Differential Equations: Computing and Modeling (5th Edition), Edwards, Penney & Calvis
Differential Equations: Computing and Modeling (5th Edition), Edwards, Penney & Calvis
5th Edition
ISBN: 9780321816252
Author: C. Henry Edwards, David E. Penney, David Calvis
Publisher: PEARSON
bartleby

Concept explainers

Question
Book Icon
Chapter 2.6, Problem 1P
Program Plan Intro

Program Description: Purpose of the problem is to construct a table for the approximation solution and the actual solution of y=y up to five decimal places by the use of Runge-Kutta’s method.

Summary Introduction:

Purpose will use Runge-Kutta’s method to construct the table of the approximation solution and the actual solution y=y(x) is the solution of a differential equation dydx=f(x,y) with y(x0)=y0 where approximate value can be calculated with the formula yi+1=yi+kh and the value of k can be calculated as k=16(k1+2k2+2k3+k4) where the value of k1=f(xi,yi) , k2=f(xi+12h,yi+12hk1) , k3=f(xi+12h,yi+12hk2) and k4=f(xi+1,yi+hk3) .

Expert Solution & Answer
Check Mark

Explanation of Solution

Given information:

In the interval of [0,0.5] the function have 2 subintervals as h=0.25 .

The differential equation is dydx=y and y(x)=2ex with y(0)=2 .

Calculation:

The initial value problem dydx=f(x,y) , y(x0)=y0 can be calculated with RungeKutta’s method with the size of h .

The differential equation is dydx=y and y(x)=2ex with y(0)=2 .

The value of k1 is f(xi,yi) .

Therefore, the value of k1 can be expressed as,

  k1=yi

Substitute 0 for i in the predicted formula to obtain the formula of u1 as,

  k1=y0 ........ (1)

Substitute 2 for y0 in equation (1) to obtain the value of k1 as,

  k1=2

The value of k2 is f(xi+12h,yi+12hk1) .

Therefore, the value of k2 can be expressed as,

  k2=(yi+12hk1)

Substitute 0 for i in the predicted formula to obtain the formula of k2 as,

  k2=(y0+12hk1) ........ (2)

Substitute 2 for y0 , 0.25 for h and 2 for k1 in equation (2) to obtain the value of k2 as,

  k2=(2+12( 0.25)( 2))k2=1.75

The value of k3 is f(xi+12h,yi+12hk2) .

Therefore, the value of k3 can be expressed as,

  k3=(yi+12hk2)

Substitute 0 for i in the predicted formula to obtain the formula of k3 as,

  k3=(y0+12hk2) ........ (3)

Substitute 2 for y0 , 0.25 for h and 1.75 for k2 in equation (3) to obtain the value of k3 as,

  k3=(2+12( 0.25)( 1.75))k3=1.78125

The value of k4 is f(xi+1,yi+hk3) .

Therefore, the value of k4 can be expressed as,

  k4=(yi+hk3)

Substitute 0 for i in the predicted formula to obtain the formula of k4 as,

  k4=(y0+hk3) ........ (4)

Substitute 2 for y0 , 0.25 for h and 1.78125 for k3 in equation (4) to obtain the value of k4 as,

  k4=(2+( 0.25)( 1.78125))k4=1.55469

The value of k can be calculated as,

  k=16(2+2( 1.75)+2( 1.78125)+( 1.55469))k=1.76953

The approximate value can be calculated as,

  yi+1=yi+khy1=2+(1.76953)(0.25)y1=1.55762

Now actual value can be calculated by substituting the given values of xi in the y(x)=2ex .

Substitute 0.25 for x in the equation y(x)=2ex to obtain the actual solution of y for x=0.25 .

  y(0.25)=2e( 0.25)y(0.25)=1.55760

Similarly, further values can also be calculated using the above steps.

    k1k2k3k4xiapprox value yiActual value     y(xi)
    21.751.781251.554690.251.557621.55760
    1.557621.362921.387251.21080.51.213091.21306

Therefore, the above table shows all the values of approximation value yi and actual value yi .

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
What are the major threats of using the internet? How do you use it? How do children use it? How canwe secure it? Provide four references with your answer. Two of the refernces can be from an article and the other two from websites.
Assume that a string of name & surname is saved in S. The alphabetical characters in S can be in lowercase and/or uppercase letters. Name and surname are assumed to be separated by a space character and the string ends with a full stop "." character. Write an assembly language program that will copy the name to NAME in lowercase and the surname to SNAME in uppercase letters. Assume that name and/or surname cannot exceed 20 characters. The program should be general and work with every possible string with name & surname. However, you can consider the data segment definition given below in your program. .DATA S DB 'Mahmoud Obaid." NAME DB 20 DUP(?) SNAME DB 20 DUP(?) Hint: Uppercase characters are ordered between 'A' (41H) and 'Z' (5AH) and lowercase characters are ordered between 'a' (61H) and 'z' (7AH) in the in the ASCII Code table. For lowercase letters, bit 5 (d5) of the ASCII code is 1 where for uppercase letters it is 0. For example, Letter 'h' Binary ASCII 01101000 68H 'H'…
What did you find most interesting or surprising about the scientist Lavoiser?

Chapter 2 Solutions

Differential Equations: Computing and Modeling (5th Edition), Edwards, Penney & Calvis

Ch. 2.1 - Prob. 11PCh. 2.1 - Prob. 12PCh. 2.1 - Prob. 13PCh. 2.1 - Prob. 14PCh. 2.1 - Prob. 15PCh. 2.1 - Prob. 16PCh. 2.1 - Prob. 17PCh. 2.1 - Prob. 18PCh. 2.1 - Prob. 19PCh. 2.1 - Prob. 20PCh. 2.1 - Prob. 21PCh. 2.1 - Suppose that at time t=0, half of a logistic...Ch. 2.1 - Prob. 23PCh. 2.1 - Prob. 24PCh. 2.1 - Prob. 25PCh. 2.1 - Prob. 26PCh. 2.1 - Prob. 27PCh. 2.1 - Prob. 28PCh. 2.1 - Prob. 29PCh. 2.1 - A tumor may be regarded as a population of...Ch. 2.1 - Prob. 31PCh. 2.1 - Prob. 32PCh. 2.1 - Prob. 33PCh. 2.1 - Prob. 34PCh. 2.1 - Prob. 35PCh. 2.1 - Prob. 36PCh. 2.1 - Prob. 37PCh. 2.1 - Fit the logistic equation to the actual U.S....Ch. 2.1 - Prob. 39PCh. 2.2 - Prob. 1PCh. 2.2 - Prob. 2PCh. 2.2 - Prob. 3PCh. 2.2 - Prob. 4PCh. 2.2 - Prob. 5PCh. 2.2 - Prob. 6PCh. 2.2 - Prob. 7PCh. 2.2 - Prob. 8PCh. 2.2 - Prob. 9PCh. 2.2 - Prob. 10PCh. 2.2 - Prob. 11PCh. 2.2 - Prob. 12PCh. 2.2 - Prob. 13PCh. 2.2 - Prob. 14PCh. 2.2 - Prob. 15PCh. 2.2 - Prob. 16PCh. 2.2 - Prob. 17PCh. 2.2 - Prob. 18PCh. 2.2 - Prob. 19PCh. 2.2 - Prob. 20PCh. 2.2 - Prob. 21PCh. 2.2 - Prob. 22PCh. 2.2 - Prob. 23PCh. 2.2 - Prob. 24PCh. 2.2 - Use the alternatives forms...Ch. 2.2 - Prob. 26PCh. 2.2 - Prob. 27PCh. 2.2 - Prob. 28PCh. 2.2 - Consider the two differentiable equation...Ch. 2.3 - The acceleration of a Maserati is proportional to...Ch. 2.3 - Prob. 2PCh. 2.3 - Prob. 3PCh. 2.3 - Prob. 4PCh. 2.3 - Prob. 5PCh. 2.3 - Prob. 6PCh. 2.3 - Prob. 7PCh. 2.3 - Prob. 8PCh. 2.3 - A motorboat weighs 32,000 lb and its motor...Ch. 2.3 - A woman bails out of an airplane at an altitude of...Ch. 2.3 - According to a newspaper account, a paratrooper...Ch. 2.3 - Prob. 12PCh. 2.3 - Prob. 13PCh. 2.3 - Prob. 14PCh. 2.3 - Prob. 15PCh. 2.3 - Prob. 16PCh. 2.3 - Prob. 17PCh. 2.3 - Prob. 18PCh. 2.3 - Prob. 19PCh. 2.3 - Prob. 20PCh. 2.3 - Prob. 21PCh. 2.3 - Suppose that =0.075 (in fps units, with g=32ft/s2...Ch. 2.3 - Prob. 23PCh. 2.3 - The mass of the sun is 329,320 times that of the...Ch. 2.3 - Prob. 25PCh. 2.3 - Suppose that you are stranded—your rocket engine...Ch. 2.3 - Prob. 27PCh. 2.3 - (a) Suppose that a body is dropped (0=0) from a...Ch. 2.3 - Prob. 29PCh. 2.3 - Prob. 30PCh. 2.4 - Prob. 1PCh. 2.4 - Prob. 2PCh. 2.4 - Prob. 3PCh. 2.4 - Prob. 4PCh. 2.4 - Prob. 5PCh. 2.4 - Prob. 6PCh. 2.4 - Prob. 7PCh. 2.4 - Prob. 8PCh. 2.4 - Prob. 9PCh. 2.4 - Prob. 10PCh. 2.4 - Prob. 11PCh. 2.4 - Prob. 12PCh. 2.4 - Prob. 13PCh. 2.4 - Prob. 14PCh. 2.4 - Prob. 15PCh. 2.4 - Prob. 16PCh. 2.4 - Prob. 17PCh. 2.4 - Prob. 18PCh. 2.4 - Prob. 19PCh. 2.4 - Prob. 20PCh. 2.4 - Prob. 21PCh. 2.4 - Prob. 22PCh. 2.4 - Prob. 23PCh. 2.4 - Prob. 24PCh. 2.4 - Prob. 25PCh. 2.4 - Prob. 26PCh. 2.4 - Prob. 27PCh. 2.4 - Prob. 28PCh. 2.4 - Prob. 29PCh. 2.4 - Prob. 30PCh. 2.4 - Prob. 31PCh. 2.5 - Prob. 1PCh. 2.5 - Prob. 2PCh. 2.5 - Prob. 3PCh. 2.5 - Prob. 4PCh. 2.5 - Prob. 5PCh. 2.5 - Prob. 6PCh. 2.5 - Prob. 7PCh. 2.5 - Prob. 8PCh. 2.5 - Prob. 9PCh. 2.5 - Prob. 10PCh. 2.5 - Prob. 11PCh. 2.5 - Prob. 12PCh. 2.5 - Prob. 13PCh. 2.5 - Prob. 14PCh. 2.5 - Prob. 15PCh. 2.5 - Prob. 16PCh. 2.5 - Prob. 17PCh. 2.5 - Prob. 18PCh. 2.5 - Prob. 19PCh. 2.5 - Prob. 20PCh. 2.5 - Prob. 21PCh. 2.5 - Prob. 22PCh. 2.5 - Prob. 23PCh. 2.5 - Prob. 24PCh. 2.5 - Prob. 25PCh. 2.5 - Prob. 26PCh. 2.5 - Prob. 27PCh. 2.5 - Prob. 28PCh. 2.5 - Prob. 29PCh. 2.5 - Prob. 30PCh. 2.6 - Prob. 1PCh. 2.6 - Prob. 2PCh. 2.6 - Prob. 3PCh. 2.6 - Prob. 4PCh. 2.6 - Prob. 5PCh. 2.6 - Prob. 6PCh. 2.6 - Prob. 7PCh. 2.6 - Prob. 8PCh. 2.6 - Prob. 9PCh. 2.6 - Prob. 10PCh. 2.6 - Prob. 11PCh. 2.6 - Prob. 12PCh. 2.6 - Prob. 13PCh. 2.6 - Prob. 14PCh. 2.6 - Prob. 15PCh. 2.6 - Prob. 16PCh. 2.6 - Prob. 17PCh. 2.6 - Prob. 18PCh. 2.6 - Prob. 19PCh. 2.6 - Prob. 20PCh. 2.6 - Prob. 21PCh. 2.6 - Prob. 22PCh. 2.6 - Prob. 23PCh. 2.6 - Prob. 24PCh. 2.6 - Prob. 25PCh. 2.6 - Prob. 26PCh. 2.6 - Prob. 27PCh. 2.6 - Prob. 28PCh. 2.6 - Prob. 29PCh. 2.6 - Prob. 30P
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr
Text book image
Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole