This document contains instructions for 5 assignment questions involving numerical integration and solving differential equations. Question 1 involves using the quad function to evaluate several integrals. Question 2 involves using quad to evaluate Fresnel integrals and plot the results. Question 3 involves using Monte Carlo methods to estimate volumes and double integrals. Question 4 involves using Euler's method to solve an initial value problem and analyze errors. Question 5 involves using lsode to solve a system of differential equations modeling atmospheric circulation and experimenting with initial conditions.
Computer Oriented Numerical Analysis
What is interpolation?
Many times, data is given only at discrete points such as .
So, how then does one find the value of y at any other value of x ?
Well, a continuous function f(x) may be used to represent the data values with f(x) passing through the points (Figure 1). Then one can find the value of y at any other value of x .
This is called interpolation
Newton’s Divided Difference Formula:
To illustrate this method, linear and quadratic interpolation is presented first.
Then, the general form of Newton’s divided difference polynomial method is presented.
Computer Oriented Numerical Analysis
What is interpolation?
Many times, data is given only at discrete points such as .
So, how then does one find the value of y at any other value of x ?
Well, a continuous function f(x) may be used to represent the data values with f(x) passing through the points (Figure 1). Then one can find the value of y at any other value of x .
This is called interpolation
Newton’s Divided Difference Formula:
To illustrate this method, linear and quadratic interpolation is presented first.
Then, the general form of Newton’s divided difference polynomial method is presented.
Review for the Third Midterm of Math 150 B 11242014Probl.docxjoellemurphey
Review for the Third Midterm of Math 150 B 11/24/2014
Problem 1
Recall that 1
1−x =
∑∞
n=0 x
n for |x| < 1.
Find a power series representation for the following functions and state the radius of
convergence for the power series
a) f(x) = x
2
(1+x)2
.
b) f(x) = 2
1+4x2
.
c) f(x) = x
4
2−x.
d) f(x) = x
1+x2
.
e) f(x) = 1
6+x
.
f) f(x) = x
2
27−x3 .
Problem 2
Find a Taylor series with a = 0 for the given function and state the radius of conver-
gence. You may use either the direct method (definition of a Taylor series) or known
series.
a) f(x) = ln(1 + x)
b) f(x) = sin x
x
c) f(x) = x sin(3x).
Problem 3
Find the radius of convergence and interval of convergence for the series
∑∞
n=1
(x+2)n
n4n
.
Ans. Radius r=2,
√
2 − 2 < x <
√
2 + 2. Problem 4
Find the interval of convergence of the following power series. You must justify your
answers.
∑∞
n=0
n2(x+4)n
23n
.
Ans. −12 < x < 4.
Problem 5
For the function f(x) = 1/
√
x, find the fourth order Taylor polynomial with a=1.
Problem 6
A curve has the parametric equations
x = cos t, y = 1 + sin t, 0 ≤ t ≤ 2π
a) Find dy
dx
when t = π
4
.
b) Find the equation of the line tangent to the curve at t = π/4. Write it in y = mx+b
form.
c) Eliminate the parameter t to find a cartesian (x, y) equation of the curve.
d) Using (c), or otherwise identify the curve.
Problem 7
State whether the given series converges or diverges
a)
∑∞
n=0 (−1)
n+1 n22n
n!
.
b)
∑∞
n=0
n(−3)n
4n−1
.
c)
∑∞
n=1
sin n
2n2+n
.
Problem 8
1
Approximate the value of the integral
∫ 1
0
e−x
2
dx with an error no greater than 5×10−4.
Ans.
∫ 1
0
e−x
2
dx = 1 − 1
3
+ 1
5.2!
− 1
7.3!
+ ... +
(−1)n
(2n+1)n!
+ .... n ≥ 5,
for n=5
∫ 1
0
e−x
2
dx ≈ 1 − 1
3
+ 1
5.2!
− 1
7.3!
+ 1
9.4!
− 1
11.5!
≈ 0.747.
Problem 9
Find the radius of convergence for the series
∑∞
n=1
nn(x−2)2n
n!
.
Ans. R = 1√
e
.
Problem 10
Let f(x) =
∑∞
n=0
(x−1)n
n2+1
.
a) Calculate the domain of f.
b) Calculate f ′(x).
c) Calculate the domain of f ′.
Problem 11
Let f(x) =
∑∞
n=0
cos n
n!
xn.
a) Calculate the domain of f.
b) Calculate f ′(x).
c) Calculate
∫
f(x)dx.
Problem 12
Using properties of series, known Maclaurin expansions of familiar functions and their
arithmetic, calculate Maclaurin series for the following.
a) ex
2
b) sin 2x
c)
∫
x5 sin xdx
d) cos x−1
x2
e)
d((x+1) tan−1(x))
dx
Problem 13
Calculate the Taylor polynomial T5(x), expanded at a=0, for
f(x) =
∫ x
0
ln |sect + tan t|dt.
Ans. T5(x) =
x2
2
+ x
4
4!
.
Problem 14
Suppose we only consider |x| ≤ 0.8. Find the best upper bound or maximum value
you can for∣∣∣sin x − (x − x33! + x55! )∣∣∣
Same question: If
(
x − x
3
3!
+ x
5
5!
)
is used to approximate sin x for |x| ≤ 0.8. What is
the maximum error? Explain what method you are using.
Problem 15
The Taylor polynomial T5(x) of degree 5 for (4 + x)
3/2 is
(4 + x)3/2 ≈ 8 + 3x + 3
16
x2 − 1
128
x3 + 3
4096
x4 − 3
32768
x5.
a) Use this polynomial to find Taylor polynomials for (4 + ...
I am Frank P. I am a Physical Chemistry Assignment Expert at eduassignmenthelp.com. I hold a Ph.D. in Physical Chemistry, from Malacca, Malaysia. I have been helping students with their homework for the past 6 years. I solve assignments related to Physical Chemistry.
Visit eduassignmenthelp.com or email info@eduassignmenthelp.com.
You can also call on +1 678 648 4277 for any assistance with Physical Chemistry Assignments.
I am Diego G. I am an Online Maths Assignment Solver at mathhomeworksolver.com. I hold a Master's in Mathematics, from Sydney, Australia. I have been helping students with their assignments for the past 10 years. I solved assignments related to Online Maths Assignment.
Visit mathhomeworksolver.com or email support@mathhomeworksolver.com. You can also call on +1 678 648 4277 for any assistance with Online Maths Assignment.
I am Theofanis A. I am a Maths Assignment Expert at mathsassignmenthelp.com. I hold a Master's in Mathematics from the University of Cambridge. I have been helping students with their assignments for the past 12 years. I solve assignments related to Maths.
Visit mathsassignmenthelp.com or email info@mathsassignmenthelp.com.
You can also call +1 678 648 4277 for any assistance with Maths Assignments.
This is the entrance exam paper for ISI MSQE Entrance Exam for the year 2008. Much more information on the ISI MSQE Entrance Exam and ISI MSQE Entrance preparation help available on http://crackdse.com
This is the entrance exam paper for ISI MSQE Entrance Exam for the year 2010. Much more information on the ISI MSQE Entrance Exam and ISI MSQE Entrance preparation help available on http://crackdse.com
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assignment6
1. AMTH250 Assignment 6
Due: 24th September, 2012
Question 1 [3 marks]
Evaluate the following integrals using quad:
∞
x3
(a) I1 = dx
0 ex − 1
1
(b) I2 = ln(1 + x) ln(1 − x) dx
−1
π
(c) I3 = (tan(sin x) − sin(tan x)) dx
0
Do you think the results are reliable?
Question 2 [3 marks]
The intensity of diffracted light near a straight edge is determined by
the Fresnel integrals
x
πt2
C(x) = cos dt
0 2
and
x
πt2
S(x) = sin dt
0 2
Use quad to evaluate these integrals for enough values of x to draw smooth
plots of C(x) and S(x) over the range −10 ≤ x ≤ 10. Also plot C(x) against
S(x) — the result is the Cornu or Euler spiral.
Question 3 [3 marks]
Use Monte-Carlo methods to
(a) Estimate the volume of the ellipsoid
y2 z2
x2 + + ≤ 1.
4 16
1
2. (b) Estimate the double integral
√
2 2
e− x +y dx dy
Ω
over the semicircular region Ω defined by
x2 + y 2 ≤ 1, x ≥ 0.
Question 4 [3 marks]
The initial value problem
dy
= −2ty, y(0) = 1
dt
has the solution
2
y(t) = e−t
Apply Euler’s method with various step-sizes h to this problem.
(a) Solve the initial value problem on the interval [0, 1]. As a measure
of error, compare the computed and exact values at t = 1. Plot and
characterize the error as a function of the step-size h.
(b) The exact solution decays to 0 as t → ∞. A numerical method for
this problem is unstable if it does not decay to 0 as t → ∞. Determine
the range of step-sizes h for which Euler’s method is unstable for this
problem.
Question 5 [4 marks]
The system of differential equations
dy1
= σ(y2 − y1 )
dt
dy2
= ry1 − y2 − y1 y3
dt
dy3
= y1 y2 − by3
dt
was used by Lorenz as a crude model of atmospheric circulation.
Take σ = 10, b = 8/3 and r = 28 and initial values y1 (0) = 0, y2 (0) = 1
and y3 (0) = 0 and use lsode to solve the differential equation from t = 0 to
t = 100. Plot (a) each component individually, (b) phase plots of each pair
of components, and (c) a 3D plot of the curve (y1 (t), y2 (t), y3 (t)).
Now experiment by changing the initial conditions by a tiny amount. De-
scribe how the graphs above and the final values (y1 (100), y2 (100), y3 (100))
change.
2
3. Notes on the Assignment
Question 2
You will need a for loop to generate the vectors of values of C(x) and S(x).
A step of 0.01 gives reasonable results, so try something like
x = -10:0.01:10;
.....
for i = 1:length(x)
% evaluate C(x(i)) & S(x(i))
end
Questions 3
It is easy to get these wrong. Some things to watch out for:
1. First identify the range of the random numbers for each dimension,
e.g. y ∈ [0, 2].
2. Use rand correctly, e.g. for y ∈ [0, 2] use 2*rand(1,1) not rand(0,2).
3. Make sure you account for the volume of the region in which you
generate the random numbers.
If in doubt, study the examples in the notes carefully making sure you
understand each step in the computation. Beware that the lines
x = rand(1,4); % x = point in unit cube
if (norm(x) <= 1) % point x lies in sphere
in the example of §1.6.3 are quite specific to that particular problem.
Questions 4
This is the same differential equation that was used as an example in the
notes.
(a) Try step sizes h = 1/2, 1/4, 1/8, . . . . You will need a for loop to
generate the data. Start with something like
N = 16;
h = zeros(1,N);
y1 = zeros(1,N); % values of y at t=1
for k = 1:N
hk = 2^-k;
h(k) = hk;
y =euler(f, 0, 1, hk, 2^k); % 2^k steps needed to reach t=1
y1(k) = y(end); % y(end) is the last element of y
end
3
4. (b) The example at the top of p25 of the notes shows Euler’s method is
unstable for h = 1.
Question 5
1. See the example in the notes on the Lotka-Volterra equations for how
to solve this sort of problem in Octave.
2. See §3.4 of the Octave notes for plotting 3D curves.
3. The initial values are [0 1 0]. For a small change in initial values,
try adding 1e-10*randn(1,3) for example.
4