Search results
- In statistics, the power of a binary hypothesis test is the probability that the test correctly rejects the null hypothesis ( H 0 {\displaystyle H_{0}}...26 KB (4,215 words) - 03:26, 21 February 2024
- Decision tree learning is a supervised learning approach used in statistics, data mining and machine learning. In this formalism, a classification or regression...46 KB (6,385 words) - 17:04, 3 March 2024
- Évariste Galois (/ɡælˈwɑː/; French: [evaʁist ɡalwa]; 25 October 1811 – 31 May 1832) was a French mathematician and political activist. While still in his...41 KB (4,794 words) - 00:44, 14 April 2024
- In mathematics, the kernel of a linear map, also known as the null space or nullspace, is the part (or linear subspace) of the domain which the map maps...23 KB (3,702 words) - 20:31, 30 April 2024
- In computational mathematics, an iterative method is a mathematical procedure that uses an initial value to generate a sequence of improving approximate...10 KB (1,409 words) - 20:07, 10 March 2024
- A Proth number is a natural number N of the form N = k × 2 n + 1 {\displaystyle N=k\times 2^{n}+1} where k and n are positive integers, k is odd and 2...14 KB (1,378 words) - 21:02, 29 March 2024
- In mathematics, a Markov decision process (MDP) is a discrete-time stochastic control process. It provides a mathematical framework for modeling decision...33 KB (4,869 words) - 23:58, 21 April 2024
- In mathematics, an inequation is a statement that an inequality holds between two values. It is usually written in the form of a pair of expressions denoting...5 KB (752 words) - 15:17, 10 November 2023
- In mathematics, the symmetric algebra S(V) (also denoted Sym(V)) on a vector space V over a field K is a commutative algebra over K that contains V, and...13 KB (2,034 words) - 13:17, 31 January 2024
- In the mathematical field of numerical analysis, Runge's phenomenon (German: [ˈʁʊŋə]) is a problem of oscillation at the edges of an interval that occurs...13 KB (1,999 words) - 05:01, 15 April 2024
- Lyra2 is a password hashing scheme (PHS) that can also work as a key derivation function (KDF). It received a special recognition during the Password Hashing...19 KB (2,610 words) - 14:54, 20 April 2024
- Autocrypt is a cryptographic protocol for email clients aiming to simplify key exchange and enabling encryption. [citation needed] Version 1.0 of the Autocrypt...9 KB (1,001 words) - 05:04, 17 February 2024
- The Bunyakovsky conjecture (or Bouniakowsky conjecture) gives a criterion for a polynomial f ( x ) {\displaystyle f(x)} in one variable with integer coefficients...13 KB (2,162 words) - 13:11, 24 December 2023
- In relation to the history of mathematics, the Italian school of algebraic geometry refers to mathematicians and their work in birational geometry, particularly...12 KB (1,498 words) - 13:47, 6 December 2023
- In abstract algebra, a module is indecomposable if it is non-zero and cannot be written as a direct sum of two non-zero submodules. Indecomposable is a...5 KB (705 words) - 22:27, 28 October 2023
- Thin plate splines (TPS) are a spline-based technique for data interpolation and smoothing. "A spline is a function defined by polynomials in a piecewise...11 KB (1,605 words) - 14:55, 19 April 2024