Browse Definitions :
Definition

# polynomial

A polynomial is a mathematical expression consisting of a sum of terms, each term including a variable or variables raised to a power and multiplied by a coefficient.  The simplest polynomials have one variable.  A one-variable (univariate) polynomial of degree n has the following form:

anxn + an-1xn-1 + ... + a2x2 + a1x1 + ax

where the a's represent the coefficients and x represents the variable.  Because x1 = x and x = 1 for all complex numbers x, the above expression can be simplified to:

anxn + an-1xn-1 + ... + a2x2 + a1x + a

When an nth-degree univariate polynomial is equal to zero, the result is a univariate polynomial equation of degree n:

anxn + an-1xn-1 + ... + a2x2 + a1x + a = 0

There may be several different values of x, called roots, that satisfy a univariate polynomial equation.  In general, the higher the order of the equation (that is, the larger the value of n), the more roots there are.

A univariate polynomial equation of degree 1 (n = 1) constitutes a linear equation.  When n = 2, it is a quadratic equation; when n = 3, it is a cubic equation; when n = 4, it is a quartic equation; when n = 5, it is a quintic equation.  The larger the value of n, the more difficult it is to find all the roots of a univariate polynomial equation.

Some polynomials have two, three, or more variables.  A two-variable polynomial is called bivariate; a three-variable polynomial is called trivariate.

This was last updated in May 2008
• network packet

A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

• virtual network functions (VNFs)

Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

• network functions virtualization (NFV)

Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

• MICR (magnetic ink character recognition)

MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

• What is cybersecurity?

Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

• Android System WebView

Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

• privacy compliance

Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

• contingent workforce

A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

• product development (new product development -- NPD)

Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

• talent acquisition

Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

• employee retention

Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

• hybrid work model

A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...