الهوامش
الفصل الأول: الفعالية اللامعقولة
(1)
In 2012 the accountancy company Deloitte carried out a survey:
Measuring the Economic Benefits of Mathematical
Science Research in the UK. At that time, 2–8 million people
were employed in mathematical science occupations: pure and applied
mathematics, statistics, and computer science. The mathematical sciences
contributed £208 billion (gross value added) to the UK economy in
that year – just under £250 billion in 2020 money, around $300
billion. Those 2–8 million people made up 10% of the British workforce, and
contributed 16% of the economy. The largest sectors were banking, industrial
research and development, computer services, aerospace, pharmaceuticals,
architecture,and construction. The report’s examples include smartphones,
weather forecasting, healthcare, movie special effects, improving athletic
performance, national security, managing epidemics, Internet data security,
and making manufacturing processes more efficient.
(3)
The formula is
where is the value of the random variable, is the mean, and is the standard deviation.
(4)
Vito Volterra was a mathematician and physicist. In 1926 his
daughter was courting Umberto D’Ancona, a marine biologist, and later they
married. D’Ancona had discovered that during the First World War, the
proportion of predatory fish (sharks, rays, swordfish) that fishermen were
catching increased, even though they were doing less fishing overall.
Volterra wrote down a simple calculus-based model for how the populations of
predators and prey change over time, which showed that the system goes round
and round in a cycle of predator explosions and prey crashes. Crucially,
on average the number of predators
increases, proportionately, more than the number of
prey.
(5)
No doubt Newton used physical intuition as well, and historians
tell us that he probably pinched the idea from Robert Hooke, but there’s no
point in being a one-trick pony.
الفصل الثاني: كيف يختار السياسيون ناخبيهم؟
(1)
www.theguardian.com/commentisfree/2014/oct/09/virginia-gerrymandering-voting-rights-act-black-voters
(2)
Time wasn’t the only issue. At the Constitutional Convention of
1787, which led to the Electoral College system, though not by that name,
James Wilson, James Madison, and others felt that a popular vote would be
best. However, there were practical problems about who would be allowed to
vote, with big differences of opinion between Northern and Southern
states.
(3)
In 1927 E. P. Cox used the same quantity in palaeontology to
assess how round sand grains are, which helps distinguish windblown sand
from waterborne sand, providing evidence for environmental conditions in
prehistoric times. See E. P. Cox. ‘A method of assigning numerical and
percentage values to the degree of roundness of sand grains,’ Journal of Paleontology 1 (1927) 179–183. In
1966 Joseph Schwartzberg proposed using the ratio of the perimeter of a
district to the circumference of the circle of the same area. This is the
reciprocal of the square root of the Polsby-Popper score, so it ranks
districts in the same way, though with different numbers. See J. E.
Schwartzberg, ‘Reapportionment, gerrymanders, and the notion of
“compactness”,’ Minnesota Law Review 50
(1966) 443–452.
(4)
By enclosing a hill, a curved surface, she crammed even more
area into her circle.
(5)
V. Blåsjö,
‘The isoperimetric problem,’ American Mathematical
Monthly 112 (2005) 526–566.
(6)
For a circle of radius ,
(7)
N. Stephanopoulos and E. McGhee, ‘Partisan gerrymandering and
the efficiency gap,’ University of Chicago Law
Review 82 (2015) 831–900.
(8)
M. Bernstein and M. Duchin, ‘A formula goes to court: Partisan
gerrymandering and the efficiency gap,’ Notices of
the American Mathematical Society 64 (2017)
1020–1024.
(9)
J. T. Barton, ‘Improving the efficiency gap,’ Math Horizons 26.1 (2018)
18–21.
(10)
In the early 1960s John Selfridge and John Horton Conway
independently found an envy-free method of cake division for three
players:
-
(1)
Alice cuts the cake into three pieces that she considers of equal value.
-
(2)
Bob either passes, if he thinks two or more pieces are tied for largest, or trims what he considers to be the largest piece to create such a tie. Trimmings are called ‘leftovers’ and set aside.
-
(3)
Charlie, Bob, and Alice, in that order, choose a piece that they think is largest or tied largest. If Bob didn’t pass in step 2 he must choose the trimmed piece, unless Charlie chose it first.
-
(4)
If Bob passed at step 2 there are no leftovers and we’re done. If not, either Bob or Charlie took the trimmed piece. Call this person the ‘non-cutter’ and the other the ‘cutter’. The cutter divides the leftovers into three pieces that he considers equal.
-
(5)
Players choose one of these pieces in the order non-cutter, Alice, cutter. No player has any reason to envy what another player receives: if they do, they got their tactics wrong and should have chosen differently. For a proof, see: en.wikipedia.org/wiki/Selfridge-Conway_procedure.
(11)
S. J. Brams and A. D. Taylor, The
Win-Win Solution: Guaranteeing Fair Shares to Everybody,
Norton, New York (1999).
(12)
Z. Landau, O. Reid, and I. Yershov, ‘A fair division solution
to the problem of redistricting,’ Social Choice and
Welfare 32 (2009) 479–492.
(13)
B. Alexeev and D. G. Mixon, ‘An impossibility theorem for
gerrymandering,’ American Mathematical
Monthly 125 (2018)
878–884.
الفصل الثالث: دع الحمامة تقود الحافلة!
(1)
B. Gibson, M. Wilkinson, and D. Kelly, ‘Let the pigeon drive
the bus: pigeons can plan future routes in a room,’ Animal Cognition (2012) 379–391.
(2)
My favourite example is a politician who made a huge fuss about
money being wasted on what he called ‘lie theory’–pronouncing ‘lie’ as in
‘untruth’, which is what he thought it was about. Not so. Sophus Lie
(pronounced ‘lee’) was a Norwegian mathematician, whose work on continuous
groups of symmetries (Lie groups) and associated algebras (guess what) is
fundamental to large parts of mathematics and even more so to physics. The
politician’s misconception was quickly pointed out … and he carried on
exactly as
before.
(3)
For technical reasons my remark about jigsaws doesn’t solve the
prize problem. If it did, I’d have got there first.
(4)
M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide to the Theory of
NP-Completeness, Freeman, San Francisco
(1979).
(5)
G. Peano, ‘Sur une courbe qui remplit toute une aire plane,’
Mathematische Annalen
36 (1890) 157–160.
(6)
Some care needs to be taken because some real numbers don’t
have unique representations as decimals–for instance 0.500000… = 0.499999….
But that’s easy to sort out.
(7)
E. Netto, ‘Beitrag zur Mannigfaltigkeitslehre,’ Journal für die Reine und Angewandte Mathematik
86 (1879) 263–268.
(8)
H. Sagan, ‘Some reflections on the emergence of space-filling
curves: the way it could have happened and should have happened, but did not
happen,’ Journal of the Franklin
Institute 328 (1991) 419–430. For an explanation, see: A.
Jaffer, ‘Peano space-filling curves,’
http://people.csail.mit.edu/jaffer/Geometry/PSFC
(9)
J. Lawder, ‘The application of space-filling curves to the
storage and retrieval of multi-dimensional data,’ PhD Thesis, Birkbeck
College, London (1999).
(10)
J. Bartholdi, ‘Some combinatorial applications of spacefilling
curves,’
www2.isye.gatech.edu/~jjb/research/mow/mow.html
(11)
H. Hahn, ‘Über die allgemeinste ebene Punktmenge, die
stetiges Bild einer Strecke ist,’ Jahresbericht der Deutschen
Mathematiker-Vereinigung, 23 (1914)
318–322. H. Hahn, ‘Mengentheoretische Charakterisierung der stetigen
Kurven,’ Sitzungsberichte der Kaiserlichen Akademie
der Wissenschaften, Wien 123 (1914) 2433–2489. S.
Mazurkiewicz, ‘O aritmetzacji kontinuów’, Comptes
Rendus de la Société Scientifique de Varsovie 6 (1913)
305–311 and 941–945.
(12)
Published in 1998: S. Arora, M. Sudan, R. Motwani, C. Lund, and
M. Szegedy, ‘Proof verification and the hardness of approximation problems,’
Journal of the Association for Computing
Machinery 45 (1998) 501–555.
(13)
L. Babai, ‘Transparent proofs and limits to approximation,’ in:
First European Congress of Mathematics. Progress
in Mathematics 3 (eds. A. Joseph, F. Mignot, F. Murat, B.
Prum, and R. Rentschler) 31–91, Birkhauser, Basel
(1994).
(14)
C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I.
Goodfellow, and R. Fergus, ‘Intriguing properties of neural networks,’
arXiv:1312.6199 (2013).
(15)
A. Shamir, I. Safran, E. Ronen, and O. Dunkelman, ‘A simple
explanation for the existence of adversarial examples with small Hamming
distance,’ arXiv:1901.10861v1 [cs.LG] (2019).
الفصل الرابع: مسألة كونيجسبرج وزرع الكُلى
(1)
Not to be confused with the graph of a function, which is a
curve relating a variable x to the value of the function. Like the parabola
for .
(2)
Thanks to Robin Wilson for gently pointing this out when I got
it wrong in one of my books.
(3)
Provided you know which region to start from, it’s enough just
to list the bridge symbols, in the order they’re crossed. Consecutive
bridges determine a common region, to which they both
connect.
(4)
This is fairly easy to prove using Euler’s characterisation of
open tours. The main idea is to break a hypothetical closed tour by cutting
out one bridge. Now you have an open tour, and the bridge concerned
originally joined the two ends.
(5)
The rest of this chapter is based on: D. Manlove, ‘Algorithms
for kidney donation,’ London Mathematical Society
Newsletter 475 (March 2018) 19–24.
الفصل الخامس: حلِّق آمنًا في الفضاء الإلكتروني
(1)
The exact date when Fermat stated his Last Theorem isn’t
certain, but it’s often taken to be 1637.
(2)
The same can be said of much ‘applied’ mathematics too.
However, there’s a difference: the attitude of the mathematician. Pure
mathematics is driven by the internal logic of the subject: not merely
monkey curiosity, but a feeling for structure and a sense of where our
understanding has significant gaps. Applied mathematics is mainly driven by
problems arising in the ‘real world’, but it’s more willing to tolerate
unjustified shortcuts and approximations in search of an answer, and the
answer may or may not have practical implications. As this chapter
illustrates, however, a topic that seems completely useless at some moment
in history can suddenly become vital to practical issues when culture or
technology changes. Moreover, mathematics is an interconnected whole; even
the pure/applied distinction is an artificial one. A theorem that seems
useless in its own right may inspire, or even imply, results of great
utility.
(3)
The answer is:
p = 12,277,385,900,723,407,383,112,254,544,721,901,362,713,421, 995,519
q = 97,117,113,276,287,886,345,399,101,127,363,740,261,423,928, 273,451
I found these two primes by trial and error, and multiplied them together, using a symbolic algebra system on a computer. This took a few minutes, mostly me changing digits at random until I stumbled across a prime. Then I told the computer to find the factors of the product, and it ran for ages with no result.
(4)
If is a prime power then For a product of prime powers, multiply these
expressions together for all the different prime powers in the prime
factorisation of For instance, to find write Then
(5)
For more detail about the issues involved, see Ian Stewart,
Do Dice Play God?, Profile, London
(2019), Chapters 15 and 16.
(6)
L. M. K. Vandersypen, M. Steffen, G. Breyta, C. S. Yannoni, M.
H. Sherwood, and I. L. Chuang, ‘Experimental realization of Shor’s quantum
factoring algorithm using nuclear magnetic resonance,’ Nature 414 (2001)
883–887.
(7)
F. Arute and others, ‘Quantum supremacy using a programmable
superconducting processor,’ Nature 574
(2019) 505–510.
(8)
J. Proos and C. Zalka, ‘Shor’s discrete logarithm quantum
algorithm for elliptic curves,’ Quantum Information
and Computation 3 (2003).
(9)
M. Roetteler, M. Naehrig, K. Svore, and K. Lauter, ‘Quantum
resource estimates for computing elliptic curve discrete logarithms,’ in:
ASIACRYPT 2017: Advances in
Cryptology, Springer, New York (2017),
214–270.
الفصل السادس: مستوى الأعداد
(1)
For instance, -25 has a square root 5i,
because
In fact, it has a second square root, -5i, for similar reasons.
(2)
Algebraists regularise the situation by saying that the square
root of zero is zero, with multiplicity
two. That is, the same value occurs twice, in a meaningful but technical
sense. An expression like has two factors, times which respectively give two
solutions and to the equation Similarly, the expression has two factors, times They just happen to be the
same.
(3)
For real the function obeys the differential
equation with initial condition If we define the exponential function for
complex so that the same equation holds, which is
sensible, and set then Since multiplying by rotates complex numbers through a right angle,
the tangent to as varies is at right angles to so the point describes a circle of radius 1 centred at the
origin. It rotates round this circle at a constant speed of one radian per
unit of time, so at time its position is at angle radians. By trigonometry, this point
is
(4)
More precisely, there has to be an ‘inner product’, which
determines distances and angles.
الفصل السابع: أبي، هل يمكنك ضرب الثلاثيات؟
(1)
The fastest supercomputer in 1988 was the Cray Y-MP, costing
$20 million (over $50 million in today’s money). It would
struggle to run a Windows operating system.
(2)
K. Shoemake, ‘Animating rotation with quaternion curves,’
Computer
Graphics 19 (1985) 245–254.
(3)
L. Euler, ‘Decouverte d’un nouveau principe de mecanique’
(1752), Opera Omnia, Series Secunda 5,
Orel Fusili Turici, Lausanne (1957), 81–108.
(4)
The half-angle property is important in quantum mechanics,
where one formulation of quantum spin is based on quaternions. If the wave
function of a particle of the kind known as a fermion is rotated through
360°, its spin reverses. (This is distinct from rotating the particle
itself.) The wave function must rotate through 720° to return the spin to
its original value. The unit quaternions form a ‘double cover’ of the
rotations.
(5)
C. Brandt, C. von Tycowicz, and K. Hildebrandt, ‘Geometric
flows of curves in shape space for processing motion of deformable objects,’
Computer Graphics Forum 35 (2016)
295–305.
الفصل الثامن: الزُّنبُركات
(1)
T. Takagi and M. Sugeno, ‘Fuzzy identification of systems and
its application to modeling and control,’ IEEE
Transactions on Systems, Man, and Cybernetics 15 (1985)
116–132.
الفصل العاشر: ابتسم، من فضلك!
(1)
This is JFIF encoding, used for the web. Exif coding, for
cameras, also includes ‘metadata’ describing the camera settings, such as
date, time, and exposure.
(2)
A. Jain and S. Pankanti, ‘Automated fingerprint identification
and imaging systems,’ in: Advances in Fingerprint
Technology (eds. C. Lee and R. E. Gaensslen), CRC Press,
(2001) 275–326.
الفصل الحادي عشر: هل اقتربنا من الوصول إلى هناك؟
(1)
N. Ashby, ‘Relativity in the Global Positioning System,’
Living Reviews in Relativity 6 (2003)
1; doi: 10.12942/lrr-2003-1.
(2)
More precisely, where the sum is over all configurations of
spin variables.الفصل الثاني عشر: إيزينج وذوبان ثلوج القطب الشمالي
(1)
Setting , where is Boltzmann’s constant, the formula
is:
(2)
The formula is:
where is the strength of the external field and is the strength of the interactions between spins. In the absence of an external field so so the whole fraction is
(3)
Y.-P. Ma, I. Sudakov, C. Strong, and K. M. Golden, ‘Ising model
for melt ponds on Arctic sea ice,’ New Journal of
Physics 21 (2019) 063029.
الفصل الثالث عشر: اتصل بعالم الطوبولوجيا!
(1)
S. Tanaka, ‘Topological analysis of point singularities in
stimulus preference maps of the primary visual cortex,’ Proceedings of the Royal Society of London B
261 (1995) 81–88.
(2)
‘Lobster telescope has an eye for X-rays,’
https://www.sciencedailycom/releases/2006/04/060404194138.htm
(3)
Technically, the curve is the image, under a map from a disc to the sphere, of the
boundary of the disc. The curve can cross itself and the disc can get
scrunched up.
(4)
J. J. Berwald, M. Gidea, and M. Vejdemo-Johansson, ‘Automatic
recognition and tagging of topologically different regimes in dynamical
systems,’ Discontinuity, Nonlinearity, and
Complexity (2014) 413–426.
(5)
F. A. Khasawneh and E. Munch, ‘Chatter detection in turning
using persistent homology,’ Mechanical Systems and
Signal Processing 70 (2016) 527–541.
(6)
C. J. Tralie and J. A. Perea, ‘(Quasi) periodicity
quantification in video data, using topology,’ SIAM
Journal on Imaging Science 11 (2018)
1049–1077.
(7)
S. Emrani, T. Gentimis, and H. Krim, ‘Persistent homology of
delay embeddings and its application to wheeze detection,’ IEEE Signal Processing Letters 21 (2014)
459–463.