Simplified Calculation of the Exponential Integral

Size: px
Start display at page:

Download "Simplified Calculation of the Exponential Integral"

Transcription

1 SIMPLIFIED CALCULATION OF THE EXPONENTIAL INTEGRAL 87 Simplified Calculation of the Exponential Integral By James Miller and R. P. Hurst Calculations of the negative exponential integral function [] () -Ei(-x) = eydt are usually made using one method for x < 3, another for 3 < x < 2, and a third for x > 2. The intermediate region is of considerable interest for many applications, and it is here that the function is most difficult to compute. The Ruedenberg [2] and Kotani [3] methods are valid for any argument, but difficulties in application limit their usefulness to the intermediate region where less complicated methods fail. The authors wish to present a simple method which is useful over the entire range of arguments. The method is based on a Taylor's expansion of the slowly varying exponential product function, ex Ei ( x). An interpolation formula is obtained by which this function may be computed from a table value, e' Ei ( xo) ; then Ei ( x) is obtained upon dividing by the exponential. The accuracy of the result is limited only by the accuracy of the table value and that of the computed exponential. The positive exponential integral Cx e' Ei (x) = - dt «/ t may be computed by analogous means. The formulae for the negative exponential product function are developed as follows : Let (2) gix) = -e*ei(-x), then g'ix) = gix) - x- g"ix) = g'ix) + x~2 g'"ix) = g"ix) -2!x-3 g-(x) = g'"(x) +3!x-<. One may show by induction that ( g(n)(x) = g<n->(* + (- l)n(» - )!*"" The Taylor's expansion, then, is (4) - e* Ei (- x) = g(x) + g'(x)(x - x) + (/2!)g"(x)(x - x)2 _ + (/3!)g'"(xo) (x - xo)3 + + (/«!)«< > (xo) (x - xo)" + Rn+i Received 2, September 57. This research was supported by the Robert A. Welch Foundation of Houston and the Office of Ordnance Research, Ü. S. Army.

2 88 SIMPLIFIED CALCULATION OF THE EXPONENTIAL INTEGRAL where *»+» = l ilm gin+)(x (X - X»)n+ (w + )! with x < Xi < x. The preceding equations may be combined to produce the simple formula (5) -e>ei(-x) = Fo+ Tn n=l where ( To = g(x) = -e*»ei (-x ) and the 7"s are related by the recursion relation n\ t x ~ ^\t, (x - xq)"-'"] (') 7n =- Tn-i -\-;- (n > ).» L ( xo)n J For the positive exponential product function we have (8) <r* Ei (x) = Uo+iUn»-i where () i/o = e-*» Ei (xo) and () X-Xofr. (x - Xo)n ^ *7«=-t/B_i H-;- (w > ). w L ( xo)" J Equations (5) through () are very convenient for computing the negative or positive exponential product functions where a table value is known. For ex- x Xo ample, with <, convergence to 6 figures is obtained with or xo fewer terms; convergence to 8 figures requires 6 or fewer terms. The spacing of the arguments in the accompanying table is such that this condition is fulfilled over most of the range 2.5 < x < 8. To prevent loss of figures, x x should be negative for computing e Ei ( x) and positive for computing e~x Ei (x). The accompanying table of ex Ei ( x) was computed starting with the value for x = 8, where e Ei ( x) was computed using the asymptotic expansion; each computed value became the 7o for the next lower argument. The table of e~~x Ei (x) was computed going up from the value of the function for x =.2, where Ei (x) was computed using the usual MacLaurins series, then multiplied by e~x to obtain the product function. All calculations were made on an IBM 65 computer using double precision, floating point arithmetic.

3 SIMPLIFIED CALCULATION OF THE EXPONENTIAL INTEGRAL 8 EXPONENTIAL INTEGRALS AND EXPONENTIAL PRODUCT FUNCTIONS El () -ezel(-x) -El(-x) o4o o.p i.ts o.í íleo e ^ 2.* ( ( Í ( l( ( ( O.35*827235( Í Í O.52B ( S( < ( O ( (.677« l(.7754O ( l( B Í ( O Í ( ( Í ( ( ( Í U Í ( Í Í ( Í l( S6l( Í ( l( ( J O ( J ( ( Í.5S ( ( ( (.53862{ ( ( ( ( Í ( ( ( Í ( l( l( ( ( ( ( < Í ( ( S62( Í Í Í ( ( ( ( ( ( ( ( ( ( ( { B7( ( ( ( ( ( ( Í ( J ( S786( ( ( O l( ( O ( ( ( S6634( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (O ( ( ( ( ( ( ( ( ( ( ( Í ( ( ( ( } ( ) B467Í ) Í ) Í ) ) ( ) $ ) ( ) ( ) ( ) o( ) ( ) ( ) ( ) ( ) Í ) O < ) ( ) ( ) ( ) Í ) ( ) ( ) Í ) ( ) ( ) (-) (-) (-) Í-) (-) (-) (-) (-) (-) (-) (-) ) Ó4885(-) (-) (-) O (-) (-) Í-) (-) (-) (-) (-) (-) (-) (-) (-) (-) (-)

4 SIMPLIFIED CALCULATION OF THE EXPONENTIAL INTEGRAL & 3.Î Loo V t75 * S.JO $ O 6. o * *86« «76544*675* «853772« ««32«8««6753 O *3*7**568* *6* * * * **87*327* *72 Ù *2* * *.25728* **762266* *4.2333*8* O.23473B *757.2* * (X ( ( (2.4837**5( ( *3(2.6* ( (2.3753***5(2.3*668*72365( *(2.* ( (2.5* (2.566**687( (2.7*822656( ( *64*33( ( ( *238675(2.2*8* (2.278* ( *6*77828( *75(2.2* *3(2! ( ( *723682( ( **8(2.3*26*757( *253( ( *283( ( «( ( ( ( ( ( ( ( ( *226( ( ( ( ( (2.6257**66(3.86* *(3.73*86578'( ( ( ( *6732( ( *28( ( ( *7736*6(.2*5*3366*4(.2* ( *32(.236**5523*( *5576( ( (.225* ( *46(.223*8267*6( (.25*77*22*757(.2333*28(.287* ( (.263*56*558(.2* (.2272* ( ( ( (.**56847( ( (.88438*37577( ( ( ( ( ( ( ( ( ( ( ( ( (.6*46876( ( ( ( ( ( ( ( (.46667( ( ( ( ( ( ( ( Í t * *.5657*5*88778'.83*25*23238(' (<." *l('.7*57* (' *833' B858(' Í' (' (' (' (' *5(' Í' J- O *8486(-.3557*628*3l(-.33* ( < * *8( ( B(-.2* * O.2336*65582( *3( *6*(' o( ( *22 3( Í-.5* ( ( Í-.* ( «8l(-. * Í (-. B626*48656< ( *73*(-.6*26*865762&(-. 578*66*82 7(-.5Ö85*6*827536( (-.*3358*3*(-.3682* ( *65*7( **227775Í *278756( ( *5l( l(- "D :? -) ù -i> à 2) i 2

5 SIMPLIFIED CALCULATION OF THE EXPONENTIAL INTEGRAL Co ,2.hO L io k 3.6 I3.8O 4.OO Ç (.77B ( ( O (.6B ( ( O ( ( ( ( ( ( ( O ( ( ( J ( ( (, ( O J.B ( ( ( ( ( C( ( O ( ( (.347fl2-l4734-:3( ( ( ( (.C ( (-, ( ( ( (-.23C ( ( Ü7553( (-.84Í ( ( ( (- O ri2(-, ( J ;( (_ ( (_ (_ ( ( ( ( ( ( ( ( ( ( ( ( ( ( (3, ( ( (3, ( ( ( ( (L ( ( (4, ( (4, (4! ( ( ( ( Í4.355* ( ( ( ( ( ( ( ( ( ( (5.25B ( (b, ( ( ( ( ( ('; ( (6, ( ( (6, (6 O , , O.85B O , , ' , O B /57273 O , , , , , Í ( Í (.28868S7625(' ' (' J' ' Í' (' Í' (' Í' U35237(' ( (' Ó ( ( S( Í ( (..8868B38( ( ( ( J {., ( ( ( ( ( l( ( ( Ó5276(- O.d ( ( ( Í- O (- O.3b ( ( ( ( ( (-.B ( ( U4582(-, ( (-, ? B488284(..'} ( B763(.!! 4) fj 4) I I a 5) 5) 5) I II

6 SIMPLIFIED CALCULATION OF THE EXPONENTIAL INTEGRAL k Í L I OO so oo h'm t ( ( ( O ( (-' ( ( (. O.62*527373( ( ( ( ( ( ( ( ( ( )3(-.5* *j-.53*58557(- O ( ( Í (.,*8*5*728(-, *5( Ö ( ( (.,*356*88385*58( *872( (-,* (-, ( ( (- O ( ( ( (. O ( ( ( Í ( ( ( (-.3O8C* (-, ( ( ( ( ( ' <-> * *278* *4257, * * *.7** *2535.** C , *8887, *8,246* * *58523* *3*6,*55758* *537837,368732* *74.255* * *6*8476*7.887* ** * *7 O.*6655** O ( Ü'4 5) (..643B ( ( ( ( ( ( ( ( (. O,5** ( ( ( ( ( ( ( ( ( S356(. O J Í ( *(-.*66* (. O (., ( BB(., (., ( (. O, (., (.,3B ( ( ( (. O ( (. O ( ( ( ( ( ( ( ( ( ( ( ( (- O ( ( ( ( J ( (. O O6Í-.*66352*8( (- 8) ****3(. 8) Î- 8) (- 8).35*273328(- 8) *833( (- 8).867*8573*56464(-8).5262*4*273(-.2*75*73*668(- 8) *8873(- ).8363**828678(- ) (- ) (- ) (- ) (- ) (- ) Í- ) Í- ) (- ).3*86*5(- ) *882(-) ** (-).3*53267*6756(-).2* (-).*378562*37(-).72665*832*(-).*28268* (-).25*4*7277*37*(-) (-) *5362(-).53*887553*27 (-) (-).8* *78(-) (-) ( ( i Í (-L) (- ;) (-.) *2456(-l ) (-l ) (-5) (-5) (-5).3738*3*8**87*7(-5) ( ( ( Í ( Í-.375* (-.22* l(-t.3*564725*2*8(.

7 IfcS Ô Í OO 6k OO OO OO SIMPLIFIED CALCULATION OF THE EXPONENTIAL INTEGRAL ( O, ( ( l(.2565B ( *86*6( (-.2*772*87276?-.2**55*637( ( Í.235*35685*S*(.2326*585*7836?-.2378*3325( *52828( ( ( ( O.274B87736( Í ( ( ( O q(-.2*7*5555*3( SÍ «-,3883*366â(-,8B ( (, ( *36*2?.75** , ( -.65*23*832(-.667*632*873f'.638* *845( ( Í (-.5S ( S8( O.l* <.**S8253(-.*2887B85736( t-, ( (- O,3S < < ( Í ( ( (5) (, ( ( ( T ( ) ( J ( ( ( (8) (8) (8) (8).7* (8).*8576() ().3* () *3().56833*66563().*363233(2).2* (2).375*427*737*5(2).6*8676*878875*(2) (2) *8552(2).75*727685*32(2).23* (.53*32385**7*3(.*25* (2.38*32* (2,56*3*8**7*65(24) *5(24) (24) (25) (25) ( ( **56(2.26* *5*6( *3626(2.8767*2556(28).58277*86*86(28) (2).36* (2).7756*55*763(2) * ( Í (3) (3),3533* (32) (32), (32) (3,746448( ( L / * ( O,2*** (, (,238224* /,235*883766*872? ; ( (..22*827* ( ? (.27* ?.25*335*62( O S653? ?.'.28*233776(_ (.,2*63*526656( O,22556*56*O(, (,8*62*33366ä(.65348l ( J.887**77*87(.652* ?, ( *8765*3/.75* (.72*63*5256( *8(, / *653/ */ S(..S *( **3*4(.S5*8*755656( ( (..**57* (.,*28855**87( (_ (.,373* ( ,'577345( **573768(. O, ( ? ( ( J.3* ) O.85*6*275< ),*82352*82( ) o ( ) O O5357Í ) *5657( ) ( *578? ; ( (,82753*572(,*8*655658(,288*23*667(.72587*28648? O Í *62383(.3735*338*8*( (,3*523*573*7572(.87*78*272584(.48* ( (.7*66**77535(.4886*23682(.6235*866*8*( *255*5( (,*267*7*723**( (.6*25327*2i( ^, ( *57*(.,655*2( *7*527(..* ( *( ( *882?..2*67685S*526*(..8* ( (.7** '(.,*258257*63(. O.54* ( (.,236* ?..737*653* (',26755**35887(.,76*656658/ *( *5»?.,*6*836*7285? *2833*( (..2228S (. In using this table each tabulated entry is to be multiplied by the power of given in the parentheses located just to the right of the last significant digit listed. The authors wish to thank Professor R. A. Matsen for his help and encouragement. Esso Research and Engineering Planning Engineering Division Linden, New Jersey The University of Wisconsin Naval Research Laboratory Madison, Wisconsin. See Frank E. Harris, "Tables of the exponential integral Ei(x)," MTAC, v., 57, p. -6 for a summary of these methods. The authors are grateful to Dr. Harris for the use of his material prior to publication. 2. K. Ruedenberg, C. C. J. Roothaan, & W. Jaunzemis, "Study of two-center integrals useful in calculations of molecular structure. III. A unified treatment of the hybrid, coulomb, and one-electron integrals," Jn. Chem. Phys., v. 24, 56, p M. Kotani, A. Amemiya, E. Ishiguro, & T. Kimura, Table of Molecular Integrals, Maruzen Co., Ltd., Tokyo, 55. 8) 8) -8) -) ) ) ) 2) 2) 2) 2) 2) 2) 2) 2) 2) 2 2

hp calculators HP 35s Using Algebraic Mode Calculation modes Functions of a single number in algebraic A simple example in algebraic

hp calculators HP 35s Using Algebraic Mode Calculation modes Functions of a single number in algebraic A simple example in algebraic Calculation modes Functions of a single number in algebraic A simple example in algebraic Arithmetic calculations with two numbers Another example - the area of a piece of carpet Algebraic mode in detail

More information

hp calculators HP 33S Using RPN and Algebraic Modes Calculation modes A simple example in RPN Functions of a single number in RPN

hp calculators HP 33S Using RPN and Algebraic Modes Calculation modes A simple example in RPN Functions of a single number in RPN s Calculation modes A simple example in RPN Functions of a single number in RPN A simple example in algebraic Functions of a single number in algebraic Arithmetic calculations with two numbers Another

More information

Assignment 1 (concept): Solutions

Assignment 1 (concept): Solutions CS10b Data Structures and Algorithms Due: Thursday, January 0th Assignment 1 (concept): Solutions Note, throughout Exercises 1 to 4, n denotes the input size of a problem. 1. (10%) Rank the following functions

More information

Generation of Finite Difference Formulas on Arbitrarily Spaced Grids

Generation of Finite Difference Formulas on Arbitrarily Spaced Grids MATHEMATICS OF COMPUTATION VOLUME, NUMBER OCTOBER 9, PAGES 99 Generation of Finite Difference Formulas on Arbitrarily Spaced Grids By Bengt Fornberg Abstract. Simple recursions are derived for calculating

More information

CS 170 DISCUSSION 8 DYNAMIC PROGRAMMING. Raymond Chan raychan3.github.io/cs170/fa17.html UC Berkeley Fall 17

CS 170 DISCUSSION 8 DYNAMIC PROGRAMMING. Raymond Chan raychan3.github.io/cs170/fa17.html UC Berkeley Fall 17 CS 170 DISCUSSION 8 DYNAMIC PROGRAMMING Raymond Chan raychan3.github.io/cs170/fa17.html UC Berkeley Fall 17 DYNAMIC PROGRAMMING Recursive problems uses the subproblem(s) solve the current one. Dynamic

More information

Study of Photovoltaic Cells Engineering Mathematical Model

Study of Photovoltaic Cells Engineering Mathematical Model OP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Study of Photovoltaic Cells Engineering Mathematical Model To cite this article: Jun Zhou et al 2016 OP Conf. Ser.: Mater. Sci.

More information

A General Greedy Approximation Algorithm with Applications

A General Greedy Approximation Algorithm with Applications A General Greedy Approximation Algorithm with Applications Tong Zhang IBM T.J. Watson Research Center Yorktown Heights, NY 10598 tzhang@watson.ibm.com Abstract Greedy approximation algorithms have been

More information

CS321 Introduction To Numerical Methods

CS321 Introduction To Numerical Methods CS3 Introduction To Numerical Methods Fuhua (Frank) Cheng Department of Computer Science University of Kentucky Lexington KY 456-46 - - Table of Contents Errors and Number Representations 3 Error Types

More information

IS BINARY ENCODING APPROPRIATE FOR THE PROBLEM-LANGUAGE RELATIONSHIP?

IS BINARY ENCODING APPROPRIATE FOR THE PROBLEM-LANGUAGE RELATIONSHIP? Theoretical Computer Science 19 (1982) 337-341 North-Holland Publishing Company NOTE IS BINARY ENCODING APPROPRIATE FOR THE PROBLEM-LANGUAGE RELATIONSHIP? Nimrod MEGIDDO Statistics Department, Tel Aviv

More information

Graphs of Increasing Exponential Functions

Graphs of Increasing Exponential Functions Section 5 2A: Graphs of Increasing Exponential Functions We want to determine what the graph of an exponential function y = a x looks like for all values of a > We will select a value of a > and examine

More information

Graphs of Increasing Exponential Functions

Graphs of Increasing Exponential Functions Section 5 2A: Graphs of Increasing Exponential Functions We want to determine what the graph of an exponential function y = a x looks like for all values of a > We will select a value of a > and examine

More information

For Review Purposes Only. Two Types of Definitions Closed Form and Recursive Developing Habits of Mind. Table H Output.

For Review Purposes Only. Two Types of Definitions Closed Form and Recursive Developing Habits of Mind. Table H Output. 79_CH_p-9.pdf Page 7. Two Types of Definitions Closed Form and Recursive The table below is from Exercise of Lesson.. Table H Developing You can describe a function that agrees with this table in more

More information

Partial Derivatives (Online)

Partial Derivatives (Online) 7in x 10in Felder c04_online.tex V3 - January 21, 2015 9:44 A.M. Page 1 CHAPTER 4 Partial Derivatives (Online) 4.7 Tangent Plane Approximations and Power Series It is often helpful to use a linear approximation

More information

LECTURE 0: Introduction and Background

LECTURE 0: Introduction and Background 1 LECTURE 0: Introduction and Background September 10, 2012 1 Computational science The role of computational science has become increasingly significant during the last few decades. It has become the

More information

Computational Mathematics: Models, Methods and Analysis. Zhilin Li

Computational Mathematics: Models, Methods and Analysis. Zhilin Li Computational Mathematics: Models, Methods and Analysis Zhilin Li Chapter 1 Introduction Why is this course important (motivations)? What is the role of this class in the problem solving process using

More information

FOR COMPUTING THE ROOT OF AN EQUATION. M. DOWELL and I ). JARRATT

FOR COMPUTING THE ROOT OF AN EQUATION. M. DOWELL and I ). JARRATT BIT (7), 8--74 A MODIFIED REGLA FALSI METHOD FOR COMPTING THE ROOT OF AN EQATION M. DOWELL and I ). JARRATT Abstract. The method is briefly described and the asymptotic convergence of the method investigated.

More information

MAT 22B-001: Differential Equations

MAT 22B-001: Differential Equations MAT 22B-001: Differential Equations Final Exam Solutions Note: There is a table of the Laplace transform in the last page Name: SSN: Total Score: Problem 1 (5 pts) Solve the following initial value problem

More information

Operational Semantics of Cool

Operational Semantics of Cool Operational Semantics of Cool Lecture 23 Dr. Sean Peisert ECS 142 Spring 2009 1 Status Project 3 due on Friday Project 4 assigned on Friday. Due June 5, 11:55pm Office Hours this week Fri at 11am No Class

More information

COMPUTATIONAL PROPERIES OF DSP ALGORITHMS

COMPUTATIONAL PROPERIES OF DSP ALGORITHMS COMPUTATIONAL PROPERIES OF DSP ALGORITHMS 1 DSP Algorithms A DSP algorithm is a computational rule, f, that maps an ordered input sequence, x(nt), to an ordered output sequence, y(nt), according to xnt

More information

EXTRA-CREDIT PROBLEMS ON SURFACES, MULTIVARIABLE FUNCTIONS AND PARTIAL DERIVATIVES

EXTRA-CREDIT PROBLEMS ON SURFACES, MULTIVARIABLE FUNCTIONS AND PARTIAL DERIVATIVES EXTRA-CREDIT PROBLEMS ON SURFACES, MULTIVARIABLE FUNCTIONS AND PARTIAL DERIVATIVES A. HAVENS These problems are for extra-credit, which is counted against lost points on quizzes or WebAssign. You do not

More information

Introduction to Computer Programming with MATLAB Calculation and Programming Errors. Selis Önel, PhD

Introduction to Computer Programming with MATLAB Calculation and Programming Errors. Selis Önel, PhD Introduction to Computer Programming with MATLAB Calculation and Programming Errors Selis Önel, PhD Today you will learn Numbers, Significant figures Error analysis Absolute error Relative error Chopping

More information

CS 173 [A]: Discrete Structures, Fall 2012 Homework 8 Solutions

CS 173 [A]: Discrete Structures, Fall 2012 Homework 8 Solutions CS 173 [A]: Discrete Structures, Fall 01 Homework 8 Solutions This homework contains 4 problems worth a total of 35 points. It is due on Wednesday, November 14th, at 5pm. 1 Induction Proofs With Inequalities

More information

14 Dynamic. Matrix-chain multiplication. P.D. Dr. Alexander Souza. Winter term 11/12

14 Dynamic. Matrix-chain multiplication. P.D. Dr. Alexander Souza. Winter term 11/12 Algorithms Theory 14 Dynamic Programming (2) Matrix-chain multiplication P.D. Dr. Alexander Souza Optimal substructure Dynamic programming is typically applied to optimization problems. An optimal solution

More information

Zuse's Z3 Square Root Algorithm Talk given at Fall meeting of the Ohio Section of the MAA October College of Wooster (Revised 02/02/2009)

Zuse's Z3 Square Root Algorithm Talk given at Fall meeting of the Ohio Section of the MAA October College of Wooster (Revised 02/02/2009) Zuse's Z3 Square Root Algorithm Tal given at Fall meeting of the Ohio Section of the MAA October 999 - College of Wooster (Revised 0/0/009 Abstract Brian J. Shelburne Dept of Math and Comp Sci Wittenberg

More information

hp calculators HP 50g Symbolic integration of polynomials Methods used The integration commands The substitution commands

hp calculators HP 50g Symbolic integration of polynomials Methods used The integration commands The substitution commands Methods used The integration commands The substitution commands Practice integrating polynomials symbolically Methods used The HP50g provides large selection of methods for performing symbolic integration

More information

>>> * *(25**0.16) *10*(25**0.16)

>>> * *(25**0.16) *10*(25**0.16) #An Interactive Session in the Python Shell. #When you type a statement in the Python Shell, #the statement is executed immediately. If the #the statement is an expression, its value is #displayed. #Lines

More information

Orthogonal Matching Pursuit: Recursive Function Approximation with Applications to Wavelet. Y. C. Pati R. Rezaiifar and P. S.

Orthogonal Matching Pursuit: Recursive Function Approximation with Applications to Wavelet. Y. C. Pati R. Rezaiifar and P. S. / To appear in Proc. of the 27 th Annual Asilomar Conference on Signals Systems and Computers, Nov. {3, 993 / Orthogonal Matching Pursuit: Recursive Function Approximation with Applications to Wavelet

More information

1. Fill in the right hand side of the following equation by taking the derivative: (x sin x) =

1. Fill in the right hand side of the following equation by taking the derivative: (x sin x) = 7.1 What is x cos x? 1. Fill in the right hand side of the following equation by taking the derivative: (x sin x = 2. Integrate both sides of the equation. Instructor: When instructing students to integrate

More information

Pointers & Arrays. CS2023 Winter 2004

Pointers & Arrays. CS2023 Winter 2004 Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this

More information

Chapter 7. Exercise 7A. dy dx = 30x(x2 3) 2 = 15(2x(x 2 3) 2 ) ( (x 2 3) 3 ) y = 15

Chapter 7. Exercise 7A. dy dx = 30x(x2 3) 2 = 15(2x(x 2 3) 2 ) ( (x 2 3) 3 ) y = 15 Chapter 7 Exercise 7A. I will use the intelligent guess method for this question, but my preference is for the rearranging method, so I will use that for most of the questions where one of these approaches

More information

Remark. Jacobs University Visualization and Computer Graphics Lab : ESM4A - Numerical Methods 331

Remark. Jacobs University Visualization and Computer Graphics Lab : ESM4A - Numerical Methods 331 Remark Reconsidering the motivating example, we observe that the derivatives are typically not given by the problem specification. However, they can be estimated in a pre-processing step. A good estimate

More information

Assessment of Programming Skills of First Year CS Students: Problem Set

Assessment of Programming Skills of First Year CS Students: Problem Set Assessment of Programming Skills of First Year CS Students: Problem Set Notes to the working group participants. Enclosed in this file are the three problems. They are in ascending order of difficulty.

More information

Pierre A. Humblet* Abstract

Pierre A. Humblet* Abstract Revised March 1980 ESL-P-8 0 0 GENERALIZATION OF HUFFMAN CODING TO MINIMIZE THE PROBABILITY OF BUFFER OVERFLOW BY Pierre A. Humblet* Abstract An algorithm is given to find a prefix condition code that

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

Name Homework Packet Week #12

Name Homework Packet Week #12 1. All problems with answers or work are examples. Lesson 4.4 Complete the table for each given sequence then graph each sequence on the coordinate plane. Term Number (n) Value of Term ( ) 1 2 3 4 5 6

More information

ECE608 - Chapter 16 answers

ECE608 - Chapter 16 answers ¼ À ÈÌ Ê ½ ÈÊÇ Ä ÅË ½µ ½ º½¹ ¾µ ½ º½¹ µ ½ º¾¹½ µ ½ º¾¹¾ µ ½ º¾¹ µ ½ º ¹ µ ½ º ¹ µ ½ ¹½ ½ ECE68 - Chapter 6 answers () CLR 6.-4 Let S be the set of n activities. The obvious solution of using Greedy-Activity-

More information

2 Computation with Floating-Point Numbers

2 Computation with Floating-Point Numbers 2 Computation with Floating-Point Numbers 2.1 Floating-Point Representation The notion of real numbers in mathematics is convenient for hand computations and formula manipulations. However, real numbers

More information

Introduction to TURING

Introduction to TURING Introduction to TURING Comments Some code is difficult to understand, even if you understand the language it is written in. To that end, the designers of programming languages have allowed us to comment

More information

General Terms: Algorithms, exponential integral function, multiple precision

General Terms: Algorithms, exponential integral function, multiple precision Multiple-Precision Exponential Integral and Related Functions David M. Smith Loyola Marymount University This article describes a collection of Fortran-95 routines for evaluating the exponential integral

More information

hp calculators HP 33S Using the HP Solver Part 2 Using the HP Solver Practice Example: Solving an Expression in a Program

hp calculators HP 33S Using the HP Solver Part 2 Using the HP Solver Practice Example: Solving an Expression in a Program Using the HP Solver Practice Example: Solving an Expression in a Program Practice Example: Solving a Program with Several Variables Practice Example: Using the Solver in a Program Using the HP Solver Part

More information

1 GLUE INTRODUCTION 1

1 GLUE INTRODUCTION 1 1 GLUE INTRODUCTION 1 1. Introduction. If TEX is being implemented on a microcomputer that does 32-bit addition and subtraction, but with multiplication and division restricted to multipliers and divisors

More information

Discrete Cubic Interpolatory Splines

Discrete Cubic Interpolatory Splines Publ RIMS, Kyoto Univ. 28 (1992), 825-832 Discrete Cubic Interpolatory Splines By Manjulata SHRIVASTAVA* Abstract In the present paper, existence, uniqueness and convergence properties of a discrete cubic

More information

PROGRAM EFFICIENCY & COMPLEXITY ANALYSIS

PROGRAM EFFICIENCY & COMPLEXITY ANALYSIS Lecture 03-04 PROGRAM EFFICIENCY & COMPLEXITY ANALYSIS By: Dr. Zahoor Jan 1 ALGORITHM DEFINITION A finite set of statements that guarantees an optimal solution in finite interval of time 2 GOOD ALGORITHMS?

More information

MACHINE INDEPENDENCE IN COMPILING*

MACHINE INDEPENDENCE IN COMPILING* MACHINE INDEPENDENCE IN COMPILING* Harry D. Huskey University of California Berkeley, California, USA Since 1958, there has been a substantial interest in the development of problem-oriented languages

More information

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu

More information

1.1 calculator viewing window find roots in your calculator 1.2 functions find domain and range (from a graph) may need to review interval notation

1.1 calculator viewing window find roots in your calculator 1.2 functions find domain and range (from a graph) may need to review interval notation 1.1 calculator viewing window find roots in your calculator 1.2 functions find domain and range (from a graph) may need to review interval notation functions vertical line test function notation evaluate

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Computer Simulations

Computer Simulations Computer Simulations A practical approach to simulation Semra Gündüç gunduc@ankara.edu.tr Ankara University Faculty of Engineering, Department of Computer Engineering 2014-2015 Spring Term Ankara University

More information

3.5D Graphing Rational Functions

3.5D Graphing Rational Functions 3.5D Graphing Rational Functions A. Strategy 1. Find all asymptotes (vertical, horizontal, oblique, curvilinear) and holes for the function. 2. Find the and intercepts. 3. Plot the and intercepts, draw

More information

I. Recursive Descriptions A phrase like to get the next term you add 2, which tells how to obtain

I. Recursive Descriptions A phrase like to get the next term you add 2, which tells how to obtain Mathematics 45 Describing Patterns in s Mathematics has been characterized as the science of patterns. From an early age students see patterns in mathematics, including counting by twos, threes, etc.,

More information

Algorithm Design Techniques part I

Algorithm Design Techniques part I Algorithm Design Techniques part I Divide-and-Conquer. Dynamic Programming DSA - lecture 8 - T.U.Cluj-Napoca - M. Joldos 1 Some Algorithm Design Techniques Top-Down Algorithms: Divide-and-Conquer Bottom-Up

More information

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter

More information

FUNCTIONS. L f(2)= 2. g(-3)= _ 3. f(t+l)= _. g(x) ) in for x in the outside function (in this case, f(x)).

FUNCTIONS. L f(2)= 2. g(-3)= _ 3. f(t+l)= _. g(x) ) in for x in the outside function (in this case, f(x)). FUNCTIONS To evaluate a function for a given value, simply plug the value into the function for x. Recall: (f 0 g ) (x) = f(g(x)) OR f[g(x)] read 'Jofg of x" Means to plug the inside function (in this

More information

11 and 12 Arithmetic Sequence notes.notebook September 14, 2017

11 and 12 Arithmetic Sequence notes.notebook September 14, 2017 Vocabulary: Arithmetic Sequence a pattern of numbers where the change is adding or subtracting the same number. We call this the common difference "d". Closed/Explicit Formula a formula for a sequence

More information

Numerical Aspects of Special Functions

Numerical Aspects of Special Functions Numerical Aspects of Special Functions Nico M. Temme In collaboration with Amparo Gil and Javier Segura, Santander, Spain. Nico.Temme@cwi.nl Centrum voor Wiskunde en Informatica (CWI), Amsterdam Numerics

More information

Probabilistic analysis of algorithms: What s it good for?

Probabilistic analysis of algorithms: What s it good for? Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like

More information

CS 135 Lab Assignments Week 1

CS 135 Lab Assignments Week 1 CS 135 Lab Assignments Week 1 Professor: Matt B. Pedersen This handout is the assignment that you must finish for the lab portion of the course in week 1. You must finish the assignments yourself; if you

More information

f(0.2) < 0 and f(0.3) > 0 f(1.2) > 0 and f(1.3) < 0 f(1) = 1 > 0 and f(2) 0.

f(0.2) < 0 and f(0.3) > 0 f(1.2) > 0 and f(1.3) < 0 f(1) = 1 > 0 and f(2) 0. 1. [Burden and Faires, Section 1.1 Problem 1]. Show that the following equations have at least one solution in the given intervals. a. xcosx 2x 2 +3x 1 = 0 on [0.2,0.3] and [1.2,1.3]. Let f(x) = xcosx

More information

Lesson #1: Exponential Functions and Their Inverses Day 2

Lesson #1: Exponential Functions and Their Inverses Day 2 Unit 5: Logarithmic Functions Lesson #1: Exponential Functions and Their Inverses Day 2 Exponential Functions & Their Inverses Exponential Functions are in the form. The inverse of an exponential is a

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

NEW OPTIONS LISTING #

NEW OPTIONS LISTING # NEW OPTIONS LISTING # 1150-08 June 10, 2008 Beginning on Monday, June 16, 2008 the PHLX will begin trading options on the following equity securities. PHLX will trade in all existing months and strike

More information

Attendance (2) Performance (3) Oral (5) Total (10) Dated Sign of Subject Teacher

Attendance (2) Performance (3) Oral (5) Total (10) Dated Sign of Subject Teacher Attendance (2) Performance (3) Oral (5) Total (10) Dated Sign of Subject Teacher Date of Performance:... Actual Date of Completion:... Expected Date of Completion:... ----------------------------------------------------------------------------------------------------------------

More information

The Bisection Method versus Newton s Method in Maple (Classic Version for Windows)

The Bisection Method versus Newton s Method in Maple (Classic Version for Windows) The Bisection Method versus (Classic Version for Windows) Author: Barbara Forrest Contact: baforres@uwaterloo.ca Copyrighted/NOT FOR RESALE version 1.1 Contents 1 Objectives for this Lab i 2 Approximate

More information

Our Strategy for Learning Fortran 90

Our Strategy for Learning Fortran 90 Our Strategy for Learning Fortran 90 We want to consider some computational problems which build in complexity. evaluating an integral solving nonlinear equations vector/matrix operations fitting data

More information

CD _. _. 'p ~~M CD, CD~~~~V. C ~'* Co ~~~~~~~~~~~~- CD / X. pd.0 & CD. On 0 CDC _ C _- CD C P O ttic 2 _. OCt CD CD (IQ. q"3. 3 > n)1t.

CD _. _. 'p ~~M CD, CD~~~~V. C ~'* Co ~~~~~~~~~~~~- CD / X. pd.0 & CD. On 0 CDC _ C _- CD C P O ttic 2 _. OCt CD CD (IQ. q3. 3 > n)1t. n 5 L n q"3 +, / X g ( E 4 11 " ') $ n 4 ) w Z$ > _ X ~'* ) i 1 _ /3 L 2 _ L 4 : 5 n W 9 U~~~~~~ 5 T f V ~~~~~~~~~~~~ (Q ' ~~M 3 > n)1 % ~~~~V v,~~ _ + d V)m X LA) z~~11 4 _ N cc ', f 'd 4 5 L L " V +,

More information

Objectives and Homework List

Objectives and Homework List MAC 1140 Objectives and Homework List Each objective covered in MAC1140 is listed below. Along with each objective is the homework list used with MyMathLab (MML) and a list to use with the text (if you

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

Many logarithms may be calculated by converting them to exponential form. Suppose we want to calculate the value of log. log 16?

Many logarithms may be calculated by converting them to exponential form. Suppose we want to calculate the value of log. log 16? Question : How do you evaluate a arithm? Many arithms may be calculated by converting them to exponential form. Suppose we want to calculate the value of arithmic form, 16. Start by writing this expression

More information

Introduction to Programming in C Department of Computer Science and Engineering. Lecture No. #23 Loops: Precedence of Operators

Introduction to Programming in C Department of Computer Science and Engineering. Lecture No. #23 Loops: Precedence of Operators Introduction to Programming in C Department of Computer Science and Engineering Lecture No. #23 Loops: Precedence of Operators This one more concept that we have to understand, before we really understand

More information

x n x n stepnumber k order r error constant C r+1 1/2 5/12 3/8 251/720 abs. stab. interval (α,0) /11-3/10

x n x n stepnumber k order r error constant C r+1 1/2 5/12 3/8 251/720 abs. stab. interval (α,0) /11-3/10 MATH 573 LECTURE NOTES 77 13.8. Predictor-corrector methods. We consider the Adams methods, obtained from the formula xn+1 xn+1 y(x n+1 y(x n ) = y (x)dx = f(x,y(x))dx x n x n by replacing f by an interpolating

More information

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0. Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Design and Analysis of Algorithms CSE 5311 Lecture 8 Sorting in Linear Time Junzhou Huang, Ph.D. Department of Computer Science and Engineering CSE5311 Design and Analysis of Algorithms 1 Sorting So Far

More information

Chapter 4: Non-Parametric Techniques

Chapter 4: Non-Parametric Techniques Chapter 4: Non-Parametric Techniques Introduction Density Estimation Parzen Windows Kn-Nearest Neighbor Density Estimation K-Nearest Neighbor (KNN) Decision Rule Supervised Learning How to fit a density

More information

Natasha S. Sharma, PhD

Natasha S. Sharma, PhD Revisiting the function evaluation problem Most functions cannot be evaluated exactly: 2 x, e x, ln x, trigonometric functions since by using a computer we are limited to the use of elementary arithmetic

More information

The divide-and-conquer paradigm involves three steps at each level of the recursion: Divide the problem into a number of subproblems.

The divide-and-conquer paradigm involves three steps at each level of the recursion: Divide the problem into a number of subproblems. 2.3 Designing algorithms There are many ways to design algorithms. Insertion sort uses an incremental approach: having sorted the subarray A[1 j - 1], we insert the single element A[j] into its proper

More information

Efficient implementation of elementary functions in the medium-precision range

Efficient implementation of elementary functions in the medium-precision range Efficient implementation of elementary functions in the medium-precision range Fredrik Johansson (LFANT, INRIA Bordeaux) 22nd IEEE Symposium on Computer Arithmetic (ARITH 22), Lyon, France, June 2015 1

More information

Classes of Real Numbers 1/2. The Real Line

Classes of Real Numbers 1/2. The Real Line Classes of Real Numbers All real numbers can be represented by a line: 1/2 π 1 0 1 2 3 4 real numbers The Real Line { integers rational numbers non-integral fractions irrational numbers Rational numbers

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

Biostatistics 615/815 - Lecture 2 Introduction to C++ Programming

Biostatistics 615/815 - Lecture 2 Introduction to C++ Programming Biostatistics 615/815 - Lecture 2 Introduction to C++ Programming Hyun Min Kang September 6th, 2012 Hyun Min Kang Biostatistics 615/815 - Lecture 2 September 6th, 2012 1 / 31 Last Lecture Algorithms are

More information

c. Show that each unit fraction, with, can be written as a sum of two or more different unit fractions.

c. Show that each unit fraction, with, can be written as a sum of two or more different unit fractions. Illustrative Mathematics A-APR Egyptian Fractions II Alignments to Content Standards Alignment: A-APR.D.6 Tags This task is not yet tagged. Ancient Egyptians used unit fractions, such as and, to represent

More information

2nd Year Computational Physics Week 1 (experienced): Series, sequences & matrices

2nd Year Computational Physics Week 1 (experienced): Series, sequences & matrices 2nd Year Computational Physics Week 1 (experienced): Series, sequences & matrices 1 Last compiled September 28, 2017 2 Contents 1 Introduction 5 2 Prelab Questions 6 3 Quick check of your skills 9 3.1

More information

Fast Computation of the n-th Root in Quad-double Arithmetic Using a Fourth-order Iterative Scheme

Fast Computation of the n-th Root in Quad-double Arithmetic Using a Fourth-order Iterative Scheme [DOI: 10.2197/ipsjjip.21.315] Technical Note Fast Computation of the n-th Root in Quad-double Arithmetic Using a Fourth-order Iterative Scheme Tsubasa Saito 1,a) Received: August 22, 2012, Accepted: December

More information

Massachusetts Institute of Technology Department of Mechanical Engineering

Massachusetts Institute of Technology Department of Mechanical Engineering Massachusetts Institute of Technology Department of Mechanical Engineering 2.003J/1.053J Dynamics & Control I Fall 2007 Homework 5 Solution Problem 5.1 : Calculating the factorial of non-negative integer

More information

Inference rule for Induction

Inference rule for Induction Inference rule for Induction Let P( ) be a predicate with domain the positive integers BASE CASE INDUCTIVE STEP INDUCTIVE Step: Usually a direct proof Assume P(x) for arbitrary x (Inductive Hypothesis),

More information

COP 4516: Math for Programming Contest Notes

COP 4516: Math for Programming Contest Notes COP 4516: Math for Programming Contest Notes Euclid's Algorithm Euclid's Algorithm is the efficient way to determine the greatest common divisor between two integers. Given two positive integers a and

More information

COMPUTER SCIENCE TRIPOS

COMPUTER SCIENCE TRIPOS CST.2010.1.1 COMPUTER SCIENCE TRIPOS Part IA NATURAL SCIENCES TRIPOS Part IA (Paper CS/1) POLITICS, PSYCHOLOGY, AND SOCIOLOGY TRIPOS Part I (Paper 7) Monday 31 May 2010 1.30 to 4.30 COMPUTER SCIENCE Paper

More information

On-line multiplication in real and complex base

On-line multiplication in real and complex base On-line multiplication in real complex base Christiane Frougny LIAFA, CNRS UMR 7089 2 place Jussieu, 75251 Paris Cedex 05, France Université Paris 8 Christiane.Frougny@liafa.jussieu.fr Athasit Surarerks

More information

List Ranking. Chapter 4

List Ranking. Chapter 4 List Ranking Chapter 4 Problem on linked lists 2-level memory model List Ranking problem Given a (mono directional) linked list L of n items, compute the distance of each item from the tail of L. Id Succ

More information

S Postgraduate Course on Signal Processing in Communications, FALL Topic: Iteration Bound. Harri Mäntylä

S Postgraduate Course on Signal Processing in Communications, FALL Topic: Iteration Bound. Harri Mäntylä S-38.220 Postgraduate Course on Signal Processing in Communications, FALL - 99 Topic: Iteration Bound Harri Mäntylä harri.mantyla@hut.fi ate: 11.10.1999 1. INTROUCTION...3 2. ATA-FLOW GRAPH (FG) REPRESENTATIONS...4

More information

arxiv: v1 [math.na] 20 Jun 2014

arxiv: v1 [math.na] 20 Jun 2014 Iterative methods for the inclusion of the inverse matrix Marko D Petković University of Niš, Faculty of Science and Mathematics Višegradska 33, 18000 Niš, Serbia arxiv:14065343v1 [mathna 20 Jun 2014 Miodrag

More information

Chapter 3 Dynamic programming

Chapter 3 Dynamic programming Chapter 3 Dynamic programming 1 Dynamic programming also solve a problem by combining the solutions to subproblems. But dynamic programming considers the situation that some subproblems will be called

More information

ELECTROMAGNETIC diffraction by perfectly conducting

ELECTROMAGNETIC diffraction by perfectly conducting IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 47, NO. 11, NOVEMBER 1999 1697 Oblique Scattering by a Pair of Conducting Half Planes: TM Case Jong-Won Yu and Noh-Hoon Myung Abstract An exact series

More information

Dynamic Programming. Design and Analysis of Algorithms. Entwurf und Analyse von Algorithmen. Irene Parada. Design and Analysis of Algorithms

Dynamic Programming. Design and Analysis of Algorithms. Entwurf und Analyse von Algorithmen. Irene Parada. Design and Analysis of Algorithms Entwurf und Analyse von Algorithmen Dynamic Programming Overview Introduction Example 1 When and how to apply this method Example 2 Final remarks Introduction: when recursion is inefficient Example: Calculation

More information

Number Systems. TA: Mamun. References: Lecture notes of Introduction to Information Technologies (ITEC 1011) by Dr Scott MacKenzie

Number Systems. TA: Mamun. References: Lecture notes of Introduction to Information Technologies (ITEC 1011) by Dr Scott MacKenzie Number Systems TA: Mamun References: Lecture notes of Introduction to Information Technologies (ITEC 1011) by Dr Scott MacKenzie Common Number Systems System Base Symbols Decimal 10 0, 1, 9 Binary 2 0,

More information

List Ranking. Chapter 4

List Ranking. Chapter 4 List Ranking Chapter 4 Problem on linked lists 2-level memory model List Ranking problem Given a (mono directional) linked list L of n items, compute the distance of each item from the tail of L. Id Succ

More information

12 Dynamic Programming (2) Matrix-chain Multiplication Segmented Least Squares

12 Dynamic Programming (2) Matrix-chain Multiplication Segmented Least Squares 12 Dynamic Programming (2) Matrix-chain Multiplication Segmented Least Squares Optimal substructure Dynamic programming is typically applied to optimization problems. An optimal solution to the original

More information

Basics of Java Programming variables, assignment, and input

Basics of Java Programming variables, assignment, and input Basics of Java Programming variables, assignment, and input CSC 1051 Algorithms and Data Structures I Dr. Mary-Angela Papalaskari Department of Computing Sciences Villanova University Course website: www.csc.villanova.edu/~map/1051/

More information

DIFFERENTIAL. Tomáš Oberhuber, Atsushi Suzuki, Jan Vacata, Vítězslav Žabka

DIFFERENTIAL. Tomáš Oberhuber, Atsushi Suzuki, Jan Vacata, Vítězslav Žabka USE OF FOR Tomáš Oberhuber, Atsushi Suzuki, Jan Vacata, Vítězslav Žabka Faculty of Nuclear Sciences and Physical Engineering Czech Technical University in Prague Mini workshop on advanced numerical methods

More information

Lecture 2: Variables & Assignments

Lecture 2: Variables & Assignments http://www.cs.cornell.edu/courses/cs1110/2018sp Lecture 2: Variables & Assignments (Sections 2.1-2.3,2.5) CS 1110 Introduction to Computing Using Python [E. Andersen, A. Bracy, D. Gries, L. Lee, S. Marschner,

More information

Sequences and Series. Copyright Cengage Learning. All rights reserved.

Sequences and Series. Copyright Cengage Learning. All rights reserved. Sequences and Series Copyright Cengage Learning. All rights reserved. 12.3 Geometric Sequences Copyright Cengage Learning. All rights reserved. 2 Objectives Geometric Sequences Partial Sums of Geometric

More information