Open Access. Powered by Scholars. Published by Universities.®
Numerical Analysis and Computation Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Numerical Analysis and Computation
Sum Of Cubes Of The First N Integers, Obiamaka L. Agu
Sum Of Cubes Of The First N Integers, Obiamaka L. Agu
Electronic Theses, Projects, and Dissertations
In Calculus we learned that Sum^{n}_{k=1} k = [n(n+1)]/2 , that Sum^{n}_{k=1} k^2 = [n(n+1)(2n+1)]/6 , and that Sum^{n}_{k=1} k^{3} = (n(n+1)/2)^{2}. These formulas are useful when solving for the area below quadratic or cubic function over an interval [a, b]. This tedious process, solving for areas under a quadratic or a cubic, served as motivation for the introduction of Riemman integrals. For the overzealous math student, these steps were replaced by a simpler method of evaluating antiderivatives at the endpoints a and b. From my recollection, a former instructor informed us to do the value of memorizing these formulas. …
Numerical Computations Of Vortex Formation Length In Flow Past An Elliptical Cylinder, Matthew Karlson, Bogdan Nita, Ashwin Vaidya
Numerical Computations Of Vortex Formation Length In Flow Past An Elliptical Cylinder, Matthew Karlson, Bogdan Nita, Ashwin Vaidya
Department of Mathematics Facuty Scholarship and Creative Works
We examine two dimensional properties of vortex shedding past elliptical cylinders through numerical simulations. Specifically, we investigate the vortex formation length in the Reynolds number regime 10 to 100 for elliptical bodies of aspect ratio in the range 0.4 to 1.4. Our computations reveal that in the steady flow regime, the change in the vortex length follows a linear profile with respect to the Reynolds number, while in the unsteady regime, the time averaged vortex length decreases in an exponential manner with increasing Reynolds number. The transition in profile is used to identify the critical Reynolds number which marks the …
Analyzing Network Topology For Ddos Mitigation Using The Abelian Sandpile Model, Bhavana Panchumarthi, Monroe Ame Stephenson
Analyzing Network Topology For Ddos Mitigation Using The Abelian Sandpile Model, Bhavana Panchumarthi, Monroe Ame Stephenson
altREU Projects
A Distributed Denial of Service (DDoS) is a cyber attack, which is capable of triggering a cascading failure in the victim network. While DDoS attacks come in different forms, their general goal is to make a network's service unavailable to its users. A common, but risky, countermeasure is to blackhole or null route the source, or the attacked destination. When a server becomes a blackhole, or referred to as the sink in the paper, the data that is assigned to it "disappears" or gets deleted. Our research shows how mathematical modeling can propose an alternative blackholing strategy that could improve …
Numerical Solution For Solving Two-Points Boundary Value Problems Using Orthogonal Boubaker Polynomials, Imad Noah Ahmed
Numerical Solution For Solving Two-Points Boundary Value Problems Using Orthogonal Boubaker Polynomials, Imad Noah Ahmed
Emirates Journal for Engineering Research
In this paper, a new technique for solving boundary value problems (BVPs) is introduced. An orthogonal function for Boubaker polynomial was utilizedand by the aid of Galerkin method the BVP was transformed to a system of linear algebraic equations with unknown coefficients, which can be easily solved to find the approximate result. Some numerical examples were added with illustrations, comparing their results with the exact to show the efficiency and the applicability of the method.