Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Answer all the problems.

problem1) Use Euler method to solve numerically the initial value problem

         dx/dt= -2t u2;       u(0) = 1

Also solve the above initial value problem by fourth order Runge-Kutta method.

problem2) (i) Find out the root between 2 and 3, of the equation

    x sin x + cos x = 0   

(ii) Solve following systems of simultaneous linear equations using Gauss elimination method

(i) x1+x2+x3=6
x1-x2-x3=6
2x1+x2+7x3=12

(ii) 2x1+4x2+6x3=16
     2x1+4x2+9x3=8
     4x1+3x2+2x3=23                               

problem3) Functions below have roots in the intervals that are specified on their right sides. find out the roots of these functions in each of the intervals to an assured three important figures by use of bisection method:

(i) ex- 3x, on (0,1) and (1,2)

(ii) x2 - √x -2  on (1,2)

(iii) lnx+ √x- 2 on (1,2)

problem4) (i)  Determine real root of the equation 4x3 + 3x2 - 4x - 5= 0 using bisection method. Perform three reiterations.    

(ii) If π = 22/7  is approximated as 3.14, determine the absolute error, relative error and relative percentage error. 

problem5) Find smallest positive root of e-x-cos(x)=0 by fixed point method.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92357

Have any Question? 


Related Questions in Computer Engineering

Charlie was just getting ready to head home when the phone

Charlie was just getting ready to head home when the phone rang. Caller ID showed it was Peter. "Hi, Peter," he said into the receiver. "Want me to start the file cracker on your spreadsheet?" "No, thanks," Peter answere ...

Overviewyou are a mobile application developer working for

Overview: You are a mobile application developer working for Mick Jagger who owns Wild Horses Incorporated (WHI).  Mick's company is just getting started with Android mobile application development. Mick wants to make su ...

Assignment 1information security within organizations has

Assignment 1 Information security within organizations has evolved and has become much more complex.  In a written paper, answer the following questions:  How has computer security evolved into modern information securit ...

1 why shouldnt an organization give an employee candidate a

1. Why shouldn't an organization give an employee candidate a tour of secure areas during the candidate's interview? 2. List and describe the typical relationships that organizations have with nonemployees. What are the ...

A train traveling at 72 kmph crosses a platform in 30

A train traveling at 72 kmph crosses a platform in 30 seconds and a man standing on the platform in 18 seconds. What is the length of the platform in meters?

Using figure 2419 explain how flow control can be achieved

Using Figure 24.19, explain how flow control can be achieved at the sender site in TCP (from the sending TCP to the sending application). Draw a representation.

Format for the 448548 research projectpaperthe image

Format for the 448/548 Research Project/Paper The Image Processing and Computer Vision Research Project/Paper is designed to be an opportunity for you explore a particular branch of this diverse field in more depth than ...

Write a program that produces random permutations of the

Write a program that produces random permutations of the numbers 1 to 10. To generate a random permutation, you need to fill an array with the numbers 1 to 10 so that no two entries of the array have the same contents. Y ...

1 evaluate the map method of your implementation of the

1. Evaluate the map() method of your implementation of the Colormap ADT from the previous question to determine the worst case time-complexity. 2. Colormaps are used in color quantization, which is the process of reducin ...

After the dhke alice and bob possess a mutual secret point

After the DHKE, Alice and Bob possess a mutual secret point R = (x,y). The modulus of the used elliptic curve is a 64-bit prime. Now, we want to derive a session key for a 128-bit block cipher. The session key is calcula ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro