Term 2, but not given in 2007/08

advertisement
MT5420 Advanced Quantum Theory (Term 2: Dr F Mota-Furtado)
Prerequisite:
Teaching:
Assessment:
An undergraduate course in quantum theory
33hr lectures, 167hr private study, including
2hr written examination
problem sheets
Aims




To derive methods, such as the Rayleigh-Ritz variational principle and perturbation theory, in
order to obtain approximate solutions of the Schrödinger equation.
To introduce spin and the Pauli exclusion principle and hence explain the mathematical basis
of the Periodic table of elements.
To introduce the quantum theory of the interaction of electromagnetic radiation with matter
using time dependent perturbation theory.
To show how scattering theory is used to probe interactions between particles and hence to
show how the probability or cross section for a scattering event to occur can be derived from
quantum theory.
Learning outcomes
On completion of the course students should be able to:
 use various methods to obtain approximate eigenvalues and eigenfunctions of any given
Schrödinger equation,
 to understand the importance of spin in quantum theory,
 to appreciate how the Periodic Table of elements follows from quantum theory,
 to write down the Schrödinger equation for the interaction of electromagnetic radiation with
the hydrogen atom and to work out photoabsorption cross sections for hydrogen,
 to define the scattering cross section and to work it out for some simple systems.
Content
Variational principles in quantum mechanics: the Rayleigh-Ritz variational principle. Bounds on
energy levels for quantum systems.
Perturbation theory: Rayleigh-Schrödinger time-independent perturbation theory. Perturbations
of energy levels due to external electromagnetic fields.
The electron’s spin: the eigenfunctions and eigenvalues of the spin operator. The Pauli exclusion
principle. The periodic table of elements. Spin precession in an external magnetic field.
Radiative transitions: the absorption and emission of electromagnetic radiation by matter.
Photoabsorption cross-sections for the hydrogen atom.
Scattering theory: definition of the scattering cross-section and the scattering amplitude.
Decomposition of the scattering amplitude into partial waves. Phase shifts and the S-matrix.
Integral representations of the scattering amplitude. The Born approximation. Potential
scattering.
Indicative texts
Quantum Physics – S Gasiorowicz (Wiley 1974) Library reference 530.12 GAS
Quantum Mechanics – P C W Davies (Chapman and Hall 1984)
Library reference 530.12 DAV
1
MT5421
Aerodynamics and Geophysical fluid dynamics (Term 2, but
not given in 2007/08)
Prerequisite: MT322 or other undergraduate course in fluid mechanics.
Teaching:
33hr lectures, 167hr private study, including problem sheets
Assessment: 2hr written examination
Aims
This course aims to show how the mathematical models of MT222 and MT322 are successful
in describing how aircraft are able to fly, and how the motions of the atmosphere and the
oceans are caused. It also gives insight into the effect that individual terms in the
mathematical model may have on the behaviour of the whole system.
Learning outcomes
At the end of the course the students should be able to
 derive the freezing-in of vortex lines for incompressible fluids;
 use complex variable theory to derive the formula for lift on an infinite cylinder;
 explain in broad terms how an aircraft is able to fly;
 understand the role of Coriolis and centrifugal forces in a rotating fluid;
 describe how rotation causes various phenomena in fluids;
 solve the simple equations for motion in an Ekman layer.
Content
Vortex dynamics: freezing-in of vortex lines, why vorticity can be treated as a pollutant.
Examples.
Flow past wing sections: two-dimensional flow, flow at sharp corners, generation of lift.
Blasius’ formula. Three-dimensional flows, trailing vortices, induced drag. Supersonic flow
past wing sections.
Rotating fluid systems: equation of motion of a rotating fluid. Geostrophic flow and simple
properties. Secondary flow and examples (e.g. meanders, tea leaves in a cup). Inertial
waves.
Viscosity-rotation interactions: Ekman layers and boundary fluxes.
The atmosphere and oceans: large-scale motions and the role of Coriolis forces. Tornado
generation. Effects of the earth’s curvature and induced waves.
Indicative text
Fluid Mechanics – P K Kundu and I M Cohen (Academic Press 2002) Library ref. 532 KUN
2
MT5422
Advanced Electromagnetism and Special Relativity (Term 1,
but not given in 2007/08)
Prerequisite: An undergraduate course in Electromagnetism (MT324 may be taken at the
same time)
Teaching:
33hr lectures, 167hr private study, including problem sheets
Assessment: 2hr written examination
Aims
 To show how Maxwell’s equations lead to electromagnetic waves and indirectly to the
special theory of relativity;
 To show how electromagnetic fields propagate with the speed of light;
 To derive the laws of optics from Maxwell’s equations;
 To show how the laws of special relativity lead to time dilation and length contraction.
Learning outcomes
On completion of the course students should be able to
 use Maxwell’s equations to demonstrate the polarization, reflection and refraction of
electromagnetic waves;
 understand the fundamental ideas of electromagnetic radiation;
 demonstrate the Galilean non-invariance and Lorentz invariance of Maxwell’s equations;
 derive the fundamental properties of relativistic optics.
Content
Electromagnetic theory: electromagnetic waves, reflection and refraction with both normal
and oblique incidence, total internal reflection, waves in conducting media, wave guides.
Radiation: the Hertz vector and related field strengths, fields of moving charges, LienhardWiechart potentials, motion of charged particles.
Special relativity: the Lorentz transformation. Relativistic invariance, the Fitzgerald
contraction, time dilation. Relativistic electromagnetic theory: Lorentz invariance of
Maxwell’s equations, the transformation of E and B . Relativistic mechanics: mass,
momentum, energy. Relativistic optics: aberration, the Doppler effect.
Indicative text
Foundations of Electromagnetic Theory (Fourth Edition) – J R Reitz, F J Milford and R W
Christy (Addison-Wesley 1993) Library reference 538.141 REI.
3
MT5423 Magnetohydrodynamics (Term 2)
Prerequisite: An undergraduate course in fluid dynamics.
Teaching: 33hr lectures, 167 hours private study
Assessment: 2hr written examination
Aims
This course aims to introduce the study of the motion of conducting fluids in
the presence of a magnetic field. Practical applications and a discussion of
the structure of sunspots and the origin of the Earth’s magnetic field will be
given.
Learning outcomes
On completion of the course the student should be able to:
 demonstrate an understanding of the basic principles of MHD;
 apply appropriate mathematical techniques to solve a wide variety of
problems in MHD.
Content
Foundations of Magnetohydrodynamics (MHD):
Consideration of the
electrodynamics of moving media and MHD approximations, leading to the
induction equation - an equation central to MHD. Alfvén's theorem for a
medium of infinite electrical conductivity - its proof and physical importance.
The necessity for an additional term in the equation of motion - the
electromagnetic body force.
Alternative description in terms of
electromagnetic stresses.
MHD waves: Alfvén waves in a medium of infinite electrical conductivity,
reflection and transmission at a discontinuity in density, effect of finite
electrical conductivity and/or viscosity, waves in a compressible medium.
MHD shock waves.
Steady flow problems: including Hartmann flow.
Magnetohydrostatics: Pressure balanced configurations. Force-free fields.
Indicative Texts
An Introduction to Magneto-fluid Mechanics  V C A Ferraro & C Plumpton
(2nd edition) (OUP 1966). Library Ref. 538.6 FER
An Introduction to Magnetohydrodynamics – P A Davidson (CUP 2001). Library Ref. 538.6
DA
4
MT5441 Channels (Term 1)
Prerequisite: Undergraduate courses on coding theory and abstract algebra
Teaching:
33hr lectures and seminars, 167hr private study, including problem sheets
Assessment: 2hr examination
Aims
To investigate the problems of data compression and information transmission in both
noiseless and noisy environments.
Learning outcomes
On completion of the course, students should be able to:
 state and derive a range of information-theoretic equalities and inequalities;
 explain data-compression techniques for ergodic as well as memoryless sources;
 explain the asymptotic equipartition property of ergodic systems;
 understand the proof of the noiseless coding theorem;
 define and use the concept of channel capacity of a noisy channel;
 explain and apply the noisy channel coding theorem;
 evaluate and understand a range of further applications of the theory.
Content
Entropy: Definition and mathematical properties of entropy, information and mutual
information.
Noiseless coding: Memoryless sources: proof of the Kraft inequality for uniquely
decipherable codes, proof of the optimality of Huffman codes, typical sequences of a
memoryless source, the fixed-length coding theorem.
Ergodic sources: entropy rate, the asymptotic equipartition property, the noiseless coding
theorem for ergodic sources.
Lempel-Ziv coding.
Noisy coding: Noisy channels, the noisy channel coding theorem, channel capacity.
Further topics, such as hash codes, or the information-theoretic approach to cryptography
and authentication.
Indicative Texts
Codes and Cryptography  D Welsh (Oxford UP). Library Ref. 001.5436 WEL
Elements of Information Theory  T M Cover and J A Thomas (Wiley).
Library Ref. 001.539 COV
Information Theory, Inference and Learning Algorithms – D J C MacKay (Cambridge UP).
Library Ref. 001.539 MAC
5
MT5445
Quantum Information Theory (Term 2)
Prerequisite: Undergraduate courses in linear algebra and probability
Teaching:
33hr lectures, 167hr private study, including problem sheets
Assessment: 2hr written examination
Aims
'Anybody who is not shocked by quantum theory has not understood it' (Niels Bohr). This
course aims to provide a sufficient understanding of quantum theory in the spirit of the above
quote. Many applications of the novel field of quantum information theory can be studied
using undergraduate mathematics. The course relies almost exclusively on tools from linear
algebra – prior knowledge of applied mathematics or quantum theory is neither required nor
particularly useful.
Learning outcomes
On completion of the course the student should be able to:
 demonstrate a comprehensive understanding of the principles of quantum superposition
and quantum measurement;
 use the basic linear algebra tools of quantum information theory confidently;
 manipulate tensor-product states and use and explain the concept of entanglement;
 explain applications of entanglement such as quantum teleportation or quantum secret key
distribution;
 describe the Einstein-Podolsky-Rosen paradox and derive a Bell inequality;
 solve a range of problems involving one or two quantum bits;
 discuss Deutsch's algorithm and its implications for the power of a quantum computer;
 understand and apply Grover’s search algorithm.
Content
Linear algebra: Complex vector space, inner product, Dirac notation, projection operators,
unitary operators, Hermitian operators, Pauli matrices.
One qubit: Pure states of a qubit, the Poincaré sphere, von Neumann measurements,
quantum logic gates for a single qubit.
Tensor products: 2 qubits, 3 qubits, quantum logic gates for 2 qubits, Deutsch's algorithm,
the Schmidt decomposition.
Mixed states: Partial trace, probability, entropy, von Neumann entropy.
Entanglement:
The Einstein-Podolsky-Rosen paradox, Bell inequalities, quantum
teleportation, measures of entanglement, decoherence.
Grover's search algorithm, and applications.
Further applications, such as e.g. the quantum Fourier transform, Shor's factoring
algorithm, the BB84 key distribution protocol, quantum channel capacity, the Holevo bound.
Indicative Text
M A Nielsen and I L Chuang – Quantum Computation and Quantum Information (Cambridge
2000). Library Ref. 001.64 NIE
6
MT5447
Advanced Financial Mathematics (Term 2)
Prerequisite: An undergraduate course covering statistics, the ideas of risk and return in
finance, stochastic calculus and the basics of derivative pricing.
Teaching:
33hr lectures, 167hr private study, including problem sheets
Assessment: 2hr written examination
Aims
 To investigate the validity of various linear and non-linear time series occurring in
finance;
 To extend the use of stochastic calculus to interest rate movements and credit rating;
Learning outcomes
On completion of the course, students should:
 make use of some of the ARCH (autoregressive conditionally heteroscedastic) family of
models in time series;
 appreciate the ideas behind the use of the BDS test and the bispectral test for time series.
 understand the partial differential equation for interest rates and the assumptions that lead
to it;
 be able to model forward and spot rates;
 understand how a Poisson process can be included to model the possibility of default on a
bond or similar asset.
Content
Financial time series: Linear time series: ARMA and ARIMA models, stationarity,
autoregressions. Testing of linearity, using spectral analysis. ARCH and GARCH models.
Structure of financial series: The random walk model, trend and volatility, moments.
Comparison with chaotic systems, dimensionality and memory effects in financial series.
The nearest neighbour algorithm and the BDS test.
Interest rate analysis: Revision of ideas in stochastic calculus. Modelling of interest rates,
the bond pricing equation. Bond derivatives. The Heath-Jarrow-Morton model.
Credit risk: Modelling of default probabilities. The equation for a risky bond.
Indicative Texts
The Econometric Modelling of Financial Time Series – T C Mills (Cambridge UP 1999)
Library ref. 330.0151 MIL
Paul Wilmott Introduces Quantitative Finance – P Wilmott (Wiley 2001)
Library ref. 332.632 WIL
Market Models – C Alexander (Wiley 2001) Library ref. 332.6 ALE
7
MT5454
Combinatorics (Term 1)
Prerequisite : An undergraduate course in Discrete Mathematics
Teaching: 33hr lectures and seminars, 167hr private study, including problem sheets
Assessment: 2hr written examination
Aims: To introduce the standard techniques of combinatorics, including
 methods of counting: generating functions, induction, subdivision;
 Principle of Inclusion and Exclusion;
 partitions, Ramsey and Polya Theory.
Learning Outcomes:
On completion of the course, students should be able to:
 find small partition numbers;
 perform simple calculations with generating functions;.
 understand Ramsey numbers and calculate upper bounds for these (where practical);
 calculate sets by inclusion and exclusion and understand the applications to number
theory;
 calculate cycle indexes for the standard groups and the numbers of distinct configurations
of symmetrical objects.
Content
Enumeration: Binomial identities. The Principle of Inclusion-Exclusion with applications to
number theory. Rook polynomials. Posets and lattices. The Möbius function of a lattice.
Generating functions: Linear recursion. Power series and ordinary generating functions.
Partitions and partition identities.
Ramsey Theory: Monochromatic subsets, Ramsey numbers and Ramsey's Theorem.
Polya Theory: Automorphisms of graphs. The Orbits-Stabiliser Theorem, and the Orbit
Counting Lemma. Cycle index of a permutation group. Polya's Theorem.
Indicative Texts
Discrete Mathematics  N.L. Biggs (Oxford UP, 1989); Library reference 510 BIG.
Combinatorics: Topics, Techniques, Algorithms – P.J. Cameron (Cambridge UP, 1994);
Library reference 512.23 CAM.
8
MT5461
Theory of Error-Correcting Codes (Term 2)
Prerequisite: Undergraduate courses covering linear algebra and probability.
Teaching:
33hr lectures and seminars, 167hr private study, including problem sheets
Assessment: 2hr written examination
Aims
To provide an introduction to the theory of error correcting codes employing the methods of
elementary enumeration, linear algebra and finite fields.
Learning Outcomes
On completion of the course, students should be able to:
 calculate the probability of error of the necessity of retransmission under various
assumptions for a binary symmetric channel with given cross-over probability;
 prove and apply various bounds on the number of possible code words in a code of given
length and difference;
 reduce a linear code to standard form, finding a parity check matrix, building standard
array and syndrome decoding tables, including for partial decoding;
 use MOLSs to construct large linear codes of certain parameters;
 know/prove/apply the theorem that a cyclic code of length n over a field consists of the
code words corresponding to all multiples of any factor of x n 1 ;
 understand the structure of BCH code;
 know/prove/apply the Peterson-Zierler decoding algorithm.
Content
Discrete communication channels; Shannon’s coding theorem. Theory of linear block codes
with special examples. Matrix description,. Standard arrays and Hamming codes, perfect
codes. Packing points in Vn(q) - Hamming, Singleton, Plotkin, and Gilbert-Varshamov
bounds. Structure of finite fields. Cyclic codes, polynomial description. BCH codes, RS
codes. Decoding techniques.
Indicative Texts
A First Course in Coding Theory  Ray Hill (OUP). Library Ref. 001.539 HIL
Coding Theory – a First Course  S Ling and C Xing (Cambridge UP 2004) Library Ref.
001.539 Lin
9
MT5462
Advanced Cipher Systems (Term 1)
Prerequisite: Undergraduate courses covering linear algebra and probability.
Teaching:
33hr lectures and seminars, 167hr private study, including problem sheets
Assessment: 2hr written examination
Aims
To introduce both symmetric key cipher systems and public key cryptography covering
methods of obtaining the two objectives of privacy and authentication.
Learning Outcomes
On completion of the course the student should be able to:
 understand the concepts of secure communications and cipher systems;
 understand and use statistical information and the concept of entropy in the cryptanalysis
of cipher systems;
 understand the structure of stream ciphers and block ciphers;
 know how to construct as well as have an appreciation of desirable properties of key
stream generators, understand and manipulate the concept of perfect secrecy;
 understand the modes of operation of block ciphers and their properties;
 understand the concept of public key cryptography, including details of the RSA and
ElGamal cryptosystems both in the description of the schemes and in their cryptanalysis;
 understand the concepts of authentication, identification and signature, be familiar with
techniques that provide these, including one way functions, hash functions and interactive
protocols, including the Fiat-Shamir scheme;
 understand the problems of key management, be aware of key distribution techniques.
Content
Examples of ciphers. Mathematical and statistical aspects of cipher systems. Substitution
ciphers; Shannon’s theory; stream and block ciphers; public key systems;
authentication/identification; digital signatures.
Indicative Text
Codes and Cryptography – D Welsh (Oxford UP 1988). Library Ref. 001.5436 WEL
Cipher Systems – H J Beker and F C Piper (Van Nostrand 1982)
10
MT5464
Operational Research Methodology (Term 1)
Prerequisite: Undergraduate courses covering linear algebra and probability.
Teaching:
33hr lectures, discussion classes and seminars, 167hr private study.
Assessment: The candidate writes two short reports (about 2500 words) on case studies
chosen from a list provided by the lecturer (25% each), a longer report (about 5000 words) on
a topic chosen by the student with the agreement of the lecturer (40%), and an oral
examination (10%).
Aims
 to show how the mathematical techniques of OR (such as mathematical programming,
combinatorial optimization, statistics and others), have been used in real situations;
 to develop a critical faculty, so that students can distinguish between good and bad
approaches to a problem;
 to look at some of the factors important in the relationship between analyst and client;
 to give practice in obtaining information from journals
 to improve communication skills.
Learning Outcomes
On completion of the course the student should be able to:
 be able to make constructive criticism based on the published description of an OR
project;
 decide whether a problem has been tackled by a suitable method, and whether or not a
satisfactory solution has been found;
 see what the client would understand by ‘a good solution’;
 collect information from journals, books, people and other sources and decide what is
appropriate;
 write a coherent report on what they have found;
 talk about their report.
Content
This course discusses the problems faced by the OR analyst; problem formulation, choice of
methodology, communication with the client, social aspects and also how techniques work in
practice, and is based on case studies. These are normally taken from papers published in the
twelve months before the course begins.
Indicative Text
None: the course involves reading recent papers, mostly in the Journal of the Operational
Research Society.
11
MT5465
Network Algorithms (Term 2)
Prerequisite: An undergraduate course in Discrete Mathematics
Teaching: 33hr lectures and seminars, 167hr private study, including problem sheets
Assessment: 2hr written examination
Aims
 To introduce the formal idea of an algorithm, when it is a good algorithm and techniques
for constructing algorithms and checking that they work.
 To explore connectivity and colourings of graphs, from an algorithmic perspective.
 To show how algebraic methods such as path algebras and cycle spaces may be used to
solve network problems.
Learning Outcomes
On completion of the course the students should be able to:
 use particular algorithms which optimize various properties for graphs and networks and
prove that they work;
 understand ideas of complexity exemplified in particular by the Travelling Salesman
Problem;
 apply Fleury’s and Tucker’s algorithms to find Eulerian trails;
 find chromatic polynomials and illustrate Vizing’s theorem on edge colourings;
 use path algebra methods to find maximal flows, critical paths and similar problems.
Content
Trees: Algorithms for minimum spanning trees.
Sorting and searching: Sorting methods including bubble sort and heap sort. Depth first
search and breadth first search. Shortest paths.
The Travelling Salesman Problem: Branch and bound method, upper and lower bounds,
approximate methods.
Flows in networks: The max-flow min-cut theorem. An algorithm for finding maximum
flows.
Matching problems: Hall's theorem. Maximum and complete matchings. Alternating paths
and applications. Menger's theorems on edge and vertex connectivity.
Eulerian trails: Algorithms for finding them: Fleury's algorithm; Tucker's algorithm.
Hamiltonian paths: Ore’s and Dirac’s theorems on Hamiltonian cycles.
Colouring graphs: Vertex and edge colourings; chromatic polynomials. Brook's, Vizing's
and König's theorems. Colouring maps, the four-colour theorem.
Path algebras: Definitions, strong and weak closure, matrices over path algebras, absorptive
matrices, applications to various network problems, including critical path analysis
Cycle spaces: Definitions, feasible flows, displacement networks. Maximum flow minimum
cost flows, cost-reducing cycles.
Indicative Texts
Algorithmic Graph Theory  A. Gibbons (Cambridge UP). Library Ref. 512.23 GIB
Discrete Mathematics  N.L. Biggs (Oxford UP). Library Ref. 510 BIG
Graphs and Networks – B. Carré (Oxford UP). Library Ref. 512.23 CAR
12
MT5466
Public Key Cryptography (Term 2)
Prerequisite: MT5485
Teaching:
33hr lectures and seminars, 167hr private study, including problem sheets
Assessment: 2hr written examination
Aims
 To introduce some of the mathematical ideas essential for an understanding of public
key cryptography, such as discrete logarithms, integer factorisation, lattices and
elliptic curves;
 To introduce several important public key cryptosystems, such as RSA, Rabin,
ElGamal, Diffie-Hellman, Schnorr signatures;
 To discuss modern notions of security and attack models for public key
cryptosystems.
Learning outcomes
On completion of the course, students should:
 be familiar with the RSA and Rabin cryptosystems, the hard problems on which their
security relies and certain attacks on them;
 have a basic knowledge of finite fields and elliptic curves over finite fields, and the
discrete logarithm problem in these groups;
 be familiar with cryptosystems based on discrete logarithms, and some algorithms for
solving the discrete logarithm problem;
 know the definition of a lattice and be familiar with the LLL algorithm and some
applications of lattices in cryptography and cryptanalysis;
 be able to define security notions and attack models relevant for modern theoretical
cryptography, such as indistinguishability and adaptive chosen-ciphertext attack.;
 be able to critically analyse cryptosystems;
 have experience with implementing cryptosystems and cryptanalytic methods using a
computer algebra package such as Mathematica.
Content
Background: Integers modulo n; Chinese remainder theorem; finite fields; fast
exponentiation; public key cryptography and security; complexity theory; primality testing
and certificates.
RSA/Rabin: Key generation; implementation; encryption and signatures with OAEP; the
RSA problem and relationship with factoring; square roots modulo a prime; Hastad attack;
Wiener attack; smooth numbers; survey of integer factorisation methods such as p  1
method and index calculus.
Discrete logarithms: Diffie-Hellman; ElGamal encryption; Schnorr signatures; DiffieHellman problem and decision Diffie-Hellman; methods to solve discrete logarithms such as
baby-step-giant-step, Pollard rho and lambda, index calculus.
Lattices: Definition of a lattice; GGH cryptosystems; LLL algorithm; lattice attacks on RSA
with small public or private exponents.
Elliptic curves: Group law; Hasse bound; group structure; ECC protocols; elliptic curve
factorisation and primality certificates; Maurer equivalence of DH and DL.
Indicative Texts
Cryptography: an introduction – Nigel Smart (McGraw Hill) Library Ref. On order
Cryptography theory and practice – Doug Stinson (CRC press, 2nd ed.)
Library Ref. 001.5436 STI
13
MT5473 Advanced Control Theory (Term 1)
Prerequisite: Undergraduate courses in linear algebra and complex variable
Teaching:
40 hours of lectures and examples classes. 160 hours of private study,
including work on problem sheets and examination preparation.
Assessment: 2hr written examination
Aims
 To show how physical control systems can lead to systems of equations.
 To extend the methods of solution available from earlier courses.
 To study the stability of these systems, especially using complex analysis.
 To develop a method for analysing non-linear behaviour of systems.
Learning outcomes
On completion of the course the student should be able to
 to show how physical systems can be described in terms of block diagrams.
 to get the differential equations describing linear systems in the standard form.
 to show how these equations can be solved (i) using Laplace transforms or z-transforms;
(ii) using a matrix exponential in the time-independent case; (iii) using transfer functions;
(iv) expressing the solution in terms of the Fundamental Matrix.
 to define different types of stability including asymptotic and BIBO stability; to apply the
methods to examples.
 to examine stability using poles of the transfer function, the Routh criterion, the circle
criterion, and Nyquist plots.
 to establish criteria (in terms of rank) for the complete controllability and for the complete
observability of linear systems, and to apply these to examples.
 to use describing functions to deal with non-linear systems.
Content
State space: the underlying concepts of state, control and output variables, open and closed
loop control. Discrete and continuous time systems. Solution of time-independent and timedependent controlled equations, using matrix, Laplace transform and z-transform techniques
as appropriate. Transfer functions. Realizations of a system.
Controllability and observability: criteria for controllability and observability: duality.
Minimal realizations.
Stability: eigenvalue analysis. Routh analysis. Root locus method. Nyquist criterion and
the circle criterion. Relocation of poles.
Optimal control: dynamic programming approach; time-independent and dependent
systems. Pontryagin's Theorem (statement). Constrained control, using Lagrange multiplier
approach. Bang-bang control.
Non-linear systems: periodic behaviour, use of Fourier series, describing functions, relays,
saturation and hysteresis.
Indicative Texts
Introduction to Mathematical Control Theory  S. Barnett (Oxford). Library Ref. 519.3 BAR
Introduction to Control Theory  O.L.R. Jacobs (Macmillan). Library Ref. 519.3 JAC
14
MT5485
Applications of Field Theory (Term 1)
Prerequisite: An undergraduate course covering the elementary theory of groups, rings and
fields.
Teaching:
33hr lectures and seminars, 167hr private study, including problem sheets
Assessment: 2hr written examination
Aims: To introduce some of the basic theory of extension fields, with special emphasis on
finite fields and their applications.
Learning Outcomes:
On completion of the course, students should be able to:
 understand simple field extensions of finite degree;
 classify finite fields and determine the number of irreducible polynomials over a finite
field;
 state the fundamental theorem of Galois theory for finite fields;
 compute in a finite field;
 understand some of the applications of fields.
Content (Other than the first section, all topics refer to finite fields only, unless otherwise
specified.)
Extension theory: Polynomial factorisation. Field extensions. Simple extensions. The
degree of an extension. Applications to ruler and compass constructions.
Classifying finite fields: The number of irreducible polynomials. Existence and uniqueness
of finite fields. Concrete representations of a finite field.
The structure of finite fields: Roots of irreducible polynomials and the Frobenius
automorphism. Cyclotomic polynomials. The Galois correspondence for finite fields. An
indication of Galois correspondence for general fields. The norm and trace of an element.
Applications to m-sequences. Dual and self-dual bases. Normal bases and the normal basis
theorem. Applications to multiplication in finite fields.
Discrete logarithms: The discrete log problem and its applications. The Pohlig-Hellman
and baby step, giant step algorithms.
Indicative Texts
Introduction to Finite Fields and their Applications – R. Lidl and H. Niederreiter (Cambridge
UP, 1994); Library ref. 512.4 LID.
Galois Theory – I. Stewart (Chapman and Hall, 1989); Library ref. 512.4 STE.
15
Academic Session: 2007-8
Status:
Course Value:
MT5492
200 hours
Optional
(ie:Core, or Optional)
Availability:
(state which teaching
Integration and Function Spaces
Term 2
terms)
Recommended:
An undergraduate course in real analysis
None
To provide a unified introduction to integration and to a functional analytic account of the most
important function spaces.
Course Code:
Course Title:
Prerequisites:
Aims:
On completion of the course, students should be able to:
 understand and be able to apply the basic ideas of the Lebesgue integral;
 understand how the basic ideas of functional analysis apply to the classical function
spaces.
Learning
Outcomes:
Measure: Lebesgue outer measure on sets in the real line; it is sub-additive and gives an
interval its length. Measurable sets: these form a sigma algebra on which outer measure is
additive on disjoint countable unions. Hence Lebesgue measure. Regularity of the measure;
approximation by finite sets of intervals. Existence of non-measurable sets
Measurable functions and the Lebesgue integral: Lebesgue integral for measurable
simple functions, hence for non-negative measurable functions.
Fatou’s lemma; Lebesgue Monotone Convergence Theorem. Non-negative measurable
functions are monotone limits of simple functions.
Integration of general measurable functions. Lebesgue’s Dominated Convergence Theorem,
with examples. Comparison of Riemann and Lebesgue integrals. Differentiation of indefinite
integrals, the Lebesgue Density Theorem. Integration of series of functions.
Spaces of functions: Lp space and its norm. Jensen, Holder and Minkowski’s inequalities
( p  1 ). Lp spaces are complete normed spaces (1  p  ) . Continuous and step functions
are dense in Lp. Normed space: linear transformations and their continuity and norms. Dual
spaces. The dual of Lp is Lq where 1/p + 1/q = 1. The dual of L1. L2 as a Hilbert space. The
Course
Content:
least distance theorem and orthogonal complements. Orthonormal sets. L (1,1) and
Legendre Polynomials. Fourier series coefficients; in L2 , Fourier series converge and obey
Parseval’s identity.
2
Teaching
Learning
Methods:
&
Key
Bibliography:
Formative
Assessment &
Feedback:
33 hours of lectures and examples classes.
167 hours of private study, including work on problem sheets and examination preparation.
This may include discussions with the course leader if the student wishes.
G. de Barra – Measure Theory and Integration (Ellis Horwood 1981) Library reference
515.52 DEB
W. Rudin – Real and Complex Analysis (McGraw Hill 1966) Library reference 515.23 RUD
W. Rudin – Functional Analysis (McGraw Hill 1974) Library reference 515.61 RUD
Formative assignments in the form of 8 problem sheets. The students will receive feedback
as written comments on their attempts.
16
Download