Gnomon algorithm: Difference between revisions
No edit summary |
No edit summary |
||
Line 15: | Line 15: | ||
<gallery> | <gallery> | ||
File:Binary_counter.gif|link=Computer science (nonfiction)|2018: [[Computer science (nonfiction)|Binary counter working overtime]], looking forward to that big paycheck. | File:Binary_counter.gif|link=Computer science (nonfiction)|2018: [[Computer science (nonfiction)|Binary counter working overtime]], looking forward to that big paycheck. | ||
File:Spinning_Thistle.jpg|link=Spinning Thistle (nonfiction)|2018: Steganographic analysis ''[[Spinning Thistle (nonfiction)|Spinning Thistle]]'' unexpectedly reveals a previously unknown Gnomon algorithm function. | File:Spinning_Thistle.jpg|link=Spinning Thistle (nonfiction)|2018: Steganographic analysis ''[[Spinning Thistle (nonfiction)|Spinning Thistle]]'' unexpectedly reveals a previously unknown Gnomon algorithm function. | ||
Line 32: | Line 31: | ||
File:Guo_Shoujing_studies_the_Pleiades.jpg|[[Guo Shoujing (nonfiction)]] studies the Pleiades, discovers new form of Gnomon algorithm. | File:Guo_Shoujing_studies_the_Pleiades.jpg|[[Guo Shoujing (nonfiction)]] studies the Pleiades, discovers new form of Gnomon algorithm. | ||
</gallery> | |||
== Fiction cross-reference == | == Fiction cross-reference == |
Revision as of 18:22, 28 November 2018
The Gnomon algorithm is a family of mathematical functions (nonfiction) which convert computation (nonfiction) into force (nonfiction).
Mathematicians use Gnomon algorithm functions for a variety of purposes:
- Detecting and preventing crimes against mathematical constants
- Creating, managing, and deleting trandimensional corporations
- Participating in the Gnomon Chronicles
- Computational farming with diagramaceous soil
- Playing Fantasy Voronoi diagram
- Activating and controlling scrying engines
- Communicating with AESOP
In the News
2018: Binary counter working overtime, looking forward to that big paycheck.
2018: Steganographic analysis Spinning Thistle unexpectedly reveals a previously unknown Gnomon algorithm function.
2017: Steganographic analysis of Green Spiral 9 unexpectedly reveals two terabytes of previously unknown Gnomon algorithm functions.
1600: Priest and mathematician Matteo Ricci publish his groundbreaking translation of Euclid's Elements into Gnomon algorithm statements.
Physicist and crime-fighter Galileo Galilei, imprisoned on trumped-up charges, uses nail to scratch the equation E pur si muove on dungeon wall; in the process, he discovers a deliberately concealed Gnomon algorithm function which proves his innocence. Although Galileo's accusation that the function was stolen and concealed by the Forbidden Ratio is widely believed to be true, no proof has emerged that the Ratio or its degenerate cases were involved.
1257: First known use of Yui's triangle to compute Gnomon algorithm functions.
Enrico Fermi discovers new form of Gnomon algorithm, uses it predict and prevent crimes against mathematical constants.
Charles Sanders Peirce invents new variety of Gnomon algorithm, anticipates future work by Ernst Schröder.
Guo Shoujing (nonfiction) studies the Pleiades, discovers new form of Gnomon algorithm.
Fiction cross-reference
- Crimes against mathematical constants
- Havelock
- Hollerith
- Mathematician
- Mathematics
- Scrying engine
- The Custodian
- Transdimensional corporation
- Watergate Scandal (virus) - a math virus which infiltrates and corrupts Gnomon algorithm functions in order to commit crimes against mathematical constants for political purposes.
Nonfiction cross-reference
- Algorithm (nonfiction)
- Computation (nonfiction)
- Computational complexity theory (nonfiction)
- Computer science (nonfiction)
- Evil bit (nonfiction)
- Force (nonfiction)
- Gnomon (nonfiction)
- Gnomon algorithm (nonfiction)
- Mathematical function (nonfiction)
- Mathematics (nonfiction)
- Measurement (nonfiction)
- Pathological science (nonfiction)