Log4 Log25

Log4 Log25.

Exponent of a power of two

Graph of
logtwox

equally a function of a positive real number
ten

In mathematics, the
binary logarithm
(logiin
) is the power to which the number
two
must be raised to obtain the valuen. That is, for any existent number
10,





x
=

log

2





due north






2

x


=
northward
.


{\displaystyle x=\log _{2}due north\quad \Longleftrightarrow \quad 2^{ten}=n.}



For example, the binary logarithm of
1
is
, the binary logarithm of
2
is
1, the binary logarithm of
iv
is2, and the binary logarithm of
32
is5.

The binary logarithm is the logarithm to the base of operations
ii
and is the inverse function of the ability of two function. Also as
logtwo
, an alternative notation for the binary logarithm is
lb
(the notation preferred by ISO 31-11 and ISO 80000-2).

Historically, the first application of binary logarithms was in music theory, past Leonhard Euler: the binary logarithm of a frequency ratio of two musical tones gives the number of octaves past which the tones differ. Binary logarithms can be used to calculate the length of the representation of a number in the binary numeral system, or the number of bits needed to encode a message in data theory. In computer science, they count the number of steps needed for binary search and related algorithms. Other areas in which the binary logarithm is frequently used include combinatorics, bioinformatics, the design of sports tournaments, and photography.

Binary logarithms are included in the standard C mathematical functions and other mathematical software packages. The integer part of a binary logarithm tin be plant using the discover first set operation on an integer value, or by looking up the exponent of a floating point value. The partial part of the logarithm tin be calculated efficiently.

History

[edit]

The powers of 2 have been known since antiquity; for example, they appear in Euclid’southward
Elements, Props. Ix.32 (on the factorization of powers of ii) and IX.36 (one-half of the Euclid–Euler theorem, on the structure of even perfect numbers). And the binary logarithm of a power of two is simply its position in the ordered sequence of powers of two. On this basis, Michael Stifel has been credited with publishing the first known table of binary logarithms in 1544. His volume
Arithmetica Integra
contains several tables that prove the integers with their corresponding powers of ii. Reversing the rows of these tables allow them to be interpreted every bit tables of binary logarithms.[1]
[ii]

Earlier than Stifel, the 8th century Jain mathematician Virasena is credited with a precursor to the binary logarithm. Virasena’s concept of
ardhacheda
has been defined as the number of times a given number can exist divided evenly past 2. This definition gives rise to a function that coincides with the binary logarithm on the powers of 2,[3]
merely it is different for other integers, giving the 2-adic order rather than the logarithm.[4]

The modern course of a binary logarithm, applying to whatever number (not but powers of two) was considered explicitly past Leonhard Euler in 1739. Euler established the application of binary logarithms to music theory, long before their applications in information theory and reckoner science became known. As role of his piece of work in this area, Euler published a table of binary logarithms of the integers from 1 to 8, to 7 decimal digits of accuracy.[5]
[half dozen]

Definition and backdrop

[edit]

The binary logarithm role may be defined every bit the inverse function to the power of two function, which is a strictly increasing role over the positive real numbers and therefore has a unique changed.[7]
Alternatively, it may be defined as
ln
due north/ln ii
, where
ln
is the natural logarithm, defined in any of its standard ways. Using the circuitous logarithm in this definition allows the binary logarithm to be extended to the complex numbers.[8]

As with other logarithms, the binary logarithm obeys the following equations, which can be used to simplify formulas that combine binary logarithms with multiplication or exponentiation:[9]






log

2





x
y
=

log

2





x
+

log

2





y


{\displaystyle \log _{2}xy=\log _{ii}x+\log _{2}y}








log

2







ten
y


=

log

two





x




log

2





y


{\displaystyle \log _{2}{\frac {10}{y}}=\log _{2}ten-\log _{2}y}








log

2






ten

y


=
y

log

2





10
.


{\displaystyle \log _{two}x^{y}=y\log _{2}10.}



For more than, see listing of logarithmic identities.

Note

[edit]

In mathematics, the binary logarithm of a number
n
is often written as
log2north
.[10]
However, several other notations for this part accept been used or proposed, especially in awarding areas.

Some authors write the binary logarithm as
lg
due north
,[11]
[12]
the notation listed in
The Chicago Manual of Style.[13]
Donald Knuth credits this notation to a suggestion of Edward Reingold,[fourteen]
only its use in both information theory and reckoner science dates to earlier Reingold was active.[xv]
[16]
The binary logarithm has also been written as
log
n

with a prior argument that the default base of operations for the logarithm isii.[17]
[18]
[nineteen]
Another notation that is often used for the same function (especially in the German language scientific literature) is
ld
n
,[20]
[21]
[22]
from Latin
logarithmus dualis
[twenty]
or
logarithmus dyadis.[20]
The DIN 1302 [de], ISO 31-11 and ISO 80000-ii standards recommend yet another annotation,
lb
north
. Co-ordinate to these standards,
lg
n

should not exist used for the binary logarithm, as it is instead reserved for the mutual logarithm
log10
n
.[23]
[24]
[25]

Applications

[edit]

Data theory

[edit]

The number of digits (bits) in the binary representation of a positive integer
northward
is the integral part of
1 + log2n
, i.e.[12]









log

2





n



+
1.


{\displaystyle \lfloor \log _{two}n\rfloor +i.}



In information theory, the definition of the amount of self-information and information entropy is often expressed with the binary logarithm, corresponding to making the bit the primal unit of measurement of data. With these units, the Shannon–Hartley theorem expresses the information capacity of a channel every bit the binary logarithm of its indicate-to-dissonance ratio, plus i. Nevertheless, the natural logarithm and the nat are likewise used in alternative notations for these definitions.[26]

Combinatorics

[edit]

Although the natural logarithm is more important than the binary logarithm in many areas of pure mathematics such as number theory and mathematical analysis,[27]
the binary logarithm has several applications in combinatorics:

  • Every binary tree with
    n
    leaves has height at least
    log2due north
    , with equality when
    north
    is a power of two and the tree is a consummate binary tree.[28]
    Relatedly, the Strahler number of a river system with
    due north
    tributary streams is at nigh
    log2northward
    + 1
    .[29]
  • Every family of sets with
    n
    unlike sets has at least
    log2n

    elements in its union, with equality when the family is a ability ready.[thirty]
  • Every partial cube with
    n
    vertices has isometric dimension at least
    logtwon
    , and has at most


    1
    /
    ii

    north
    log2northward

    edges, with equality when the partial cube is a hypercube graph.[31]
  • Co-ordinate to Ramsey’s theorem, every
    n-vertex undirected graph has either a clique or an contained set up of size logarithmic in
    n. The precise size that can be guaranteed is non known, but the all-time premises known on its size involve binary logarithms. In particular, all graphs accept a clique or independent ready of size at to the lowest degree


    1
    /
    ii

    log2n
    (ane −
    o(1))

    and almost all graphs do not take a clique or contained set of size larger than
    2 log2north
    (one +
    o(1))
    .[32]
  • From a mathematical analysis of the Gilbert–Shannon–Reeds model of random shuffles, 1 tin can evidence that the number of times one needs to shuffle an
    due north-carte du jour deck of cards, using riffle shuffles, to go a distribution on permutations that is close to uniformly random, is approximately


    3
    /
    ii

    log2n
    . This calculation forms the ground for a recommendation that 52-card decks should be shuffled seven times.[33]

Computational complexity

[edit]

Binary search in a sorted array, an algorithm whose time complexity involves binary logarithms

The binary logarithm also frequently appears in the analysis of algorithms,[nineteen]
not only because of the frequent employ of binary number arithmetic in algorithms, only also because binary logarithms occur in the analysis of algorithms based on two-style branching.[14]
If a problem initially has
n
choices for its solution, and each iteration of the algorithm reduces the number of choices by a factor of 2, then the number of iterations needed to select a single pick is again the integral part of
logiinorthward
. This idea is used in the analysis of several algorithms and data structures. For example, in binary search, the size of the problem to exist solved is halved with each iteration, and therefore roughly
log2due north

iterations are needed to obtain a solution for a problem of size
due north.[34]
Similarly, a perfectly counterbalanced binary search tree containing
n
elements has summit
log2(north
+ one) − one
.[35]

The running fourth dimension of an algorithm is ordinarily expressed in big O annotation, which is used to simplify expressions past omitting their constant factors and lower-social club terms. Because logarithms in different bases differ from each other simply past a abiding factor, algorithms that run in

O(log2n)

time tin also be said to run in, say,

O(log13
north)

time. The base of the logarithm in expressions such as

O(log
n)

or

O(northward
log
n)

is therefore not important and can exist omitted.[11]
[36]
However, for logarithms that appear in the exponent of a time bound, the base of the logarithm cannot exist omitted. For example,

O(twolog2n
)

is not the same as

O(2ln
n
)

because the former is equal to

O(north)

and the latter to

O(n
0.6931…)
.

Algorithms with running fourth dimension

O(n logn)

are sometimes called linearithmic.[37]
Some examples of algorithms with running time

O(log
n)

or

O(n
log
northward)

are:

  • Average time quicksort and other comparison sort algorithms[38]
  • Searching in balanced binary search trees[39]
  • Exponentiation by squaring[xl]
  • Longest increasing subsequence[41]

Binary logarithms also occur in the exponents of the time bounds for some split up and conquer algorithms, such equally the Karatsuba algorithm for multiplying
northward-bit numbers in time

O(due north
log2 3)
,[42]
and the Strassen algorithm for multiplying

n
×
n

matrices in fourth dimension

O(n
log2 seven)
.[43]
The occurrence of binary logarithms in these running times tin can be explained by reference to the chief theorem for divide-and-conquer recurrences.

Bioinformatics

[edit]

A microarray for approximately 8700 genes. The expression rates of these genes are compared using binary logarithms.

In bioinformatics, microarrays are used to measure out how strongly different genes are expressed in a sample of biological material. Different rates of expression of a factor are often compared by using the binary logarithm of the ratio of expression rates: the log ratio of two expression rates is divers as the binary logarithm of the ratio of the ii rates. Binary logarithms allow for a user-friendly comparison of expression rates: a doubled expression rate tin be described by a log ratio of
ane, a halved expression rate tin can be described past a log ratio of
−1, and an unchanged expression charge per unit tin can exist described past a log ratio of cypher, for instance.[44]

Data points obtained in this way are often visualized as a scatterplot in which one or both of the coordinate axes are binary logarithms of intensity ratios, or in visualizations such as the MA plot and RA plot that rotate and scale these log ratio scatterplots.[45]

Music theory

[edit]

In music theory, the interval or perceptual difference betwixt ii tones is adamant past the ratio of their frequencies. Intervals coming from rational number ratios with small numerators and denominators are perceived as especially euphonious. The simplest and near important of these intervals is the octave, a frequency ratio of
2:1. The number of octaves by which two tones differ is the binary logarithm of their frequency ratio.[46]

To study tuning systems and other aspects of music theory that crave finer distinctions between tones, it is helpful to have a measure of the size of an interval that is finer than an octave and is additive (every bit logarithms are) rather than multiplicative (every bit frequency ratios are). That is, if tones
x,
y, and
z
form a rising sequence of tones, then the mensurate of the interval from
10
to
y
plus the measure of the interval from
y
to
z
should equal the measure of the interval from
10
to
z. Such a measure is given by the cent, which divides the octave into
1200
equal intervals (12
semitones of
100
cents each). Mathematically, given tones with frequencies

f
i

and

f
2
, the number of cents in the interval from

f
1

to

f
2

is[46]






|

1200

log

two








f

1



f

2





|

.


{\displaystyle \left|1200\log _{2}{\frac {f_{1}}{f_{two}}}\right|.}



The millioctave is defined in the same way, but with a multiplier of
thou
instead of
1200.[47]

Sports scheduling

[edit]

In competitive games and sports involving two players or teams in each game or friction match, the binary logarithm indicates the number of rounds necessary in a unmarried-elimination tournament required to determine a winner. For example, a tournament of
four
players requires
logii iv = 2
rounds to make up one’s mind the winner, a tournament of
32
teams requires
logtwo 32 = 5
rounds, etc. In this case, for
n
players/teams where
n
is not a power of 2,
log2n

is rounded up since it is necessary to have at least one round in which not all remaining competitors play. For example,
log2 vi
is approximately
ii.585, which rounds upwardly to
3, indicating that a tournament of
six
teams requires
iii
rounds (either two teams sit out the first circular, or one team sits out the second round). The same number of rounds is as well necessary to determine a clear winner in a Swiss-system tournament.[48]

Photography

[edit]

In photography, exposure values are measured in terms of the binary logarithm of the amount of light reaching the film or sensor, in accordance with the Weber–Fechner police describing a logarithmic response of the human visual organization to light. A single stop of exposure is one unit on a base-2
logarithmic scale.[49]
[50]
More than precisely, the exposure value of a photograph is divers as






log

2








N

2


t




{\displaystyle \log _{ii}{\frac {N^{ii}}{t}}}



where
North
is the f-number measuring the discontinuity of the lens during the exposure, and
t
is the number of seconds of exposure.[51]

Binary logarithms (expressed as stops) are also used in densitometry, to express the dynamic range of calorie-free-sensitive materials or digital sensors.[52]

Calculation

[edit]

Conversion from other bases

[edit]

An easy way to calculate
log2n

on calculators that do not have a
log2

role is to use the natural logarithm (ln) or the common logarithm (log
or
log10
) functions, which are found on most scientific calculators. The specific change of logarithm base of operations formulae for this are:[l]
[53]






log

2





due north
=



ln



due north


ln



2



=




log

ten





n



log

x





2



,


{\displaystyle \log _{two}northward={\frac {\ln n}{\ln ii}}={\frac {\log _{x}northward}{\log _{10}2}},}



or approximately






log

2





n



1.442695
ln



n



3.321928

log

x





n
.


{\displaystyle \log _{2}north\approx 1.442695\ln n\approx iii.321928\log _{ten}northward.}



Integer rounding

[edit]

The binary logarithm tin be fabricated into a role from integers and to integers past rounding it up or down. These 2 forms of integer binary logarithm are related by this formula:









log

two





(
due north
)



=




log

2





(
northward
+
one
)






1
,

 if

north



1.


{\displaystyle \lfloor \log _{2}(n)\rfloor =\lceil \log _{two}(n+ane)\rceil -ane,{\text{ if }}n\geq i.}




[54]

The definition tin can be extended by defining








log

ii





(

)



=



1


{\displaystyle \lfloor \log _{two}(0)\rfloor =-i}



. Extended in this way, this function is related to the number of leading zeros of the 32-flake unsigned binary representation of
x,
nlz(x).









log

2





(
n
)



=
31



nlz



(
n
)
.


{\displaystyle \lfloor \log _{2}(north)\rfloor =31-\operatorname {nlz} (n).}




[54]

The integer binary logarithm can be interpreted as the cipher-based index of the about significant
1
flake in the input. In this sense it is the complement of the find first set operation, which finds the index of the to the lowest degree significant
1
bit. Many hardware platforms include support for finding the number of leading zeros, or equivalent operations, which can be used to rapidly find the binary logarithm. The
fls
and
flsl
functions in the Linux kernel[55]
and in some versions of the libc software library also compute the binary logarithm (rounded upward to an integer, plus i).

Iterative approximation

[edit]

For a general positive existent number, the binary logarithm may exist computed in ii parts.[56]
Start, one computes the integer part,








log

2





ten





{\displaystyle \lfloor \log _{2}10\rfloor }




(called the characteristic of the logarithm). This reduces the problem to one where the argument of the logarithm is in a restricted range, the interval
[ane, 2), simplifying the 2nd stride of computing the fractional part (the mantissa of the logarithm). For whatsoever

x
> 0
, there exists a unique integer
n
such that
ii
n


x
< 2
n+1

, or equivalently
1 ≤ 2north

x
< 2
. Now the integer part of the logarithm is just
due north, and the fractional part is
log2(twonorth

ten)
.[56]
In other words:






log

2





x
=
n
+

log

ii





y


where

y
=

2




northward


x

 and

y



[
one
,
2
)


{\displaystyle \log _{two}x=n+\log _{2}y\quad {\text{where }}y=ii^{-due north}x{\text{ and }}y\in [i,2)}



For normalized floating-point numbers, the integer office is given by the floating-point exponent,[57]
and for integers it can be adamant past performing a count leading zeros functioning.[58]

The partial function of the result is
log2y

and tin can be computed iteratively, using only elementary multiplication and division.[56]
The algorithm for computing the partial role can be described in pseudocode as follows:

  1. Offset with a real number
    y
    in the half-open up interval
    [1, two). If

    y
    = 1
    , so the algorithm is done, and the fractional office is zero.
  2. Otherwise, square
    y
    repeatedly until the consequence
    z
    lies in the interval
    [2, 4). Let
    g
    be the number of squarings needed. That is,

    z
    =
    y
    2
    thou



    with
    1000
    chosen such that
    z
    is in
    [two, 4).
  3. Taking the logarithm of both sides and doing some algebra:









    log

    2





    z



    =

    2

    thousand



    log

    ii





    y





    log

    two





    y



    =




    log

    two





    z


    two

    m










    =



    1
    +

    log

    2





    (
    z

    /

    two
    )


    two

    one thousand










    =

    2




    thousand


    +

    2




    thousand



    log

    two





    (
    z

    /

    2
    )
    .






    {\displaystyle {\begin{aligned}\log _{two}z&=2^{thou}\log _{ii}y\\\log _{two}y&={\frac {\log _{two}z}{ii^{m}}}\\&={\frac {1+\log _{2}(z/ii)}{2^{thou}}}\\&=2^{-m}+2^{-m}\log _{2}(z/2).\stop{aligned}}}

  4. Over again

    z/two

    is a real number in the interval
    [one, 2). Return to step 1 and compute the binary logarithm of

    z/ii

    using the same method.

The consequence of this is expressed by the following recursive formulas, in which





m

i




{\displaystyle m_{i}}




is the number of squarings required in the
i-th iteration of the algorithm:









log

two





ten



=
n
+

two





yard

i





(

1
+

2





chiliad

2





(

one
+

2





thou

3





(

1
+




)


)


)







=
n
+

2





m

1




+

2





m

i






yard

two




+

ii





m

1






m

2






m

3




+









{\displaystyle {\begin{aligned}\log _{2}x&=n+2^{-m_{1}}\left(1+2^{-m_{2}}\left(ane+2^{-m_{3}}\left(1+\cdots \right)\right)\right)\\&=n+two^{-m_{1}}+two^{-m_{1}-m_{2}}+2^{-m_{one}-m_{2}-m_{3}}+\cdots \end{aligned}}}

In the special case where the fractional office in step ane is institute to be zippo, this is a
finite
sequence terminating at some indicate. Otherwise, it is an infinite serial that converges co-ordinate to the ratio test, since each term is strictly less than the previous 1 (since every

m

i

> 0
). For practical use, this infinite series must exist truncated to reach an approximate result. If the series is truncated after the
i-thursday term, then the error in the outcome is less than
2−(1000
one
+
m
ii
+ ⋯ +
m

i
)

.[56]

Software library back up

[edit]

The
log2
function is included in the standard C mathematical functions. The default version of this office takes double precision arguments just variants of information technology allow the argument to be single-precision or to be a long double.[59]
In computing environments supporting circuitous numbers and implicit blazon conversion such equally MATLAB the argument to the
log2
function is immune to be a negative number, returning a circuitous one.[60]

References

[edit]


  1. ^


    Groza, Vivian Shaw; Shelley, Susanne G. (1972),
    Precalculus mathematics, New York: Holt, Rinehart and Winston, p. 182, ISBN978-0-03-077670-0

    .

  2. ^


    Stifel, Michael (1544),
    Arithmetica integra
    (in Latin), p. 31

    . A re-create of the same tabular array with two more entries appears on p. 237, and another copy extended to negative powers appears on p. 249b.

  3. ^


    Joseph, G. G. (2011),
    The Crest of the Peacock: Non-European Roots of Mathematics
    (3rd ed.), Princeton University Press, p. 352

    .

  4. ^

    Run into, e.thou.,
    Shparlinski, Igor (2013),
    Cryptographic Applications of Analytic Number Theory: Complexity Lower Bounds and Pseudorandomness, Progress in Computer science and Applied Logic, vol. 22, Birkhäuser, p. 35, ISBN978-3-0348-8037-4

    .

  5. ^


    Euler, Leonhard (1739), “Chapter Vii. De Variorum Intervallorum Receptis Appelationibus”,
    Tentamen novae theoriae musicae ex certissismis harmoniae principiis dilucide expositae
    (in Latin), Saint Petersburg Academy, pp. 102–112

    .

  6. ^


    Tegg, Thomas (1829), “Binary logarithms”,
    London encyclopaedia; or, Universal dictionary of science, art, literature and practical mechanics: comprising a popular view of the nowadays country of noesis, Book iv, pp. 142–143

    .

  7. ^


    Batschelet, E. (2012),
    Introduction to Mathematics for Life Scientists, Springer, p. 128, ISBN978-iii-642-96080-2

    .

  8. ^

    For example, Microsoft Excel provides the
    IMLOG2
    function for circuitous binary logarithms: see
    Bourg, David Thou. (2006),
    Excel Scientific and Engineering science Cookbook, O’Reilly Media, p. 232, ISBN978-0-596-55317-3

    .

  9. ^


    Kolman, Bernard; Shapiro, Arnold (1982), “11.4 Properties of Logarithms”,
    Algebra for College Students, Bookish Press, pp. 334–335, ISBN978-1-4832-7121-7

    .

  10. ^

    For instance, this is the notation used in the
    Encyclopedia of Mathematics
    and
    The Princeton Companion to Mathematics.
  11. ^


    a




    b




    Cormen, Thomas H.; Leiserson, Charles E.; Rivest, Ronald Fifty.; Stein, Clifford (2001) [1990],
    Introduction to Algorithms
    (2nd ed.), MIT Printing and McGraw-Colina, pp. 34, 53–54, ISBN0-262-03293-seven


  12. ^


    a




    b




    Sedgewick, Robert; Wayne, Kevin Daniel (2011),
    Algorithms, Addison-Wesley Professional, p. 185, ISBN978-0-321-57351-3

    .

  13. ^



    The Chicago Transmission of Fashion
    (25th ed.), Academy of Chicago Press, 2003, p. 530

    .
  14. ^


    a




    b




    Knuth, Donald E. (1997),
    Key Algorithms, The Art of Computer Programming, vol. 1 (3rd ed.), Addison-Wesley Professional, ISBN978-0-321-63574-7

    , p. 11. The same notation was in the 1973 2nd edition of the same book (p. 23) but without the credit to Reingold.

  15. ^


    Trucco, Ernesto (1956), “A annotation on the information content of graphs”,
    Bull. Math. Biophys.,
    18
    (2): 129–135, doi:10.1007/BF02477836, MR 0077919

    .

  16. ^


    Mitchell, John N. (1962), “Computer multiplication and sectionalization using binary logarithms”,
    IRE Transactions on Electronic Computers, EC-11 (4): 512–517, doi:10.1109/TEC.1962.5219391

    .

  17. ^


    Fiche, Georges; Hebuterne, Gerard (2013),
    Mathematics for Engineers, John Wiley & Sons, p. 152, ISBN978-1-118-62333-6,
    In the post-obit, and unless otherwise stated, the notation
    log
    x

    always stands for the logarithm to the base
    two
    of
    x


    .

  18. ^


    Cover, Thomas 1000.; Thomas, Joy A. (2012),
    Elements of Data Theory
    (2nd ed.), John Wiley & Sons, p. 33, ISBN978-i-118-58577-1,
    Unless otherwise specified, we volition take all logarithms to base
    2


    .
  19. ^


    a




    b




    Goodrich, Michael T.; Tamassia, Roberto (2002),
    Algorithm Design: Foundations, Analysis, and Internet Examples, John Wiley & Sons, p. 23,
    One of the interesting and sometimes fifty-fifty surprising aspects of the assay of information structures and algorithms is the ubiquitous presence of logarithms … As is the custom in the computing literature, nosotros omit writing the base
    b
    of the logarithm when

    b = 2
    .



  20. ^


    a




    b




    c




    Tafel, Hans Jörg (1971),
    Einführung in die digitale Datenverarbeitung
    [Introduction to digital information processing] (in German), Munich: Carl Hanser Verlag, pp. 20–21, ISBN3-446-10569-7



  21. ^


    Tietze, Ulrich; Schenk, Christoph (1999),

    Halbleiter-Schaltungstechnik

    (in German) (1st corrected reprint, 11th ed.), Springer Verlag, p. 1370, ISBN3-540-64192-0



  22. ^


    Bauer, Friedrich L. (2009),
    Origins and Foundations of Computing: In Cooperation with Heinz Nixdorf MuseumsForum, Springer Scientific discipline & Business Media, p. 54, ISBN978-iii-642-02991-2

    .

  23. ^

    For DIN 1302 see

    Brockhaus Enzyklopädie in zwanzig Bänden
    [Brockhaus Encyclopedia in Twenty Volumes] (in German), vol. 11, Wiesbaden: F.A. Brockhaus, 1970, p. 554, ISBN978-3-7653-0000-4

    .

  24. ^

    For ISO 31-eleven see
    Thompson, Ambler; Taylor, Barry M (March 2008),
    Guide for the Use of the International System of Units (SI) — NIST Special Publication 811, 2008 Edition — Second Printing
    (PDF), NIST, p. 33

    .

  25. ^

    For ISO 80000-2 see
    “Quantities and units – Part two: Mathematical signs and symbols to be used in the natural sciences and technology”
    (PDF),
    International Standard ISO 80000-ii
    (1st ed.), December i, 2009, Department 12, Exponential and logarithmic functions, p. eighteen

    .

  26. ^


    Van der Lubbe, Jan C. A. (1997),
    Information Theory, Cambridge University Press, p. 3, ISBN978-0-521-46760-5

    .

  27. ^


    Stewart, Ian (2015),
    Taming the Infinite, Quercus, p. 120, ISBN9781623654733,
    in advanced mathematics and science the merely logarithm of importance is the natural logarithm

    .

  28. ^


    Leiss, Ernst L. (2006),
    A Programmer’s Companion to Algorithm Analysis, CRC Press, p. 28, ISBN978-1-4200-1170-eight

    .

  29. ^


    Devroye, L.; Kruszewski, P. (1996), “On the Horton–Strahler number for random tries”,
    RAIRO Informatique Théorique et Applications,
    30
    (five): 443–456, doi:10.1051/ita/1996300504431, MR 1435732

    .

  30. ^

    Equivalently, a family unit with
    k
    distinct elements has at well-nigh
    2
    k


    distinct sets, with equality when information technology is a ability set.

  31. ^


    Eppstein, David (2005), “The lattice dimension of a graph”,
    European Journal of Combinatorics,
    26
    (5): 585–592, arXiv:cs.DS/0402028, doi:x.1016/j.ejc.2004.05.001, MR 2127682, S2CID 7482443

    .

  32. ^


    Graham, Ronald L.; Rothschild, Bruce L.; Spencer, Joel H. (1980),
    Ramsey Theory, Wiley-Interscience, p. 78

    .

  33. ^


    Bayer, Dave; Diaconis, Persi (1992), “Trailing the dovetail shuffle to its lair”,
    The Annals of Practical Probability,
    2
    (2): 294–313, doi:10.1214/aoap/1177005705, JSTOR 2959752, MR 1161056

    .

  34. ^


    Mehlhorn, Kurt; Sanders, Peter (2008), “2.5 An example – binary search”,
    Algorithms and Data Structures: The Basic Toolbox
    (PDF), Springer, pp. 34–36, ISBN978-3-540-77977-3

    .

  35. ^


    Roberts, Fred; Tesman, Barry (2009),
    Applied Combinatorics
    (2nd ed.), CRC Press, p. 206, ISBN978-1-4200-9983-6

    .

  36. ^


    Sipser, Michael (2012), “Example 7.4”,
    Introduction to the Theory of Ciphering
    (3rd ed.), Cengage Learning, pp. 277–278, ISBN9781133187790

    .

  37. ^

    Sedgewick & Wayne (2011), p. 186.

  38. ^

    Cormen et al., p. 156; Goodrich & Tamassia, p. 238.

  39. ^

    Cormen et al., p. 276; Goodrich & Tamassia, p. 159.

  40. ^

    Cormen et al., pp. 879–880; Goodrich & Tamassia, p. 464.

  41. ^


    Edmonds, Jeff (2008),
    How to Think Near Algorithms, Cambridge Academy Press, p. 302, ISBN978-1-139-47175-6

    .

  42. ^

    Cormen et al., p. 844; Goodrich & Tamassia, p. 279.

  43. ^

    Cormen et al., department 28.2.

  44. ^


    Causton, Helen; Quackenbush, John; Brazma, Alvis (2009),
    Microarray Gene Expression Data Analysis: A Beginner’s Guide, John Wiley & Sons, pp. 49–fifty, ISBN978-ane-4443-1156-iii

    .

  45. ^


    Eidhammer, Ingvar; Barsnes, Harald; Eide, Geir Egil; Martens, Lennart (2012),
    Computational and Statistical Methods for Protein Quantification past Mass Spectrometry, John Wiley & Sons, p. 105, ISBN978-1-118-49378-6

    .
  46. ^


    a




    b




    Campbell, Murray; Greated, Clive (1994),
    The Musician’due south Guide to Acoustics, Oxford Academy Printing, p. 78, ISBN978-0-19-159167-nine

    .

  47. ^


    Randel, Don Michael, ed. (2003),
    The Harvard Dictionary of Music
    (quaternary ed.), The Belknap Press of Harvard University Press, p. 416, ISBN978-0-674-01163-2

    .

  48. ^


    French republic, Robert (2008),
    Introduction to Physical Education and Sport Science, Cengage Learning, p. 282, ISBN978-1-4180-5529-5

    .

  49. ^


    Allen, Elizabeth; Triantaphillidou, Sophie (2011),
    The Manual of Photography, Taylor & Francis, p. 228, ISBN978-0-240-52037-7

    .
  50. ^


    a




    b




    Davis, Phil (1998),
    Beyond the Zone System, CRC Press, p. 17, ISBN978-1-136-09294-7

    .

  51. ^

    Allen & Triantaphillidou (2011), p. 235.

  52. ^


    Zwerman, Susan; Okun, Jeffrey A. (2012),
    Visual Effects Society Handbook: Workflow and Techniques, CRC Press, p. 205, ISBN978-i-136-13614-6

    .

  53. ^


    Bauer, Craig P. (2013),
    Secret History: The Story of Cryptology, CRC Press, p. 332, ISBN978-one-4665-6186-1

    .
  54. ^


    a




    b




    Warren Jr., Henry S. (2002),
    Hacker’s Delight
    (1st ed.), Addison Wesley, p. 215, ISBN978-0-201-91465-8



  55. ^

    fls, Linux kernel API, kernel.org, retrieved 2010-ten-17.
  56. ^


    a




    b




    c




    d




    Majithia, J. C.; Levan, D. (1973), “A note on base-two logarithm computations”,
    Proceedings of the IEEE,
    61
    (10): 1519–1520, doi:10.1109/PROC.1973.9318

    .

  57. ^


    Stephenson, Ian (2005), “9.vi Fast Power, Log2, and Exp2 Functions”,
    Production Rendering: Design and Implementation, Springer-Verlag, pp. 270–273, ISBN978-1-84628-085-vi

    .

  58. ^


    Warren Jr., Henry S. (2013) [2002], “11-4: Integer Logarithm”,
    Hacker’s Delight
    (2nd ed.), Addison Wesley – Pearson Didactics, Inc., p. 291, ISBN978-0-321-84268-viii, 0-321-84268-5

    .

  59. ^


    “seven.12.6.10 The log2 functions”,
    ISO/IEC 9899:1999 specification
    (PDF), p. 226

    .

  60. ^


    Redfern, Darren; Campbell, Colin (1998),
    The Matlab® v Handbook, Springer-Verlag, p. 141, ISBN978-1-4612-2170-8

    .

External links

[edit]


  • Weisstein, Eric Westward., “Binary Logarithm”,
    MathWorld


  • Anderson, Sean Eron (December 12, 2003), “Observe the log base two of an North-fleck integer in O(lg(N)) operations”,
    Bit Twiddling Hacks, Stanford University, retrieved
    2015-xi-25


  • Feynman and the Connectedness Machine



Log4 Log25

Source: https://en.wikipedia.org/wiki/Binary_logarithm

Baca :   Satuan Suhu Dalam Satuan Internasional Adalah

Check Also

Contoh Soal Perkalian Vektor

Contoh Soal Perkalian Vektor. Web log Koma – Setelah mempelajari beberapa operasi hitung pada vektor …