![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Mathematical theory of computation
Congruences are ubiquitous in computer science, engineering, mathematics, and related areas. Developing techniques for finding (the number of) solutions of congruences is an important problem. But there are many scenarios in which we are interested in only a subset of the solutions; in other words, there are some restrictions. What do we know about these restricted congruences, their solutions, and applications? This book introduces the tools that are needed when working on restricted congruences and then systematically studies a variety of restricted congruences. Restricted Congruences in Computing defines several types of restricted congruence, obtains explicit formulae for the number of their solutions using a wide range of tools and techniques, and discusses their applications in cryptography, information security, information theory, coding theory, string theory, quantum field theory, parallel computing, artificial intelligence, computational biology, discrete mathematics, number theory, and more. This is the first book devoted to restricted congruences and their applications. It will be of interest to graduate students and researchers across computer science, electrical engineering, and mathematics.
This EMS volume consists of two parts, written by leading scientists in the field of operator algebras and non-commutative geometry. The first part, written by M.Rordam, is on Elliott's classification program for nuclear C*-algebras. The emphasis is on the work of Kirchberg and the spectacular results by Kirchberg and Phillips giving a nearly complete classification, in terms of K-theoretic invariants, in the purely infinite case. This part of the program is described with almost full proofs beginning with Kirchberg's tensor product theorems and Kirchberg's embedding theorem for exact C*-algebras. The classification of finite simple C*-algebras starting with AF-algebras, and continuing with AT- and AH-algebras is covered, but mostly without proofs. The second part, written by E.Stormer, is a survey of the theory of of noncommutative entropy of automorphisms of C*-algebras and von Neumann algebras from its initiation by Connes and Stormer in 1975 till 2001.
Automatic Differentiation (AD) is a maturing computational technology and has become a mainstream tool used by practicing scientists and computer engineers. The rapid advance of hardware computing power and AD tools has enabled practitioners to quickly generate derivative-enhanced versions of their code for a broad range of applications in applied research and development. "Automatic Differentiation of Algorithms" provides a comprehensive and authoritative survey of all recent developments, new techniques, and tools for AD use. The book covers all aspects of the subject: mathematics, scientific programming ( i.e., use of adjoints in optimization) and implementation (i.e., memory management problems). A strong theme of the book is the relationships between AD tools and other software tools, such as compilers and parallelizers. A rich variety of significant applications are presented as well, including optimum-shape design problems, for which AD offers more efficient tools and techniques. Topics and features: * helpful introductory AD survey chapter for brief overview of the field *extensive applications chapters, i.e., for circuit simulation, optimization and optimal-control shape design, structural mechanics, and multibody dynamical systems modeling *comprehensive bibliography for all current literature and results for the field *performance issues *optimal control sensitivity analysis *AD use with object oriented software tool kits The book is an ideal and accessible survey of recent developments and applications of AD tools and techniques for a broad scientific computing and computer engineering readership. Practitioners, professionals, and advanced graduates working in AD development will find the book a useful reference and essential resource for their work.
This book is dedicated to the work of Alasdair Urquhart. The book starts out with an introduction to and an overview of Urquhart's work, and an autobiographical essay by Urquhart. This introductory section is followed by papers on algebraic logic and lattice theory, papers on the complexity of proofs, and papers on philosophical logic and history of logic. The final section of the book contains a response to the papers by Urquhart. Alasdair Urquhart has made extremely important contributions to a variety of fields in logic. He produced some of the earliest work on the semantics of relevant logic. He provided the undecidability of the logics R (of relevant implication) and E (of relevant entailment), as well as some of their close neighbors. He proved that interpolation fails in some of those systems. Urquhart has done very important work in complexity theory, both about the complexity of proofs in classical and some nonclassical logics. In pure algebra, he has produced a representation theorem for lattices and some rather beautiful duality theorems. In addition, he has done important work in the history of logic, especially on Bertrand Russell, including editing Volume four of Russell's Collected Papers.
Features Includes cutting edge applications in machine learning and data analytics. Suitable as a primary text for undergraduates studying linear algebra. Requires very little in the way of pre-requisites.
The thesis deals with averaging dynamics in a multiagent networked system, which is a main mechanism for diffusing the information over such networks. It arises in a wide range of applications in engineered physical networks (such as mobile communication and sensor networks), as well as social and economic networks. The thesis provides in depth study of stability and other phenomena characterizing the limiting behavior of both deterministic and random averaging dynamics. By developing new concepts, and using the tools from dynamic system theory and non-negative matrix theory, several novel fundamental results are rigorously developed. These contribute significantly to our understanding of averaging dynamics as well as to non-negative random matrix theory. The exposition, although highly rigorous and technical, is elegant and insightful, and accompanied with numerous illustrative examples, which makes this thesis work easily accessible to those just entering this field and will also be much appreciated by experts in the field.
Paul Erdos was one of the most influential mathematicians of the twentieth century, whose work in number theory, combinatorics, set theory, analysis, and other branches of mathematics has determined the development of large areas of these fields. In 1999, a conference was organized to survey his work, his contributions to mathematics, and the far-reaching impact of his work on many branches of mathematics. On the 100th anniversary of his birth, this volume undertakes the almost impossible task to describe the ways in which problems raised by him and topics initiated by him (indeed, whole branches of mathematics) continue to flourish. Written by outstanding researchers in these areas, these papers include extensive surveys of classical results as well as of new developments."
An up-to-date analysis of the SAR wavefront reconstruction signal theory and its digital implementation With the advent of fast computing and digital information processing techniques, synthetic aperture radar (SAR) technology has become both more powerful and more accurate. Synthetic Aperture Radar Signal Processing with MATLAB Algorithms addresses these recent developments, providing a complete, up-to-date analysis of SAR and its associated digital signal processing algorithms. This book introduces the wavefront reconstruction signal theory that underlies the best SAR imaging methods and provides clear guidelines to system design, implementation, and applications in diverse areas—from airborne reconnaissance to topographic imaging of ocean floors to surveillance and air traffic control to medical imaging techniques, and numerous others. Enabling professionals in radar signal and image processing to use synthetic aperture technology to its fullest potential, this work:
In the last decade, both scholars and practitioners have sought novel ways to address the problem of cybersecurity. Innovative outcomes have included applications such as blockchain as well as creative methods for cyber forensics, software development, and intrusion prevention. Accompanying these technological advancements, discussion on cyber matters at national and international levels has focused primarily on the topics of law, policy, and strategy. The objective of these efforts is typically to promote security by establishing agreements among stakeholders on regulatory activities. Varying levels of investment in cyberspace, however, comes with varying levels of risk; in some ways, this can translate directly to the degree of emphasis for pushing substantial change. At the very foundation or root of cyberspace systems and processes are tenets and rules governed by principles in mathematics. Topics such as encrypting or decrypting file transmissions, modeling networks, performing data analysis, quantifying uncertainty, measuring risk, and weighing decisions or adversarial courses of action represent a very small subset of activities highlighted by mathematics. To facilitate education and a greater awareness of the role of mathematics in cyber systems and processes, a description of research in this area is needed. Mathematics in Cyber Research aims to familiarize educators and young researchers with the breadth of mathematics in cyber-related research. Each chapter introduces a mathematical sub-field, describes relevant work in this field associated with the cyber domain, provides methods and tools, as well as details cyber research examples or case studies. Features One of the only books to bring together such a diverse and comprehensive range of topics within mathematics and apply them to cyber research. Suitable for college undergraduate students or educators that are either interested in learning about cyber-related mathematics or intend to perform research within the cyber domain. The book may also appeal to practitioners within the commercial or government industry sectors. Most national and international venues for collaboration and discussion on cyber matters have focused primarily on the topics of law, policy, strategy, and technology. This book is among the first to address the underpinning mathematics.
The two volumes in this advanced textbook present results, proof methods, and translations of motivational and philosophical considerations to formal constructions. In the associated Vol. I the author explains preferential structures and abstract size. In this Vol. II he presents chapters on theory revision and sums, defeasible inheritance theory, interpolation, neighbourhood semantics and deontic logic, abstract independence, and various aspects of nonmonotonic and other logics. In both volumes the text contains many exercises and some solutions, and the author limits the discussion of motivation and general context throughout, offering this only when it aids understanding of the formal material, in particular to illustrate the path from intuition to formalisation. Together these books are a suitable compendium for graduate students and researchers in the area of computer science and mathematical logic.
This volume contains the texts of the principal survey papers presented at ALGORITHMS -and ORDER, held. at Ottawa, Canada from June 1 to June 12, 1987. The conference was supported by grants from the N.A.T.O. Advanced Study Institute programme, the University of Ottawa, and the Natural Sciences and Engineering Research Council of Canada. We are grateful for this considerable support. Over fifty years ago, the Symposium on Lattice Theory, in Charlottesville, U.S.A., proclaimed the vitality of ordered sets. Only twenty years later the Symposium on Partially Ordered Sets and Lattice Theory, held at Monterey, U.S.A., had solved many of the problems that had been originally posed. In 1981, the Symposium on Ordered Sets held at Banff, Canada, continued this tradition. It was marked by a landmark volume containing twenty-three articles on almost all current topics in the theory of ordered sets and its applications. Three years after, Graphs and Orders, also held at Banff, Canada, aimed to document the role of graphs in the theory of ordered sets and its applications. Because of its special place in the landscape of the mathematical sciences order is especially sensitive to new trends and developments. Today, the most important current in the theory and application of order springs from theoretical computer seience. Two themes of computer science lead the way. The first is data structure. Order is common to data structures."
A comprehensive overview of the current evolution of research in algorithms, architectures and compilation for parallel systems is provided by this publication. The contributions focus specifically on domains where embedded systems are required, either oriented to application-specific or to programmable realisations. These are crucial in domains such as audio, telecom, instrumentation, speech, robotics, medical and automotive processing, image and video processing, TV, multimedia, radar and sonar. The book will be of particular interest to the academic community because of the detailed descriptions of research results presented. In addition, many contributions feature the "real-life" applications that are responsible for driving research and the impact of their specific characteristics on the methodologies is assessed. The publication will also be of considerable value to senior design engineers and CAD managers in the industrial arena, who wish either to anticipate the evolution of commercially available design tools or to utilize the presented concepts in their own R&D programmes.
This textbook helps future data analysts comprehend aggregation function theory and methods in an accessible way, focusing on a fundamental understanding of the data and summarization tools. Offering a broad overview of recent trends in aggregation research, it complements any study in statistical or machine learning techniques. Readers will learn how to program key functions in R without obtaining an extensive programming background. Sections of the textbook cover background information and context, aggregating data with averaging functions, power means, and weighted averages including the Borda count. It explains how to transform data using normalization or scaling and standardization, as well as log, polynomial, and rank transforms. The section on averaging with interaction introduces OWS functions and the Choquet integral, simple functions that allow the handling of non-independent inputs. The final chapters examine software analysis with an emphasis on parameter identification rather than technical aspects. This textbook is designed for students studying computer science or business who are interested in tools for summarizing and interpreting data, without requiring a strong mathematical background. It is also suitable for those working on sophisticated data science techniques who seek a better conception of fundamental data aggregation. Solutions to the practice questions are included in the textbook.
This book concentrates on mining networks, a subfield within data science. Data science uses scientific and computational tools to extract valuable knowledge from large data sets. Once data is processed and cleaned, it is analyzed and presented to support decision-making processes. Data science and machine learning tools have become widely used in companies of all sizes. Networks are often large-scale, decentralized, and evolve dynamically over time. Mining complex networks aim to understand the principles governing the organization and the behavior of such networks is crucial for a broad range of fields of study. Here are a few selected typical applications of mining networks: Community detection (which users on some social media platforms are close friends). Link prediction (who is likely to connect to whom on such platforms). Node attribute prediction (what advertisement should be shown to a given user of a particular platform to match their interests). Influential node detection (which social media users would be the best ambassadors of a specific product). This textbook is suitable for an upper-year undergraduate course or a graduate course in programs such as data science, mathematics, computer science, business, engineering, physics, statistics, and social science. This book can be successfully used by all enthusiasts of data science at various levels of sophistication to expand their knowledge or consider changing their career path. Jupiter notebooks (in Python and Julia) accompany the book and can be accessed on https://www.ryerson.ca/mining-complex-networks/. These not only contain all the experiments presented in the book, but also include additional material. Bogumil Kaminski is the Chairman of the Scientific Council for the Discipline of Economics and Finance at SGH Warsaw School of Economics. He is also an Adjunct Professor at the Data Science Laboratory at Ryerson University. Bogumil is an expert in applications of mathematical modeling to solving complex real-life problems. He is also a substantial open-source contributor to the development of the Julia language and its package ecosystem. Pawel Pralat is a Professor of Mathematics in Ryerson University, whose main research interests are in random graph theory, especially in modeling and mining complex networks. He is the Director of Fields-CQAM Lab on Computational Methods in Industrial Mathematics in The Fields Institute for Research in Mathematical Sciences and has pursued collaborations with various industry partners as well as the Government of Canada. He has written over 170 papers and three books with 130 plus collaborators. Francois Theberge holds a B.Sc. degree in applied mathematics from the University of Ottawa, a M.Sc. in telecommunications from INRS and a PhD in electrical engineering from McGill University. He has been employed by the Government of Canada since 1996 where he was involved in the creation of the data science team as well as the research group now known as the Tutte Institute for Mathematics and Computing. He also holds an adjunct professorial position in the Department of Mathematics and Statistics at the University of Ottawa. His current interests include relational-data mining and deep learning.
This textbook gives a systematized and compact summary, providing the most essential types of modern models for languages and computation together with their properties and applications. Most of these models properly reflect and formalize current computational methods, based on parallelism, distribution and cooperation covered in this book. As a result, it allows the user to develop, study, and improve these methods very effectively. This textbook also represents the first systematic treatment of modern language models for computation. It covers all essential theoretical topics concerning them. From a practical viewpoint, it describes various concepts, methods, algorithms, techniques, and software units based upon these models. Based upon them, it describes several applications in biology, linguistics, and computer science. Advanced-level students studying computer science, mathematics, linguistics and biology will find this textbook a valuable resource. Theoreticians, practitioners and researchers working in today's theory of computation and its applications will also find this book essential as a reference.
This textbook presents an introduction to the mathematical foundations of software engineering. It presents the rich applications of mathematics in areas such as error-correcting codes, cryptography, the safety and security critical fields, the banking and insurance fields, as well as traditional engineering applications. Topics and features: Addresses core mathematics for critical thinking and problem solving Discusses propositional and predicate logic and various proof techniques to demonstrate the correctness of a logical argument. Examines number theory and its applications to cryptography Considers the underlying mathematics of error-correcting codes Discusses graph theory and its applications to modelling networks Reviews tools to support software engineering mathematics, including automated and interactive theorem provers and model checking Discusses financial software engineering, including simple and compound interest, probability and statistics, and operations research Discusses software reliability and dependability and explains formal methods used to derive a program from its specification Discusses calculus, matrices, vectors, complex numbers, and quaternions, as well as applications to graphics and robotics Includes key learning topics, summaries, and review questions in each chapter, together with a useful glossary This practical and easy-to-follow textbook/reference is ideal for computer science students seeking to learn how mathematics can assist them in building high-quality and reliable software on time and on budget. The text also serves as an excellent self-study primer for software engineers, quality professionals, and software managers.
This book offers a defense against non-classical approaches to the paradoxes. The author argues that, despite appearances, the paradoxes give no reason at all to reject classical logic. In fact, he believes classical solutions fare better than non-classical ones with respect to key tests like Curry's Paradox, a Liar-like paradox that dialetheists are forced to solve in a way totally disjoint from their solution to the Liar. Graham Priest's In Contradiction was the first major work that advocated the use of non-classical approaches. Since then, these views have moved into the philosophical mainstream. Much of this movement is fueled by a widespread sense that these logically heterodox solutions get to the real nub of the issue. They lack the ad hoc feel of many other solutions to the paradoxes. The author believes that it's long past time for a response to these attacks against classical orthodoxy. He presents a non-logically-revisionary solution to the paradoxes. This title offers a literal way of cashing out the disquotation metaphor. While the details of the view are novel, the idea has a pre-history in the relevant literature. The author examines objections in detail. He rejects each in turn and concludes by comparing the virtues of his logically orthodox approach with those of the paraconsistent and paracomplete competition.
Covers computational methods in design and fluid dynamics with a focus on computational fluid dynamics Explains advanced material applications and manufacturing in labs using novel alloys and introduces properties in material Discusses fabrication of graphene reinforced magnesium metal matrix for orthopedic applications Illustrates simulation and optimization gear transmission, heat sink and heat exchangers application Provides unique problem-solution approach including solutions, methodology, experimental setup, and results validation
the handbook is a valuable reference to researchers from industry and academia, as well as Masters and PhD students around the globe working in the metaheuristics and applications domain includes contributions from a variety of academics/researchers in the field of metaheuristics
From Markov Jump Processes to Spatial Queues aims to develop a unified theory of spatial queues that yields concrete results for the performance analysis of mobile communication networks. A particular objective is to develop the most natural generalization of existing concepts (e.g. the BMAP) toward the needs of mobile communication networks. To these belong the spatial distribution of batch arrivals and users in the system as well as time-inhomogeneous (e.g. periodic) arrival intensities and user movements. One of the major recent challenges for the stochastic modelling of communication systems is the emergence of wireless networks, which are used by more and more subscribers today. The main new feature of those, which is not covered by classical queuing theory, clearly is the importance of the user location within the area that is served by the base stations of the network. In the framework of queuing theory, this opens up the natural extension of classical queuing models towards queues with a structured space in which users are served. The present book is intended to introduce this extension under the name of spatial queues. The main point of view and the general approach will be that of Markov jump processes. We start with a closer look into the theory. Then we present new results for the theory of stochastic processes as well as for classical queuing theory. Finally we introduce the new concepts of spatial Markovian arrival processes and spatial queues. The main text is divided into three parts. The first part provides a new presentation of the theory of Markov jump processes. We derive a number of new results, especially for time-inhomogeneous processes, which have been neglected too much in the current textbooks on stochastic processes. For the first time, the class of Markov-additive jump processes is analysed in detail. This extends and unifies all Markovian arrival processes that have been proposed up to now (including arrivals for fluid queues) and provides a foundation for the subsequent introduction of spatial Markovian arrival processes. The second part contains new results for classical queues with BMAP input. These include the first explicit formulae for the distribution of periodic queues. The class of fluid Markovian arrival processes is introduced, and we give statistical estimates for the parameters of a BMAP. In the third part, the concepts of spatial Markovian arrival
processes (abbreviated: SMAPs) and spatial queues are introduced.
After that, periodic spatial Markovian queues are analysed as a
model for the cells of a wireless communication network.
This book presents fundamental concepts of optimization problems and its real-world applications in various fields. The core concepts of optimization, formulations and solution procedures of various real-world problems are provided in an easy-to-read manner. The unique feature of this book is that it presents unified knowledge of the modelling of real-world decision-making problems and provides the solution procedure using the appropriate optimization techniques. The book will help students, researchers, and faculty members to understand the need for optimization techniques for obtaining optimal solution for the decision-making problems. It provides a sound knowledge of modelling of real-world problems using optimization techniques. It is a valuable compendium of several optimization techniques for solving real-world application problems using optimization software LINGO. The book is useful for academicians, practitioners, students and researchers in the field of OR. It is written in simple language with a detailed explanation of the core concepts of optimization techniques. Readers of this book will understand the formulation of real-world problems and their solution procedures obtained using the appropriate optimization techniques.
This book highlights state-of-the-art developments in metaheuristics research. It examines all aspects of metaheuristic research including new algorithmic developments, applications, new research challenges, theoretical developments, implementation issues, in-depth experimental studies. The book is divided into two sections. Part I is focused on new optimization and modeling techniques based on metaheuristics. The chapters in this section cover topics from multi-objective problems with fuzzy data with triangular-valued objective functions, to hyper-heuristics optimization methodology, designing genetic algorithms, and also the cuckoo search algorithm. The techniques described help to enhance the usability and increase the potential of metaheuristic algorithms. Part II showcases advanced metaheuristic approaches to solve real-life applications issues. This includes an examination of scheduling, the vehicle routing problem, multimedia sensor network, supplier selection, bin packing, objects tracking, and radio frequency identification. In the fields covered in the chapters are of high-impact applications of metaheuristics. The chapters offer innovative applications of metaheuristics that have a potential of widening research frontiers. Altogether, this book offers a comprehensive look at how researchers are currently using metaheuristics in different domains of design and application.
Since the emergence of the formal concept of probability theory in the seventeenth century, uncertainty has been perceived solely in terms of probability theory. However, this apparently unique link between uncertainty and probability theory has come under investigation a few decades back. Uncertainties are nowadays accepted to be of various kinds. Uncertainty in general could refer to different sense like not certainly known, questionable, problematic, vague, not definite or determined, ambiguous, liable to change, not reliable. In Indian languages, particularly in Sanskrit-based languages, there are other higher levels of uncertainties. It has been shown that several mathematical concepts such as the theory of fuzzy sets, theory of rough sets, evidence theory, possibility theory, theory of complex systems and complex network, theory of fuzzy measures and uncertainty theory can also successfully model uncertainty.
The quadratic binary optimization problem (QUBO) is a versatile combinatorial optimization model with a variety of applications and rich theoretical properties. Application areas of the model include finance, cluster analysis, traffic management, machine scheduling, VLSI physical design, physics, quantum computing, engineering, and medicine. In addition, various mathematical optimization models can be reformulated as a QUBO, including the resource constrained assignment problem, set partitioning problem, maximum cut problem, quadratic assignment problem, the bipartite unconstrained binary optimization problem, among others. This book presents a systematic development of theory, algorithms, and applications of QUBO. It offers a comprehensive treatment of QUBO from various viewpoints, including a historical introduction along with an in-depth discussion of applications modelling, complexity and polynomially solvable special cases, exact and heuristic algorithms, analysis of approximation algorithms, metaheuristics, polyhedral structure, probabilistic analysis, persistencies, and related topics. Available software for solving QUBO is also introduced, including public domain, commercial, as well as quantum computing based codes.
This monograph provides a modern introduction to the theory of quantales. First coined by C.J. Mulvey in 1986, quantales have since developed into a significant topic at the crossroads of algebra and logic, of notable interest to theoretical computer science. This book recasts the subject within the powerful framework of categorical algebra, showcasing its versatility through applications to C*- and MV-algebras, fuzzy sets and automata. With exercises and historical remarks at the end of each chapter, this self-contained book provides readers with a valuable source of references and hints for future research. This book will appeal to researchers across mathematics and computer science with an interest in category theory, lattice theory, and many-valued logic. |
![]() ![]() You may like...
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
![]()
Research Anthology on Architectures…
Information R Management Association
Hardcover
R13,709
Discovery Miles 137 090
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Advanced Methodologies and Technologies…
D.B.A., Mehdi Khosrow-Pour,
Hardcover
R9,863
Discovery Miles 98 630
|