SYLLABUS
& LEARNING OUTCOMES
For the course syllabus, learning
outcomes and assessment details see the
course
web page and the
continuous assessment web page. At the end of this
module you'll be able to tackle questions such as those on the
2013
exam paper and those on the
2014
exam paper.
FORTNIGHTLY HOMEWORKS
The fortnightly homeworks count 40% towards the module assessment.
For the Science MA180 homeworks
click
here.
For the Maths & Education MA185 homeworks
click
here.
For the CS&IT MA190 homeworks
click
here.
To register
for homeworks use your eight digit ID number, and choose a memorable
password for the homework system.
Don't
forget
your
MA180/MA185/MA190 password because I am
unable to reset it
for you!
WEEKLY WORKSHOPS
Workshops begin on Monday 15th September. Details can be found
here.
WHAT IS MATHEMATICS?
I'm not too sure of the answer. But whatever it is it is possibly
something a bit larger than what was taught in your school mathematics
classes. If you are interested in the question then you should browse
this
article by Fields Medallist William Thurston. He won the Fields
Medal for his work in geometry.
WHAT ARE THE EMPLOYMENT PROSPECTS
FOR A MATHS GRADUATE?
Have a look at the
links
here to answer this question.
ALGEBRA
MATERIAL
Algebra
text:
I can't find a single suitable book to recommend for the algebra
lectures. So
you'll just have to rely on the lecture notes and the various
references given below in the lecture outlines.
Algebra outline:
This module introduces the student to matrix algebra and systems
of equations, emphasizing that: (i) the entries of a matrix can be any
"numbers" for which we have a suitable notion of addition and
multiplication; (ii) matrix arithmetic underpins Ireland's
knowledge economy; (iii) matrix arithmetic over the "real numbers" has
a fruitful geometric interpretation. The module is divided into three
parts. Part I introduces a number system that will be new to many
students. Part II introduces matrix arithmetic over this number system,
as well as over the usual real number system. Part III develops a
geometric interpretation for matrix arithmetic and systems of equations
over the real numbers. Students will be expected to develop their
understanding of the topics through extensive calculation rather than
through formal theory.
Online Calculator:
This
online
calculator will help with all your modular arithmetic calculations.
Algebra lectures 2014-15:
The algebra lecture slides will be
uploaded to the web after each lecture and links to the slides will be
given below. A brief outline of each lecture will be added below
shortly after each lecture.
Here is some
student feedback after the first six weeks. I'll try to respond to
the criticisms as best I can.
1
|
Lecture
1:
Introduction to modular arithmetic. An application to the ISBN book
number was explained.
For another introduction to modular arithmetic take a look at this Youtube clip.
Then
take a look at this
clip, this
clip
and this clip |
2
|
Lecture
2:
Explained Euclid's algorithm for finding the greatest common divisor of
two numbers, and used it to find the inverse of some number n modulo m.
An application of modular arithmetic to IBAN bank numbers was explained.
Take a look at
this clip
for another
example of using the Euclidean algorithm to find the inverse of a
number in modular arithmetic.
For more background on modular arithmetic take a look at the wikipedia
page
here.
|
3
|
Lecture
3:
Explained the basic ideas underlying cryptography. Discussed the Enigma
machine and an affine cryptosystem on single letter message units.
For more background on the Enigma machine take a look at the wikipedia
page
here.
For more background on affine cryptosystems take a look at the
wikipedia page
here.
|
4
|
Lecture
4:
Deciphered an enciphered message sent from Agent 007.
|
5
|
Lecture
5:
Explained the Chinese Remainder Theorem.
For more background on the Chinese Remainder Theorem take a look at the
wikipedia page
here.
Also, take a look at this youtube
explanation which uses easily calculated numbers,
|
6
|
Lecture
6:
Introduced Euler's phi (or totient) function.
For more background on Euler's phi function take a look at the
wikipedia page
here.
|
7
|
Lecture
7:
Explained the RSA public key cryptosystem.
For more background on the RSA cryptosystem take a look at the
wikipedia page
here.
|
8
|
Lecture
8:
Stated and illustrated Euler's Theorem. Then stated and proved a
special case known as Fermat's little theorem.
For more background on Euler's Theorem take a look at the wikipedia
page
here.
For more background on Fermat's little heorem take a look at the
wikipedia page
here.
|
9
|
Lecture
9:
Introduced the notion of a matrix and the operations of addition,
subtraction and multiplication.
For more background on matrix addition look at the wikipedia page
here.
For more background on matrix multiplication look at the wikipedia page
here.
Take a look at
this clip
for examples of matrix multiplication.
|
10
|
Lecture
10 (part 1) and
Lecture 10 (part 2):
Explained the notion of an affine matrix cryptosystem.
|
11
|
Lecture
11:
Deciphered a ciphertext obtained from an affine matrix cryptosystem. In
the process I got lots of practice of matrix multiplication.
|
12
|
Lecture
12:
Introduced the concept of a linear transformation of the plane. Showed that reflection in a line through the origin is a linear transormation.
For more background on linear transformations take a look at the Open
Corseware notes from MIT
here.
|
13
|
Lecture
13:
Explained why every linear transformation of the plane can be represented by a 2x2 matrix. Stated a theorem that asserts that composition of transformations corresponds to multiplication of matrices. Matrix multiplication has been invented just so that this theorem is true.
I didn't get around to deriving the matrix representing rotation through an angle theta about the origin. See the slides of a previous year's lecture for this important derivation.
|
14
|
Lecture
14:
Illustrated the Gauss-Jordan method for inverting a matrix. The method uses a sequence of row operations. |
15
|
Lecture
15:
Explained why the Gauss-Jordan method for finding the inverse of a matrix works.
Gave an example to illustrate that row operations can be used to solve systems of linear equations arising from "real life" problems.
For more background on systems of linear equations take a look at the wikipedia page
here.
|
16
|
Lecture
16:
Defined the determinant and adjoint of a 2x2 matrix. Gave a formula for the inverse of a 2x2 matrix in terms of its determinant and adjoint. Explained that the determinant of a 2x2 matrix is equal to the area of a certain parallelogram up to sign. |
17
|
Lecture
17:
Proved that the determinant of a 2x2 matrix is equal to the area of a certain parallelogram up to sign. Then introduced and illustrated the notions of eigenvector and eigenvalue of a matrix. |
18
|
Lecture
18:
Explained how eigenvectors are involved in Google's page rank algorithm. (I intensionally over simplified the explanation. In particular, the importance In of a page is determined from the full network of pages on the internet and not just those [8 in my explanation] containg the given searched words.)
More details on the page rank algorithm can be found here.
Also stated and illustrated the important Hamilton-Cayley Theorem. |
19
|
Lecture
19:
Explained how to find eigenvalues of a 2x2 matrix using the characteristic equation. Explained how to find eigenvectors for the given eigenvalues.
Derived the recurrence relation Fn = Fn-1 + Fn-2 for the number of rabbits in a field after n months, based on some assumptions about rabbit breeding. |
20
|
Lecture
20:
Talked about various occurences of the Golden Ratio. |
21
|
Lecture
21:
Explained how to express a suitable 2x2 matrix A in the form A=T-1 D T where D is diagonal. Here "suitable" means that A must have two eigenvectors such that the matrix T containing the two eigenvectors as columns is invertible.
Used the above expression to find a formula for the terms Fn in the Fibonacci sequence. |
22
|
Lecture
22:
Used eigenvalues and eigenvectors to study a diseased population of frogs. |
23
|
Lecture
23:
Did some revision. |
24
|
Lecture
Sem II:
This is a Semester II lecture about the validity of logical arguments.
|
Algebra lectures 2012-13:
The course content is similar to that of 2012-13 and 2011-12. Links to
lecture slides from that year are available below.
Lecture
1
(2012-13): Introduction to modular aritmetic.
This lecture had to be repeated due to a timetable mixup. So these
slides are a compilation of the original lecture and the repeat
lecture.
Lecture
1 (2011-12): Introduction
to the course. Introduction to modular
aritmetic.
The notions of multiplicative inverse n-1 and additive
inverse -n modulo m were explained. The ISBN number was explained. The
lecture was short due to a power failure, so the IBAN was only
partially explained!
Take a look at the Wikipedia for a
good
introduction to modular arithmetic.
Lecture
2 (2012-13):
Lecture
2 (2011-12):
Explanation of a validation test for
International Bank Accounts
Numbers (IBANs) using arithmetic mod 97. Explanation of how the mod 97
value of a large integer can be calculated by hand. Introduction to
cryptography (U-boats, Bletchley Park, secure internet pages etc.) and
an example of a simple affine cryptosystem over a 26-letter alphabet in
which message units are single letters. Some mod 26 calculations show
that the composite of the enciphering function f(n) with the
deciphering function f'(n) yields the identity function f'(f(n)) = n.
Lecture
3 (2012-13):
Attacked and decoded a
ciphertext
sent using an affine cryptosystem
with single letter message units. As part of the attack the Euclidean
algorithm was used to find the inverse of an integer n modulo m. A
careful analysis of this method for finding an inverse shows that a
number n has an inverse modulo m if and only if gcd(m,n)=1.
Lecture
3
(2011-12):
See here
for an obituary of Peter Hilton - Codebreaker and Mathematician. He
worked at Bletchley Park during World War II.
Lecture
4 (2012-13 & 2011-12):
A lady has a basket of eggs. If she
packs them in boxes containing
exactly 13 eggs she can pack all but 3 eggs. If she packs them in boxes
of 14 she can pack all but 6 eggs. If she packs them in boxes of 15 she
can pack all but 9 eggs. In order to determine the least possible
number of eggs she could have we used the Chinese Remainder Theorem.
(It's fun to use this theorem but a bit boring to state it. So we used
it without stating it!)
At the start of the lecture we computed the last digit of a large power
of an integer.
Take a look at the Wikepedia for a good
account of the Chinese Remainder Theorem.
Lecture
5 (2011-12): RSA public key cryptography and Euler's Phi function.
Lecture
6 (2011-12): RSA Cryptography and Euler's Theorem.
Lecture
5 (2012-13). Here are the photos of those who attended this
lecture on 27 September 2012.
Photo
1,
Photo
2,
Photo
3.
Lecture
6 (2012-13).
(
Some may also find it useful to look at the three
lectures 1,
2,
3
on RSA cryptography given in 2010-11.)
Lecture
7 (2011-12):
Deciphered a message sent to me using the RSA system. Explained how RSA
can be used to sign/authenticate documents electronically. Stated and
proved a special case of Euler's Theorem known as Fermat's Little
Theorem.
(Those who'd like to see a proof of the proposition (x^e)^d = x mod n
satisfied by the integers e,d,n used in RSA cryptography could take a
look at the second part of this
lecture which I gave last year.)
Lecture
8 (2011-12):
Recalled the notion of an mxn matrix (m rows, n columns). Recalled
addition/subtraction of two mxn matrices, and multiplication AB of an
mxn matrix A with a nxp matrix B. Recalled the notions of: zero matrix,
identity matrix, inverse matrix. From the definition of an inverse
matrix we evaluated the inverse of a 2x2 matrix modulo 5.
Lecture
9 (2011-12):
Gave the formula for the inverse of a 2x2 matrix, and indicated its
importance in affine encryption systems with message units of length 2.
Lecture
10 (2011-12):
Used the inverse of a 2x2 matrix modulo 37 to attack an affine
cryptosystem with 2-letter message units. We finished off the attack
using a computer implementation of the cryptosystem.
Lecture
11 (2011-12):
Introduced the notion of a linear transformation and gave various
examples. Also gave an example of a transformations which is not
linear.
Lecture
12 (2011-12):
Proved that any linear transformation can be represaented by a matrix.
Stated (without proof) that any reflection in a line through the origin
is linear, as is any rotation about the origin. Noted that if S, T are
two linear transformations represented by matrices A, B, then the
composite transformation SoT: v ->S(T(v)) is represented by the
matrix product AB. Derived the matrix representing an anticlockwise
rotation through an angle theta about the origin.
Lecture
13 (2011-12):
Illustrated the Gauss-Jordan method for finding the inverse of a square
matrix. The method is based on three types of row operations: i) Add a
multiplie of one row to a different row; ii) interchange two rows;
(iii) multiply a row by a non-zero (i.e. invertible!!) scalar.
Lecture
14 (2011-12):
Explained how each of the three row operations can be represented as
pre-multiplication by a suitable matrix. Then proved that the
Gauss-Jordan method always yields the inverse of a matrix when an
inverse exists. (The proof incorporates a hidden assumption which is
true but a bit tricky to prove. Please do try to spot the hidden
assumption!) Finished off by explaining how systems of
linear equations arise in real life, and how row operations can be used
to solve such systems.
Lecture
15 (2011-12):
Gave the definition and some basic properties of the determinant of a
2x2 matrix.
Lecture
16 (2011-12):
Proved that the determinant of a 2x2 matrix is equal to the area of a
parallelogram (up to sign). Then gave the definition of an eigenvalue
and eigenvector, together with examples and a method for computing
eigenvalues and vectors.
Lecture
17 (2011-12):
Motivated by a problem of mathematically modelling a field of breeding
rabbits, we used eigenvalues and eigenvectors to study the Fibonacci
sequence and the Golden Ratio.
Lecture
18 (2011-12):
Started with three equivalent definitions of the Golden Ratio, and
mentioned its role in aesthetics. The used eigenvectors to find a
closed formula for the n-th term of the Fibonacci sequence.
Lecture
19 (2011-12):
Motivated by a problem of mathematically modelling an island of
infected frogs, the notion of a Markov matrix and Markov process was
introduced and used to study the long term prognosis for the island's
frog population.
Lecture
20 (2011-12):
Starting from a model of the internet as a collection of nodes, and
arrows from one node to another, we saw how the eigenvector
corresponding to the largest eigenvalue of a certain Markov matrix
gives the ranking produced by a Google search. The very important
Hamilton Cayley Theorem was squaezed in at the end of the lecture.
See this link
for a more detailed account of Google's page rank algorithm.
In Lectures 21 and 22 (2011-12) I worked through some old exam
questions (and
found a slip in one of them)!