Complex roots, Programming Languages

Assignment Help:

We will be assuming here that our roots are of the form, in this case,

r1,2 = l+ mi

If we take the first root we'll find the following solution.

xl+ mi

It is a problem as we don't want complex solutions, we only need real solutions. We can eliminate it by recalling,

xr =eIn xr = er In x

Plugging the root in this provides,

xl+ mi = e(l+ mi) In x

1393_complex root.png

= el In x e mi In x

= xl cos(m In x) + i xl sin(m In x)

Remember that we had to use Euler formula as well to find to the final step. This time, as we've done every other time we've noticed solutions as it we can take the real part and the imaginary part and utilize those for our two solutions.

Therefore, in the case of complex roots the general solution will be as,

 y(x) = c1 xl cos (m ln x ) + c2 xl sin (m ln x ) = xl (c1 cos (m ln x ) + c2 sin (m ln x ))

Once again we can notice why we required x>0.


Related Discussions:- Complex roots

Type of linear programming - dea, Type of Linear Programming - DEA The ...

Type of Linear Programming - DEA The Express Dry Cleaners currently has four locations in the Chicago area and willing be opening the fifth in the very near future.  Mr. James,

Padovan string, Padovan String Problem Description A Padovan string...

Padovan String Problem Description A Padovan string P(n) for a natural number n is defined as: P(0) = 'X' P(1) = 'Y' P(2) = 'Z' P(n) = P(n-2) + P(n-3), n

Define a procedure that takes three numbers as arguments, Translate the fol...

Translate the following formula into a prefix form expression in Scheme: Question 2 Define a procedure that takes three numbers as arguments and returns the sum of the squ

What are program visible and invisible resisters, What are program visible ...

What are program visible and invisible resisters? A4) Program visible is those registers that can be programmed by the users, or which are customizable, whereas Program invisible

Project 8-1: count alligators and clone sheep, Operation • This application...

Operation • This application uses an Alligator class that implements a Countable interface to display Alligator objects as shown above. • This application uses a Sheep class that i

Discuss on unix kernel components, Question 1 Discuss on UNIX kernel co...

Question 1 Discuss on UNIX kernel components 2 Explain process creation and process termination 3 When do a Deadlock occur? What are the Necessary Conditions for Deadlock

Pl sql project, create a small database for a company, require at least 4 t...

create a small database for a company, require at least 4 tables. also, have 4 business report, oracle built-in function, 5 string, 5 number or math functions, 5 date and time func

Higher order differential equations, We'll start this section off with the ...

We'll start this section off with the material which most text books that will cover in this section. We will take the matter from the Second Order chapter and expand this out to n

Shell script to print the name of file that has maximum size, Normal 0 ...

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4

Access modifiers, Access Modifiers Convenience Modifiers or we can say (Acc...

Access Modifiers Convenience Modifiers or we can say (Access Specifies) identifies as the opportunity of accessibility of an Item and its associates. All C# kinds and kind associat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd