TOPICS
Search

Search Results for ""


9441 - 9450 of 13135 for complex numberSearch Results
Caesar's method is an encryption scheme involving shifting an alphabet (so a->c, b->d, c->e, d->f, etc., x->z,y->a,z->b). It is one of the most basic encryption methods, and ...
The Cairo tessellation is a tessellation appearing in the streets of Cairo and in many Islamic decorations. Its tiles are obtained by projection of a dodecahedron, and it is ...
Calabi's triangle is the unique triangle other that the equilateral triangle for which the largest inscribed square can be inscribed in three different ways (Calabi 1997). ...
A canonical labeling, also called a canonical form, of a graph G is a graph G^' which is isomorphic to G and which represents the whole isomorphism class of G (Piperno 2011). ...
As defined by Kyrmse, a canonical polygon is a closed polygon whose vertices lie on a point lattice and whose edges consist of vertical and horizontal steps of unit length or ...
A Cartesian product of any finite or infinite set I of copies of Z_2, equipped with the product topology derived from the discrete topology of Z_2. It is denoted Z_2^I. The ...
A coordinate system obtained by inversion of the bicyclide coordinates. They are given by the transformation equations x = Lambda/(aUpsilon)snmudnnucospsi (1) y = ...
The symbol intersection , used for the intersection of sets, and sometimes also for the logical connective AND instead of the symbol ^ (wedge). In fact, for any two sets A ...
Let S be a collection of subsets of a set X, mu:S->[0,infty] a set function, and mu^* the outer measure induced by mu. The measure mu^_ that is the restriction of mu^* to the ...
For any sets A and B, their cardinal numbers satisfy |A|<=|B| iff there is a one-to-one function f from A into B (Rubin 1967, p. 266; Suppes 1972, pp. 94 and 116). It is easy ...
1 ... 942|943|944|945|946|947|948 ... 1314 Previous Next

...