TOPICS
Search

Search Results for ""


741 - 750 of 3719 for Inverse Hyperbolic FunctionsSearch Results
The forward and inverse Kontorovich-Lebedev transforms are defined by K_(ix)[f(t)] = int_0^inftyK_(ix)(t)f(t)dt (1) K_(ix)^(-1)[g(t)] = ...
The orthoptic circle of the Steiner inellipse is the circle with center at alpha_2=1/a, (1) corresponding to the triangle centroid G and radius ...
A figurate number which is given by Ptop_n=1/4Te_n(n+3)=1/(24)n(n+1)(n+2)(n+3), where Te_n is the nth tetrahedral number. The first few pentatope numbers are 1, 5, 15, 35, ...
A nonzero vector v=(v_0,v_1,...,v_(n-1)) in n-dimensional Lorentzian space R^(1,n-1) is said to be negative timelike if it has imaginary (Lorentzian) norm and if its first ...
The modified Lommel functions of the first and second kind give the solution to the Lommel differential equation with a minus sign in front of the linear term, i.e., ...
A metric defined by d(z,w)=sup{|ln[(u(z))/(u(w))]|:u in H^+}, where H^+ denotes the positive harmonic functions on a domain. The part metric is invariant under conformal maps ...
A hash function H projects a value from a set with many (or even an infinite number of) members to a value from a set with a fixed number of (fewer) members. Hash functions ...
The probability density function (PDF) P(x) of a continuous distribution is defined as the derivative of the (cumulative) distribution function D(x), D^'(x) = ...
The Möbius function is a number theoretic function defined by mu(n)={0 if n has one or more repeated prime factors; 1 if n=1; (-1)^k if n is a product of k distinct primes, ...
Birthday attacks are a class of brute-force techniques used in an attempt to solve a class of cryptographic hash function problems. These methods take advantage of functions ...
1 ... 72|73|74|75|76|77|78 ... 372 Previous Next

...