proforma mte 3114 - applications of mathematics
TRANSCRIPT
© Cikgu Madrid
Course Pro FormaProgram Ijazah Sarjana Muda Perguruan Dengan Kepujian
(Matematik Pendidikan Rendah)
Course Title Applications of Mathematics(Aplikasi Matematik)
Course Code MTE 3114
Credit 3(2+1)
Contact Hours
60 hours
Language Of Delivery
English
Prerequisite to entry
Nil
Semester One/ Two
Learning outcomes
1. Explore the role of mathematics in modern technologies.
2. Investigate mathematics as an ongoing cultural activity
3. Demonstrate an understanding of the nature of mathematics
and its applications
4. Apply the various mathematical processes and problem solving techniques
Synopsis This course relates students to the earlier mathematics courses. Its contents cover mathematics in every day life, classical codes and ciphers, codes and cryptography, use of mathematical modeling in biology and ecology, and some key mathematical ideas related to calculus.
Kursus ini dikaitkan dengan kursus-kursus matematik yang sebelum ini. Isi kandungannya meliputi matematik di dalam kehidupan harian, kod klasik dan nombor rahsia, kod dan kriptografi, penggunaan model matematik dalam biologi dan ekologi, serta sebahagian idea utama matematik berkaitan dengan kalkulus.
Topic Content Hours
© Cikgu Madrid
1PracticalMathematics in everyday life
Investigate the followingo Role of mathematics in modern
technologieso Mathematics as an ongoing cultural
activityo Bases for contemporary mathematics
Compile the findings Submit a written report
10
2 Mathematical modeling Conduct a mathematical modeling activity
based on the following stepso Specify a real problemo Formulate a mathematical modelo Solve the mathematical problemo Interpret the solutiono Compare with realityo Communicate the results
Group presentation Submit a written report
10
3 Some key mathematical ideas related to calculus Group project
o Explore applications and relations of the following Archimedes’ approximation of π Archimedes’ determination of the area
of a circle Zeno’s paradox Newton’s investigation of cubic curves
o Presentation of project
10
Sub Total 30
Total 60
Assessment Coursework 60%Examination 40 %
Main References
Coutinho, S. C. (1999). The mathematics of ciphers: Numbertheory and RSA Cryptography. Natick, MA: A. K. Peters.
Dym, C. L. (2004). Principles of mathematical modelling. 2nd ed. Boston: Elsevier Academic Press.
© Cikgu Madrid
Haydock, R. (1991). Information and coding. UK: Cambridge.
Stacey, K. & Stillman, G. (2002). Modelling trends in numbers of deaths due to HIV/AIDS infection in USA and Australia. Melbourne: University of Melbourne, CAS-CAT Project.
Wilf, H. S. (1986). Algorithms and complexity. Englewood Cliffs, NJ: Prentice-Hall.
Additional References
Fazekas de St Groth, C., & Solomon, P. J. (1990). Short-term prediction of the AIDS epidemic using empirical models. In P. J. Solomon, C. Fazekas de St Groth, & S. R. Wilson (Eds.), Projections of acquired immune deficiency syndrome in Australia using data to the end of September 1989 (Working Paper No. 16, pp. 11-17). Canberra, ACT: Australian National University, National Centre for Epidemiology and Population Health.
Full Singh, S. (2002). The cracking codebook: How to make it, break it, hack it, crack it. London: Harper Collins.
Hellman, M. E. (1979). The mathematics of public-key cryptography. Scientific American, 241(8), 146–157.
Humphreys, J. F., & Prest, M. Y. (2004). Numbers, groups andcodes. 2nd ed. Cambridge: Cambridge University Press.
Jackson, M. B., & Ramsey, J. R. (1993). Problems for student investigation. MAA Notes. Volume 30. Washington: Mathematical Association of America.
Jackson, T. H. (1987). From number theory to secret codes. Bristol: IOP Publishing.
Malevitch, J., Froelich, G., & Froelich, D. (1991). Codes galore Module #18. Lexington, VA: Consortium for Mathematics and Its Applications (COMAP).
Maynard Smith, J. (1968). Mathematical ideas in biology. London: Cambridge University Press.
Posamentier, A. A., & Lehmann, I. (2004). π: A biography of the world's most mysterious number, Amherst, NY: Prometheus Books.
Trappe, W., & Washington, L. C. (2006). Introduction to cryptography with coding theory. 2nd ed. Upper Saddle River, NJ: Pearson Prentice Hall.
Welsh, D. J. A., (1988). Codes and cryptography. Oxford: Oxford University Press.