![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Science & Mathematics > Mathematics > Mathematical foundations > Mathematical logic
Cantor's ideas formed the basis for set theory and also for the mathematical treatment of the concept of infinity. The philosophical and heuristic framework he developed had a lasting effect on modern mathematics, and is the recurrent theme of this volume. Hallett explores Cantor's ideas and, in particular, their ramifications for Zermelo-Frankel set theory.
Already in just a decade of existence, cryptocurrencies have been the world's best-performing financial asset, outperforming stocks, bonds, commodities and currencies. This comprehensive yet concise book will enable the reader to learn about the nuts and bolts of cryptocurrencies, including their history, technology, regulations and economics. Additionally, this book teaches sound investment strategies that already work along with the spectrum of risks and returns. This book provides a plain-language primer for beginners worldwide on how to confidently navigate the rapidly evolving world of cryptocurrencies. Beginning by cutting to the chase, the author lists the common burning questions about cryptocurrency and provides succinct answers. Next, he gives an overview of cryptocurrency's underlying technology: blockchain. He then explores the history of cryptocurrency and why it's attracted so much attention. With that foundation, readers will be ready to understand how to invest in cryptocurrency: how cryptocurrency differs from traditional investments such as stocks, how to decide which cryptocurrency to invest in, how to acquire it, how to send and receive it, along with investment strategies. Additionally, legal issues, social implications, cybersecurity risks and the vocabulary of cryptocurrency are also covered, including Bitcoin and the many alternative cryptocurrencies. Written by a journalist-turned-professor, this book's appeal lies in its succinct, informative and easy-to-understand style. It will be of great interest to anyone looking to further their understanding of what cryptocurrency is, why it's a big deal, how to acquire it, how to send and receive it, and investment strategies.
First published in 1982, this reissue contains a critical exposition of the views of Frege, Dedekind and Peano on the foundations of arithmetic. The last quarter of the 19th century witnessed a remarkable growth of interest in the foundations of arithmetic. This work analyses both the reasons for this growth of interest within both mathematics and philosophy and the ways in which this study of the foundations of arithmetic led to new insights in philosophy and striking advances in logic. This historical-critical study provides an excellent introduction to the problems of the philosophy of mathematics - problems which have wide implications for philosophy as a whole. This reissue will appeal to students of both mathematics and philosophy who wish to improve their knowledge of logic.
Is college worth the cost? Should I worry about arsenic in my rice? Can we recycle pollution? Real questions of personal finance, public health, and social policy require sober, data-driven analyses. This unique text provides students with the tools of quantitative reasoning to answer such questions. The text models how to clarify the question, recognize and avoid bias, isolate relevant factors, gather data, and construct numerical analyses for interpretation. Themes and techniques are repeated across chapters, with a progression in mathematical sophistication over the course of the book, which helps the student get comfortable with the process of thinking in numbers. This textbook includes references to source materials and suggested further reading, making it user-friendly for motivated undergraduate students. The many detailed problems and worked solutions in the text and extensive appendices help the reader learn mathematical areas such as algebra, functions, graphs, and probability. End-of-chapter problem material provides practice for students, and suggested projects are provided with each chapter. A solutions manual is available online for instructors.
Proves that math can be serious fun! If you like any kind of game at all, you'll enjoy the amazing mathematical brainteasers in this entertaining book. No special mathematics training is needed. With an emphasis on puzzling word problems with surprising solutions, the author presents his mathematical hurdles in order of increasing difficulty. Many appear deceptively simple, such as: How many quarter-inch marks are on an unusual sixteen-inch ruler? Or: If the cost of a bottle and a cork is $1.10 and the bottle costs $1.00 more than the cork, how much did the bottle alone cost? Check the answers before you decide that these are too easy. You may be surprised. Novices may want to begin with some of the teasers in the first "easy" section. More experienced math-heads may want to test their wits with the "challenging" or even the "difficult" sections (some are fiendishly difficult). Including word problems by famed mathematical puzzle geniuses Sam Loyd (1841 - 1911) and Henry Ernest Dudeney (1857 - 1930), which have entertained recreational math aficionados for more than a century, this book has something for puzzle solvers at any level. And for the math phobic, it may whet your appetite to delve into a subject you thought could only be boring.
Proofs play a central role in advanced mathematics and theoretical computer science, yet many students struggle the first time they take a course in which proofs play a significant role. This bestselling text's third edition helps students transition from solving problems to proving theorems by teaching them the techniques needed to read and write proofs. Featuring over 150 new exercises and a new chapter on number theory, this new edition introduces students to the world of advanced mathematics through the mastery of proofs. The book begins with the basic concepts of logic and set theory to familiarize students with the language of mathematics and how it is interpreted. These concepts are used as the basis for an analysis of techniques that can be used to build up complex proofs step by step, using detailed 'scratch work' sections to expose the machinery of proofs about numbers, sets, relations, and functions. Assuming no background beyond standard high school mathematics, this book will be useful to anyone interested in logic and proofs: computer scientists, philosophers, linguists, and, of course, mathematicians.
The bestselling book that has helped millions of readers solve any problem. A must-have guide by eminent mathematician G. Polya, How to Solve It shows anyone in any field how to think straight. In lucid and appealing prose, Polya reveals how the mathematical method of demonstrating a proof or finding an unknown can help you attack any problem that can be reasoned out—from building a bridge to winning a game of anagrams. How to Solve It includes a heuristic dictionary with dozens of entries on how to make problems more manageable—from analogy and induction to the heuristic method of starting with a goal and working backward to something you already know. This disarmingly elementary book explains how to harness curiosity in the classroom, bring the inventive faculties of students into play, and experience the triumph of discovery. But it’s not just for the classroom. Generations of readers from all walks of life have relished Polya’s brilliantly deft instructions on stripping away irrelevancies and going straight to the heart of a problem.
This book is addressed primarily to researchers specializing in mathemat ical logic. It may also be of interest to students completing a Masters Degree in mathematics and desiring to embark on research in logic, as well as to teachers at universities and high schools, mathematicians in general, or philosophers wishing to gain a more rigorous conception of deductive reasoning. The material stems from lectures read from 1962 to 1968 at the Faculte des Sciences de Paris and since 1969 at the Universities of Provence and Paris-VI. The only prerequisites demanded of the reader are elementary combinatorial theory and set theory. We lay emphasis on the semantic aspect of logic rather than on syntax; in other words, we are concerned with the connection between formulas and the multirelations, or models, which satisfy them. In this context considerable importance attaches to the theory of relations, which yields a novel approach and algebraization of many concepts of logic. The present two-volume edition considerably widens the scope of the original French] one-volume edition (1967: Relation, Formule logique, Compacite, Completude). The new Volume 1 (1971: Relation et Formule logique) reproduces the old Chapters 1, 2, 3, 4, 5 and 8, redivided as follows: Word, formula (Chapter 1), Connection (Chapter 2), Relation, operator (Chapter 3), Free formula (Chapter 4), Logicalformula, denumer able-model theorem (L6wenheim-Skolem) (Chapter 5), Completeness theorem (G6del-Herbrand) and Interpolation theorem (Craig-Lyndon) (Chapter 6), Interpretability of relations (Chapter 7)."
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.
This book, Algebraic Computability and Enumeration Models: Recursion Theory and Descriptive Complexity, presents new techniques with functorial models to address important areas on pure mathematics and computability theory from the algebraic viewpoint. The reader is first introduced to categories and functorial models, with Kleene algebra examples for languages. Functorial models for Peano arithmetic are described toward important computational complexity areas on a Hilbert program, leading to computability with initial models. Infinite language categories are also introduced to explain descriptive complexity with recursive computability with admissible sets and urelements. Algebraic and categorical realizability is staged on several levels, addressing new computability questions with omitting types realizably. Further applications to computing with ultrafilters on sets and Turing degree computability are examined. Functorial models computability is presented with algebraic trees realizing intuitionistic types of models. New homotopy techniques are applied to Marin Lof types of computations with model categories. Functorial computability, induction, and recursion are examined in view of the above, presenting new computability techniques with monad transformations and projective sets. This informative volume will give readers a complete new feel for models, computability, recursion sets, complexity, and realizability. This book pulls together functorial thoughts, models, computability, sets, recursion, arithmetic hierarchy, filters, with real tree computing areas, presented in a very intuitive manner for university teaching, with exercises for every chapter. The book will also prove valuable for faculty in computer science and mathematics.
Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field. The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from these requirements. Focusing on these four kinds of cryptography, this volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied. The book provides vivid demonstrations of how modern cryptographic techniques can be used to solve security problems. The applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography. This volume is an essential resource for cryptographers and practitioners of network security, security researchers and engineers, and those responsible for designing and developing secure network systems.
This work is a sequel to the author's Gödel's Incompleteness Theorems, though it can be read independently by anyone familiar with Gödel's incompleteness theorem for Peano arithmetic. The book deals mainly with those aspects of recursion theory that have applications to the metamathematics of incompleteness, undecidability, and related topics. It is both an introduction to the theory and a presentation of new results in the field.
This authoritative biography of Kurt Goedel relates the life of this most important logician of our time to the development of the field. Goedel's seminal achievements that changed the perception and foundations of mathematics are explained in the context of his life from the turn of the century Austria to the Institute for Advanced Study in Princeton.
How strongly should you believe the various propositions that you
can express?
Finite-state methods are the most efficient mechanisms for analysing textual and symbolic data, providing elegant solutions for an immense number of practical problems in computational linguistics and computer science. This book for graduate students and researchers gives a complete coverage of the field, starting from a conceptual introduction and building to advanced topics and applications. The central finite-state technologies are introduced with mathematical rigour, ranging from simple finite-state automata to transducers and bimachines as 'input-output' devices. Special attention is given to the rich possibilities of simplifying, transforming and combining finite-state devices. All algorithms presented are accompanied by full correctness proofs and executable source code in a new programming language, C(M), which focuses on transparency of steps and simplicity of code. Thus, by enabling readers to obtain a deep formal understanding of the subject and to put finite-state methods to real use, this book closes the gap between theory and practice.
Formal languages are widely regarded as being above all mathematical objects and as producing a greater level of precision and technical complexity in logical investigations because of this. Yet defining formal languages exclusively in this way offers only a partial and limited explanation of the impact which their use (and the uses of formalisms more generally elsewhere) actually has. In this book, Catarina Dutilh Novaes adopts a much wider conception of formal languages so as to investigate more broadly what exactly is going on when theorists put these tools to use. She looks at the history and philosophy of formal languages and focuses on the cognitive impact of formal languages on human reasoning, drawing on their historical development, psychology, cognitive science and philosophy. Her wide-ranging study will be valuable for both students and researchers in philosophy, logic, psychology and cognitive and computer science.
Blockchain, Internet of Things, and Artificial Intelligence provides an integrated overview and technical description of the fundamental concepts of blockchain, IoT, and AI technologies. State-of-the-art techniques are explored in depth to discuss the challenges in each domain. The convergence of these revolutionized technologies has leveraged several areas that receive attention from academicians and industry professionals, which in turn promotes the book's accessibility more extensively. Discussions about an integrated perspective on the influence of blockchain, IoT, and AI for smart cities, healthcare, and other business sectors illuminate the benefits and opportunities in the ecosystems worldwide. The contributors have focused on real-world examples and applications and highlighted the significance of the strengths of blockchain to transform the readers' thinking toward finding potential solutions. The faster maturity and stability of blockchain is the key differentiator in artificial intelligence and the Internet of Things. This book discusses their potent combination in realizing intelligent systems, services, and environments. The contributors present their technical evaluations and comparisons with existing technologies. Theoretical explanations and experimental case studies related to real-time scenarios are also discussed. FEATURES Discusses the potential of blockchain to significantly increase data while boosting accuracy and integrity in IoT-generated data and AI-processed information Elucidates definitions, concepts, theories, and assumptions involved in smart contracts and distributed ledgers related to IoT systems and AI approaches Offers real-world uses of blockchain technologies in different IoT systems and further studies its influence in supply chains and logistics, the automotive industry, smart homes, the pharmaceutical industry, agriculture, and other areas Presents readers with ways of employing blockchain in IoT and AI, helping them to understand what they can and cannot do with blockchain Provides readers with an awareness of how industry can avoid some of the pitfalls of traditional data-sharing strategies This book is suitable for graduates, academics, researchers, IT professionals, and industry experts.
Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.
Computability theory is a branch of mathematical logic and computer science that has become increasingly relevant in recent years. The field has developed growing connections in diverse areas of mathematics, with applications in topology, group theory, and other subfields. In A Hierarchy of Turing Degrees, Rod Downey and Noam Greenberg introduce a new hierarchy that allows them to classify the combinatorics of constructions from many areas of computability theory, including algorithmic randomness, Turing degrees, effectively closed sets, and effective structure theory. This unifying hierarchy gives rise to new natural definability results for Turing degree classes, demonstrating how dynamic constructions become reflected in definability. Downey and Greenberg present numerous construction techniques involving high-level nonuniform arguments, and their self-contained work is appropriate for graduate students and researchers. Blending traditional and modern research results in computability theory, A Hierarchy of Turing Degrees establishes novel directions in the field. |
You may like...
Logic from Russell to Church, Volume 5
Dov M. Gabbay, John Woods
Hardcover
R5,271
Discovery Miles 52 710
Theory and Applications of…
Florentin Smarandache, Madeline Al-Tahan
Hardcover
R6,648
Discovery Miles 66 480
Elementary Lessons in Logic - Deductive…
William Stanley Jevons
Paperback
R569
Discovery Miles 5 690
|