# Register now to access 7 million high quality study materials (What's Course Hero?) Course Hero is the premier provider of high quality online educational resources. With millions of study documents, online tutors, digital flashcards and free courseware, Course Hero is helping students learn more efficiently and effectively. Whether you're interested in exploring new subjects or mastering key topics for your next exam, Course Hero has the tools you need to achieve your goals.

2 Pages

### Homework_1(05-2)

Course: CS 1515, Fall 2008
School: Pittsburgh
Rating:

Word Count: 394

#### Document Preview

1 Homework CS1515 Due: January 21, 2005 by 11:59pm Submit a zip-file containing your solutions and a text-file listing the names of your mfiles and their corresponding problem number (for example: problem A (1) bellcurve.m problem A (2) rect2polar.m ... to the digital dropbox in Blackboard. A) Create an m-file to solve the following problems from Chapra's text: 1) Problem 2.2, page 29 2) Problem 3.6, page 56 3)...

Register Now

#### Unformatted Document Excerpt

Coursehero >> Pennsylvania >> Pittsburgh >> CS 1515

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.
1 Homework CS1515 Due: January 21, 2005 by 11:59pm Submit a zip-file containing your solutions and a text-file listing the names of your mfiles and their corresponding problem number (for example: problem A (1) bellcurve.m problem A (2) rect2polar.m ... to the digital dropbox in Blackboard. A) Create an m-file to solve the following problems from Chapra's text: 1) Problem 2.2, page 29 2) Problem 3.6, page 56 3) Problem 3.9, page 57 _ B) Write a function to evaluate the polynomial shown below using Horner's method p(x) = a1xn-1 + a2xn-2 +... + an-1x + an at x = c. Your parameters are a vector v = [a1 a2 a3 . . . an-1 an] and a real number c. For example, the following execution evaluates 5x3 - 3x2 + 7x + 2 at x = 4. QuestionB([5 -3 7 2],4) ans = 302 C) Write a function with one parameter n that equals the size of a random vector [use rand(m,1) to generate a random vector of length m]. 1) Compute the sum of the elements in this vector in generated order (1st to last), 2) Compute the sum of the elements in this vector in reverse order (last to 1st), 3) Compute the sum of the elements in this vector sorted in increasing order, 4) Compute the sum of the elements in this vector sorted in decreasing order. Explain why the answers are all different. sumRandomVector(120000) sumGenOrder = 5.992251152396442e+004 sumIncOrder = 5.992251152396477e+004 sumDecOrder = 5.992251152396395e+004 = sumRevOrder 5.992251152396531e+004 5 __ _ D) Derive an iterative algorithm to determine the fifth root of x from the equation y = x, where x is any real number. You may only use multiplication and square roots to build your iteration rule x = g(x). Implement your algorithm as a Matlab function with two parameters x and d to compute the fifth root of x to d decimal places of accuracy. Recall, d is defined as Absolute error = |yk trueroot| = 10-d Note: you are allowed to compute the trueroot in your function to accomplish the above test. Also, choose |x| as the initial guess. format long g questionD(2.861381721051424e+015,1) ans = 1234.03821013704 questionD(2.861381721051424e+015,2) ans = 1234.00537322903 questionD(2.861381721051424e+015,4) ans = 1234.00003984655 E) Modify the solution of ...

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Pittsburgh - CS - 401
/* /this function recursively adds together two integers /* public static int add(int m, int n){ System.out.println(&quot;add(&quot; + m + &quot;,&quot; + n + &quot;)&quot;); /show the current recursive call if(m = 0) return n; else
Pittsburgh - CS - 1515
Data Linearization Example: DFit the data to the curve y = Cxwhere x = 1, 4, 9, and 16 and y = 2, 16, 54, and 128.ln(y) = ln(C) + Dln(x) Y = B + A XNote:Y = ln(y)X = ln(x)D = AC = exp(B)--&gt; x=[1;4;
Pittsburgh - CS - 1515
A and b are given on slide 186&gt; LL = 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 -1 0 0 0 0 0 1 0&gt; UU = 0 1 0 0 0 0 0
Pittsburgh - REC - 3
Dr. NovackyCS0007 Lab 3 Manipulating a Gene SequenceDefinitionsA gene sequence is any sequence of the bases A (adenine), C (cytosine), G (guanine), and T (thymine). A codon is any group of three bases (for example, AAA, AAC, GTA, .).ProcedureI
Pittsburgh - CS - 4
Practice writing code in Visual Basic . DUE: Thursday, Jan 15, 2:30pm 1. Write a program in Visual Basic that will contain 4 buttons and one textbox. The buttons should be labeled: red, green, yellow and blue. If necessary, you can add some labels to
Pittsburgh - REC - 3
1. Create a derived class from Java's Stack&lt;E&gt; called ReversibleStack&lt;E&gt;1.1 implement a constructor to initialize an empty ReversibleStack&lt;E&gt;1.2 implement a method that returns the reverse of a ReversibleStack2. Create a class ClientWritesRever
Pittsburgh - REC - 5
Recitation 5Oct 3, 20081. Write a program that will read from the command line all the arguments provided (the number may differ from two different running). If the numbers are all positive then add them and output the sum. If there are
Pittsburgh - CS - 7
CS007 Introduction to Programming in Java Hw1Directions:Using WinZip or a similar program, Pack (compress) all of the assignment files into an archive called FirstName_LastNameAssign1.zip. Make sure you take snapshots of your output run for each p
Pittsburgh - CS - 7
CS007 Introduction to Programming in JavaLAB4 (due Feb.26 in class)Name _ Email_ Recitation meeting day: (Tues? _) (Thurs?_) Directions: For each problem, compile and run your program in the Command Prompt window. Take a snapshot of your output r
Pittsburgh - CS - 7
CS007 Introduction to Programming in JavaLAB3Name _ Email_ Directions: Score _/20For each problem, compile and run your program in the Command Prompt window. Take a snapshot of your output run (use Alt+PrintScreen for PCs) and (Apple+Shift-3
Pittsburgh - CS - 131
&lt;Enter Your Name&gt; &lt;Address&gt; &lt;Home and Work Telephone&gt; &lt; Email address and Web address&gt;OBJECTIVE:To use my creative and analytical skills in the technical writing field.EXPERIENCE: Technical Writing PinPoint Systems International, Inc. Wrote t
Pittsburgh - CS - 1567
ControllersDaniel Mosse cs1657cs15671Introduction Supposeyou have a system that needs to be controlled Your software gives commands, the system responds to it Turn x degrees to the right Move forward 15 wheel rotations Canyou always t
Pittsburgh - CS - 2001
Using Secure Coprocessors to Protect Access to Enterprise and Ad Hoc NetworksDr. Jos Carlos Brustoloni Dept. Computer Science University of Pittsburgh jcb@cs.pitt.edu Joint work with Haidong Xia and Jayashree KanchanaMotivationAttackers can eas
Pittsburgh - CS - 1550
1. The longest delay in reading a file sector is: a. Seek delay b. rotational delay c. transfer delay d. none of the above 2. Contiguous file systems suffer from similar problems as (in mem mgmt) a. static partitions b. dynamic partitions c. paging d
Pittsburgh - HW - 0132
University of Pittsburgh Department of Electrical and Computer Engineering COE/EE 0132 Homework Assignment #3 Due January 30, 2007 Chapter 3: problems 1,2,3,6,7,9,10 SPRING 2007Note: a) = m1,m2,m4,m7
Pittsburgh - IS - 2150
IS 2150 / TEL 2810 Introduction to SecurityJames Joshi Associate Professor, SISLecture 1 August 26, 20081ContactInstructor: James B. D. Joshi GSA: 706A, IS Building Phone: 4126249982 Email: jjoshi@mail.sis.pitt.edu Web: http:/w
Pittsburgh - UG - 51
&lt;!DOCTYPE html PUBLIC &quot;-/W3C/DTD XHTML 1.0 Transitional/EN&quot; &quot;http:/www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd&quot;&gt;&lt;html xmlns=&quot;http:/www.w3.org/1999/xhtml&quot;&gt;&lt;head&gt;&lt;meta http-equiv=&quot;Content-Type&quot; content=&quot;text/html; charset=iso-8859-1&quot; /&gt;&lt;title&gt;
Pittsburgh - WIPIP - 2006
Wages for the Sin of Omission in the Trademark Office: Should Applicants Be Under a Duty to Disclose? A federal trademark registration is a powerful evidentiary tool which gives its owner a substantial advantage in infringement, dilution, and cyber-s
Pittsburgh - WIPIP - 2006
Courts as Machines? Legal Uncertainty in Patent Law Kelly Casey Concern for certainty is ubiquitous in the law. Some degree of determinacy in the content and the application of laws is necessary for individuals to ensure that their conduct conforms w
Pittsburgh - WIPIP - 2006
MY FAIR LADIES: SEX, GENDER, AND FAIR USE IN COPYRIGHTRebecca Tushnet*Abstract: 2 Live Crew juxtaposes the romantic musings of a man whose fantasy comes true, with degrading taunts, a bawdy demand for sex, and a sigh of relief from paternal respons
Pittsburgh - WIPIP - 2006
The Origins of the Right of Privacy Peter Winn The historical origins of the modern right to privacy go back several hundred years earlier than generally believed B to the early 17th Century. In a series of famous common law cases, Edward Coke protec
Pittsburgh - WINDOWS - 3
SoftQuad HoTMetaL: Frequently Asked Questions@ What is it?SoftQuad HoTMetaL is an editor for the HTML files used on the World Wide Web.It runs on Sun SPARC systems with X11 or OpenWindows, and under MicrosoftWindows. Use HoTMetaL to create ne
Pittsburgh - C - 64
SOUND MAKER By: Psychobird LOADING: Simply insert your Sound Maker disk, and type the following lines: LOAD &quot;SOUND MAKER&quot;,8 &lt;RETURN&gt; RUN &lt;RETURN&gt; You will then be asked to wait a little while, and then the menu will appear. EDITOR: There are two mode
Pittsburgh - C - 64
Unzip64v2.00 - Copyright 1998 Errol Smith This is the first public releaseversion of Unzip64v2, a program todecompress 'zip' archives created byPKZIPv2.04g or equivalent programs. Itwill work on a c64 or c128 i
Pittsburgh - C - 64
The Obligatory Pseudo-Sci-Fi Bit (skip this if you want)A mighty Empire. A darkened Galaxy. Thus was the situation with thecombined might of the Irata/Zzyaxian empire enslaving sentient lifeacross known space. Barely a free world glimmered in
Pittsburgh - C - 64
Megasound Music Editor by Jori Olkkonen (Yip/Purebyte)This is the editor Jori used to do the endpart music for BMX kids on C64.It was printed in a Finnish magazine called C as for Commodore (June/1988).I typed it in and used it for the next two y
Pittsburgh - LTL - 13
TweeningTweening Definition Computing Frames &quot;between&quot; Keyframes Benefits Saves effort Types Motion ShapeMotion Tweening Calculate the frames between a Keyframe with an object in a position on the stage and a second Keyframe with that s
Pittsburgh - LTL - 13
ActionScript 3.0Hints/Tricks Like C, C+, C#, Java Case Sensitivity Overlaid Symbols Variable Scope Running Code Cheat SheetLanguage Elements Variables - Declarations Statements Functions Conditionals if, switch Loops For, whileHel
Pittsburgh - LTL - 13
Data BasesKen SochatsData Bases Local OLEDB Microsoft Access Remote ODBC SQL Server Oracle IBM DB2Data Base Process Connect to Data Base Query the Data Base Read the RecordsExample Dim Connection As New Syst
Pittsburgh - LTL - 13
Starbucks Beyond The CupINFSCI 2810 M.I.S. Ken Sochats Presented by: Sangeeta Bokil * Arindam Dutta Jessica Fondy * Shawn LewisStrengths / Weaknesses Strengths Name Recognition Market Penetration Perception of Quality Consumer Respect for
Pittsburgh - LTL - 13
Biography of Ken SochatsKen Sochats has over thirty years of experience in the Computer and Telecommunications Industries and Academia. He was a 2007 semi-finalist for the Christopher Columbus Award, an award established by the US Congress. He is th
Pittsburgh - LTL - 13
Adventure Mapping M. Alison Stones and Ken Sochats University of Pittsburgh ABSTRACT The Lancelot Project applies GIS technology to analyze medieval manuscripts that chronicle the search for the Holy Grail. The manuscripts studied represent approxima
Pittsburgh - LTL - 13
Proceedings of the 2007 Winter Simulation Conference S. G. Henderson, B. Biller, M.-H. Hsieh, J. Shortle, J. D. Tew, and R. R. Barton, eds.SYSTEM IMPLEMENTATION ISSUES OF DYNAMIC DISCRETE DISASTER DECISION SIMULATION SYSTEM (D4S2) PHASE I Shengnan
Pittsburgh - LTL - 13
Eibling Webbased Icon Testing 1of 22Assessment of Web based Usability Testing of Metaphoric Icons for Visual Patient Care Information SystemsDavid Eibling MD * Ken So
Pittsburgh - LTL - 13
2 The Graphics ToolboxThis chapter discusses 3 philosophy and approach for designing graphics and graphic software systems. Our main assumption is that a person engaged in producing or using computer Systems that generate graphical displays will ben
Pittsburgh - LTL - 13
#region Using Statementsusing System;using System.Collections.Generic;using Microsoft.Xna.Framework;using Microsoft.Xna.Framework.Audio;using Microsoft.Xna.Framework.Content;using Microsoft.Xna.Framework.Graphics;using Microsoft.Xna.Framework
Pittsburgh - EDBT - 04
The - Synopses SystemYossi Matias Leon Portman Tel Aviv University-SynopsesProvide a run-time environment for remote execution of pluggable synopses Research platform for benchmarking and comparisonExternal Synopsis HostGUIFrameworkExter
Pittsburgh - EDBT - 04
HippoJan Chomicki University at Buffalo Jerzy Marcinkowski Wroclaw University Slawomir Staworko University at Buffaloa System for ComputingConsistent Query Answers to a Class of SQL QueriesMotivation - Inconsistent dataEnforcing data consisten
Pittsburgh - MOBIDE - 06
- 5th ACM International Workshop on Data Engineering for Wireless and Mobile Access (MobiDE'06) Sponsored by ACM SIGMOD In coo
Pittsburgh - DMSN - 04
CALL FOR PARTICIPATION - DMSN 2004First International Workshop on Data Management for Sensor Networks (held in conjunction with VLDB 2004)Monday, August 30, 2004, Toronto, Canada York Room, Royal York Hotelhttp:/db.cs.pitt.edu/dmsn04WORKS
Pittsburgh - SUPER - 6121
Page 1Table 20. OSHA Criteria for Rating a Substance Serious or Other Health Hazard Major Health Hazard Category I Cancer Subset Explanation Regulated at present as carcinogens by OSHA: Chiefly work practice standards II Chronic (Cumulative)
Pittsburgh - DPF - 7
FACULTY: Daniel P. Frederick, Computer Science TERM: Spring 2008 PHONE: x2925 EMAIL: dpf7@pitt.edu OFFICE: 214 BlackingtonPeriod 10:00-11:00 11:00-12:00 12:00-1:00 1:00-2:00 2:00-2:30 4:00-5:00 5:00-6:00 6:00-7:40 7:40-8:40Monday CS0081 Black 134
Pittsburgh - CS - 0016
CS0016 Lab # 11 DO Loops (6.1-6.2) Overview This lab will feature the use of DO loops, counters, and accumulators. Replicate the following form:Form Declarations (declare immediately after Public Class Form1 ) Declare a format string to be used to
Pittsburgh - TSA - 2
# fit SV model to NYSE returns - uses SVfiltery=matrix(scan(&quot;/mydata/nyse.dat&quot;),ncol=1)num=length(y)y=log(y^2)#initial parametersphi0= 0phi1=.95sQ=.2alpha=mean(y) sR0=1mu1=-3sR1=2 initpar=c(phi0,phi1,sQ,alpha,sR0,mu1,sR1)#- evaluate
Pittsburgh - NEW - 2
#- this is example 6.5 using ss1 -##!##- assumes ss1 has been sourced -##!##~ detailed comments are in ex65.txt ~## the only difference here is that# A is an array of num 1x1 matrices (see line 17)#- generate data -set.seed
Pittsburgh - NEW - 2
#!##- assumes ss0 has been sourced -##!##- generate data set.seed(999) num=100 N=num+1 # need 101 x's # generate x(t)=.8x(t-1)+w(t), t=1,.,100 # and x(0) from the stationary distribution: x = arima.sim(n=N, list(ar = .8, sd=1) # h
Pittsburgh - REC - 9
transaction 1: sold 6 items of S144 for \$502.32 @83.72 at time 2:0:45.transaction 12: sold 3 items of S680 for \$172.98 @57.66 at time 2:0:46.transaction 5: sold 1 items of S256 for \$14.30 @14.30 at time 2:0:46.transaction 13: sold 2 items of S680
Pittsburgh - REC - 9
transaction 1: sold 6 items of S144 for \$502.32 @83.72 at time 2:0:45.transaction 12: sold 3 items of S680 for \$172.98 @57.66 at time 2:0:46.transaction 5: sold 1 items of S256 for \$14.30 @14.30 at time 2:0:46.transaction 13: sold 2 items of S680
Pittsburgh - CS - 110
4. Working with Letters, Envelops, and LabelsThis topics covers creating a document. Utilization of Letter Wizard Create an envelope and an understanding of labelsa. Letter Wizard Open Click SelectWord [ Tools | Letters and Mailings] Letter W
Pittsburgh - CS - 110
2. The Next Level of Processing Words!Utilizing the New Features of Microsoft Word XP1New and Useful Features of Word XP Automation of Tasks Editing Proofing Tools Creating Tables Using Borders and Shading Creating Graphics On-line Utiliti
BU - LX - 700
GRS LX 700 Language Acquisition and Linguistic TheoryWeek 9. Second Language Acquisition: introductionScientific study of language What constitutes one's knowledge of language? How is that knowledge acquired? Looking at adult native languages
BU - CS - 112
0 1001 1002 1003 1004 1005 1006 1007 1008 1009 10010 10011 10012 10013 10014 10015 10016 10017 10018 10019 10020 10021 10022 10023 100
Pittsburgh - P - 2
This program calculates correlation scores between columns in multiple alignment according to the new pair-to-pair substitution matrix.Platforms:The program is working on different Unix/Linux platforms. Specifically it was tested successfully on
BU - GK - 12
Molecules of LifeWater The human body is mostly water Lean muscle: _ water Blood: _ water Body fat: _ water Bone: _ water All living organisms require water to liveProperties of Water Water is a _ _ Each atom has a partial charge Molecu
BU - LOG - 02
Note the unusual time- B O S T O N U N I V E R S I T Y Computer Science Department C O L L O Q U I U M Wednesday, November 13, 11:00 AM
Pittsburgh - ENG - 11
Your Section Your Group NumberPAPER FORMATTING SPECIFICATIONS FOR ENGINEERING 0011/0711Dan Budny (budny@pitt.edu) and Beth Bateman Newborg (bateman@pitt.edu)FORMATTING OVERVIEWPapers #2, #3, and #4 must follow these formatting specifications ex
Pittsburgh - IS - 2150
IS 2150 / TEL 2810 Introduction to SecurityJames Joshi Assistant Professor, SISLecture 1 August 30, 2007 1ContactInstructor: James B. D. Joshi GSA: TBD Lab help: Carlos E Caicedo Bastida 2706A, IS Building Phone: 41262
Pittsburgh - TELCOM - 2813
TEL2813/IS2820 Security ManagementLegal &amp; Ethical Issues Lecture 12 April 7, 2005 Laws and SecurityFederal and state laws affect privacy and secrecyLaws regulate the use, development and ownership of data and programsRights of i
BU - SC - 441
SC441 Introduction to Computer Networks Boston UniversityIndependent Study Mid-term ReportMetropolitan Ethernet NetworksMatt Powers (mtpowers@bu.edu) Estella Kang (kykang@bu.edu) October 21, 2004The demand for more reliable, cost-effective, a
Pittsburgh - IS - 2470
#3 Human Information Processing &amp; HCISeparating the Forest from the TreesSimplified HIP ModelS E N S O R Y S T O R EAttention Working Memory Long Term MemoryUnconscious/Automatic ProcessesHuman information Processing Working memory &amp; verba
Pittsburgh - LECT - 12
IS12 - Introduction to Programming Lecture 7: Introduction to CPeter Brusilovskyhttp:/www2.sis.pitt.edu/~peterb/0012-041/Why C?ssModular procedural language with arrays, structures, and references C vs. Pascal modern, portable, better textb