![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Science & Mathematics > Mathematics > Combinatorics & graph theory
Combinatorics and Number Theory of Counting Sequences is an introduction to the theory of finite set partitions and to the enumeration of cycle decompositions of permutations. The presentation prioritizes elementary enumerative proofs. Therefore, parts of the book are designed so that even those high school students and teachers who are interested in combinatorics can have the benefit of them. Still, the book collects vast, up-to-date information for many counting sequences (especially, related to set partitions and permutations), so it is a must-have piece for those mathematicians who do research on enumerative combinatorics. In addition, the book contains number theoretical results on counting sequences of set partitions and permutations, so number theorists who would like to see nice applications of their area of interest in combinatorics will enjoy the book, too. Features The Outlook sections at the end of each chapter guide the reader towards topics not covered in the book, and many of the Outlook items point towards new research problems. An extensive bibliography and tables at the end make the book usable as a standard reference. Citations to results which were scattered in the literature now become easy, because huge parts of the book (especially in parts II and III) appear in book form for the first time.
Finite Geometries stands out from recent textbooks about the subject of finite geometries by having a broader scope. The authors thoroughly explain how the subject of finite geometries is a central part of discrete mathematics. The text is suitable for undergraduate and graduate courses. Additionally, it can be used as reference material on recent works. The authors examine how finite geometries' applicable nature led to solutions of open problems in different fields, such as design theory, cryptography and extremal combinatorics. Other areas covered include proof techniques using polynomials in case of Desarguesian planes, and applications in extremal combinatorics, plus, recent material and developments. Features: Includes exercise sets for possible use in a graduate course Discusses applications to graph theory and extremal combinatorics Covers coding theory and cryptography Translated and revised text from the Hungarian published version
This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes, and algebraic curves. The latter part presents a brief introduction to the theory of algebraic curves and its most important applications to coding theory.
One service mathematics has rendered the 'Et moi, ..., si j'avait su comment en revenir, It has put common sense back je n'y serais point al e.' human race. Jules Verne where it belongs, on the topmost shelf next to the dusty canister labelled 'discarded n- sense'. The series is divergent; therefore we may be able to do something with it. Eric T. Bell o. Heaviside Mathematics is a tool for thought. A highly necessary tool in a world where both feedback and non linearities abound. Similarly, all kinds of parts of mathematics serve as tools for other parts and for other sciences. Applying a simple rewriting rule to the quote on the right above one finds such statements as: 'One service topology has rendered mathematical physics .. .'; 'One service logic has rendered com puterscience .. .'; 'One service category theory has rendered mathematics .. .'. All arguably true. And all statements obtainable this way form part of the raison d'etre of this series."
This book describes a set of novel statistical algorithms designed to infer functional connectivity of large-scale neural assemblies. The algorithms are developed with the aim of maximizing computational accuracy and efficiency, while faithfully reconstructing both the inhibitory and excitatory functional links. The book reports on statistical methods to compute the most significant functional connectivity graph, and shows how to use graph theory to extract the topological features of the computed network. A particular feature is that the methods used and extended at the purpose of this work are reported in a fairly completed, yet concise manner, together with the necessary mathematical fundamentals and explanations to understand their application. Furthermore, all these methods have been embedded in the user-friendly open source software named SpiCoDyn, which is also introduced here. All in all, this book provides researchers and graduate students in bioengineering, neurophysiology and computer science, with a set of simplified and reduced models for studying functional connectivity in in silico biological neuronal networks, thus overcoming the complexity of brain circuits.
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject's fundamentals while presenting the most current advances in cryptography. The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world. Key Features of the Fourth Edition: New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9). New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1). New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A). An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium. Interesting attacks on cryptosystems, including: padding oracle attack correlation attacks and algebraic attacks on stream ciphers attack on the DUAL-EC random bit generator that makes use of a trapdoor. A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard. Methods of key distribution in sensor networks. The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret. The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain. The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.
This book introduces polyhedra as a tool for graph theory and discusses their properties and applications in solving the Gauss crossing problem. The discussion is extended to embeddings on manifolds, particularly to surfaces of genus zero and non-zero via the joint tree model, along with solution algorithms. Given its rigorous approach, this book would be of interest to researchers in graph theory and discrete mathematics.
A complete, self-contained introduction to a powerful and resurging mathematical discipline … Combinatorial Geometry presents and explains with complete proofs some of the most important results and methods of this relatively young mathematical discipline, started by Minkowski, Fejes Tóth, Rogers, and Erd???s. Nearly half the results presented in this book were discovered over the past twenty years, and most have never before appeared in any monograph. Combinatorial Geometry will be of particular interest to mathematicians, computer scientists, physicists, and materials scientists interested in computational geometry, robotics, scene analysis, and computer-aided design. It is also a superb textbook, complete with end-of-chapter problems and hints to their solutions that help students clarify their understanding and test their mastery of the material. Topics covered include:
This volume comprises papers presented at the Third Isle of Thorns Conference on Finite Geometries and Designs. The papers explore the structure and associated incidence structures of Galois geometries, and their related automorphism groups. Among the main topics covered are generalized quadrangles and n-gons, groups acting on geometries, linear spaces, partial geometries, diagram geometries, non-Desarguesian planes, strongly regular graphs, and designs. This timely collection of articles is expertly presented and will be of interest to research workers and postgraduates in combinatorics, design theory, and finite geometries.
In knot theory, diagrams of a given canonical genus can be described by means of a finite number of patterns ("generators"). Diagram Genus, Generators and Applications presents a self-contained account of the canonical genus: the genus of knot diagrams. The author explores recent research on the combinatorial theory of knots and supplies proofs for a number of theorems. The book begins with an introduction to the origin of knot tables and the background details, including diagrams, surfaces, and invariants. It then derives a new description of generators using Hirasawa's algorithm and extends this description to push the compilation of knot generators one genus further to complete their classification for genus 4. Subsequent chapters cover applications of the genus 4 classification, including the braid index, polynomial invariants, hyperbolic volume, and Vassiliev invariants. The final chapter presents further research related to generators, which helps readers see applications of generators in a broader context.
Paul Erdos was one of the most influential mathematicians of the twentieth century, whose work in number theory, combinatorics, set theory, analysis, and other branches of mathematics has determined the development of large areas of these fields. In 1999, a conference was organized to survey his work, his contributions to mathematics, and the far-reaching impact of his work on many branches of mathematics. On the 100th anniversary of his birth, this volume undertakes the almost impossible task to describe the ways in which problems raised by him and topics initiated by him (indeed, whole branches of mathematics) continue to flourish. Written by outstanding researchers in these areas, these papers include extensive surveys of classical results as well as of new developments."
This book describes Python3 programming resources for implementing decision aiding algorithms in the context of a bipolar-valued outranking approach. These computing resources, made available under the name Digraph3, are useful in the field of Algorithmic Decision Theory and more specifically in outranking-based Multiple-Criteria Decision Aiding (MCDA). The first part of the book presents a set of tutorials introducing the Digraph3 collection of Python3 modules and its main objects, such as bipolar-valued digraphs and outranking digraphs. In eight methodological chapters, the second part illustrates multiple-criteria evaluation models and decision algorithms. These chapters are largely problem-oriented and demonstrate how to edit a new multiple-criteria performance tableau, how to build a best choice recommendation, how to compute the winner of an election and how to make rankings or ratings using incommensurable criteria. The book's third part presents three real-world decision case studies, while the fourth part addresses more advanced topics, such as computing ordinal correlations between bipolar-valued outranking digraphs, computing kernels in bipolar-valued digraphs, testing for confidence or stability of outranking statements when facing uncertain or solely ordinal criteria significance weights, and tempering plurality tyranny effects in social choice problems. The fifth and last part is more specifically focused on working with undirected graphs, tree graphs and forests. The closing chapter explores comparability, split, interval and permutation graphs. The book is primarily intended for graduate students in management sciences, computational statistics and operations research. The chapters presenting algorithms for ranking multicriteria performance records will be of computational interest for designers of web recommender systems. Similarly, the relative and absolute quantile-rating algorithms, discussed and illustrated in several chapters, will be of practical interest to public and private performance auditors.
Presents refereed papers by international experts regarding such diverse areas of interest as: random mappings and permutations, quasirandom graphs, random walks on trees, degree sequences, random matroids, central limit theorems, percolations and random subgraphs of the n-cube. Features an appendix of open problems from the conference.
This book provides an overview of the emerging field of in situ visualization, i.e. visualizing simulation data as it is generated. In situ visualization is a processing paradigm in response to recent trends in the development of high-performance computers. It has great promise in its ability to access increased temporal resolution and leverage extensive computational power. However, the paradigm also is widely viewed as limiting when it comes to exploration-oriented use cases. Furthermore, it will require visualization systems to become increasingly complex and constrained in usage. As research efforts on in situ visualization are growing, the state of the art and best practices are rapidly maturing. Specifically, this book contains chapters that reflect state-of-the-art research results and best practices in the area of in situ visualization. Our target audience are researchers and practitioners from the areas of mathematics computational science, high-performance computing, and computer science that work on or with in situ techniques, or desire to do so in future.
Are you looking for new lectures for your course on algorithms, combinatorial optimization, or algorithmic game theory? Maybe you need a convenient source of relevant, current topics for a graduate student or advanced undergraduate student seminar? Or perhaps you just want an enjoyable look at some beautiful mathematical and algorithmic results, ideas, proofs, concepts, and techniques in discrete mathematics and theoretical computer science? Gems of Combinatorial Optimization and Graph Algorithms is a handpicked collection of up-to-date articles, carefully prepared by a select group of international experts, who have contributed some of their most mathematically or algorithmically elegant ideas. Topics include longest tours and Steiner trees in geometric spaces, cartograms, resource buying games, congestion games, selfish routing, revenue equivalence and shortest paths, scheduling, linear structures in graphs, contraction hierarchies, budgeted matching problems, and motifs in networks. This volume is aimed at readers with some familiarity of combinatorial optimization, and appeals to researchers, graduate students, and advanced undergraduate students alike.
Key problems and conjectures have played an important role in promoting the development of Ramsey theory, a field where great progress has been made during the past two decades, with some old problems solved and many new problems proposed. The present book will be helpful to readers who wish to learn about interesting problems in Ramsey theory, to see how they are interconnected, and then to study them in depth. This book is the first problem book of such scope in Ramsey theory. Many unsolved problems, conjectures and related partial results in Ramsey theory are presented, in areas such as extremal graph theory, additive number theory, discrete geometry, functional analysis, algorithm design, and in other areas. Most presented problems are easy to understand, but they may be difficult to solve. They can be appreciated on many levels and by a wide readership, ranging from undergraduate students majoring in mathematics to research mathematicians. This collection is an essential reference for mathematicians working in combinatorics and number theory, as well as for computer scientists studying algorithms. Contents Some definitions and notations Ramsey theory Bi-color diagonal classical Ramsey numbers Paley graphs and lower bounds for R(k, k) Bi-color off-diagonal classical Ramsey numbers Multicolor classical Ramsey numbers Generalized Ramsey numbers Folkman numbers The Erdos-Hajnal conjecture Other Ramsey-type problems in graph theory On van der Waerden numbers and Szemeredi's theorem More problems of Ramsey type in additive number theory Sidon-Ramsey numbers Games in Ramsey theory Local Ramsey theory Set-coloring Ramsey theory Other problems and conjectures
Covering the major topics of evolutionary game theory, Game-Theoretical Models in Biology, Second Edition presents both abstract and practical mathematical models of real biological situations. It discusses the static aspects of game theory in a mathematically rigorous way that is appealing to mathematicians. In addition, the authors explore many applications of game theory to biology, making the text useful to biologists as well. The book describes a wide range of topics in evolutionary games, including matrix games, replicator dynamics, the hawk-dove game, and the prisoner's dilemma. It covers the evolutionarily stable strategy, a key concept in biological games, and offers in-depth details of the mathematical models. Most chapters illustrate how to use Python to solve various games. Important biological phenomena, such as the sex ratio of so many species being close to a half, the evolution of cooperative behaviour, and the existence of adornments (for example, the peacock's tail), have been explained using ideas underpinned by game theoretical modelling. Suitable for readers studying and working at the interface of mathematics and the life sciences, this book shows how evolutionary game theory is used in the modelling of these diverse biological phenomena. In this thoroughly revised new edition, the authors have added three new chapters on the evolution of structured populations, biological signalling games, and a topical new chapter on evolutionary models of cancer. There are also new sections on games with time constraints that convert simple games to potentially complex nonlinear ones; new models on extortion strategies for the Iterated Prisoner's Dilemma and on social dilemmas; and on evolutionary models of vaccination, a timely section given the current Covid pandemic. Features Presents a wide range of biological applications of game theory. Suitable for researchers and professionals in mathematical biology and the life sciences, and as a text for postgraduate courses in mathematical biology. Provides numerous examples, exercises, and Python code.
This book brings together current advances in high-technology visualisation and the age-old but science-adapted practice of drawing for improved observation in medical education and surgical planning and practice. We begin this book with a chapter reviewing the history of confusion around visualisation, observation and theory, outlining the implications for medical imaging. The authors consider the shifting influence of various schools of philosophy, and the changing agency of technology over time. We then follow with chapters on the practical application of visualisation and observation, including emerging imaging techniques in anatomy for teaching, research and clinical practice - innovation in the mapping of orthopaedic fractures for optimal orthopaedic surgical guidance - placental morphology and morphometry as a prerequisite for future pathological investigations - visualising the dural venous sinuses using volume tracing. Two chapters explore the use and benefit of drawing in medical education and surgical planning. It is worth noting that experienced surgeons and artists employ a common set of techniques as part of their work which involves both close observation and the development of fine motor skills and sensitive tool use. An in-depth look at police identikit construction from memory by eyewitnesses to crimes, outlines how an individual's memory of a suspect's facial features are rendered visible as a composite image. This book offers anatomy educators and clinicians an overview of the history and philosophy of medical observation and imaging, as well as an overview of contemporary imaging technologies for anatomy education and clinical practice. In addition, we offer anatomy educators and clinicians a detailed overview of drawing practices for the improvement of anatomical observation and surgical planning. Forensic psychologists and law enforcement personnel will not only benefit from a chapter dedicated to the construction of facial composites, but also from chapters on drawing and observation.
This book reports on advanced concepts in fuzzy graph theory, showing a set of tools that can be successfully applied to understanding and modeling illegal human trafficking. Building on the previous book on fuzzy graph by the same authors, which set the fundamentals for readers to understand this developing field of research, this second book gives a special emphasis to applications of the theory. For this, authors introduce new concepts, such as intuitionistic fuzzy graphs, the concept of independence and domination in fuzzy graphs, as well as directed fuzzy networks, incidence graphs and many more.
This collection of peer-reviewed workshop papers provides comprehensive coverage of cutting-edge research into topological approaches to data analysis and visualization. It encompasses the full range of new algorithms and insights, including fast homology computation, comparative analysis of simplification techniques, and key applications in materials and medical science. The book also addresses core research challenges such as the representation of large and complex datasets, and integrating numerical methods with robust combinatorial algorithms. In keeping with the focus of the TopoInVis 2017 Workshop, the contributions reflect the latest advances in finding experimental solutions to open problems in the sector. They provide an essential snapshot of state-of-the-art research, helping researchers to keep abreast of the latest developments and providing a basis for future work. Gathering papers by some of the world's leading experts on topological techniques, the book represents a valuable contribution to a field of growing importance, with applications in disciplines ranging from engineering to medicine.
This book provides an introduction to hypergraphs, its aim being to overcome the lack of recent manuscripts on this theory. In the literature hypergraphs have many other names such as set systems and families of sets. This work presents the theory of hypergraphs in its most original aspects, while also introducing and assessing the latest concepts on hypergraphs. The variety of topics, their originality and novelty are intended to help readers better understand the hypergraphs in all their diversity in order to perceive their value and power as mathematical tools. This book will be a great asset to upper-level undergraduate and graduate students in computer science and mathematics. It has been the subject of an annual Master's course for many years, making it also ideally suited to Master's students in computer science, mathematics, bioinformatics, engineering, chemistry, and many other fields. It will also benefit scientists, engineers and anyone else who wants to understand hypergraphs theory.
Wallis's book on discrete mathematics is a resource for an introductory course in a subject fundamental to both mathematics and computer science, a course that is expected not only to cover certain specific topics but also to introduce students to important modes of thought specific to each discipline . . . Lower-division undergraduates through graduate students. -Choice reviews (Review of the First Edition) Very appropriately entitled as a 'beginner's guide', this textbook presents itself as the first exposure to discrete mathematics and rigorous proof for the mathematics or computer science student. -Zentralblatt Math (Review of the First Edition) This second edition of A Beginner's Guide to Discrete Mathematics presents a detailed guide to discrete mathematics and its relationship to other mathematical subjects including set theory, probability, cryptography, graph theory, and number theory. This textbook has a distinctly applied orientation and explores a variety of applications. Key Features of the second edition: * Includes a new chapter on the theory of voting as well as numerous new examples and exercises throughout the book * Introduces functions, vectors, matrices, number systems, scientific notations, and the representation of numbers in computers * Provides examples which then lead into easy practice problems throughout the text and full exercise at the end of each chapter * Full solutions for practice problems are provided at the end of the book This text is intended for undergraduates in mathematics and computer science, however, featured special topics and applications may also interest graduate students.
Disjunctive Programming is a technique and a discipline initiated by the author in the early 1970's, which has become a central tool for solving nonconvex optimization problems like pure or mixed integer programs, through convexification (cutting plane) procedures combined with enumeration. It has played a major role in the revolution in the state of the art of Integer Programming that took place roughly during the period 1990-2010. The main benefit that the reader may acquire from reading this book is a deeper understanding of the theoretical underpinnings and of the applications potential of disjunctive programming, which range from more efficient problem formulation to enhanced modeling capability and improved solution methods for integer and combinatorial optimization. Egon Balas is University Professor and Lord Professor of Operations Research at Carnegie Mellon University's Tepper School of Business.
Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users.This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they triggered, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.
This collaborative book presents recent trends on the study of sequences, including combinatorics on words and symbolic dynamics, and new interdisciplinary links to group theory and number theory. Other chapters branch out from those areas into subfields of theoretical computer science, such as complexity theory and theory of automata. The book is built around four general themes: number theory and sequences, word combinatorics, normal numbers, and group theory. Those topics are rounded out by investigations into automatic and regular sequences, tilings and theory of computation, discrete dynamical systems, ergodic theory, numeration systems, automaton semigroups, and amenable groups. This volume is intended for use by graduate students or research mathematicians, as well as computer scientists who are working in automata theory and formal language theory. With its organization around unified themes, it would also be appropriate as a supplemental text for graduate level courses. |
You may like...
|