SlideShare a Scribd company logo
Professional Elegancy (or how to
 write paper for IEEE journal) ...
   Any engineer learns the mathematical notation
 through which two real numbers, for example,



                1+1 = 2
         can be written down very simply.
Even so, this form is wrong, for being too trivial and
          for showing a total lack of style.
Since our very first Math lessons we have known that,

                    1 = ln(e)

                   and also that,

            1 = sin ( p ) + cos ( p )
                     2              2



        besides this, everybody knows that,
                         ∞          n
                       1 
                2 =∑  
                   n=  2 
                     0
So being, the expression,

                 1+1 = 2
  can be re-written in a more elegant form,
                                      ∞         n
                                        1
ln ( e ) + sin ( p ) + cos ( p ) = ∑  
             2            2

                                   n =0  2 


which, as we can easily observe, is a lot more
    scientific and easier to understand.
It is known that:


1 = cosh(q ) * 1 − tanh (q )
                           2



          and that,

                      z
                1
      e = lim1 + 
          z →∞
                z
Hence resulting,

                                                      ∞         n
                                                        1
                ln ( e ) + sin ( p ) + cos ( p ) = ∑  
                              2             2

                                                   n =0  2 



    and can further be written as follows, offering
         substantial clarity and tranparency,

    1 2                                    ∞
                                                   cosh(q ) * 1 − tanh 2 (q)
ln lim1 +   + sin 2 ( p ) + cos 2 ( p ) = ∑
   z →∞  z                                                2n
                                            n =0
Considering that,

                        0!= 1
and that the inverted matrix of a transposed matrix
 equals the transposed matrix of an inverted matrix
(presuming an unidimentional space), we obtain the
      following simplification (using vectorial
                    notation X ),


              (X ) − (X )
                 T −1       −1 T
                                   =0
If both expressions are unified,
              0!= 1
                and

      (X ) − (X )
         T −1         −1 T
                             =0

 we would obviously obtain,

 
   ( ) − (X )
  X
 
       T −1             −1 T   
                               != 1
                               
Applying the above simplifications
             1 2                                ∞
                                                        cosh(q ) * 1 − tanh 2 (q )
            lim1 +   + sin ( p ) + cos ( p ) = ∑
                              2           2
            z →∞ z                                             2n
                                                 n =0




Obtaining finaly, in a total elegant form, legible, brief
    and comprehencible to anyone, the equation:

     T
         ( ) − (X )                     
                                    2
                −1   −1 T    1         + sin 2 ( p ) + cos 2 ( p ) = ∑
                                                                         ∞
                                                                             cosh(q ) * 1 − tanh 2 (q )
 ln lim  X               !+ 
    z →∞                  z                                                       2n
                                                                      n =0




 (which, being honest, is by far more professional than the
                original 1 + 1 = 2 )
Send this message to your colleagues who like to publish
  IEEE journals. Send it also to your friends, who will
come to appreciate your sensible and humble engineering
                         soul …

More Related Content

What's hot

Engr 213 midterm 2a sol 2010
Engr 213 midterm 2a sol 2010Engr 213 midterm 2a sol 2010
Engr 213 midterm 2a sol 2010akabaka12
 
Engr 213 final 2009
Engr 213 final 2009Engr 213 final 2009
Engr 213 final 2009akabaka12
 
Engr 213 final sol 2009
Engr 213 final sol 2009Engr 213 final sol 2009
Engr 213 final sol 2009akabaka12
 
Engr 213 midterm 2b sol 2010
Engr 213 midterm 2b sol 2010Engr 213 midterm 2b sol 2010
Engr 213 midterm 2b sol 2010akabaka12
 
Emat 213 final fall 2005
Emat 213 final fall 2005Emat 213 final fall 2005
Emat 213 final fall 2005akabaka12
 
Asymptotic Growth of Functions
Asymptotic Growth of FunctionsAsymptotic Growth of Functions
Asymptotic Growth of Functions
DEVTYPE
 
Operational research
Operational researchOperational research
Operational research
Albi Thomas
 
Active Attacks on DH Key Exchange
Active Attacks on DH Key ExchangeActive Attacks on DH Key Exchange
Active Attacks on DH Key Exchange
Dharmalingam Ganesan
 
Engineering procedure
Engineering procedureEngineering procedure
Engineering procedure
Vinny Costa
 
Answer to selected_miscellaneous_exercises
Answer to selected_miscellaneous_exercisesAnswer to selected_miscellaneous_exercises
Answer to selected_miscellaneous_exercisespaufong
 
2.1 Revision Game
2.1 Revision Game2.1 Revision Game
2.1 Revision Gamealihamp
 
Linear algebra-solutions-manual-kuttler-1-30-11-otc
Linear algebra-solutions-manual-kuttler-1-30-11-otcLinear algebra-solutions-manual-kuttler-1-30-11-otc
Linear algebra-solutions-manual-kuttler-1-30-11-otckjalili
 
Bch and reed solomon codes generation in frequency domain
Bch and reed solomon codes generation in frequency domainBch and reed solomon codes generation in frequency domain
Bch and reed solomon codes generation in frequency domain
Madhumita Tamhane
 
Engr 213 midterm 1a sol 2009
Engr 213 midterm 1a sol 2009Engr 213 midterm 1a sol 2009
Engr 213 midterm 1a sol 2009akabaka12
 

What's hot (19)

Engr 213 midterm 2a sol 2010
Engr 213 midterm 2a sol 2010Engr 213 midterm 2a sol 2010
Engr 213 midterm 2a sol 2010
 
Engr 213 final 2009
Engr 213 final 2009Engr 213 final 2009
Engr 213 final 2009
 
Engr 213 final sol 2009
Engr 213 final sol 2009Engr 213 final sol 2009
Engr 213 final sol 2009
 
Engr 213 midterm 2b sol 2010
Engr 213 midterm 2b sol 2010Engr 213 midterm 2b sol 2010
Engr 213 midterm 2b sol 2010
 
IntrRSCode
IntrRSCodeIntrRSCode
IntrRSCode
 
Emat 213 final fall 2005
Emat 213 final fall 2005Emat 213 final fall 2005
Emat 213 final fall 2005
 
Quad eqn
Quad eqnQuad eqn
Quad eqn
 
Asymptotic Growth of Functions
Asymptotic Growth of FunctionsAsymptotic Growth of Functions
Asymptotic Growth of Functions
 
Operational research
Operational researchOperational research
Operational research
 
Active Attacks on DH Key Exchange
Active Attacks on DH Key ExchangeActive Attacks on DH Key Exchange
Active Attacks on DH Key Exchange
 
Engineering procedure
Engineering procedureEngineering procedure
Engineering procedure
 
Answer to selected_miscellaneous_exercises
Answer to selected_miscellaneous_exercisesAnswer to selected_miscellaneous_exercises
Answer to selected_miscellaneous_exercises
 
2.1 Revision Game
2.1 Revision Game2.1 Revision Game
2.1 Revision Game
 
Jejemon
JejemonJejemon
Jejemon
 
Chapter 4 (maths 3)
Chapter 4 (maths 3)Chapter 4 (maths 3)
Chapter 4 (maths 3)
 
Linear algebra-solutions-manual-kuttler-1-30-11-otc
Linear algebra-solutions-manual-kuttler-1-30-11-otcLinear algebra-solutions-manual-kuttler-1-30-11-otc
Linear algebra-solutions-manual-kuttler-1-30-11-otc
 
Bch and reed solomon codes generation in frequency domain
Bch and reed solomon codes generation in frequency domainBch and reed solomon codes generation in frequency domain
Bch and reed solomon codes generation in frequency domain
 
Fourier series 2
Fourier series 2Fourier series 2
Fourier series 2
 
Engr 213 midterm 1a sol 2009
Engr 213 midterm 1a sol 2009Engr 213 midterm 1a sol 2009
Engr 213 midterm 1a sol 2009
 

Similar to one + 1

SOME THOUGHTS ON DIVERGENT SERIES
SOME THOUGHTS ON DIVERGENT SERIESSOME THOUGHTS ON DIVERGENT SERIES
SOME THOUGHTS ON DIVERGENT SERIESgenius98
 
some thoughts on divergent series
some thoughts on divergent seriessome thoughts on divergent series
some thoughts on divergent series
genius98
 
R. Jimenez - Fundamental Physics from Astronomical Observations
R. Jimenez - Fundamental Physics from Astronomical ObservationsR. Jimenez - Fundamental Physics from Astronomical Observations
R. Jimenez - Fundamental Physics from Astronomical Observations
SEENET-MTP
 
Roots of unity_cool_app
Roots of unity_cool_appRoots of unity_cool_app
Roots of unity_cool_app
dineshkrithi
 
Exponentials integrals
Exponentials integralsExponentials integrals
Exponentials integralsTarun Gehlot
 
On the Stick and Rope Problem - Draft 1
On the Stick and Rope Problem - Draft 1On the Stick and Rope Problem - Draft 1
On the Stick and Rope Problem - Draft 1
Iwan Pranoto
 
Engr 213 midterm 2b sol 2009
Engr 213 midterm 2b sol 2009Engr 213 midterm 2b sol 2009
Engr 213 midterm 2b sol 2009akabaka12
 
Maths assignment
Maths assignmentMaths assignment
Maths assignmentNtshima
 
Reflect tsukuba524
Reflect tsukuba524Reflect tsukuba524
Reflect tsukuba524kazuhase2011
 
Kolmogorov complexity and topological arguments
Kolmogorov complexity and topological argumentsKolmogorov complexity and topological arguments
Kolmogorov complexity and topological arguments
shenmontpellier
 
數學測試
數學測試數學測試
數學測試s9007912
 

Similar to one + 1 (20)

Fourier series
Fourier seriesFourier series
Fourier series
 
Fourier series
Fourier seriesFourier series
Fourier series
 
SOME THOUGHTS ON DIVERGENT SERIES
SOME THOUGHTS ON DIVERGENT SERIESSOME THOUGHTS ON DIVERGENT SERIES
SOME THOUGHTS ON DIVERGENT SERIES
 
some thoughts on divergent series
some thoughts on divergent seriessome thoughts on divergent series
some thoughts on divergent series
 
R. Jimenez - Fundamental Physics from Astronomical Observations
R. Jimenez - Fundamental Physics from Astronomical ObservationsR. Jimenez - Fundamental Physics from Astronomical Observations
R. Jimenez - Fundamental Physics from Astronomical Observations
 
Roots of unity_cool_app
Roots of unity_cool_appRoots of unity_cool_app
Roots of unity_cool_app
 
Taylor problem
Taylor problemTaylor problem
Taylor problem
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 2 (maths 3)
Chapter 2 (maths 3)Chapter 2 (maths 3)
Chapter 2 (maths 3)
 
Lecture5
Lecture5Lecture5
Lecture5
 
Exponentials integrals
Exponentials integralsExponentials integrals
Exponentials integrals
 
Legendre
LegendreLegendre
Legendre
 
On the Stick and Rope Problem - Draft 1
On the Stick and Rope Problem - Draft 1On the Stick and Rope Problem - Draft 1
On the Stick and Rope Problem - Draft 1
 
Fourier series
Fourier seriesFourier series
Fourier series
 
Engr 213 midterm 2b sol 2009
Engr 213 midterm 2b sol 2009Engr 213 midterm 2b sol 2009
Engr 213 midterm 2b sol 2009
 
Maths assignment
Maths assignmentMaths assignment
Maths assignment
 
Reflect tsukuba524
Reflect tsukuba524Reflect tsukuba524
Reflect tsukuba524
 
Taylor series
Taylor seriesTaylor series
Taylor series
 
Kolmogorov complexity and topological arguments
Kolmogorov complexity and topological argumentsKolmogorov complexity and topological arguments
Kolmogorov complexity and topological arguments
 
數學測試
數學測試數學測試
數學測試
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

one + 1

  • 1. Professional Elegancy (or how to write paper for IEEE journal) ... Any engineer learns the mathematical notation through which two real numbers, for example, 1+1 = 2 can be written down very simply. Even so, this form is wrong, for being too trivial and for showing a total lack of style.
  • 2. Since our very first Math lessons we have known that, 1 = ln(e) and also that, 1 = sin ( p ) + cos ( p ) 2 2 besides this, everybody knows that, ∞ n 1  2 =∑   n=  2  0
  • 3. So being, the expression, 1+1 = 2 can be re-written in a more elegant form, ∞ n 1 ln ( e ) + sin ( p ) + cos ( p ) = ∑   2 2 n =0  2  which, as we can easily observe, is a lot more scientific and easier to understand.
  • 4. It is known that: 1 = cosh(q ) * 1 − tanh (q ) 2 and that, z  1 e = lim1 +  z →∞  z
  • 5. Hence resulting, ∞ n 1 ln ( e ) + sin ( p ) + cos ( p ) = ∑   2 2 n =0  2  and can further be written as follows, offering substantial clarity and tranparency,   1 2  ∞ cosh(q ) * 1 − tanh 2 (q) ln lim1 +   + sin 2 ( p ) + cos 2 ( p ) = ∑  z →∞ z  2n   n =0
  • 6. Considering that, 0!= 1 and that the inverted matrix of a transposed matrix equals the transposed matrix of an inverted matrix (presuming an unidimentional space), we obtain the following simplification (using vectorial notation X ), (X ) − (X ) T −1 −1 T =0
  • 7. If both expressions are unified, 0!= 1 and (X ) − (X ) T −1 −1 T =0 we would obviously obtain,  ( ) − (X )  X  T −1 −1 T  != 1 
  • 8. Applying the above simplifications   1 2  ∞ cosh(q ) * 1 − tanh 2 (q )  lim1 +   + sin ( p ) + cos ( p ) = ∑ 2 2  z →∞ z   2n   n =0 Obtaining finaly, in a total elegant form, legible, brief and comprehencible to anyone, the equation:   T ( ) − (X )  2 −1 −1 T  1  + sin 2 ( p ) + cos 2 ( p ) = ∑ ∞ cosh(q ) * 1 − tanh 2 (q ) ln lim  X !+   z →∞   z  2n   n =0 (which, being honest, is by far more professional than the original 1 + 1 = 2 )
  • 9. Send this message to your colleagues who like to publish IEEE journals. Send it also to your friends, who will come to appreciate your sensible and humble engineering soul …