When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Log-normal distribution - Wikipedia

    en.wikipedia.org/wiki/Log-normal_distribution

    For example, the log-normal function with such fits well with the size of secondarily produced droplets during droplet impact [56] and the spreading of an epidemic disease. [ 57 ] The value σ = 1 / 6 {\textstyle \sigma =1{\big /}{\sqrt {6}}} is used to provide a probabilistic solution for the Drake equation.

  3. Logarithmic decrement - Wikipedia

    en.wikipedia.org/wiki/Logarithmic_decrement

    The logarithmic decrement can be obtained e.g. as ln(x 1 /x 3).Logarithmic decrement, , is used to find the damping ratio of an underdamped system in the time domain.. The method of logarithmic decrement becomes less and less precise as the damping ratio increases past about 0.5; it does not apply at all for a damping ratio greater than 1.0 because the system is overdamped.

  4. Logarithm of a matrix - Wikipedia

    en.wikipedia.org/wiki/Logarithm_of_a_matrix

    The exponential of a matrix A is defined by =!. Given a matrix B, another matrix A is said to be a matrix logarithm of B if e A = B.. Because the exponential function is not bijective for complex numbers (e.g. = =), numbers can have multiple complex logarithms, and as a consequence of this, some matrices may have more than one logarithm, as explained below.

  5. Pollard's rho algorithm for logarithms - Wikipedia

    en.wikipedia.org/wiki/Pollard's_rho_algorithm_for...

    Let be a cyclic group of order , and given ,, and a partition =, let : be the map = {and define maps : and : by (,) = {() + (,) = {+ ()input: a: a generator of G b: an element of G output: An integer x such that a x = b, or failure Initialise i ← 0, a 0 ← 0, b 0 ← 0, x 0 ← 1 ∈ G loop i ← i + 1 x i ← f(x i−1), a i ← g(x i−1, a i−1), b i ← h(x i−1, b i−1) x 2i−1 ← ...

  6. Lenstra–Lenstra–Lovász lattice basis reduction algorithm

    en.wikipedia.org/wiki/Lenstra–Lenstra–Lovász...

    An early successful application of the LLL algorithm was its use by Andrew Odlyzko and Herman te Riele in disproving Mertens conjecture. [5]The LLL algorithm has found numerous other applications in MIMO detection algorithms [6] and cryptanalysis of public-key encryption schemes: knapsack cryptosystems, RSA with particular settings, NTRUEncrypt, and so forth.

  7. Log reduction - Wikipedia

    en.wikipedia.org/wiki/Log_reduction

    Log reduction is a measure of how thoroughly a decontamination process reduces the concentration of a contaminant. It is defined as the common logarithm of the ratio of the levels of contamination before and after the process, so an increment of 1 corresponds to a reduction in concentration by a factor of 10.

  8. Discrete logarithm - Wikipedia

    en.wikipedia.org/wiki/Discrete_logarithm

    For example, log 10 10000 = 4, and log 10 0.001 = −3. These are instances of the discrete logarithm problem. Other base-10 logarithms in the real numbers are not instances of the discrete logarithm problem, because they involve non-integer exponents. For example, the equation log 10 53 = 1.724276… means that 10 1.724276… = 53.

  9. Smith normal form - Wikipedia

    en.wikipedia.org/wiki/Smith_normal_form

    As an example, we will find the Smith normal form of the following matrix over the integers. ( 2 4 4 − 6 6 12 10 4 16 ) {\displaystyle {\begin{pmatrix}2&4&4\\-6&6&12\\10&4&16\end{pmatrix}}} The following matrices are the intermediate steps as the algorithm is applied to the above matrix.