![]() |
![]() |
Your cart is empty |
||
Books > Science & Mathematics > Mathematics > Number theory
This book offers the basics of algebraic number theory for students and others who need an introduction and do not have the time to wade through the voluminous textbooks available. It is suitable for an independent study or as a textbook for a first course on the topic. The author presents the topic here by first offering a brief introduction to number theory and a review of the prerequisite material, then presents the basic theory of algebraic numbers. The treatment of the subject is classical but the newer approach discussed at the end provides a broader theory to include the arithmetic of algebraic curves over finite fields, and even suggests a theory for studying higher dimensional varieties over finite fields. It leads naturally to the Weil conjecture and some delicate questions in algebraic geometry. About the Author Dr. J. S. Chahal is a professor of mathematics at Brigham Young University. He received his Ph.D. from Johns Hopkins University and after spending a couple of years at the University of Wisconsin as a post doc, he joined Brigham Young University as an assistant professor and has been there ever since. He specializes and has published several papers in number theory. For hobbies, he likes to travel and hike. His book, Fundamentals of Linear Algebra, is also published by CRC Press.
This is the first in a series of three volumes dealing with important topics in algebra. It offers an introduction to the foundations of mathematics together with the fundamental algebraic structures, namely groups, rings, fields, and arithmetic. Intended as a text for undergraduate and graduate students of mathematics, it discusses all major topics in algebra with numerous motivating illustrations and exercises to enable readers to acquire a good understanding of the basic algebraic structures, which they can then use to find the exact or the most realistic solutions to their problems.
P-adic Analytic Functions describes the definition and properties of p-adic analytic and meromorphic functions in a complete algebraically closed ultrametric field.Various properties of p-adic exponential-polynomials are examined, such as the Hermite-Lindemann theorem in a p-adic field, with a new proof. The order and type of growth for analytic functions are studied, in the whole field and inside an open disk. P-adic meromorphic functions are studied, not only on the whole field but also in an open disk and on the complemental of an open disk, using Motzkin meromorphic products. Finally, the p-adic Nevanlinna theory is widely explained, with various applications. Small functions are introduced with results of uniqueness for meromorphic functions. The question of whether the ring of analytic functions-in the whole field or inside an open disk-is a Bezout ring is also examined.
This collection of surveys and research articles explores a fascinating class of varieties: Beauville surfaces. It is the first time that these objects are discussed from the points of view of algebraic geometry as well as group theory. The book also includes various open problems and conjectures related to these surfaces. Beauville surfaces are a class of rigid regular surfaces of general type, which can be described in a purely algebraic combinatoric way. They play an important role in different fields of mathematics like algebraic geometry, group theory and number theory. The notion of Beauville surface was introduced by Fabrizio Catanese in 2000 and after the first systematic study of these surfaces by Ingrid Bauer, Fabrizio Catanese and Fritz Grunewald, there has been an increasing interest in the subject. These proceedings reflect the topics of the lectures presented during the workshop 'Beauville surfaces and groups 2012', held at Newcastle University, UK in June 2012. This conference brought together, for the first time, experts of different fields of mathematics interested in Beauville surfaces.
Written for graduate students and researchers alike, this set of lectures provides a structured introduction to the concept of equidistribution in number theory. This concept is of growing importance in many areas, including cryptography, zeros of L-functions, Heegner points, prime number theory, the theory of quadratic forms, and the arithmetic aspects of quantum chaos. The volume brings together leading researchers from a range of fields, whose accessible presentations reveal fascinating links between seemingly disparate areas."
The theory of algebras, rings, and modules is one of the fundamental domains of modern mathematics. General algebra, more specifically non-commutative algebra, is poised for major advances in the twenty-first century (together with and in interaction with combinatorics), just as topology, analysis, and probability experienced in the twentieth century. This volume is a continuation and an in-depth study, stressing the non-commutative nature of the first two volumes of Algebras, Rings and Modules by M. Hazewinkel, N. Gubareni, and V. V. Kirichenko. It is largely independent of the other volumes. The relevant constructions and results from earlier volumes have been presented in this volume.
The theory of algebras, rings, and modules is one of the fundamental domains of modern mathematics. General algebra, more specifically non-commutative algebra, is poised for major advances in the twenty-first century (together with and in interaction with combinatorics), just as topology, analysis, and probability experienced in the twentieth century. This is the second volume of Algebras, Rings and Modules: Non-commutative Algebras and Rings by M. Hazewinkel and N. Gubarenis, a continuation stressing the more important recent results on advanced topics of the structural theory of associative algebras, rings and modules.
Originally published in 1994, The Incommensurability Thesis is a critical study of the Incommensurability Thesis of Thomas Kuhn and Paul Feyerabend. The book examines the theory that different scientific theories may be incommensurable because of conceptual variance. The book presents a critique of the thesis and examines and discusses the arguments for the theory, acknowledging and debating the opposing views of other theorists. The book provides a comprehensive and detailed discussion of the incommensurability thesis.
This book develops a novel approach to perturbative quantum field theory: starting with a perturbative formulation of classical field theory, quantization is achieved by means of deformation quantization of the underlying free theory and by applying the principle that as much of the classical structure as possible should be maintained. The resulting formulation of perturbative quantum field theory is a version of the Epstein-Glaser renormalization that is conceptually clear, mathematically rigorous and pragmatically useful for physicists. The connection to traditional formulations of perturbative quantum field theory is also elaborated on, and the formalism is illustrated in a wealth of examples and exercises.
Research in mathematics is much more than solving puzzles, but most people will agree that solving puzzles is not just fun: it helps focus the mind and increases one's armory of techniques for doing mathematics. Mathematical Puzzles makes this connection explicit by isolating important mathematical methods, then using them to solve puzzles and prove a theorem. Features A collection of the world's best mathematical puzzles Each chapter features a technique for solving mathematical puzzles, examples, and finally a genuine theorem of mathematics that features that technique in its proof Puzzles that are entertaining, mystifying, paradoxical, and satisfying; they are not just exercises or contest problems.
This collection of survey and research articles focuses on recent developments concerning various quantitative aspects of 'thin groups'. There are discrete subgroups of semisimple Lie groups that are both big (i.e., Zariski dense) and small (i.e., of infinite co-volume). This dual nature leads to many intricate questions. Over the past few years, many new ideas and techniques, arising in particular from arithmetic combinatorics, have been involved in the study of such groups, leading, for instance, to far-reaching generalizations of the strong approximation theorem in which congruence quotients are shown to exhibit a spectral gap, referred to as superstrong approximation. This book provides a broad panorama of a very active field of mathematics at the boundary between geometry, dynamical systems, number theory, and combinatorics. It is suitable for professional mathematicians and graduate students in mathematics interested in this fascinating area of research.
In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology now contains many new technical and biographical details. The first part treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, where particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers.
Proofs 101: An Introduction to Formal Mathematics serves as an introduction to proofs for mathematics majors who have completed the calculus sequence (at least Calculus I and II) and a first course in linear algebra. The book prepares students for the proofs they will need to analyze and write the axiomatic nature of mathematics and the rigors of upper-level mathematics courses. Basic number theory, relations, functions, cardinality, and set theory will provide the material for the proofs and lay the foundation for a deeper understanding of mathematics, which students will need to carry with them throughout their future studies. Features Designed to be teachable across a single semester Suitable as an undergraduate textbook for Introduction to Proofs or Transition to Advanced Mathematics courses Offers a balanced variety of easy, moderate, and difficult exercises
For a long time, all thought there was only one geometry - Euclidean geometry. Nevertheless, in the 19th century, many non-Euclidean geometries were discovered. It took almost two millennia to do this. This was the major mathematical discovery and advancement of the 19th century, which changed understanding of mathematics and the work of mathematicians providing innovative insights and tools for mathematical research and applications of mathematics.A similar event happened in arithmetic in the 20th century. Even longer than with geometry, all thought there was only one conventional arithmetic of natural numbers - the Diophantine arithmetic, in which 2+2=4 and 1+1=2. It is natural to call the conventional arithmetic by the name Diophantine arithmetic due to the important contributions to arithmetic by Diophantus. Nevertheless, in the 20th century, many non-Diophantine arithmetics were discovered, in some of which 2+2=5 or 1+1=3. It took more than two millennia to do this. This discovery has even more implications than the discovery of new geometries because all people use arithmetic.This book provides a detailed exposition of the theory of non-Diophantine arithmetics and its various applications. Reading this book, the reader will see that on the one hand, non-Diophantine arithmetics continue the ancient tradition of operating with numbers while on the other hand, they introduce extremely original and innovative ideas.
This book deals with several aspects of what is now called "explicit number theory." The central theme is the solution of Diophantine equations, i.e., equations or systems of polynomial equations which must be solved in integers, rational numbers or more generally in algebraic numbers. This theme, in particular, is the central motivation for the modern theory of arithmetic algebraic geometry. In this text, this is considered through three of its most basic aspects. The local aspect, global aspect, and the third aspect is the theory of zeta and L-functions. This last aspect can be considered as a unifying theme for the whole subject.
Proofs 101: An Introduction to Formal Mathematics serves as an introduction to proofs for mathematics majors who have completed the calculus sequence (at least Calculus I and II) and a first course in linear algebra. The book prepares students for the proofs they will need to analyze and write the axiomatic nature of mathematics and the rigors of upper-level mathematics courses. Basic number theory, relations, functions, cardinality, and set theory will provide the material for the proofs and lay the foundation for a deeper understanding of mathematics, which students will need to carry with them throughout their future studies. Features Designed to be teachable across a single semester Suitable as an undergraduate textbook for Introduction to Proofs or Transition to Advanced Mathematics courses Offers a balanced variety of easy, moderate, and difficult exercises
The Rogers--Ramanujan identities are a pair of infinite series-infinite product identities that were first discovered in 1894. Over the past several decades these identities, and identities of similar type, have found applications in number theory, combinatorics, Lie algebra and vertex operator algebra theory, physics (especially statistical mechanics), and computer science (especially algorithmic proof theory). Presented in a coherant and clear way, this will be the first book entirely devoted to the Rogers-Ramanujan identities and will include related historical material that is unavailable elsewhere.
Complex Numbers lie at the heart of most technical and scientific subjects. This book can be used to teach complex numbers as a course text,a revision or remedial guide, or as a self-teaching work. The author has designed the book to be a flexible learning tool, suitable for A-Level students as well as other students in higher and further education whose courses include a substantial maths component (e.g. BTEC or GNVQ science and engineering courses). Verity Carr has accumulated nearly thirty years of experience teaching mathematics at all levels and has a rare gift for making mathematics simple and enjoyable. At Brooklands College, she has taken a leading role in the development of a highly successful Mathematics Workshop. This series of Made Simple Maths books widens her audience but continues to provide the kind of straightforward and logical approach she has developed over her years of teaching.
Architecture of Mathematics describes the logical structure of Mathematics from its foundations to its real-world applications. It describes the many interweaving relationships between different areas of mathematics and its practical applications, and as such provides unique reading for professional mathematicians and nonmathematicians alike. This book can be a very important resource both for the teaching of mathematics and as a means to outline the research links between different subjects within and beyond the subject. Features All notions and properties are introduced logically and sequentially, to help the reader gradually build understanding. Focusses on illustrative examples that explain the meaning of mathematical objects and their properties. Suitable as a supplementary resource for teaching undergraduate mathematics, and as an aid to interdisciplinary research. Forming the reader's understanding of Mathematics as a unified science, the book helps to increase his general mathematical culture.
This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. Presents new and updated coverage of cryptography including new content on quantum resistant cryptography; Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear); Includes a full suite of classroom materials including exercises, Q&A, and examples.
In 1988 Shafarevich asked me to write a volume for the Encyclopaedia of Mathematical Sciences on Diophantine Geometry. I said yes, and here is the volume. By definition, diophantine problems concern the solutions of equations in integers, or rational numbers, or various generalizations, such as finitely generated rings over Z or finitely generated fields over Q. The word Geometry is tacked on to suggest geometric methods. This means that the present volume is not elementary. For a survey of some basic problems with a much more elementary approach, see La 9Oc]. The field of diophantine geometry is now moving quite rapidly. Out standing conjectures ranging from decades back are being proved. I have tried to give the book some sort of coherence and permanence by em phasizing structural conjectures as much as results, so that one has a clear picture of the field. On the whole, I omit proofs, according to the boundary conditions of the encyclopedia. On some occasions I do give some ideas for the proofs when these are especially important. In any case, a lengthy bibliography refers to papers and books where proofs may be found. I have also followed Shafarevich's suggestion to give examples, and I have especially chosen these examples which show how some classical problems do or do not get solved by contemporary in sights. Fermat's last theorem occupies an intermediate position. Al though it is not proved, it is not an isolated problem any more."
In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography. Rather than simply combining number theory and modern algebra, this textbook features the interdisciplinary characteristics of cryptography-revealing the integrations of mathematical theories and public-key cryptographic applications. Incorporating the complexity theory of algorithms throughout, it introduces the basic number theoretic and algebraic algorithms and their complexities to provide a preliminary understanding of the applications of mathematical theories in cryptographic algorithms. Supplying a seamless integration of cryptography and mathematics, the book includes coverage of elementary number theory; algebraic structure and attributes of group, ring, and field; cryptography-related computing complexity and basic algorithms, as well as lattice and fundamental methods of lattice cryptanalysis. The text consists of 11 chapters. Basic theory and tools of elementary number theory, such as congruences, primitive roots, residue classes, and continued fractions, are covered in Chapters 1-6. The basic concepts of abstract algebra are introduced in Chapters 7-9, where three basic algebraic structures of groups, rings, and fields and their properties are explained. Chapter 10 is about computational complexities of several related mathematical algorithms, and hard problems such as integer factorization and discrete logarithm. Chapter 11 presents the basics of lattice theory and the lattice basis reduction algorithm-the LLL algorithm and its application in the cryptanalysis of the RSA algorithm. Containing a number of exercises on key algorithms, the book is suitable for use as a textbook for undergraduate students and first-year graduate students in information security programs. It is also an ideal reference book for cryptography professionals looking to master public-key cryptography.
This book details the classical part of the theory of algebraic number theory, excluding class-field theory and its consequences. Coverage includes: ideal theory in rings of algebraic integers, p-adic fields and their finite extensions, ideles and adeles, zeta-functions, distribution of prime ideals, Abelian fields, the class-number of quadratic fields, and factorization problems. The book also features exercises and a list of open problems.
Our grasp of numbers and uncertainty is one of humankind's most distinctive and important traits. It is pivotal to our exceptional ability to control the world around us as we make short-term choices and forecast far into the future. But very smart people can struggle with numbers in ways that pose negative consequences for their decision making. Numeric ability equips individuals with vital tools that allow them to take charge of various aspects of their life. The more numerate enjoy superior health, wealth, and employment outcomes, while the innumerate remain more vulnerable. This book presents the logic, rules, and habits that highly numerate people use in decision making. Innumeracy in the Wild also introduces two additional ways of knowing numbers that complement and compensate for lower numeric ability and explores how numeric abilities develop and where mistakes are made. It offers a state-of-the-art review of the now sizeable body of psychological and applied findings that demonstrate the critical importance of numeracy in our world. With more than two decades of experience in the decision sciences, Ellen Peters demonstrates how intervention can foster adult numeric capacity, propel people to use numeric facts in decision making, and empower those with lower numeracy to reason better.
Hardy's Z-function, related to the Riemann zeta-function (s), was originally utilised by G. H. Hardy to show that (s) has infinitely many zeros of the form 1/2+it. It is now amongst the most important functions of analytic number theory, and the Riemann hypothesis, that all complex zeros lie on the line 1/2+it, is perhaps one of the best known and most important open problems in mathematics. Today Hardy's function has many applications; among others it is used for extensive calculations regarding the zeros of (s). This comprehensive account covers many aspects of Z(t), including the distribution of its zeros, Gram points, moments and Mellin transforms. It features an extensive bibliography and end-of-chapter notes containing comments, remarks and references. The book also provides many open problems to stimulate readers interested in further research. |
![]() ![]() You may like...
Recent Progress On Topics Of Ramanujan…
Helmut Maier, Laszlo Toth, …
Hardcover
R1,831
Discovery Miles 18 310
|