Skip to main content
This is the 2nd Edition of the best-selling book "Introduction to Computational Mathematics".
    • by 
    •   11  
      AlgorithmsScientific Computing (Computational Science)Swarm IntelligencePDE (Mathematics)
VERSION EN INGLES
    • by 
    •   2  
      Linear AlgebraDemostraciones
A method is presented for the recovery of optical flow. The key idea is that the local spatial structure of optical flow, with the exception of surface boundaries, is usually rather coherent and can thus be appropriately approximated by a... more
    • by 
    •   16  
      MathematicsComputer ScienceComputer VisionLinear Algebra
    • by 
    •   19  
      MathematicsComputer ScienceComputational ModelingComputer Aided Design
    • by 
    •   4  
      MathematicsAlgebraLinear AlgebraPure Mathmatics
    • by 
    •   7  
      Applied MathematicsModelingLinear AlgebraModel Order Reduction
    • by 
    •   10  
      Cognitive ScienceDistributed ComputingParallel ComputingLinear Algebra
    • by 
    •   9  
      MathematicsApplied MathematicsSignal ProcessingLinear Algebra
    • by 
    •   7  
      Digital Signal ProcessingLinear AlgebraTime series analysisInverse Scattering
    • by 
    •   10  
      Civil EngineeringGeologyCoastal EngineeringLinear Algebra
    • by 
    •   4  
      MathematicsCryptographyLinear AlgebraComputer Control
We look at the why of the how we identify linearly independent columns in a matrix.
    • by 
    •   3  
      StatisticsLinear AlgebraElementary-Linear-Algebra
THIS BOOK CONTAINS TOPICS RELATED TO LINEAR ALGEBRA AND VECTOR SPACES
    • by 
    •   2  
      Linear AlgebraVector Calculus
    • by 
    •   7  
      Computer ScienceDistributed Shared Memory SystemLinear AlgebraFortran
    • by 
    •   11  
      MathematicsSet TheoryFunctional AnalysisComputer Science
    • by 
    •   6  
      MathematicsApplied MathematicsGroup TheoryPure Mathematics
    • by 
    •   2  
      Linear AlgebraControl Structure
    • by 
    •   18  
      Cognitive ScienceAlgorithmsLinear AlgebraHumans
    • by 
    •   13  
      Mechanical EngineeringApplied MathematicsApproximation TheoryStability
    • by 
    •   12  
      Computer ScienceInformation SecurityAlgorithmLinear Algebra
    • by 
    •   10  
      Computer ScienceGraph TheoryLinear AlgebraData Structure
All the important parameters of a truncated dodecahedron (having 20 congruent equilateral triangular & 12 congruent regular decagonal faces each of equal edge length) such as normal distances & solid angles subtended by the faces, inner... more
    • by 
    •   3  
      Aerospace EngineeringGeometry And TopologyLinear Algebra
    • by 
    •   10  
      MathematicsApplied MathematicsComputer ScienceLinear Algebra
Abstract—The diffraction of E-polarized plane waves by a tandem impedance,slit waveguide is investigated rigorously by using the Fourier transform technique in conjunction with the Mode Matching method. This mixed method,of formulation... more
    • by 
    •   7  
      Linear AlgebraFourier transformBoolean SatisfiabilityNumerical Solution
    • by 
    •   15  
      ModelingPerformanceMathematical ModellingEnvironmental Pollution
    • by 
    •   14  
      Chemical EngineeringMass TransferKineticsLinear Algebra
    • by 
    •   2  
      AlgebraLinear Algebra
    • by 
    •   4  
      EngineeringLinear AlgebraError AnalysisPenalty Function
The aim of this research is to investigate preservice mathematics teachers' performances on systems of linear equations within the context of self-efficacy on systems of linear equations. The research uses a case study methodology which... more
    • by  and +1
    •   4  
      Teachers' self efficacy levelsMathematics Teacher EducationLinear AlgebraSelf Efficacy
    • by 
    •   12  
      Mathematical PhysicsQuantum PhysicsPure MathematicsNumerical Linear Algebra
    • by 
    •   13  
      MathematicsHigher EducationMathematics EducationRepresentations
In cryptography, we know the symmetric key algorithms and asymmetric key algorithms. We know that the asymmetric key algorithm is more secure than the symmetric key algorithm. Affine Cipher uses a symmetric key algorithm. In this paper,... more
    • by 
    •   4  
      CryptographyLinear AlgebraAbstract AlgebraPublic Key Cryptosystems
    • by 
    •   8  
      Cognitive ScienceDistributed ComputingParallel ComputingDistributed Shared Memory System
T I. INTRODUCTION HIS paper deals with some mathematical aspects of the discrete Fourier transform (DFT), studied with linear algebra and matrix theory methods. The vast majority of papers on the DFT have concerned computational issues,... more
    • by 
    •   8  
      Harmonic AnalysisLinear AlgebraMatrix Decompositiondiscrete Yang-Fourier transforms
We describe a new algorithm for Gaussian Elimination suitable for general (unsymmetric and possibly singular) sparse matrices, of any entry type, which has a natural parallel and distributed-memory formulation but degrades gracefully to... more
    • by 
    •   8  
      MathematicsComputer ScienceNumerical Linear AlgebraLinear Algebra
This is a second handwritten note on the business of changing from a basis to another basis and what that does to the coordinates of a vector. The example given here is that of spaces of polynomials whose degree not exceeding some bounds.
    • by 
    •   3  
      Linear Algebra (Vector Space)Linear AlgebraLinear Transformation
    • by 
    •   4  
      Linear AlgebraHigh performanceMatrix MultiplicationSparse Matrix
    • by 
    •   16  
      Software DevelopmentMathematical ModellingLinear AlgebraParameter estimation
    • by 
    •   4  
      Teaching and LearningLinear AlgebraLinear IndependenceLinear Transformation
    • by 
    •   7  
      Applied MathematicsNumerical AnalysisConvergenceLinear Algebra
    • by 
    •   5  
      Computer ScienceObject Oriented ProgrammingLinear AlgebraMENTAL MODEL
    • by 
    •   10  
      EngineeringLinear AlgebraMathematical SciencesImage Restoration
    • by 
    •   18  
      EngineeringTechnologySignal ProcessingStatistical Analysis
The assignment – selection problem used to find one-to- one match of given “Users” to “Laptops”, the main objective is to minimize the cost as per user requirement. This paper presents satisfactory solution for real assignment – Laptop... more
    • by 
    •   20  
      Hierarchical Linear ModelingLinear ProgrammingMatlabLinear models
    • by 
    •   7  
      Computer ArchitectureTechnologyComputational FinanceMonte Carlo
    • by 
    •   6  
      MathematicsApplied MathematicsAlgebraPure Mathematics
Tiling is one of the more important transformations for en-hancing locality of reference in programs. Intuitively, tiling a set of loops achieves the effect of interleaving iterations of these loops. Tiling of perfectly-nested loop nests... more
    • by 
    •   3  
      Linear AlgebraLoop TilingProduct Space
    • by 
    •   6  
      EngineeringLinear AlgebraMathematical SciencesGraph
In this work the magic squares of order n are addressed from the perspective of linear algebra, vector space, "Magic Space" and some of its basis is presented. The case of sparse systems of equations that having more than one... more
    • by 
    •   9  
      Numerical Linear AlgebraLinear AlgebraGeneralized Linear modelsSparse Matrices
    • by 
    •   10  
      Linear AlgebraFísicaQuímicaEngenharia de Produção