![]() |
![]() |
Your cart is empty |
||
Books > Science & Mathematics > Mathematics > Combinatorics & graph theory
Finite Geometries stands out from recent textbooks about the subject of finite geometries by having a broader scope. The authors thoroughly explain how the subject of finite geometries is a central part of discrete mathematics. The text is suitable for undergraduate and graduate courses. Additionally, it can be used as reference material on recent works. The authors examine how finite geometries' applicable nature led to solutions of open problems in different fields, such as design theory, cryptography and extremal combinatorics. Other areas covered include proof techniques using polynomials in case of Desarguesian planes, and applications in extremal combinatorics, plus, recent material and developments. Features: Includes exercise sets for possible use in a graduate course Discusses applications to graph theory and extremal combinatorics Covers coding theory and cryptography Translated and revised text from the Hungarian published version
This book contains the notes of the lectures delivered at an Advanced Course on Combinatorial Matrix Theory held at Centre de Recerca Matematica (CRM) in Barcelona. These notes correspond to five series of lectures. The first series is dedicated to the study of several matrix classes defined combinatorially, and was delivered by Richard A. Brualdi. The second one, given by Pauline van den Driessche, is concerned with the study of spectral properties of matrices with a given sign pattern. Dragan Stevanovic delivered the third one, devoted to describing the spectral radius of a graph as a tool to provide bounds of parameters related with properties of a graph. The fourth lecture was delivered by Stephen Kirkland and is dedicated to the applications of the Group Inverse of the Laplacian matrix. The last one, given by Angeles Carmona, focuses on boundary value problems on finite networks with special in-depth on the M-matrix inverse problem.
Divisors and Sandpiles provides an introduction to the combinatorial theory of chip-firing on finite graphs. Part 1 motivates the study of the discrete Laplacian by introducing the dollar game. The resulting theory of divisors on graphs runs in close parallel to the geometric theory of divisors on Riemann surfaces, and Part I culminates in a full exposition of the graph-theoretic Riemann-Roch theorem due to M. Baker and S. Norine. The text leverages the reader's understanding of the discrete story to provide a brief overview of the classical theory of Riemann surfaces. Part 2 focuses on sandpiles, which are toy models of physical systems with dynamics controlled by the discrete Laplacian of the underlying graph. The text provides a careful introduction to the sandpile group and the abelian sandpile model, leading ultimately to L. Levine's threshold density theorem for the fixed-energy sandpile Markov chain. In a precise sense, the theory of sandpiles is dual to the theory of divisors, and there are many beautiful connections between the first two parts of the book. Part 3 addresses various topics connecting the theory of chip-firing to other areas of mathematics, including the matrix-tree theorem, harmonic morphisms, parking functions, $M$-matrices, matroids, the Tutte polynomial, and simplicial homology. The text is suitable for advanced undergraduates and beginning graduate students.
This book, written by experts from universities and major research laboratories, addresses the hot topic of network coding, a powerful scheme for information transmission in networks that yields near-optimal throughput. It introduces readers to this striking new approach to network coding, in which the network is not simply viewed as a mechanism for delivering packets, but rather an algebraic structure named the subspace, which these packets span. This leads to a new kind of coding theory, employing what are called subspace codes. The book presents selected, highly relevant advanced research output on: Subspace Codes and Rank Metric Codes; Finite Geometries and Subspace Designs; Application of Network Coding; Codes for Distributed Storage Systems. The outcomes reflect research conducted within the framework of the European COST Action IC1104: Random Network Coding and Designs over GF(q). Taken together, they offer communications engineers, R&D engineers, researchers and graduate students in Mathematics, Computer Science, and Electrical Engineering a comprehensive reference guide to the construction of optimal network codes, as well as efficient encoding and decoding schemes for a given network code.
Introduction to Radar Analysis, Second Edition is a major revision of the popular textbook. It is written within the context of communication theory as well as the theory of signals and noise. By emphasizing principles and fundamentals, the textbook serves as a vital source for students and engineers. Part I bridges the gap between communication, signal analysis, and radar. Topics include modulation techniques and associated Continuous Wave (CW) and pulsed radar systems. Part II is devoted to radar signal processing and pulse compression techniques. Part III presents special topics in radar systems including radar detection, radar clutter, target tracking, phased arrays, and Synthetic Aperture Radar (SAR). Many new exercise are included and the author provides comprehensive easy-to-follow mathematical derivations of all key equations and formulas. The author has worked extensively for the U.S. Army, the U.S. Space and Missile Command, and other military agencies. This is not just a textbook for senior level and graduates students, but a valuable tool for practicing radar engineers. Features Authored by a leading industry radar professional. Comprehensive up-to-date coverage of radar systems analysis issues. Easy to follow mathematical derivations of all equations and formulas Numerous graphical plots and table format outputs. One part of the book is dedicated to radar waveforms and radar signal processing.
Outer billiards provides a toy model for planetary motion and exhibits intricate and mysterious behavior even for seemingly simple examples. It is a dynamical system in which a particle in the plane moves around the outside of a convex shape according to a scheme that is reminiscent of ordinary billiards. The Plaid Model, which is a self-contained sequel to Richard Schwartz's Outer Billiards on Kites, provides a combinatorial model for orbits of outer billiards on kites. Schwartz relates these orbits to such topics as polytope exchange transformations, renormalization, continued fractions, corner percolation, and the Truchet tile system. The combinatorial model, called "the plaid model," has a self-similar structure that blends geometry and elementary number theory. The results were discovered through computer experimentation and it seems that the conclusions would be extremely difficult to reach through traditional mathematics. The book includes an extensive computer program that allows readers to explore the materials interactively and each theorem is accompanied by a computer demonstration.
For undergraduate or graduate courses in Graph Theory in departments of mathematics or computer science. This title is part of the Pearson Modern Classics series. Pearson Modern Classics are acclaimed titles at a value price. Please visit www.pearsonhighered.com/math-classics-series for a complete list of titles. This text offers a comprehensive and coherent introduction to the fundamental topics of graph theory. It includes basic algorithms and emphasizes the understanding and writing of proofs about graphs. Thought-provoking examples and exercises develop a thorough understanding of the structure of graphs and the techniques used to analyze problems. The first seven chapters form the basic course, with advanced material in Chapter 8.
Excellent text for upper-level undergraduate and graduate students shows how geometric and algebraic ideas met and grew together into an important branch of mathematics. Lucid coverage of vector fields, surfaces, homology of complexes, much more. Some knowledge of differential equations and multivariate calculus required. Many problems and exercises (some solutions) integrated into the text. 1979 edition. Bibliography.
As the first book of a three-part series, this book is offered as a tribute to pioneers in vision, such as Bela Julesz, David Marr, King-Sun Fu, Ulf Grenander, and David Mumford. The authors hope to provide foundation and, perhaps more importantly, further inspiration for continued research in vision. This book covers David Marr's paradigm and various underlying statistical models for vision. The mathematical framework herein integrates three regimes of models (low-, mid-, and high-entropy regimes) and provides foundation for research in visual coding, recognition, and cognition. Concepts are first explained for understanding and then supported by findings in psychology and neuroscience, after which they are established by statistical models and associated learning and inference algorithms. A reader will gain a unified, cross-disciplinary view of research in vision and will accrue knowledge spanning from psychology to neuroscience to statistics.
This book is dedicated to the study of algebraic characteristics of some structures of matroid type. The notions of pseudo-matroids generated by mappings of matroids, G-mappings of binary matroids and semi-matroids are introduced. Some results on general matroid theory and an algorithmic solution for exponential complexity of problems with enumeration of all non-isomorphic binary matroids are found. The theoretical results are applied to the solution of some practical problems. This monograph is beneficial to specialists in discrete mathematics and matroids, information transmission technologies, as well as students and post-graduates.
This book deals with the analysis of the structure of complex networks by combining results from graph theory, physics, and pattern recognition. The book is divided into two parts. 11 chapters are dedicated to the development of theoretical tools for the structural analysis of networks, and 7 chapters are illustrating, in a critical way, applications of these tools to real-world scenarios. The first chapters provide detailed coverage of adjacency and metric and topological properties of networks, followed by chapters devoted to the analysis of individual fragments and fragment-based global invariants in complex networks. Chapters that analyse the concepts of communicability, centrality, bipartivity, expansibility and communities in networks follow. The second part of this book is devoted to the analysis of genetic, protein residue, protein-protein interaction, intercellular, ecological and socio-economic networks, including important breakthroughs as well as examples of the misuse of structural concepts.
The interplay between combinatorics and theoretical physics is a recent trend which appears to us as particularly natural, since the unfolding of new ideas in physics is often tied to the development of combinatorial methods, and, conversely, problems in combinatorics have been successfully tackled using methods inspired by theoretical physics. We can thus speak nowadays of an emerging domain of Combinatorial Physics. The interference between these two disciplines is moreover an interference of multiple facets. Its best known manifestation (both to combinatorialists and theoretical physicists) has so far been the one between combinatorics and statistical physics, as statistical physics relies on an accurate counting of the various states or configurations of a physical system. But combinatorics and theoretical physics interact in various other ways. This book is mainly dedicated to the interactions of combinatorics (algebraic, enumerative, analytic) with (commutative and non-commutative) quantum field theory and tensor models, the latter being seen as a quantum field theoretical generalisation of matrix models.
The Art of Proving Binomial Identities accomplishes two goals: (1) It provides a unified treatment of the binomial coefficients, and (2) Brings together much of the undergraduate mathematics curriculum via one theme (the binomial coefficients). The binomial coefficients arise in a variety of areas of mathematics: combinatorics, of course, but also basic algebra (binomial theorem), infinite series (Newton's binomial series), differentiation (Leibniz's generalized product rule), special functions (the beta and gamma functions), probability, statistics, number theory, finite difference calculus, algorithm analysis, and even statistical mechanics. The book is very suitable for advanced undergraduates or beginning graduate students and includes various exercises asking them to prove identities. Students will find that the text and notes at the end of the chapters encourages them to look at binomial coefficients from different angles. With this learning experience, students will be able to understand binomial coefficients in a new way. Features: Provides a unified treatment of many of the techniques for proving binomial coefficient identities. Ties together several of the courses in the undergraduate mathematics curriculum via a single theme. A textbook for a capstone or senior seminar course in mathematics. Contains several results by the author on proof techniques for binomial coefficients that are not well-known. Ideal for self-study, it contains a large number of exercises at the end of each chapter, with hints or solutions for every exercise at the end of the book.
Game Theory: A Modeling Approach quickly moves readers through the fundamental ideas of the subject to enable them to engage in creative modeling projects based on game theoretic concepts. The authors match conclusions to real-world scenarios and applications. The text engages students in active learning, group work, in-class discussions and interactive simulations. Each chapter provides foundation pieces or adds more features to help readers build game theoretic models. The chapters include definitions, concepts and illustrative examples. The text will engage and challenge both undergraduate and graduate students. Features: Enables readers to apply game theorty to real-world scenarios Chapters can be used for core course materials or independent stuides Exercises, included at the end of the chapters, follow the order of the sections in the text Select answers and solutions are found at the end of the book Solutions manual for instructors is available from the authors
This reissued classic text is the acclaimed second edition of Professor Ian Macdonald's groundbreaking monograph on symmetric functions and Hall polynomials. The first edition was published in 1979, before being significantly expanded into the present edition in 1995. This text is widely regarded as the best source of information on Hall polynomials and what have come to be known as Macdonald polynomials, central to a number of key developments in mathematics and mathematical physics in the 21st century Macdonald polynomials gave rise to the subject of double affine Hecke algebras (or Cherednik algebras) important in representation theory. String theorists use Macdonald polynomials to attack the so-called AGT conjectures. Macdonald polynomials have been recently used to construct knot invariants. They are also a central tool for a theory of integrable stochastic models that have found a number of applications in probability, such as random matrices, directed polymers in random media, driven lattice gases, and so on. Macdonald polynomials have become a part of basic material that a researcher simply must know if (s)he wants to work in one of the above domains, ensuring this new edition will appeal to a very broad mathematical audience. Featuring a new foreword by Professor Richard Stanley of MIT.
The fusion between graph theory and combinatorial optimization has led to theoretically profound and practically useful algorithms, yet there is no book that currently covers both areas together. Handbook of Graph Theory, Combinatorial Optimization, and Algorithms is the first to present a unified, comprehensive treatment of both graph theory and combinatorial optimization. Divided into 11 cohesive sections, the handbook's 44 chapters focus on graph theory, combinatorial optimization, and algorithmic issues. The book provides readers with the algorithmic and theoretical foundations to: Understand phenomena as shaped by their graph structures Develop needed algorithmic and optimization tools for the study of graph structures Design and plan graph structures that lead to certain desirable behavior With contributions from more than 40 worldwide experts, this handbook equips readers with the necessary techniques and tools to solve problems in a variety of applications. Readers gain exposure to the theoretical and algorithmic foundations of a wide range of topics in graph theory and combinatorial optimization, enabling them to identify (and hence solve) problems encountered in diverse disciplines, such as electrical, communication, computer, social, transportation, biological, and other networks.
The third edition of this definitive and popular book continues to pursue the question: what is the most efficient way to pack a large number of equal spheres in n-dimensional Euclidean space? The authors also examine such related issues as the kissing number problem, the covering problem, the quantizing problem, and the classification of lattices and quadratic forms. There is also a description of the applications of these questions to other areas of mathematics and science such as number theory, coding theory, group theory, analogue-to-digital conversion and data compression, n-dimensional crystallography, dual theory and superstring theory in physics. New and of special interest is a report on some recent developments in the field, and an updated and enlarged supplementary bibliography with over 800 items.
Ramsey theory is the study of the structure of mathematical objects that is preserved under partitions. In its full generality, Ramsey theory is quite powerful, but can quickly become complicated. By limiting the focus of this book to Ramsey theory applied to the set of integers, the authors have produced a gentle, but meaningful, introduction to an important and enticing branch of modern mathematics. Ramsey Theory on the Integers offers students a glimpse into the world of mathematical research and the opportunity for them to begin pondering unsolved problems. For this new edition, several sections have been added and others have been significantly updated. Among the newly introduced topics are: rainbow Ramsey theory, an "inequality" version of Schur's theorem, monochromatic solutions of recurrence relations, Ramsey results involving both sums and products, monochromatic sets avoiding certain differences, Ramsey properties for polynomial progressions, generalizations of the Erdos-Ginzberg-Ziv theorem, and the number of arithmetic progressions under arbitrary colorings. Many new results and proofs have been added, most of which were not known when the first edition was published. Furthermore, the book's tables, exercises, lists of open research problems, and bibliography have all been significantly updated. This innovative book also provides the first cohesive study of Ramsey theory on the integers. It contains perhaps the most substantial account of solved and unsolved problems in this blossoming subject. This breakthrough book will engage students, teachers, and researchers alike.
This textbook is an introduction to Scientific Computing, in which several numerical methods for the computer-based solution of certain classes of mathematical problems are illustrated. The authors show how to compute the zeros, the extrema, and the integrals of continuous functions, solve linear systems, approximate functions using polynomials and construct accurate approximations for the solution of ordinary and partial differential equations. To make the format concrete and appealing, the programming environments Matlab and Octave are adopted as faithful companions. The book contains the solutions to several problems posed in exercises and examples, often originating from important applications. At the end of each chapter, a specific section is devoted to subjects which were not addressed in the book and contains bibliographical references for a more comprehensive treatment of the material. From the review: ".... This carefully written textbook, the third English edition, contains substantial new developments on the numerical solution of differential equations. It is typeset in a two-color design and is written in a style suited for readers who have mathematics, natural sciences, computer sciences or economics as a background and who are interested in a well-organized introduction to the subject." Roberto Plato (Siegen), Zentralblatt MATH 1205.65002.
From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed. Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms. As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography.
Elementary Number Theory takes an accessible approach to teaching students about the role of number theory in pure mathematics and its important applications to cryptography and other areas. The first chapter of the book explains how to do proofs and includes a brief discussion of lemmas, propositions, theorems, and corollaries. The core of the text covers linear Diophantine equations; unique factorization; congruences; Fermat's, Euler's, and Wilson's theorems; order and primitive roots; and quadratic reciprocity. The authors also discuss numerous cryptographic topics, such as RSA and discrete logarithms, along with recent developments. The book offers many pedagogical features. The "check your understanding" problems scattered throughout the chapters assess whether students have learned essential information. At the end of every chapter, exercises reinforce an understanding of the material. Other exercises introduce new and interesting ideas while computer exercises reflect the kinds of explorations that number theorists often carry out in their research.
The first book devoted exclusively to quantitative graph theory, Quantitative Graph Theory: Mathematical Foundations and Applications presents and demonstrates existing and novel methods for analyzing graphs quantitatively. Incorporating interdisciplinary knowledge from graph theory, information theory, measurement theory, and statistical techniques, this book covers a wide range of quantitative-graph theoretical concepts and methods, including those pertaining to real and random graphs such as: Comparative approaches (graph similarity or distance) Graph measures to characterize graphs quantitatively Applications of graph measures in social network analysis and other disciplines Metrical properties of graphs and measures Mathematical properties of quantitative methods or measures in graph theory Network complexity measures and other topological indices Quantitative approaches to graphs using machine learning (e.g., clustering) Graph measures and statistics Information-theoretic methods to analyze graphs quantitatively (e.g., entropy) Through its broad coverage, Quantitative Graph Theory: Mathematical Foundations and Applications fills a gap in the contemporary literature of discrete and applied mathematics, computer science, systems biology, and related disciplines. It is intended for researchers as well as graduate and advanced undergraduate students in the fields of mathematics, computer science, mathematical chemistry, cheminformatics, physics, bioinformatics, and systems biology. |
![]() ![]() You may like...
Handbook of Research on Advanced…
Madhumangal Pal, Sovan Samanta, …
Hardcover
R7,398
Discovery Miles 73 980
Graphs and Discrete Dirichlet Spaces
Matthias Keller, Daniel Lenz, …
Hardcover
R4,185
Discovery Miles 41 850
Galois Covers, Grothendieck-Teichmuller…
Frank Neumann, Sibylle Schroll
Hardcover
R4,473
Discovery Miles 44 730
Code Based Secret Sharing Schemes…
Patrick Sole, Selda Calkavur, …
Hardcover
R2,372
Discovery Miles 23 720
|