Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Answer all the problems.

problem1) Use Euler method to solve numerically the initial value problem

         dx/dt= -2t u2;       u(0) = 1

Also solve the above initial value problem by fourth order Runge-Kutta method.

problem2) (i) Find out the root between 2 and 3, of the equation

    x sin x + cos x = 0   

(ii) Solve following systems of simultaneous linear equations using Gauss elimination method

(i) x1+x2+x3=6
x1-x2-x3=6
2x1+x2+7x3=12

(ii) 2x1+4x2+6x3=16
     2x1+4x2+9x3=8
     4x1+3x2+2x3=23                               

problem3) Functions below have roots in the intervals that are specified on their right sides. find out the roots of these functions in each of the intervals to an assured three important figures by use of bisection method:

(i) ex- 3x, on (0,1) and (1,2)

(ii) x2 - √x -2  on (1,2)

(iii) lnx+ √x- 2 on (1,2)

problem4) (i)  Determine real root of the equation 4x3 + 3x2 - 4x - 5= 0 using bisection method. Perform three reiterations.    

(ii) If π = 22/7  is approximated as 3.14, determine the absolute error, relative error and relative percentage error. 

problem5) Find smallest positive root of e-x-cos(x)=0 by fixed point method.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92357

Have any Question? 


Related Questions in Computer Engineering

Security programas you build your model and plan you have

Security Program As you build your model and plan, you have requested assistance from various organizations to identify their data and system requirements. To assist them, you have created a data classification scheme, a ...

Mobile app part 3 riskreference the microsoft project file

Mobile App Part 3 Risk Reference the Microsoft Project file you created in Assignment 5(AT THE ATTACHED): Mobile App Part 2 (Gantt and PERT Charts) for the completion of this assignment. Write a two to three page paper i ...

1 what is the difference between the serversocket class and

1. What is the difference between the ServerSocket class and the Socket class in Java? 2. We say that in network programming a socket should be at least bound to a local socket address. The first constructor of the Datag ...

Consider the vector adt from programming project 21a

Consider the Vector ADT from Programming Project 2.1: (a) Implement a new version of the ADT using an unsorted linked list. (b) Evaluate your new implementation to determine the worst case run time of each operation. (c) ...

1 modify the previous program to get its input from a file2

1. Modify the previous program to get its input from a file. 2. Heating and cooling degree-days are measures used by utility companies to estimate energy requirements. If the average temperature for a day is below 60, th ...

Consider the following binary treea show the order the

Consider the following binary tree (a) Show the order the nodes will be visited in a: (b) Identify all of the leaf nodes. (c) Identify all of the interior nodes. (d) List all of the nodes on level 4. (e) List all of the ...

Using a small array less than 20 elements compare the

Using a small array (less than 20 elements), compare the sorting times between the insertion sort and QuickSort. What is the difference in time? Can you explain why this difference occurs?

Distinguish between a policy requirement and a mechanism

Distinguish between a policy requirement and a mechanism. Identify at least three specific security requirements for a system you know and describe at least two different mechanisms for implementing each one.

1 determine the picker route in the storage zone of the

1. Determine the picker route in the storage zone of the French warehouse of the Guillen company (see given figure), using the S-shaped heuristic, the largest gap heuristic, the combined heuristic and the aisle-by-aisle ...

1 what are the types of password attacks what can a systems

1. What are the types of password attacks? What can a systems administrator do to protect against them? 2. What is the difference between a denial-of-service attack and a distributed denial-of-service attack? Which is mo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro