Listing 1 - 9 of 9 |
Sort by
|
Choose an application
This volume contains the proceedings of the conference "Casimir Force, Casimir Operators and the Riemann Hypothesis - Mathematics for Innovation in Industry and Science" held in November 2009 in Fukuoka (Japan). The motive for the conference was the celebration of the 100th birthday of Casimir and the 150th birthday of the Riemann hypothesis. The conference focused on the following topics: Casimir operators in harmonic analysis and representation theory Number theory, in particular zeta functions and cryptography Casimir force in physics and its relation with nano-science Mathematical biology Importance of mathematics for innovation in industry The latter topic was inspired both by the call for innovation in industry worldwide and by the fact that Casimir, who was the director of Philips research for a long time in his career, had an outspoken opinion on the importance of fundamental science for industry. These proceedings are of interest both to research mathematicians and to those interested in the role science, and in particular mathematics, can play in innovation in industry.
Casimir effect --- Research --- Research, Industrial --- Technological innovations --- Breakthroughs, Technological --- Innovations, Industrial --- Innovations, Technological --- Technical innovations --- Technological breakthroughs --- Technological change --- Creative ability in technology --- Inventions --- Domestication of technology --- Innovation relay centers --- Technology transfer --- Contract research --- Industrial research --- Engineering experiment stations --- Science --- Science research --- Scientific research --- Information services --- Learning and scholarship --- Methodology --- Research teams --- Casimir force --- Casimir forces --- Effect, Casimir --- Force, Casimir --- Electric fields --- Vacuum polarization --- Zero-point field --- Mathematical models --- Fukuoka <2009> --- Casimir Operators. --- Mathematical Biology. --- Mathematics in Industry. --- Number Theory.
Choose an application
This book is a collection of papers presented at the conference “Forum Math-for-Industry 2014” for which the unifying theme was “Applications + Practical Conceptualization + Mathematics = fruitful Innovation” in October 2014. This epigram encapsulates the dynamics of the process that takes an application through to an innovation. Industrial mathematics can be viewed as the causal engine that implements the epigram by taking an Application such as input and convolving it with a mixture of Practical Conceptualization and Mathematics to generate a fruitful Innovation as output. The book illustrates various aspects of the two-way interaction between applications and their association highlighting how practical conceptualization assists with the linking of the question that encapsulates the current application to the relevant mathematics. The contents of this volume address productive and successful interaction between industry and mathematicians, as well as the cross-fertilization and collaboration that result when mathematics is involved with the advancement of science and technology.
Applied Mathematics --- Civil Engineering --- Civil & Environmental Engineering --- Engineering & Applied Sciences --- Industrial engineering --- Mathematics --- Mathematics. --- Industrial applications. --- Math --- Engineering mathematics --- Science --- Engineering mathematics. --- Mathematical physics. --- Mathematical and Computational Engineering. --- Applications of Mathematics. --- Mathematical Methods in Physics. --- Physical mathematics --- Physics --- Engineering --- Engineering analysis --- Mathematical analysis --- Applied mathematics. --- Physics. --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics
Choose an application
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.
Computer science. --- Computer security. --- Data structures (Computer science). --- Number theory. --- Quantum field theory. --- String theory. --- Quantum physics. --- Applied mathematics. --- Engineering mathematics. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Appl.Mathematics/Computational Methods of Engineering. --- Number Theory. --- Quantum Field Theories, String Theory. --- Quantum Physics. --- Engineering --- Engineering analysis --- Quantum dynamics --- Quantum mechanics --- Quantum physics --- Models, String --- String theory --- Relativistic quantum field theory --- Number study --- Numbers, Theory of --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Mathematics --- Protection --- Security measures --- Mathematical analysis --- Physics --- Mechanics --- Thermodynamics --- Nuclear reactions --- Field theory (Physics) --- Quantum theory --- Relativity (Physics) --- Algebra --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data protection --- Security systems --- Hacking --- Science --- Cryptography --- Mathematical models. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Quantum theory. --- Data Structures and Information Theory. --- Mathematical and Computational Engineering.
Choose an application
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
Applied mathematics. --- Engineering mathematics. --- Data structures (Computer science). --- Quantum computers. --- Computer security. --- Mathematical and Computational Engineering. --- Data Structures and Information Theory. --- Quantum Computing. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Engineering --- Engineering analysis --- Mathematical analysis --- Protection --- Security measures --- Mathematics --- Mathematical and Computational Engineering --- Data Structures and Information Theory --- Quantum Computing --- Systems and Data Security --- Mathematical and Computational Engineering Applications --- Data and Information Security --- Cryptography for Quantum Computers --- Post-quantum Cryptography --- Number Theory --- Representation Theory --- Quantum Physics --- Security Modelling --- Open Access --- Maths for engineers --- Algorithms & data structures --- Information theory --- Mathematical theory of computation --- Computer security --- Network security
Choose an application
Mathematical control systems --- Mathematics --- Applied physical engineering --- Engineering sciences. Technology --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- quantumcomputers --- economie --- informatica --- informatietechnologie --- wiskunde --- computerbeveiliging --- ingenieurswetenschappen --- informatietheorie
Choose an application
This book is a collection of papers presented at the conference “Forum Math-for-Industry 2014” for which the unifying theme was “Applications + Practical Conceptualization + Mathematics = fruitful Innovation” in October 2014. This epigram encapsulates the dynamics of the process that takes an application through to an innovation. Industrial mathematics can be viewed as the causal engine that implements the epigram by taking an Application such as input and convolving it with a mixture of Practical Conceptualization and Mathematics to generate a fruitful Innovation as output. The book illustrates various aspects of the two-way interaction between applications and their association highlighting how practical conceptualization assists with the linking of the question that encapsulates the current application to the relevant mathematics. The contents of this volume address productive and successful interaction between industry and mathematicians, as well as the cross-fertilization and collaboration that result when mathematics is involved with the advancement of science and technology.
Mathematics --- Mathematical physics --- Physics --- Applied physical engineering --- Engineering sciences. Technology --- analyse (wiskunde) --- toegepaste wiskunde --- economie --- wiskunde --- ingenieurswetenschappen --- fysica
Choose an application
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.
Number theory --- Mathematics --- Quantum mechanics. Quantumfield theory --- Applied physical engineering --- Engineering sciences. Technology --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- quantumfysica --- quantumtheorie --- economie --- informatica --- informatietechnologie --- wiskunde --- computerbeveiliging --- ingenieurswetenschappen --- fysica --- getallenleer
Choose an application
This book is a collection of papers presented at the Forum “The Impact of Applications on Mathematics” in October 2013. It describes an appropriate framework in which to highlight how real-world problems, over the centuries and today, have influenced and are influencing the development of mathematics and, thereby, how mathematics is reshaped, in order to advance mathematics and its application. The contents of this book address productive and successful interaction between industry and mathematicians, as well as the cross-fertilization and collaboration that result when mathematics is involved with the advancement of science and technology.
Mathematics --- Applied mathematics --- Math --- Science --- Mathematics. --- Engineering mathematics. --- Computer simulation. --- Applications of Mathematics. --- Mathematical and Computational Engineering. --- Simulation and Modeling. --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Engineering --- Engineering analysis --- Mathematical analysis --- Applied mathematics.
Choose an application
This book is a collection of papers presented at the Forum “The Impact of Applications on Mathematics” in October 2013. It describes an appropriate framework in which to highlight how real-world problems, over the centuries and today, have influenced and are influencing the development of mathematics and, thereby, how mathematics is reshaped, in order to advance mathematics and its application. The contents of this book address productive and successful interaction between industry and mathematicians, as well as the cross-fertilization and collaboration that result when mathematics is involved with the advancement of science and technology.
Mathematics --- Applied physical engineering --- Engineering sciences. Technology --- Artificial intelligence. Robotics. Simulation. Graphics --- analyse (wiskunde) --- toegepaste wiskunde --- vormgeving --- economie --- mineralen (chemie) --- simulaties --- mijnbouw --- wiskunde --- KI (kunstmatige intelligentie) --- ingenieurswetenschappen
Listing 1 - 9 of 9 |
Sort by
|