TOPICS
Search

Search Results for ""


271 - 280 of 500 for BCH codeSearch Results
Polynomials b_n(x) which form a Sheffer sequence with g(t) = t/(e^t-1) (1) f(t) = e^t-1, (2) giving generating function sum_(k=0)^infty(b_k(x))/(k!)t^k=(t(t+1)^x)/(ln(1+t)). ...
A bilinear form on a real vector space is a function b:V×V->R that satisfies the following axioms for any scalar alpha and any choice of vectors v,w,v_1,v_2,w_1, and w_2. 1. ...
The area of the shadow of a body on a plane, also called the "outer quermass."
In the theory of transfinite ordinal numbers, 1. Every well ordered set has a unique ordinal number, 2. Every segment of ordinals (i.e., any set of ordinals arranged in ...
A function with k continuous derivatives is called a C^k function. In order to specify a C^k function on a domain X, the notation C^k(X) is used. The most common C^k space is ...
The problem of finding the number of different ways in which a product of n different ordered factors can be calculated by pairs (i.e., the number of binary bracketings of n ...
A chamfered icosahedron, also called a tritruncated rhombic triacontahedron, is a polyhedron obtained by chamfering a regular icosahedron. The illustration above shows ...
A Gaussian quadrature-like formula over the interval [-1,1] which has weighting function W(x)=x. The general formula is int_(-1)^1xf(x)dx=sum_(i=1)^nw_i[f(x_i)-f(-x_i)]. n ...
Let r and s be positive integers which are relatively prime and let a and b be any two integers. Then there is an integer N such that N=a (mod r) (1) and N=b (mod s). (2) ...
A cipher is an algorithm that converts data (plaintext) to an obfuscated form that is not directly readable. Ciphers are usually used with the intention of hiding the ...
1 ... 25|26|27|28|29|30|31 ... 50 Previous Next

...