Vous êtes sur la page 1sur 4

Course Pro Forma Program Ijazah Sarjana Muda Perguruan Dengan Kepujian (Matematik Pendidikan Rendah) Course Title

Course Code Credit Contact Hours Language Of Delivery Prerequisite to entry Semester Learning outcomes Applications of Mathematics (Aplikasi Matematik) MTE3114 3(2+1) 60 hours English language Nil One/ Two 1. Explore the role of mathematics in modern technologies. 2. Investigate mathematics as an ongoing cultural activity 3. Demonstrate an understanding of the nature of mathematics and its applications 4. Apply the various mathematical processes and problem solving techniques Synopsis This course focuses on the applications of mathematics in various areas. Its contents cover mathematics in every day life, classical codes and ciphers, codes and cryptography, use of mathematical modeling in biology and ecology, and some key mathematical ideas related to calculus. Experience involving applications of mathematics is provided through practical activities. Kursus ini berfokus kepada aplikasi matematik dalam pelbagai bidang. Isi kandungannya meliputi matematik dalam kehidupan harian, kod klasik dan nombor rahsia, kod dan kriptografi, penggunaan model matematik dalam biologi dan ekologi, serta sebahagian idea utama matematik berkaitan dengan kalkulus. Pengalaman melibatkan aplikasi matematik dibekalkan melalui aktiviti-aktiviti praktikal.

Topic 1

Content Theory Mathematics in every day life Role of mathematics in modern technologies Mathematics as an ongoing cultural activity Bases for contemporary mathematics Classical codes and ciphers The development of classical codes and ciphers using the following techniques o Transposition o Substitution Codes and cryptography Error correcting codes: repetition codes, parity check codes, Hamming codes, Hadamard codes and the 1969 Mariner spacecraft Linear codes: solution spaces for systems of linear equations and their use in error correcting codes Public-key cryptography, including the use of elementary number theory to produce computationally intractable systems of codes, the RSA algorithm Use of mathematical modeling in biology and ecology Predator-prey models: separate and nonseparate generations, the logistic equation, interactions between species, simulations The use of simple differential equations in modeling safe and effective drug dosages Modeling the spread of diseases such as AIDS, bird flu etc Some key mathematical ideas related to calculus Archimedes approximation of Archimedes determination of the area of a circle Zenos paradox Newtons investigation of cubic curves Sub Total

Hours 4

10

30

Practical Mathematics in everyday life Investigate the following o Role of mathematics in modern technologies o Mathematics as an ongoing cultural activity o Bases for contemporary mathematics Compile the findings Submit a written report Mathematical modeling Conduct a mathematical modeling activity based on the following steps o Specify a real problem o Formulate a mathematical model o Solve the mathematical problem o Interpret the solution o Compare with reality o Communicate the results Group presentation Submit a written report Some key mathematical ideas related to calculus Group project o Explore applications and relations of the following Archimedes approximation of Archimedes determination of the area of a circle Zenos paradox Newtons investigation of cubic curves o Presentation of project Sub Total Total

10

10

10

30 60

Assessment Main References

Coursework Examination

60% 40 %

Coutinho, S. C. (1999). The mathematics of ciphers: Number theory and RSA Cryptography. Natick, MA: A. K. Peters. Dym, C. L. (2004). Principles of mathematical modelling. 2nd ed. Boston: Elsevier Academic Press. Haydock, R. (1991). Information and coding. UK: Cambridge. Stacey, K. & Stillman, G. (2002). Modelling trends in numbers of deaths due to HIV/AIDS infection in USA and Australia. Melbourne: University of Melbourne, CAS-CAT Project. Wilf, H. S. (1986). Algorithms and complexity. Englewood Cliffs, NJ: Prentice-Hall.

Additional References

Fazekas de St Groth, C., & Solomon, P. J. (1990). Short-term prediction of the AIDS epidemic using empirical models. In P. J. Solomon, C. Fazekas de St Groth, & S. R. Wilson (Eds.), Projections of acquired immune deficiency syndrome in Australia using data to the end of September 1989 (Working Paper No. 16, pp. 11-17). Canberra, ACT: Australian National University, National Centre for Epidemiology and Population Health.

Full Singh, S. (2002). The cracking codebook: How to make it, break it, hack it, crack it. London: Harper Collins. Hellman, M. E. (1979). The mathematics of public-key cryptography. Scientific American, 241(8), 146157. Humphreys, J. F., & Prest, M. Y. (2004). Numbers, groups and codes. 2nd ed. Cambridge: Cambridge University Press. Jackson, M. B., & Ramsey, J. R. (1993). Problems for student investigation. MAA Notes. Volume 30. Washington: Mathematical Association of America. Jackson, T. H. (1987). From number theory to secret codes. Bristol: IOP Publishing. Malevitch, J., Froelich, G., & Froelich, D. (1991). Codes galore Module #18. Lexington, VA: Consortium for Mathematics and Its Applications (COMAP). Maynard Smith, J. (1968). Mathematical ideas in biology. London: Cambridge University Press. Posamentier, A. A., & Lehmann, I. (2004). : A biography of the world's most mysterious number, Amherst, NY: Prometheus Books. Trappe, W., & Washington, L. C. (2006). Introduction to cryptography with coding theory. 2nd ed. Upper Saddle River, NJ: Pearson Prentice Hall. Welsh, D. J. A., (1988). Codes and cryptography. Oxford: Oxford University Press.

Vous aimerez peut-être aussi