Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Science & Mathematics > Mathematics > Combinatorics & graph theory
This is the first book to link the mod 2 Steenrod algebra, a classical object of study in algebraic topology, with modular representations of matrix groups over the field F of two elements. The link is provided through a detailed study of Peterson's 'hit problem' concerning the action of the Steenrod algebra on polynomials, which remains unsolved except in special cases. The topics range from decompositions of integers as sums of 'powers of 2 minus 1', to Hopf algebras and the Steinberg representation of GL(n,F). Volume 1 develops the structure of the Steenrod algebra from an algebraic viewpoint and can be used as a graduate-level textbook. Volume 2 broadens the discussion to include modular representations of matrix groups.
Introduction to Radar Analysis, Second Edition is a major revision of the popular textbook. It is written within the context of communication theory as well as the theory of signals and noise. By emphasizing principles and fundamentals, the textbook serves as a vital source for students and engineers. Part I bridges the gap between communication, signal analysis, and radar. Topics include modulation techniques and associated Continuous Wave (CW) and pulsed radar systems. Part II is devoted to radar signal processing and pulse compression techniques. Part III presents special topics in radar systems including radar detection, radar clutter, target tracking, phased arrays, and Synthetic Aperture Radar (SAR). Many new exercise are included and the author provides comprehensive easy-to-follow mathematical derivations of all key equations and formulas. The author has worked extensively for the U.S. Army, the U.S. Space and Missile Command, and other military agencies. This is not just a textbook for senior level and graduates students, but a valuable tool for practicing radar engineers. Features Authored by a leading industry radar professional. Comprehensive up-to-date coverage of radar systems analysis issues. Easy to follow mathematical derivations of all equations and formulas Numerous graphical plots and table format outputs. One part of the book is dedicated to radar waveforms and radar signal processing.
Graph theory goes back several centuries and revolves around the study of graphs--mathematical structures showing relations between objects. With applications in biology, computer science, transportation science, and other areas, graph theory encompasses some of the most beautiful formulas in mathematics--and some of its most famous problems. The Fascinating World of Graph Theory explores the questions and puzzles that have been studied, and often solved, through graph theory. This book looks at graph theory's development and the vibrant individuals responsible for the field's growth. Introducing fundamental concepts, the authors explore a diverse plethora of classic problems such as the Lights Out Puzzle, and each chapter contains math exercises for readers to savor. An eye-opening journey into the world of graphs, The Fascinating World of Graph Theory offers exciting problem-solving possibilities for mathematics and beyond.
For undergraduate or graduate courses in Graph Theory in departments of mathematics or computer science. This title is part of the Pearson Modern Classics series. Pearson Modern Classics are acclaimed titles at a value price. Please visit www.pearsonhighered.com/math-classics-series for a complete list of titles. This text offers a comprehensive and coherent introduction to the fundamental topics of graph theory. It includes basic algorithms and emphasizes the understanding and writing of proofs about graphs. Thought-provoking examples and exercises develop a thorough understanding of the structure of graphs and the techniques used to analyze problems. The first seven chapters form the basic course, with advanced material in Chapter 8.
The interplay between combinatorics and theoretical physics is a recent trend which appears to us as particularly natural, since the unfolding of new ideas in physics is often tied to the development of combinatorial methods, and, conversely, problems in combinatorics have been successfully tackled using methods inspired by theoretical physics. We can thus speak nowadays of an emerging domain of Combinatorial Physics. The interference between these two disciplines is moreover an interference of multiple facets. Its best known manifestation (both to combinatorialists and theoretical physicists) has so far been the one between combinatorics and statistical physics, as statistical physics relies on an accurate counting of the various states or configurations of a physical system. But combinatorics and theoretical physics interact in various other ways. This book is mainly dedicated to the interactions of combinatorics (algebraic, enumerative, analytic) with (commutative and non-commutative) quantum field theory and tensor models, the latter being seen as a quantum field theoretical generalisation of matrix models.
This book deals with the analysis of the structure of complex networks by combining results from graph theory, physics, and pattern recognition. The book is divided into two parts. 11 chapters are dedicated to the development of theoretical tools for the structural analysis of networks, and 7 chapters are illustrating, in a critical way, applications of these tools to real-world scenarios. The first chapters provide detailed coverage of adjacency and metric and topological properties of networks, followed by chapters devoted to the analysis of individual fragments and fragment-based global invariants in complex networks. Chapters that analyse the concepts of communicability, centrality, bipartivity, expansibility and communities in networks follow. The second part of this book is devoted to the analysis of genetic, protein residue, protein-protein interaction, intercellular, ecological and socio-economic networks, including important breakthroughs as well as examples of the misuse of structural concepts.
This book is dedicated to the study of algebraic characteristics of some structures of matroid type. The notions of pseudo-matroids generated by mappings of matroids, G-mappings of binary matroids and semi-matroids are introduced. Some results on general matroid theory and an algorithmic solution for exponential complexity of problems with enumeration of all non-isomorphic binary matroids are found. The theoretical results are applied to the solution of some practical problems. This monograph is beneficial to specialists in discrete mathematics and matroids, information transmission technologies, as well as students and post-graduates.
The Art of Proving Binomial Identities accomplishes two goals: (1) It provides a unified treatment of the binomial coefficients, and (2) Brings together much of the undergraduate mathematics curriculum via one theme (the binomial coefficients). The binomial coefficients arise in a variety of areas of mathematics: combinatorics, of course, but also basic algebra (binomial theorem), infinite series (Newton's binomial series), differentiation (Leibniz's generalized product rule), special functions (the beta and gamma functions), probability, statistics, number theory, finite difference calculus, algorithm analysis, and even statistical mechanics. The book is very suitable for advanced undergraduates or beginning graduate students and includes various exercises asking them to prove identities. Students will find that the text and notes at the end of the chapters encourages them to look at binomial coefficients from different angles. With this learning experience, students will be able to understand binomial coefficients in a new way. Features: Provides a unified treatment of many of the techniques for proving binomial coefficient identities. Ties together several of the courses in the undergraduate mathematics curriculum via a single theme. A textbook for a capstone or senior seminar course in mathematics. Contains several results by the author on proof techniques for binomial coefficients that are not well-known. Ideal for self-study, it contains a large number of exercises at the end of each chapter, with hints or solutions for every exercise at the end of the book.
Game Theory: A Modeling Approach quickly moves readers through the fundamental ideas of the subject to enable them to engage in creative modeling projects based on game theoretic concepts. The authors match conclusions to real-world scenarios and applications. The text engages students in active learning, group work, in-class discussions and interactive simulations. Each chapter provides foundation pieces or adds more features to help readers build game theoretic models. The chapters include definitions, concepts and illustrative examples. The text will engage and challenge both undergraduate and graduate students. Features: Enables readers to apply game theorty to real-world scenarios Chapters can be used for core course materials or independent stuides Exercises, included at the end of the chapters, follow the order of the sections in the text Select answers and solutions are found at the end of the book Solutions manual for instructors is available from the authors
While the significance of networks in various human behavior and activities has a history as long as human's existence, network awareness is a recent scientific phenomenon. The neologism network science is just one or two decades old. Nevertheless, with this limited time, network thinking has substantially reshaped the recent development in economics, and almost all solutions to real-world problems involve the network element. This book integrates agent-based modeling and network science. It is divided into three parts, namely, foundations, primary dynamics on and of social networks, and applications. The authors begin with the network origin of agent-based models, known as cellular automata, and introduce a number of classic models, such as Schelling's segregation model and Axelrod's spatial game. The essence of the foundation part is the network-based agent-based models in which agents follow network-based decision rules. Under the influence of the substantial progress in network science in late 1990s, these models have been extended from using lattices into using small-world networks, scale-free networks, etc. The text also shows that the modern network science mainly driven by game-theorists and sociophysicists has inspired agent-based social scientists to develop alternative formation algorithms, known as agent-based social networks. It reviews a number of pioneering and representative models in this family. Upon the given foundation, the second part reviews three primary forms of network dynamics, such as diffusions, cascades, and influences. These primary dynamics are further extended and enriched by practical networks in goods-and-service markets, labor markets, and international trade. At the end, the book considers two challenging issues using agent-based models of networks: network risks and economic growth.
This reissued classic text is the acclaimed second edition of Professor Ian Macdonald's groundbreaking monograph on symmetric functions and Hall polynomials. The first edition was published in 1979, before being significantly expanded into the present edition in 1995. This text is widely regarded as the best source of information on Hall polynomials and what have come to be known as Macdonald polynomials, central to a number of key developments in mathematics and mathematical physics in the 21st century Macdonald polynomials gave rise to the subject of double affine Hecke algebras (or Cherednik algebras) important in representation theory. String theorists use Macdonald polynomials to attack the so-called AGT conjectures. Macdonald polynomials have been recently used to construct knot invariants. They are also a central tool for a theory of integrable stochastic models that have found a number of applications in probability, such as random matrices, directed polymers in random media, driven lattice gases, and so on. Macdonald polynomials have become a part of basic material that a researcher simply must know if (s)he wants to work in one of the above domains, ensuring this new edition will appeal to a very broad mathematical audience. Featuring a new foreword by Professor Richard Stanley of MIT.
The third edition of this definitive and popular book continues to pursue the question: what is the most efficient way to pack a large number of equal spheres in n-dimensional Euclidean space? The authors also examine such related issues as the kissing number problem, the covering problem, the quantizing problem, and the classification of lattices and quadratic forms. There is also a description of the applications of these questions to other areas of mathematics and science such as number theory, coding theory, group theory, analogue-to-digital conversion and data compression, n-dimensional crystallography, dual theory and superstring theory in physics. New and of special interest is a report on some recent developments in the field, and an updated and enlarged supplementary bibliography with over 800 items.
This textbook is an introduction to Scientific Computing, in which several numerical methods for the computer-based solution of certain classes of mathematical problems are illustrated. The authors show how to compute the zeros, the extrema, and the integrals of continuous functions, solve linear systems, approximate functions using polynomials and construct accurate approximations for the solution of ordinary and partial differential equations. To make the format concrete and appealing, the programming environments Matlab and Octave are adopted as faithful companions. The book contains the solutions to several problems posed in exercises and examples, often originating from important applications. At the end of each chapter, a specific section is devoted to subjects which were not addressed in the book and contains bibliographical references for a more comprehensive treatment of the material. From the review: ".... This carefully written textbook, the third English edition, contains substantial new developments on the numerical solution of differential equations. It is typeset in a two-color design and is written in a style suited for readers who have mathematics, natural sciences, computer sciences or economics as a background and who are interested in a well-organized introduction to the subject." Roberto Plato (Siegen), Zentralblatt MATH 1205.65002.
From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed. Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms. As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography.
In the last decade, the areas of quadratic and higher degree forms have witnessed dramatic advances. This volume is an outgrowth of three seminal conferences on these topics held in 2009, two at the University of Florida and one at the Arizona Winter School. The volume also includes papers from the two focused weeks on quadratic forms and integral lattices at the University of Florida in 2010.Topics discussed include the links between quadratic forms and automorphic forms, representation of integers and forms by quadratic forms, connections between quadratic forms and lattices, and algorithms for quaternion algebras and quadratic forms. The book will be of interest to graduate students and mathematicians wishing to study quadratic and higher degree forms, as well as to established researchers in these areas. Quadratic and Higher Degree Forms contains research and semi-expository papers that stem from the presentations at conferences at the University of Florida as well as survey lectures on quadratic forms based on the instructional workshop for graduate students held at the Arizona Winter School. The survey papers in the volume provide an excellent introduction to various aspects of the theory of quadratic forms starting from the basic concepts and provide a glimpse of some of the exciting questions currently being investigated. The research and expository papers present the latest advances on quadratic and higher degree forms and their connections with various branches of mathematics.
Graph Theory as I Have Known It provides a unique introduction to
graph theory by one of the founding fathers, and will appeal to
anyone interested in the subject. It is not intended as a
comprehensive treatise, but rather as an account of those parts of
the theory that have been of special interest to the author.
Professor Tutte details his experience in the area, and provides a
fascinating insight into how he was led to his theorems and the
proofs he used. As well as being of historical interest it provides
a useful starting point for research, with references to further
suggested books as well as the original papers.
This book deals with the analysis of the structure of complex networks by combining results from graph theory, physics, and pattern recognition. The book is divided into two parts. 11 chapters are dedicated to the development of theoretical tools for the structural analysis of networks, and 7 chapters are illustrating, in a critical way, applications of these tools to real-world scenarios. The first chapters provide detailed coverage of adjacency and metric and topological properties of networks, followed by chapters devoted to the analysis of individual fragments and fragment-based global invariants in complex networks. Chapters that analyse the concepts of communicability, centrality, bipartivity, expansibility and communities in networks follow. The second part of this book is devoted to the analysis of genetic, protein residue, protein-protein interaction, intercellular, ecological and socio-economic networks, including important breakthroughs as well as examples of the misuse of structural concepts.
* What is the essence of the similarity between linearly
independent sets of columns of a matrix and forests in a graph?
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the field, provides a highly practical learning experience by progressing at a gentle pace, keeping mathematics at a manageable level, and including numerous end-of-chapter exercises. Focusing on the cryptosystems themselves rather than the means of breaking them, the book first explores when and how the methods of modern cryptography can be used and misused. It then presents number theory and the algorithms and methods that make up the basis of cryptography today. After a brief review of "classical" cryptography, the book introduces information theory and examines the public-key cryptosystems of RSA and Rabin s cryptosystem. Other public-key systems studied include the El Gamal cryptosystem, systems based on knapsack problems, and algorithms for creating digital signature schemes. The second half of the text moves on to consider bit-oriented secret-key, or symmetric, systems suitable for encrypting large amounts of data. The author describes block ciphers (including the Data Encryption Standard), cryptographic hash functions, finite fields, the Advanced Encryption Standard, cryptosystems based on elliptical curves, random number generation, and stream ciphers. The book concludes with a look at examples and applications of modern cryptographic systems, such as multi-party computation, zero-knowledge proofs, oblivious transfer, and voting protocols.
This book constitutes the proceedings of the 28th International Conference on Computing and Combinatorics, COCOON 2022, held in Shenzhen, China, in October 2022.The 39 full papers together with 12 short papers presented in this volume were carefully reviewed and selected from 101 submissions. The papers focus on subjects such as Algorithmica, Theoretical Computer Science, Journal of Combinatorial Optimization and others.
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students, and practitioners a unique update on the latest advances in theory and a multitude of applications. It presents the peer-reviewed proceedings of the X International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2021). The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure, network dynamics; diffusion, epidemics and spreading processes; resilience and control as well as all the main network applications, including social and political networks; networks in finance and economics; biological and neuroscience networks, and technological networks.
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students, and practitioners a unique update on the latest advances in theory and a multitude of applications. It presents the peer-reviewed proceedings of the X International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2021). The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure, network dynamics; diffusion, epidemics and spreading processes; resilience and control as well as all the main network applications, including social and political networks; networks in finance and economics; biological and neuroscience networks, and technological networks.
This book presents interdisciplinary, cutting-edge and creative applications of graph theory and modeling in science, technology, architecture and art. Topics are divided into three parts: the first one examines mechanical problems related to gears, planetary gears and engineering installations; the second one explores graph-based methods applied to medical analyses as well as biological and chemical modeling; and the third part includes various topics e.g. drama analysis, aiding of design activities and network visualisation. The authors represent several countries in Europe and America, and their contributions show how different, useful and fruitful the utilization of graphs in modelling of engineering systems can be. The book has been designed to serve readers interested in the subject of graph modelling and those with expertise in related areas, as well as members of the worldwide community of graph modelers.
Rave reviews for INTEGER AND COMBINATORIAL OPTIMIZATION "This book provides an excellent introduction and survey of traditional fields of combinatorial optimization . . . It is indeed one of the best and most complete texts on combinatorial optimization . . . available. [And] with more than 700 entries, [it] has quite an exhaustive reference list."—Optima "A unifying approach to optimization problems is to formulate them like linear programming problems, while restricting some or all of the variables to the integers. This book is an encyclopedic resource for such formulations, as well as for understanding the structure of and solving the resulting integer programming problems."—Computing Reviews "[This book] can serve as a basis for various graduate courses on discrete optimization as well as a reference book for researchers and practitioners."—Mathematical Reviews "This comprehensive and wide-ranging book will undoubtedly become a standard reference book for all those in the field of combinatorial optimization."—Bulletin of the London Mathematical Society "This text should be required reading for anybody who intends to do research in this area or even just to keep abreast of developments."—Times Higher Education Supplement, London Also of interest . . . INTEGER PROGRAMMING Laurence A. Wolsey Comprehensive and self-contained, this intermediate-level guide to integer programming provides readers with clear, up-to-date explanations on why some problems are difficult to solve, how techniques can be reformulated to give better results, and how mixed integer programming systems can be used more effectively. 1998 (0-471-28366-5) 260 pp.
This textbook offers an accessible introduction to combinatorics, infused with Solomon Golomb's insights and illustrative examples. Core concepts in combinatorics are presented with an engaging narrative that suits undergraduate study at any level. Featuring early coverage of the Principle of Inclusion-Exclusion and a unified treatment of permutations later on, the structure emphasizes the cohesive development of ideas. Combined with the conversational style, this approach is especially well suited to independent study. Falling naturally into three parts, the book begins with a flexible Chapter Zero that can be used to cover essential background topics, or as a standalone problem-solving course. The following three chapters cover core topics in combinatorics, such as combinations, generating functions, and permutations. The final three chapters present additional topics, such as Fibonacci numbers, finite groups, and combinatorial structures. Numerous illuminating examples are included throughout, along with exercises of all levels. Three appendices include additional exercises, examples, and solutions to a selection of problems. Solomon Golomb's Course on Undergraduate Combinatorics is ideal for introducing mathematics students to combinatorics at any stage in their program. There are no formal prerequisites, but readers will benefit from mathematical curiosity and a willingness to engage in the book's many entertaining challenges. |
You may like...
Handbook of Research on Advanced…
Madhumangal Pal, Sovan Samanta, …
Hardcover
R7,051
Discovery Miles 70 510
A Journey Through Discrete Mathematics…
Martin Loebl, Jaroslav Nesetril, …
Hardcover
R4,651
Discovery Miles 46 510
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, …
Hardcover
R3,259
Discovery Miles 32 590
Galois Covers, Grothendieck-Teichmuller…
Frank Neumann, Sibylle Schroll
Hardcover
R4,264
Discovery Miles 42 640
Code Based Secret Sharing Schemes…
Patrick Sole, Selda Calkavur, …
Hardcover
R2,261
Discovery Miles 22 610
|