Book Image

Practical Discrete Mathematics

By : Ryan T. White, Archana Tikayat Ray
Book Image

Practical Discrete Mathematics

By: Ryan T. White, Archana Tikayat Ray

Overview of this book

Discrete mathematics deals with studying countable, distinct elements, and its principles are widely used in building algorithms for computer science and data science. The knowledge of discrete math concepts will help you understand the algorithms, binary, and general mathematics that sit at the core of data-driven tasks. Practical Discrete Mathematics is a comprehensive introduction for those who are new to the mathematics of countable objects. This book will help you get up to speed with using discrete math principles to take your computer science skills to a more advanced level. As you learn the language of discrete mathematics, you’ll also cover methods crucial to studying and describing computer science and machine learning objects and algorithms. The chapters that follow will guide you through how memory and CPUs work. In addition to this, you’ll understand how to analyze data for useful patterns, before finally exploring how to apply math concepts in network routing, web searching, and data science. By the end of this book, you’ll have a deeper understanding of discrete math and its applications in computer science, and be ready to work on real-world algorithm development and machine learning.
Table of Contents (17 chapters)
1
Part I – Basic Concepts of Discrete Math
7
Part II – Implementing Discrete Mathematics in Data and Computer Science
12
Part III – Real-World Applications of Discrete Mathematics

Efficacy of brute-force algorithms

A combination lock requires you to input three numbers from, say, 0 to 9 to open the lock. One approach to open it if you forget the password is to try (0, 0, 0), then (0, 0, 1), then (0, 0, 2), and so on. This method is guaranteed to succeed if we have enough patience to test all permutations of 0 through 9 for each of the three numbers. This is a brute-force algorithm: a trial-and-error approach to solving a problem where you simply guess the answer over and over until you get it right. Of course, this is very tedious for a combination lock, but brute-force approaches are actually sometimes practical, especially when using computers.

Example – Caesar cipher

Roman emperor and general Julius Caesar is said to have been one of the earliest users of encryption in the form of coded messages. Now called the Caesar cipher, his method was to write the message and then shift the alphabet by some specified number of letters. For example, he might...