![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Science & Mathematics > Mathematics > Mathematical foundations
A comprehensive work in finite-value systems that covers the latest achievements using the semi-tensor product method, on various kinds of finite-value systems. These results occupy the highest position in the analysis and control of this field. It not only covers all aspects of research in finite-value systems, but also presents the mathematical derivation for each conclusion in depth. The book contains examples to provide a better understanding of the practical applications of finite-value systems. It will serve as a textbook for graduate students of Cybernetics, Mathematical, and Biology, and a reference for readers interested in the theory of finite-value systems.
Iterative processes are the tools used to generate sequences approximating solutions of equations describing real life problems. Intended for researchers in computational sciences and as a reference book for advanced computational method in nonlinear analysis, this book is a collection of the recent results on the convergence analysis of numerical algorithms in both finite-dimensional and infinite-dimensional spaces and presents several applications and connections with fixed point theory. It contains an abundant and updated bibliography and provides comparisons between various investigations made in recent years in the field of computational nonlinear analysis. The book also provides recent advancements in the study of iterative procedures and can be used as a source to obtain the proper method to use in order to solve a problem. The book assumes a basic background in Mathematical Statistics, Linear Algebra and Numerical Analysis and may be used as a self-study reference or as a supplementary text for an advanced course in Biosciences or Applied Sciences. Moreover, the newest techniques used to study the dynamics of iterative methods are described and used in the book and they are compared with the classical ones.
Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.
Most coding theory experts date the origin of the subject with the 1948 publication of A Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has grown into a discipline with many practical applications (antennas, networks, memories), requiring various mathematical techniques, from commutative algebra, to semi-definite programming, to algebraic geometry. Most topics covered in the Concise Encyclopedia of Coding Theory are presented in short sections at an introductory level and progress from basic to advanced level, with definitions, examples, and many references. The book is divided into three parts: Part I fundamentals: cyclic codes, skew cyclic codes, quasi-cyclic codes, self-dual codes, codes and designs, codes over rings, convolutional codes, performance bounds Part II families: AG codes, group algebra codes, few-weight codes, Boolean function codes, codes over graphs Part III applications: alternative metrics, algorithmic techniques, interpolation decoding, pseudo-random sequences, lattices, quantum coding, space-time codes, network coding, distributed storage, secret-sharing, and code-based-cryptography. Features Suitable for students and researchers in a wide range of mathematical disciplines Contains many examples and references Most topics take the reader to the frontiers of research
Mathematical Labyrinths. Pathfinding provides an overview of various non-standard problems and the approaches to their solutions. The essential idea is a framework laid upon the reader on how to solve nonconventional problems - particularly in the realm of mathematics and logic. It goes over the key steps in approaching a difficult problem, contemplating a plan for its solution, and discusses set of mental models to solve math problems.The book is not a routine set of problems. It is rather an entertaining and educational journey into the fascinating world of mathematical reasoning and logic. It is about finding the best path to a solution depending on the information given, asking and answering the right questions, analyzing and comparing alternative approaches to problem solving, searching for generalizations and inventing new problems. It also considers as an important pedagogical tool playing mathematical and logical games, deciphering mathematical sophisms, and interpreting mathematical paradoxes.It is suitable for mathematically talented and curious students in the age range 10-20. There are many 'Eureka'- type, out of the ordinary, fun problems that require bright idea and insight. These intriguing and thought-provoking brainteasers and logic puzzles should be enjoyable by the audience of almost any age group, from 6-year-old children to 80-year-old and older adults.
Mathematical Labyrinths. Pathfinding provides an overview of various non-standard problems and the approaches to their solutions. The essential idea is a framework laid upon the reader on how to solve nonconventional problems - particularly in the realm of mathematics and logic. It goes over the key steps in approaching a difficult problem, contemplating a plan for its solution, and discusses set of mental models to solve math problems.The book is not a routine set of problems. It is rather an entertaining and educational journey into the fascinating world of mathematical reasoning and logic. It is about finding the best path to a solution depending on the information given, asking and answering the right questions, analyzing and comparing alternative approaches to problem solving, searching for generalizations and inventing new problems. It also considers as an important pedagogical tool playing mathematical and logical games, deciphering mathematical sophisms, and interpreting mathematical paradoxes.It is suitable for mathematically talented and curious students in the age range 10-20. There are many 'Eureka'- type, out of the ordinary, fun problems that require bright idea and insight. These intriguing and thought-provoking brainteasers and logic puzzles should be enjoyable by the audience of almost any age group, from 6-year-old children to 80-year-old and older adults.
The present book aims to provide systematic and reliable techniques, called the global solution, for Sudoku puzzles. Any proper Sudoku puzzle, which has one and only one solution of Sudoku, can be solved by anyone following the techniques provided in this book. Specific symbols are introduced to express the 6 basic rules of the Sudoku global solution, as the results, those Sudoku solving techniques are presented similar to the annotations in chess. Finnish mathematician Arto Inkala proposed 'the most difficult Sudoku puzzle' in 2007. Then, he designed another difficult Sudoku puzzle in 2012, named 'the thing Everest'. In the present book the solving process of those two difficult Sudoku puzzles are illustrated reliably by the specific symbols of the global solution step by step.
College students struggle with the switch from thinking of mathematics as a calculation based subject to a problem solving based subject. This book describes how the introduction to proofs course can be taught in a way that gently introduces students to this new way of thinking. This introduction utilizes recent research in neuroscience regarding how the brain learns best. Rather than jumping right into proofs, students are first taught how to change their mindset about learning, how to persevere through difficult problems, how to work successfully in a group, and how to reflect on their learning. With these tools in place, students then learn logic and problem solving as a further foundation.Next various proof techniques such as direct proofs, proof by contraposition, proof by contradiction, and mathematical induction are introduced. These proof techniques are introduced using the context of number theory. The last chapter uses Calculus as a way for students to apply the proof techniques they have learned.
College students struggle with the switch from thinking of mathematics as a calculation based subject to a problem solving based subject. This book describes how the introduction to proofs course can be taught in a way that gently introduces students to this new way of thinking. This introduction utilizes recent research in neuroscience regarding how the brain learns best. Rather than jumping right into proofs, students are first taught how to change their mindset about learning, how to persevere through difficult problems, how to work successfully in a group, and how to reflect on their learning. With these tools in place, students then learn logic and problem solving as a further foundation.Next various proof techniques such as direct proofs, proof by contraposition, proof by contradiction, and mathematical induction are introduced. These proof techniques are introduced using the context of number theory. The last chapter uses Calculus as a way for students to apply the proof techniques they have learned.
The second volume, which assumes familiarity with the material in the first, introduces important classes of categories that have played a fundamental role in the subject's development and applications. In addition, after several chapters discussing specific categories, the book develops all the major concepts concerning Benabou's ideas of fibered categories.
Originally published in 1966. This is a self-instructional course intended for first-year university students who have not had previous acquaintance with Logic. The book deals with "propositional" logic by the truth-table method, briefly introducing axiomatic procedures, and proceeds to the theory of the syllogism, the logic of one-place predicates, and elementary parts of the logic of many-place predicates. Revision material is provided covering the main parts of the course. The course represents from eight to twenty hours work. depending on the student's speed of work and on whether optional chapters are taken.
Originally published in 1934. This fourth edition originally published 1954., revised by C. W. K. Mundle. "It must be the desire of every reasonable person to know how to justify a contention which is of sufficient importance to be seriously questioned. The explicit formulation of the principles of sound reasoning is the concern of Logic". This book discusses the habit of sound reasoning which is acquired by consciously attending to the logical principles of sound reasoning, in order to apply them to test the soundness of arguments. It isn't an introduction to logic but it encourages the practice of logic, of deciding whether reasons in argument are sound or unsound. Stress is laid upon the importance of considering language, which is a key instrument of our thinking and is imperfect.
A survey of the philosophical implications and practical applications of fuzzy systems Fuzzy mathematical concepts such as fuzzy sets, fuzzy logic, and similarity relations represent one of the most exciting currents in modern engineering and have great potential in applications ranging from control theory to bioinformatics. Data Engineering guides the reader through a number of concepts interconnected by fuzzy mathematics and discusses these concepts from a systems engineering perspective to showcase the continuing vitality, attractiveness, and applicability of fuzzy mathematics. The author discusses the fundamental aspects of data analysis, systems modeling, and uncertainty calculi. He avoids a narrow discussion of specialized methodologies and takes a holistic view of the nature and application of fuzzy systems, considering principles, paradigms, and methodologies along the way. This broad coverage includes:
In the important emerging field of bioinformatics, the book sets out how to encode a natural system in mathematical models, describes methods to identify interrelationships and interactions from data, and thereby helps the practitioner to decide which variables to measure and why. Data Engineering serves as an up-to-date and informative survey of the theoretical and practical tools for analyzing complex systems. It offers a unique treatment of complex issues that is accessible to students and researchers from a variety of backgrounds.
Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools-definitions, usage, and analysis-that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.
This volume presents some exciting new developments occurring on the interface between set theory and computability as well as their applications in algebra, analysis and topology. These include effective versions of Borel equivalence, Borel reducibility and Borel determinacy. It also covers algorithmic randomness and dimension, Ramsey sets and Ramsey spaces. Many of these topics are being discussed in the NSF-supported annual Southeastern Logic Symposium.
This accessible book helps readers to see the bigger picture of advanced mathematics. The book contains carefully selected, challenging problems in an easy-to-follow, step-by-step process. Neither prior preparation nor any mathematical sophistication is required. The authors guide the reader to "train their brain" to think and express themselves in a rigorous, mathematical way, and to extract facts, analyze the problem, and identify main challenges. A firm foundation in a diverse range of topics is presented. Moreover, the authors show how to draw appropriate, true conclusions. Computer support is used to better intuition into discussed problems. The book is designed for self-study. It can be used to bridge the gap between introductory calculus/linear algebra courses and more advanced courses offered at universities. It improves the ability to read, write, and think in a rigorous, mature mathematical fashion. The reader will develop a deeper understanding in preparation to succeed in more advanced course work. Features *The authors employ a six-step process: 1.SOURCE 2.PROBLEM 3.THEORY 4.SOLUTION 5.REMARK 6.EXERCISES *An Appendix introduces programming in Julia This book is also suitable for high school students that are interested in competing in math competitions or simply for people of all ages and backgrounds who want to expand their knowledge and to challenge themselves with interesting questions.
The crypto wars have raged for half a century. In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned encryption would not only prevent surveillance of law-abiding citizens, but of criminals, terrorists, and foreign spies, ushering in a rival dystopian future. Both parties fought to defend the citizenry from what they believed the most perilous threats. The government tried to control encryption to preserve its surveillance capabilities; privacy activists armed citizens with cryptographic tools and challenged encryption regulations in the courts. No clear victor has emerged from the crypto wars. Governments have failed to forge a framework to govern the, at times conflicting, civil liberties of privacy and security in the digital age-an age when such liberties have an outsized influence on the citizen-State power balance. Solving this problem is more urgent than ever. Digital privacy will be one of the most important factors in how we architect twenty-first century societies-its management is paramount to our stewardship of democracy for future generations. We must elevate the quality of debate on cryptography, on how we govern security and privacy in our technology-infused world. Failure to end the crypto wars will result in societies sleepwalking into a future where the citizen-State power balance is determined by a twentieth-century status quo unfit for this century, endangering both our privacy and security. This book provides a history of the crypto wars, with the hope its chronicling sets a foundation for peace.
This book presents a set of historical recollections on the work of Martin Davis and his role in advancing our understanding of the connections between logic, computing, and unsolvability. The individual contributions touch on most of the core aspects of Davis' work and set it in a contemporary context. They analyse, discuss and develop many of the ideas and concepts that Davis put forward, including such issues as contemporary satisfiability solvers, essential unification, quantum computing and generalisations of Hilbert's tenth problem. The book starts out with a scientific autobiography by Davis, and ends with his responses to comments included in the contributions. In addition, it includes two previously unpublished original historical papers in which Davis and Putnam investigate the decidable and the undecidable side of Logic, as well as a full bibliography of Davis' work. As a whole, this book shows how Davis' scientific work lies at the intersection of computability, theoretical computer science, foundations of mathematics, and philosophy, and draws its unifying vision from his deep involvement in Logic.
Alfred Tarski (1901-1983) was a renowned Polish/American mathematician, a giant of the twentieth century, who helped establish the foundations of geometry, set theory, model theory, algebraic logic and universal algebra. Throughout his career, he taught mathematics and logic at universities and sometimes in secondary schools. Many of his writings before 1939 were in Polish and remained inaccessible to most mathematicians and historians until now. This self-contained book focuses on Tarski's early contributions to geometry and mathematics education, including the famous Banach-Tarski paradoxical decomposition of a sphere as well as high-school mathematical topics and pedagogy. These themes are significant since Tarski's later research on geometry and its foundations stemmed in part from his early employment as a high-school mathematics teacher and teacher-trainer. The book contains careful translations and much newly uncovered social background of these works written during Tarski's years in Poland. Alfred Tarski: Early Work in Poland serves the mathematical, educational, philosophical and historical communities by publishing Tarski's early writings in a broadly accessible form, providing background from archival work in Poland and updating Tarski's bibliography. A list of errata can be found on the author Smith's personal webpage.
Proofs 101: An Introduction to Formal Mathematics serves as an introduction to proofs for mathematics majors who have completed the calculus sequence (at least Calculus I and II) and a first course in linear algebra. The book prepares students for the proofs they will need to analyze and write the axiomatic nature of mathematics and the rigors of upper-level mathematics courses. Basic number theory, relations, functions, cardinality, and set theory will provide the material for the proofs and lay the foundation for a deeper understanding of mathematics, which students will need to carry with them throughout their future studies. Features Designed to be teachable across a single semester Suitable as an undergraduate textbook for Introduction to Proofs or Transition to Advanced Mathematics courses Offers a balanced variety of easy, moderate, and difficult exercises
Proofs 101: An Introduction to Formal Mathematics serves as an introduction to proofs for mathematics majors who have completed the calculus sequence (at least Calculus I and II) and a first course in linear algebra. The book prepares students for the proofs they will need to analyze and write the axiomatic nature of mathematics and the rigors of upper-level mathematics courses. Basic number theory, relations, functions, cardinality, and set theory will provide the material for the proofs and lay the foundation for a deeper understanding of mathematics, which students will need to carry with them throughout their future studies. Features Designed to be teachable across a single semester Suitable as an undergraduate textbook for Introduction to Proofs or Transition to Advanced Mathematics courses Offers a balanced variety of easy, moderate, and difficult exercises
There are thousands of books relating to poker, blackjack, roulette and baccarat, including strategy guides, statistical analysis, psychological studies, and much more. However, there are no books on Pell, Rouleno, Street Dice, and many other games that have had a short life in casinos! While this is understandable - most casino gamblers have not heard of these games, and no one is currently playing them - their absence from published works means that some interesting mathematics and gaming history are at risk of being lost forever. Table games other than baccarat, blackjack, craps, and roulette are called carnival games, as a nod to their origin in actual traveling or seasonal carnivals. Mathematics of Casino Carnival Games is a focused look at these games and the mathematics at their foundation. Features * Exercises, with solutions, are included for readers who wish to practice the ideas presented * Suitable for a general audience with an interest in the mathematics of gambling and games * Goes beyond providing practical 'tips' for gamblers, and explores the mathematical principles that underpin gambling games
This is the first book to introduce Green-function-based multiscale theory and the corresponding finite element method, which are readily applicable to composites and random media. The methodology is considered to be the one that most effectively tackles the uncertainty of stress propagation in complex heterogeneities of random media, and which presents multiscale theory from distinctive scale separation and scale-coupling viewpoints. Deliberately taking a multiscale perspective, it covers scale separation and then scale coupling. Both micromechanics and novel scale-coupling mechanics are described in relation to variational principles and bounds, as well as in the emerging topics on percolation and scale-coupling computation. It gives detail on the different bounds encountered, covering classical second and third order, new fourth order, and innovative ellipsoidal variations. Green-function-based multiscale theory is addressed to applications in solid mechanics and transport of complex media ranging from micro- and nano-composites, polycrystals, soils, rocks, cementitious materials, to biological materials. It is useful as a graduate textbook in civil and mechanical engineering and as a reference.
Model theory is one of the central branches of mathematical logic. The field has evolved rapidly in the last few decades. This book is an introduction to current trends in model theory, and contains a collection of articles authored by top researchers in the field. It is intended as a reference for students as well as senior researchers.
This textbook provides an accessible and concise introduction to numerical analysis for upper undergraduate and beginning graduate students from various backgrounds. It was developed from the lecture notes of four successful courses on numerical analysis taught within the MPhil of Scientific Computing at the University of Cambridge. The book is easily accessible, even to those with limited knowledge of mathematics. Students will get a concise, but thorough introduction to numerical analysis. In addition the algorithmic principles are emphasized to encourage a deeper understanding of why an algorithm is suitable, and sometimes unsuitable, for a particular problem. A Concise Introduction to Numerical Analysis strikes a balance between being mathematically comprehensive, but not overwhelming with mathematical detail. In some places where further detail was felt to be out of scope of the book, the reader is referred to further reading. The book uses MATLAB (R) implementations to demonstrate the workings of the method and thus MATLAB's own implementations are avoided, unless they are used as building blocks of an algorithm. In some cases the listings are printed in the book, but all are available online on the book's page at www.crcpress.com. Most implementations are in the form of functions returning the outcome of the algorithm. Also, examples for the use of the functions are given. Exercises are included in line with the text where appropriate, and each chapter ends with a selection of revision exercises. Solutions to odd-numbered exercises are also provided on the book's page at www.crcpress.com. This textbook is also an ideal resource for graduate students coming from other subjects who will use numerical techniques extensively in their graduate studies. |
You may like...
Logic from Russell to Church, Volume 5
Dov M. Gabbay, John Woods
Hardcover
R5,271
Discovery Miles 52 710
Elementary Lessons in Logic - Deductive…
William Stanley Jevons
Paperback
R569
Discovery Miles 5 690
From Quantum Information to Musical…
Maria Luisa Dalla Chiara, Roberto Giuntini, …
Paperback
R522
Discovery Miles 5 220
|