![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Science & Mathematics > Mathematics > General
This volume is dedicated to Paul Erdos, who profoundly influenced mathematics in the twentieth century, with over 1200 papers in number theory, complex analysis, probability theory, geometry, interpretation theory, algebra set theory and combinatorics. One of Erdos' hallmarks was the host of stimulating problems and conjectures, to many of which he attached monetary prices, in accordance with their notoriety. A feature of this volume is a collection of some 50 outstanding unsolved problems, together with their 'value'! Eminent mathematicians from around the world have contributed articles to this volume that reflect the diversity of Erdos' interests, and it will be a fund of insight for number theorists, combinatorialists, set theorists and analysts.
This book discusses recent developments in Input-Output (I/O) models for microcomputers and applications of I/O models in regional studies. It provides background information on traditional I/O models and a set of working examples of I/O applications for users.
This book is composed of the most interesting problems from a quarter century of regional mathematics competitions for students aged 11-14 in the province of Styria, Austria. The problems presented here range from pure puzzles to a more traditional mathematical type of question, but all are somehow special, posed with the intent of giving the reader something interesting to think about, with the promise of an entertaining moment of elucidation and enlightenment at the end.
This book provides prospective and practicing teachers with research insights into the mathematical difficulties of students with learning disabilities and classroom practices that address these difficulties. This linkage between research and practice celebrates teachers as learners of their own students' mathematical thinking, thus contributing an alternative view of mathematical progression in which students are taught conceptually. The research-based volume presents a unique collaboration among researchers in special education, psychology, and mathematics education from around the world. It reflects an ongoing work by members of the International Group for the Psychology of Mathematics Education (PME) and the North American Chapter of the PME Working Groups. The authors of chapters in this book, who have been collaborating extensively over the past 7 years, are from Australia, Canada, the United Kingdom, and the United States.
This second edition includes eleven new sections based on the approximation of matrix functions, deflating the solution space and improving the accuracy of approximate solutions, iterative solution of initial value problems of systems of ordinary differential equations, and the method of trial functions for boundary value problems. The topics of the two new chapters are integral equations and mathematical optimization. The book provides alternative solutions to software tools amenable to hand computations to validate the results obtained by "black box" solvers. It also offers an insight into the mathematics behind many CAD, CAE tools of the industry. The book aims to provide a working knowledge of the various approximation techniques for engineering practice.
This new and updated second edition of Debates in Mathematics Education explores the major issues that mathematics teachers encounter in their daily lives. By engaging with established and contemporary debates, this volume promotes and supports critical reflection and aims to stimulate both novice and experienced teachers to reach informed judgements and argue their point of view with deeper theoretical knowledge and understanding. Divided into five accessible sections, this book investigates and offers fresh insight into topics of central importance in mathematics education, with this second edition including new discussions and chapters on: Classic and contemporary issues of pedagogy, politics, philosophy and sociology of mathematics education International comparisons of achievement Digital technologies for teaching Mastery in mathematics Pop culture and mathematics Whether mathematics can be harmful Designed to stimulate discussion and support you in your own research, writing and practice through suggested questions and activities throughout, Debates in Mathematics Education will be a valuable resource for any student or practising teacher, and those engaged in initial teacher education, continuing professional development or Master's level study. This book also has much to offer to those leading mathematics departments in schools and initial teacher education programmes, and to beginning doctoral students looking for a survey of the field of mathematics education research.
In practice, actuators often undergo failures and various factors influence its effectiveness. Also due to the increasing complexity of large-scale systems, subsystems are often interconnected, whereas the interactions between any two subsystems are difficult to deal with. This book details a series of new methodologies of designing and analyzing adaptive backstepping control systems involving treatment on actuator failures, subsystem interactions and nonsmooth nonlinearities. Moreover, it discusses some interesting open issues in adaptive failure accommodation, decentralized adaptive control and distributed adaptive coordinated control.
This book brings together diverse recent developments exploring the philosophy of mathematics in education. The unique combination of ethnomathematics, philosophy, history, education, statistics and mathematics offers a variety of different perspectives from which existing boundaries in mathematics education can be extended. The ten chapters in this book offer a balance between philosophy of and philosophy in mathematics education. Attention is paid to the implementation of a philosophy of mathematics within the mathematics curriculum.
Data Fusion and Data Mining for Power System Monitoring provides a comprehensive treatment of advanced data fusion and data mining techniques for power system monitoring with focus on use of synchronized phasor networks. Relevant statistical data mining techniques are given, and efficient methods to cluster and visualize data collected from multiple sensors are discussed. Both linear and nonlinear data-driven mining and fusion techniques are reviewed, with emphasis on the analysis and visualization of massive distributed data sets. Challenges involved in realistic monitoring, visualization, and analysis of observation data from actual events are also emphasized, supported by examples of relevant applications. Features Focuses on systematic illustration of data mining and fusion in power systems Covers issues of standards used in the power industry for data mining and data analytics Applications to a wide range of power networks are provided including distribution and transmission networks Provides holistic approach to the problem of data mining and data fusion using cutting-edge methodologies and technologies Includes applications to massive spatiotemporal data from simulations and actual events
powerful operations on them. An early step in this direction was the development of APl, and more recent examples have been SETl which enables a user to code in terms of mathematical enti ties such as sets and BDl which allows a user, presumably a businessman, to specify a computation in terms of a series of tabular forms and a series of processing paths through which data flows. The design and implementation of such languages are examined in chapters by P. GOLDBERG. Another extension to traditional methods is made possible by systems designed to automatically handle low level flow-of control decisions. All the above higher level languages do this implicitly with their built in operators. PROLOG is a language which does this with a theorem proving mechanism employing primarily unification and backtracking. The programmer specifies the problem to be solved with a set of formal logic statements including a theorem to be proved. The theorem proving system finds a way to combine the axioms to prove the theorem, and in the process, it completes the desired calculation. H. GAllAIRE has contributed a chapter describing PROLOG giving many examples of its usage."
Among the group of physics honors students huddled in 1957 on a Colorado mountain watching Sputnik bisect the heavens, one young scientist was destined, three short years later, to become a key player in America s own top-secret spy satellite program. One of our era s most prolific mathematicians, Karl Gustafson was given just two weeks to write the first US spy satellite s software. The project would fundamentally alter America s Cold War strategy, and this autobiographical account of a remarkable academic life spent in the top flight tells this fascinating inside story for the first time. Gustafson takes you from his early pioneering work in computing, through fascinating encounters with Nobel laureates and Fields medalists, to his current observations on mathematics, science and life. He tells of brushes with death, being struck by lightning, and the beautiful women who have been a part of his journey."
"A stereotype of computer science textbooks is that they are dry, boring, and sometimes even intimidating. As a result, they turn students' interests off from the subject matter instead of enticing them into it. This textbook is the opposite of such a stereotype. The author presents the subject matter in a refreshing story-telling style and aims to bring the Internet-generation of students closer to her stories." --Yingcai Xiao, The University of Akron Introduction to Middleware: Web Services, Object Components, and Cloud Computing provides a comparison of different middleware technologies and the overarching middleware concepts they are based on. The various major paradigms of middleware are introduced and their pros and cons are discussed. This includes modern cloud interfaces, including the utility of Service Oriented Architectures. The text discusses pros and cons of RESTful vs. non-RESTful web services, and also compares these to older but still heavily used distributed object/component middleware. The text guides readers to select an appropriate middleware technology to use for any given task, and to learn new middleware technologies as they appear over time without being greatly overwhelmed by any new concept. The book begins with an introduction to different distributed computing paradigms, and a review of the different kinds of architectures, architectural styles/patterns, and properties that various researchers have used in the past to examine distributed applications and determine the quality of distributed applications. Then it includes appropriate background material in networking and the web, security, and encoding necessary to understand detailed discussion in this area. The major middleware paradigms are compared, and a comparison methodology is developed. Readers will learn how to select a paradigm and technology for a particular task, after reading this text. Detailed middleware technology review sections allow students or industry practitioners working to expand their knowledge to achieve practical skills based on real projects so as to become well-functional in that technology in industry. Major technologies examined include: RESTful web services (RESTful cloud interfaces such as OpenStack, AWS EC2 interface, CloudStack; AJAX, JAX-RS, ASP.NET MVC and ASP.NET Core), non-RESTful (SOAP and WSDL-based) web services (JAX-WS, Windows Communication Foundation), distributed objects/ components (Enterprise Java Beans, .NET Remoting, CORBA). The book presents two projects that can be used to illustrate the practical use of middleware, and provides implementations of these projects over different technologies. This versatile and class-tested textbook is suitable (depending on chapters selected) for undergraduate or first-year graduate courses on client server architectures, middleware, and cloud computing, web services, and web programming.
Nature-Inspired Computing: Physics and Chemistry-Based Algorithms provides a comprehensive introduction to the methodologies and algorithms in nature-inspired computing, with an emphasis on applications to real-life engineering problems. The research interest for Nature-inspired Computing has grown considerably exploring different phenomena observed in nature and basic principles of physics, chemistry, and biology. The discipline has reached a mature stage and the field has been well-established. This endeavour is another attempt at investigation into various computational schemes inspired from nature, which are presented in this book with the development of a suitable framework and industrial applications. Designed for senior undergraduates, postgraduates, research students, and professionals, the book is written at a comprehensible level for students who have some basic knowledge of calculus and differential equations, and some exposure to optimization theory. Due to the focus on search and optimization, the book is also appropriate for electrical, control, civil, industrial and manufacturing engineering, business, and economics students, as well as those in computer and information sciences. With the mathematical and programming references and applications in each chapter, the book is self-contained, and can also serve as a reference for researchers and scientists in the fields of system science, natural computing, and optimization.
Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications. The book focuses on novel and advanced algorithms, as well as mobile app development. The book begins with an overview of mobile cloud computing concepts, models, and service deployments, as well as specific cloud service models. It continues with the basic mechanisms and principles of mobile computing, as well as virtualization techniques. The book also introduces mobile cloud computing architecture, design, key techniques, and challenges. The second part of the book covers optimizations of data processing and storage in mobile clouds, including performance and green clouds. The crucial optimization algorithm in mobile cloud computing is also explored, along with big data and service computing. Security issues in mobile cloud computing are covered in-depth, including a brief introduction to security and privacy issues and threats, as well as privacy protection techniques in mobile systems. The last part of the book features the integration of service-oriented architecture with mobile cloud computing. It discusses web service specifications related to implementations of mobile cloud computing. The book not only presents critical concepts in mobile cloud systems, but also drives readers to deeper research, through open discussion questions. Practical case studies are also included. Suitable for graduate students and professionals, this book provides a detailed and timely overview of mobile cloud computing for a broad range of readers.
From the Foreword "Getting CPS dependability right is essential to forming a solid foundation for a world that increasingly depends on such systems. This book represents the cutting edge of what we know about rigorous ways to ensure that our CPS designs are trustworthy. I recommend it to anyone who wants to get a deep look at these concepts that will form a cornerstone for future CPS designs." --Phil Koopman, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA Trustworthy Cyber-Physical Systems Engineering provides practitioners and researchers with a comprehensive introduction to the area of trustworthy Cyber Physical Systems (CPS) engineering. Topics in this book cover questions such as What does having a trustworthy CPS actually mean for something as pervasive as a global-scale CPS? How does CPS trustworthiness map onto existing knowledge, and where do we need to know more? How can we mathematically prove timeliness, correctness, and other essential properties for systems that may be adaptive and even self-healing? How can we better represent the physical reality underlying real-world numeric quantities in the computing system? How can we establish, reason about, and ensure trust between CPS components that are designed, installed, maintained, and operated by different organizations, and which may never have really been intended to work together? Featuring contributions from leading international experts, the book contains sixteen self-contained chapters that analyze the challenges in developing trustworthy CPS, and identify important issues in developing engineering methods for CPS. The book addresses various issues contributing to trustworthiness complemented by contributions on TCSP roadmapping, taxonomy, and standardization, as well as experience in deploying advanced system engineering methods in industry. Specific approaches to ensuring trustworthiness, namely, proof and refinement, are covered, as well as engineering methods for dealing with hybrid aspects.
Computer Systems Architecture provides IT professionals and students with the necessary understanding of computer hardware. It addresses the ongoing issues related to computer hardware and discusses the solutions supplied by the industry. The book describes trends in computing solutions that led to the current available infrastructures, tracing the initial need for computers to recent concepts such as the Internet of Things. It covers computers' data representation, explains how computer architecture and its underlying meaning changed over the years, and examines the implementations and performance enhancements of the central processing unit (CPU). It then discusses the organization, hierarchy, and performance considerations of computer memory as applied by the operating system and illustrates how cache memory significantly improves performance. The author proceeds to explore the bus system, algorithms for ensuring data integrity, input and output (I/O) components, methods for performing I/O, various aspects relevant to software engineering, and nonvolatile storage devices, such as hard drives and technologies for enhancing performance and reliability. He also describes virtualization and cloud computing and the emergence of software-based systems' architectures. Accessible to software engineers and developers as well as students in IT disciplines, this book enhances readers' understanding of the hardware infrastructure used in software engineering projects. It enables readers to better optimize system usage by focusing on the principles used in hardware systems design and the methods for enhancing performance.
This book introduces fundamental concepts and theories in pervasive computing as well as its key technologies and applications. It explains how to design and implement pervasive middleware and real application systems, covering nearly all aspects related to pervasive computing. Key technologies in the book include pervasive computing-oriented resource management and task migration, mobile pervasive transaction, human computer interface, and context collection-oriented wireless sensor networks.
Practical Guidance on the Efficient Development of High-Quality Software Introduction to Software Engineering, Second Edition equips students with the fundamentals to prepare them for satisfying careers as software engineers regardless of future changes in the field, even if the changes are unpredictable or disruptive in nature. Retaining the same organization as its predecessor, this second edition adds considerable material on open source and agile development models. The text helps students understand software development techniques and processes at a reasonably sophisticated level. Students acquire practical experience through team software projects. Throughout much of the book, a relatively large project is used to teach about the requirements, design, and coding of software. In addition, a continuing case study of an agile software development project offers a complete picture of how a successful agile project can work. The book covers each major phase of the software development life cycle, from developing software requirements to software maintenance. It also discusses project management and explains how to read software engineering literature. Three appendices describe software patents, command-line arguments, and flowcharts.
This handy pocket book will help veterinary nurses with all types
of calculations. Numerous worked examples are included to delelop
the reader's confidence in carrying out the procedures involved.
Each type of calculation has its own separate section in the book
and the authors have used the simplest possible method in
explaining each one. The book is structured such a way that the
reader can progress from a simple explanation of the arithmetic
principles involved, to the application of these principles to
essential veterinary calculations. Qualified veterinary nurses and students alike will fine this
book an invaluable reference source, whether performing relevant
veterinary calculations or studying for professional
examinations. Key Features
|
You may like...
Computational Science and High…
Egon Krause, Yurii I Shokin, …
Hardcover
R5,335
Discovery Miles 53 350
Integrating Deep Learning Algorithms to…
R. Sujatha, S. L. Aarthy, …
Hardcover
R3,649
Discovery Miles 36 490
|