Search Results for ""
901 - 910 of 3441 for Conical_functionSearch Results
A pivotal isotomic cubic is a self-isotomic cubic that possesses a pivot point, i.e., in which points P lying on the conic and their isotomic conjugates are collinear with a ...
The most common statement known as Steiner's theorem (Casey 1893, p. 329) states that the Pascal lines of the hexagons 123456, 143652, and 163254 formed by interchanging the ...
If three conics pass through two given points Q and Q^', then the lines joining the other two intersections of each pair of conics P_(ij)P_(ij)^' are concurrent at a point X ...
An inconic with parameters x:y:z=a(b-c):b(c-a):c(a-b), (1) giving equation (2) (Kimberling 1998, pp. 238-239). Its focus is Kimberling center X_(101) and its conic section ...
Order the natural numbers as follows: Now let F be a continuous function from the reals to the reals and suppose p≺q in the above ordering. Then if F has a point of least ...
The hyperbolic sine is defined as sinhz=1/2(e^z-e^(-z)). (1) The notation shz is sometimes also used (Gradshteyn and Ryzhik 2000, p. xxix). It is implemented in the Wolfram ...
The line R[s]=1/2 in the complex plane on which the Riemann hypothesis asserts that all nontrivial (complex) Riemann zeta function zeros lie. The plot above shows the first ...
Ramanujan's Dirichlet L-series is defined as f(s)=sum_(n=1)^infty(tau(n))/(n^s), (1) where tau(n) is the tau function. Note that the notation F(s) is sometimes used instead ...
The inverse hyperbolic tangent tanh^(-1)z (Zwillinger 1995, p. 481; Beyer 1987, p. 181), sometimes called the area hyperbolic tangent (Harris and Stocker 1998, p. 267), is ...
Birthday attacks are a class of brute-force techniques used in an attempt to solve a class of cryptographic hash function problems. These methods take advantage of functions ...
...
View search results from all Wolfram sites (414760 matches)

