06.09.2021 Views

College Algebra, 2013a

College Algebra, 2013a

College Algebra, 2013a

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.5 Applications of Exponential and Logarithmic Functions 477<br />

If we take the time to analyze the graph of y = N(x) above, we can see graphically how logistic<br />

growth combines features of uninhibited and limited growth. The curve seems to rise steeply, then<br />

at some point, begins to level off. The point at which this happens is called an inflection point<br />

or is sometimes called the ‘point of diminishing returns’. At this point, even though the function is<br />

still increasing, the rate at which it does so begins to decline. It turns out the point of diminishing<br />

returns always occurs at half the limiting population. (In our case, when y = 42.) While these<br />

concepts are more precisely quantified using Calculus, below are two views of the graph of y = N(x),<br />

one on the interval [0, 8], the other on [8, 15]. The former looks strikingly like uninhibited growth;<br />

the latter like limited growth.<br />

84<br />

84<br />

y = f(x) = for y = f(x) =<br />

1+2799e −x<br />

0 ≤ x ≤ 8 8 ≤ x ≤ 16<br />

6.5.2 Applications of Logarithms<br />

1+2799e −x for<br />

Just as many physical phenomena can be modeled by exponential functions, the same is true of<br />

logarithmic functions. In Exercises 75, 76 and 77 of Section 6.1, we showed that logarithms are<br />

useful in measuring the intensities of earthquakes (the Richter scale), sound (decibels) and acids and<br />

bases (pH). We now present yet a different use of the a basic logarithm function, password strength.<br />

Example 6.5.6. The information entropy H, in bits, of a randomly generated password consisting<br />

of L characters is given by H = L log 2 (N), where N is the number of possible symbols for each<br />

character in the password. In general, the higher the entropy, the stronger the password.<br />

1. If a 7 character case-sensitive 16 password is comprised of letters and numbers only, find the<br />

associated information entropy.<br />

2. How many possible symbol options per character is required to produce a 7 character password<br />

with an information entropy of 50 bits?<br />

Solution.<br />

1. There are 26 letters in the alphabet, 52 if upper and lower case letters are counted as different.<br />

There are 10 digits (0 through 9) for a total of N = 62 symbols. Since the password is to be<br />

7 characters long, L =7. Thus,H =7log 2 (62) = 7 ln(62)<br />

ln(2)<br />

≈ 41.68.<br />

16 That is, upper and lower case letters are treated as different characters.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!