Browse Definitions :
Definition

# absolute value

Absolute value is a term used in mathematics to indicate the distance of a point or number from the origin (zero point) of a number line or coordinate system. This can apply to Scalar or vector quantities. The symbol for absolute value is a pair of vertical lines, one on either side of the quantity whose absolute value is to be determined.

Suppose x is a real number. Then the absolute value of x is defined as follows:

For x = 0 or x > 0, | x | = x
For x < 0, | x | = - x

Alternatively, the absolute value of a real number x is equal to the positive square root of x 2 :

| x | = ( x 2 ) 1/2

Let a + jb be a complex number, where a and b are real numbers and j is the positive square root of -1. (The symbol j is standard in engineering practice; mathematicians symbolize the positive square root of -1 as i .) Then the absolute value of a + jb , also called the modulus, is defined as follows:

| a + jb | = ( a 2 + b 2 ) 1/2

The absolute value of a vector in n dimensions is defined in terms of the coordinates of its termination point, in Cartesian n -space, assuming its origin coincides with the point where all coordinate values are zero. Suppose v is a vector in n dimensions, represented by the following coordinates:

v = ( v 1 , v 2 , v 3 , ..., v n )

Then the absolute value of v is given by:

| v | = ( v 1 2 + v 2 2 + v 3 2 + ... + v n 2 ) 1/2

Also see Mathematical Symbols .

This was last updated in November 2010
• subnet (subnetwork)

A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

• secure access service edge (SASE)

Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

• Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

• intrusion detection system (IDS)

An intrusion detection system monitors (IDS) network traffic for suspicious activity and sends alerts when such activity is ...

• cyber attack

A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

• digital signature

A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

• product development (new product development)

Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

• innovation culture

Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

• organizational network analysis (ONA)

Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

• HireVue

HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

• Human Resource Certification Institute (HRCI)

Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

• What is lead-to-revenue management (L2RM)?

Lead-to-revenue management (L2RM) is a set of sales and marketing methods focusing on generating revenue throughout the customer ...

• What is relationship marketing?

Relationship marketing is a facet of customer relationship management (CRM) that focuses on customer loyalty and long-term ...

• contact center burnout

Contact center burnout refers to physical, emotional and mental exhaustion experienced by contact center employees.

Close