Browse Definitions :

absolute value

Absolute value is a term used in mathematics to indicate the distance of a point or number from the origin (zero point) of a number line or coordinate system. This can apply to Scalar or vector quantities. The symbol for absolute value is a pair of vertical lines, one on either side of the quantity whose absolute value is to be determined.

Suppose x is a real number. Then the absolute value of x is defined as follows:

For x = 0 or x > 0, | x | = x
For x < 0, | x | = - x

Alternatively, the absolute value of a real number x is equal to the positive square root of x 2 :

| x | = ( x 2 ) 1/2

Let a + jb be a complex number, where a and b are real numbers and j is the positive square root of -1. (The symbol j is standard in engineering practice; mathematicians symbolize the positive square root of -1 as i .) Then the absolute value of a + jb , also called the modulus, is defined as follows:

| a + jb | = ( a 2 + b 2 ) 1/2

The absolute value of a vector in n dimensions is defined in terms of the coordinates of its termination point, in Cartesian n -space, assuming its origin coincides with the point where all coordinate values are zero. Suppose v is a vector in n dimensions, represented by the following coordinates:

v = ( v 1 , v 2 , v 3 , ..., v n )

Then the absolute value of v is given by:

| v | = ( v 1 2 + v 2 2 + v 3 2 + ... + v n 2 ) 1/2

Also see Mathematical Symbols .

This was last updated in November 2010
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

  • intrusion detection system (IDS)

    An intrusion detection system monitors (IDS) network traffic for suspicious activity and sends alerts when such activity is ...

  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • What is lead-to-revenue management (L2RM)?

    Lead-to-revenue management (L2RM) is a set of sales and marketing methods focusing on generating revenue throughout the customer ...

  • What is relationship marketing?

    Relationship marketing is a facet of customer relationship management (CRM) that focuses on customer loyalty and long-term ...

  • contact center burnout

    Contact center burnout refers to physical, emotional and mental exhaustion experienced by contact center employees.