Pourqoui ce blog

Ce blog est concu par Aboutaki dans le but de rassembler sur Internet les documents Mathématique qu'il juge utils pour certaines spécialités Mathématiques. Vous trouveriez aussi des logiciels jeux éducatifs pour enfants, des logiciels de calculs formel, traitement du text et de geometrie...
Si vous avez besion d'un document logiciel ou consiel ou bien vous avez une remarque, suggestion ou meme une critique contacter moi sur l e.mail :
aboutaki@gmail.com

Google Search

Google
 

mardi 16 septembre 2008

Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting

Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
355 pages | Springer; 1 edition (December 14, 2007) | ISBN: 3540716408 | PDF | 5 Mb

The book consists of a collection of works on utilising the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID Labs around the globe. The collection of works and the organisation of the book assume very little knowledge on the part of the reader on Networked RFID systems as the material provided in the introduction familiarises the reader with concepts, underlying principles and vulnerabilities of modern RFID systems. The collection of works presented on highlighting the counterfeiting problem and problems with existing low cost RFID technology is an important guide to practitioners, professionals and graduates in the area of RFID systems application, implementation and integration.

 Download - (5 Mb)
paid4share.net | depositfiles.com

Symbolic Data Analysis and the SODAS Software

Symbolic Data Analysis and the SODAS Software
476 pages | Wiley-Interscience (March 21, 2008) | ISBN: 0470018836 | PDF | 5 Mb

Symbolic data analysis is a relatively new field that provides a range of methods for analyzing complex datasets. Standard statistical methods do not have the power or flexibility to make sense of very large datasets, and symbolic data analysis techniques have been developed in order to extract knowledge from such data. Symbolic data methods differ from that of data mining, for example, because rather than identifying points of interest in the data, symbolic data methods allow the user to build models of the data and make predictions about future events. This book is the result of the work f a pan-European project team led by Edwin Diday following 3 years work sponsored by EUROSTAT. It includes a full explanation of the new SODAS software developed as a result of this project. The software and methods described highlight the crossover between statistics and computer science, with a particular emphasis on data mining.

 Download - (5 Mb)
paid4share.net | depositfiles.com

Miror: http://rapidshare.com/files/145083562/SymbolicDataAnalysisandtheSODASMar08.rar

3D Geometrical Objects v1.4

3D Geometrical Objects v1.4 | 1MB

The software is designed as a simple accessory for teaching math.


The program can represent the following objects in 3D space:

* regular prism (3 to 10 sides)
* general three-sided prism
* special four-sided prism (adjustable inclination of sides)
* regular pyramid (3 to 10 sides)

For each geometrical object, certain parameters can be interactively adjusted, such as: height and length of sides, inclination of sides, number of sides, etc. Each object can be gradually and smoothly opened or closed from its basic net to a geometrical object. Each adjustment of parameters is interactive and seen immediately - animated. Each object can be freely rotated in 3D space at 'all times of the process'. Additionally, each object can be zoomed-in, or zoomed-out, at any scale. 3D animation executes at high speed - in real time, even on slower machines.


http://w17.easy-share.com/1701569536.html

keygen:   http://rapidshare.com/files/145740359/EduIQ.3D.Geometrical.Objects.v1.4.Keygen.Only-ORiON.rar.html

Math Toolkit for Real-Time Programming

Jack W. Crenshaw “Math Toolkit for Real-Time Programming" 
CMP Books | 2000-09 | ISBN: 1929629095 | 466 pages | PDF | 3,2 Mb

Do big math on small machines Write fast and accurate library functions Master analytical and numerical calculus Perform numerical integration to any order Implement z-transform formulas Need to learn the ins and outs of the fundamental math functions in 
Master analytical and numerical calculus with this solid course in applied math from the renowned columnist of Embedded Systems Programming magazine. You will learn how to do big math on small machines with fast and accurate library functions, numerical integration to any order and z-transform formulas. Features never-before-published methods and a versatile set of algorithms to use in your own projects.






dimanche 14 septembre 2008

Invitation to the Mathematics of Fermat-Wiles (Fermat's Last Theorem)

Yves Hellegouarch, "Invitation to the Mathematics of Fermat-Wiles"
Academic Press | ISBN 0123392519 | Year 2001 | 448 pages | PDF | 12 MB compressed


Book Description
Assuming only modest knowledge of undergraduate level math, Invitation to the Mathematics of Fermat-Wiles presents diverse concepts required to comprehend Wiles' extraordinary proof. Furthermore, it places these concepts in their historical context.

This book can be used in introduction to mathematics theories courses and in special topics courses on Fermat's last theorem. It contains themes suitable for development by students as an introduction to personal research as well as numerous exercises and problems. However, the book will also appeal to the inquiring and mathematically informed reader intrigued by the unraveling of this fascinating puzzle.

Review
"This text provides a sweeping introduction to all those mathematical topics, concepts, methods, techniques, and classical results that are necessary to understand Andrew Wiles's theory culminating in the first complete proof of Fermat's last theorem. The text is accessible, without compromising the rigor of its mathematical exposition, to reasoned undergraduate students, at least so for the most part it can serve as the basis for various teaching courses. It sets the whole discussion in a fascinating, generally educating historical context, thereby travelling - metaphorically speaking - through the centuries of mathematical history. No doubt, it is a true blessing that the English translation of this unique book is now at hand for a much wider public." - Werner Kleinert (Berlin) in Zentralblatt MATH 1036 

Key Features

  • Rigorously presents the concepts required to understand Wiles' proof, assuming only modest undergraduate level math
  • Sets the math in its historical context
  • Contains several themes that could be further developed by student research and numerous exercises and problems
  • Written by Yves Hellegouarch, who himself made an important contribution to the proof of Fermat's last theorem

Elementary Number Theory

Elementary Number Theory 
McGraw-Hill Science/Engineering/Math | ISBN 0073051888 | 2005-09-27 | PDF | 3.7 MB | 448 pages

Elementary Number Theory, Sixth Edition, is written for the one-semester undergraduate number theory course taken by math majors, secondary education majors, and computer science students. This contemporary text provides a simple account of classical number theory, set against a historical background that shows the subject's evolution from antiquity to recent research. Written in David Burton’s engaging style, Elementary Number Theory reveals the attraction that has drawn leading mathematicians and amateurs alike to number theory over the course of history.

Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications)

Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications)
Chapman & Hall/CRC | 3 edition (November 1, 2005) | 616 pages | ISBN: 1584885084 | djvu | 3 Mb

Douglas R. Stinson's Cryptography: Theory and Practice is a mathematically intensive examination of cryptography, including ciphers, the Data Encryption Standard (DES), public key cryptography, one-way hash functions, and digital signatures. Stinson's explication of "zero-sum proofs"--a process by which one person lets another person know that he or she has a password without actually revealing any information--is especially good.
If you are new to the math behind cryptography but want to tackle it, the author covers all of the required background to understand the real mathematics here. Cryptography includes extensive exercises with each chapter and makes an ideal introduction for any math-literate person willing to get acquainted with this material.

THE LEGACY… First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography. WHY A THIRD EDITION? The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering: · Pseudorandom bit generation in cryptography · Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes · Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs · Public key infrastructure, including identity-based cryptography · Secret sharing schemes · Multicast security, including broadcast encryption and copyright protection THE RESULT… Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.

Thanx 2 are!