Short Description: Note: This OpenStax book was imported into Pressbooks on August …
Short Description: Note: This OpenStax book was imported into Pressbooks on August 7, 2019, to make it easier for instructors to edit, build upon, and remix the content. The OpenStax import process isn't perfect, so there are a number of formatting errors in the book that need attention. As such, we don't recommend you use this book in the classroom. This also means that, while the original version of this book is accessible, this Pressbooks copy is not. For information about how to get your own copy of this book to work on, see the Add Content part in the Pressbooks Guide. You can access the original version of this textbook here: Algebra and Trigonometry: OpenStax.
Long Description: Algebra and Trigonometry provides a comprehensive exploration of algebraic principles and meets scope and sequence requirements for a typical introductory algebra and trigonometry course. The modular approach and the richness of content ensure that the book meets the needs of a variety of courses. Algebra and Trigonometry offers a wealth of examples with detailed, conceptual explanations, building a strong foundation in the material before asking students to apply what they’ve learned.
Word Count: 374323
ISBN: 978-1-947172-10-4
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This course covers the applications of algebra to combinatorics. Topics include enumeration …
This course covers the applications of algebra to combinatorics. Topics include enumeration methods, permutations, partitions, partially ordered sets and lattices, Young tableaux, graph theory, matrix tree theorem, electrical networks, convex polytopes, and more.
This lesson is about trying to get students to make connections between …
This lesson is about trying to get students to make connections between ideas about equations, inequalities, and expressions. The lesson is designed to give students opportunities to use mathematical vocabulary for a purpose to describe, discuss, and work with these symbol strings.The idea is for students to start gathering global information by looking at the whole number string rather than thinking only about individual procedures or steps. Hopefully students will begin to see the symbol strings as mathematical objects with their own unique set of attributes. (7th Grade Math)
This is the first semester of a two-semester sequence on Algebraic Geometry. …
This is the first semester of a two-semester sequence on Algebraic Geometry. The goal of the course is to introduce the basic notions and techniques of modern algebraic geometry. It covers fundamental notions and results about algebraic varieties over an algebraically closed field; relations between complex algebraic varieties and complex analytic varieties; and examples with emphasis on algebraic curves and surfaces. This course is an introduction to the language of schemes and properties of morphisms.
This course covers the fundamental notions and results about algebraic varieties over …
This course covers the fundamental notions and results about algebraic varieties over an algebraically closed field. It also analyzes the relations between complex algebraic varieties and complex analytic varieties.
This course provides an introduction to the language of schemes, properties of …
This course provides an introduction to the language of schemes, properties of morphisms, and sheaf cohomology. Together with 18.725 Algebraic Geometry, students gain an understanding of the basic notions and techniques of modern algebraic geometry.
This research-oriented course will focus on algebraic and computational techniques for optimization …
This research-oriented course will focus on algebraic and computational techniques for optimization problems involving polynomial equations and inequalities with particular emphasis on the connections with semidefinite optimization. The course will develop in a parallel fashion several algebraic and numerical approaches to polynomial systems, with a view towards methods that simultaneously incorporate both elements. We will study both the complex and real cases, developing techniques of general applicability, and stressing convexity-based ideas, complexity results, and efficient implementations. Although we will use examples from several engineering areas, particular emphasis will be given to those arising from systems and control applications.
This is a course on the singular homology of topological spaces. Topics …
This is a course on the singular homology of topological spaces. Topics include: Singular homology, CW complexes, Homological algebra, Cohomology, and Poincare duality.
This is the second part of the two-course series on algebraic topology. …
This is the second part of the two-course series on algebraic topology. Topics include basic homotopy theory, obstruction theory, classifying spaces, spectral sequences, characteristic classes, and Steenrod operations.
This is a research-oriented course on algorithm engineering, which will cover both …
This is a research-oriented course on algorithm engineering, which will cover both the theory and practice of algorithms and data structures. Students will learn about models of computation, algorithm design and analysis, and performance engineering of algorithm implementations. We will study the design and implementation of sequential, parallel, cache-efficient, external-memory, and write-efficient algorithms for fundamental problems in computing. Many of the principles of algorithm engineering will be illustrated in the context of parallel algorithms and graph problems.
This course is organized around algorithmic issues that arise in machine learning. …
This course is organized around algorithmic issues that arise in machine learning. Modern machine learning systems are often built on top of algorithms that do not have provable guarantees, and it is the subject of debate when and why they work. In this class, we focus on designing algorithms whose performance we can rigorously analyze for fundamental machine learning problems.
This lesson centers around the How AI Works: Equal Access and Algorithmic …
This lesson centers around the How AI Works: Equal Access and Algorithmic Bias video from the How AI Works video series. Watch this video first before exploring the lesson plan.
In this lesson, students will practice cropping images to uncover the bias underlying the Twitter cropping algorithm. Then, students will read and watch a video about the discovery of this biased algorithm. Finally, students will discuss ways to recognize and reduce bias along with analyzing Twitter's response to the allegations of bias in their cropping algorithm.
This lesson can be taught on its own, or as part of a 7-lesson sequence on How AI Works. Duration: 45 minutes
6.890 Algorithmic Lower Bounds: Fun with Hardness Proofs is a class taking …
6.890 Algorithmic Lower Bounds: Fun with Hardness Proofs is a class taking a practical approach to proving problems can’t be solved efficiently (in polynomial time and assuming standard complexity-theoretic assumptions like P ≠ NP). The class focuses on reductions and techniques for proving problems are computationally hard for a variety of complexity classes. Along the way, the class will create many interesting gadgets, learn many hardness proof styles, explore the connection between games and computation, survey several important problems and complexity classes, and crush hopes and dreams (for fast optimal solutions).
2023 Education Vision "Face to face in-service trainings will be organized for …
2023 Education Vision "Face to face in-service trainings will be organized for the teaching of algorithmic thinking of classroom teachers in a computer-free environment." The in-service program was opened within the scope of the study, which was initiated in line with the target.
This resource is a video abstract of a research paper created by …
This resource is a video abstract of a research paper created by Research Square on behalf of its authors. It provides a synopsis that's easy to understand, and can be used to introduce the topics it covers to students, researchers, and the general public. The video's transcript is also provided in full, with a portion provided below for preview:
"A new algorithm has successfully mapped part of the brain’s circuitry during shock therapy. For those suffering from severe depression, the approach could make for safer and more effective treatment. For brain research at large, it could lead to better ways of untangling noisy neural data to reveal real connections between different focal regions of the brain. Despite the gruesome picture painted by pop culture, modern shock therapy is a mild treatment option. In fact, over 2 million treatments are administered worldwide every year. Under general anesthesia, patients receive a small amount of current to the brain, triggering a brief seizure. The resulting changes in brain chemistry have been shown to reverse symptoms of mental health conditions like severe depression or bipolar disorder. But the procedure isn’t perfect. One of the most troubling side effects is memory loss, a result of poor targeting. To be effective and safe, induced seizures should be restricted to the pre-frontal cortex..."
The rest of the transcript, along with a link to the research itself, is available on the resource itself.
This book aims to be an accessible introduction into the design and …
This book aims to be an accessible introduction into the design and analysis of efficient algorithms. Throughout the book we will introduce only the most basic techniques and describe the rigorous mathematical methods needed to analyze them.
The topics covered include:
The divide and conquer technique. The use of randomization in algorithms. The general, but typically inefficient, backtracking technique. Dynamic programming as an efficient optimization for some backtracking algorithms. Greedy algorithms as an optimization of other kinds of backtracking algorithms. Hill-climbing techniques, including network flow.
The goal of the book is to show you how you can methodically apply different techniques to your own algorithms to make them more efficient. While this book mostly highlights general techniques, some well-known algorithms are also looked at in depth. This book is written so it can be read from "cover to cover" in the length of a semester, where sections marked with a * may be skipped.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.