This study of Margaret Beaufort, mother of Henry VII and the founder of two Cambridge colleges is the first biography to explore the full range of archival sources and one of the best-documented studies of any late-medieval woman.
The concept of altruism, or disinterested concern for another's welfare, has been discussed by everyone from theologians to psychologists to biologists. In this cutting edge book, evolutionary, neurological, developmental, psychological, social, cultural, and religious aspects of altruistic behavior are examined by renowned researchers. The result is a collaborative and provocative look at one of humanity's essential and defining characteristics.
This text is intended for a one-semester course in cryptography at the advanced undergraduate/Master's degree level. It is suitable for students from various STEM backgrounds, including engineering, mathematics, and computer science, and may also be attractive for researchers and professionals who want to learn the basics of cryptography. Advanced knowledge of computer science or mathematics (other than elementary programming skills) is not assumed. The book includes more material than can be covered in a single semester. The Preface provides a suggested outline for a single semester course, though instructors are encouraged to select their own topics to reflect their specific requirements and interests. Each chapter contains a set of carefully written exercises which prompts review of the material in the chapter and expands on the concepts. Throughout the book, problems are stated mathematically, then algorithms are devised to solve the problems. Students are tasked to write computer programs (in C++ or GAP) to implement the algorithms. The use of programming skills to solve practical problems adds extra value to the use of this text. This book combines mathematical theory with practical applications to computer information systems. The fundamental concepts of classical and modern cryptography are discussed in relation to probability theory, complexity theory, modern algebra, and number theory. An overarching theme is cyber security: security of the cryptosystems and the key generation and distribution protocols, and methods of cryptanalysis (i.e., code breaking). It contains chapters on probability theory, information theory and entropy, complexity theory, and the algebraic and number theoretic foundations of cryptography. The book then reviews symmetric key cryptosystems, and discusses one-way trap door functions and public key cryptosystems including RSA and ElGamal. It contains a chapter on digital signature schemes, including material on message authentication and forgeries, and chapters on key generation and distribution. It contains a chapter on elliptic curve cryptography, including new material on the relationship between singular curves, algebraic groups and Hopf algebras.
Written specifically for students of experimental psychology, this book focuses on attention and memory, and attempts to inegrate these two closely related phenomena. In addition to the concepts of short term and long term memory there has been added the system of immediate or sensory memory. In the description of the representation of knowledge by human memory the author has necessarily drawn conclusions about optimal presentation and retrieval procedures, which should be transferable to non-laboratory situations where information processing is presently inadequate. The present approach attempts to keep in perspective the functions of attention and memory that the proponents of model building techniques have tended to overlook in their investigations. A new and fresh contribution to a growing area of research and teaching interest
This text aims to provide graduate students with a self-contained introduction to topics that are at the forefront of modern algebra, namely, coalgebras, bialgebras and Hopf algebras. The last chapter (Chapter 4) discusses several applications of Hopf algebras, some of which are further developed in the author’s 2011 publication, An Introduction to Hopf Algebras. The book may be used as the main text or as a supplementary text for a graduate algebra course. Prerequisites for this text include standard material on groups, rings, modules, algebraic extension fields, finite fields and linearly recursive sequences. The book consists of four chapters. Chapter 1 introduces algebras and coalgebras over a field K; Chapter 2 treats bialgebras; Chapter 3 discusses Hopf algebras and Chapter 4 consists of three applications of Hopf algebras. Each chapter begins with a short overview and ends with a collection of exercises which are designed to review and reinforce the material. Exercises range from straightforward applications of the theory to problems that are devised to challenge the reader. Questions for further study are provided after selected exercises. Most proofs are given in detail, though a few proofs are omitted since they are beyond the scope of this book.
Rather than simply summarising the state of play in African countries and elsewhere, Freedom of Information and the Developing World identifies and makes explicit the assumptions about the citizen's relationship to the state that lie beneath Freedom of Information (FoI) discourse. The book goes on to test them against the reality of the pervasive politics of patronage that characterise much of African practice. - Develops a discourse about the concept of FoI - Discussion of the human rights claim appropriates the concepts of Hohfeldian analysis for more radical purposes in support of the idea that the state has a duty to implement FoI practices
The purpose of this book is to provide a concise yet detailed account of fundamental concepts in modern algebra. The target audience for this book is first-year graduate students in mathematics, though the first two chapters are probably accessible to well-prepared undergraduates. The book covers a broad range of topics in modern algebra and includes chapters on groups, rings, modules, algebraic extension fields, and finite fields. Each chapter begins with an overview which provides a road map for the reader showing what material will be covered. At the end of each chapter we collect exercises which review and reinforce the material in the corresponding sections. These exercises range from straightforward applications of the material to problems designed to challenge the reader. We also include a list of 'Questions for Further Study' which pose problems suitable for master's degree research projects.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.