![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Science & Mathematics > Mathematics > General
THE REAL WORLD OF MATHEMATICS, SCIENCE, AND TECHNOLOGY EDUCATION In this Preface, I would like to focus on what I mean by "education" and speak about the models and metaphors that are used when people talk, write, and act in the domain of education. We need to look at the assu- tions and processes that the models and metaphors implicitly and explicitly contain. I feel we should explore whether there is a specific thrust to mat- matics education in the here and now, and be very practical about it. For me education is the enhancement of knowledge and understanding, and there is a strong and unbreakable link between the two. There seems l- tle point in acquiring knowledge without understanding its meaning. Nor is it enough to gain a deep understanding of problems without gaining the appropriate knowledge to work for their solution. Thus knowledge and understanding are each necessary conditions for the process of education, but only when they are linked will the process bear fruit. Only in the b- anced interplay of knowledge and understanding can we expect to achieve genuine education.
Este trabajo presenta una alternativa para estimar el valor de los factores de intensidad de esfuerzos (SIF por sus siglas en ingles) en un sistema con friccion. Tal estudio se realiza mediante el software ABAQUS(r), en el cual se utiliza el metodo del elemento finito (MEF) y el metodo del elemento finito extendido (X-FEM) para el analisis. Para el caso del MEF, se presentan simulaciones de placas agrietadas con la finalidad de verificar el proceso del fenomeno de fractura. En el caso del X-FEM, se analiza un engrane con una grieta en la raiz de su diente, a la cual se varia el angulo de inclinacion para verificar como afecta la magnitud de los SIF's. De la misma manera se presentan simulaciones para diferentes coeficientes de friccion, esto con la finalidad de analizar la influencia que tiene la friccion sobre los SIF's en el engrane. A partir de los resultados de las simulaciones, se obtienen las curvas de comportamiento de SIF en funcion del angulo de la grieta y del coeficiente de friccion. Se realiza el ajuste de estas curvas mediante el metodo de segmentarias cubicas y se obtienen las ecuaciones que describen el comportamiento del sistem
The only single-source----now completely updated and revised----to offer a unified treatment of the theory, methodology, and applications of the EM algorithm Complete with updates that capture developments from the past decade, The EM Algorithm and Extensions, Second Edition successfully provides a basic understanding of the EM algorithm by describing its inception, implementation, and applicability in numerous statistical contexts. In conjunction with the fundamentals of the topic, the authors discuss convergence issues and computation of standard errors, and, in addition, unveil many parallels and connections between the EM algorithm and Markov chain Monte Carlo algorithms. Thorough discussions on the complexities and drawbacks that arise from the basic EM algorithm, such as slow convergence and lack of an in-built procedure to compute the covariance matrix of parameter estimates, are also presented. While the general philosophy of the First Edition has been maintained, this timely new edition has been updated, revised, and expanded to include: New chapters on Monte Carlo versions of the EM algorithm and generalizations of the EM algorithm New results on convergence, including convergence of the EM algorithm in constrained parameter spaces Expanded discussion of standard error computation methods, such as methods for categorical data and methods based on numerical differentiation Coverage of the interval EM, which locates all stationary points in a designated region of the parameter space Exploration of the EM algorithm's relationship with the Gibbs sampler and other Markov chain Monte Carlo methods Plentiful pedagogical elements--chapter introductions, lists of examples, author and subject indices, computer-drawn graphics, and a related Web site The EM Algorithm and Extensions, Second Edition serves as an excellent text for graduate-level statistics students and is also a comprehensive resource for theoreticians, practitioners, and researchers in the social and physical sciences who would like to extend their knowledge of the EM algorithm.
Written by Habia, the Hair and Beauty Industry Authority, this write-in workbook is an invaluable resource to help learners improve their Maths and English skills and prepare for Level 1 and Level 2 Functional Skills exams. The workbook format enables learners to practice and improve their maths and English skills and the real-life questions, exercises and scenarios are all written with a Hairdressing context to help students find essential Maths and English theory understandable, engaging and achievable. This workbook is an invaluable resource to support Maths and English learning in the classroom, at work and for personal study at home.
'Stewart is Britain's most brilliant and prolific populariser of maths' Alex Bellos 'The instructive equivalent of a Michelin-starred tasting menu' Tim Radford Many people think mathematics is useless. They're wrong. In the UK, the 2.8 million people employed in mathematical science occupations contributed GBP208 billion to the economy in a single year - that's 10 per cent of the workforce contributing 16 per cent of the economy. What's the Use? asks why there is such a vast gulf between public perceptions of mathematics and reality. It shows how mathematics is vital, often in surprising ways, behind the scenes of daily life. How politicians pick their voters. How an absurd little puzzle solved 300 years ago leads to efficient methods for kidney transplants. And how a bizarre, infinitely wiggly curve helps to optimise deliveries to your door.
The Third European Congress of Mathematics (3ecm) took place from July 10th to July 14th, 2000 in Barcelona. It was organised by the Societat Catalana de Matematiques (Catalan Mathematical Society), under the auspices of the Euro- pean Mathematical Society (EMS). As foreseen by the EMS and the International Mathematical Union, this Congress was a major event in World Mathematical Year 2000. In addition to reviewing outstanding research achievements, important aspects of the life of European mathematics were discussed. Mathematics is undergoing a period of rapid changes. Effective computation and applications in science and technology go ever more hand in hand with con- ceptual developments. It was one of the aims of 3ecm to reflect this mutual enrich- ment, while steering present and future trends of mathematical sciences. In fact, the motto of the Congress, Shaping the 21st Century, was meant to capture these views. Nearly 1400 people from 87 countries gathered together in the Palau de Con- gressos of Barcelona in order to take part in the activities of the 3ecm scientific programme: Nine plenary lectures, thirty invited lectures in parallel sessions, lec- tures given by EMS prize winners, ten mini-symposia on special topics, seven round tables, poster sessions, presentations of mathematical software and video exhibitions. Twenty events were satellites of 3ecm in various countries.
Algebraic Geometry often seems very abstract, but in fact it is full of concrete examples and problems. This side of the subject can be approached through the equations of a variety, and the syzygies of these equations are a necessary part of the study. This book is the first textbook-level account of basic examples and techniques in this area. It illustrates the use of syzygies in many concrete geometric considerations, from interpolation to the study of canonical curves. The text has served as a basis for graduate courses by the author at Berkeley, Brandeis, and in Paris. It is also suitable for self-study by a reader who knows a little commutative algebra and algebraic geometry already. As an aid to the reader, the appendices provide summaries of local cohomology and commutative algebra, tying together examples and major results from a wide range of topics.
This volume presents the invited lectures of the workshop "Infinite Dimensional Algebras and Quantum Integrable Systems" held in July 2003 at the University of Algarve, Faro, Portugal, as a satellite workshop of the XIV International Congress on Mathematical Physics. In it, recent developments in the theory of infinite dimensional algebras, and their applications to quantum integrable systems, are reviewed by leading experts in the field.
This is an acessible book on the advanced symmetry methods for differential equations, including such subjects as conservation laws, Lie-B cklund symmetries, contact transformations, adjoint symmetries, N ther's Theorem, mappings with some modification, potential symmetries, nonlocal symmetries, nonlocal mappings, and non-classical method. Of use to graduate students and researchers in mathematics and physics.
Although some examples of phase portraits of quadratic systems can already be found in the work of Poincare, the first paper dealing exclusively with these systems was published by Buchel in 1904. By the end of the 20th century an increasing flow of publications resulted in nearly a thousand papers on the subject. This book attempts to give a presentation of the advance of our knowledge of phase portraits of quadratic systems, paying special attention to the historical development of the subject. The book organizes the portraits into classes, using the notions of finite and infinite multiplicity and finite and infinite index. Classifications of phase portraits for various classes are given using the well-known methods of phase plane analysis."
Presents a firm mathematical basis for the use of response-adaptive randomization procedures in practice "The Theory of Response-Adaptive Randomization in Clinical Trials" is the result of the authors' ten-year collaboration as well as their collaborations with other researchers in investigating the important questions regarding response-adaptive randomization in a rigorous mathematical framework. Response-adaptive allocation has a long history in biostatistics literature; however, largely due to the disastrous ECMO trial in the early 1980s, there is a general reluctance to use these procedures. This timely book represents a mathematically rigorous subdiscipline of experimental design involving randomization and answers fundamental questions, including: How does response-adaptive randomization affect power? Can standard inferential tests be applied following response-adaptive randomization? What is the effect of delayed response? Which procedure is most appropriate and how can "most appropriate" be quantified? How can heterogeneity of the patient population be incorporated? Can response-adaptive randomization be performed with more than two treatments or with continuous responses? The answers to these questions communicate a thorough understanding of the asymptotic properties of each procedure discussed, including asymptotic normality, consistency, and asymptotic variance of the induced allocation. Topical coverage includes: The relationship between power and response-adaptive randomization The general result for determining asymptotically best procedures Procedures based on urn models Procedures based on sequential estimation Implications for the practice of clinical trials Useful for graduate students in mathematics, statistics, and biostatistics as well as researchers and industrial and academic biostatisticians, this book offers a rigorous treatment of the subject in order to find the optimal procedure to use in practice.
This book focuses on logic and logical language. It examines different types of words, terms and propositions in detail. While discussing the nature of propositions, it illustrates the procedures used to determine the truth and falsity of a proposition, and the validity and invalidity of an argument. In addition, the book provides a clear exposition of the pure and mixed form of syllogism with suitable examples. The book encompasses sentential logic, predicate logic, symbolic logic, induction and set theory topics. The book is designed to serve all those involved in teaching and learning courses on logic. It offers a valuable resource for students and researchers in philosophy, mathematics and computer science disciplines. Given its scope, it is an essential read for everyone interested in logic, language, formulation of the hypotheses for the scientific enquiries and research studies, and judging valid and invalid arguments in the natural language discourse.
This book presents a unified theory of the Finite Element Method and the Boundary Element Method for a numerical solution of second order elliptic boundary value problems. This includes the solvability, stability, and error analysis as well as efficient methods to solve the resulting linear systems. Applications are the potential equation, the system of linear elastostatics and the Stokes system. While there are textbooks on the finite element method, this is one of the first books on Theory of Boundary Element Methods. It is suitable for self study and exercises are included.
In this monograph, we develop the theory of one of the most fascinating topics in coding theory, namely, perfect codes and related structures. Perfect codes are considered to be the most beautiful structure in coding theory, at least from the mathematical side. These codes are the largest ones with their given parameters. The book develops the theory of these codes in various metrics - Hamming, Johnson, Lee, Grassmann, as well as in other spaces and metrics. It also covers other related structures such as diameter perfect codes, quasi-perfect codes, mixed codes, tilings, combinatorial designs, and more. The goal is to give the aspects of all these codes, to derive bounds on their sizes, and present various constructions for these codes.The intention is to offer a different perspective for the area of perfect codes. For example, in many chapters there is a section devoted to diameter perfect codes. In these codes, anticodes are used instead of balls and these anticodes are related to intersecting families, an area that is part of extremal combinatorics. This is one example that shows how we direct our exposition in this book to both researchers in coding theory and mathematicians interested in combinatorics and extremal combinatorics. New perspectives for MDS codes, different from the classic ones, which lead to new directions of research on these codes are another example of how this book may appeal to both researchers in coding theory and mathematicians.The book can also be used as a textbook, either on basic course in combinatorial coding theory, or as an advance course in combinatorial coding theory.
Stopping Losses from Accidental and Malicious Actions Around the world, users cost organizations billions of dollars due to simple errors and malicious actions. They believe that there is some deficiency in the users. In response, organizations believe that they have to improve their awareness efforts and making more secure users. This is like saying that coalmines should get healthier canaries. The reality is that it takes a multilayered approach that acknowledges that users will inevitably make mistakes or have malicious intent, and the failure is in not planning for that. It takes a holistic approach to assessing risk combined with technical defenses and countermeasures layered with a security culture and continuous improvement. Only with this kind of defense in depth can organizations hope to prevent the worst of the cybersecurity breaches and other user-initiated losses. Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, Ira Winkler and Dr. Tracy Celaya's You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement. Minimize business losses associated with user failings Proactively plan to prevent and mitigate data breaches Optimize your security spending Cost justify your security and loss reduction efforts Improve your organization’s culture Business technology and security professionals will benefit from the information provided by these two well-known and influential cybersecurity speakers and experts.
The articles in this volume study various cohomological aspects of
algebraic varieties:
The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book. |
You may like...
Routley-Meyer Ternary Relational…
Gemma Robles, Jose M. Mendez
Paperback
R1,575
Discovery Miles 15 750
Pearson Edexcel International A Level…
Joe Skrakowski, Harry Smith
Digital product license key
R930
Discovery Miles 9 300
Pearson Edexcel International A Level…
Joe Skrakowski, Harry Smith
Digital product license key
R943
Discovery Miles 9 430
Financial Mathematics - A Computational…
K. Pereira, N. Modhien, …
Paperback
R326
Discovery Miles 3 260
STEM Research for Students Volume 1…
Julia H Cothron, Ronald N Giese, …
Hardcover
R2,712
Discovery Miles 27 120
Precalculus: Mathematics for Calculus…
Lothar Redlin, Saleem Watson, …
Paperback
Financial Mathematics - A Computational…
Kevin Pereira, Naeemah Modhien, …
Multiple copy pack
|