Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Answer all the problems.

problem1) Use Euler method to solve numerically the initial value problem

         dx/dt= -2t u2;       u(0) = 1

Also solve the above initial value problem by fourth order Runge-Kutta method.

problem2) (i) Find out the root between 2 and 3, of the equation

    x sin x + cos x = 0   

(ii) Solve following systems of simultaneous linear equations using Gauss elimination method

(i) x1+x2+x3=6
x1-x2-x3=6
2x1+x2+7x3=12

(ii) 2x1+4x2+6x3=16
     2x1+4x2+9x3=8
     4x1+3x2+2x3=23                               

problem3) Functions below have roots in the intervals that are specified on their right sides. find out the roots of these functions in each of the intervals to an assured three important figures by use of bisection method:

(i) ex- 3x, on (0,1) and (1,2)

(ii) x2 - √x -2  on (1,2)

(iii) lnx+ √x- 2 on (1,2)

problem4) (i)  Determine real root of the equation 4x3 + 3x2 - 4x - 5= 0 using bisection method. Perform three reiterations.    

(ii) If π = 22/7  is approximated as 3.14, determine the absolute error, relative error and relative percentage error. 

problem5) Find smallest positive root of e-x-cos(x)=0 by fixed point method.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92357

Have any Question? 


Related Questions in Computer Engineering

In practice the short exponents e 3 17 and 216 1 are

In practice the short exponents e = 3, 17 and 216 +1 are widely used. 1. Why can't we use these three short exponents as values for the exponent d in applications where we want to accelerate decryption? 2. Suggest a mini ...

1 we would like to execute the loop below as efficiently as

1. We would like to execute the loop below as efficiently as possible. We have two different machines, a MIMD machine and a SIMD machine. 2. For a 4 CPU MIMD machine, show the sequence of MIPS instructions that you would ...

Suppose a virtual machine monitor call it vmm-1 is running

Suppose a virtual machine monitor (call it VMM-1) is running another virtual machine monitor (VMM-2), which in turn is running a version of the Linux operating system. The user running the Linux system is editing a file. ...

Create a data file consisting of at least 100 string values

Create a data file consisting of at least 100 string values. You can create the list yourself, or perhaps copy the values from a text file of some type, or you can even create the file by generating random strings. Sort ...

Write a 3 page paper discuss why hci human computer

Write a 3 page paper discuss why HCI (Human computer Interaction) is important and has evolved to ensure that the needs of different kinds of users are taken into account in computer systems. Discuss the application of s ...

1 run the binary search method on a set of unordered data

1. Run the binary search method on a set of unordered data. What happens? 2. Using the CArray class with the SeqSearch method and the BinSearch method, create an array of 1,000 random integers. Add a new private Integer ...

1 what techniques can be used to reduce page table

1. What techniques can be used to reduce page table shadowing induced overhead? 2. What techniques can be used to reduce NPT induced overhead? 3. One of the biggest impediments to widespread use of virtual machines is th ...

A postfix expression evaluator works on arithmetic

A postfix expression evaluator works on arithmetic statements that take the following form: op1 op2 operator... Using two stacks, one for the operands and one for the operators, design and implement a Calculator class th ...

Consider the signalxn deltan-2deltan-1 2deltan-2-deltan-3a

Consider the signal x[n] = δ[n]-2δ[n-1]+ 2δ[n-2]-δ[n-3]. (a) Compute and plot the 4-point DFT X[k]. (b) Using the fewest number of zeros possible, zero pad x[n] so that the DFT frequency resolution is at least Ω0 = 0.1. ...

1 explain the terms shallow copy and deep copy2 what access

1. Explain the terms shallow copy and deep copy. 2. What access attribute should instance variables have? What access attribute should static variables have? How about static final variables? 3. What access attribute sho ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro