + 2" ) + R1(x) p 2"(α + β) + 2"2 = α2 + β2 + + R(x) 2pα2 + β2 p "(α + β) "2 = α2 + β2 + + + R(x): pα2 + β2 pα2 + β2 Other theorems related to Taylor's Theorem (1.1.1) state that the error term R(x) is `small', loosely on the order of "2 or higher. In practical terms, this means that the only error that really plays a role in the above is p"(α+β) . α2+β2 α + β p Exercise. Prove that if α; β > 0, then ≤ 2. pα2 + β2 Definition. A function f on a set X ⊆ R has a limit L at x0, denoted lim f(x) = L x!x0 if for every " > 0 there exists a δ > 0 such that jx − x0j < δ implies jf(x) − Lj < ". x0 − δ x0 + δ f(x) L + " L L − " x0 2 1.1 Basic Calculus 1 Introduction and Background Definition. A function f is continuous at x0 if lim f(x) = f(x0). x!x0 The set of functions that are continuous on a set X is denoted C(X). For example, if X is an interval we will write C[a; b]. 1 Definition. Let fxngn=1 be a sequence of real numbers, then fxng converges to some num- ber x if for every " > 0 there is some N 2 N such that jxn − xj < " whenever n ≥ N. Intuitively, fxng ! x if later values of xn land in smaller and smaller neighborhoods of the `target' x. We will also denote this by lim xn = x. n!1 Theorem 1.1.3. If f is a function on a set of real numbers X, then the following are equivalent: (1) f is continuous at x0. (2) If fxng is a sequence in X converging to x0 then the sequence ff(xn)g ⊂ f(X) con- verges to f(x0). In topology, (2) is known as the sequential definition of continuity. This theorem shows that analyzing functions is really the same as looking at limits of sequences. Theorem 1.1.4 (Mean Value Theorem). If f 2 C[a; b] and f is differentiable on (a; b) then there exists a number c 2 (a; b) so that f(b) − f(a) f 0(c) = : b − a a c b What this says is that there is a point c between a and b such that the slope of the tangent line at c is equal to the slope of the secant line through (a; f(a)) and (b; f(b)). Theorem 1.1.5 (Intermediate Value Theorem). If f 2 C[a; b] and k is any number between f(a) and f(b), then there is some x 2 (a; b) such that f(x) = k. 3 1.1 Basic Calculus 1 Introduction and Background This is sometimes stated as \If you draw a continuous function from a to b, you don't pick up your pencil." Recall Taylor's Theorem (1.1.1) from the start of the section. This is a supremely useful tool in calculus, and especially in computational methods that will be explored later. Think about it this way: a calculator (even a high-powered computer) can only do four arithmetic operations, +; −; × and ÷. How does a calculator compute sin(4), for example? Taylor's Theorem gives us a way of approximating functions such as sin(4) in terms of basic arithmetic operations to a high degree of accuracy. So far we have not described the error term Rn(x). Taylor's Theorem tells us that f (n+1)(ξ(x)) R (x) = (x − x )n+1 n (n + 1)! 0 for some choice of ξ(x) between x and x0. We write ξ(x) because the value will depend on the x chosen (it's a moving target). Pn is called the nth Taylor polynomial for f and Rn is called the remainder or error term. Before proving Taylor's Theorem, we need a lemma. Lemma 1.1.6. Suppose f has n + 1 derivatives on [a; b] and that there is a number c so that f(c) = 0 f 0(c) = 0 . f (n)(c) = 0 and there is a number d 6= c so that f(d) = 0. Then there is a number β so that f (n+1)(β) = 0. Proof. Repeatedly use MVT. Onto the proof of Taylor's Theorem (1.1.1)... Proof. Let Pn(x) be the nth Taylor polynomial for f. Define g(x) = f(x) − Pn(x). Then proving Taylor's Theorem comes down to showing that g(x) = Rn(x) for a choice of ξ(x). 0 First, g(x0) = f(x0) − Pn(x0) = f(x0) − (f(x0) + 0 + 0 + 0 + :::) = 0. Similarly, g (x0) is also 0, and in fact the first n derivatives of g at x0 are all 0. So g almost satisfies Lemma 1.1.6, but we don't have this extra place where g(x) = 0. To remedy this, take x1 6= x0 and let C be the unique constant so that n+1 g(x1) = −C(x1 − x0) : −g(x1) n+1 Namely, C = n+1 . We define a new function h by h(x) = g(x) + C(x − x0) . We (x1 − x0) n+1 claim that h satisfies Lemma 1.1.6. First, h(x0) = g(x0) + C(x0 − x0) = 0 + 0 = 0, and for the first n derivatives of h, (k) (i) n+1−k h (x0) = g (x0) + C · k!(x0 − x0) 4 1.2 Floating Point Numbers 1 Introduction and Background n+1 so these are clearly all zero as well. Plugging in x1 yields h(x1) = g(x1) + C(x1 − x0) = g(x1) − g(x1) = 0, so the conditions of Lemma 1.1.6 are satisfied for h.
Recommended publications
  • Lecture Notes in Advanced Matrix Computations
    Lecture Notes in Advanced Matrix Computations Lectures by Dr. Michael Tsatsomeros Throughout these notes, signifies end proof, and N signifies end of example. Table of Contents Table of Contents i Lecture 0 Technicalities 1 0.1 Importance . 1 0.2 Background . 1 0.3 Material . 1 0.4 Matrix Multiplication . 1 Lecture 1 The Cost of Matrix Algebra 2 1.1 Block Matrices . 2 1.2 Systems of Linear Equations . 3 1.3 Triangular Systems . 4 Lecture 2 LU Decomposition 5 2.1 Gaussian Elimination and LU Decomposition . 5 Lecture 3 Partial Pivoting 6 3.1 LU Decomposition continued . 6 3.2 Gaussian Elimination with (Partial) Pivoting . 7 Lecture 4 Complete Pivoting 8 4.1 LU Decomposition continued . 8 4.2 Positive Definite Systems . 9 Lecture 5 Cholesky Decomposition 10 5.1 Positive Definiteness and Cholesky Decomposition . 10 Lecture 6 Vector and Matrix Norms 11 6.1 Vector Norms . 11 6.2 Matrix Norms . 13 Lecture 7 Vector and Matrix Norms continued 13 7.1 Matrix Norms . 13 7.2 Condition Numbers . 15 Notes by Jakob Streipel. Last updated April 27, 2018. i TABLE OF CONTENTS ii Lecture 8 Condition Numbers 16 8.1 Solving Perturbed Systems . 16 Lecture 9 Estimating the Condition Number 18 9.1 More on Condition Numbers . 18 9.2 Ill-conditioning by Scaling . 19 9.3 Estimating the Condition Number . 20 Lecture 10 Perturbing Not Only the Vector 21 10.1 Perturbing the Coefficient Matrix . 21 10.2 Perturbing Everything . 22 Lecture 11 Error Analysis After The Fact 23 11.1 A Posteriori Error Analysis Using the Residue .
    [Show full text]
  • Chapter 7 Powers of Matrices
    Chapter 7 Powers of Matrices 7.1 Introduction In chapter 5 we had seen that many natural (repetitive) processes such as the rabbit examples can be described by a discrete linear system (1) ~un+1 = A~un, n = 0, 1, 2,..., and that the solution of such a system has the form n (2) ~un = A ~u0. n In addition, we had learned how to find an explicit expression for A and hence for ~un by using the constituent matrices of A. In this chapter, however, we will be primarily interested in “long range predictions”, i.e. we want to know the behaviour of ~un for n large (or as n → ∞). In view of (2), this is implied by an understanding of the limit matrix n A∞ = lim A , n→∞ provided that this limit exists. Thus we shall: 1) Establish a criterion to guarantee the existence of this limit (cf. Theorem 7.6); 2) Find a quick method to compute this limit when it exists (cf. Theorems 7.7 and 7.8). We then apply these methods to analyze two application problems: 1) The shipping of commodities (cf. section 7.7) 2) Rat mazes (cf. section 7.7) As we had seen in section 5.9, the latter give rise to Markov chains, which we shall study here in more detail (cf. section 7.7). 312 Chapter 7: Powers of Matrices 7.2 Powers of Numbers As was mentioned in the introduction, we want to study here the behaviour of the powers An of a matrix A as n → ∞. However, before considering the general case, it is useful to first investigate the situation for 1 × 1 matrices, i.e.
    [Show full text]
  • Topological Recursion and Random Finite Noncommutative Geometries
    Western University Scholarship@Western Electronic Thesis and Dissertation Repository 8-21-2018 2:30 PM Topological Recursion and Random Finite Noncommutative Geometries Shahab Azarfar The University of Western Ontario Supervisor Khalkhali, Masoud The University of Western Ontario Graduate Program in Mathematics A thesis submitted in partial fulfillment of the equirr ements for the degree in Doctor of Philosophy © Shahab Azarfar 2018 Follow this and additional works at: https://ir.lib.uwo.ca/etd Part of the Discrete Mathematics and Combinatorics Commons, Geometry and Topology Commons, and the Quantum Physics Commons Recommended Citation Azarfar, Shahab, "Topological Recursion and Random Finite Noncommutative Geometries" (2018). Electronic Thesis and Dissertation Repository. 5546. https://ir.lib.uwo.ca/etd/5546 This Dissertation/Thesis is brought to you for free and open access by Scholarship@Western. It has been accepted for inclusion in Electronic Thesis and Dissertation Repository by an authorized administrator of Scholarship@Western. For more information, please contact [email protected]. Abstract In this thesis, we investigate a model for quantum gravity on finite noncommutative spaces using the topological recursion method originated from random matrix theory. More precisely, we consider a particular type of finite noncommutative geometries, in the sense of Connes, called spectral triples of type (1; 0) , introduced by Barrett. A random spectral triple of type (1; 0) has a fixed fermion space, and the moduli space of its Dirac operator D = fH; ·} ;H 2 HN , encoding all the possible geometries over the fermion −S(D) space, is the space of Hermitian matrices HN . A distribution of the form e dD is considered over the moduli space of Dirac operators.
    [Show full text]
  • Students' Solutions Manual Applied Linear Algebra
    Students’ Solutions Manual for Applied Linear Algebra by Peter J.Olver and Chehrzad Shakiban Second Edition Undergraduate Texts in Mathematics Springer, New York, 2018. ISBN 978–3–319–91040–6 To the Student These solutions are a resource for students studying the second edition of our text Applied Linear Algebra, published by Springer in 2018. An expanded solutions manual is available for registered instructors of courses adopting it as the textbook. Using the Manual The material taught in this book requires an active engagement with the exercises, and we urge you not to read the solutions in advance. Rather, you should use the ones in this manual as a means of verifying that your solution is correct. (It is our hope that all solutions appearing here are correct; errors should be reported to the authors.) If you get stuck on an exercise, try skimming the solution to get a hint for how to proceed, but then work out the exercise yourself. The more you can do on your own, the more you will learn. Please note: for students taking a course based on Applied Linear Algebra, copying solutions from this Manual can place you in violation of academic honesty. In particular, many solutions here just provide the final answer, and for full credit one must also supply an explanation of how this is found. Acknowledgements We thank a number of people, who are named in the text, for corrections to the solutions manuals that accompanied the first edition. Of course, as authors, we take full respon- sibility for all errors that may yet appear.
    [Show full text]
  • Volume 3 (2010), Number 2
    APLIMAT - JOURNAL OF APPLIED MATHEMATICS VOLUME 3 (2010), NUMBER 2 APLIMAT - JOURNAL OF APPLIED MATHEMATICS VOLUME 3 (2010), NUMBER 2 Edited by: Slovak University of Technology in Bratislava Editor - in - Chief: KOVÁČOVÁ Monika (Slovak Republic) Editorial Board: CARKOVS Jevgenijs (Latvia ) CZANNER Gabriela (USA) CZANNER Silvester (Great Britain) DE LA VILLA Augustin (Spain) DOLEŽALOVÁ Jarmila (Czech Republic) FEČKAN Michal (Slovak Republic) FERREIRA M. A. Martins (Portugal) FRANCAVIGLIA Mauro (Italy) KARPÍŠEK Zdeněk (Czech Republic) KOROTOV Sergey (Finland) LORENZI Marcella Giulia (Italy) MESIAR Radko (Slovak Republic) TALAŠOVÁ Jana (Czech Republic) VELICHOVÁ Daniela (Slovak Republic) Editorial Office: Institute of natural sciences, humanities and social sciences Faculty of Mechanical Engineering Slovak University of Technology in Bratislava Námestie slobody 17 812 31 Bratislava Correspodence concerning subscriptions, claims and distribution: F.X. spol s.r.o Azalková 21 821 00 Bratislava [email protected] Frequency: One volume per year consisting of three issues at price of 120 EUR, per volume, including surface mail shipment abroad. Registration number EV 2540/08 Information and instructions for authors are available on the address: http://www.journal.aplimat.com/ Printed by: FX spol s.r.o, Azalková 21, 821 00 Bratislava Copyright © STU 2007-2010, Bratislava All rights reserved. No part may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise,
    [Show full text]
  • Simpson's Rule
    Simpson's rule In numerical analysis, Simpson's rule is a method for numerical integration, the numerical approximation of definite integrals. Specifically, it is the following approximation for equally spaced subdivisions (where is even): (General Form) , where and . Simpson's rule also corresponds to the three-point Newton-Cotes quadrature rule. Simpson's rule can be derived by In English, the method is credited to the mathematician Thomas Simpson (1710–1761) of Leicestershire, England. However, approximating the integrand f (x) (in Johannes Kepler used similar formulas over 100 years prior, and for this reason the method is sometimes called Kepler's blue) by the quadratic interpolant P rule , or Keplersche Fassregel (Kepler's barrel rule) in German. (x) (in red) . Contents Quadratic interpolation Averaging the midpoint and the trapezoidal rules Undetermined coefficients Error Composite Simpson's rule An animation showing how Simpson's 3/8 rule Simpson's rule approximation Composite Simpson's 3/8 rule improves with more strips. Alternative extended Simpson's rule Simpson's rules in the case of narrow peaks Composite Simpson's rule for irregularly spaced data See also Notes References External links Quadratic interpolation One derivation replaces the integrand by the quadratic polynomial (i.e. parabola) which takes the same values as at the end points a and b and the midpoint m = ( a + b) / 2. One can use Lagrange polynomial interpolation to find an expression for this polynomial, Using integration by substitution one can show that [1] Introducing the step size this is also commonly written as Because of the factor Simpson's rule is also referred to as Simpson's 1/3 rule (see below for generalization).
    [Show full text]
  • Formal Matrix Integrals and Combinatorics of Maps
    SPhT-T05/241 Formal matrix integrals and combinatorics of maps B. Eynard 1 Service de Physique Th´eorique de Saclay, F-91191 Gif-sur-Yvette Cedex, France. Abstract: This article is a short review on the relationship between convergent matrix inte- grals, formal matrix integrals, and combinatorics of maps. 1 Introduction This article is a short review on the relationship between convergent matrix inte- grals, formal matrix integrals, and combinatorics of maps. We briefly summa- rize results developed over the last 30 years, as well as more recent discoveries. We recall that formal matrix integrals are identical to combinatorial generating functions for maps, and that formal matrix integrals are in general very different from arXiv:math-ph/0611087v3 19 Dec 2006 convergent matrix integrals. Both may coincide perturbatively (i.e. up to terms smaller than any negative power of N), only for some potentials which correspond to negative weights for the maps, and therefore not very interesting from the combinatorics point of view. We also recall that both convergent and formal matrix integrals are solutions of the same set of loop equations, and that loop equations do not have a unique solution in general. Finally, we give a list of the classical matrix models which have played an important role in physics in the past decades. Some of them are now well understood, some are still difficult challenges. Matrix integrals were first introduced by physicists [55], mostly in two ways: - in nuclear physics, solid state physics, quantum chaos, convergent matrix integrals are 1 E-mail: [email protected] 1 studied for the eigenvalues statistical properties [48, 33, 5, 52].
    [Show full text]
  • Memory Capacity of Neural Turing Machines with Matrix Representation
    Memory Capacity of Neural Turing Machines with Matrix Representation Animesh Renanse * [email protected] Department of Electronics & Electrical Engineering Indian Institute of Technology Guwahati Assam, India Rohitash Chandra * [email protected] School of Mathematics and Statistics University of New South Wales Sydney, NSW 2052, Australia Alok Sharma [email protected] Laboratory for Medical Science Mathematics RIKEN Center for Integrative Medical Sciences Yokohama, Japan *Equal contributions Editor: Abstract It is well known that recurrent neural networks (RNNs) faced limitations in learning long- term dependencies that have been addressed by memory structures in long short-term memory (LSTM) networks. Matrix neural networks feature matrix representation which inherently preserves the spatial structure of data and has the potential to provide better memory structures when compared to canonical neural networks that use vector repre- sentation. Neural Turing machines (NTMs) are novel RNNs that implement notion of programmable computers with neural network controllers to feature algorithms that have copying, sorting, and associative recall tasks. In this paper, we study augmentation of mem- arXiv:2104.07454v1 [cs.LG] 11 Apr 2021 ory capacity with matrix representation of RNNs and NTMs (MatNTMs). We investigate if matrix representation has a better memory capacity than the vector representations in conventional neural networks. We use a probabilistic model of the memory capacity us- ing Fisher information and investigate how the memory capacity for matrix representation networks are limited under various constraints, and in general, without any constraints. In the case of memory capacity without any constraints, we found that the upper bound on memory capacity to be N 2 for an N ×N state matrix.
    [Show full text]
  • Convergence of Two-Stage Iterative Scheme for $ K $-Weak Regular Splittings of Type II with Application to Covid-19 Pandemic Model
    Convergence of two-stage iterative scheme for K-weak regular splittings of type II with application to Covid-19 pandemic model Vaibhav Shekharb, Nachiketa Mishraa, and Debasisha Mishra∗b aDepartment of Mathematics, Indian Institute of Information Technology, Design and Manufacturing, Kanchipuram emaila: [email protected] bDepartment of Mathematics, National Institute of Technology Raipur, India. email∗: [email protected]. Abstract Monotone matrices play a key role in the convergence theory of regular splittings and different types of weak regular splittings. If monotonicity fails, then it is difficult to guarantee the convergence of the above-mentioned classes of matrices. In such a case, K- monotonicity is sufficient for the convergence of K-regular and K-weak regular splittings, where K is a proper cone in Rn. However, the convergence theory of a two-stage iteration scheme in general proper cone setting is a gap in the literature. Especially, the same study for weak regular splittings of type II (even if in standard proper cone setting, i.e., K = Rn +), is open. To this end, we propose convergence theory of two-stage iterative scheme for K-weak regular splittings of both types in the proper cone setting. We provide some sufficient conditions which guarantee that the induced splitting from a two-stage iterative scheme is a K-regular splitting and then establish some comparison theorems. We also study K-monotone convergence theory of the stationary two-stage iterative method in case of a K-weak regular splitting of type II. The most interesting and important part of this work is on M-matrices appearing in the Covid-19 pandemic model.
    [Show full text]
  • Additional Details and Fortification for Chapter 1
    APPENDIX A Additional Details and Fortification for Chapter 1 A.1 Matrix Classes and Special Matrices The matrices can be grouped into several classes based on their operational prop- erties. A short list of various classes of matrices is given in Tables A.1 and A.2. Some of these have already been described earlier, for example, elementary, sym- metric, hermitian, othogonal, unitary, positive definite/semidefinite, negative defi- nite/semidefinite, real, imaginary, and reducible/irreducible. Some of the matrix classes are defined based on the existence of associated matri- ces. For instance, A is a diagonalizable matrix if there exists nonsingular matrices T such that TAT −1 = D results in a diagonal matrix D. Connected with diagonalizable matrices are normal matrices. A matrix B is a normal matrix if BB∗ = B∗B.Normal matrices are guaranteed to be diagonalizable matrices. However, defective matri- ces are not diagonalizable. Once a matrix has been identified to be diagonalizable, then the following fact can be used for easier computation of integral powers of the matrix: A = T −1DT → Ak = T −1DT T −1DT ··· T −1DT = T −1DkT and then take advantage of the fact that ⎛ ⎞ dk 0 ⎜ 1 ⎟ K . D = ⎝ .. ⎠ K 0 dN Another set of related classes of matrices are the idempotent, projection, invo- lutory, nilpotent, and convergent matrices. These classes are based on the results of integral powers. Matrix A is idempotent if A2 = A, and if, in addition, A is hermitian, then A is known as a projection matrix. Projection matrices are used to partition an N-dimensional space into two subspaces that are orthogonal to each other.
    [Show full text]
  • The Quantum Structure of Space and Time
    QcEntwn Structure &pace and Time This page intentionally left blank Proceedings of the 23rd Solvay Conference on Physics Brussels, Belgium 1 - 3 December 2005 The Quantum Structure of Space and Time EDITORS DAVID GROSS Kavli Institute. University of California. Santa Barbara. USA MARC HENNEAUX Universite Libre de Bruxelles & International Solvay Institutes. Belgium ALEXANDER SEVRIN Vrije Universiteit Brussel & International Solvay Institutes. Belgium \b World Scientific NEW JERSEY LONOON * SINGAPORE BElJlNG * SHANGHAI HONG KONG TAIPEI * CHENNAI Published by World Scientific Publishing Co. Re. Ltd. 5 Toh Tuck Link, Singapore 596224 USA ofJice: 27 Warren Street, Suite 401-402, Hackensack, NJ 07601 UK ofice; 57 Shelton Street, Covent Garden, London WC2H 9HE British Library Cataloguing-in-PublicationData A catalogue record for this hook is available from the British Library. THE QUANTUM STRUCTURE OF SPACE AND TIME Proceedings of the 23rd Solvay Conference on Physics Copyright 0 2007 by World Scientific Publishing Co. Pte. Ltd. All rights reserved. This book, or parts thereoi may not be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the Publisher. For photocopying of material in this volume, please pay a copying fee through the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA. In this case permission to photocopy is not required from the publisher. ISBN 981-256-952-9 ISBN 981-256-953-7 (phk) Printed in Singapore by World Scientific Printers (S) Pte Ltd The International Solvay Institutes Board of Directors Members Mr.
    [Show full text]
  • Elementary Numerical Methods and Computing with Python
    Elementary Numerical Methods and computing with Python Steven Pav1 Mark McClure2 April 14, 2016 1Portions Copyright c 2004-2006 Steven E. Pav. Permission is granted to copy, dis- tribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. 2Copyright c 2016 Mark McClure. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Ver- sion 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled ”GNU Free Documentation License”. 2 Contents Preface 7 1 Introduction 9 1.1 Examples ............................... 9 1.2 Iteration ................................ 11 1.3 Topics ................................. 12 2 Some mathematical preliminaries 15 2.1 Series ................................. 15 2.1.1 Geometric series ....................... 15 2.1.2 The integral test ....................... 17 2.1.3 Alternating Series ...................... 20 2.1.4 Taylor’s Theorem ....................... 21 Exercises .................................. 25 3 Computer arithmetic 27 3.1 Strange arithmetic .......................... 27 3.2 Error .................................. 28 3.3 Computer numbers .......................... 29 3.3.1 Types of numbers ...................... 29 3.3.2 Floating point numbers ................... 30 3.3.3 Distribution of computer numbers ............. 31 3.3.4 Exploring numbers with Python .............. 32 3.4 Loss of Significance .......................... 33 Exercises .................................. 36 4 Finding Roots 37 4.1 Bisection ............................... 38 4.1.1 Modifications ........................
    [Show full text]