# Register now to access 7 million high quality study materials (What's Course Hero?) Course Hero is the premier provider of high quality online educational resources. With millions of study documents, online tutors, digital flashcards and free courseware, Course Hero is helping students learn more efficiently and effectively. Whether you're interested in exploring new subjects or mastering key topics for your next exam, Course Hero has the tools you need to achieve your goals.

1 Page

### linde1

Course: CAP 94, Fall 2009
School: UNF
Rating:

Word Count: 324

#### Document Preview

THIS /* LITTLE PACKAGE SOLVES FIRST ORDER LINEAR ORDINARY DIFFERENTIAL EQUATIONS SUBJECT TO A BOUNDARY CONDITION (B.C.) AT AN INITIAL POINT THE CALLING PROCEDURE IS IVPSOL(DIFFEQ,Y,X,A,BCEQ); WHERE DIFFEQ IS THE DIFFERENTIAL EQUATION TO BE SOLVED (E.G.: X*'DIFF(Y,X)+2*Y=1) Y IS THE DEPENDENT VARIABLE X IS THE INDEPENDENT VARIABLE A IS...

Register Now

#### Unformatted Document Excerpt

Coursehero >> Florida >> UNF >> CAP 94

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.
THIS /* LITTLE PACKAGE SOLVES FIRST ORDER LINEAR ORDINARY DIFFERENTIAL EQUATIONS SUBJECT TO A BOUNDARY CONDITION (B.C.) AT AN INITIAL POINT THE CALLING PROCEDURE IS IVPSOL(DI...
Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

UNF - CAP - 4630
/* -*- Macsyma -*- */EVAL_WHEN(BATCH,TTYOFF:TRUE)\$/*ASB;DECLIN 612:28pm Saturday, 13 March 1982 Removed GETSYMBOL and PUTSYMBOL to GENUT. Not recompiled.7:42pm Saturday, 29 May 1982 Added a DIAGEVAL_VERSION for this file.1:18pm Saturday,
UNF - CAP - 94
/* -*- Macsyma -*- */EVAL_WHEN(BATCH,TTYOFF:TRUE)\$/*ASB;DECLIN 612:28pm Saturday, 13 March 1982 Removed GETSYMBOL and PUTSYMBOL to GENUT. Not recompiled.7:42pm Saturday, 29 May 1982 Added a DIAGEVAL_VERSION for this file.1:18pm Saturday,
UNF - CAP - 4630
TTYOFF:TRUE\$/* (c) Copyright 1981 Massachusetts Institute of Technology */DYNAMALLOC:TRUE\$IEQNPRINT:TRUE\$IEQN([ARGLIST]):= IF LENGTH(ARGLIST)&lt;2 THEN ERROR(&quot;IEQN requires at least two arguments&quot;) ELSEIEQN1(ARGLIST[1], ARGLIST[2],IF LE
UNF - CAP - 94
TTYOFF:TRUE\$/* (c) Copyright 1981 Massachusetts Institute of Technology */DYNAMALLOC:TRUE\$IEQNPRINT:TRUE\$IEQN([ARGLIST]):= IF LENGTH(ARGLIST)&lt;2 THEN ERROR(&quot;IEQN requires at least two arguments&quot;) ELSEIEQN1(ARGLIST[1], ARGLIST[2],IF LE
UNF - CAP - 4630
SINNPIFLAG:TRUE\$COSNPIFLAG:TRUE\$REMFUN1(FUN,EXP):=SCANMAP(LAMBDA([Q],DELFUN1(FUN,Q),EXP)\$DELFUN1(FUN,EXP):=IF NOT ATOM(EXP) AND INPART(EXP,0) = FUN THEN FIRST(ARGS(EXP) ELSE EXP\$REMFUNN1(FUN,EXP):=SCANMAP(LAMBDA([Q],DELFUNN1(FUN,Q),EXP)\$DE
UNF - CAP - 94
SINNPIFLAG:TRUE\$COSNPIFLAG:TRUE\$REMFUN1(FUN,EXP):=SCANMAP(LAMBDA([Q],DELFUN1(FUN,Q),EXP)\$DELFUN1(FUN,EXP):=IF NOT ATOM(EXP) AND INPART(EXP,0) = FUN THEN FIRST(ARGS(EXP) ELSE EXP\$REMFUNN1(FUN,EXP):=SCANMAP(LAMBDA([Q],DELFUNN1(FUN,Q),EXP)\$DE
UNF - CAP - 4630
/* GENERAL DIFFERENTIATION SIMPLIFICATION: DIFF(E,X,N), FORN SYMBOLIC */GENDIFF(E,X,N):= IF NUMBERP(N)THEN IF INTEGERP(N) THEN DIFF(E,X,N) ELSE (PRINT (&quot;FRACTIONAL DERIVATIVES NOT SUPPORTED&quot;),'DIFF(E,X,N) ELSE IF FREEOF(X,E) THEN 0 ELSE IF ATOM(
UNF - CAP - 94
/* GENERAL DIFFERENTIATION SIMPLIFICATION: DIFF(E,X,N), FORN SYMBOLIC */GENDIFF(E,X,N):= IF NUMBERP(N)THEN IF INTEGERP(N) THEN DIFF(E,X,N) ELSE (PRINT (&quot;FRACTIONAL DERIVATIVES NOT SUPPORTED&quot;),'DIFF(E,X,N) ELSE IF FREEOF(X,E) THEN 0 ELSE IF ATOM(
UNF - CAP - 4630
/* the following routines compute inverses and adjoints of matrices *//* if ratmx is false [the default] then the elements will not be convertedto cre-form */adjoint(mat):= block([adj,n], n:length(mat), adj:ident(n), if n#1 then
UNF - CAP - 94
/* the following routines compute inverses and adjoints of matrices *//* if ratmx is false [the default] then the elements will not be convertedto cre-form */adjoint(mat):= block([adj,n], n:length(mat), adj:ident(n), if n#1 then
UNF - CAP - 4630
TTYOFF: NOLABELS: TRUE \$%SIGNUMDISTRIBUTE:%ABSDISTRIBUTE:FALSE \$%ELIGIBLE:'[SINH,ATAN,TANH,ATANH,ERF,ASINH,CSCH,COTH,ASIN] \$UNITSTEP(U) := (1+SIGNUM(U)/2 \$UNITRAMP(U) := (U+ABS(U)/2 \$MATCHDECLARE([UTRUE, VTRUE], TRUE, EVENINTEGER, EVENINTEGERP
UNF - CAP - 94
TTYOFF: NOLABELS: TRUE \$%SIGNUMDISTRIBUTE:%ABSDISTRIBUTE:FALSE \$%ELIGIBLE:'[SINH,ATAN,TANH,ATANH,ERF,ASINH,CSCH,COTH,ASIN] \$UNITSTEP(U) := (1+SIGNUM(U)/2 \$UNITRAMP(U) := (U+ABS(U)/2 \$MATCHDECLARE([UTRUE, VTRUE], TRUE, EVENINTEGER, EVENINTEGERP
UNF - CAP - 4630
/* recursion relation for modified bessel function k */kn(x,n):= block(if n=0 then return(block(karray[0]:k0(x),karray[0]), if n=1 then return(block(karray[1]:k1(x),karray[1]), karray[n]:2.*(n-1)/x*kn(x,n-1)+kn(x,n
UNF - CAP - 94
/* recursion relation for modified bessel function k */kn(x,n):= block(if n=0 then return(block(karray[0]:k0(x),karray[0]), if n=1 then return(block(karray[1]:k1(x),karray[1]), karray[n]:2.*(n-1)/x*kn(x,n-1)+kn(x,n
UNF - CAP - 4630
/* -*-MACSYMA-*- Simple programs for the numerical solution of ordinary differential equations. A better implementation of this stuff is NDIFFQ. -GJC *//* The main use for these RUNGE-KUTTA formulas is to get starting values for p
UNF - CAP - 94
/* -*-MACSYMA-*- Simple programs for the numerical solution of ordinary differential equations. A better implementation of this stuff is NDIFFQ. -GJC *//* The main use for these RUNGE-KUTTA formulas is to get starting values for p
UNF - CAP - 4630
?PUTPROP(?QUOTE(gcdivide),?FILESTRIP(?CDR([functs,lisp,dsk,share]),?QUOTE(?AUTOLOAD);det&amp; det(m):=BLOCK([n],LOCAL(a), n:LENGTH(m), IF n &lt; 2 THEN ERROR (&quot;Improper argument:&quot;,m), ARRAY(a,n,n), FOR i THRU n DO FOR j THRU n DO a[i,j]
UNF - CAP - 94
?PUTPROP(?QUOTE(gcdivide),?FILESTRIP(?CDR([functs,lisp,dsk,share]),?QUOTE(?AUTOLOAD);det&amp; det(m):=BLOCK([n],LOCAL(a), n:LENGTH(m), IF n &lt; 2 THEN ERROR (&quot;Improper argument:&quot;,m), ARRAY(a,n,n), FOR i THRU n DO FOR j THRU n DO a[i,j]
UNF - CDA - 6506
Computer Network Architectures Syllabus Spring 1999 Instructor: Ralph M. Butler Office: 15/3223 Office hours: on homepage: http:/www.unf.edu/~rbutler E-mail: rbutler Text: TCP/IP Illu
UNF - CIS - 4930
Use my SimpleLabel which I created and TextLabel, et.al.from the Exploring Java book.In the ExploringJava dir, get into the beans subdir, and: - copy TestBeans.* to . (i.e. to the beans subdir) note that this pgm uses magicbeans.*
UNF - CIS - 4930
Recommended Reading Outline for IBM Smalltalk (and VisualAge) on-line Development Guide These are the topics I suggest you read in the Development Guide. If I leave a topic out, I am suggesting you skip it. I have included some notes and exercises. I
UNF - CIS - 4930
Object Oriented Programming in Smalltalk Summer Cross-Term 1996 TR 8:00 - 9:40 p.m.Introductory Text: None. Software: IBM Smalltalk 2.0, installed in student labs and available for home use. * Language Reference: Included with software. Advanced Tex
UNF - CIS - 4930
Smalltalk Best Practice Patterns Volume 1: CodingKent Beck First Class Software, Inc.Draft for comment only. Copyright (c) 1995, 1996, Kent Beck, All rights reserved. Please send comments to: voice: +1.408.338.4649 fax: +1.408.338.1115 email: 70761
UNF - COP - 2220
-List of directories and files for CBD 3e code:READ_ME.txtline_cnt.txtls_CFR.txtch01:00_READ.txt 04_wreck.c 08_circl.c 12_hello.c exer_07.c01_hello.c 05_prn_l.c 09_sum.c 13_gcd.c exer_12.c02_hello.c 0
UNF - COP - 6570
Software ToolsProject 3 Summer 1999 turnin code: rbutler.cop6570.proj3 Re-do the Perl SIC program as a CGI program that can be invoked from a web page. There should be two boxes on the web pag
UNF - COP - 6570
Software ToolsSyllabus Summer 1999 Instructor: Ralph M. Butler Office: 15/3223 Office hours: on homepage: http:/www.unf.edu/~rbutler E-mail: rbutler Texts:Perl in a Nutshell by Siever, et
UNF - COP - 6570
Software ToolsProject 2 Summer 1999 turnin code: rbutler.cop6570.proj2 Using the opcodes provided below, write a Perl program that performs pass 1 of a SIC assembler program. The name of a file cont
UNF - COP - 6570
Programming: cc/ld / lint (c+/g+) as cb/indent unifdef error strip emacs Most of the items below have &quot;demo&quot; dirs in the public dir. ksh / csh / shprintenv (set) (Csh specific)echobasenameexprfalse/
UNF - COP - 2220
-Line counts for CBD 3e code: 55 ./READ_ME.txt 23 ./ch01/00_READ.txt 11 ./ch01/01_hello.c 8 ./ch01/02_hello.c 8 ./ch01/03_hello.c 17 ./ch01/04_wreck.c 10 ./ch01/05_prn_l.c 11 ./ch01/06_sum
UNF - CH - 2220
-CHAPTER 3: FLOW OF CONTROLThe code in this directory is related to the materialin Chapter 3 in C By Dissection, 3rd edition, Al Kelley and Ira Pohl, Addison-Wesley, Menlo Park, CA, 1996-Files ending in .c contain either C
UNF - CH - 05
-CHAPTER 5: CHARACTER PROCESSINGThe code in this directory is related to the materialin Chapter 5 in C By Dissection, 3rd edition, Al Kelley and Ira Pohl, Addison-Wesley, Menlo Park, CA, 1996-Files ending in .c contain eit
UNF - CH - 2220
-CHAPTER 5: CHARACTER PROCESSINGThe code in this directory is related to the materialin Chapter 5 in C By Dissection, 3rd edition, Al Kelley and Ira Pohl, Addison-Wesley, Menlo Park, CA, 1996-Files ending in .c contain eit
UNF - COP - 2220
-APPENDIX B: THE PREPROCESSORThe code in this directory is related tothe material in Appenix B in C By Dissection, 3rd edition, Al Kelley and Ira Pohl, Addison-Wesley, Menlo Park, CA, 1996-Files ending in .c contain either
UNF - CH - 11
-EXERCISE 11 on page 452:The program in this directory gets you started on this exercise.Begin by compiling and executing the program so you understandits effects. To do this exercise correctly, you must makemodifications to the program.
UNF - CH - 2220
-EXERCISE 11 on page 452:The program in this directory gets you started on this exercise.Begin by compiling and executing the program so you understandits effects. To do this exercise correctly, you must makemodifications to the program.
UNF - CH - 13
-EXERCISE 13 on page 452:Writing an iterative version of the function count()is straightforward. Here, we provide a program thatwill test your function by counting elements in alinked list of word obtained from a file.First compile a
UNF - CH - 2220
-EXERCISE 13 on page 452:Writing an iterative version of the function count()is straightforward. Here, we provide a program thatwill test your function by counting elements in alinked list of word obtained from a file.First compile a
UNF - CH - 2220
-EXERCISE 7 on page 284POSSIBLE TROUBLE on Sun machinesC/C+ systems on Sun Microsystems machines often use theidentifier sun as a symbolic constant. When this occurs,the programmer cannot use sun as an identifier in astraightforward
UNF - CH - 18
-EXERCISE 18 on page 326This is a C+ program that exercises the circular-shiftfunction shift(). Although the function shift() itselfis straighforward, the function main() uses some advancedideas.In main(), we use the function shift()
UNF - CH - 2220
-EXERCISE 18 on page 326This is a C+ program that exercises the circular-shiftfunction shift(). Although the function shift() itselfis straighforward, the function main() uses some advancedideas.In main(), we use the function shift()
UNF - CH - 14
-FIND A FORTUNE: Exercise 8 on page 533In the 1980s, when Berkeley UNIX was prevalent, the fortune commandcould be found on most, but not all, UNIX systems. Today, BerkeleyUNIX is much less prevalent than it was, and probably less than hal
UNF - CH - 2220
-FIND A FORTUNE: Exercise 8 on page 533In the 1980s, when Berkeley UNIX was prevalent, the fortune commandcould be found on most, but not all, UNIX systems. Today, BerkeleyUNIX is much less prevalent than it was, and probably less than hal
UNF - COP - 6616
The necessary files to submit for each project includes your Cprogram(s), supporting files (e.g.*.h files), and a makefile.I should simply be able to type &quot;make&quot; and have the project bebuilt; make builds the first target in a makefile by default.
UNF - CDA - 6506
Computer Network Architectures Spring 1999 Project 3 turnin id: rbutler.cda6506.proj3 This project requires you to write two C programs, a client and server, which
UNF - COP - 2220
C ProgrammingLecture 11The switch Statementa Theswitch statement is a multiway conditional statement generalizing the if-else statement.switchswitch (expression) { case constant1: statement . statement case constant_2: statement . statement
UNF - COP - 2220
UNF - COP - 2220
C ProgrammingLecture 8 Call by Reference ScopeCall-by-ReferenceaFor a C function to &quot;effect&quot; (read as &quot;imitate&quot;) call-byreference: Pointers must be used in the parameter list in the function definition. When the function is called, addresses
UNF - COP - 2220
Menu Functionmenu ()Display MenuGet ChoiceIf Choice &lt; 'A' or Choice &gt; 'D' FTDisplay Error MessageIf Choice &lt; 'A' or Choice &gt; 'D' F Return ChoiceT
UNF - COP - 2220
This is in Directory 1.
UNF - COP - 2220
TRANSFERRING FILES TO/FROM THE IBM MAINFRAME IN THE LAB
UNF - CH - 2220
The programs in this chapter run without modification runs as presentedin the text with the exception of Program 8. It needs to be modified toinclude defined constants for TRUE and FALSE on the Borland compiler.Program 5 has been combined with pro
UNF - CH - 2220
The programs in this chapter run without modification runs as presented in the text. Program 2-8 is not included because it is only documentation.1. P2-1.C The greeting program 2. P2-2.C Print sum of three numbers3. P2-3.C Memory constants4. P2
UNF - CH - 2220
The programs in this chapter run without modification runs as presentedin the text. Programs 1 and 11 are code fragments that are not included.1.P9-01.C Demonstrate use of pointers2.P9-02.C Fun with pointers3.P9-03.C Add two numbers using
UNF - CH - 2220
The programs in this chapter run as presented in the text. 1.P3-1.CBinary expressions 2.P3-2.CDemonstration of compound assignments 3.P3-3.CDemonstrate postfix increment 4.P3-4.CDemonstrate prefix incremen 5.P3-5.CPrecedence 6.P3-6.
UNF - COP - 2220
This is in Directory 4.
UNF - COP - 2220
This is in Directory 7.
UNF - CIS - 6516
Six Sigma and CMMI : Showdown in Software Process EngineeringJonathan BeckhamProcess Improvement Goals Process Goals Improve schedule and budget predictability Improve cycle time / time to market Increase productivity Improve quality (as mea
UNF - CEN - 6016
Business Modeling Domain AnalysisMost materials taken from the RUP textbook Chapter 8 and OOSE, pp. 101-1061/21Purpose of Business Modeling To understand the structure and dynamics of theorganization in which a system is to be deployed To un
UNF - COP - 3540
Using NetBeans to Create and Run a Java ApplicationNetBeans is an open source IDE (integrated development environment) available to programmers who want to develop Java projects. Since it is an IDE, the tools needed for editing, compiling, building,
UNF - COP - 3540
COP 3540 Data Structures with OOPProject 3 Fall 2008Due: 31 October (Friday) at 6pmDoubly-Linked ListsUsing NetBeans 6.1, you are to write a Java program using OOP principles to accommodate the following functionalityAssignment #3Objectives
UNF - COP - 3540
COP 3540 Data Structures with OOPProject 2 Fall 2008Due: Friday, October 10th 6pmPriority QueuesUsing NetBeans 6.1, you are to write a Java program using OOP principles to accommodate the following functionalityAssignment #2Objectives:Pro