Rust f64::asinh

Percentage Accurate: 29.8% → 99.4%
Time: 9.0s
Alternatives: 10
Speedup: 4.0×

Specification

?
\[\begin{array}{l} \\ \sinh^{-1} x \end{array} \]
(FPCore (x) :precision binary64 (asinh x))
double code(double x) {
	return asinh(x);
}
def code(x):
	return math.asinh(x)
function code(x)
	return asinh(x)
end
function tmp = code(x)
	tmp = asinh(x);
end
code[x_] := N[ArcSinh[x], $MachinePrecision]
\begin{array}{l}

\\
\sinh^{-1} x
\end{array}

Sampling outcomes in binary64 precision:

Local Percentage Accuracy vs ?

The average percentage accuracy by input value. Horizontal axis shows value of an input variable; the variable is choosen in the title. Vertical axis is accuracy; higher is better. Red represent the original program, while blue represents Herbie's suggestion. These can be toggled with buttons below the plot. The line is an average while dots represent individual samples.

Accuracy vs Speed?

Herbie found 10 alternatives:

AlternativeAccuracySpeedup
The accuracy (vertical axis) and speed (horizontal axis) of each alternatives. Up and to the right is better. The red square shows the initial program, and each blue circle shows an alternative.The line shows the best available speed-accuracy tradeoffs.

Initial Program: 29.8% accurate, 1.0× speedup?

\[\begin{array}{l} \\ \mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \end{array} \]
(FPCore (x)
 :precision binary64
 (copysign (log (+ (fabs x) (sqrt (+ (* x x) 1.0)))) x))
double code(double x) {
	return copysign(log((fabs(x) + sqrt(((x * x) + 1.0)))), x);
}
public static double code(double x) {
	return Math.copySign(Math.log((Math.abs(x) + Math.sqrt(((x * x) + 1.0)))), x);
}
def code(x):
	return math.copysign(math.log((math.fabs(x) + math.sqrt(((x * x) + 1.0)))), x)
function code(x)
	return copysign(log(Float64(abs(x) + sqrt(Float64(Float64(x * x) + 1.0)))), x)
end
function tmp = code(x)
	tmp = sign(x) * abs(log((abs(x) + sqrt(((x * x) + 1.0)))));
end
code[x_] := N[With[{TMP1 = Abs[N[Log[N[(N[Abs[x], $MachinePrecision] + N[Sqrt[N[(N[(x * x), $MachinePrecision] + 1.0), $MachinePrecision]], $MachinePrecision]), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]
\begin{array}{l}

\\
\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right)
\end{array}

Alternative 1: 99.4% accurate, 0.3× speedup?

\[\begin{array}{l} \\ \begin{array}{l} t_0 := \mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right)\\ \mathbf{if}\;t\_0 \leq -10:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\ \mathbf{elif}\;t\_0 \leq 4 \cdot 10^{-7}:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)\\ \end{array} \end{array} \]
(FPCore (x)
 :precision binary64
 (let* ((t_0 (copysign (log (+ (fabs x) (sqrt (+ (* x x) 1.0)))) x)))
   (if (<= t_0 -10.0)
     (copysign (log (- (fabs x) x)) x)
     (if (<= t_0 4e-7)
       (copysign (+ x (* x (* (* x x) -0.16666666666666666))) x)
       (copysign (log (+ (fabs x) (hypot 1.0 x))) x)))))
double code(double x) {
	double t_0 = copysign(log((fabs(x) + sqrt(((x * x) + 1.0)))), x);
	double tmp;
	if (t_0 <= -10.0) {
		tmp = copysign(log((fabs(x) - x)), x);
	} else if (t_0 <= 4e-7) {
		tmp = copysign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = copysign(log((fabs(x) + hypot(1.0, x))), x);
	}
	return tmp;
}
public static double code(double x) {
	double t_0 = Math.copySign(Math.log((Math.abs(x) + Math.sqrt(((x * x) + 1.0)))), x);
	double tmp;
	if (t_0 <= -10.0) {
		tmp = Math.copySign(Math.log((Math.abs(x) - x)), x);
	} else if (t_0 <= 4e-7) {
		tmp = Math.copySign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = Math.copySign(Math.log((Math.abs(x) + Math.hypot(1.0, x))), x);
	}
	return tmp;
}
def code(x):
	t_0 = math.copysign(math.log((math.fabs(x) + math.sqrt(((x * x) + 1.0)))), x)
	tmp = 0
	if t_0 <= -10.0:
		tmp = math.copysign(math.log((math.fabs(x) - x)), x)
	elif t_0 <= 4e-7:
		tmp = math.copysign((x + (x * ((x * x) * -0.16666666666666666))), x)
	else:
		tmp = math.copysign(math.log((math.fabs(x) + math.hypot(1.0, x))), x)
	return tmp
function code(x)
	t_0 = copysign(log(Float64(abs(x) + sqrt(Float64(Float64(x * x) + 1.0)))), x)
	tmp = 0.0
	if (t_0 <= -10.0)
		tmp = copysign(log(Float64(abs(x) - x)), x);
	elseif (t_0 <= 4e-7)
		tmp = copysign(Float64(x + Float64(x * Float64(Float64(x * x) * -0.16666666666666666))), x);
	else
		tmp = copysign(log(Float64(abs(x) + hypot(1.0, x))), x);
	end
	return tmp
end
function tmp_2 = code(x)
	t_0 = sign(x) * abs(log((abs(x) + sqrt(((x * x) + 1.0)))));
	tmp = 0.0;
	if (t_0 <= -10.0)
		tmp = sign(x) * abs(log((abs(x) - x)));
	elseif (t_0 <= 4e-7)
		tmp = sign(x) * abs((x + (x * ((x * x) * -0.16666666666666666))));
	else
		tmp = sign(x) * abs(log((abs(x) + hypot(1.0, x))));
	end
	tmp_2 = tmp;
end
code[x_] := Block[{t$95$0 = N[With[{TMP1 = Abs[N[Log[N[(N[Abs[x], $MachinePrecision] + N[Sqrt[N[(N[(x * x), $MachinePrecision] + 1.0), $MachinePrecision]], $MachinePrecision]), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]}, If[LessEqual[t$95$0, -10.0], N[With[{TMP1 = Abs[N[Log[N[(N[Abs[x], $MachinePrecision] - x), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], If[LessEqual[t$95$0, 4e-7], N[With[{TMP1 = Abs[N[(x + N[(x * N[(N[(x * x), $MachinePrecision] * -0.16666666666666666), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], N[With[{TMP1 = Abs[N[Log[N[(N[Abs[x], $MachinePrecision] + N[Sqrt[1.0 ^ 2 + x ^ 2], $MachinePrecision]), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]]]]
\begin{array}{l}

\\
\begin{array}{l}
t_0 := \mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right)\\
\mathbf{if}\;t\_0 \leq -10:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\

\mathbf{elif}\;t\_0 \leq 4 \cdot 10^{-7}:\\
\;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\

\mathbf{else}:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)\\


\end{array}
\end{array}
Derivation
  1. Split input into 3 regimes
  2. if (copysign.f64 (log.f64 (+.f64 (fabs.f64 x) (sqrt.f64 (+.f64 (*.f64 x x) #s(literal 1 binary64))))) x) < -10

    1. Initial program 53.7%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around -inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(-1 \cdot \left(x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\mathsf{neg}\left(x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right)\right), x\right) \]
      2. neg-sub0N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right), x\right) \]
      3. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - x \cdot \left(-1 \cdot \frac{\left|x\right|}{x} + 1\right)\right)\right), x\right) \]
      4. distribute-lft-inN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - \left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right) + x \cdot 1\right)\right)\right), x\right) \]
      5. *-rgt-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - \left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right) + x\right)\right)\right), x\right) \]
      6. associate--r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(0 - x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right)\right) - x\right)\right), x\right) \]
      7. neg-sub0N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right)\right)\right) - x\right)\right), x\right) \]
      8. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(x \cdot \left(\mathsf{neg}\left(\frac{\left|x\right|}{x}\right)\right)\right)\right) - x\right)\right), x\right) \]
      9. distribute-rgt-neg-outN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(\left(\mathsf{neg}\left(x \cdot \frac{\left|x\right|}{x}\right)\right)\right)\right) - x\right)\right), x\right) \]
      10. remove-double-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(x \cdot \frac{\left|x\right|}{x} - x\right)\right), x\right) \]
      11. --lowering--.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(x \cdot \frac{\left|x\right|}{x}\right), x\right)\right), x\right) \]
      12. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right|}{x} \cdot x\right), x\right)\right), x\right) \]
      13. associate-*l/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right| \cdot x}{x}\right), x\right)\right), x\right) \]
      14. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\left(\left|x\right| \cdot x\right), x\right), x\right)\right), x\right) \]
      15. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\left(x \cdot \left|x\right|\right), x\right), x\right)\right), x\right) \]
      16. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\mathsf{*.f64}\left(x, \left(\left|x\right|\right)\right), x\right), x\right)\right), x\right) \]
      17. fabs-lowering-fabs.f6453.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\mathsf{*.f64}\left(x, \mathsf{fabs.f64}\left(x\right)\right), x\right), x\right)\right), x\right) \]
    7. Simplified53.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\frac{x \cdot \left|x\right|}{x} - x\right)}, x\right) \]
    8. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\frac{x \cdot \left|x\right|}{x} - x\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{x \cdot \left|x\right|}{x} - x\right)\right), x\right) \]
      3. --lowering--.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{x \cdot \left|x\right|}{x}\right), x\right)\right), x\right) \]
      4. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right| \cdot x}{x}\right), x\right)\right), x\right) \]
      5. associate-/l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot \frac{x}{x}\right), x\right)\right), x\right) \]
      6. *-inversesN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot 1\right), x\right)\right), x\right) \]
      7. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot \left|1\right|\right), x\right)\right), x\right) \]
      8. fabs-mulN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x \cdot 1\right|\right), x\right)\right), x\right) \]
      9. *-rgt-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right|\right), x\right)\right), x\right) \]
      10. fabs-lowering-fabs.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right)\right), x\right) \]
    9. Applied egg-rr100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)} \]

    if -10 < (copysign.f64 (log.f64 (+.f64 (fabs.f64 x) (sqrt.f64 (+.f64 (*.f64 x x) #s(literal 1 binary64))))) x) < 3.9999999999999998e-7

    1. Initial program 9.6%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified9.7%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(1 + \left(\left|x\right| + \frac{1}{2} \cdot {x}^{2}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. associate-+r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(1 + \left|x\right|\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\left|x\right| + 1\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      3. associate-+l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      5. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      6. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\frac{1}{2} \cdot {x}^{2}\right)\right)\right)\right), x\right) \]
      7. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      8. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      9. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      10. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      11. *-lowering-*.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
    7. Simplified9.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\left|x\right| + \left(1 + x \cdot \left(x \cdot 0.5\right)\right)\right)}, x\right) \]
    8. Applied egg-rr6.6%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\frac{1 + x \cdot \left(x \cdot x\right)}{1 + \frac{\left(x \cdot x\right) \cdot \left(x \cdot \left(x \cdot \left(x \cdot x\right)\right)\right) - x \cdot \left(x \cdot x\right)}{x \cdot \left(x \cdot \left(x \cdot x\right)\right) + \left(x \cdot x + x \cdot \left(x \cdot x\right)\right)}} + 0.5 \cdot \left(x \cdot x\right)\right), x\right)} \]
    9. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\left(x \cdot \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right)}, x\right) \]
    10. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\frac{-1}{6} \cdot {x}^{2}\right)\right)\right), x\right) \]
      3. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      4. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      5. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      7. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{-1}{6}\right)\right)\right)\right), x\right) \]
    11. Simplified100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(1 + x \cdot \left(x \cdot -0.16666666666666666\right)\right)}, x\right) \]
    12. Step-by-step derivation
      1. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right) + 1\right)\right), x\right) \]
      2. distribute-rgt-inN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + 1 \cdot x\right), x\right) \]
      3. *-lft-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + x\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x\right), x\right), x\right) \]
      5. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      7. associate-*r*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right), x\right), x\right) \]
      8. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\frac{-1}{6} \cdot \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      9. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      10. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \mathsf{*.f64}\left(x, x\right)\right)\right), x\right), x\right) \]
    13. Applied egg-rr100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(-0.16666666666666666 \cdot \left(x \cdot x\right)\right) + x}, x\right) \]

    if 3.9999999999999998e-7 < (copysign.f64 (log.f64 (+.f64 (fabs.f64 x) (sqrt.f64 (+.f64 (*.f64 x x) #s(literal 1 binary64))))) x)

    1. Initial program 48.8%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
  3. Recombined 3 regimes into one program.
  4. Final simplification100.0%

    \[\leadsto \begin{array}{l} \mathbf{if}\;\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \leq -10:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\ \mathbf{elif}\;\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \leq 4 \cdot 10^{-7}:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)\\ \end{array} \]
  5. Add Preprocessing

Alternative 2: 99.4% accurate, 1.2× speedup?

\[\begin{array}{l} \\ \begin{array}{l} \mathbf{if}\;x \leq -1.3:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\ \mathbf{elif}\;x \leq 0.88:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(x \cdot \left(1 + \left(\frac{0.5}{x \cdot x} + \left(\frac{\left|x\right|}{x} + \frac{-0.125}{x \cdot \left(x \cdot \left(x \cdot x\right)\right)}\right)\right)\right)\right), x\right)\\ \end{array} \end{array} \]
(FPCore (x)
 :precision binary64
 (if (<= x -1.3)
   (copysign (log (- (fabs x) x)) x)
   (if (<= x 0.88)
     (copysign (+ x (* x (* (* x x) -0.16666666666666666))) x)
     (copysign
      (log
       (*
        x
        (+
         1.0
         (+
          (/ 0.5 (* x x))
          (+ (/ (fabs x) x) (/ -0.125 (* x (* x (* x x)))))))))
      x))))
double code(double x) {
	double tmp;
	if (x <= -1.3) {
		tmp = copysign(log((fabs(x) - x)), x);
	} else if (x <= 0.88) {
		tmp = copysign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = copysign(log((x * (1.0 + ((0.5 / (x * x)) + ((fabs(x) / x) + (-0.125 / (x * (x * (x * x))))))))), x);
	}
	return tmp;
}
public static double code(double x) {
	double tmp;
	if (x <= -1.3) {
		tmp = Math.copySign(Math.log((Math.abs(x) - x)), x);
	} else if (x <= 0.88) {
		tmp = Math.copySign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = Math.copySign(Math.log((x * (1.0 + ((0.5 / (x * x)) + ((Math.abs(x) / x) + (-0.125 / (x * (x * (x * x))))))))), x);
	}
	return tmp;
}
def code(x):
	tmp = 0
	if x <= -1.3:
		tmp = math.copysign(math.log((math.fabs(x) - x)), x)
	elif x <= 0.88:
		tmp = math.copysign((x + (x * ((x * x) * -0.16666666666666666))), x)
	else:
		tmp = math.copysign(math.log((x * (1.0 + ((0.5 / (x * x)) + ((math.fabs(x) / x) + (-0.125 / (x * (x * (x * x))))))))), x)
	return tmp
function code(x)
	tmp = 0.0
	if (x <= -1.3)
		tmp = copysign(log(Float64(abs(x) - x)), x);
	elseif (x <= 0.88)
		tmp = copysign(Float64(x + Float64(x * Float64(Float64(x * x) * -0.16666666666666666))), x);
	else
		tmp = copysign(log(Float64(x * Float64(1.0 + Float64(Float64(0.5 / Float64(x * x)) + Float64(Float64(abs(x) / x) + Float64(-0.125 / Float64(x * Float64(x * Float64(x * x))))))))), x);
	end
	return tmp
end
function tmp_2 = code(x)
	tmp = 0.0;
	if (x <= -1.3)
		tmp = sign(x) * abs(log((abs(x) - x)));
	elseif (x <= 0.88)
		tmp = sign(x) * abs((x + (x * ((x * x) * -0.16666666666666666))));
	else
		tmp = sign(x) * abs(log((x * (1.0 + ((0.5 / (x * x)) + ((abs(x) / x) + (-0.125 / (x * (x * (x * x))))))))));
	end
	tmp_2 = tmp;
end
code[x_] := If[LessEqual[x, -1.3], N[With[{TMP1 = Abs[N[Log[N[(N[Abs[x], $MachinePrecision] - x), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], If[LessEqual[x, 0.88], N[With[{TMP1 = Abs[N[(x + N[(x * N[(N[(x * x), $MachinePrecision] * -0.16666666666666666), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], N[With[{TMP1 = Abs[N[Log[N[(x * N[(1.0 + N[(N[(0.5 / N[(x * x), $MachinePrecision]), $MachinePrecision] + N[(N[(N[Abs[x], $MachinePrecision] / x), $MachinePrecision] + N[(-0.125 / N[(x * N[(x * N[(x * x), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]]]
\begin{array}{l}

\\
\begin{array}{l}
\mathbf{if}\;x \leq -1.3:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\

\mathbf{elif}\;x \leq 0.88:\\
\;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\

\mathbf{else}:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(x \cdot \left(1 + \left(\frac{0.5}{x \cdot x} + \left(\frac{\left|x\right|}{x} + \frac{-0.125}{x \cdot \left(x \cdot \left(x \cdot x\right)\right)}\right)\right)\right)\right), x\right)\\


\end{array}
\end{array}
Derivation
  1. Split input into 3 regimes
  2. if x < -1.30000000000000004

    1. Initial program 53.7%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around -inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(-1 \cdot \left(x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\mathsf{neg}\left(x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right)\right), x\right) \]
      2. neg-sub0N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right), x\right) \]
      3. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - x \cdot \left(-1 \cdot \frac{\left|x\right|}{x} + 1\right)\right)\right), x\right) \]
      4. distribute-lft-inN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - \left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right) + x \cdot 1\right)\right)\right), x\right) \]
      5. *-rgt-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - \left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right) + x\right)\right)\right), x\right) \]
      6. associate--r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(0 - x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right)\right) - x\right)\right), x\right) \]
      7. neg-sub0N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right)\right)\right) - x\right)\right), x\right) \]
      8. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(x \cdot \left(\mathsf{neg}\left(\frac{\left|x\right|}{x}\right)\right)\right)\right) - x\right)\right), x\right) \]
      9. distribute-rgt-neg-outN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(\left(\mathsf{neg}\left(x \cdot \frac{\left|x\right|}{x}\right)\right)\right)\right) - x\right)\right), x\right) \]
      10. remove-double-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(x \cdot \frac{\left|x\right|}{x} - x\right)\right), x\right) \]
      11. --lowering--.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(x \cdot \frac{\left|x\right|}{x}\right), x\right)\right), x\right) \]
      12. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right|}{x} \cdot x\right), x\right)\right), x\right) \]
      13. associate-*l/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right| \cdot x}{x}\right), x\right)\right), x\right) \]
      14. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\left(\left|x\right| \cdot x\right), x\right), x\right)\right), x\right) \]
      15. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\left(x \cdot \left|x\right|\right), x\right), x\right)\right), x\right) \]
      16. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\mathsf{*.f64}\left(x, \left(\left|x\right|\right)\right), x\right), x\right)\right), x\right) \]
      17. fabs-lowering-fabs.f6453.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\mathsf{*.f64}\left(x, \mathsf{fabs.f64}\left(x\right)\right), x\right), x\right)\right), x\right) \]
    7. Simplified53.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\frac{x \cdot \left|x\right|}{x} - x\right)}, x\right) \]
    8. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\frac{x \cdot \left|x\right|}{x} - x\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{x \cdot \left|x\right|}{x} - x\right)\right), x\right) \]
      3. --lowering--.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{x \cdot \left|x\right|}{x}\right), x\right)\right), x\right) \]
      4. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right| \cdot x}{x}\right), x\right)\right), x\right) \]
      5. associate-/l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot \frac{x}{x}\right), x\right)\right), x\right) \]
      6. *-inversesN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot 1\right), x\right)\right), x\right) \]
      7. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot \left|1\right|\right), x\right)\right), x\right) \]
      8. fabs-mulN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x \cdot 1\right|\right), x\right)\right), x\right) \]
      9. *-rgt-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right|\right), x\right)\right), x\right) \]
      10. fabs-lowering-fabs.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right)\right), x\right) \]
    9. Applied egg-rr100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)} \]

    if -1.30000000000000004 < x < 0.880000000000000004

    1. Initial program 9.6%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified9.7%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(1 + \left(\left|x\right| + \frac{1}{2} \cdot {x}^{2}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. associate-+r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(1 + \left|x\right|\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\left|x\right| + 1\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      3. associate-+l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      5. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      6. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\frac{1}{2} \cdot {x}^{2}\right)\right)\right)\right), x\right) \]
      7. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      8. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      9. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      10. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      11. *-lowering-*.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
    7. Simplified9.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\left|x\right| + \left(1 + x \cdot \left(x \cdot 0.5\right)\right)\right)}, x\right) \]
    8. Applied egg-rr6.6%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\frac{1 + x \cdot \left(x \cdot x\right)}{1 + \frac{\left(x \cdot x\right) \cdot \left(x \cdot \left(x \cdot \left(x \cdot x\right)\right)\right) - x \cdot \left(x \cdot x\right)}{x \cdot \left(x \cdot \left(x \cdot x\right)\right) + \left(x \cdot x + x \cdot \left(x \cdot x\right)\right)}} + 0.5 \cdot \left(x \cdot x\right)\right), x\right)} \]
    9. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\left(x \cdot \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right)}, x\right) \]
    10. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\frac{-1}{6} \cdot {x}^{2}\right)\right)\right), x\right) \]
      3. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      4. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      5. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      7. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{-1}{6}\right)\right)\right)\right), x\right) \]
    11. Simplified100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(1 + x \cdot \left(x \cdot -0.16666666666666666\right)\right)}, x\right) \]
    12. Step-by-step derivation
      1. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right) + 1\right)\right), x\right) \]
      2. distribute-rgt-inN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + 1 \cdot x\right), x\right) \]
      3. *-lft-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + x\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x\right), x\right), x\right) \]
      5. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      7. associate-*r*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right), x\right), x\right) \]
      8. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\frac{-1}{6} \cdot \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      9. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      10. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \mathsf{*.f64}\left(x, x\right)\right)\right), x\right), x\right) \]
    13. Applied egg-rr100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(-0.16666666666666666 \cdot \left(x \cdot x\right)\right) + x}, x\right) \]

    if 0.880000000000000004 < x

    1. Initial program 48.8%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(x \cdot \left(\left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(\left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right), x\right) \]
      2. associate--l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \left(\left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right), x\right) \]
      4. associate--l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\frac{\frac{1}{2}}{{x}^{2}} + \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      5. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\left(\frac{\frac{1}{2}}{{x}^{2}}\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      6. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \left({x}^{2}\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      7. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \left(x \cdot x\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      8. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      9. sub-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \left(\frac{\left|x\right|}{x} + \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      10. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\left(\frac{\left|x\right|}{x}\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      11. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\left(\left|x\right|\right), x\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      12. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      13. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{\frac{1}{8} \cdot 1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      14. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{\frac{1}{8}}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      15. distribute-neg-fracN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\mathsf{neg}\left(\frac{1}{8}\right)}{{x}^{4}}\right)\right)\right)\right)\right)\right), x\right) \]
      16. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{4}}\right)\right)\right)\right)\right)\right), x\right) \]
      17. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{\left(2 \cdot 2\right)}}\right)\right)\right)\right)\right)\right), x\right) \]
      18. pow-sqrN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{2} \cdot {x}^{2}}\right)\right)\right)\right)\right)\right), x\right) \]
      19. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \mathsf{/.f64}\left(\frac{-1}{8}, \left({x}^{2} \cdot {x}^{2}\right)\right)\right)\right)\right)\right)\right), x\right) \]
    7. Simplified99.1%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(x \cdot \left(1 + \left(\frac{0.5}{x \cdot x} + \left(\frac{\left|x\right|}{x} + \frac{-0.125}{x \cdot \left(x \cdot \left(x \cdot x\right)\right)}\right)\right)\right)\right)}, x\right) \]
  3. Recombined 3 regimes into one program.
  4. Final simplification99.7%

    \[\leadsto \begin{array}{l} \mathbf{if}\;x \leq -1.3:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\ \mathbf{elif}\;x \leq 0.88:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(x \cdot \left(1 + \left(\frac{0.5}{x \cdot x} + \left(\frac{\left|x\right|}{x} + \frac{-0.125}{x \cdot \left(x \cdot \left(x \cdot x\right)\right)}\right)\right)\right)\right), x\right)\\ \end{array} \]
  5. Add Preprocessing

Alternative 3: 99.3% accurate, 1.3× speedup?

\[\begin{array}{l} \\ \begin{array}{l} \mathbf{if}\;x \leq -1.3:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\ \mathbf{elif}\;x \leq 0.95:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(x \cdot \left(\frac{\left|x\right|}{x} + \left(1 + \frac{0.5}{x \cdot x}\right)\right)\right), x\right)\\ \end{array} \end{array} \]
(FPCore (x)
 :precision binary64
 (if (<= x -1.3)
   (copysign (log (- (fabs x) x)) x)
   (if (<= x 0.95)
     (copysign (+ x (* x (* (* x x) -0.16666666666666666))) x)
     (copysign (log (* x (+ (/ (fabs x) x) (+ 1.0 (/ 0.5 (* x x)))))) x))))
double code(double x) {
	double tmp;
	if (x <= -1.3) {
		tmp = copysign(log((fabs(x) - x)), x);
	} else if (x <= 0.95) {
		tmp = copysign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = copysign(log((x * ((fabs(x) / x) + (1.0 + (0.5 / (x * x)))))), x);
	}
	return tmp;
}
public static double code(double x) {
	double tmp;
	if (x <= -1.3) {
		tmp = Math.copySign(Math.log((Math.abs(x) - x)), x);
	} else if (x <= 0.95) {
		tmp = Math.copySign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = Math.copySign(Math.log((x * ((Math.abs(x) / x) + (1.0 + (0.5 / (x * x)))))), x);
	}
	return tmp;
}
def code(x):
	tmp = 0
	if x <= -1.3:
		tmp = math.copysign(math.log((math.fabs(x) - x)), x)
	elif x <= 0.95:
		tmp = math.copysign((x + (x * ((x * x) * -0.16666666666666666))), x)
	else:
		tmp = math.copysign(math.log((x * ((math.fabs(x) / x) + (1.0 + (0.5 / (x * x)))))), x)
	return tmp
function code(x)
	tmp = 0.0
	if (x <= -1.3)
		tmp = copysign(log(Float64(abs(x) - x)), x);
	elseif (x <= 0.95)
		tmp = copysign(Float64(x + Float64(x * Float64(Float64(x * x) * -0.16666666666666666))), x);
	else
		tmp = copysign(log(Float64(x * Float64(Float64(abs(x) / x) + Float64(1.0 + Float64(0.5 / Float64(x * x)))))), x);
	end
	return tmp
end
function tmp_2 = code(x)
	tmp = 0.0;
	if (x <= -1.3)
		tmp = sign(x) * abs(log((abs(x) - x)));
	elseif (x <= 0.95)
		tmp = sign(x) * abs((x + (x * ((x * x) * -0.16666666666666666))));
	else
		tmp = sign(x) * abs(log((x * ((abs(x) / x) + (1.0 + (0.5 / (x * x)))))));
	end
	tmp_2 = tmp;
end
code[x_] := If[LessEqual[x, -1.3], N[With[{TMP1 = Abs[N[Log[N[(N[Abs[x], $MachinePrecision] - x), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], If[LessEqual[x, 0.95], N[With[{TMP1 = Abs[N[(x + N[(x * N[(N[(x * x), $MachinePrecision] * -0.16666666666666666), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], N[With[{TMP1 = Abs[N[Log[N[(x * N[(N[(N[Abs[x], $MachinePrecision] / x), $MachinePrecision] + N[(1.0 + N[(0.5 / N[(x * x), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]]]
\begin{array}{l}

\\
\begin{array}{l}
\mathbf{if}\;x \leq -1.3:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\

\mathbf{elif}\;x \leq 0.95:\\
\;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\

\mathbf{else}:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(x \cdot \left(\frac{\left|x\right|}{x} + \left(1 + \frac{0.5}{x \cdot x}\right)\right)\right), x\right)\\


\end{array}
\end{array}
Derivation
  1. Split input into 3 regimes
  2. if x < -1.30000000000000004

    1. Initial program 53.7%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around -inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(-1 \cdot \left(x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\mathsf{neg}\left(x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right)\right), x\right) \]
      2. neg-sub0N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right), x\right) \]
      3. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - x \cdot \left(-1 \cdot \frac{\left|x\right|}{x} + 1\right)\right)\right), x\right) \]
      4. distribute-lft-inN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - \left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right) + x \cdot 1\right)\right)\right), x\right) \]
      5. *-rgt-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - \left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right) + x\right)\right)\right), x\right) \]
      6. associate--r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(0 - x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right)\right) - x\right)\right), x\right) \]
      7. neg-sub0N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right)\right)\right) - x\right)\right), x\right) \]
      8. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(x \cdot \left(\mathsf{neg}\left(\frac{\left|x\right|}{x}\right)\right)\right)\right) - x\right)\right), x\right) \]
      9. distribute-rgt-neg-outN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(\left(\mathsf{neg}\left(x \cdot \frac{\left|x\right|}{x}\right)\right)\right)\right) - x\right)\right), x\right) \]
      10. remove-double-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(x \cdot \frac{\left|x\right|}{x} - x\right)\right), x\right) \]
      11. --lowering--.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(x \cdot \frac{\left|x\right|}{x}\right), x\right)\right), x\right) \]
      12. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right|}{x} \cdot x\right), x\right)\right), x\right) \]
      13. associate-*l/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right| \cdot x}{x}\right), x\right)\right), x\right) \]
      14. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\left(\left|x\right| \cdot x\right), x\right), x\right)\right), x\right) \]
      15. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\left(x \cdot \left|x\right|\right), x\right), x\right)\right), x\right) \]
      16. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\mathsf{*.f64}\left(x, \left(\left|x\right|\right)\right), x\right), x\right)\right), x\right) \]
      17. fabs-lowering-fabs.f6453.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\mathsf{*.f64}\left(x, \mathsf{fabs.f64}\left(x\right)\right), x\right), x\right)\right), x\right) \]
    7. Simplified53.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\frac{x \cdot \left|x\right|}{x} - x\right)}, x\right) \]
    8. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\frac{x \cdot \left|x\right|}{x} - x\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{x \cdot \left|x\right|}{x} - x\right)\right), x\right) \]
      3. --lowering--.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{x \cdot \left|x\right|}{x}\right), x\right)\right), x\right) \]
      4. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right| \cdot x}{x}\right), x\right)\right), x\right) \]
      5. associate-/l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot \frac{x}{x}\right), x\right)\right), x\right) \]
      6. *-inversesN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot 1\right), x\right)\right), x\right) \]
      7. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot \left|1\right|\right), x\right)\right), x\right) \]
      8. fabs-mulN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x \cdot 1\right|\right), x\right)\right), x\right) \]
      9. *-rgt-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right|\right), x\right)\right), x\right) \]
      10. fabs-lowering-fabs.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right)\right), x\right) \]
    9. Applied egg-rr100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)} \]

    if -1.30000000000000004 < x < 0.94999999999999996

    1. Initial program 9.6%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified9.7%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(1 + \left(\left|x\right| + \frac{1}{2} \cdot {x}^{2}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. associate-+r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(1 + \left|x\right|\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\left|x\right| + 1\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      3. associate-+l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      5. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      6. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\frac{1}{2} \cdot {x}^{2}\right)\right)\right)\right), x\right) \]
      7. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      8. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      9. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      10. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      11. *-lowering-*.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
    7. Simplified9.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\left|x\right| + \left(1 + x \cdot \left(x \cdot 0.5\right)\right)\right)}, x\right) \]
    8. Applied egg-rr6.6%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\frac{1 + x \cdot \left(x \cdot x\right)}{1 + \frac{\left(x \cdot x\right) \cdot \left(x \cdot \left(x \cdot \left(x \cdot x\right)\right)\right) - x \cdot \left(x \cdot x\right)}{x \cdot \left(x \cdot \left(x \cdot x\right)\right) + \left(x \cdot x + x \cdot \left(x \cdot x\right)\right)}} + 0.5 \cdot \left(x \cdot x\right)\right), x\right)} \]
    9. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\left(x \cdot \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right)}, x\right) \]
    10. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\frac{-1}{6} \cdot {x}^{2}\right)\right)\right), x\right) \]
      3. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      4. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      5. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      7. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{-1}{6}\right)\right)\right)\right), x\right) \]
    11. Simplified100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(1 + x \cdot \left(x \cdot -0.16666666666666666\right)\right)}, x\right) \]
    12. Step-by-step derivation
      1. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right) + 1\right)\right), x\right) \]
      2. distribute-rgt-inN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + 1 \cdot x\right), x\right) \]
      3. *-lft-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + x\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x\right), x\right), x\right) \]
      5. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      7. associate-*r*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right), x\right), x\right) \]
      8. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\frac{-1}{6} \cdot \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      9. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      10. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \mathsf{*.f64}\left(x, x\right)\right)\right), x\right), x\right) \]
    13. Applied egg-rr100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(-0.16666666666666666 \cdot \left(x \cdot x\right)\right) + x}, x\right) \]

    if 0.94999999999999996 < x

    1. Initial program 48.8%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(x \cdot \left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right)\right)\right), x\right) \]
      2. associate-+r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(\left(1 + \frac{\frac{1}{2}}{{x}^{2}}\right) + \frac{\left|x\right|}{x}\right)\right)\right), x\right) \]
      3. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(\frac{\left|x\right|}{x} + \left(1 + \frac{\frac{1}{2}}{{x}^{2}}\right)\right)\right)\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\left(\frac{\left|x\right|}{x}\right), \left(1 + \frac{\frac{1}{2}}{{x}^{2}}\right)\right)\right)\right), x\right) \]
      5. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\left(\left|x\right|\right), x\right), \left(1 + \frac{\frac{1}{2}}{{x}^{2}}\right)\right)\right)\right), x\right) \]
      6. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(1 + \frac{\frac{1}{2}}{{x}^{2}}\right)\right)\right)\right), x\right) \]
      7. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \mathsf{+.f64}\left(1, \left(\frac{\frac{1}{2}}{{x}^{2}}\right)\right)\right)\right)\right), x\right) \]
      8. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \mathsf{+.f64}\left(1, \mathsf{/.f64}\left(\frac{1}{2}, \left({x}^{2}\right)\right)\right)\right)\right)\right), x\right) \]
      9. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \mathsf{+.f64}\left(1, \mathsf{/.f64}\left(\frac{1}{2}, \left(x \cdot x\right)\right)\right)\right)\right)\right), x\right) \]
      10. *-lowering-*.f6498.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \mathsf{+.f64}\left(1, \mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right)\right)\right)\right)\right), x\right) \]
    7. Simplified98.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(x \cdot \left(\frac{\left|x\right|}{x} + \left(1 + \frac{0.5}{x \cdot x}\right)\right)\right)}, x\right) \]
  3. Recombined 3 regimes into one program.
  4. Final simplification99.6%

    \[\leadsto \begin{array}{l} \mathbf{if}\;x \leq -1.3:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\ \mathbf{elif}\;x \leq 0.95:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(x \cdot \left(\frac{\left|x\right|}{x} + \left(1 + \frac{0.5}{x \cdot x}\right)\right)\right), x\right)\\ \end{array} \]
  5. Add Preprocessing

Alternative 4: 99.3% accurate, 1.3× speedup?

\[\begin{array}{l} \\ \begin{array}{l} \mathbf{if}\;x \leq -1.3:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\ \mathbf{elif}\;x \leq 1.1:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right), x\right)\\ \end{array} \end{array} \]
(FPCore (x)
 :precision binary64
 (if (<= x -1.3)
   (copysign (log (- (fabs x) x)) x)
   (if (<= x 1.1)
     (copysign (+ x (* x (* (* x x) -0.16666666666666666))) x)
     (copysign (log (/ (+ 0.5 (/ -0.125 (* x x))) x)) x))))
double code(double x) {
	double tmp;
	if (x <= -1.3) {
		tmp = copysign(log((fabs(x) - x)), x);
	} else if (x <= 1.1) {
		tmp = copysign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = copysign(log(((0.5 + (-0.125 / (x * x))) / x)), x);
	}
	return tmp;
}
public static double code(double x) {
	double tmp;
	if (x <= -1.3) {
		tmp = Math.copySign(Math.log((Math.abs(x) - x)), x);
	} else if (x <= 1.1) {
		tmp = Math.copySign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = Math.copySign(Math.log(((0.5 + (-0.125 / (x * x))) / x)), x);
	}
	return tmp;
}
def code(x):
	tmp = 0
	if x <= -1.3:
		tmp = math.copysign(math.log((math.fabs(x) - x)), x)
	elif x <= 1.1:
		tmp = math.copysign((x + (x * ((x * x) * -0.16666666666666666))), x)
	else:
		tmp = math.copysign(math.log(((0.5 + (-0.125 / (x * x))) / x)), x)
	return tmp
function code(x)
	tmp = 0.0
	if (x <= -1.3)
		tmp = copysign(log(Float64(abs(x) - x)), x);
	elseif (x <= 1.1)
		tmp = copysign(Float64(x + Float64(x * Float64(Float64(x * x) * -0.16666666666666666))), x);
	else
		tmp = copysign(log(Float64(Float64(0.5 + Float64(-0.125 / Float64(x * x))) / x)), x);
	end
	return tmp
end
function tmp_2 = code(x)
	tmp = 0.0;
	if (x <= -1.3)
		tmp = sign(x) * abs(log((abs(x) - x)));
	elseif (x <= 1.1)
		tmp = sign(x) * abs((x + (x * ((x * x) * -0.16666666666666666))));
	else
		tmp = sign(x) * abs(log(((0.5 + (-0.125 / (x * x))) / x)));
	end
	tmp_2 = tmp;
end
code[x_] := If[LessEqual[x, -1.3], N[With[{TMP1 = Abs[N[Log[N[(N[Abs[x], $MachinePrecision] - x), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], If[LessEqual[x, 1.1], N[With[{TMP1 = Abs[N[(x + N[(x * N[(N[(x * x), $MachinePrecision] * -0.16666666666666666), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], N[With[{TMP1 = Abs[N[Log[N[(N[(0.5 + N[(-0.125 / N[(x * x), $MachinePrecision]), $MachinePrecision]), $MachinePrecision] / x), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]]]
\begin{array}{l}

\\
\begin{array}{l}
\mathbf{if}\;x \leq -1.3:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\

\mathbf{elif}\;x \leq 1.1:\\
\;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\

\mathbf{else}:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right), x\right)\\


\end{array}
\end{array}
Derivation
  1. Split input into 3 regimes
  2. if x < -1.30000000000000004

    1. Initial program 53.7%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around -inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(-1 \cdot \left(x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\mathsf{neg}\left(x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right)\right), x\right) \]
      2. neg-sub0N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - x \cdot \left(1 + -1 \cdot \frac{\left|x\right|}{x}\right)\right)\right), x\right) \]
      3. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - x \cdot \left(-1 \cdot \frac{\left|x\right|}{x} + 1\right)\right)\right), x\right) \]
      4. distribute-lft-inN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - \left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right) + x \cdot 1\right)\right)\right), x\right) \]
      5. *-rgt-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - \left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right) + x\right)\right)\right), x\right) \]
      6. associate--r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(0 - x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right)\right) - x\right)\right), x\right) \]
      7. neg-sub0N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(x \cdot \left(-1 \cdot \frac{\left|x\right|}{x}\right)\right)\right) - x\right)\right), x\right) \]
      8. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(x \cdot \left(\mathsf{neg}\left(\frac{\left|x\right|}{x}\right)\right)\right)\right) - x\right)\right), x\right) \]
      9. distribute-rgt-neg-outN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\mathsf{neg}\left(\left(\mathsf{neg}\left(x \cdot \frac{\left|x\right|}{x}\right)\right)\right)\right) - x\right)\right), x\right) \]
      10. remove-double-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(x \cdot \frac{\left|x\right|}{x} - x\right)\right), x\right) \]
      11. --lowering--.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(x \cdot \frac{\left|x\right|}{x}\right), x\right)\right), x\right) \]
      12. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right|}{x} \cdot x\right), x\right)\right), x\right) \]
      13. associate-*l/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right| \cdot x}{x}\right), x\right)\right), x\right) \]
      14. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\left(\left|x\right| \cdot x\right), x\right), x\right)\right), x\right) \]
      15. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\left(x \cdot \left|x\right|\right), x\right), x\right)\right), x\right) \]
      16. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\mathsf{*.f64}\left(x, \left(\left|x\right|\right)\right), x\right), x\right)\right), x\right) \]
      17. fabs-lowering-fabs.f6453.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{/.f64}\left(\mathsf{*.f64}\left(x, \mathsf{fabs.f64}\left(x\right)\right), x\right), x\right)\right), x\right) \]
    7. Simplified53.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\frac{x \cdot \left|x\right|}{x} - x\right)}, x\right) \]
    8. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\frac{x \cdot \left|x\right|}{x} - x\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{x \cdot \left|x\right|}{x} - x\right)\right), x\right) \]
      3. --lowering--.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{x \cdot \left|x\right|}{x}\right), x\right)\right), x\right) \]
      4. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\frac{\left|x\right| \cdot x}{x}\right), x\right)\right), x\right) \]
      5. associate-/l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot \frac{x}{x}\right), x\right)\right), x\right) \]
      6. *-inversesN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot 1\right), x\right)\right), x\right) \]
      7. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right| \cdot \left|1\right|\right), x\right)\right), x\right) \]
      8. fabs-mulN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x \cdot 1\right|\right), x\right)\right), x\right) \]
      9. *-rgt-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\left(\left|x\right|\right), x\right)\right), x\right) \]
      10. fabs-lowering-fabs.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right)\right), x\right) \]
    9. Applied egg-rr100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)} \]

    if -1.30000000000000004 < x < 1.1000000000000001

    1. Initial program 9.6%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified9.7%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(1 + \left(\left|x\right| + \frac{1}{2} \cdot {x}^{2}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. associate-+r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(1 + \left|x\right|\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\left|x\right| + 1\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      3. associate-+l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      5. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      6. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\frac{1}{2} \cdot {x}^{2}\right)\right)\right)\right), x\right) \]
      7. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      8. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      9. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      10. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      11. *-lowering-*.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
    7. Simplified9.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\left|x\right| + \left(1 + x \cdot \left(x \cdot 0.5\right)\right)\right)}, x\right) \]
    8. Applied egg-rr6.6%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\frac{1 + x \cdot \left(x \cdot x\right)}{1 + \frac{\left(x \cdot x\right) \cdot \left(x \cdot \left(x \cdot \left(x \cdot x\right)\right)\right) - x \cdot \left(x \cdot x\right)}{x \cdot \left(x \cdot \left(x \cdot x\right)\right) + \left(x \cdot x + x \cdot \left(x \cdot x\right)\right)}} + 0.5 \cdot \left(x \cdot x\right)\right), x\right)} \]
    9. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\left(x \cdot \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right)}, x\right) \]
    10. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\frac{-1}{6} \cdot {x}^{2}\right)\right)\right), x\right) \]
      3. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      4. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      5. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      7. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{-1}{6}\right)\right)\right)\right), x\right) \]
    11. Simplified100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(1 + x \cdot \left(x \cdot -0.16666666666666666\right)\right)}, x\right) \]
    12. Step-by-step derivation
      1. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right) + 1\right)\right), x\right) \]
      2. distribute-rgt-inN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + 1 \cdot x\right), x\right) \]
      3. *-lft-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + x\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x\right), x\right), x\right) \]
      5. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      7. associate-*r*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right), x\right), x\right) \]
      8. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\frac{-1}{6} \cdot \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      9. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      10. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \mathsf{*.f64}\left(x, x\right)\right)\right), x\right), x\right) \]
    13. Applied egg-rr100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(-0.16666666666666666 \cdot \left(x \cdot x\right)\right) + x}, x\right) \]

    if 1.1000000000000001 < x

    1. Initial program 48.8%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(x \cdot \left(\left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(\left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right), x\right) \]
      2. associate--l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \left(\left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right), x\right) \]
      4. associate--l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\frac{\frac{1}{2}}{{x}^{2}} + \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      5. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\left(\frac{\frac{1}{2}}{{x}^{2}}\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      6. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \left({x}^{2}\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      7. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \left(x \cdot x\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      8. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      9. sub-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \left(\frac{\left|x\right|}{x} + \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      10. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\left(\frac{\left|x\right|}{x}\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      11. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\left(\left|x\right|\right), x\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      12. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      13. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{\frac{1}{8} \cdot 1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      14. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{\frac{1}{8}}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      15. distribute-neg-fracN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\mathsf{neg}\left(\frac{1}{8}\right)}{{x}^{4}}\right)\right)\right)\right)\right)\right), x\right) \]
      16. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{4}}\right)\right)\right)\right)\right)\right), x\right) \]
      17. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{\left(2 \cdot 2\right)}}\right)\right)\right)\right)\right)\right), x\right) \]
      18. pow-sqrN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{2} \cdot {x}^{2}}\right)\right)\right)\right)\right)\right), x\right) \]
      19. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \mathsf{/.f64}\left(\frac{-1}{8}, \left({x}^{2} \cdot {x}^{2}\right)\right)\right)\right)\right)\right)\right), x\right) \]
    7. Simplified99.1%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(x \cdot \left(1 + \left(\frac{0.5}{x \cdot x} + \left(\frac{\left|x\right|}{x} + \frac{-0.125}{x \cdot \left(x \cdot \left(x \cdot x\right)\right)}\right)\right)\right)\right)}, x\right) \]
    8. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{{x}^{3}}\right)}\right), x\right) \]
    9. Step-by-step derivation
      1. cube-multN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{x \cdot \left(x \cdot x\right)}\right)\right), x\right) \]
      2. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{x \cdot {x}^{2}}\right)\right), x\right) \]
      3. associate-/l/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      4. div-subN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{\frac{1}{2} \cdot {x}^{2}}{{x}^{2}} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      5. associate-/l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot \frac{{x}^{2}}{{x}^{2}} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      6. *-inversesN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot 1 - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      7. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      8. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{\frac{1}{8} \cdot 1}{{x}^{2}}}{x}\right)\right), x\right) \]
      9. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{1}{8} \cdot \frac{1}{{x}^{2}}}{x}\right)\right), x\right) \]
      10. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\left(\frac{1}{2} - \frac{1}{8} \cdot \frac{1}{{x}^{2}}\right), x\right)\right), x\right) \]
      11. sub-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\left(\frac{1}{2} + \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      12. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      13. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{\frac{1}{8} \cdot 1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      14. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{\frac{1}{8}}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      15. distribute-neg-fracN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\frac{\mathsf{neg}\left(\frac{1}{8}\right)}{{x}^{2}}\right)\right), x\right)\right), x\right) \]
      16. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\frac{\frac{-1}{8}}{{x}^{2}}\right)\right), x\right)\right), x\right) \]
      17. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \left({x}^{2}\right)\right)\right), x\right)\right), x\right) \]
      18. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \left(x \cdot x\right)\right)\right), x\right)\right), x\right) \]
      19. *-lowering-*.f6498.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \mathsf{*.f64}\left(x, x\right)\right)\right), x\right)\right), x\right) \]
    10. Simplified98.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right)}, x\right) \]
  3. Recombined 3 regimes into one program.
  4. Final simplification99.6%

    \[\leadsto \begin{array}{l} \mathbf{if}\;x \leq -1.3:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\left|x\right| - x\right), x\right)\\ \mathbf{elif}\;x \leq 1.1:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right), x\right)\\ \end{array} \]
  5. Add Preprocessing

Alternative 5: 82.1% accurate, 1.3× speedup?

\[\begin{array}{l} \\ \begin{array}{l} \mathbf{if}\;x \leq 0.88:\\ \;\;\;\;\mathsf{copysign}\left(\mathsf{log1p}\left(\left|x\right|\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right), x\right)\\ \end{array} \end{array} \]
(FPCore (x)
 :precision binary64
 (if (<= x 0.88)
   (copysign (log1p (fabs x)) x)
   (copysign (log (/ (+ 0.5 (/ -0.125 (* x x))) x)) x)))
double code(double x) {
	double tmp;
	if (x <= 0.88) {
		tmp = copysign(log1p(fabs(x)), x);
	} else {
		tmp = copysign(log(((0.5 + (-0.125 / (x * x))) / x)), x);
	}
	return tmp;
}
public static double code(double x) {
	double tmp;
	if (x <= 0.88) {
		tmp = Math.copySign(Math.log1p(Math.abs(x)), x);
	} else {
		tmp = Math.copySign(Math.log(((0.5 + (-0.125 / (x * x))) / x)), x);
	}
	return tmp;
}
def code(x):
	tmp = 0
	if x <= 0.88:
		tmp = math.copysign(math.log1p(math.fabs(x)), x)
	else:
		tmp = math.copysign(math.log(((0.5 + (-0.125 / (x * x))) / x)), x)
	return tmp
function code(x)
	tmp = 0.0
	if (x <= 0.88)
		tmp = copysign(log1p(abs(x)), x);
	else
		tmp = copysign(log(Float64(Float64(0.5 + Float64(-0.125 / Float64(x * x))) / x)), x);
	end
	return tmp
end
code[x_] := If[LessEqual[x, 0.88], N[With[{TMP1 = Abs[N[Log[1 + N[Abs[x], $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], N[With[{TMP1 = Abs[N[Log[N[(N[(0.5 + N[(-0.125 / N[(x * x), $MachinePrecision]), $MachinePrecision]), $MachinePrecision] / x), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]]
\begin{array}{l}

\\
\begin{array}{l}
\mathbf{if}\;x \leq 0.88:\\
\;\;\;\;\mathsf{copysign}\left(\mathsf{log1p}\left(\left|x\right|\right), x\right)\\

\mathbf{else}:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right), x\right)\\


\end{array}
\end{array}
Derivation
  1. Split input into 2 regimes
  2. if x < 0.880000000000000004

    1. Initial program 26.0%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f6443.2%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified43.2%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\log \left(1 + \left|x\right|\right)}, x\right) \]
    6. Step-by-step derivation
      1. log1p-defineN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\mathsf{log1p}\left(\left|x\right|\right)\right), x\right) \]
      2. log1p-lowering-log1p.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log1p.f64}\left(\left(\left|x\right|\right)\right), x\right) \]
      3. fabs-lowering-fabs.f6472.9%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log1p.f64}\left(\mathsf{fabs.f64}\left(x\right)\right), x\right) \]
    7. Simplified72.9%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{\mathsf{log1p}\left(\left|x\right|\right)}, x\right) \]

    if 0.880000000000000004 < x

    1. Initial program 48.8%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(x \cdot \left(\left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(\left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right), x\right) \]
      2. associate--l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \left(\left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right), x\right) \]
      4. associate--l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\frac{\frac{1}{2}}{{x}^{2}} + \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      5. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\left(\frac{\frac{1}{2}}{{x}^{2}}\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      6. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \left({x}^{2}\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      7. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \left(x \cdot x\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      8. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      9. sub-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \left(\frac{\left|x\right|}{x} + \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      10. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\left(\frac{\left|x\right|}{x}\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      11. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\left(\left|x\right|\right), x\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      12. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      13. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{\frac{1}{8} \cdot 1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      14. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{\frac{1}{8}}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      15. distribute-neg-fracN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\mathsf{neg}\left(\frac{1}{8}\right)}{{x}^{4}}\right)\right)\right)\right)\right)\right), x\right) \]
      16. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{4}}\right)\right)\right)\right)\right)\right), x\right) \]
      17. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{\left(2 \cdot 2\right)}}\right)\right)\right)\right)\right)\right), x\right) \]
      18. pow-sqrN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{2} \cdot {x}^{2}}\right)\right)\right)\right)\right)\right), x\right) \]
      19. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \mathsf{/.f64}\left(\frac{-1}{8}, \left({x}^{2} \cdot {x}^{2}\right)\right)\right)\right)\right)\right)\right), x\right) \]
    7. Simplified99.1%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(x \cdot \left(1 + \left(\frac{0.5}{x \cdot x} + \left(\frac{\left|x\right|}{x} + \frac{-0.125}{x \cdot \left(x \cdot \left(x \cdot x\right)\right)}\right)\right)\right)\right)}, x\right) \]
    8. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{{x}^{3}}\right)}\right), x\right) \]
    9. Step-by-step derivation
      1. cube-multN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{x \cdot \left(x \cdot x\right)}\right)\right), x\right) \]
      2. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{x \cdot {x}^{2}}\right)\right), x\right) \]
      3. associate-/l/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      4. div-subN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{\frac{1}{2} \cdot {x}^{2}}{{x}^{2}} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      5. associate-/l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot \frac{{x}^{2}}{{x}^{2}} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      6. *-inversesN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot 1 - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      7. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      8. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{\frac{1}{8} \cdot 1}{{x}^{2}}}{x}\right)\right), x\right) \]
      9. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{1}{8} \cdot \frac{1}{{x}^{2}}}{x}\right)\right), x\right) \]
      10. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\left(\frac{1}{2} - \frac{1}{8} \cdot \frac{1}{{x}^{2}}\right), x\right)\right), x\right) \]
      11. sub-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\left(\frac{1}{2} + \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      12. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      13. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{\frac{1}{8} \cdot 1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      14. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{\frac{1}{8}}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      15. distribute-neg-fracN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\frac{\mathsf{neg}\left(\frac{1}{8}\right)}{{x}^{2}}\right)\right), x\right)\right), x\right) \]
      16. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\frac{\frac{-1}{8}}{{x}^{2}}\right)\right), x\right)\right), x\right) \]
      17. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \left({x}^{2}\right)\right)\right), x\right)\right), x\right) \]
      18. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \left(x \cdot x\right)\right)\right), x\right)\right), x\right) \]
      19. *-lowering-*.f6498.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \mathsf{*.f64}\left(x, x\right)\right)\right), x\right)\right), x\right) \]
    10. Simplified98.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right)}, x\right) \]
  3. Recombined 2 regimes into one program.
  4. Add Preprocessing

Alternative 6: 83.0% accurate, 1.9× speedup?

\[\begin{array}{l} \\ \begin{array}{l} \mathbf{if}\;x \leq -1.95:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(0 - x\right), x\right)\\ \mathbf{elif}\;x \leq 1.1:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right), x\right)\\ \end{array} \end{array} \]
(FPCore (x)
 :precision binary64
 (if (<= x -1.95)
   (copysign (log (- 0.0 x)) x)
   (if (<= x 1.1)
     (copysign (+ x (* x (* (* x x) -0.16666666666666666))) x)
     (copysign (log (/ (+ 0.5 (/ -0.125 (* x x))) x)) x))))
double code(double x) {
	double tmp;
	if (x <= -1.95) {
		tmp = copysign(log((0.0 - x)), x);
	} else if (x <= 1.1) {
		tmp = copysign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = copysign(log(((0.5 + (-0.125 / (x * x))) / x)), x);
	}
	return tmp;
}
public static double code(double x) {
	double tmp;
	if (x <= -1.95) {
		tmp = Math.copySign(Math.log((0.0 - x)), x);
	} else if (x <= 1.1) {
		tmp = Math.copySign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = Math.copySign(Math.log(((0.5 + (-0.125 / (x * x))) / x)), x);
	}
	return tmp;
}
def code(x):
	tmp = 0
	if x <= -1.95:
		tmp = math.copysign(math.log((0.0 - x)), x)
	elif x <= 1.1:
		tmp = math.copysign((x + (x * ((x * x) * -0.16666666666666666))), x)
	else:
		tmp = math.copysign(math.log(((0.5 + (-0.125 / (x * x))) / x)), x)
	return tmp
function code(x)
	tmp = 0.0
	if (x <= -1.95)
		tmp = copysign(log(Float64(0.0 - x)), x);
	elseif (x <= 1.1)
		tmp = copysign(Float64(x + Float64(x * Float64(Float64(x * x) * -0.16666666666666666))), x);
	else
		tmp = copysign(log(Float64(Float64(0.5 + Float64(-0.125 / Float64(x * x))) / x)), x);
	end
	return tmp
end
function tmp_2 = code(x)
	tmp = 0.0;
	if (x <= -1.95)
		tmp = sign(x) * abs(log((0.0 - x)));
	elseif (x <= 1.1)
		tmp = sign(x) * abs((x + (x * ((x * x) * -0.16666666666666666))));
	else
		tmp = sign(x) * abs(log(((0.5 + (-0.125 / (x * x))) / x)));
	end
	tmp_2 = tmp;
end
code[x_] := If[LessEqual[x, -1.95], N[With[{TMP1 = Abs[N[Log[N[(0.0 - x), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], If[LessEqual[x, 1.1], N[With[{TMP1 = Abs[N[(x + N[(x * N[(N[(x * x), $MachinePrecision] * -0.16666666666666666), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], N[With[{TMP1 = Abs[N[Log[N[(N[(0.5 + N[(-0.125 / N[(x * x), $MachinePrecision]), $MachinePrecision]), $MachinePrecision] / x), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]]]
\begin{array}{l}

\\
\begin{array}{l}
\mathbf{if}\;x \leq -1.95:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(0 - x\right), x\right)\\

\mathbf{elif}\;x \leq 1.1:\\
\;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\

\mathbf{else}:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right), x\right)\\


\end{array}
\end{array}
Derivation
  1. Split input into 3 regimes
  2. if x < -1.94999999999999996

    1. Initial program 53.7%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around -inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(-1 \cdot x\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\mathsf{neg}\left(x\right)\right)\right), x\right) \]
      2. neg-sub0N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - x\right)\right), x\right) \]
      3. --lowering--.f6431.4%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(0, x\right)\right), x\right) \]
    7. Simplified31.4%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(0 - x\right)}, x\right) \]
    8. Step-by-step derivation
      1. sub0-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\mathsf{neg}\left(x\right)\right)\right), x\right) \]
      2. neg-lowering-neg.f6431.4%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{neg.f64}\left(x\right)\right), x\right) \]
    9. Applied egg-rr31.4%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(-x\right)}, x\right) \]

    if -1.94999999999999996 < x < 1.1000000000000001

    1. Initial program 9.6%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified9.7%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(1 + \left(\left|x\right| + \frac{1}{2} \cdot {x}^{2}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. associate-+r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(1 + \left|x\right|\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\left|x\right| + 1\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      3. associate-+l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      5. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      6. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\frac{1}{2} \cdot {x}^{2}\right)\right)\right)\right), x\right) \]
      7. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      8. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      9. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      10. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      11. *-lowering-*.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
    7. Simplified9.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\left|x\right| + \left(1 + x \cdot \left(x \cdot 0.5\right)\right)\right)}, x\right) \]
    8. Applied egg-rr6.6%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\frac{1 + x \cdot \left(x \cdot x\right)}{1 + \frac{\left(x \cdot x\right) \cdot \left(x \cdot \left(x \cdot \left(x \cdot x\right)\right)\right) - x \cdot \left(x \cdot x\right)}{x \cdot \left(x \cdot \left(x \cdot x\right)\right) + \left(x \cdot x + x \cdot \left(x \cdot x\right)\right)}} + 0.5 \cdot \left(x \cdot x\right)\right), x\right)} \]
    9. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\left(x \cdot \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right)}, x\right) \]
    10. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\frac{-1}{6} \cdot {x}^{2}\right)\right)\right), x\right) \]
      3. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      4. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      5. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      7. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{-1}{6}\right)\right)\right)\right), x\right) \]
    11. Simplified100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(1 + x \cdot \left(x \cdot -0.16666666666666666\right)\right)}, x\right) \]
    12. Step-by-step derivation
      1. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right) + 1\right)\right), x\right) \]
      2. distribute-rgt-inN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + 1 \cdot x\right), x\right) \]
      3. *-lft-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + x\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x\right), x\right), x\right) \]
      5. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      7. associate-*r*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right), x\right), x\right) \]
      8. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\frac{-1}{6} \cdot \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      9. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      10. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \mathsf{*.f64}\left(x, x\right)\right)\right), x\right), x\right) \]
    13. Applied egg-rr100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(-0.16666666666666666 \cdot \left(x \cdot x\right)\right) + x}, x\right) \]

    if 1.1000000000000001 < x

    1. Initial program 48.8%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(x \cdot \left(\left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(\left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right), x\right) \]
      2. associate--l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \left(\left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right), x\right) \]
      4. associate--l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\frac{\frac{1}{2}}{{x}^{2}} + \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      5. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\left(\frac{\frac{1}{2}}{{x}^{2}}\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      6. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \left({x}^{2}\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      7. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \left(x \cdot x\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      8. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      9. sub-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \left(\frac{\left|x\right|}{x} + \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      10. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\left(\frac{\left|x\right|}{x}\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      11. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\left(\left|x\right|\right), x\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      12. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      13. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{\frac{1}{8} \cdot 1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      14. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{\frac{1}{8}}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      15. distribute-neg-fracN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\mathsf{neg}\left(\frac{1}{8}\right)}{{x}^{4}}\right)\right)\right)\right)\right)\right), x\right) \]
      16. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{4}}\right)\right)\right)\right)\right)\right), x\right) \]
      17. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{\left(2 \cdot 2\right)}}\right)\right)\right)\right)\right)\right), x\right) \]
      18. pow-sqrN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{2} \cdot {x}^{2}}\right)\right)\right)\right)\right)\right), x\right) \]
      19. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \mathsf{/.f64}\left(\frac{-1}{8}, \left({x}^{2} \cdot {x}^{2}\right)\right)\right)\right)\right)\right)\right), x\right) \]
    7. Simplified99.1%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(x \cdot \left(1 + \left(\frac{0.5}{x \cdot x} + \left(\frac{\left|x\right|}{x} + \frac{-0.125}{x \cdot \left(x \cdot \left(x \cdot x\right)\right)}\right)\right)\right)\right)}, x\right) \]
    8. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{{x}^{3}}\right)}\right), x\right) \]
    9. Step-by-step derivation
      1. cube-multN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{x \cdot \left(x \cdot x\right)}\right)\right), x\right) \]
      2. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{x \cdot {x}^{2}}\right)\right), x\right) \]
      3. associate-/l/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      4. div-subN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{\frac{1}{2} \cdot {x}^{2}}{{x}^{2}} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      5. associate-/l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot \frac{{x}^{2}}{{x}^{2}} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      6. *-inversesN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot 1 - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      7. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      8. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{\frac{1}{8} \cdot 1}{{x}^{2}}}{x}\right)\right), x\right) \]
      9. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{1}{8} \cdot \frac{1}{{x}^{2}}}{x}\right)\right), x\right) \]
      10. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\left(\frac{1}{2} - \frac{1}{8} \cdot \frac{1}{{x}^{2}}\right), x\right)\right), x\right) \]
      11. sub-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\left(\frac{1}{2} + \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      12. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      13. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{\frac{1}{8} \cdot 1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      14. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{\frac{1}{8}}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      15. distribute-neg-fracN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\frac{\mathsf{neg}\left(\frac{1}{8}\right)}{{x}^{2}}\right)\right), x\right)\right), x\right) \]
      16. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\frac{\frac{-1}{8}}{{x}^{2}}\right)\right), x\right)\right), x\right) \]
      17. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \left({x}^{2}\right)\right)\right), x\right)\right), x\right) \]
      18. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \left(x \cdot x\right)\right)\right), x\right)\right), x\right) \]
      19. *-lowering-*.f6498.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \mathsf{*.f64}\left(x, x\right)\right)\right), x\right)\right), x\right) \]
    10. Simplified98.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right)}, x\right) \]
  3. Recombined 3 regimes into one program.
  4. Final simplification81.2%

    \[\leadsto \begin{array}{l} \mathbf{if}\;x \leq -1.95:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(0 - x\right), x\right)\\ \mathbf{elif}\;x \leq 1.1:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right), x\right)\\ \end{array} \]
  5. Add Preprocessing

Alternative 7: 82.9% accurate, 1.9× speedup?

\[\begin{array}{l} \\ \begin{array}{l} \mathbf{if}\;x \leq -1.95:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(0 - x\right), x\right)\\ \mathbf{elif}\;x \leq 1.25:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\frac{0.5}{x}\right), x\right)\\ \end{array} \end{array} \]
(FPCore (x)
 :precision binary64
 (if (<= x -1.95)
   (copysign (log (- 0.0 x)) x)
   (if (<= x 1.25)
     (copysign (+ x (* x (* (* x x) -0.16666666666666666))) x)
     (copysign (log (/ 0.5 x)) x))))
double code(double x) {
	double tmp;
	if (x <= -1.95) {
		tmp = copysign(log((0.0 - x)), x);
	} else if (x <= 1.25) {
		tmp = copysign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = copysign(log((0.5 / x)), x);
	}
	return tmp;
}
public static double code(double x) {
	double tmp;
	if (x <= -1.95) {
		tmp = Math.copySign(Math.log((0.0 - x)), x);
	} else if (x <= 1.25) {
		tmp = Math.copySign((x + (x * ((x * x) * -0.16666666666666666))), x);
	} else {
		tmp = Math.copySign(Math.log((0.5 / x)), x);
	}
	return tmp;
}
def code(x):
	tmp = 0
	if x <= -1.95:
		tmp = math.copysign(math.log((0.0 - x)), x)
	elif x <= 1.25:
		tmp = math.copysign((x + (x * ((x * x) * -0.16666666666666666))), x)
	else:
		tmp = math.copysign(math.log((0.5 / x)), x)
	return tmp
function code(x)
	tmp = 0.0
	if (x <= -1.95)
		tmp = copysign(log(Float64(0.0 - x)), x);
	elseif (x <= 1.25)
		tmp = copysign(Float64(x + Float64(x * Float64(Float64(x * x) * -0.16666666666666666))), x);
	else
		tmp = copysign(log(Float64(0.5 / x)), x);
	end
	return tmp
end
function tmp_2 = code(x)
	tmp = 0.0;
	if (x <= -1.95)
		tmp = sign(x) * abs(log((0.0 - x)));
	elseif (x <= 1.25)
		tmp = sign(x) * abs((x + (x * ((x * x) * -0.16666666666666666))));
	else
		tmp = sign(x) * abs(log((0.5 / x)));
	end
	tmp_2 = tmp;
end
code[x_] := If[LessEqual[x, -1.95], N[With[{TMP1 = Abs[N[Log[N[(0.0 - x), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], If[LessEqual[x, 1.25], N[With[{TMP1 = Abs[N[(x + N[(x * N[(N[(x * x), $MachinePrecision] * -0.16666666666666666), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], N[With[{TMP1 = Abs[N[Log[N[(0.5 / x), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]]]
\begin{array}{l}

\\
\begin{array}{l}
\mathbf{if}\;x \leq -1.95:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(0 - x\right), x\right)\\

\mathbf{elif}\;x \leq 1.25:\\
\;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\

\mathbf{else}:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(\frac{0.5}{x}\right), x\right)\\


\end{array}
\end{array}
Derivation
  1. Split input into 3 regimes
  2. if x < -1.94999999999999996

    1. Initial program 53.7%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around -inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(-1 \cdot x\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\mathsf{neg}\left(x\right)\right)\right), x\right) \]
      2. neg-sub0N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - x\right)\right), x\right) \]
      3. --lowering--.f6431.4%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(0, x\right)\right), x\right) \]
    7. Simplified31.4%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(0 - x\right)}, x\right) \]
    8. Step-by-step derivation
      1. sub0-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\mathsf{neg}\left(x\right)\right)\right), x\right) \]
      2. neg-lowering-neg.f6431.4%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{neg.f64}\left(x\right)\right), x\right) \]
    9. Applied egg-rr31.4%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(-x\right)}, x\right) \]

    if -1.94999999999999996 < x < 1.25

    1. Initial program 9.6%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified9.7%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(1 + \left(\left|x\right| + \frac{1}{2} \cdot {x}^{2}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. associate-+r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(1 + \left|x\right|\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\left|x\right| + 1\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      3. associate-+l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      5. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      6. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\frac{1}{2} \cdot {x}^{2}\right)\right)\right)\right), x\right) \]
      7. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      8. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      9. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      10. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      11. *-lowering-*.f649.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
    7. Simplified9.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\left|x\right| + \left(1 + x \cdot \left(x \cdot 0.5\right)\right)\right)}, x\right) \]
    8. Applied egg-rr6.6%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\frac{1 + x \cdot \left(x \cdot x\right)}{1 + \frac{\left(x \cdot x\right) \cdot \left(x \cdot \left(x \cdot \left(x \cdot x\right)\right)\right) - x \cdot \left(x \cdot x\right)}{x \cdot \left(x \cdot \left(x \cdot x\right)\right) + \left(x \cdot x + x \cdot \left(x \cdot x\right)\right)}} + 0.5 \cdot \left(x \cdot x\right)\right), x\right)} \]
    9. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\left(x \cdot \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right)}, x\right) \]
    10. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \frac{-1}{6} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\frac{-1}{6} \cdot {x}^{2}\right)\right)\right), x\right) \]
      3. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      4. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right)\right), x\right) \]
      5. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{-1}{6}\right)\right)\right)\right), x\right) \]
      7. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{-1}{6}\right)\right)\right)\right), x\right) \]
    11. Simplified100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(1 + x \cdot \left(x \cdot -0.16666666666666666\right)\right)}, x\right) \]
    12. Step-by-step derivation
      1. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right) + 1\right)\right), x\right) \]
      2. distribute-rgt-inN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + 1 \cdot x\right), x\right) \]
      3. *-lft-identityN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x + x\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(\left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right) \cdot x\right), x\right), x\right) \]
      5. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\left(x \cdot \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(x \cdot \left(x \cdot \frac{-1}{6}\right)\right)\right), x\right), x\right) \]
      7. associate-*r*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\left(x \cdot x\right) \cdot \frac{-1}{6}\right)\right), x\right), x\right) \]
      8. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \left(\frac{-1}{6} \cdot \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      9. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \left(x \cdot x\right)\right)\right), x\right), x\right) \]
      10. *-lowering-*.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{+.f64}\left(\mathsf{*.f64}\left(x, \mathsf{*.f64}\left(\frac{-1}{6}, \mathsf{*.f64}\left(x, x\right)\right)\right), x\right), x\right) \]
    13. Applied egg-rr100.0%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(-0.16666666666666666 \cdot \left(x \cdot x\right)\right) + x}, x\right) \]

    if 1.25 < x

    1. Initial program 48.8%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(x \cdot \left(\left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(\left(1 + \left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right)\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right), x\right) \]
      2. associate--l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \left(1 + \left(\left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(\frac{\frac{1}{2}}{{x}^{2}} + \frac{\left|x\right|}{x}\right) - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right), x\right) \]
      4. associate--l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\frac{\frac{1}{2}}{{x}^{2}} + \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      5. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\left(\frac{\frac{1}{2}}{{x}^{2}}\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      6. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \left({x}^{2}\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      7. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \left(x \cdot x\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      8. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \left(\frac{\left|x\right|}{x} - \frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right), x\right) \]
      9. sub-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \left(\frac{\left|x\right|}{x} + \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      10. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\left(\frac{\left|x\right|}{x}\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      11. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\left(\left|x\right|\right), x\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      12. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      13. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{\frac{1}{8} \cdot 1}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      14. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\mathsf{neg}\left(\frac{\frac{1}{8}}{{x}^{4}}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      15. distribute-neg-fracN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\mathsf{neg}\left(\frac{1}{8}\right)}{{x}^{4}}\right)\right)\right)\right)\right)\right), x\right) \]
      16. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{4}}\right)\right)\right)\right)\right)\right), x\right) \]
      17. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{\left(2 \cdot 2\right)}}\right)\right)\right)\right)\right)\right), x\right) \]
      18. pow-sqrN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \left(\frac{\frac{-1}{8}}{{x}^{2} \cdot {x}^{2}}\right)\right)\right)\right)\right)\right), x\right) \]
      19. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{+.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, \mathsf{*.f64}\left(x, x\right)\right), \mathsf{+.f64}\left(\mathsf{/.f64}\left(\mathsf{fabs.f64}\left(x\right), x\right), \mathsf{/.f64}\left(\frac{-1}{8}, \left({x}^{2} \cdot {x}^{2}\right)\right)\right)\right)\right)\right)\right), x\right) \]
    7. Simplified99.1%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(x \cdot \left(1 + \left(\frac{0.5}{x \cdot x} + \left(\frac{\left|x\right|}{x} + \frac{-0.125}{x \cdot \left(x \cdot \left(x \cdot x\right)\right)}\right)\right)\right)\right)}, x\right) \]
    8. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{{x}^{3}}\right)}\right), x\right) \]
    9. Step-by-step derivation
      1. cube-multN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{x \cdot \left(x \cdot x\right)}\right)\right), x\right) \]
      2. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{x \cdot {x}^{2}}\right)\right), x\right) \]
      3. associate-/l/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{\frac{1}{2} \cdot {x}^{2} - \frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      4. div-subN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{\frac{1}{2} \cdot {x}^{2}}{{x}^{2}} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      5. associate-/l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot \frac{{x}^{2}}{{x}^{2}} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      6. *-inversesN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} \cdot 1 - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      7. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{\frac{1}{8}}{{x}^{2}}}{x}\right)\right), x\right) \]
      8. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{\frac{1}{8} \cdot 1}{{x}^{2}}}{x}\right)\right), x\right) \]
      9. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\frac{\frac{1}{2} - \frac{1}{8} \cdot \frac{1}{{x}^{2}}}{x}\right)\right), x\right) \]
      10. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\left(\frac{1}{2} - \frac{1}{8} \cdot \frac{1}{{x}^{2}}\right), x\right)\right), x\right) \]
      11. sub-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\left(\frac{1}{2} + \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      12. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{1}{8} \cdot \frac{1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      13. associate-*r/N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{\frac{1}{8} \cdot 1}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      14. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\mathsf{neg}\left(\frac{\frac{1}{8}}{{x}^{2}}\right)\right)\right), x\right)\right), x\right) \]
      15. distribute-neg-fracN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\frac{\mathsf{neg}\left(\frac{1}{8}\right)}{{x}^{2}}\right)\right), x\right)\right), x\right) \]
      16. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \left(\frac{\frac{-1}{8}}{{x}^{2}}\right)\right), x\right)\right), x\right) \]
      17. /-lowering-/.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \left({x}^{2}\right)\right)\right), x\right)\right), x\right) \]
      18. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \left(x \cdot x\right)\right)\right), x\right)\right), x\right) \]
      19. *-lowering-*.f6498.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\mathsf{+.f64}\left(\frac{1}{2}, \mathsf{/.f64}\left(\frac{-1}{8}, \mathsf{*.f64}\left(x, x\right)\right)\right), x\right)\right), x\right) \]
    10. Simplified98.7%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\frac{0.5 + \frac{-0.125}{x \cdot x}}{x}\right)}, x\right) \]
    11. Taylor expanded in x around inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(\frac{\frac{1}{2}}{x}\right)}\right), x\right) \]
    12. Step-by-step derivation
      1. /-lowering-/.f6497.8%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{/.f64}\left(\frac{1}{2}, x\right)\right), x\right) \]
    13. Simplified97.8%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\frac{0.5}{x}\right)}, x\right) \]
  3. Recombined 3 regimes into one program.
  4. Final simplification80.9%

    \[\leadsto \begin{array}{l} \mathbf{if}\;x \leq -1.95:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(0 - x\right), x\right)\\ \mathbf{elif}\;x \leq 1.25:\\ \;\;\;\;\mathsf{copysign}\left(x + x \cdot \left(\left(x \cdot x\right) \cdot -0.16666666666666666\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(\frac{0.5}{x}\right), x\right)\\ \end{array} \]
  5. Add Preprocessing

Alternative 8: 65.5% accurate, 1.9× speedup?

\[\begin{array}{l} \\ \begin{array}{l} \mathbf{if}\;x \leq -2:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(0 - x\right), x\right)\\ \mathbf{elif}\;x \leq 3:\\ \;\;\;\;\mathsf{copysign}\left(x \cdot \left(1 + x \cdot \left(x \cdot \left(-0.16666666666666666 + x \cdot \left(0.125 + x \cdot -0.05\right)\right)\right)\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log x, x\right)\\ \end{array} \end{array} \]
(FPCore (x)
 :precision binary64
 (if (<= x -2.0)
   (copysign (log (- 0.0 x)) x)
   (if (<= x 3.0)
     (copysign
      (*
       x
       (+
        1.0
        (* x (* x (+ -0.16666666666666666 (* x (+ 0.125 (* x -0.05))))))))
      x)
     (copysign (log x) x))))
double code(double x) {
	double tmp;
	if (x <= -2.0) {
		tmp = copysign(log((0.0 - x)), x);
	} else if (x <= 3.0) {
		tmp = copysign((x * (1.0 + (x * (x * (-0.16666666666666666 + (x * (0.125 + (x * -0.05)))))))), x);
	} else {
		tmp = copysign(log(x), x);
	}
	return tmp;
}
public static double code(double x) {
	double tmp;
	if (x <= -2.0) {
		tmp = Math.copySign(Math.log((0.0 - x)), x);
	} else if (x <= 3.0) {
		tmp = Math.copySign((x * (1.0 + (x * (x * (-0.16666666666666666 + (x * (0.125 + (x * -0.05)))))))), x);
	} else {
		tmp = Math.copySign(Math.log(x), x);
	}
	return tmp;
}
def code(x):
	tmp = 0
	if x <= -2.0:
		tmp = math.copysign(math.log((0.0 - x)), x)
	elif x <= 3.0:
		tmp = math.copysign((x * (1.0 + (x * (x * (-0.16666666666666666 + (x * (0.125 + (x * -0.05)))))))), x)
	else:
		tmp = math.copysign(math.log(x), x)
	return tmp
function code(x)
	tmp = 0.0
	if (x <= -2.0)
		tmp = copysign(log(Float64(0.0 - x)), x);
	elseif (x <= 3.0)
		tmp = copysign(Float64(x * Float64(1.0 + Float64(x * Float64(x * Float64(-0.16666666666666666 + Float64(x * Float64(0.125 + Float64(x * -0.05)))))))), x);
	else
		tmp = copysign(log(x), x);
	end
	return tmp
end
function tmp_2 = code(x)
	tmp = 0.0;
	if (x <= -2.0)
		tmp = sign(x) * abs(log((0.0 - x)));
	elseif (x <= 3.0)
		tmp = sign(x) * abs((x * (1.0 + (x * (x * (-0.16666666666666666 + (x * (0.125 + (x * -0.05)))))))));
	else
		tmp = sign(x) * abs(log(x));
	end
	tmp_2 = tmp;
end
code[x_] := If[LessEqual[x, -2.0], N[With[{TMP1 = Abs[N[Log[N[(0.0 - x), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], If[LessEqual[x, 3.0], N[With[{TMP1 = Abs[N[(x * N[(1.0 + N[(x * N[(x * N[(-0.16666666666666666 + N[(x * N[(0.125 + N[(x * -0.05), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], N[With[{TMP1 = Abs[N[Log[x], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]]]
\begin{array}{l}

\\
\begin{array}{l}
\mathbf{if}\;x \leq -2:\\
\;\;\;\;\mathsf{copysign}\left(\log \left(0 - x\right), x\right)\\

\mathbf{elif}\;x \leq 3:\\
\;\;\;\;\mathsf{copysign}\left(x \cdot \left(1 + x \cdot \left(x \cdot \left(-0.16666666666666666 + x \cdot \left(0.125 + x \cdot -0.05\right)\right)\right)\right), x\right)\\

\mathbf{else}:\\
\;\;\;\;\mathsf{copysign}\left(\log x, x\right)\\


\end{array}
\end{array}
Derivation
  1. Split input into 3 regimes
  2. if x < -2

    1. Initial program 53.7%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around -inf

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(-1 \cdot x\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\mathsf{neg}\left(x\right)\right)\right), x\right) \]
      2. neg-sub0N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(0 - x\right)\right), x\right) \]
      3. --lowering--.f6431.4%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{\_.f64}\left(0, x\right)\right), x\right) \]
    7. Simplified31.4%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(0 - x\right)}, x\right) \]
    8. Step-by-step derivation
      1. sub0-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\mathsf{neg}\left(x\right)\right)\right), x\right) \]
      2. neg-lowering-neg.f6431.4%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{neg.f64}\left(x\right)\right), x\right) \]
    9. Applied egg-rr31.4%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(-x\right)}, x\right) \]

    if -2 < x < 3

    1. Initial program 10.4%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f6410.5%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified10.5%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\color{blue}{\left(1 + \left(\left|x\right| + \frac{1}{2} \cdot {x}^{2}\right)\right)}\right), x\right) \]
    6. Step-by-step derivation
      1. associate-+r+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(1 + \left|x\right|\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      2. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left(\left|x\right| + 1\right) + \frac{1}{2} \cdot {x}^{2}\right)\right), x\right) \]
      3. associate-+l+N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      4. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      5. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(1 + \frac{1}{2} \cdot {x}^{2}\right)\right)\right), x\right) \]
      6. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\frac{1}{2} \cdot {x}^{2}\right)\right)\right)\right), x\right) \]
      7. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      8. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \frac{1}{2}\right)\right)\right)\right), x\right) \]
      9. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      10. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
      11. *-lowering-*.f649.8%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \frac{1}{2}\right)\right)\right)\right)\right), x\right) \]
    7. Simplified9.8%

      \[\leadsto \mathsf{copysign}\left(\log \color{blue}{\left(\left|x\right| + \left(1 + x \cdot \left(x \cdot 0.5\right)\right)\right)}, x\right) \]
    8. Applied egg-rr6.7%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\frac{1 + x \cdot \left(x \cdot x\right)}{1 + \frac{\left(x \cdot x\right) \cdot \left(x \cdot \left(x \cdot \left(x \cdot x\right)\right)\right) - x \cdot \left(x \cdot x\right)}{x \cdot \left(x \cdot \left(x \cdot x\right)\right) + \left(x \cdot x + x \cdot \left(x \cdot x\right)\right)}} + 0.5 \cdot \left(x \cdot x\right)\right), x\right)} \]
    9. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\left(x \cdot \left(1 + {x}^{2} \cdot \left(x \cdot \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right) - \frac{1}{6}\right)\right)\right)}, x\right) \]
    10. Step-by-step derivation
      1. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \left(1 + {x}^{2} \cdot \left(x \cdot \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right) - \frac{1}{6}\right)\right)\right), x\right) \]
      2. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left({x}^{2} \cdot \left(x \cdot \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right) - \frac{1}{6}\right)\right)\right)\right), x\right) \]
      3. unpow2N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(\left(x \cdot x\right) \cdot \left(x \cdot \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right) - \frac{1}{6}\right)\right)\right)\right), x\right) \]
      4. associate-*l*N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \left(x \cdot \left(x \cdot \left(x \cdot \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right) - \frac{1}{6}\right)\right)\right)\right)\right), x\right) \]
      5. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \left(x \cdot \left(x \cdot \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right) - \frac{1}{6}\right)\right)\right)\right)\right), x\right) \]
      6. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \left(x \cdot \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right) - \frac{1}{6}\right)\right)\right)\right)\right), x\right) \]
      7. sub-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \left(x \cdot \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right) + \left(\mathsf{neg}\left(\frac{1}{6}\right)\right)\right)\right)\right)\right)\right), x\right) \]
      8. metadata-evalN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \left(x \cdot \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right) + \frac{-1}{6}\right)\right)\right)\right)\right), x\right) \]
      9. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \left(\frac{-1}{6} + x \cdot \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right)\right)\right)\right)\right)\right), x\right) \]
      10. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\frac{-1}{6}, \left(x \cdot \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right)\right)\right)\right)\right)\right)\right), x\right) \]
      11. *-lowering-*.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\frac{-1}{6}, \mathsf{*.f64}\left(x, \left(\frac{1}{8} + \frac{-1}{20} \cdot x\right)\right)\right)\right)\right)\right)\right), x\right) \]
      12. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\frac{-1}{6}, \mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\frac{1}{8}, \left(\frac{-1}{20} \cdot x\right)\right)\right)\right)\right)\right)\right)\right), x\right) \]
      13. *-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\frac{-1}{6}, \mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\frac{1}{8}, \left(x \cdot \frac{-1}{20}\right)\right)\right)\right)\right)\right)\right)\right), x\right) \]
      14. *-lowering-*.f6499.3%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{*.f64}\left(x, \mathsf{+.f64}\left(1, \mathsf{*.f64}\left(x, \mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\frac{-1}{6}, \mathsf{*.f64}\left(x, \mathsf{+.f64}\left(\frac{1}{8}, \mathsf{*.f64}\left(x, \frac{-1}{20}\right)\right)\right)\right)\right)\right)\right)\right), x\right) \]
    11. Simplified99.3%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{x \cdot \left(1 + x \cdot \left(x \cdot \left(-0.16666666666666666 + x \cdot \left(0.125 + x \cdot -0.05\right)\right)\right)\right)}, x\right) \]

    if 3 < x

    1. Initial program 48.1%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f64100.0%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified100.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around inf

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\left(-1 \cdot \log \left(\frac{1}{x}\right)\right)}, x\right) \]
    6. Step-by-step derivation
      1. mul-1-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\mathsf{neg}\left(\log \left(\frac{1}{x}\right)\right)\right), x\right) \]
      2. log-recN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\mathsf{neg}\left(\left(\mathsf{neg}\left(\log x\right)\right)\right)\right), x\right) \]
      3. remove-double-negN/A

        \[\leadsto \mathsf{copysign.f64}\left(\log x, x\right) \]
      4. log-lowering-log.f6431.4%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(x\right), x\right) \]
    7. Simplified31.4%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{\log x}, x\right) \]
  3. Recombined 3 regimes into one program.
  4. Final simplification62.7%

    \[\leadsto \begin{array}{l} \mathbf{if}\;x \leq -2:\\ \;\;\;\;\mathsf{copysign}\left(\log \left(0 - x\right), x\right)\\ \mathbf{elif}\;x \leq 3:\\ \;\;\;\;\mathsf{copysign}\left(x \cdot \left(1 + x \cdot \left(x \cdot \left(-0.16666666666666666 + x \cdot \left(0.125 + x \cdot -0.05\right)\right)\right)\right), x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log x, x\right)\\ \end{array} \]
  5. Add Preprocessing

Alternative 9: 59.0% accurate, 2.0× speedup?

\[\begin{array}{l} \\ \begin{array}{l} \mathbf{if}\;x \leq 3.2:\\ \;\;\;\;\mathsf{copysign}\left(x, x\right)\\ \mathbf{else}:\\ \;\;\;\;\mathsf{copysign}\left(\log x, x\right)\\ \end{array} \end{array} \]
(FPCore (x)
 :precision binary64
 (if (<= x 3.2) (copysign x x) (copysign (log x) x)))
double code(double x) {
	double tmp;
	if (x <= 3.2) {
		tmp = copysign(x, x);
	} else {
		tmp = copysign(log(x), x);
	}
	return tmp;
}
public static double code(double x) {
	double tmp;
	if (x <= 3.2) {
		tmp = Math.copySign(x, x);
	} else {
		tmp = Math.copySign(Math.log(x), x);
	}
	return tmp;
}
def code(x):
	tmp = 0
	if x <= 3.2:
		tmp = math.copysign(x, x)
	else:
		tmp = math.copysign(math.log(x), x)
	return tmp
function code(x)
	tmp = 0.0
	if (x <= 3.2)
		tmp = copysign(x, x);
	else
		tmp = copysign(log(x), x);
	end
	return tmp
end
function tmp_2 = code(x)
	tmp = 0.0;
	if (x <= 3.2)
		tmp = sign(x) * abs(x);
	else
		tmp = sign(x) * abs(log(x));
	end
	tmp_2 = tmp;
end
code[x_] := If[LessEqual[x, 3.2], N[With[{TMP1 = Abs[x], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision], N[With[{TMP1 = Abs[N[Log[x], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]]
\begin{array}{l}

\\
\begin{array}{l}
\mathbf{if}\;x \leq 3.2:\\
\;\;\;\;\mathsf{copysign}\left(x, x\right)\\

\mathbf{else}:\\
\;\;\;\;\mathsf{copysign}\left(\log x, x\right)\\


\end{array}
\end{array}
Derivation
  1. Split input into 2 regimes
  2. if x < 3.2000000000000002

    1. Initial program 26.4%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f6443.5%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified43.5%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\log \left(1 + \left|x\right|\right)}, x\right) \]
    6. Step-by-step derivation
      1. log1p-defineN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\mathsf{log1p}\left(\left|x\right|\right)\right), x\right) \]
      2. log1p-lowering-log1p.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log1p.f64}\left(\left(\left|x\right|\right)\right), x\right) \]
      3. fabs-lowering-fabs.f6472.6%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log1p.f64}\left(\mathsf{fabs.f64}\left(x\right)\right), x\right) \]
    7. Simplified72.6%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{\mathsf{log1p}\left(\left|x\right|\right)}, x\right) \]
    8. Applied egg-rr4.0%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\frac{1 + x \cdot \left(x \cdot x\right)}{1 + \frac{\left(x \cdot x\right) \cdot \left(x \cdot \left(x \cdot \left(x \cdot x\right)\right)\right) - x \cdot \left(x \cdot x\right)}{x \cdot \left(x \cdot \left(x \cdot x\right)\right) + \left(x \cdot x + x \cdot \left(x \cdot x\right)\right)}}\right), x\right)} \]
    9. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{x}, x\right) \]
    10. Step-by-step derivation
      1. Simplified64.4%

        \[\leadsto \mathsf{copysign}\left(\color{blue}{x}, x\right) \]

      if 3.2000000000000002 < x

      1. Initial program 48.1%

        \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
      2. Step-by-step derivation
        1. copysign-lowering-copysign.f64N/A

          \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
        2. log-lowering-log.f64N/A

          \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
        3. +-lowering-+.f64N/A

          \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
        4. fabs-lowering-fabs.f64N/A

          \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
        5. +-commutativeN/A

          \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
        6. hypot-1-defN/A

          \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
        7. hypot-lowering-hypot.f64100.0%

          \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
      3. Simplified100.0%

        \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
      4. Add Preprocessing
      5. Taylor expanded in x around inf

        \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\left(-1 \cdot \log \left(\frac{1}{x}\right)\right)}, x\right) \]
      6. Step-by-step derivation
        1. mul-1-negN/A

          \[\leadsto \mathsf{copysign.f64}\left(\left(\mathsf{neg}\left(\log \left(\frac{1}{x}\right)\right)\right), x\right) \]
        2. log-recN/A

          \[\leadsto \mathsf{copysign.f64}\left(\left(\mathsf{neg}\left(\left(\mathsf{neg}\left(\log x\right)\right)\right)\right), x\right) \]
        3. remove-double-negN/A

          \[\leadsto \mathsf{copysign.f64}\left(\log x, x\right) \]
        4. log-lowering-log.f6431.4%

          \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(x\right), x\right) \]
      7. Simplified31.4%

        \[\leadsto \mathsf{copysign}\left(\color{blue}{\log x}, x\right) \]
    11. Recombined 2 regimes into one program.
    12. Add Preprocessing

    Alternative 10: 52.4% accurate, 4.0× speedup?

    \[\begin{array}{l} \\ \mathsf{copysign}\left(x, x\right) \end{array} \]
    (FPCore (x) :precision binary64 (copysign x x))
    double code(double x) {
    	return copysign(x, x);
    }
    
    public static double code(double x) {
    	return Math.copySign(x, x);
    }
    
    def code(x):
    	return math.copysign(x, x)
    
    function code(x)
    	return copysign(x, x)
    end
    
    function tmp = code(x)
    	tmp = sign(x) * abs(x);
    end
    
    code[x_] := N[With[{TMP1 = Abs[x], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]
    
    \begin{array}{l}
    
    \\
    \mathsf{copysign}\left(x, x\right)
    \end{array}
    
    Derivation
    1. Initial program 32.2%

      \[\mathsf{copysign}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), x\right) \]
    2. Step-by-step derivation
      1. copysign-lowering-copysign.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\log \left(\left|x\right| + \sqrt{x \cdot x + 1}\right), \color{blue}{x}\right) \]
      2. log-lowering-log.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\left(\left|x\right| + \sqrt{x \cdot x + 1}\right)\right), x\right) \]
      3. +-lowering-+.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\left(\left|x\right|\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      4. fabs-lowering-fabs.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{x \cdot x + 1}\right)\right)\right), x\right) \]
      5. +-commutativeN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\sqrt{1 + x \cdot x}\right)\right)\right), x\right) \]
      6. hypot-1-defN/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \left(\mathsf{hypot}\left(1, x\right)\right)\right)\right), x\right) \]
      7. hypot-lowering-hypot.f6458.7%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log.f64}\left(\mathsf{+.f64}\left(\mathsf{fabs.f64}\left(x\right), \mathsf{hypot.f64}\left(1, x\right)\right)\right), x\right) \]
    3. Simplified58.7%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\left|x\right| + \mathsf{hypot}\left(1, x\right)\right), x\right)} \]
    4. Add Preprocessing
    5. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{\log \left(1 + \left|x\right|\right)}, x\right) \]
    6. Step-by-step derivation
      1. log1p-defineN/A

        \[\leadsto \mathsf{copysign.f64}\left(\left(\mathsf{log1p}\left(\left|x\right|\right)\right), x\right) \]
      2. log1p-lowering-log1p.f64N/A

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log1p.f64}\left(\left(\left|x\right|\right)\right), x\right) \]
      3. fabs-lowering-fabs.f6461.5%

        \[\leadsto \mathsf{copysign.f64}\left(\mathsf{log1p.f64}\left(\mathsf{fabs.f64}\left(x\right)\right), x\right) \]
    7. Simplified61.5%

      \[\leadsto \mathsf{copysign}\left(\color{blue}{\mathsf{log1p}\left(\left|x\right|\right)}, x\right) \]
    8. Applied egg-rr4.1%

      \[\leadsto \color{blue}{\mathsf{copysign}\left(\log \left(\frac{1 + x \cdot \left(x \cdot x\right)}{1 + \frac{\left(x \cdot x\right) \cdot \left(x \cdot \left(x \cdot \left(x \cdot x\right)\right)\right) - x \cdot \left(x \cdot x\right)}{x \cdot \left(x \cdot \left(x \cdot x\right)\right) + \left(x \cdot x + x \cdot \left(x \cdot x\right)\right)}}\right), x\right)} \]
    9. Taylor expanded in x around 0

      \[\leadsto \mathsf{copysign.f64}\left(\color{blue}{x}, x\right) \]
    10. Step-by-step derivation
      1. Simplified48.5%

        \[\leadsto \mathsf{copysign}\left(\color{blue}{x}, x\right) \]
      2. Add Preprocessing

      Developer Target 1: 99.9% accurate, 0.6× speedup?

      \[\begin{array}{l} \\ \begin{array}{l} t_0 := \frac{1}{\left|x\right|}\\ \mathsf{copysign}\left(\mathsf{log1p}\left(\left|x\right| + \frac{\left|x\right|}{\mathsf{hypot}\left(1, t\_0\right) + t\_0}\right), x\right) \end{array} \end{array} \]
      (FPCore (x)
       :precision binary64
       (let* ((t_0 (/ 1.0 (fabs x))))
         (copysign (log1p (+ (fabs x) (/ (fabs x) (+ (hypot 1.0 t_0) t_0)))) x)))
      double code(double x) {
      	double t_0 = 1.0 / fabs(x);
      	return copysign(log1p((fabs(x) + (fabs(x) / (hypot(1.0, t_0) + t_0)))), x);
      }
      
      public static double code(double x) {
      	double t_0 = 1.0 / Math.abs(x);
      	return Math.copySign(Math.log1p((Math.abs(x) + (Math.abs(x) / (Math.hypot(1.0, t_0) + t_0)))), x);
      }
      
      def code(x):
      	t_0 = 1.0 / math.fabs(x)
      	return math.copysign(math.log1p((math.fabs(x) + (math.fabs(x) / (math.hypot(1.0, t_0) + t_0)))), x)
      
      function code(x)
      	t_0 = Float64(1.0 / abs(x))
      	return copysign(log1p(Float64(abs(x) + Float64(abs(x) / Float64(hypot(1.0, t_0) + t_0)))), x)
      end
      
      code[x_] := Block[{t$95$0 = N[(1.0 / N[Abs[x], $MachinePrecision]), $MachinePrecision]}, N[With[{TMP1 = Abs[N[Log[1 + N[(N[Abs[x], $MachinePrecision] + N[(N[Abs[x], $MachinePrecision] / N[(N[Sqrt[1.0 ^ 2 + t$95$0 ^ 2], $MachinePrecision] + t$95$0), $MachinePrecision]), $MachinePrecision]), $MachinePrecision]], $MachinePrecision]], TMP2 = Sign[x]}, TMP1 * If[TMP2 == 0, 1, TMP2]], $MachinePrecision]]
      
      \begin{array}{l}
      
      \\
      \begin{array}{l}
      t_0 := \frac{1}{\left|x\right|}\\
      \mathsf{copysign}\left(\mathsf{log1p}\left(\left|x\right| + \frac{\left|x\right|}{\mathsf{hypot}\left(1, t\_0\right) + t\_0}\right), x\right)
      \end{array}
      \end{array}
      

      Reproduce

      ?
      herbie shell --seed 2024139 
      (FPCore (x)
        :name "Rust f64::asinh"
        :precision binary64
      
        :alt
        (! :herbie-platform default (let* ((ax (fabs x)) (ix (/ 1 ax))) (copysign (log1p (+ ax (/ ax (+ (hypot 1 ix) ix)))) x)))
      
        (copysign (log (+ (fabs x) (sqrt (+ (* x x) 1.0)))) x))