Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Answer all the problems.

problem1) Use Euler method to solve numerically the initial value problem

         dx/dt= -2t u2;       u(0) = 1

Also solve the above initial value problem by fourth order Runge-Kutta method.

problem2) (i) Find out the root between 2 and 3, of the equation

    x sin x + cos x = 0   

(ii) Solve following systems of simultaneous linear equations using Gauss elimination method

(i) x1+x2+x3=6
x1-x2-x3=6
2x1+x2+7x3=12

(ii) 2x1+4x2+6x3=16
     2x1+4x2+9x3=8
     4x1+3x2+2x3=23                               

problem3) Functions below have roots in the intervals that are specified on their right sides. find out the roots of these functions in each of the intervals to an assured three important figures by use of bisection method:

(i) ex- 3x, on (0,1) and (1,2)

(ii) x2 - √x -2  on (1,2)

(iii) lnx+ √x- 2 on (1,2)

problem4) (i)  Determine real root of the equation 4x3 + 3x2 - 4x - 5= 0 using bisection method. Perform three reiterations.    

(ii) If π = 22/7  is approximated as 3.14, determine the absolute error, relative error and relative percentage error. 

problem5) Find smallest positive root of e-x-cos(x)=0 by fixed point method.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92357

Have any Question? 


Related Questions in Computer Engineering

Color images can also be stored using three separate color

Color images can also be stored using three separate color channels in which the values of each color component is stored in a separate data structure. Implement a new version of the Color Image ADT using three 1-D array ...

In this exercise we illustrate the problem of using

In this exercise, we illustrate the problem of using nonprobabilistic cryptosystems, such as schoolbook RSA, imprudently. Nonprobabilistic means that the same sequence of plaintext letters maps to the same ciphertext. Th ...

1 write a program that draws two solid squares one in pink

1. Write a program that draws two solid squares: one in pink and one in purple. Use a standard color for one of them and a custom color for the other. Provide a class TwoSquareViewer and a class TwoSquareComponent. 2. Wr ...

Article critiqueone significant industrial hygiene related

Article Critique One significant industrial hygiene related situation that occurred in the not too distant past involved workers at a microwave popcorn facility who were diagnosed with a debilitating lung disease known a ...

Welcome to the pen testing firm of bodgit and run we hope

Welcome to the Pen Testing firm of Bodgit and Run, we hope you will find your work with our company both entertaining (for you) and profitable (for us). To this end we have a client who wants us to do a risk assessment o ...

Sum it upnbspplease respond to the followingwrite a speech

" Sum It Up "  Please respond to the following: Write a speech that you would give to a friend in an elevator summing up the contents of this course. You have 30 to 90 seconds to inform your friend of the most important ...

What is the relationship between hvac and physical security

What is the relationship between HVAC and physical security? What four physical characteristics of the indoor environment are controlled by a properly designed HVAC system? What are the optimal temperature and humidity r ...

1 prove that the nor gate is universal by showing how to

1. Prove that the NOR gate is universal by showing how to build the AND, OR, and NOT functions using a two-input NOR gate. 2. Prove that the NAND gate is universal by showing how to build the AND, OR, and NOT functions u ...

Using a risk assessment and business impact analysiswrite a

Using a risk assessment and business impact analysis. Write a draft memo to the president of the university explaining the need for a business continuity plan. Be sure to include your recommendations on how you would imp ...

1 potential incidents represent threats that have yet to

1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaining security? 2. Penetration testing is a particularly important contributor to the incident ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen