![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Science & Mathematics > Mathematics > Mathematical foundations
The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken. The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field. FEATURES Presents a chronological development of key concepts Includes the Vigenere cipher, the one-time pad, transposition ciphers, Jefferson's wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers
Originally published in 1973. This book is directed to the student of philosophy whose background in mathematics is very limited. The author strikes a balance between material of a philosophical and a formal kind, and does this in a way that will bring out the intricate connections between the two. On the formal side, he gives particular care to provide the basic tools from set theory and arithmetic that are needed to study systems of logic, setting out completeness results for two, three, and four valued logic, explaining concepts such as freedom and bondage in quantificational logic, describing the intuitionistic conception of the logical operators, and setting out Zermelo's axiom system for set theory. On the philosophical side, he gives particular attention to such topics as the problem of entailment, the import of the Loewenheim-Skolem theorem, the expressive powers of quantificational logic, the ideas underlying intuitionistic logic, the nature of set theory, and the relationship between logic and set theory. There are exercises within the text, set out alongside the theoretical ideas that they involve.
Scientific Computing with MATLAB (R), Second Edition improves students' ability to tackle mathematical problems. It helps students understand the mathematical background and find reliable and accurate solutions to mathematical problems with the use of MATLAB, avoiding the tedious and complex technical details of mathematics. This edition retains the structure of its predecessor while expanding and updating the content of each chapter. The book bridges the gap between problems and solutions through well-grouped topics and clear MATLAB example scripts and reproducible MATLAB-generated plots. Students can effortlessly experiment with the scripts for a deep, hands-on exploration. Each chapter also includes a set of problems to strengthen understanding of the material.
Originally published in 1962. This book gives an account of the concepts and methods of a basic part of logic. In chapter I elementary ideas, including those of truth-functional argument and truth-functional validity, are explained. Chapter II begins with a more comprehensive account of truth-functionality; the leading characteristics of the most important monadic and dyadic truth-functions are described, and the different notations in use are set forth. The main part of the book describes and explains three different methods of testing truth-functional aguments and agument forms for validity: the truthtable method, the deductive method and the method of normal forms; for the benefit mainly of readers who have not acquired in one way or another a general facility in the manipulation of symbols some of the procedures have been described in rather more detail than is common in texts of this kind. In the final chapter the author discusses and rejects the view, based largely on the so called paradoxes of material implication, that truth-functional logic is not applicable in any really important way to arguments of ordinary discourse.
Originally published in 1962. A clear and simple account of the growth and structure of Mathematical Logic, no earlier knowledge of logic being required. After outlining the four lines of thought that have been its roots - the logic of Aristotle, the idea of all the parts of mathematics as systems to be designed on the same sort of plan as that used by Euclid and his Elements, and the discoveries in algebra and geometry in 1800-1860 - the book goes on to give some of the main ideas and theories of the chief writers on Mathematical Logic: De Morgan, Boole, Jevons, Pierce, Frege, Peano, Whitehead, Russell, Post, Hilbert and Goebel. Written to assist readers who require a general picture of current logic, it will also be a guide for those who will later be going more deeply into the expert details of this field.
Originally published in 1966. Professor Rescher's aim is to develop a "logic of commands" in exactly the same general way which standard logic has already developed a "logic of truth-functional statement compounds" or a "logic of quantifiers". The object is to present a tolerably accurate and precise account of the logically relevant facets of a command, to study the nature of "inference" in reasonings involving commands, and above all to establish a viable concept of validity in command inference, so that the logical relationships among commands can be studied with something of the rigour to which one is accustomed in other branches of logic.
Originally published in 1931. This inquiry investigates and develops John Cook Wilson's view of the province of logic. It bases the study on the posthumous collected papers Statement and Inference. The author seeks to answer questions on the nature of logic using Cook Wilson's thought. The chapters introduce and consider topics from metaphysics to grammar and from psychology to knowledge. An early conception of logic in the sciences and presenting the work of an important twentieth century philosopher, this is an engaging work.
Originally published in 1937. A short account of the traditional logic, intended to provide the student with the fundamentals necessary for the specialized study. Suitable for working through individualy, it will provide sufficient knowledge of the elements of the subject to understand materials on more advanced and specialized topics. This is an interesting historic perspective on this area of philosophy and mathematics.
Proof techniques in cryptography are very difficult to understand, even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proofs of the cryptographic schemes, practical aspects of them have received comparatively less attention. This book addresses these two issues by providing detailed, structured proofs and demonstrating examples, applications and implementations of the schemes, so that students and practitioners may obtain a practical view of the schemes. Seong Oun Hwang is a professor in the Department of Computer Engineering and director of Artificial Intelligence Security Research Center, Gachon University, Korea. He received the Ph.D. degree in computer science from the Korea Advanced Institute of Science and Technology (KAIST), Korea. His research interests include cryptography, cybersecurity, networks, and machine learning. Intae Kim is an associate research fellow at the Institute of Cybersecurity and Cryptology, University of Wollongong, Australia. He received the Ph.D. degree in electronics and computer engineering from Hongik University, Korea. His research interests include cryptography, cybersecurity, and networks. Wai Kong Lee is an assistant professor in UTAR (University Tunku Abdul Rahman), Malaysia. He received the Ph.D. degree in engineering from UTAR, Malaysia. In between 2009 - 2012, he served as an R&D engineer in several multinational companies including Agilent Technologies (now known as Keysight) in Malaysia. His research interests include cryptography engineering, GPU computing, numerical algorithms, Internet of Things (IoT) and energy harvesting.
Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.
Iterative processes are the tools used to generate sequences approximating solutions of equations describing real life problems. Intended for researchers in computational sciences and as a reference book for advanced computational method in nonlinear analysis, this book is a collection of the recent results on the convergence analysis of numerical algorithms in both finite-dimensional and infinite-dimensional spaces and presents several applications and connections with fixed point theory. It contains an abundant and updated bibliography and provides comparisons between various investigations made in recent years in the field of computational nonlinear analysis. The book also provides recent advancements in the study of iterative procedures and can be used as a source to obtain the proper method to use in order to solve a problem. The book assumes a basic background in Mathematical Statistics, Linear Algebra and Numerical Analysis and may be used as a self-study reference or as a supplementary text for an advanced course in Biosciences or Applied Sciences. Moreover, the newest techniques used to study the dynamics of iterative methods are described and used in the book and they are compared with the classical ones.
A comprehensive work in finite-value systems that covers the latest achievements using the semi-tensor product method, on various kinds of finite-value systems. These results occupy the highest position in the analysis and control of this field. It not only covers all aspects of research in finite-value systems, but also presents the mathematical derivation for each conclusion in depth. The book contains examples to provide a better understanding of the practical applications of finite-value systems. It will serve as a textbook for graduate students of Cybernetics, Mathematical, and Biology, and a reference for readers interested in the theory of finite-value systems.
Most coding theory experts date the origin of the subject with the 1948 publication of A Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has grown into a discipline with many practical applications (antennas, networks, memories), requiring various mathematical techniques, from commutative algebra, to semi-definite programming, to algebraic geometry. Most topics covered in the Concise Encyclopedia of Coding Theory are presented in short sections at an introductory level and progress from basic to advanced level, with definitions, examples, and many references. The book is divided into three parts: Part I fundamentals: cyclic codes, skew cyclic codes, quasi-cyclic codes, self-dual codes, codes and designs, codes over rings, convolutional codes, performance bounds Part II families: AG codes, group algebra codes, few-weight codes, Boolean function codes, codes over graphs Part III applications: alternative metrics, algorithmic techniques, interpolation decoding, pseudo-random sequences, lattices, quantum coding, space-time codes, network coding, distributed storage, secret-sharing, and code-based-cryptography. Features Suitable for students and researchers in a wide range of mathematical disciplines Contains many examples and references Most topics take the reader to the frontiers of research
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested. In the research side, this book presents a novel approach for trend analysis that can be applied to any technology or research area. In this method, a text mining tool is used which extracts 1020 keywords from the titles of the sample papers. Then, a classifying tool classifies the keywords into 295 meaningful research topics. The popularity of each topic is then numerically measured and analyzed over the course of time through a statistical analysis on the number of research papers related to the topic as well as the number of their citations. The authors identify the most popular topics in four different domains; over the history of PUFs, during the recent years, in top conferences, and in top journals. The results are used to present an evolution study as well as a trend analysis and develop a roadmap for future research in this area. This method gives an automatic popularity-based statistical trend analysis which eliminates the need for passing personal judgments about the direction of trends, and provides concrete evidence to the future direction of research on PUFs. Another advantage of this method is the possibility of studying a whole lot of existing research works (more than 700 in this book). This book will appeal to researchers in text mining, cryptography, hardware security, and IoT.
Mathematical Labyrinths. Pathfinding provides an overview of various non-standard problems and the approaches to their solutions. The essential idea is a framework laid upon the reader on how to solve nonconventional problems - particularly in the realm of mathematics and logic. It goes over the key steps in approaching a difficult problem, contemplating a plan for its solution, and discusses set of mental models to solve math problems.The book is not a routine set of problems. It is rather an entertaining and educational journey into the fascinating world of mathematical reasoning and logic. It is about finding the best path to a solution depending on the information given, asking and answering the right questions, analyzing and comparing alternative approaches to problem solving, searching for generalizations and inventing new problems. It also considers as an important pedagogical tool playing mathematical and logical games, deciphering mathematical sophisms, and interpreting mathematical paradoxes.It is suitable for mathematically talented and curious students in the age range 10-20. There are many 'Eureka'- type, out of the ordinary, fun problems that require bright idea and insight. These intriguing and thought-provoking brainteasers and logic puzzles should be enjoyable by the audience of almost any age group, from 6-year-old children to 80-year-old and older adults.
Mathematical Labyrinths. Pathfinding provides an overview of various non-standard problems and the approaches to their solutions. The essential idea is a framework laid upon the reader on how to solve nonconventional problems - particularly in the realm of mathematics and logic. It goes over the key steps in approaching a difficult problem, contemplating a plan for its solution, and discusses set of mental models to solve math problems.The book is not a routine set of problems. It is rather an entertaining and educational journey into the fascinating world of mathematical reasoning and logic. It is about finding the best path to a solution depending on the information given, asking and answering the right questions, analyzing and comparing alternative approaches to problem solving, searching for generalizations and inventing new problems. It also considers as an important pedagogical tool playing mathematical and logical games, deciphering mathematical sophisms, and interpreting mathematical paradoxes.It is suitable for mathematically talented and curious students in the age range 10-20. There are many 'Eureka'- type, out of the ordinary, fun problems that require bright idea and insight. These intriguing and thought-provoking brainteasers and logic puzzles should be enjoyable by the audience of almost any age group, from 6-year-old children to 80-year-old and older adults.
The present book aims to provide systematic and reliable techniques, called the global solution, for Sudoku puzzles. Any proper Sudoku puzzle, which has one and only one solution of Sudoku, can be solved by anyone following the techniques provided in this book. Specific symbols are introduced to express the 6 basic rules of the Sudoku global solution, as the results, those Sudoku solving techniques are presented similar to the annotations in chess. Finnish mathematician Arto Inkala proposed 'the most difficult Sudoku puzzle' in 2007. Then, he designed another difficult Sudoku puzzle in 2012, named 'the thing Everest'. In the present book the solving process of those two difficult Sudoku puzzles are illustrated reliably by the specific symbols of the global solution step by step.
College students struggle with the switch from thinking of mathematics as a calculation based subject to a problem solving based subject. This book describes how the introduction to proofs course can be taught in a way that gently introduces students to this new way of thinking. This introduction utilizes recent research in neuroscience regarding how the brain learns best. Rather than jumping right into proofs, students are first taught how to change their mindset about learning, how to persevere through difficult problems, how to work successfully in a group, and how to reflect on their learning. With these tools in place, students then learn logic and problem solving as a further foundation.Next various proof techniques such as direct proofs, proof by contraposition, proof by contradiction, and mathematical induction are introduced. These proof techniques are introduced using the context of number theory. The last chapter uses Calculus as a way for students to apply the proof techniques they have learned.
College students struggle with the switch from thinking of mathematics as a calculation based subject to a problem solving based subject. This book describes how the introduction to proofs course can be taught in a way that gently introduces students to this new way of thinking. This introduction utilizes recent research in neuroscience regarding how the brain learns best. Rather than jumping right into proofs, students are first taught how to change their mindset about learning, how to persevere through difficult problems, how to work successfully in a group, and how to reflect on their learning. With these tools in place, students then learn logic and problem solving as a further foundation.Next various proof techniques such as direct proofs, proof by contraposition, proof by contradiction, and mathematical induction are introduced. These proof techniques are introduced using the context of number theory. The last chapter uses Calculus as a way for students to apply the proof techniques they have learned.
Reviews of the first edition: ..".Gerstein wants-very gently-to teach his students to think. He wants to show them how to wrestle with a problem (one that is more sophisticated than "plug and chug"), how to build a solution, and ultimately he wants to teach the students to take a statement and develop a way to prove it...Gerstein writes with a certain flair that I think students will find appealing. For instance, after his discussion of cardinals he has a section entitled Languages and Finite Automata. This allows him to illustrate some of the ideas he has been discussing with problems that almost anyone can understand, but most importantly he shows how these rather transparent problems can be subjected to a mathematical analysis. His discussion of how a machine might determine whether the sequence of words "Celui fromage de la parce que maintenant" is a legitimate French sentence is just delightful (and even more so if one knows a little French.)...I am confident that a student who works through Gerstein's book will really come away with (i) some mathematical technique, and (ii) some mathematical knowledge. -Steven Krantz, American Mathematical Monthly "This very elementary book is intended to be a textbook for a one-term course which introduces students into the basic notions of any higher mathematics courses...The explanations of the basic notions are combined with some main theorems, illustrated by examples (with solutions if necessary) and complemented by exercises. The book is well written and should be easily understandable to any beginning student." -S. Gottwald, Zentralblatt This textbook is intended for a one-term course whose goal is to ease the transition from lower-division calculus courses to upper-division courses in linear and abstract algebra, real and complex analysis, number theory, topology, combinatorics, etc. It contains a wide-ranging assortment of examples and imagery to motivate and to enhance the underlying intuitions, as well as numerous exercises and a solutions manual for professors. The new material in this second edition includes four more topics in number theory, a brief introduction to complex numbers, and a section on graph theory and combinatorial topics related to graphs. Introducing these additional topics gives the reader an even broader view of the mathematical experience.
The second volume, which assumes familiarity with the material in the first, introduces important classes of categories that have played a fundamental role in the subject's development and applications. In addition, after several chapters discussing specific categories, the book develops all the major concepts concerning Benabou's ideas of fibered categories.
Originally published in 1966. This is a self-instructional course intended for first-year university students who have not had previous acquaintance with Logic. The book deals with "propositional" logic by the truth-table method, briefly introducing axiomatic procedures, and proceeds to the theory of the syllogism, the logic of one-place predicates, and elementary parts of the logic of many-place predicates. Revision material is provided covering the main parts of the course. The course represents from eight to twenty hours work. depending on the student's speed of work and on whether optional chapters are taken.
Innovative Teaching: Best Practices from Business and Beyond for Mathematics Teachers provides educators with new and exciting ways to introduce material and methods to motivate and engage students by showing how some of the techniques commonly used in the business world - and beyond - are applicable to the world of education. It also offers educators practical advice with regard to the changing culture of education, keeping up with technology, navigating politics at work, interacting with colleagues, developing leadership skills, group behavior, and gender differences.Innovative Teaching demonstrates how the classroom environment is similar to the marketplace. Educators, like businesses, for example, must capture and hold the attention of their audience while competing with a constant stream of 'noise.' With the introduction of the Internet and the wide use of social media, promoters understand that they must not only engage their audience, but also incorporate audience feedback into the promotional work and product or service they offer. Innovative Teaching shows educators how to take the best practices from business - and beyond - and recombine these resources for appropriate use in the classroom.
Metaheuristic optimization is a higher-level procedure or heuristic designed to find, generate, or select a heuristic (partial search algorithm) that may provide a sufficiently good solution to an optimization problem, especially with incomplete or imperfect information or limited computation capacity. This is usually applied when two or more objectives are to be optimized simultaneously. This book is presented with two major objectives. Firstly, it features chapters by eminent researchers in the field providing the readers about the current status of the subject. Secondly, algorithm-based optimization or advanced optimization techniques, which are applied to mostly non-engineering problems, are applied to engineering problems. This book will also serve as an aid to both research and industry. Usage of these methodologies would enable the improvement in engineering and manufacturing technology and support an organization in this era of low product life cycle. Features: Covers the application of recent and new algorithms Focuses on the development aspects such as including surrogate modeling, parallelization, game theory, and hybridization Presents the advances of engineering applications for both single-objective and multi-objective optimization problems Offers recent developments from a variety of engineering fields Discusses Optimization using Evolutionary Algorithms and Metaheuristics applications in engineering
This book contains fundamental concepts on discrete mathematical structures in an easy to understand style so that the reader can grasp the contents and explanation easily. The concepts of discrete mathematical structures have application to computer science, engineering and information technology including in coding techniques, switching circuits, pointers and linked allocation, error corrections, as well as in data networking, Chemistry, Biology and many other scientific areas. The book is for undergraduate and graduate levels learners and educators associated with various courses and progammes in Mathematics, Computer Science, Engineering and Information Technology. The book should serve as a text and reference guide to many undergraduate and graduate programmes offered by many institutions including colleges and universities. Readers will find solved examples and end of chapter exercises to enhance reader comprehension. Features Offers comprehensive coverage of basic ideas of Logic, Mathematical Induction, Graph Theory, Algebraic Structures and Lattices and Boolean Algebra Provides end of chapter solved examples and practice problems Delivers materials on valid arguments and rules of inference with illustrations Focuses on algebraic structures to enable the reader to work with discrete structures |
You may like...
The New Method Arithmetic [microform]
P (Phineas) McIntosh, C a (Carl Adolph) B 1879 Norman
Hardcover
R921
Discovery Miles 9 210
Logic from Russell to Church, Volume 5
Dov M. Gabbay, John Woods
Hardcover
R5,271
Discovery Miles 52 710
Elementary Lessons in Logic - Deductive…
William Stanley Jevons
Paperback
R569
Discovery Miles 5 690
From Quantum Information to Musical…
Maria Luisa Dalla Chiara, Roberto Giuntini, …
Paperback
R522
Discovery Miles 5 220
|