Search Results for ""
9511 - 9520 of 13135 for Polar Formof Complex NumberSearch Results
The algebraic identity (sum_(i=1)^na_ic_i)(sum_(i=1)^nb_id_i)-(sum_(i=1)^na_id_i)(sum_(i=1)^nb_ic_i) =sum_(1<=i<j<=n)(a_ib_j-a_jb_i)(c_id_j-c_jd_i). (1) Letting c_i=a_i and ...
Binet's first formula for the log gamma function lnGamma(z), where Gamma(z) is a gamma function, is given by for R[z]>0 (Erdélyi et al. 1981, p. 21; Whittaker and Watson ...
B^^ = T^^xN^^ (1) = (r^'xr^(''))/(|r^'xr^('')|), (2) where the unit tangent vector T and unit "principal" normal vector N are defined by T^^ = (r^'(s))/(|r^'(s)|) (3) N^^ = ...
The term "biquadratic equation" is sometimes used to as a synonym for quartic equation (Beyer 1987b, p. 34), but perhaps more commonly (e.g., Hazewinkel 1988; Gellert et al. ...
Let T be an ergodic endomorphism of the probability space X and let f:X->R be a real-valued measurable function. Then for almost every x in X, we have 1/nsum_(j=1)^nf ...
In homogeneous coordinates, the first positive quadrant joins (0,1) with (1,0) by "points" (f_1,f_2), and is mapped onto the hyperbolic line -infty<u<+infty by the ...
Let A and B be two algebras over the same signature Sigma, with carriers A and B, respectively (cf. universal algebra). B is a subalgebra of A if B subset= A and every ...
Birthday attacks are a class of brute-force techniques used in an attempt to solve a class of cryptographic hash function problems. These methods take advantage of functions ...
Let V(r) be the volume of a ball of radius r in a complete n-dimensional Riemannian manifold with Ricci curvature tensor >=(n-1)kappa. Then V(r)<=V_kappa(r), where V_kappa is ...
A system of curvilinear coordinates variously denoted (xi,eta,phi) (Arfken 1970) or (theta,eta,psi) (Moon and Spencer 1988). Using the notation of Arfken, the bispherical ...
...
View search results from all Wolfram sites (65924 matches)

