Browse Definitions :
Definition

absolute value

Absolute value is a term used in mathematics to indicate the distance of a point or number from the origin (zero point) of a number line or coordinate system. This can apply to Scalar or vector quantities. The symbol for absolute value is a pair of vertical lines, one on either side of the quantity whose absolute value is to be determined.

Suppose x is a real number. Then the absolute value of x is defined as follows:

For x = 0 or x > 0, | x | = x
For x < 0, | x | = - x

Alternatively, the absolute value of a real number x is equal to the positive square root of x 2 :

| x | = ( x 2 ) 1/2

Let a + jb be a complex number, where a and b are real numbers and j is the positive square root of -1. (The symbol j is standard in engineering practice; mathematicians symbolize the positive square root of -1 as i .) Then the absolute value of a + jb , also called the modulus, is defined as follows:

| a + jb | = ( a 2 + b 2 ) 1/2

The absolute value of a vector in n dimensions is defined in terms of the coordinates of its termination point, in Cartesian n -space, assuming its origin coincides with the point where all coordinate values are zero. Suppose v is a vector in n dimensions, represented by the following coordinates:

v = ( v 1 , v 2 , v 3 , ..., v n )

Then the absolute value of v is given by:

| v | = ( v 1 2 + v 2 2 + v 3 2 + ... + v n 2 ) 1/2

Also see Mathematical Symbols .

This was last updated in November 2010
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

  • data masking

    Data masking is a method of creating a structurally similar but inauthentic version of an organization's data that can be used ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close