In mathematics, an algebraic differential equation is a differential equation that can be expressed by means of differential algebra. There are several such notions, according to the concept of differential algebra used.
In Boolean algebra, the algebraic normal form , ring sum normal form , Zhegalkin normal form, or Reed–Muller expansion is a way of writing logical formulas in one of three...
In mathematics, in the field of control theory, a Sylvester equation is a matrix equation of the form: Then given matrices A, B, and C, the problem is to find...
An independent equation is an equation in a system of simultaneous equations which cannot be derived algebraically from the other equations. The concept typically arises in the context of linear...
The costate equation is related to the state equation used in optimal control. It is also referred to as auxiliary, adjoint, influence, or multiplier equation. It is stated as a...
Differential pulse voltammetry is a voltammetry method used to make electrochemical measurements and a derivative of linear sweep voltammetry or staircase voltammetry, with a series of regular voltage pulses...
Differential capacitance in physics, electronics, and electrochemistry is a measure of the voltage-dependent capacitance of a nonlinear capacitor, such as an electrical double layer or a semiconductor diode. It is...
In linguistics, differential argument marking is the phenomenon of a language's encoding a single grammatical function in different ways. It includes non-uniform encoding of arguments in terms of case marking,...
In abstract algebra, an adelic algebraic group is a semitopological group defined by an algebraic group G over a number field K, and the adele ring A = A of...
In algebraic geometry, a morphism between algebraic varieties is a function between the varieties that is given locally by polynomials. It is also called a regular map. A morphism from...
Differential fault analysis is a type of active side-channel attack in the field of cryptography, specifically cryptanalysis. The principle is to induce faults—unexpected environmental conditions—into cryptographic operations, to reveal their...