Browse Results

Showing 76 through 100 of 23,635 results

Physik und Finanzen

by Volker Ziemann

Dieses Buch führt Physikstudenten in die Konzepte und Methoden der Finanzwissenschaft ein. Obwohl die Finanzwissenschaft als recht weit von der Physik entfernt wahrgenommen wird, teilt sie eine Reihe gemeinsamer Methoden und Ideen, die in der Regel mit Rauschen und Unsicherheiten zu tun haben. Durch die Gegenüberstellung der wichtigsten Methoden mit Anwendungen in der Physik und im Finanzwesen werden sowohl die Unterschiede als auch die Gemeinsamkeiten deutlich, was den Studierenden ein tieferes Verständnis der zugrunde liegenden Ideen vermittelt. Darüber hinaus lernen sie eine Reihe nützlicher mathematischer und rechnerischer Werkzeuge kennen, wie stochastische Differentialgleichungen, Pfadintegrale, Monte-Carlo-Methoden und grundlegende Kryptologie. Jedes Kapitel endet mit einer Reihe sorgfältig ausgearbeiteter Übungen, mit denen die Leser ihr Verständnis überprüfen können.

Rough Sets: International Joint Conference, IJCRS 2017, Olsztyn, Poland, July 3–7, 2017, Proceedings, Part I (Lecture Notes in Computer Science #10313)

by Beata Zielosko Dominik Ślęzak Dun Liu Davide Ciucci Piotr Artiemjew Yiyu Yao Lech Polkowski

Decision trees and decision rule systems are widely used in different applications as algorithms for problem solving, as predictors, and as a way for knowledge representation. Reducts play key role in the problem of attribute (feature) selection. The aims of this book are (i) the consideration of the sets of decision trees, rules and reducts; (ii) study of relationships among these objects; (iii) design of algorithms for construction of trees, rules and reducts; and (iv) obtaining bounds on their complexity. Applications for supervised machine learning, discrete optimization, analysis of acyclic programs, fault diagnosis, and pattern recognition are considered also. This is a mixture of research monograph and lecture notes. It contains many unpublished results. However, proofs are carefully selected to be understandable for students. The results considered in this book can be useful for researchers in machine learning, data mining and knowledge discovery, especially for those who are working in rough set theory, test theory and logical analysis of data. The book can be used in the creation of courses for graduate students.

Figurierte Zahlen: Veranschaulichung als heuristische Strategie

by Jochen Ziegenbalg

Dieses Buch behandelt die Visualisierung als Methode des mathematischen Problemlösens, Begründens und Beweisens: Konkrete Beispiele zur Veranschaulichung durch mathematische Figuren und Bilder bieten einen faszinierenden Einblick in das Argumentieren anhand strukturierter und strukturierender Figuren zur Betrachtung von Zahlen und Zahlenfolgen. Die historischen Wurzeln dieses mathematischen Handwerkszeugs werden dabei so weit wie möglich einbezogen. Die Beispiele sind in der Regel konstruktiver Natur; gelegentlich wird, wo angebracht, die algorithmische Erschließung durch Hinweise auf die Programmierung mit Hilfe von Computeralgebra Systemen ergänzt. Das Buch richtet sich an Studierende und Lehrende an Schulen und Hochschulen, sowie an alle an der Elementarmathematik interessierten Nichtspezialisten, die das mathematische Arbeiten einmal außerhalb der von den Bildungsinstitutionen vorgezeichneten Pfade kennenlernen wollen. Es liefert insbesondere Lehrkräften und Lehramtsstudierenden wertvolle Anregungen, etwa zur Förderung mathematisch interessierter Schülerinnen und Schüler. In der 2. Auflage ist mit den mathematisch fundamentalen und historisch bedeutsamen Themen Wechselwegnahme, Teilbarkeit, Euklidischer Algorithmus, Inkommensurabilität und Kettenbrüche ein neues, für Visualisierungen gut geeignetes Kapitel hinzugekommen. Bereits bestehende Kapitel wurde durch Abschnitte über Trapezzahlen, ungerade Quadratzahlen und zentrierte Polygonalzahlen ergänzt.

You Can't Buy A Dinosaur With A Dime

by Harriet Ziefert Amanda Haley

Clink, clink, clink, clink...Clink, clink, clinkity... Money saved in a bank makes your brain think-thinkity! <P><P>Children are fascinated by money how it looks, feels, smells, and most of all, what it buys. And Pete is no exception. The rhymed verse describes how Pete saves his allowance, spends too much of it, has second thoughts, and starts over. <P><P>Young readers will not only applaud Pete's decisions, but join him in his computations as he saves, spends, and strategizes over future purchases. The lively combination of fact and fiction, plus humorous art, will prove both thought-provoking and thoroughly enjoyable.

10 Little Sock Monkeys

by Harriet Ziefert

Ten little monkeys are swinging on a bar. Two by two, these creatures drop away, while all the rest continue to play.

The Golden Rule of Ethics: A Dynamic Game-Theoretic Framework Based on Berge Equilibrium (Communications in Cybernetics, Systems Science and Engineering #9)

by Vladislav I. Zhukovskiy Mindia E. Salukvadze

This book synthesizes the game-theoretic modeling of decision-making processes and an ancient moral requirement called the Golden Rule of ethics (GR). This rule states "Behave to others as you would like them to behave to you." The GR is one of the oldest, most widespread, and specific moral requirements that appear in Christianity, Islam, Judaism, Buddhism, and Confucianism. This book constructs and justifies mathematical models of dynamic socio-economic processes and phenomena that reveal the mechanism of the GR and are based on the concept of Berge equilibrium. The GR can be naturally used for resolving or balancing conflicts, and its "altruistic character" obviously excludes wars, blood-letting, and armed clashes. The previous book by the authors, The Berge Equilibrium: A Game-Theoretic Framework for the Golden Rule of Ethics, covers the static case of the GR. In this book, the dynamic case of the GR is investigated using the altruistic concept of Berge equilibrium and three factors as follows: 1) a modification of N.N. Krasovskii’s mathematical formalization of differential positional games (DPGs), in view of the counterexamples given by A.I. Subbotin and A.F. Kononenko; 2) the method of guiding control, proposed by N.N. Krasovskii; and 3) the Germier convolution of the payoff functions of different players. Additionally, this book features exercises, problems, and solution tips collected together in Appendix 1, as well as new approaches to conflict resolution as presented in Appendices 2 to 4. This book will be of use to undergraduate and graduate students and experts in the field of decision-making in complex control and management systems, as well as anyone interested in game theory and applications.

Game Theoretic Analysis of Congestion, Safety and Security

by Jun Zhuang Kjell Hausken

Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e. g. , road/sea/air traffic, people, data, information, water, electricity, and organisms. Analysing systems where congestion occurs - which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways - this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security into proceedings. Addressing the multiple actors who may hold different concerns regarding system reliability; e. g. one or several terrorists, a government, various local or regional government agencies, or others with stakes for or against system reliability, this book describes how governments and authorities may have the tools to handle congestion, but that these tools need to be improved whilst additionally ensuring safety and security against various threats. This game-theoretic analysis sets this book apart from the current congestion literature and ensures that the book will be of use to postgraduates, researchers, 3rd/4th-year undergraduates, policy makers, and practitioners.

Analysis and Design of Nonlinear Systems in the Frequency Domain (Springer Theses)

by Yunpeng Zhu

This book focuses on the development of three novel approaches to build up a framework for the frequency domain analysis and design of nonlinear systems. The concepts are derived from Volterra series representation of nonlinear systems which are described by nonlinear difference or differential equations. Occupying the middle ground between traditional linear approaches and more complex nonlinear system theories, the book will help readers to have a good start to analyse and exploit the nonlinearities. Analysis and Design of Nonlinear Systems in the Frequency Domain provides clear illustrations and examples at the beginning and the end of each chapter, respectively, making it of interest to both academics and practicing engineers.

Networked Multisensor Decision and Estimation Fusion: Based on Advanced Mathematical Methods

by Yunmin Zhu Jie Zhou Xiaojing Shen Enbin Song Yingting Luo

Due to the increased capability, reliability, robustness, and survivability of systems with multiple distributed sensors, multi-source information fusion has become a crucial technique in a growing number of areas-including sensor networks, space technology, air traffic control, military engineering, agriculture and environmental engineering, and i

Power System Loads and Power System Stability (Springer Theses)

by Yue Zhu

This thesis develops a pioneering methodology and a concept for identifying critical loads and load model parameters in large power networks based on their influence on power system stability. The research described in the thesis first develops an automatic load modelling tool (ALMT) that can be used to automatically build load model from actual measured power system data without human intervention and the benefits of the ALMY are explored. Secondly, it develops a pioneering framework based on Morris screening method for ranking power system load model parameters based on their influence on overall power system stability (voltage, frequency, transient and small disturbance stability) considering different load models and loading conditions. Thirdly, a novel probabilistic methodology for determining the accuracy levels of critical load model parameters has been developed. This book will be of interest to students and researchers within the field of electrical engineering, as well as industry professionals.

Uncertain Optimal Control (Springer Uncertainty Research Ser.)

by Yuanguo Zhu

This book introduces the theory and applications of uncertain optimal control, and establishes two types of models including expected value uncertain optimal control and optimistic value uncertain optimal control. These models, which have continuous-time forms and discrete-time forms, make use of dynamic programming. The uncertain optimal control theory relates to equations of optimality, uncertain bang-bang optimal control, optimal control with switched uncertain system, and optimal control for uncertain system with time-delay. Uncertain optimal control has applications in portfolio selection, engineering, and games. The book is a useful resource for researchers, engineers, and students in the fields of mathematics, cybernetics, operations research, industrial engineering, artificial intelligence, economics, and management science.

Equations and Analytical Tools in Mathematical Physics: A Concise Introduction

by Yichao Zhu

​This book highlights a concise and readable introduction to typical treatments of partial differential equations in mathematical physics. Mathematical physics is regarded by many as a profound discipline. In conventional textbooks of mathematical physics, the known and the new pieces of knowledge often intertwine with each other. The book aims to ease readers' struggle by facilitating a smooth transition to new knowledge. To achieve so, the author designs knowledge maps before each chapter and provides comparative summaries in each chapter whenever appropriate. Through these unique ways, readers can clarify the underlying structures among different equations and extend one's vision to the big picture. The book also emphasizes applications of the knowledge by providing practical examples. The book is intended for all those interested in mathematical physics, enabling them to develop a solid command in using partial differential equations to solve physics and engineering problems in a not-so-painful learning experience.

Combinatorial Nullstellensatz: With Applications to Graph Colouring

by Xuding Zhu R. Balakrishnan

Combinatorial Nullstellensatz is a novel theorem in algebra introduced by Noga Alon to tackle combinatorial problems in diverse areas of mathematics. This book focuses on the applications of this theorem to graph colouring. A key step in the applications of Combinatorial Nullstellensatz is to show that the coefficient of a certain monomial in the expansion of a polynomial is nonzero. The major part of the book concentrates on three methods for calculating the coefficients: Alon-Tarsi orientation: The task is to show that a graph has an orientation with given maximum out-degree and for which the number of even Eulerian sub-digraphs is different from the number of odd Eulerian sub-digraphs. In particular, this method is used to show that a graph whose edge set decomposes into a Hamilton cycle and vertex-disjoint triangles is 3-choosable, and that every planar graph has a matching whose deletion results in a 4-choosable graph. Interpolation formula for the coefficient: This method is in particular used to show that toroidal grids of even order are 3-choosable, r-edge colourable r-regular planar graphs are r-edge choosable, and complete graphs of order p+1, where p is a prime, are p-edge choosable. Coefficients as the permanents of matrices: This method is in particular used in the study of the list version of vertex-edge weighting and to show that every graph is (2,3)-choosable. It is suited as a reference book for a graduate course in mathematics.

Computer Vision: Statistical Models for Marr's Paradigm

by Song-Chun Zhu Ying Nian Wu

As the first book of a three-part series, this book is offered as a tribute to pioneers in vision, such as Béla Julesz, David Marr, King-Sun Fu, Ulf Grenander, and David Mumford. The authors hope to provide foundation and, perhaps more importantly, further inspiration for continued research in vision. This book covers David Marr's paradigm and various underlying statistical models for vision. The mathematical framework herein integrates three regimes of models (low-, mid-, and high-entropy regimes) and provides foundation for research in visual coding, recognition, and cognition. Concepts are first explained for understanding and then supported by findings in psychology and neuroscience, after which they are established by statistical models and associated learning and inference algorithms. A reader will gain a unified, cross-disciplinary view of research in vision and will accrue knowledge spanning from psychology to neuroscience to statistics.

Reciprocal Learning for Cross-Cultural Mathematics Education: A Partnership Project Between Canada and China (Intercultural Reciprocal Learning in Chinese and Western Education)

by Sijia Cynthia Zhu Shu Xie Yunpeng Ma Douglas McDougall

This edited volume examines new ways of teaching mathematics through a cross-cultural reciprocal learning project between sister schools in Canada and China. Situating teacher learning in the intersection of the two different school systems, curriculums, and cultures of mathematics learning and teaching in both nations, this volume offers teachers a unique and much-needed perspective on how practices between countries become more and more likely shaped by each other in the emerging global society. Born out of a comparative study project sponsored by the SSHRC, this volume compiles five years' worth of findings from reciprocal partnerships between researchers, teachers, school administrators, and students from both nations. Through the process of reciprocal learning and narrative inquiry, the research described in these chapters illuminates the unknown and shares newly-created mathematics education knowledge.

Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach (Advances in Information Security #81)

by Quanyan Zhu Zhiheng Xu

This book introduces a cross-layer design to achieve security and resilience for CPSs (Cyber-Physical Systems). The authors interconnect various technical tools and methods to capture the different properties between cyber and physical layers. Part II of this book bridges the gap between cryptography and control-theoretic tools. It develops a bespoke crypto-control framework to address security and resiliency in control and estimation problems where the outsourcing of computations is possible. Part III of this book bridges the gap between game theory and control theory and develops interdependent impact-aware security defense strategies and cyber-aware resilient control strategies.With the rapid development of smart cities, there is a growing need to integrate the physical systems, ranging from large-scale infrastructures to small embedded systems, with networked communications. The integration of the physical and cyber systems forms Cyber-Physical Systems (CPSs), enabling the use of digital information and control technologies to improve the monitoring, operation, and planning of the systems. Despite these advantages, they are vulnerable to cyber-physical attacks, which aim to damage the physical layer through the cyber network.This book also uses case studies from autonomous systems, communication-based train control systems, cyber manufacturing, and robotic systems to illustrate the proposed methodologies. These case studies aim to motivate readers to adopt a cross-layer system perspective toward security and resilience issues of large and complex systems and develop domain-specific solutions to address CPS challenges.A comprehensive suite of solutions to a broad range of technical challenges in secure and resilient control systems are described in this book (many of the findings in this book are useful to anyone working in cybersecurity). Researchers, professors, and advanced-level students working in computer science and engineering will find this book useful as a reference or secondary text. Industry professionals and military workers interested in cybersecurity will also want to purchase this book.

Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)

by Quanyan Zhu Stefan Rass Stefan Schauer Sandra König

This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation. Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack “practically impossible.” A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward. This does not rule out the possibility of an attack but minimizes its likelihood to the least possible risk. The book follows this economic definition of security, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanced persistent threats. Drawing on the authors’ experience and inspired by real case studies, the book provides a systematic approach to critical infrastructure security and resilience. Presenting a mixture of theoretical work and practical success stories, the book is chiefly intended for students and practitioners seeking an introduction to game- and decision-theoretic techniques for security. The required mathematical concepts are self-contained, rigorously introduced, and illustrated by case studies. The book also provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.

Decision and Game Theory for Security

by Quanyan Zhu Tansu Alpcan Emmanouil Panaousis Milind Tambe William Casey

This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".

Diagnosis, Fault Detection & Tolerant Control (Studies in Systems, Decision and Control #269)

by Quanmin Zhu Nabil Derbel Jawhar Ghommam

This book focuses on unhealthy cyber-physical systems. Consisting of 14 chapters, it discusses recognizing the beginning of the fault, diagnosing the appearance of the fault, and stopping the system or switching to a special control mode known as fault-tolerant control. Each chapter includes the background, motivation, quantitative development (equations), and case studies/illustration/tutorial (simulations, experiences, curves, tables, etc.). Readers can easily tailor the techniques presented to accommodate their ad hoc applications.

New Trends in Robot Control (Studies in Systems, Decision and Control #270)

by Quanmin Zhu Nabil Derbel Jawhar Ghommam

This book presents solutions to control problems in a number of robotic systems and provides a wealth of worked-out examples with full analytical and numerical details, graphically illustrated to aid in reader comprehension. It also presents relevant studies on and applications of robotic system control approaches, as well as the latest findings from interdisciplinary theoretical studies. Featuring chapters on advanced control (fuzzy, neural, backstepping, sliding mode, adaptive, predictive, diagnosis, and fault-tolerant control), the book will equip readers to easily tailor the techniques to their own applications. Accordingly, it offers a valuable resource for researchers, engineers, and students in the field of robotic systems.

Distributed Optimization-Based Control of Multi-Agent Networks in Complex Environments

by Minghui Zhu Sonia Martínez

This book offers a concise and in-depth exposition of specific algorithmic solutions for distributed optimization based control of multi-agent networks and their performance analysis. It synthesizes and analyzes distributed strategies for three collaborative tasks: distributed cooperative optimization, mobile sensor deployment and multi-vehicle formation control. The book integrates miscellaneous ideas and tools from dynamic systems, control theory, graph theory, optimization, game theory and Markov chains to address the particular challenges introduced by such complexities in the environment as topological dynamics, environmental uncertainties, and potential cyber-attack by human adversaries. The book is written for first- or second-year graduate students in a variety of engineering disciplines, including control, robotics, decision-making, optimization and algorithms and with backgrounds in aerospace engineering, computer science, electrical engineering, mechanical engineering and operations research. Researchers in these areas may also find the book useful as a reference.

Dynamic Graph Learning for Dimension Reduction and Data Clustering (Synthesis Lectures on Computer Science)

by Lei Zhu Jingjing Li Zheng Zhang

This book illustrates how to achieve effective dimension reduction and data clustering. The authors explain how to accomplish this by utilizing the advanced dynamic graph learning technique in the era of big data. The book begins by providing background on dynamic graph learning. The authors discuss why it has attracted considerable research attention in recent years and has become well recognized as an advanced technique. After covering the key topics related to dynamic graph learning, the book discusses the recent advancements in the area. The authors then explain how these techniques can be practically applied for several purposes, including feature selection, feature projection, and data clustering.

Handbook of Analytic Operator Theory (CRC Press/Chapman and Hall Handbooks in Mathematics Series)

by Kehe Zhu

Handbook of Analytic Operator Theory thoroughly covers the subject of holomorphic function spaces and operators acting on them. The spaces covered include Bergman spaces, Hardy spaces, Fock spaces and the Drury-Averson space. Operators discussed in the book include Toeplitz operators, Hankel operators, composition operators, and Cowen-Douglas class operators. <P><P>The volume consists of eleven articles in the general area of analytic function spaces and operators on them. Each contributor focuses on one particular topic, for example, operator theory on the Drury-Aversson space, and presents the material in the form of a survey paper which contains all the major results in the area and includes all relevant references. The overalp between this volume and existing books in the area is minimal. The material on two-variable weighted shifts by Curto, the Drury-Averson space by Fang and Xia, the Cowen-Douglas class by Misra, and operator theory on the bi-disk by Yang has never appeared in book form before. <P><P>Features: <li>The editor of the handbook is a widely known and published researcher on this topic <li>The handbook's contributors are a who's=who of top researchers in the area <li>The first contributed volume on these diverse topics

An Introduction to Operator Algebras (Studies in Advanced Mathematics #9)

by Kehe Zhu

An Introduction to Operator Algebras is a concise text/reference that focuses on the fundamental results in operator algebras. Results discussed include Gelfand's representation of commutative C*-algebras, the GNS construction, the spectral theorem, polar decomposition, von Neumann's double commutant theorem, Kaplansky's density theorem, the (continuous, Borel, and L8) functional calculus for normal operators, and type decomposition for von Neumann algebras. Exercises are provided after each chapter.

Handbook on Data Envelopment Analysis

by Joe Zhu William W. Cooper Lawrence M. Seiford

This handbook covers DEA topics that are extensively used and solidly based. The purpose of the handbook is to (1) describe and elucidate the state of the field and (2), where appropriate, extend the frontier of DEA research. It defines the state-of-the-art of DEA methodology and its uses. This handbook is intended to represent a milestone in the progression of DEA. Written by experts, who are generally major contributors to the topics to be covered, it includes a comprehensive review and discussion of basic DEA models, which, in the present issue extensions to the basic DEA methods, and a collection of DEA applications in the areas of banking, engineering, health care, and services. The handbook's chapters are organized into two categories: (i) basic DEA models, concepts, and their extensions, and (ii) DEA applications. First edition contributors have returned to update their work. The second edition includes updated versions of selected first edition chapters. New chapters have been added on: different approaches with no need for a priori choices of weights (called "multipliers) that reflect meaningful trade-offs, construction of static and dynamic DEA technologies, slacks-based model and its extensions, DEA models for DMUs that have internal structures network DEA that can be used for measuring supply chain operations, Selection of DEA applications in the service sector with a focus on building a conceptual framework, research design and interpreting results.

Refine Search

Showing 76 through 100 of 23,635 results