Lifestyle business Updated +Created
Boron Updated +Created
Uranium Updated +Created
Open source analog-to-digital converter Updated +Created
Video 1.
Open Source 8.5 Digit Voltmeter from CERN by Marco Reps (2021)
Source.
Internet service provider Updated +Created
Tree type Updated +Created
Company Updated +Created
Salt (chemistry) Updated +Created
Steel Updated +Created
A phase of Fe-C characterized by the low ammount of carbon.
Jazz fusion musician Updated +Created
Ciro Santilli's favorites, including album when they're more of a one hit wonder:
Latin letter Updated +Created
Lp space Updated +Created
Integrable functions to the power , usually and in this text assumed under the Lebesgue integral because: Lebesgue integral of is complete but Riemann isn't
Levi-Civita symbol as a tensor Updated +Created
It takes as input three vectors, and outputs one real number, the volume. And it is linear on each vector. This perfectly satisfied the definition of a tensor of order (3,0).
Given a basis and a function that return the volume of a parallelepiped given by three vectors , .
Exponential map Updated +Created
Most commonly refers to: exponential map.
Lie Algebras In Particle Physics by Howard Georgi (1999) Updated +Created
The missing link between continuous and discrete AI Updated +Created
Caesium standard Updated +Created
Uses the frequency of the hyperfine structure of caesium-133 ground state, i.e spin up vs spin down of its valence electron , to define the second.
International System of Units definition of the second since 1967, because this is what atomic clocks use.
TODO why does this have more energy than the hyperfine split of the hydrogen line given that it is further from the nucleus?
RSA (cryptosystem) Updated +Created
Based on the fact that we don't have a P algorithm for integer factorization as of 2020. But nor proof that one does not exist!
The private key is made of two randomly generated prime numbers: and . How such large primes are found: how large primes are found for RSA.
The public key is made of:
  • n = p*q
  • a randomly chosen integer exponent between 1 and e_max = lcm(p -1, q -1), where lcm is the Least common multiple
Given a plaintext message m, the encrypted ciphertext version is:
c = m^e mod n
This operation is called modular exponentiation can be calculated efficiently with the Extended Euclidean algorithm.
The inverse operation of finding the private m from the public c, e and is however believed to be a hard problem without knowing the factors of n.
However, if we know the private p and q, we can solve the problem. As follows.
First we calculate the modular multiplicative inverse. TODO continue.
Rubik's Cube Updated +Created

Unlisted articles are being shown, click here to show only listed articles.