Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Binary logarithm

This is a good article. Click here for more information.
From Wikipedia, the free encyclopedia
Exponent of a power of two

Graph oflog2x as a function of a positive real numberx

Inmathematics, thebinary logarithm (log2n) is thepower to which the number2 must beraised to obtain the value n. That is, for any real numberx,

x=log2n2x=n.{\displaystyle x=\log _{2}n\quad \Longleftrightarrow \quad 2^{x}=n.}

For example, the binary logarithm of1 is0, the binary logarithm of2 is1, the binary logarithm of4 is 2, and the binary logarithm of32 is 5.

The binary logarithm is thelogarithm to the base2 and is theinverse function of thepower of two function. There are several alternatives to thelog2 notation for the binary logarithm; see theNotation section below.

Historically, the first application of binary logarithms was inmusic theory, byLeonhard Euler: the binary logarithm of a frequency ratio of two musical tones gives the number ofoctaves by which the tones differ. Binary logarithms can be used to calculate the length of the representation of a number in thebinary numeral system, or the number ofbits needed to encode a message ininformation theory. Incomputer science, they count the number of steps needed forbinary search and related algorithms. Other areasin which the binary logarithm is frequently used includecombinatorics,bioinformatics, the design of sportstournaments, andphotography.

Binary logarithms are included in the standardC mathematical functions and other mathematical software packages.

History

[edit]
Main article:History of logarithms
Leonhard Euler was the first to apply binary logarithms tomusic theory, in 1739.

Thepowers of two have been known since antiquity; for instance, they appear inEuclid'sElements, Props. IX.32 (on thefactorization of powers of two) and IX.36 (half of theEuclid–Euler theorem, on the structure of evenperfect numbers).And the binary logarithm of a power of two is just its position in the ordered sequence of powers of two.On this basis,Michael Stifel has been credited with publishing the first known table of binary logarithms in 1544. His bookArithmetica Integra contains several tables that show theintegers with their corresponding powers of two. Reversing the rows of these tables allow them to be interpreted as tables of binary logarithms.[1][2]

Earlier than Stifel, the 8th centuryJain mathematicianVirasena is credited with a precursor to the binary logarithm. Virasena's concept ofardhacheda has been defined as the number of times a given number can be divided evenly by two. This definition gives rise to a function that coincides with the binary logarithm on the powers of two,[3] but it is different for other integers, giving the2-adic order rather than the logarithm.[4]

The modern form of a binary logarithm, applying to any number (not just powers of two) was considered explicitly byLeonhard Euler in 1739. Euler established the application of binary logarithms to music theory, long before their applications in information theory and computer science became known. As part of his work in this area, Euler published a table of binary logarithms of the integers from 1 to 8, to seven decimal digits of accuracy.[5][6]

Definition and properties

[edit]

The binary logarithm function may be defined as theinverse function to thepower of two function, which is a strictly increasing function over the positivereal numbers and therefore has a unique inverse.[7]Alternatively, it may be defined aslnn/ln 2, whereln is thenatural logarithm, defined in any of its standard ways. Using thecomplex logarithm in this definition allows the binary logarithm to be extended to thecomplex numbers.[8]

As with other logarithms, the binary logarithm obeys the following equations, which can be used to simplify formulas that combine binary logarithms with multiplication or exponentiation:[9]

log2xy=log2x+log2y{\displaystyle \log _{2}xy=\log _{2}x+\log _{2}y}
log2xy=log2xlog2y{\displaystyle \log _{2}{\frac {x}{y}}=\log _{2}x-\log _{2}y}
log2xy=ylog2x.{\displaystyle \log _{2}x^{y}=y\log _{2}x.}

For more, seelist of logarithmic identities.

Notation

[edit]

In mathematics, the binary logarithm of a numbern is often written aslog2n.[10] However, several other notations for this function have been used or proposed, especially in application areas.

Some authors write the binary logarithm aslgn,[11][12] the notation listed inThe Chicago Manual of Style.[13]Donald Knuth credits this notation to a suggestion ofEdward Reingold,[14] but its use in both information theory and computer science dates to before Reingold was active.[15][16] The binary logarithm has also been written aslogn with a prior statement that the default base for the logarithm is 2.[17][18][19] Another notation that is often used for the same function (especially in the German scientific literature) isldn,[20][21][22] fromLatinlogarithmusdualis[20] orlogarithmus dyadis.[20]TheDIN 1302 [de],ISO 31-11 andISO 80000-2 standards recommend yet another notation,lbn. According to these standards,lgn should not be used for the binary logarithm, as it is instead reserved for thecommon logarithmlog10n.[23][24][25]

Applications

[edit]
See also:Doubling time

Information theory

[edit]

The number of digits (bits) in thebinary representation of a positive integern is theintegral part of1 + log2n, i.e.[12]

log2n+1.{\displaystyle \lfloor \log _{2}n\rfloor +1.}

In information theory, the definition of the amount ofself-information andinformation entropy is often expressed with the binary logarithm, corresponding to making the bit the fundamentalunit of information. With these units, theShannon–Hartley theorem expresses the information capacity of a channel as the binary logarithm of its signal-to-noise ratio, plus one. However, thenatural logarithm and thenat are also used in alternative notations for these definitions.[26]

Combinatorics

[edit]
A 16-playersingle eliminationtournament bracket with the structure of acomplete binary tree. The height of the tree (number of rounds of the tournament) is the binary logarithm of the number of players, rounded up to an integer.

Although the natural logarithm is more important than the binary logarithm in many areas of pure mathematics such asnumber theory andmathematical analysis,[27] the binary logarithm has several applications incombinatorics:

  • Everybinary tree withn leaves has height at leastlog2n, with equality whenn is apower of two and the tree is acomplete binary tree.[28] Relatedly, theStrahler number of a river system withn tributary streams is at mostlog2n + 1.[29]
  • Everyfamily of sets withn different sets has at leastlog2n elements in its union, with equality when the family is apower set.[30]
  • Everypartial cube withn vertices has isometric dimension at leastlog2n, and has at most1/2n log2n edges, with equality when the partial cube is ahypercube graph.[31]
  • According toRamsey's theorem, everyn-vertexundirected graph has either aclique or anindependent set of size logarithmic inn. The precise size that can be guaranteed is not known, but the best bounds known on its size involve binary logarithms. In particular, all graphs have a clique or independent set of size at least1/2 log2n (1 −o(1)) and almost all graphs do not have a clique or independent set of size larger than2 log2n (1 +o(1)).[32]
  • From a mathematical analysis of theGilbert–Shannon–Reeds model of random shuffles, one can show that the number of times one needs to shuffle ann-card deck of cards, usingriffle shuffles, to get a distribution on permutations that is close to uniformly random, is approximately3/2 log2n. This calculation forms the basis for a recommendation that 52-card decks should be shuffled seven times.[33]

Computational complexity

[edit]
Binary search in a sorted array, an algorithm whose time complexity involves binary logarithms

The binary logarithm also frequently appears in theanalysis of algorithms,[19] not only because of the frequent use of binary number arithmetic in algorithms, but also because binary logarithms occur in the analysis of algorithms based on two-way branching.[14] If a problem initially hasn choices for its solution, and each iteration of the algorithm reduces the number of choices by a factor of two, then the number of iterations needed to select a single choice is again the integral part oflog2n. This idea is used in the analysis of severalalgorithms anddata structures. For example, inbinary search, the size of the problem to be solved is halved with each iteration, and therefore roughlylog2n iterations are needed to obtain a solution for a problem of sizen.[34] Similarly, a perfectly balancedbinary search tree containingn elements has heightlog2(n + 1) − 1.[35]

The running time of an algorithm is usually expressed inbig O notation, which is used to simplify expressions by omitting their constant factors and lower-order terms. Because logarithms in different bases differ from each other only by a constant factor, algorithms that run inO(log2n) time can also be said to run in, say,O(log13n) time. The base of the logarithm in expressions such asO(logn) orO(n logn) is therefore not important and can be omitted.[11][36] However, for logarithms that appear in the exponent of a time bound, the base of the logarithm cannot be omitted. For example,O(2log2n) is not the same asO(2lnn) because the former is equal toO(n) and the latter toO(n0.6931...).

Algorithms with running timeO(n log n) are sometimes calledlinearithmic.[37] Some examples of algorithms with running timeO(logn) orO(n logn) are:

Binary logarithms also occur in the exponents of the time bounds for somedivide and conquer algorithms, such as theKaratsuba algorithm for multiplyingn-bit numbers in timeO(nlog2 3),[42]and theStrassen algorithm for multiplyingn ×n matrices in timeO(nlog2 7).[43] The occurrence of binary logarithms in these running times can be explained by reference to themaster theorem for divide-and-conquer recurrences.

Bioinformatics

[edit]
Amicroarray for approximately 8700 genes. The expression rates of these genes are compared using binary logarithms.

Inbioinformatics,microarrays are used to measure how strongly different genes are expressed in a sample of biological material. Different rates of expression of a gene are often compared by using the binary logarithm of the ratio of expression rates: the log ratio of two expression rates is defined as the binary logarithm of the ratio of the two rates. Binary logarithms allow for a convenient comparison of expression rates: a doubled expression rate can be described by a log ratio of1, a halved expression rate can be described by a log ratio of−1, and an unchanged expression rate can be described by a log ratio of zero, for instance.[44]

Data points obtained in this way are often visualized as ascatterplot in which one or both of the coordinate axes are binary logarithms of intensity ratios, or in visualizations such as theMA plot andRA plot that rotate and scale these log ratio scatterplots.[45]

Music theory

[edit]

Inmusic theory, theinterval or perceptual difference between two tones is determined by the ratio of their frequencies. Intervals coming fromrational number ratios with small numerators and denominators are perceived as particularly euphonious. The simplest and most important of these intervals is theoctave, a frequency ratio of2:1. The number of octaves by which two tones differ is the binary logarithm of their frequency ratio.[46]

To studytuning systems and other aspects of music theory that require finer distinctions between tones, it is helpful to have a measure of the size of an interval that is finer than an octave and is additive (as logarithms are) rather than multiplicative (as frequency ratios are). That is, if tonesx,y, andz form a rising sequence of tones, then the measure of the interval fromx toy plus the measure of the interval fromy toz should equal the measure of the interval fromx toz. Such a measure is given by thecent, which divides the octave into1200 equal intervals (12semitones of100 cents each). Mathematically, given tones with frequenciesf1 andf2, the number of cents in the interval fromf1 tof2 is[46]

|1200log2f1f2|.{\displaystyle \left|1200\log _{2}{\frac {f_{1}}{f_{2}}}\right|.}

Themillioctave is defined in the same way, but with a multiplier of1000 instead of1200.[47]

Sports scheduling

[edit]

In competitive games and sports involving two players or teams in each game or match, the binary logarithm indicates the number of rounds necessary in asingle-elimination tournament required to determine a winner. For example, a tournament of4 players requireslog2 4 = 2 rounds to determine the winner, a tournament of32 teams requireslog2 32 = 5 rounds, etc. In this case, forn players/teams wheren is not a power of 2,log2n is rounded up since it is necessary to have at least one round in which not all remaining competitors play. For example,log2 6 is approximately2.585, which rounds up to3, indicating that a tournament of6 teams requires3 rounds (either two teams sit out the first round, or one team sits out the second round). The same number of rounds is also necessary to determine a clear winner in aSwiss-system tournament.[48]

Photography

[edit]

Inphotography,exposure values are measured in terms of the binary logarithm of the amount of light reaching the film or sensor, in accordance with theWeber–Fechner law describing a logarithmic response of the human visual system to light. A single stop of exposure is one unit on a base-2 logarithmic scale.[49][50] More precisely, the exposure value of a photograph is defined as

log2N2t{\displaystyle \log _{2}{\frac {N^{2}}{t}}}

whereN is thef-number measuring theaperture of the lens during the exposure, andt is the number of seconds of exposure.[51]

Binary logarithms (expressed as stops) are also used indensitometry, to express thedynamic range of light-sensitive materials or digital sensors.[52]

Calculation

[edit]
HP-35scientific calculator (1972). The log and ln keys are in the top row; there is no log2 key.

Conversion from other bases

[edit]

An easy way to calculatelog2n oncalculators that do not have alog2 function is to use thenatural logarithm (ln) or thecommon logarithm (log orlog10) functions, which are found on mostscientific calculators. Tochange the logarithm base to 2 frome,10, or any other baseb, one can use theformulae:[50][53]

log2n=lnnln2=log10nlog102=logbnlogb2.{\displaystyle \log _{2}n={\frac {\ln n}{\ln 2}}={\frac {\log _{10}n}{\log _{10}2}}={\frac {\log _{b}n}{\log _{b}2}}\,.}

Approximately,[54][55]

log2n1.442695lnn3.321928log10n.{\displaystyle \log _{2}n\approx 1.442695\ln n\approx 3.321928\log _{10}n\,.}

Integer rounding

[edit]

The binary logarithm can be made into a function from integers and to integers byrounding it up or down. These two forms of integer binary logarithm are related by this formula:

log2(n)=log2(n+1)1, if n1.{\displaystyle \lfloor \log _{2}(n)\rfloor =\lceil \log _{2}(n+1)\rceil -1,{\text{ if }}n\geq 1.}[56]

The definition can be extended by defininglog2(0)=1{\displaystyle \lfloor \log _{2}(0)\rfloor =-1}. Extended in this way, this function is related to thenumber of leading zeros of the 32-bit unsigned binary representation ofx,nlz(x).

log2(n)=31nlz(n).{\displaystyle \lfloor \log _{2}(n)\rfloor =31-\operatorname {nlz} (n).}[56]

The integer binary logarithm can be interpreted as the zero-based index of the most significant1 bit in the input. In this sense it is the complement of thefind first set operation, which finds the index of the least significant1 bit. Many hardware platforms include support for finding the number of leading zeros, or equivalent operations, which can be used to quickly find the binary logarithm. Thefls andflsl functions in theLinux kernel[57] and in some versions of thelibc software library also compute the binary logarithm (rounded up to an integer, plus one).

Piecewise-linear approximation

[edit]

For a numberx{\displaystyle x} represented infloating point asx=2E(1+m){\displaystyle x=2^{E}(1+m)}, with integer exponentE{\displaystyle E} andmantissam{\displaystyle m} in the range0m<1{\displaystyle 0\leq m<1}, the binary logarithm can be roughly approximated aslog2xE+m{\displaystyle \log _{2}x\approx E+m}.[16] This approximation is exact at both ends of the range of mantissas but underestimates the logarithm in the middle of the range, reaching a maximum error of approximately 0.086 at a mantissa of approximately 0.44. It can be made more accurate by using apiecewise linear function ofm{\displaystyle m},[58] or more crudely by adding a constant correction termlog2xE+m+σ{\displaystyle \log _{2}x\approx E+m+\sigma }. For instance choosingσ0.043{\displaystyle \sigma \approx 0.043} would halve the maximum error. Thefast inverse square root algorithm uses this idea, with a different correction term that can be inferred to beσ0.0450466{\displaystyle \sigma \approx 0.0450466}, by directly manipulating the binary representation ofx{\displaystyle x} to multiply this approximate logarithm by12{\displaystyle -{\tfrac {1}{2}}}, obtaining a floating point value that approximates1/x{\displaystyle 1/{\sqrt {x}}}.[59]

Iterative approximation

[edit]

For a generalpositive real number, the binary logarithm may be computed in two parts.[60]First, one computes theinteger part,log2x{\displaystyle \lfloor \log _{2}x\rfloor } (called the characteristic of the logarithm).This reduces the problem to one where the argument of the logarithm is in a restricted range, the interval[1, 2), simplifying the second step of computing the fractional part (the mantissa of the logarithm).For anyx > 0, there exists a unique integern such that2nx < 2n+1, or equivalently1 ≤ 2nx < 2. Now the integer part of the logarithm is simplyn, and the fractional part islog2(2nx).[60] In other words:

log2x=n+log2ywhere y=2nx and y[1,2){\displaystyle \log _{2}x=n+\log _{2}y\quad {\text{where }}y=2^{-n}x{\text{ and }}y\in [1,2)}

For normalizedfloating-point numbers, the integer part is given by the floating-point exponent,[61] and for integers it can be determined by performing acount leading zeros operation.[62]

The fractional part of the result islog2y and can be computed iteratively, using only elementary multiplication and division.[60]The algorithm for computing the fractional part can be described inpseudocode as follows:

  1. Start with a real numbery in the half-open interval[1, 2). Ify = 1, then the algorithm is done, and the fractional part is zero.
  2. Otherwise, squarey repeatedly until the resultz lies in the interval[2, 4). Letm be the number of squarings needed. That is,z =y2m withm chosen such thatz is in[2, 4).
  3. Taking the logarithm of both sides and doing some algebra:log2z=2mlog2ylog2y=log2z2m=1+log2(z/2)2m=2m+2mlog2(z/2).{\displaystyle {\begin{aligned}\log _{2}z&=2^{m}\log _{2}y\\\log _{2}y&={\frac {\log _{2}z}{2^{m}}}\\&={\frac {1+\log _{2}(z/2)}{2^{m}}}\\&=2^{-m}+2^{-m}\log _{2}(z/2).\end{aligned}}}
  4. Once againz/2 is a real number in the interval[1, 2). Return to step 1 and compute the binary logarithm ofz/2 using the same method.

The result of this is expressed by the following recursive formulas, in whichmi{\displaystyle m_{i}} is the number of squarings required in thei-th iteration of the algorithm:log2x=n+2m1(1+2m2(1+2m3(1+)))=n+2m1+2m1m2+2m1m2m3+{\displaystyle {\begin{aligned}\log _{2}x&=n+2^{-m_{1}}\left(1+2^{-m_{2}}\left(1+2^{-m_{3}}\left(1+\cdots \right)\right)\right)\\&=n+2^{-m_{1}}+2^{-m_{1}-m_{2}}+2^{-m_{1}-m_{2}-m_{3}}+\cdots \end{aligned}}}

In the special case where the fractional part in step 1 is found to be zero, this is afinite sequence terminating at some point. Otherwise, it is aninfinite series thatconverges according to theratio test, since each term is strictly less than the previous one (since everymi > 0). SeeHorner's method. For practical use, this infinite series must be truncated to reach an approximate result. If the series is truncated after thei-th term, then the error in the result is less than2−(m1 +m2 + ⋯ +mi).[60]

Software library support

[edit]

Thelog2 function is included in the standardC mathematical functions. The default version of this function takesdouble precision arguments but variants of it allow the argument to be single-precision or to be along double.[63] In computing environments supportingcomplex numbers and implicit type conversion such asMATLAB the argument to thelog2 function is allowed to be anegative number, returning a complex one.[64]

References

[edit]
  1. ^Groza, Vivian Shaw; Shelley, Susanne M. (1972),Precalculus mathematics, New York: Holt, Rinehart and Winston, p. 182,ISBN 978-0-03-077670-0.
  2. ^Stifel, Michael (1544),Arithmetica integra (in Latin), p. 31. A copy of the same table with two more entries appears on p. 237, and another copy extended to negative powers appears on p. 249b.
  3. ^Joseph, G. G. (2011),The Crest of the Peacock: Non-European Roots of Mathematics (3rd ed.), Princeton University Press, p. 352.
  4. ^See, e.g.,Shparlinski, Igor (2013),Cryptographic Applications of Analytic Number Theory: Complexity Lower Bounds and Pseudorandomness, Progress in Computer Science and Applied Logic, vol. 22, Birkhäuser, p. 35,ISBN 978-3-0348-8037-4.
  5. ^Euler, Leonhard (1739), "Chapter VII. De Variorum Intervallorum Receptis Appelationibus",Tentamen novae theoriae musicae ex certissismis harmoniae principiis dilucide expositae (in Latin), Saint Petersburg Academy, pp. 102–112.
  6. ^Tegg, Thomas (1829), "Binary logarithms",London encyclopaedia; or, Universal dictionary of science, art, literature and practical mechanics: comprising a popular view of the present state of knowledge, Volume 4, pp. 142–143.
  7. ^Batschelet, E. (2012),Introduction to Mathematics for Life Scientists, Springer, p. 128,ISBN 978-3-642-96080-2.
  8. ^For instance,Microsoft Excel provides theIMLOG2 function for complex binary logarithms: seeBourg, David M. (2006),Excel Scientific and Engineering Cookbook, O'Reilly Media, p. 232,ISBN 978-0-596-55317-3.
  9. ^Kolman, Bernard; Shapiro, Arnold (1982), "11.4 Properties of Logarithms",Algebra for College Students, Academic Press, pp. 334–335,ISBN 978-1-4832-7121-7.
  10. ^For instance, this is the notation used in theEncyclopedia of Mathematics andThe Princeton Companion to Mathematics.
  11. ^abCormen, Thomas H.;Leiserson, Charles E.;Rivest, Ronald L.;Stein, Clifford (2001) [1990],Introduction to Algorithms (2nd ed.), MIT Press and McGraw-Hill, pp. 34,53–54,ISBN 0-262-03293-7
  12. ^abSedgewick, Robert; Wayne, Kevin Daniel (2011),Algorithms, Addison-Wesley Professional, p. 185,ISBN 978-0-321-57351-3.
  13. ^The Chicago Manual of Style (25th ed.), University of Chicago Press, 2003, p. 530.
  14. ^abKnuth, Donald E. (1997),Fundamental Algorithms,The Art of Computer Programming, vol. 1 (3rd ed.), Addison-Wesley Professional,ISBN 978-0-321-63574-7,p. 11. The same notation was in the 1973 2nd edition of the same book (p. 23) but without the credit to Reingold.
  15. ^Trucco, Ernesto (1956), "A note on the information content of graphs",Bull. Math. Biophys.,18 (2):129–135,doi:10.1007/BF02477836,MR 0077919.
  16. ^abMitchell, John N. (1962), "Computer multiplication and division using binary logarithms",IRE Transactions on Electronic Computers, EC-11 (4):512–517,Bibcode:1962IRTEC..11..512M,doi:10.1109/TEC.1962.5219391.
  17. ^Fiche, Georges; Hebuterne, Gerard (2013),Mathematics for Engineers, John Wiley & Sons, p. 152,ISBN 978-1-118-62333-6,In the following, and unless otherwise stated, the notationlogx always stands for the logarithm to the base2 ofx.
  18. ^Cover, Thomas M.; Thomas, Joy A. (2012),Elements of Information Theory (2nd ed.),John Wiley & Sons, p. 33,ISBN 978-1-118-58577-1,Unless otherwise specified, we will take all logarithms to base2.
  19. ^abGoodrich, Michael T.;Tamassia, Roberto (2002),Algorithm Design: Foundations, Analysis, and Internet Examples, John Wiley & Sons, p. 23,One of the interesting and sometimes even surprising aspects of the analysis of data structures and algorithms is the ubiquitous presence of logarithms ... As is the custom in the computing literature, we omit writing the baseb of the logarithm whenb = 2.
  20. ^abcTafel, Hans Jörg (1971),Einführung in die digitale Datenverarbeitung [Introduction to digital information processing] (in German), Munich:Carl Hanser Verlag, pp. 20–21,ISBN 3-446-10569-7
  21. ^Tietze, Ulrich; Schenk, Christoph (1999),Halbleiter-Schaltungstechnik (in German) (1st corrected reprint, 11th ed.),Springer Verlag, p. 1370,ISBN 3-540-64192-0
  22. ^Bauer, Friedrich L. (2009),Origins and Foundations of Computing: In Cooperation with Heinz Nixdorf MuseumsForum,Springer Science & Business Media, p. 54,ISBN 978-3-642-02991-2.
  23. ^For DIN 1302 seeBrockhaus Enzyklopädie in zwanzig Bänden [Brockhaus Encyclopedia in Twenty Volumes] (in German), vol. 11, Wiesbaden: F.A. Brockhaus, 1970, p. 554,ISBN 978-3-7653-0000-4.
  24. ^For ISO 31-11 seeThompson, Ambler; Taylor, Barry M (March 2008),Guide for the Use of the International System of Units (SI) — NIST Special Publication 811, 2008 Edition — Second Printing(PDF),NIST, p. 33.
  25. ^For ISO 80000-2 see"Quantities and units – Part 2: Mathematical signs and symbols to be used in the natural sciences and technology"(PDF),International Standard ISO 80000-2 (1st ed.), December 1, 2009, Section 12, Exponential and logarithmic functions, p. 18.
  26. ^Van der Lubbe, Jan C. A. (1997),Information Theory, Cambridge University Press, p. 3,ISBN 978-0-521-46760-5.
  27. ^Stewart, Ian (2015),Taming the Infinite, Quercus, p. 120,ISBN 9781623654733,in advanced mathematics and science the only logarithm of importance is the natural logarithm.
  28. ^Leiss, Ernst L. (2006),A Programmer's Companion to Algorithm Analysis, CRC Press, p. 28,ISBN 978-1-4200-1170-8.
  29. ^Devroye, L.; Kruszewski, P. (1996),"On the Horton–Strahler number for random tries",RAIRO Informatique Théorique et Applications,30 (5):443–456,doi:10.1051/ita/1996300504431,MR 1435732.
  30. ^Equivalently, a family withk distinct elements has at most2k distinct sets, with equality when it is a power set.
  31. ^Eppstein, David (2005), "The lattice dimension of a graph",European Journal of Combinatorics,26 (5):585–592,arXiv:cs.DS/0402028,doi:10.1016/j.ejc.2004.05.001,MR 2127682,S2CID 7482443.
  32. ^Graham, Ronald L.;Rothschild, Bruce L.;Spencer, Joel H. (1980),Ramsey Theory, Wiley-Interscience, p. 78.
  33. ^Bayer, Dave;Diaconis, Persi (1992), "Trailing the dovetail shuffle to its lair",The Annals of Applied Probability,2 (2):294–313,doi:10.1214/aoap/1177005705,JSTOR 2959752,MR 1161056.
  34. ^Mehlhorn, Kurt;Sanders, Peter (2008), "2.5 An example – binary search",Algorithms and Data Structures: The Basic Toolbox(PDF), Springer, pp. 34–36,ISBN 978-3-540-77977-3.
  35. ^Roberts, Fred; Tesman, Barry (2009),Applied Combinatorics (2nd ed.), CRC Press, p. 206,ISBN 978-1-4200-9983-6.
  36. ^Sipser, Michael (2012), "Example 7.4",Introduction to the Theory of Computation (3rd ed.), Cengage Learning, pp. 277–278,ISBN 9781133187790.
  37. ^Sedgewick & Wayne (2011),p. 186.
  38. ^Cormen et al. (2001), p. 156;Goodrich & Tamassia (2002), p. 238.
  39. ^Cormen et al. (2001), p. 276;Goodrich & Tamassia (2002), p. 159.
  40. ^Cormen et al. (2001), p. 879–880;Goodrich & Tamassia (2002), p. 464.
  41. ^Edmonds, Jeff (2008),How to Think About Algorithms, Cambridge University Press, p. 302,ISBN 978-1-139-47175-6.
  42. ^Cormen et al. (2001), p. 844;Goodrich & Tamassia (2002), p. 279.
  43. ^Cormen et al. (2001), section 28.2..
  44. ^Causton, Helen; Quackenbush, John; Brazma, Alvis (2009),Microarray Gene Expression Data Analysis: A Beginner's Guide, John Wiley & Sons, pp. 49–50,ISBN 978-1-4443-1156-3.
  45. ^Eidhammer, Ingvar; Barsnes, Harald; Eide, Geir Egil; Martens, Lennart (2012),Computational and Statistical Methods for Protein Quantification by Mass Spectrometry, John Wiley & Sons, p. 105,ISBN 978-1-118-49378-6.
  46. ^abCampbell, Murray; Greated, Clive (1994),The Musician's Guide to Acoustics, Oxford University Press, p. 78,ISBN 978-0-19-159167-9.
  47. ^Randel, Don Michael, ed. (2003),The Harvard Dictionary of Music (4th ed.), The Belknap Press of Harvard University Press, p. 416,ISBN 978-0-674-01163-2.
  48. ^France, Robert (2008),Introduction to Physical Education and Sport Science, Cengage Learning, p. 282,ISBN 978-1-4180-5529-5.
  49. ^Allen, Elizabeth; Triantaphillidou, Sophie (2011),The Manual of Photography, Taylor & Francis, p. 228,ISBN 978-0-240-52037-7.
  50. ^abDavis, Phil (1998),Beyond the Zone System, CRC Press, p. 17,ISBN 978-1-136-09294-7.
  51. ^Allen & Triantaphillidou (2011),p. 235.
  52. ^Zwerman, Susan; Okun, Jeffrey A. (2012),Visual Effects Society Handbook: Workflow and Techniques, CRC Press, p. 205,ISBN 978-1-136-13614-6.
  53. ^Bauer, Craig P. (2013),Secret History: The Story of Cryptology, CRC Press, p. 332,ISBN 978-1-4665-6186-1.
  54. ^Sloane, N. J. A. (ed.),"Sequence A007525 (Decimal expansion of log_2 e)",TheOn-Line Encyclopedia of Integer Sequences, OEIS Foundation
  55. ^Sloane, N. J. A. (ed.),"Sequence A020862 (Decimal expansion of log_2(10))",TheOn-Line Encyclopedia of Integer Sequences, OEIS Foundation
  56. ^abWarren Jr., Henry S. (2002),Hacker's Delight (1st ed.),Addison Wesley, p. 215,ISBN 978-0-201-91465-8
  57. ^fls, Linux kernel API,kernel.org, retrieved 2010-10-17.
  58. ^Combet, M.; Van Zonneveld, H.; Verbeek, L. (December 1965), "Computation of the base two logarithm of binary numbers",IEEE Transactions on Electronic Computers, EC-14 (6):863–867,Bibcode:1965ITECm..14..863C,doi:10.1109/pgec.1965.264080
  59. ^McEniry, Charles (August 2007),The Mathematics Behind the Fast Inverse Square Root Function Code(PDF), archived fromthe original(PDF) on 2015-05-11
  60. ^abcdMajithia, J. C.; Levan, D. (1973), "A note on base-2 logarithm computations",Proceedings of the IEEE,61 (10):1519–1520,Bibcode:1973IEEEP..61.1519M,doi:10.1109/PROC.1973.9318.
  61. ^Stephenson, Ian (2005), "9.6 Fast Power, Log2, and Exp2 Functions",Production Rendering: Design and Implementation, Springer-Verlag, pp. 270–273,ISBN 978-1-84628-085-6.
  62. ^Warren Jr., Henry S. (2013) [2002],"11-4: Integer Logarithm",Hacker's Delight (2nd ed.),Addison WesleyPearson Education, Inc., p. 291,ISBN 978-0-321-84268-8, 0-321-84268-5.
  63. ^"7.12.6.10 The log2 functions",ISO/IEC 9899:1999 specification(PDF), p. 226.
  64. ^Redfern, Darren; Campbell, Colin (1998),The Matlab® 5 Handbook, Springer-Verlag, p. 141,ISBN 978-1-4612-2170-8.

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Binary_logarithm&oldid=1317086714"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp