TOPICS
Search

Search Results for ""


7361 - 7370 of 13134 for SPECIAL TOPICSSearch Results
B^^ = T^^xN^^ (1) = (r^'xr^(''))/(|r^'xr^('')|), (2) where the unit tangent vector T and unit "principal" normal vector N are defined by T^^ = (r^'(s))/(|r^'(s)|) (3) N^^ = ...
Bipolar coordinates are a two-dimensional system of coordinates. There are two commonly defined types of bipolar coordinates, the first of which is defined by x = ...
A set of curvilinear coordinates defined by x = (asinhv)/(coshv-cosu) (1) y = (asinu)/(coshv-cosu) (2) z = z, (3) where u in [0,2pi), v in (-infty,infty), and z in ...
The term "biquadratic equation" is sometimes used to as a synonym for quartic equation (Beyer 1987b, p. 34), but perhaps more commonly (e.g., Hazewinkel 1988; Gellert et al. ...
Gauss stated the reciprocity theorem for the case n=4 x^4=q (mod p) (1) can be solved using the Gaussian integers as ...
A quaternion with complex coefficients. The algebra of biquaternions is isomorphic to a full matrix ring over the complex number field (van der Waerden 1985).
Let T be an ergodic endomorphism of the probability space X and let f:X->R be a real-valued measurable function. Then for almost every x in X, we have 1/nsum_(j=1)^nf ...
In homogeneous coordinates, the first positive quadrant joins (0,1) with (1,0) by "points" (f_1,f_2), and is mapped onto the hyperbolic line -infty<u<+infty by the ...
Let A and B be two algebras over the same signature Sigma, with carriers A and B, respectively (cf. universal algebra). B is a subalgebra of A if B subset= A and every ...
Birthday attacks are a class of brute-force techniques used in an attempt to solve a class of cryptographic hash function problems. These methods take advantage of functions ...
1 ... 734|735|736|737|738|739|740 ... 1314 Previous Next

...