Maple Document: New Applications
http://www.maplesoft.com/applications/category.aspx?cid=1337
en-us2014 Maplesoft, A Division of Waterloo Maple Inc.Maplesoft Document SystemWed, 16 Apr 2014 19:01:26 GMTWed, 16 Apr 2014 19:01:26 GMTNew applications in the Maple Document categoryhttp://www.mapleprimes.com/images/mapleapps.gifMaple Document: New Applications
http://www.maplesoft.com/applications/category.aspx?cid=1337
Downloading Stock Prices and Plotting Returns Distributions
http://www.maplesoft.com/applications/view.aspx?SID=153539&ref=Feed
<p>This application:</p>
<ul>
<li>downloads historical stock prices from Yahoo Finance,</li>
<li>calculates the returns,</li>
<li>plots the distribution of the returns in a histogram,</li>
<li>and overlays a normal distribution with the same mean and standard deviation as the historical data.</li>
<li>The application uses Maple 18's improved Internet connectivity; you can now download data from a URL straight into a matrix using <span ><a href="http://www.maplesoft.com/support/help/Maple/view.aspx?path=ImportMatrix">ImportMatrix()</a></span>.</li>
</ul><img src="/view.aspx?si=153539/stockreturns.png" alt="Downloading Stock Prices and Plotting Returns Distributions" align="left"/><p>This application:</p>
<ul>
<li>downloads historical stock prices from Yahoo Finance,</li>
<li>calculates the returns,</li>
<li>plots the distribution of the returns in a histogram,</li>
<li>and overlays a normal distribution with the same mean and standard deviation as the historical data.</li>
<li>The application uses Maple 18's improved Internet connectivity; you can now download data from a URL straight into a matrix using <span ><a href="http://www.maplesoft.com/support/help/Maple/view.aspx?path=ImportMatrix">ImportMatrix()</a></span>.</li>
</ul>153539Thu, 03 Apr 2014 04:00:00 ZSamir KhanSamir KhanElGamal E-mail Encryption Scheme
http://www.maplesoft.com/applications/view.aspx?SID=153538&ref=Feed
<p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p><img src="/view.aspx?si=153538/image.PNG" alt="ElGamal E-mail Encryption Scheme" align="left"/><p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p>153538Wed, 02 Apr 2014 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyOptimize the Flight Path of a Pan-US Delivery Drone
http://www.maplesoft.com/applications/view.aspx?SID=153536&ref=Feed
<p>You run a pan-US drone delivery service for a popular online retailer. You're given a list of zip codes across the US at which you need to drop off parcels, and want to optimize its journey so it travels the shortest distance.</p>
<p>This application extracts the latitude and longitude of those zip codes from an SQLlite database (the application includes the database, which cross-references US zip codes against their latitude, longitude, city and state). The application then performs a traveling salesman optimization and plots the shortest path on a map of the US.</p>
<p>This application uses background plot images, and SQLLite integration, two new features introduced in Maple 18.</p><img src="/view.aspx?si=153536/pan-us_drone.jpg" alt="Optimize the Flight Path of a Pan-US Delivery Drone" align="left"/><p>You run a pan-US drone delivery service for a popular online retailer. You're given a list of zip codes across the US at which you need to drop off parcels, and want to optimize its journey so it travels the shortest distance.</p>
<p>This application extracts the latitude and longitude of those zip codes from an SQLlite database (the application includes the database, which cross-references US zip codes against their latitude, longitude, city and state). The application then performs a traveling salesman optimization and plots the shortest path on a map of the US.</p>
<p>This application uses background plot images, and SQLLite integration, two new features introduced in Maple 18.</p>153536Mon, 31 Mar 2014 04:00:00 ZSamir KhanSamir KhanInteractive Google Maps Component
http://www.maplesoft.com/applications/view.aspx?SID=153537&ref=Feed
<p>This application is a simple demonstration of Maple 18's new HTTP package for communicating with web-based APIs. It has a component-based interface that lets you interact with Google Maps. Simply enter a latitude and longitude, and set your zoom level and desired map type. Maple will then:</p>
<ul>
<li>download map images using the Google Maps API, </li>
<li>and then place those images on a label component</li>
</ul>
<p>The code for the application is located in the Startup code region (Edit > Startup Code).</p>
<p>The Google Maps API limits the number of anonymous queries you can make per day. If you exceed their limit, you'll need to include a Google Maps API key in the startup code.</p>
<p>The default latitude and longitude point to the location of the Maplesoft office in Waterloo, Ontario.</p><img src="/view.aspx?si=153537/Maps_image1.jpg" alt="Interactive Google Maps Component" align="left"/><p>This application is a simple demonstration of Maple 18's new HTTP package for communicating with web-based APIs. It has a component-based interface that lets you interact with Google Maps. Simply enter a latitude and longitude, and set your zoom level and desired map type. Maple will then:</p>
<ul>
<li>download map images using the Google Maps API, </li>
<li>and then place those images on a label component</li>
</ul>
<p>The code for the application is located in the Startup code region (Edit > Startup Code).</p>
<p>The Google Maps API limits the number of anonymous queries you can make per day. If you exceed their limit, you'll need to include a Google Maps API key in the startup code.</p>
<p>The default latitude and longitude point to the location of the Maplesoft office in Waterloo, Ontario.</p>153537Mon, 31 Mar 2014 04:00:00 ZSamir KhanSamir KhanSudoku tactile généralisé (version finale)
http://www.maplesoft.com/applications/view.aspx?SID=124424&ref=Feed
<p>Ma maplet de sudoku (à régions n*m) en version finale.</p><img src="/view.aspx?si=124424/capsud.PNG" alt="Sudoku tactile généralisé (version finale)" align="left"/><p>Ma maplet de sudoku (à régions n*m) en version finale.</p>124424Wed, 26 Mar 2014 04:00:00 Zxavier cormierxavier cormierThe Greeks
http://www.maplesoft.com/applications/view.aspx?SID=153533&ref=Feed
<p>In mathematical finance, The Greeks are measurements of risk that are used to represent the sensitivity of the price of a derivative to underlying variables, such as time-value decay and the implied volatility or price of the underlying asset.<br /><br /></p>
<p>This application calculates the Greeks for a European call or put option using the Black-Scholes model.</p><img src="/view.aspx?si=153533/TheGreeks.png" alt="The Greeks" align="left"/><p>In mathematical finance, The Greeks are measurements of risk that are used to represent the sensitivity of the price of a derivative to underlying variables, such as time-value decay and the implied volatility or price of the underlying asset.<br /><br /></p>
<p>This application calculates the Greeks for a European call or put option using the Black-Scholes model.</p>153533Mon, 24 Mar 2014 04:00:00 ZMaplesoftMaplesoftInternet Page Ranking Algorithms
http://www.maplesoft.com/applications/view.aspx?SID=153532&ref=Feed
In this guest article in the Tips and Techniques series, Dr. Michael Monagan explains how internet pages are ranked.<img src="/view.aspx?si=153532/thumb.jpg" alt="Internet Page Ranking Algorithms" align="left"/>In this guest article in the Tips and Techniques series, Dr. Michael Monagan explains how internet pages are ranked.153532Thu, 20 Mar 2014 04:00:00 ZProf. Michael MonaganProf. Michael MonaganState-Feedback and Observer-Based Control Design
http://www.maplesoft.com/applications/view.aspx?SID=153526&ref=Feed
<p>This application explores different control strategies for a cart supporting two inverted pendulums of different, but unknown, lengths. State-feedback, observer-based controllers are designed for the system. Controllers are parameterized, and interactive applications are created for each method to allow easy exploration and visualization.</p>
<p>This application requires the <a href="/products/toolboxes/control_design/">MapleSim Control Design Toolbox</a>.</p><img src="/view.aspx?si=153526/95d1242810308c9068f71961d5f5f9e4.gif" alt="State-Feedback and Observer-Based Control Design" align="left"/><p>This application explores different control strategies for a cart supporting two inverted pendulums of different, but unknown, lengths. State-feedback, observer-based controllers are designed for the system. Controllers are parameterized, and interactive applications are created for each method to allow easy exploration and visualization.</p>
<p>This application requires the <a href="/products/toolboxes/control_design/">MapleSim Control Design Toolbox</a>.</p>153526Wed, 19 Mar 2014 04:00:00 ZMaplesoftMaplesoftDesigning a PID Controller
http://www.maplesoft.com/applications/view.aspx?SID=153527&ref=Feed
<p>This worksheet illustrates how the MapleSim Control Design Toolbox can be used to design PID controllers using several methods. In the first section, we will use the Pole Placement method to design a PI controller for a second-order system so that we can confine the closed-loop poles to a desired region. In the second section, we will use the Exact Pole Placement method to design a PID controller so that we can specify the exact location of the dominant poles. In the third section, we will use the Gain-Phase Margin method to design a PID controller for a fifth-order system. Finally, in the last section, we will use a single tuning parameter - equivalent to the desired time constant of the closed-loop system - to design a PID controller for a third-order system applying Skogestad IMC tuning rules.</p>
<p>This application requires the <a href="/products/toolboxes/control_design/">MapleSim Control Design Toolbox</a>.</p><img src="/view.aspx?si=153527/3ac68242ca1f9edfc23fddc173ce6537.gif" alt="Designing a PID Controller" align="left"/><p>This worksheet illustrates how the MapleSim Control Design Toolbox can be used to design PID controllers using several methods. In the first section, we will use the Pole Placement method to design a PI controller for a second-order system so that we can confine the closed-loop poles to a desired region. In the second section, we will use the Exact Pole Placement method to design a PID controller so that we can specify the exact location of the dominant poles. In the third section, we will use the Gain-Phase Margin method to design a PID controller for a fifth-order system. Finally, in the last section, we will use a single tuning parameter - equivalent to the desired time constant of the closed-loop system - to design a PID controller for a third-order system applying Skogestad IMC tuning rules.</p>
<p>This application requires the <a href="/products/toolboxes/control_design/">MapleSim Control Design Toolbox</a>.</p>153527Wed, 19 Mar 2014 04:00:00 ZMaplesoftMaplesoftJump-diffusion stochastic processes with Maple
http://www.maplesoft.com/applications/view.aspx?SID=153516&ref=Feed
<p>The application presents and definition, creation and handling of jump-diffusion processes. In general, jump-diffusion is an extension to the theory of stochastic processes where the underlying parameters exhibit shocks and "jump" to their new values. Stochasticity with jumps is well recognised in several scientific branches including physics, chemistry, biology, but also economic and finance. The application looks at the example of the last-mentioned fields where the theory of jump-diffusions has been particularly actively researched and applied.</p><img src="/view.aspx?si=153516/Jump_image1.jpg" alt="Jump-diffusion stochastic processes with Maple" align="left"/><p>The application presents and definition, creation and handling of jump-diffusion processes. In general, jump-diffusion is an extension to the theory of stochastic processes where the underlying parameters exhibit shocks and "jump" to their new values. Stochasticity with jumps is well recognised in several scientific branches including physics, chemistry, biology, but also economic and finance. The application looks at the example of the last-mentioned fields where the theory of jump-diffusions has been particularly actively researched and applied.</p>153516Sat, 08 Mar 2014 05:00:00 ZIgor HlivkaIgor HlivkaDescartes & Mme La Marquise du Chatelet And The Elastic Collision of Two Bodies
http://www.maplesoft.com/applications/view.aspx?SID=153515&ref=Feed
<p><strong><em> ABSTRACT<br /> <br /> The Marquise</em></strong> <strong><em>du Chatelet in her book " Les Institutions Physiques" published in 1740, stated on page 36, that Descartes, when formulating his laws of motion in an elastic collision of two bodies B & C (B being more massive than C) <span >having the same speed v</span>, said that t<span >he smaller one C will reverse its course </span>while <span >the more massive body B will continue its course in the same direction as before</span> and <span >both will have again the same speed v.<br /> <br /> </span>Mme du Chatelet, basing her judgment on theoretical considerations using <span >the principle of continuity</span> , declared that Descartes was <span >wrong</span> in his statement. For Mme du Chatelet the larger mass B should reverse its course and move in the opposite direction. She mentioned nothing about both bodies B & C as <span >having the same velocity after collision as Descartes did</span>.<br /> <br /> At the time of Descartes, some 300 years ago, the concept of kinetic energy & momentum as we know today was not yet well defined, let alone considered in any physical problem.<br /> <br /> Actually both Descartes & Mme du Chatelet may have been right in some special cases but not in general as the discussion that follows will show.</em></strong></p><img src="/view.aspx?si=153515/Elastic_Collision_image1.jpg" alt="Descartes & Mme La Marquise du Chatelet And The Elastic Collision of Two Bodies" align="left"/><p><strong><em> ABSTRACT<br /> <br /> The Marquise</em></strong> <strong><em>du Chatelet in her book " Les Institutions Physiques" published in 1740, stated on page 36, that Descartes, when formulating his laws of motion in an elastic collision of two bodies B & C (B being more massive than C) <span >having the same speed v</span>, said that t<span >he smaller one C will reverse its course </span>while <span >the more massive body B will continue its course in the same direction as before</span> and <span >both will have again the same speed v.<br /> <br /> </span>Mme du Chatelet, basing her judgment on theoretical considerations using <span >the principle of continuity</span> , declared that Descartes was <span >wrong</span> in his statement. For Mme du Chatelet the larger mass B should reverse its course and move in the opposite direction. She mentioned nothing about both bodies B & C as <span >having the same velocity after collision as Descartes did</span>.<br /> <br /> At the time of Descartes, some 300 years ago, the concept of kinetic energy & momentum as we know today was not yet well defined, let alone considered in any physical problem.<br /> <br /> Actually both Descartes & Mme du Chatelet may have been right in some special cases but not in general as the discussion that follows will show.</em></strong></p>153515Fri, 07 Mar 2014 05:00:00 ZDr. Ahmed BaroudyDr. Ahmed BaroudyThe Mortgage Payment Problem: Approximating a Discrete Process with a Differential Equation
http://www.maplesoft.com/applications/view.aspx?SID=153511&ref=Feed
In this guest article in the Tips and Techniques series, Dr. Michael Monagan uses mortgage interest to test how well a differential equation models what is essentially a discrete process.<img src="/view.aspx?si=153511/thumb.jpg" alt="The Mortgage Payment Problem: Approximating a Discrete Process with a Differential Equation" align="left"/>In this guest article in the Tips and Techniques series, Dr. Michael Monagan uses mortgage interest to test how well a differential equation models what is essentially a discrete process.153511Thu, 20 Feb 2014 05:00:00 ZProf. Michael MonaganProf. Michael MonaganGeneralized, byte-oriented, to reverse engineering resistant, fast stream-cipher
http://www.maplesoft.com/applications/view.aspx?SID=153499&ref=Feed
<p>A new numerous family of strong, to reverse engineering resistant, and fast byte-oriented stream-ciphers has been presented. One ought to unpack the file gbosc.zip, open the worksheet gbosc.mw in the Maple session, read it and test the application described.</p><img src="/applications/images/app_image_blank_lg.jpg" alt="Generalized, byte-oriented, to reverse engineering resistant, fast stream-cipher" align="left"/><p>A new numerous family of strong, to reverse engineering resistant, and fast byte-oriented stream-ciphers has been presented. One ought to unpack the file gbosc.zip, open the worksheet gbosc.mw in the Maple session, read it and test the application described.</p>153499Tue, 28 Jan 2014 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyThe House Warming Model
http://www.maplesoft.com/applications/view.aspx?SID=153491&ref=Feed
In this guest article in the Tips and Techniques series, Dr. Michael Monagan discusses a model of heat-flow in a house, and shows how he uses this model in his class.<img src="/view.aspx?si=153491/thumb.jpg" alt="The House Warming Model" align="left"/>In this guest article in the Tips and Techniques series, Dr. Michael Monagan discusses a model of heat-flow in a house, and shows how he uses this model in his class.153491Wed, 22 Jan 2014 05:00:00 ZProf. Michael MonaganProf. Michael MonaganAnalysis of a Refrigeration Cycle with CoolProp
http://www.maplesoft.com/applications/view.aspx?SID=153490&ref=Feed
<p>This application analyzes a vapor compression refrigeration cycle for the refrigerant R134a. The application calculates heat changes over the compressor, condenser, throttle and evaporator, together with the coefficient of performance. Additionally, a P-h-T chart illustrating the refrigeration cycle is plotted.</p>
<p>Thermophysical properties are provided by the open source C++ CoolProp library (<a href="http://coolprop.org/">http://coolprop.org</a>). Once compiled and linked to Maple, CoolProp lets you access the properties of pure fluids, pseudo-pure fluids, and humid air with a function call. This application comes with a CoolProp DLL for 64-bit Windows. You may need to compile CoolProp for your own environment for a compatible library. </p><img src="/view.aspx?si=153490/CoolProp_image1.jpg" alt="Analysis of a Refrigeration Cycle with CoolProp" align="left"/><p>This application analyzes a vapor compression refrigeration cycle for the refrigerant R134a. The application calculates heat changes over the compressor, condenser, throttle and evaporator, together with the coefficient of performance. Additionally, a P-h-T chart illustrating the refrigeration cycle is plotted.</p>
<p>Thermophysical properties are provided by the open source C++ CoolProp library (<a href="http://coolprop.org/">http://coolprop.org</a>). Once compiled and linked to Maple, CoolProp lets you access the properties of pure fluids, pseudo-pure fluids, and humid air with a function call. This application comes with a CoolProp DLL for 64-bit Windows. You may need to compile CoolProp for your own environment for a compatible library. </p>153490Fri, 17 Jan 2014 05:00:00 ZSamir KhanSamir KhanSuspension Design
http://www.maplesoft.com/applications/view.aspx?SID=153486&ref=Feed
<p>This suspension design tool provides a complete toolbox for design and analyses of the automobile's suspension systems. As the most popular suspension systems layout, the front and rear systems are supposed to be Macpherson and torsion beam respectively. The toolbox can perform complete kinematic analyses of the front and rear suspensions and the results can be viewed using a wide variety of characteristic curves, such as spring deflection, damper deflection, camber by roll, scrub by bump, roll centre position and others. Moreover, it can size the front and rear springs, dampers and anti-roll-bars . In this application, the input parameters can be easily changed, new simulations computed, and plots selected through the use of buttons, drop-down lists, and other interactive elements.</p><img src="/view.aspx?si=153486/Suspension_image1.jpg" alt="Suspension Design" align="left"/><p>This suspension design tool provides a complete toolbox for design and analyses of the automobile's suspension systems. As the most popular suspension systems layout, the front and rear systems are supposed to be Macpherson and torsion beam respectively. The toolbox can perform complete kinematic analyses of the front and rear suspensions and the results can be viewed using a wide variety of characteristic curves, such as spring deflection, damper deflection, camber by roll, scrub by bump, roll centre position and others. Moreover, it can size the front and rear springs, dampers and anti-roll-bars . In this application, the input parameters can be easily changed, new simulations computed, and plots selected through the use of buttons, drop-down lists, and other interactive elements.</p>153486Tue, 07 Jan 2014 05:00:00 ZAhmad KeshavarziAhmad KeshavarziCollision detection between toolholder and workpiece on ball nut grinding
http://www.maplesoft.com/applications/view.aspx?SID=153477&ref=Feed
<p>In this worksheet a collision detection performed to determine the minimum safety distance between a tool holder and ball nut on grinding manufacturing. A nonlinear quartic equation system have to be solved by <em>Newton's</em> and <em>Broyden's</em> methods and results are compared with <em>Maple fsolve()</em> command. Users can check the different results by embedded components and animated 3D surface plot.</p><img src="/view.aspx?si=153477/Collision_Detection_image1.jpg" alt="Collision detection between toolholder and workpiece on ball nut grinding" align="left"/><p>In this worksheet a collision detection performed to determine the minimum safety distance between a tool holder and ball nut on grinding manufacturing. A nonlinear quartic equation system have to be solved by <em>Newton's</em> and <em>Broyden's</em> methods and results are compared with <em>Maple fsolve()</em> command. Users can check the different results by embedded components and animated 3D surface plot.</p>153477Mon, 23 Dec 2013 05:00:00 ZGyörgy HegedûsGyörgy HegedûsCryptographic directory protection using the byte-oriented stream-cipher of type A256K1024
http://www.maplesoft.com/applications/view.aspx?SID=153483&ref=Feed
<p>This one-worksheet user-friendly application allows to encrypt/decrypt selected by user directory, containing confidential files, by means of practically unbreakable non-redundant byte-oriented cipher of type <strong>A256K1024.</strong> The type cipher name means that the encryption process involves<strong> addition</strong> operation in <strong>GF(256)</strong> and the secret key of length <strong>1024</strong> bytes (8192 bits), which in the application is embedded. The user can replace the application key (the list <strong>K</strong> of 1024 integers in the range 0..255) by his one. </p><img src="/applications/images/app_image_blank_lg.jpg" alt="Cryptographic directory protection using the byte-oriented stream-cipher of type A256K1024" align="left"/><p>This one-worksheet user-friendly application allows to encrypt/decrypt selected by user directory, containing confidential files, by means of practically unbreakable non-redundant byte-oriented cipher of type <strong>A256K1024.</strong> The type cipher name means that the encryption process involves<strong> addition</strong> operation in <strong>GF(256)</strong> and the secret key of length <strong>1024</strong> bytes (8192 bits), which in the application is embedded. The user can replace the application key (the list <strong>K</strong> of 1024 integers in the range 0..255) by his one. </p>153483Mon, 23 Dec 2013 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyThe Curse of Dimensionality
http://www.maplesoft.com/applications/view.aspx?SID=153482&ref=Feed
<p>We will in this worksheet shortly explore the Curse of Dimensionality<br />which plays an important role in ie portfolio theory.</p><img src="/view.aspx?si=153482/ffc9658f8bbbf859cc17f5d03c5a790b.gif" alt="The Curse of Dimensionality" align="left"/><p>We will in this worksheet shortly explore the Curse of Dimensionality<br />which plays an important role in ie portfolio theory.</p>153482Fri, 20 Dec 2013 05:00:00 ZMarcus DavidssonMarcus DavidssonMeasuring Water Flow of Rivers
http://www.maplesoft.com/applications/view.aspx?SID=153480&ref=Feed
In this guest article in the Tips & Techniques series, Dr. Michael Monagan discusses the art and science of measuring the amount of water flowing in a river, and relates his personal experiences with this task to its morph into a project for his calculus classes.<img src="/view.aspx?si=153480/thumb.jpg" alt="Measuring Water Flow of Rivers" align="left"/>In this guest article in the Tips & Techniques series, Dr. Michael Monagan discusses the art and science of measuring the amount of water flowing in a river, and relates his personal experiences with this task to its morph into a project for his calculus classes.153480Fri, 13 Dec 2013 05:00:00 ZProf. Michael MonaganProf. Michael Monagan