Redhawke.org
NUMB3RS All the Math
NUMB3RS has opened the eyes of many people to the ways math and/or science can be used to solve crimes. This is a list of math and science concepts used in the series with links to on-line sources to find more information or sometimes articles written by mathematicians and scientists explaining the concepts used in episodes.

[A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

 
A

Acoustics
Activation Synthesis Theory
Advanced Conditional Probability Distribution
Affinity Analysis
Aggregation Model
AMANDA
Angel Problem
Anti-Counterfeiting Measures
Aperture Illusion
Applied Mathematics
Arbitrage Opportunity
Archimedes' Principle
Arsenic
Artificial Intelligence
Asteroid Hermes
Asthma
Asymmetric Dominance
Asymmetrical Threat Analysis
Auction Theory
Autism
Avian Flu

B

Backdraft
Backward Induction
Bacon's Cipher
Bak-Tang-Wiesenfeld sand pile
Ballistics
Baryogenesis
Bayesian Filter
Bayesian Inference
Beale Ciphers, The
Beat The Dealer
Belief Propagation
Bell Curve
Benford's Law
Black Sox Scandal
Black Swan Theory
Blood Spatter Trigonometry
Bootstrap Statistical Technique
Braille
Bringing Down The House
Brockmann, Dirk
Brownian Motion
Brute Force Search
Buffon's Needle Problem
Buoyancy
Burr Puzzle
Byzantine Fault Tolerance

C

CAD Program
Cake Cutting Algorithm
Calabi-Yau Manifold
Calendar
Cancer Cluster
Card Counting
Cellular Automation
Center for Missing and Exploited Children
Centripetal Force
Chess
Chinese Room
Chomp
Chvatal's Art Gallery Theorem
Classification and Regression Tree
Cloning
Coherent State
Collective Behavior
Combinatorics
Computer Encryption and Reimann
Conflict Diamonds
Conjecture
Constrained System Dynamics
Cooper, D.B.
Courtship Modeling
Craquelure
Critical Path
Cryptography
Curtate Cycloid
Curvelet Analysis

D

Danzig Wolfe Decomposition
Dark Matter
Data Mining
Decision Theory
Decision Tree
Deconvolution Algorithm
"Decoy Effect"
Design Recovery
Diaconis, Persi
Differential Geometry
Diffie-Hellman Encryption
Dijkstra's Algorithm
Dimensional Data Set
Direct Network Flow Problem
Dirichlet tessellations
DNA
Domain Name System
Doppler Effect
Dual-tone Multi-frequency
Dynamic Density

E

Earth Liberation Movement
Econometrics
Economic Model
Eigenface
Electricity
Elevator Paradox
Emerson, Ralph Waldo
Entropy
Equivalent Retaliation Protocol
Escher, MC
Euclid's Orchard
Eugenics
Evans, Robert
Evolutionary Algorithm
Exploding Soda Bottle Experiment

F

4-d Mapping
Faraday's Law of Induction
Farey Sequence
Feynman, Richard
Fibonacci Number
Fifty-Nine Story Crisis, The
Figure-Ground Effect
Flash Mob
Flock Theory
Fluid Dynamics
Fokker-Planck Equation
Forensic Video Reconstruction
Fractal
Fractal Dimension Analysis
Frequency Domain
Friction Circle

G

Gait Analysis
Galton Board
Gambler's Ruin
Game Theory
Gaussian Blur
Gaussian Dispersion Model
Genealogy
Geographic Network Analysis
Geographic Profiling
Geometric Progressions
Ghost Bride
God Particle
Golden Ratio, The
GPS
Greedy Algorithm
Grobner Basis
Groundwater Flow Analysis
Guilloche Patterns

H

H5N1-Avian Flu
Hall Effect
Handwriting Analysis
Hard Disk Partitioning
Heisenberg's Uncertainty Principle
Heron's Fountain
Heterogeneous Poisson Process
Hidden Variable Theory
Hidden Markov Model
Hide and Seek Game Theory
Higgs boson
Holmes-Rahe Scale
Houdini, Harry
Hyperspectral Imagery

I

Ideal Gas Law
Illumination Problem
Information Entropy
Information Theory
International Space Station
Ionizing Radiation

J

Jeopardy Surface
Jessica's Law

K

Katzman Automatic Imaging Telescope
Kennedy Assassination
Kennewick Man
Kernel Density Estimation
Kitt Peak National Observatory
Knapsack Algorithm
Kruskal Count

L

Laser-Induced Plasma Channel
Laser Swath Mapping
Lattice Points
Law of Unintended Consequences
Leet
Levy Flight
Lightning
LIGO
Linear Discrimination Analysis
Liquid Nitrogen Ice Cream
Listing's Law
Load Flow Analysis
Logistic Regression Model
Longitudinal Socialization Process
Lottery
Lunar Phases

M

Magnus Effect
Man in the Middle Attack
Manhattan Project
Markov Chain
Maxwell's Demon
Megan's Law
Mersenne Twister
Metadata
Metcalfe's Law
Microcredit
Millennium Prize Problem
Misznay-Schardin effect
MKULTRA
Monet, Claude
Monty Hall Problem
Multi-Attirbute Compositional Model

N

Nash, John
Nazi Art Theft
Near Earth Asteroids
Nebula M57
Newton, Isaac
Noisy Edge
Non-Newtonian Fluid
Numerology

O

Occam's Razor
Ocean Wave
Odds Ratios
Onion Routing
OODA Loop
Oort Cloud
Optic Crystallographic Analysis
Operation Condor
Opposition Research
Organ Donation
Organizational Theory
Origami
Outlier Detection

P

P vs NP
Paper Airplane
Parimutuel Betting
Partial Differential Equation
Pascal's Principle
Patient Zero
Payoff Matrix
PeMS
Percolation Theory
Phases of Matter
Phishing
Photo Enhancement
Pi
Pick 6
Pissarro, Camille
Podcast
Point Pattern Match
Point Spread
Poisson Clumping Heuristic
Private Information Retrieval
Principal Components Analysis
Probability Theory
Project Stargate
Proof
Property Value
Pursuit Curve
Pursuit Evasion

Q

Quadratic Discriminant Analysis
Quantum Entanglement
Quipu

R

Radiocarbon Dating
Random Match Probability
Rationality Theorem
Recommender System
Refraction
Regression to the Mean
Reimann's Hypothesis
Retrograde Analysis
Reverse Trajectory Problem
RFID
Risk/Reward Analysis
Rosetta Stone
Rossmo, Kim
Runge - Kutta Method

S

Sabermetrics
Scheduling Algorithm
Schrödinger's Cat
Seismic Imaging
Self-organized Criticality
Self Organizing Systems
SETI
Set Covering Deployment
Set Theory
Seven Bridges of Königsberg
Shuffle Tracking
SIR Model
Simplex Algorithm
Simpson's Paradox
Six Degrees of Separation
Slotin, Louis
Small World Problem
Snell's Law
Soap Bubble Theory
Social Image Typology
Social Network Analysis
Social Security Number
Sorry Wrong Number
Spanish Flu
Spectral Representation Synthesis
Squawk Code
"Squish-Squash"
State Diagram
Statistical Linguistic Analysis
Statistical Path Analysis
Statistical Randomness
Stealth Technology
Steiner Tree
Steganography
Straddling Checkerboard
Strange Loop Theory
Straw Purchase
String Metric
String Theory
Strong Law of Small Numbers
Suduko
Sundials
Supply Chain Analysis
Surf Forecasting
Surface Tension
Swarm Bots
Syndromic Surveillance
Syzygy

T

Tabu Search
Target Discrimination
Temporal Link Analysis
Tesseract
Texas Hold 'Em
Texas Sharpshooter
There's Plenty of Room at the Bottom
Time Series Analysis
Tipping Point
"Tit for tat"
Trading Futures
Trajectory
Transposition Cipher
Trawler Problem
Triange Book, The
Triangulation
Trust Metric
Turing Test

U

Ultimatum Game
Unexpected Hanging Paradox

V

Van Eck Phreaking
Venn Diagram
Viterbi Algorithm
VoIP
Volume Rendering
Voronoi Diagrams

W

Walking Ghost Phase
Wavelet Analysis
Wheat and Chessboard Problem
Wright's Equation

X

Nothing yet

Y

Nothing yet

Z

Nothing yet



Last Updated ( Sunday, 28 March 2010 )
Next >