Convergence of Bisection Method
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2022.13.2.14Keywords:
Bisection method, convergence, stopping tolerance, error, percentage error, computer program, iterations.Dimensions Badge
Issue
Section
License
Copyright (c) 2022 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Fourth roots of the natural numbers from 1 to 30 have been calculated by Bisection method in the interval [0, 3] using stopping tolerance 0f 0.00001. Calculated roots have been compared with the actual values of roots to obtain error and percentage error in the calculated roots. Numerical rate of convergence has also been calculated in the determination of each fourthroot. The highest numerical rate of convergence of Bisection method has been observed in the calculation of fourth root of 2 and is equal to 1.754385964912. The lowest numerical rate of convergence of Bisection method has been observed in the calculation of fourth roots of 1, 3, -8, 10, 12 and is equal to 1.333333333333. Average error, average percentage error and average numerical rate of convergence of Bisection method have been found to be 0.000000062635, 0.000003048055 and 1.458082183940 respectivelyAbstract
How to Cite
Downloads
Similar Articles
- Neeraj ., Anita Singhrova, Quantum Key Distribution-based Techniques in IoT , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- B. Kalpana, P. Krishnamoorthy, S. Kanageswari, Anitha J. Albert, Machine learning approaches for predicting species interactions in dynamic ecosystems , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Hemamalini V., Victoria Priscilla C, Deep learning driven image steganalysis approach with the impact of dilation rate using DDS_SE-net on diverse datasets , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Shripada Patil, Sandeep N. Jagdale, Prashant Kalshetti, Management education system in the 21st century: Challenges and opportunities , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Vijay Sharma, Nishu, Anshu Malhotra, An encryption and decryption of phonetic alphabets using signed graphs , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RFSVMDD: Ensemble of multi-dimension random forest and custom-made support vector machine for detecting RPL DDoS attacks in an IoT-based WSN environment , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- A. Sathya, M. S. Mythili, MOHCOA: Multi-objective hermit crab optimization algorithm for feature selection in sentiment analysis of Covid-19 Twitter datasets , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Thangatharani T, M. Subalakshmi, Development of an adaptive machine learning framework for real-time anomaly detection in cybersecurity , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
<< < 14 15 16 17 18 19 20 21 22 23 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Lavkush Pandey, Trilokinath, Convergence of the Method of False Position , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper

