Solve the given initial value problem, Programming Languages

Assignment Help:

Solve the following initial value problem

y(3) - 5y'' - 22y' + 56 y= 0;       y(0) = 1;           y'(0) = -2;         y''(0) = -4

Solution:

r3 - 5r2 - 22r + 56 = (r + 4)(r - 2)(r - 7) = 0

= r1 = -4, r2 = 4 and r3 = 7

Therefore we have three real distinct roots now and thus the general solution is,

y(t) = c1 e-4t + c2 ex2t + c3 ex7t

Differentiating a couple of times and applying the initial conditions provides the subsequent system of equations that we'll require solving in order to get the coefficients.

1 = y(0) = c1 + c2 + c3

-2 = y'(0) = - 4c1 + 2 c2 + 7 c3

-4 = y''(0) = 16 c1 + 4 c2 + 49 c3

After solving all these equations we get:

c1 = 14/33

c2 = 13/15

c3 = -(16/55)

Then the actual solution is,

 y(t) = (14/33) e-4t + (13/15) ex2t -(16/55)ex7t

Therefore, outside of requiring to solve a cubic polynomial that we left the details for you to verify and requiring to solve a system of 3 equations to get the coefficients that we also left for you to fill the details, the work currently is pretty much identical to the work we did in solving a 2nd order initial value problem.

Since the initial condition work is identical to work which we should be extremely familiar with to that point with the exception which it involved solving larger systems we're going to not bother with solving initial value problems for the rest of the examples. The basic point of this section is the new concepts involved in getting the general solution to the differential equation anyway and thus we'll concentrate on this for the remaining illustrations.

Also note that we'll not be demonstrating very much work in solving the characteristic polynomial. Here we are using computational aids and would encourage you to do similar here.  Solving these higher degree polynomials is simply too much work and would obscure the point of these illustrations.


Related Discussions:- Solve the given initial value problem

Fileless document and encryption(stegnography), code for using tree view co...

code for using tree view control and fill it with database

Project , You get a contract to implement a simple Java application that pr...

You get a contract to implement a simple Java application that process NBA team roster : your application has to read the NBA team roster from a text file and then print each playe

Assembly Language Programming, Complete the following program to move a val...

Complete the following program to move a value of 0xFFH to PORTB LIST p=18f4550 #include org 0x0000 movlw 0x00 _________ movlw 0xFF movwf PORTB end .

Write a program to list the intermediate films sandwiched, We want a progra...

We want a program, a logic, we can list the intermediate films sandwiched between the 2 tapes (from - to) that indicates the user. example: From to

C program with creation of child process using fork system, Problem 6. ...

Problem 6. Demonstrate how and when can you use the commands- vi, cat, chmod, grep, man, pwd, ps, kill, mkdir, rm demonstrating how and when the above 10 commands can be

Recursive decent parser, Given grammar Grammar M following: 1 - - > b...

Given grammar Grammar M following: 1 - - > begin end 2 - - > 3 - - > 4 - - > ? 5 - - > Id : = ; 6 - - > read ( ) ; 7 - - > write ( )

Computer games development, Lazytown Constabulary are concerned that young ...

Lazytown Constabulary are concerned that young people in the town are unaware of the sorts of crime that they might encounter in their daily lives and are concerned that they may b

Write a program that lets the user play an adventure game, Let the player (...

Let the player (denoted U in the diagram below) navigate around the board until she wins the game by finding the exit or is killed by a monster. A player begins the game with a sli

(l)unix commands, 1. Logon to Linux. 2. Create a directory ...

1. Logon to Linux. 2. Create a directory "Unix" under your home directory. Command(s): …………………………………………. 3. Create four sub-directories bin, conf, docs

Program to finds central individuals in arbitrary networks, Identifying the...

Identifying the Central Individual in a Social Network 1. Introduction You have just been hired by a social networking company! The division you are working in is particul

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd