The book examines the underlying principles that guide effective teaching in an age when everyone,and in particular the students we are teaching, are using technology. A framework for making decisions about your teaching is provided, while understanding that every subject is different, and every instructor has something unique and special to bring to their teaching. The book enables teachers an…
This textbook provides an introduction to the mathematics on which modern cryptology is based. It covers not only public key cryptography, the glamorous component of modern cryptology, but also pays considerable attention to secret key cryptography, its workhorse in practice. Modern cryptology has been described as the science of the integrity of information, covering all aspects like confid…
This book examines the relationship between mathematics and data in the modern world. Indeed, modern societies are awash with data which must be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from an unauthorised access and transmitted over unreliable channels. All of these operations can be understood only by a person with know…
This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically sound ways of introducing ICT, new technical artifacts supporting the approach, the evaluation in a large-scale validator, and future work. While many innovations in Technology Enhanced Learning (TEL) have emerged over the last two decades, the uptake of these inno…
Although scientific computing is very often associated with numeric computations, the use of computer algebra methods in scientific computing has obtained considerable attention in the last two decades. Computer algebra methods are especially suitable for parametric analysis of the key properties of systems arising in scientific computing. The expression-based computational answers generally pr…
By restricting to Gaussian distributions, the optimal Bayesian filtering problem can be transformed into an algebraically simple form, which allows for computationally efficient algorithms. Three problem settings are discussed in this thesis: (1) filtering with Gaussians only, (2) Gaussian mixture filtering for strong nonlinearities, (3) Gaussian process filtering for purely data-driven scenari…
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the authors’ twenty-five years of …
Software has changed the rules of the game. The world talks about the digitalization in industry and society – how the focus has shifted from producing tangible things towards software and services. This trend started many years ago, but is now affecting every company, whether it’s a software company or not. There are many companies that have already made a digitalization journey – and ma…
This book offers a concise and gentle introduction to finite element programming in Python based on the popular FEniCS software library. Using a series of examples, including the Poisson equation, the equations of linear elasticity, the incompressible Navier–Stokes equations, and systems of nonlinear advection–diffusion–reaction equations, it guides readers through the essential steps to …
Ontologies and semantic metadata can theoretically solve all problems of traditional full-text search engines. In practice, however, they are always imperfect. This work analyzed whether the negative effect of ontology imperfection is higher than the positive effect of exploiting the ontology features for IR. To answer this question, a complete ontology-based information retrieval system was im…