A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding
|
|
- Chloe Wiggins
- 5 years ago
- Views:
Transcription
1 International Journal of Comuter Science and Alications c Technomathematics Research Foundation Vol. 7 No. 4,. 1-15, 010 A Note On the Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding Sandian Dey Microsoft India Develoment Center sandian.dey@gmail.com Hameed Al-Qaheri Deartment of Quantitative Methods and Information Systems College of Business Administration Kuwait University alqaheri@cba.edu.w Suneeta Sane Comuter and Information Technology Deartment Veermata Jijabai Technological Institute Mumbai, Maharashtra , India sssane@vjti.org.in Sugata Sanyal School of Technology and Comuter Science Tata Institute of Fundamental Research Homi Bhabha Road, Mumbai , India sanyal@tifr.res.in In this aer, we suggest a lower and an uer bound for the Generalized Fibonacci-Sequence, for different values of. The Fibonacci--Sequence is a generalization of the Classical Fibonacci Sequence. We first show that the ratio of two consecutive terms in generalized Fibonacci sequence converges to a -degree olynomial and then use this result to rove the bounds for generalized Fibonacci- sequence, thereby generalizing the exonential bounds for classical Fibonacci Sequence. Then we show how these results can be used to rove efficiency for data hiding techniques using generalized Fibonacci sequence. These steganograhic techniques use generalized Fibonacci--Sequence for increasing the number of available bit-lanes to hide data, so that more and more data can be hidden into the higher bit-lanes of any ixel without causing much distortion of the cover image. This bound can be used as a theoretical roof for efficiency of those techniques, for instance it exlains why more and more data can be hidden into the higher bit-lanes of a ixel, without causing considerable decrease in PSNR. Keywords: Fibonacci-sequence, LSB Data-hiding, PSNR 1. Introduction Among many different data hiding techniques roosed to embed secret message within images, the LSB data hiding technique is one of the simlest methods for inserting data into digital signals in noise free environments, which merely embeds secret message-bits in a subset of the LSB lanes of the image. LSB is the least 1
2 Dey, Al-Qaheri, Sane, Sanyal significant bit or the 0th bit, the second LSB is the 1st bit, and so on. Desite being simle, this technique is more redictable and hence less secure, also PSNR ea signal to noise ratio decreases very raidly as we use the higher bit lanes for data hiding. As soon as we go from LSB least significant bit to MSB most significant bit for selection of bit-lanes for our message embedding, the distortion in stego-image is liely to increase exonentially, so it becomes imossible without noticeable distortion and with exonentially increasing distance from cover-image and stego-image to use higher bit-lanes for embedding without any further rocessing. The worarounds may be: through the random LSB relacement in stead of sequential, secret messages can be randomly scattered in stego-images, so the security can be imroved. Also, using the aroaches given by variable deth LSB algorithm [Liu et al. 004], or by the otimal substitution rocess based on genetic algorithm and local ixel adjustment [Wang et al. 001], one is able to hide data to some extent in higher bit-lanes as well. Battisti et al. [Battisti et al. 006], [Picione et al. 006] roosed a novel data hiding technique from a totally different ersective, it uses a different bitlanes decomosition altogether, based on the generalized Fibonacci--sequences, that not only increases the number of embeddable bit-lanes but also decreases PSNR in the stego image considerably, thereby imroving the LSB technique. In this aer, we first rove some theoretical uer and lower bounds for generalized Fibonacci--sequence and give a theoretical roof for the better erformance of the data hiding technique using generalized Fibonacci decomosition, i.e., why the data hiding technique using this decomosition not only gives larger number of bit lanes for hiding secret bits, but also gives a far better PSNR than that in classical LSB technique. The Generalized Fibonacci--Sequence [Horadam 1961], [Basin and Hoggatt 1963], [Hoggatt 197], [Atins and Geist 1987], [Hendel 1994], [Sun and Sun 199] is given by, F 0 = F 1 =... = F = 1, F n = F n 1 + F n 1, n + 1, n, N 1 For = 1, we have, F 0 = F 1 = 1, F n = F n 1 + F n 1, n, n N We get the classical Fibonacci sequence 1, 1,, 3, 5, 8,.... We already have some results for this Classical Fibonacci Sequence, e.g., we now the ratio of two consecutive terms in Fibonacci sequence converge to Golden Ratio, In this aer, we show that α n > F n > α n, n, N, where α is the ositive Root of
3 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 3 x x 1 = 0. The ratio of two consecutive terms in Fibonacci--Sequence converges to this α.. Bounds for the generalized Fibonacci--Sequence In this section we rove the uer and lower bounds for the generalized Fibonacci-sequence. First, we show that the ratio of consecutive terms of generalized Fibonacci--sequence converges to the ositive root of the olynomial x x 1 = 0. Next we use this root to rove a bound on the generalized Fibonacci--sequence..1. Lemma 1 The ratio of two consecutive numbers in generalized Fibonacci -sequence converges to the ositive root of the degree- olynomial P x = x x 1. Proof: Convergence Let us first define{ the ratio} of two consecutive terms of Fibonacci--sequence as a Fn+1 sequence {β n } = F n. Now, by definition of Fibonacci--sequence, we have β 0 = β 1 = = β = 1 β n = 1 + F n > 1, n > F n β = β + β 0 = = β n = 1 + F n < =, n > + 1 F n 1 < β n <, n > + 1 We observe that the sequence β n is bounded and hence by Monotone Convergence theorem must have a convergent subsequence. For instance, for = 1 classical Fibonacci sequence, we have two convergent subsequences β n increasing and β n+1 decreasing, n N natural number and they both converge to the same limit [Craw 000], as shown in figure. Positive Root of the olynomial x x 1 Now, let s analyze the olynomial function y = P x = x x 1. By Descartes rule, the olynomial can have at most one ositive real root, since it has exactly one change in sign. First we observe that the function P x is continuous and differentiable everywhere. We also notice that the function has exactly one ositive root α and α
4 4 Dey, Al-Qaheri, Sane, Sanyal is also strictly larger than 1. This is a consequence of elementary calculus. By successive differentiation, we see that y 1 = P x = + 1x x 1 y = P x = + 1x 1 1x The function P x has critical oints at P x = 0, i.e., at x = 0 and x = y x=. = 1 > 0, 1. By nd order sufficient condition for local minima, P x has a local minima at x =. At x = 0, the function will have a maxima or a oint of inflection deending on whether is odd or even, exlained in the next section. When N odd, we have, y 1 = P x = + 1x 1 x is < 0 x < 0 = 0 x = 0 < 0 0 < x < = 0 x = > 0 x >, and increasing in Hence the function is decreasing in., Also, y 1 = 1, y0 = y1 = 1 and y = 1 1, N odd. At x =, P x has a minima gradient changes from negative to ositive but at x = 0 no sign change in gradient we have a oint of inflection. Again, P x being a continuous function assumes all ossible values within an interval. Combining all these, we can easily see that the grah of the function has exactly two real zeroes, one ositive and the other negative the remaining roots are comlex conjugate airs. When N even, we have, y 1 = P x = + 1x 1 x is > 0 x < 0 = 0 x = 0 < 0 0 < x < = 0 x = > 0 x > Hence the function is increasing in, 0, then decreasing in 0, and again increasing in., Also, y 1 = y0 = y1 = 1 and y = 1 1, N even. At x 0 =, P x has a minima but at x = 0 gradient changes from ositive to negative we have a maxima. Combining all these, we can easily see that we have exactly one real ositive root at α, since y1 < 0 and y > 0, also yx
5 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 5 being continuous. From this result we immediately have Lemma. From figure 1 we can see the grah of the degree- olynomial, for odd and even resectively. Convergence to the ositive root of the olynomial Now, we show that if sequence {β n } converges to β, then β = α. Let s assume the sequence {β n } converges to β R +. Now we rove, the sequence must converge to the only ositive root α of the above-stated -degree olynomial. By assumtion, β = lim n fn+ f n+ 1 = lim n fn+ 1 f n fn =... = lim =..., n f n 1 f n = n th number in the F ibonacci Sequence, f n+ = f n+ 1 + f n 1 fn+ 1 + f n 1 fn β = lim = lim, n n β = 1 + lim n f n+ 1 f =n+ =n 1 β = 1 + f +1 = =1 1 β = lim n f n 1 fn f n 1 β = β β β 1 = 0 Hence β satisfies the equation x x 1 = 0, N, β R +, i.e., from above results, we have, β = α Fig. 1. Grah of x x 1 = 0, showing α for different values of
6 6 Dey, Al-Qaheri, Sane, Sanyal.. Lemma If α be a ositive root of the equation x x 1 = 0, we have 1 < α <, N. Proof: We have, Also, α α 1 = 0 1 = 1 > 0, N 1 > α α 1 α > α α Also, 1 < 0 = α α 1 α α 1 > 0 From, we immediately see the following: α > 1 since ositive 3 α > 0 according to our assumtion, hence we can not have α = LHS & RHS both becomes 0, that does not satisfy inequality. If α >, we have LHS < 0 while RHS > 0 which again does not satisfy inequality. Hence we have α <, N From 3, we have, α > 1. Combining, we get, 1 < α <, N.3. Lemma 3 If α be a ositive root of the equation x x 1 = 0, where N, we have the following results, N, α > α +1 lim α = 1 α +1 > 1+α α < + 1 α +1 > 1 Proof: We have, For =, α +1 α 1 = 0 For = + 1, α + +1 α = 0 α α +1 1 = αα 1 α+1 1 = α 1 α α +1.α +1 4
7 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 7 From 4 we can argue, α α +1, since neither of them is 0 or 1 from Lemma. If α < α +1, we have LHS of inequality 4 < 1, but RHS > 1, since both the terms in RHS will be greater than 1 by our assumtion and by Lemma, a contradiction. Hence we must have Also, from Lemma, we have, 1 < α <, N. Hence we have, Again, from 4 we have, α > α +1, N 5 > α 1 > α >... > α > α +1 >... > 1, N lim α = 1 α+1 1 α.α +1 > 1, since > 1, from 5 α 1 α +1 α 1 > α +1 >, from Lemma α +1 1 α +1 > 1 + α Now, let us induct on N to rove α < + 1. Base case: For = 1, 1 < α 1 <, by Lemma. Let us assume the inequality holds < α < + 1, Induction Ste: = + 1, α = α 1 α., by 4 α +1 1 α < + 1. α 1 α +1 1 < α < + 1, by induction hyothesis α < α α +1 α +1 1 α < α α +1 α +1 1 α < , from 6, we have, α α +1 α +1 1 < 1 6 α < + α < + 1, N 7
8 8 Dey, Al-Qaheri, Sane, Sanyal Also, since α is a root of x x 1 = 0, for = we have. α +1 α 1 = 0 α +1 = α + 1 > since from Lemma, we have, α > 1 α +1 > 8.4. Lemma 4 The following inequalities always hold: < <... < 4 3 < 3 1 < α < + 1 α 1 α + > α +3 Proof: By Binomial Theorem, we have, = 1 r=0 1 1 <... α 3 < 4 α < 3 α < > 3... α + > α + > = 1 r! 1 r= r 1... r r!. 1 = 1 r=0. 1 r r s=1 1 s. 1 r! < =. 1 = < 1 9 }{{} times Hence we have, < 1 1 <... < < 3 1 < Also, from 7 we have, α < Combining, we get, α < < 1 1 <... < < 3 1 < α < + 1 α 1 <... α 4 < 5 α 3 < 4 α < 3 α < 10 Also, we have, α + > α +3 α +1 > α + = α +1 + α > + 1 = 3 α + > 3 α +3 = α + + α > = 4 > 3... α + > α + > Lemma 5 The following inequality gives us the lower and uer bounds for generalized Fibonacci--sequence, α n > F n > α n, n >, n N 1 where α is the ositive root of the equation x x 1 = 0.
9 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 9 Proof: We induct on n to show the result. F 0 = F 1 =... = F = 1, By definition of Fibonacci--Sequence. Base case: From Lemma 4, we have, α α + α +3 > F + 1 = F + F 0 = = > α > F + = F F 1 = + 1 = 3 > α > F + 3 = F + + F = = 4 > α 3 α + > F = F + + F = = + > α Induction Ste: Let s assume the above result is also true m : + 1 < m < n, m, n N. Now, we rove for m = n, α n 1 + α n 1 F n 1 + F n 1 > α n 1 Hence we have the following inequality, > F n 1 + F n 1 by hyothesis + α n 1 by hyothesis α n α > F n > α n α α n 1.α > F n > α n 1.α α n > F n > α n, n >, n N α n > F n > α n, α R + and α 1, 13 α 1 = , α , α , α , α > α, N The emirical results Table 1 also rove our claim for =. Also F 0 = F 1 = = F = 1 and F n + 1 > F n, n >. Hence we have, F n = F n 1 + F n 1 <.F n 1, n > F n <.F n 1 <.F n < < n.f = n, n > F n < n, n > 14
10 10 Dey, Al-Qaheri, Sane, Sanyal Combining 13 and 14, we have, n > F n > α n, n >, and n, N 15 where α is the ositive Root of x x 1 = 0. Figure and Table show the convergence of ratio of successive terms for Fibonacci--sequences for different For = 1 we get classical Fibonacci sequence. It can be noticed that smaller the value of, quicer the convergence of the ratio is achieved, as shown. Also value to which the ratio converges monotonically decreases with increase in the value of. 3. Alication in Data Hiding Data hiding is a new ind of secret communication technology, where message is hidden inside an image or any other medium, so that it cannot be observed. One of the simlest data hiding technique is LSB data hiding technique, which merely embeds secret message-bits in a subset of the LSB lanes of the image. One of the drawbacs of this technique is: as soon as we go from LSB to MSB for selection of bit-lanes for our message embedding, the distortion in stego-image is liely to increase exonentially, so it becomes imossible without noticeable distortion and with exonentially increasing distance from cover-image and stego-image to use higher bit-lanes for embedding without any further rocessing. This articular roblem was addressed by Battisti et al., [Battisti et al. 006], who roosed to use generalized Fibonacci--sequence decomosition technique instead of classical binary decomosition and shows by emirical results that this
11 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 11 Fig.. a Convergence of the ratio of successive terms in generalized Fibonacci -Sequence for different values of b Convergent Subsequences for classical Fibonacci sequence =1 technique outerforms the classical LSB technique when thought in terms of embedding in the higher bit lane as well with less distortion. This technique basically increases the number of bit-lanes by generating a new larger set of bit-lanes that we call virtual bit-lanes by using Fibonacci--sequence decomosition. It can be further imroved using rime and natural number decomosition techniques
12 1 Dey, Al-Qaheri, Sane, Sanyal as shown in [Dey et al. 007a], [Dey et al. 007b], [Dey et al. 008]. Also, [Cooer 1984] [Dotson et al. 1993] illustrates Fibonacci sequence can be used in various alications. In this aer we give a formal roof of Fibonacci--sequence bounds and show how this can be used to theoretically rove that Fibonacci--sequence decomosition gives better result in hiding data. From 15 it is clear from the uer bound that the same value will require more numbers of bits to be reresented than the number of bits required in classical binary decomosition since n > α n > F n, if it s exressed using Fibonacci--sequence decomosition where the radix is Fibonacci-sequence numbers instead of owers of. As illustrated in [Dey et al. 008], in order to measure the distortion in the stego-image, we use Mean square error MSE, Worst case Mean Square Error
13 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 13 WMSE and Pea Signal to Noise Ratio PSNR, which are defined by MSE = M i=1 j=1 N f ij g ij /MN P SNR = 10.log 10 L MSE [Dey et al. 008]. If the secret data-bit is embedded in the i th bit-lane of a ixel, the worst-case error-square-er-ixel will be = W SE = W i1..0 = W i here W i reresents the corresonding weight in the number system for the i th bit, e.g., for classical decomosition W i = i, for generalized Fibonacci decomosition W i = F i, corresonding to the case when the corresonding bit in cover-image toggles in stego-image, after embedding the secret data-bit. For examle, worst-case error-square-er-ixel for embedding a secret data-bit in the ith bit lane in case of a ixel in classical binary decomosition is = i = 4 i, where i N {0}. If the original -bit grayscale cover-image has size w h, we define, W MSE = w h W i = w h W SE [Dey et al. 008]. Hence, WMSE after embedding secret message bit only in the l th virtual bit-lane of each ixel in case of classical traditional binary LSB data hiding technique is given by, W MSEl th bit lane Classical Binary Decomosition = θ4l. WMSE after embedding secret message bit in the l th virtual bit-lane of each ixel in case of generalized Fibonacci decomosition is given by, W MSEl th bit lanef ibonacci Sequence Decomosition = F l α l < W MSEl F ibonacci sequence < α l, α R +, α 1 = 1 + 5, α > α, N, α1.618, W MSE l Generalized F ibonacci sequence < θ.618 l. Hence, we have, W MSE Binary > W MSE F ibonacci P SNR F ibonacci > P SNR Binary. Thus, we have first roved bounds on the generalized Fibonacci sequence and then by using our bounds, we have given a formal roof for better erformance in terms of PSNR for LSB data hiding technique using generalized Fibonacci-sequence decomosition than that using classical binary decomosition. Also, we
14 14 Dey, Al-Qaheri, Sane, Sanyal have, number of rimes n = n = θn. log n = oα n < F n < n [Telang 1999], [Niven and Zucerman 1966], [Tattersall 005] The above imlies that if the same number is reresented using rime decomosition n th rime number as weightage to n th bit, it will give still more numbers of virtual bit lanes [Battisti et al. 006]. We have similar results for LSB data hiding using natural number decomosition technique, and combining the results from [Battisti et al. 006], [Dey et al. 007a], [Dey et al. 007b], [Dey et al. 008] we have the following, W MSE Binary > W MSE F ibonacci > W MSE P rime > W MSE Natural P SNR Natural > P SNR P rime > P SNR F ibonacci > P SNR Binary. Hence, data hiding using natural number decomosition gives the best erformance among the above mentioned techniques. In data hiding, we hide data in different bit-lanes of a ixel. In classical LSB data-hiding technique the ixel is reresented as binary value, hence it has less numbers of bit-lanes as we have in case of Fibonacci--sequence decomosition, the later having still less number of bit-lanes than in case of rime decomosition technique. It is shown in [Dey et al. 007a], [Dey et al. 007b], [Dey et al. 008] by calculation of WMSE and PSNR measures that embedding data even in higher bit-lanes of ixel using these techniques results in less visible distortion of the cover image, since the distortion as measured by WMSE is roortional to the square of the weights to the bits in the corresonding decomosition, hence it decreases as the weights go on decreasing from classical binary to generalized Fibonacci and from that to rime and natural number decomosition [Dey et al. 008]. 4. Conclusions In this aer, we have established the bounds for generalized Fibonacci-sequence α n > F n > α n, n >, n, N. Emirical results obtained vindicates our theoretically-roven bounds. Then we used the result n > F n > α n, n >, n, N, where α is the ositive Root of x x 1 = 0, to rove that data hiding technique using generalized Fibonacci--sequence gives more embeddable bit-lanes along with better PSNR than that in case of classical LSB technique [Dey et al. 008], and the same using rime decomosition technique increases virtual bit-lanes and PSNR further [Dey et al. 007a]. References Battisti F., Carli M., Neri A., Egiazarian K A Generalized Fibonacci LSB Data Hiding Technique. 3rd International Conference on Comuters and Devices for Communication CODEC- 06, December 18 0 TEA, Institute of Radio Physics and Electronics, University of Calcutta.
15 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 15 Basin S. L. and Hoggatt V. E. Jr A Primer on the Fibonacci Sequence, Fib. Quart. 1. Atins J. and Geist R Fibonacci numbers and comuter algorithms. College Math. J. 18, Cooer C Alication of a Generalized Fibonacci Sequence. The College Mathematics Journal, Vol. 15,, Craw I Advanced Calculus and Analysis, MA100, Deartment of Mathematical Sciences, University of Aberdeen, DSN mth , 6 7, V Dey S., Abraham A. and Sanyal S. 007a. An LSB Data Hiding Technique Using Prime Numbers. Third International Symosium on Information Assurance and Security IAS 07, August 9 31, Manchester, United Kingdom, IEEE Comuter Society ress, USA, ISBN , Dey S., Abraham A. and Sanyal S. 007b. An LSB Data Hiding Technique Using Natural Numbers. IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIHMSP 07, Nov 6 8, Kaohsiung City, Taiwan, IEEE Comuter Society ress, USA, ISBN , Dey S., Abraham A., Bandyoadhyay B. and Sanyal S Data Hiding Techniques Using Prime and Natural Numbers. Journal of Digital Information Management, Vol. 6. Dotson W., Norwood F. and Taylor C Fiber otics and Fibonacci. this MAGAZINE 66, Hendel R. J Aroaches to the formula for the nth Fibonacci number, College Math. J. 5, Hoggatt V. E. Jr Fibonacci and Lucas numbers. The Fibonacci Association, Santa Clara, California, USA. Horadam A A generalized Fibonacci sequence. American Mathematical Monthly, 68, Liu S. H., Chen T. H., Yao H. X., Gao W A Variable Deth LSB Data Hiding Technique in images. Proceedings of the 3rd International Conference on Machine Learning and Cybernetics, 6-9 August, Shanghai. Niven I. and Zucerman H. S An Introduction to the Theory of Numbers. Wiley, nd ed., New Yor. Picione D. D. L., Battisti F., Carli M., Astola J. and Egiazarian K.006. A Fibonacci LSB data hiding technique. Proc. Euroean signal rocessing conference. Sun Z. H. and Sun Z. W Fibonacci numbers and Fermat s last theorem. Acta Arith. 60, Tattersall J. J Elementary number theory in nine chaters, nd ed., Cambridge University Press, ISBN , Telang S. G Number Theory. Tata McGraw-Hill, ISBN , First Rerint, Wang R. Z., Lin C. F. and Lin I. C Image Hiding by LSB substitution and genetic algorithm. Pattern Recognition, Vol. 34, 3,
CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education
CERIAS Tech Reort 2010-01 The eriod of the Bell numbers modulo a rime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education and Research Information Assurance and Security Purdue University,
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationHENSEL S LEMMA KEITH CONRAD
HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar
More informationElementary Analysis in Q p
Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some
More informationwhere x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:
Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.
More information#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS
#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt
More informationON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS
#A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,
More informationOn the irreducibility of a polynomial associated with the Strong Factorial Conjecture
On the irreducibility of a olynomial associated with the Strong Factorial Conecture Michael Filaseta Mathematics Deartment University of South Carolina Columbia, SC 29208 USA E-mail: filaseta@math.sc.edu
More informationA FEW EQUIVALENCES OF WALL-SUN-SUN PRIME CONJECTURE
International Journal of Mathematics & Alications Vol 4, No 1, (June 2011), 77-86 A FEW EQUIVALENCES OF WALL-SUN-SUN PRIME CONJECTURE ARPAN SAHA AND KARTHIK C S ABSTRACT: In this aer, we rove a few lemmas
More informationMath 4400/6400 Homework #8 solutions. 1. Let P be an odd integer (not necessarily prime). Show that modulo 2,
MATH 4400 roblems. Math 4400/6400 Homework # solutions 1. Let P be an odd integer not necessarily rime. Show that modulo, { P 1 0 if P 1, 7 mod, 1 if P 3, mod. Proof. Suose that P 1 mod. Then we can write
More informationOn generalizing happy numbers to fractional base number systems
On generalizing hay numbers to fractional base number systems Enriue Treviño, Mikita Zhylinski October 17, 018 Abstract Let n be a ositive integer and S (n) be the sum of the suares of its digits. It is
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More informationA Social Welfare Optimal Sequential Allocation Procedure
A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More information1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)
CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,
More informationBOUNDS FOR THE SIZE OF SETS WITH THE PROPERTY D(n) Andrej Dujella University of Zagreb, Croatia
GLASNIK MATMATIČKI Vol. 39(59(2004, 199 205 BOUNDS FOR TH SIZ OF STS WITH TH PROPRTY D(n Andrej Dujella University of Zagreb, Croatia Abstract. Let n be a nonzero integer and a 1 < a 2 < < a m ositive
More informationGOOD MODELS FOR CUBIC SURFACES. 1. Introduction
GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in
More informationWhen do Fibonacci invertible classes modulo M form a subgroup?
Calhoun: The NPS Institutional Archive DSace Reository Faculty and Researchers Faculty and Researchers Collection 2013 When do Fibonacci invertible classes modulo M form a subgrou? Luca, Florian Annales
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM
ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to
More informationMarch 4, :21 WSPC/INSTRUCTION FILE FLSpaper2011
International Journal of Number Theory c World Scientific Publishing Comany SOLVING n(n + d) (n + (k 1)d ) = by 2 WITH P (b) Ck M. Filaseta Deartment of Mathematics, University of South Carolina, Columbia,
More informationAnalysis of some entrance probabilities for killed birth-death processes
Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction
More informationAn Estimate For Heilbronn s Exponential Sum
An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined
More information#A8 INTEGERS 12 (2012) PARTITION OF AN INTEGER INTO DISTINCT BOUNDED PARTS, IDENTITIES AND BOUNDS
#A8 INTEGERS 1 (01) PARTITION OF AN INTEGER INTO DISTINCT BOUNDED PARTS, IDENTITIES AND BOUNDS Mohammadreza Bidar 1 Deartment of Mathematics, Sharif University of Technology, Tehran, Iran mrebidar@gmailcom
More informationA CRITERION FOR POLYNOMIALS TO BE CONGRUENT TO THE PRODUCT OF LINEAR POLYNOMIALS (mod p) ZHI-HONG SUN
A CRITERION FOR POLYNOMIALS TO BE CONGRUENT TO THE PRODUCT OF LINEAR POLYNOMIALS (mod ) ZHI-HONG SUN Deartment of Mathematics, Huaiyin Teachers College, Huaian 223001, Jiangsu, P. R. China e-mail: hyzhsun@ublic.hy.js.cn
More informationE-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula
e-comanion to Han Du and Zuluaga: Etension of Scarf s ma-min order formula ec E-comanion to A risk- and ambiguity-averse etension of the ma-min newsvendor order formula Qiaoming Han School of Mathematics
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationAnalysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel
Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict
More informationMersenne and Fermat Numbers
NUMBER THEORY CHARLES LEYTEM Mersenne and Fermat Numbers CONTENTS 1. The Little Fermat theorem 2 2. Mersenne numbers 2 3. Fermat numbers 4 4. An IMO roblem 5 1 2 CHARLES LEYTEM 1. THE LITTLE FERMAT THEOREM
More informationReal Analysis 1 Fall Homework 3. a n.
eal Analysis Fall 06 Homework 3. Let and consider the measure sace N, P, µ, where µ is counting measure. That is, if N, then µ equals the number of elements in if is finite; µ = otherwise. One usually
More information#A45 INTEGERS 12 (2012) SUPERCONGRUENCES FOR A TRUNCATED HYPERGEOMETRIC SERIES
#A45 INTEGERS 2 (202) SUPERCONGRUENCES FOR A TRUNCATED HYPERGEOMETRIC SERIES Roberto Tauraso Diartimento di Matematica, Università di Roma Tor Vergata, Italy tauraso@mat.uniroma2.it Received: /7/, Acceted:
More informationSome sophisticated congruences involving Fibonacci numbers
A tal given at the National Center for Theoretical Sciences (Hsinchu, Taiwan; July 20, 2011 and Shanghai Jiaotong University (Nov. 4, 2011 Some sohisticated congruences involving Fibonacci numbers Zhi-Wei
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationVarious Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems
Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various
More informationGaps in Semigroups. Université Pierre et Marie Curie, Paris 6, Equipe Combinatoire - Case 189, 4 Place Jussieu Paris Cedex 05, France.
Gas in Semigrous J.L. Ramírez Alfonsín Université Pierre et Marie Curie, Paris 6, Equie Combinatoire - Case 189, 4 Place Jussieu Paris 755 Cedex 05, France. Abstract In this aer we investigate the behaviour
More informationarxiv: v1 [math.nt] 4 Nov 2015
Wall s Conjecture and the ABC Conjecture George Grell, Wayne Peng August 0, 018 arxiv:1511.0110v1 [math.nt] 4 Nov 015 Abstract We show that the abc conjecture of Masser-Oesterlé-Sziro for number fields
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More informationFinding Shortest Hamiltonian Path is in P. Abstract
Finding Shortest Hamiltonian Path is in P Dhananay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune, India bstract The roblem of finding shortest Hamiltonian ath in a eighted comlete grah belongs
More informationResearch Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces
Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and
More informationExamples from Elements of Theory of Computation. Abstract. Introduction
Examles from Elements of Theory of Comutation Mostafa Ghandehari Samee Ullah Khan Deartment of Comuter Science and Engineering University of Texas at Arlington, TX-7609, USA Tel: +(87)7-5688, Fax: +(87)7-784
More informationDimension Characterizations of Complexity Classes
Dimension Characterizations of Comlexity Classes Xiaoyang Gu Jack H. Lutz Abstract We use derandomization to show that sequences of ositive sace-dimension in fact, even ositive k-dimension for suitable
More informationA Public-Key Cryptosystem Based on Lucas Sequences
Palestine Journal of Mathematics Vol. 1(2) (2012), 148 152 Palestine Polytechnic University-PPU 2012 A Public-Key Crytosystem Based on Lucas Sequences Lhoussain El Fadil Communicated by Ayman Badawi MSC2010
More informationGRACEFUL NUMBERS. KIRAN R. BHUTANI and ALEXANDER B. LEVIN. Received 14 May 2001
IJMMS 29:8 2002 495 499 PII S06720200765 htt://immshindawicom Hindawi Publishing Cor GRACEFUL NUMBERS KIRAN R BHUTANI and ALEXANDER B LEVIN Received 4 May 200 We construct a labeled grah Dn that reflects
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationNONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm
- (23) NLP - NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS The Goldstein-Levitin-Polya algorithm We consider an algorithm for solving the otimization roblem under convex constraints. Although the convexity
More informationSupplementary Materials for Robust Estimation of the False Discovery Rate
Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides
More informationp-adic Measures and Bernoulli Numbers
-Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,
More informationThe Fibonacci Quarterly 44(2006), no.2, PRIMALITY TESTS FOR NUMBERS OF THE FORM k 2 m ± 1. Zhi-Hong Sun
The Fibonacci Quarterly 44006, no., 11-130. PRIMALITY TESTS FOR NUMBERS OF THE FORM k m ± 1 Zhi-Hong Sun eartment of Mathematics, Huaiyin Teachers College, Huaian, Jiangsu 3001, P.R. China E-mail: zhsun@hytc.edu.cn
More informationRANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES
RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationSome Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationMAS 4203 Number Theory. M. Yotov
MAS 4203 Number Theory M. Yotov June 15, 2017 These Notes were comiled by the author with the intent to be used by his students as a main text for the course MAS 4203 Number Theory taught at the Deartment
More informationThe non-stochastic multi-armed bandit problem
Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at
More information216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are
Numer. Math. 68: 215{223 (1994) Numerische Mathemati c Sringer-Verlag 1994 Electronic Edition Bacward errors for eigenvalue and singular value decomositions? S. Chandrasearan??, I.C.F. Isen??? Deartment
More informationRAMANUJAN-NAGELL CUBICS
RAMANUJAN-NAGELL CUBICS MARK BAUER AND MICHAEL A. BENNETT ABSTRACT. A well-nown result of Beuers [3] on the generalized Ramanujan-Nagell equation has, at its heart, a lower bound on the quantity x 2 2
More informationBy Evan Chen OTIS, Internal Use
Solutions Notes for DNY-NTCONSTRUCT Evan Chen January 17, 018 1 Solution Notes to TSTST 015/5 Let ϕ(n) denote the number of ositive integers less than n that are relatively rime to n. Prove that there
More informationFeedback-error control
Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller
More informationLower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data
Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment
More informationOn the Chvatál-Complexity of Knapsack Problems
R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew
More informationOptimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment
Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun
More informationTHE LEAST PRIME QUADRATIC NONRESIDUE IN A PRESCRIBED RESIDUE CLASS MOD 4
THE LEAST PRIME QUADRATIC NONRESIDUE IN A PRESCRIBED RESIDUE CLASS MOD 4 PAUL POLLACK Abstract For all rimes 5, there is a rime quadratic nonresidue q < with q 3 (mod 4 For all rimes 3, there is a rime
More informationWhen do the Fibonacci invertible classes modulo M form a subgroup?
Annales Mathematicae et Informaticae 41 (2013). 265 270 Proceedings of the 15 th International Conference on Fibonacci Numbers and Their Alications Institute of Mathematics and Informatics, Eszterházy
More informationApproximation of the Euclidean Distance by Chamfer Distances
Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of
More informationPrime Reciprocal Digit Frequencies and the Euler Zeta Function
Prime Recirocal Digit Frequencies and the Euler Zeta Function Subhash Kak. The digit frequencies for rimes are not all equal. The least significant digit for rimes greater than 5 can only be, 3, 7, or
More informationBest approximation by linear combinations of characteristic functions of half-spaces
Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of
More informationRobustness of classifiers to uniform l p and Gaussian noise Supplementary material
Robustness of classifiers to uniform l and Gaussian noise Sulementary material Jean-Yves Franceschi Ecole Normale Suérieure de Lyon LIP UMR 5668 Omar Fawzi Ecole Normale Suérieure de Lyon LIP UMR 5668
More informationRandomness Extraction in finite fields F p
Randomness Extraction in finite fields F n Abdoul Aziz Ciss École doctorale de Mathématiques et d Informatique, Université Cheikh Anta Dio de Dakar, Sénégal BP: 5005, Dakar Fann abdoul.ciss@ucad.edu.sn,
More informationUniformly best wavenumber approximations by spatial central difference operators: An initial investigation
Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations
More information1 Gambler s Ruin Problem
Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins
More information2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.
-D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear
More informationON THE DISTRIBUTION OF THE PARTIAL SUM OF EULER S TOTIENT FUNCTION IN RESIDUE CLASSES
C O L L O Q U I U M M A T H E M A T I C U M VOL. * 0* NO. * ON THE DISTRIBUTION OF THE PARTIAL SUM OF EULER S TOTIENT FUNCTION IN RESIDUE CLASSES BY YOUNESS LAMZOURI, M. TIP PHAOVIBUL and ALEXANDRU ZAHARESCU
More informationJARED DUKER LICHTMAN AND CARL POMERANCE
THE ERDŐS CONJECTURE FOR PRIMITIVE SETS JARED DUKER LICHTMAN AND CARL POMERANCE Abstract. A subset of the integers larger than is rimitive if no member divides another. Erdős roved in 935 that the sum
More informationThe Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001
The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse-Minkowski Theorem rovides a characterization of the rational quadratic forms. What follows is a roof of the Hasse-Minkowski
More informationThe inverse Goldbach problem
1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the
More informationPrimes of the form ±a 2 ± qb 2
Stud. Univ. Babeş-Bolyai Math. 58(2013), No. 4, 421 430 Primes of the form ±a 2 ± qb 2 Eugen J. Ionascu and Jeff Patterson To the memory of Professor Mircea-Eugen Craioveanu (1942-2012) Abstract. Reresentations
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More informationComplex Analysis Homework 1
Comlex Analysis Homework 1 Steve Clanton Sarah Crimi January 27, 2009 Problem Claim. If two integers can be exressed as the sum of two squares, then so can their roduct. Proof. Call the two squares that
More informationThe Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity
The Knuth-Yao Quadrangle-Ineuality Seedu is a Conseuence of Total-Monotonicity Wolfgang W. Bein Mordecai J. Golin Lawrence L. Larmore Yan Zhang Abstract There exist several general techniues in the literature
More informationRobust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System
Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology
More informationThe sum of squares for primes
Notes on Number Theory and Discrete Mathematics ISSN 30 53 Vol., 05, No. 4, 7 The sum of squares for rimes J. V. Leyendekkers and A. G. Shannon,3 Faculty of Science, The University of Sydney, NSW 006,
More informationProbability Estimates for Multi-class Classification by Pairwise Coupling
Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics
More informationOn Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm
On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,
More informationOptimal Recognition Algorithm for Cameras of Lasers Evanescent
Otimal Recognition Algorithm for Cameras of Lasers Evanescent T. Gaudo * Abstract An algorithm based on the Bayesian aroach to detect and recognise off-axis ulse laser beams roagating in the atmoshere
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationMATH 250: THE DISTRIBUTION OF PRIMES. ζ(s) = n s,
MATH 50: THE DISTRIBUTION OF PRIMES ROBERT J. LEMKE OLIVER For s R, define the function ζs) by. Euler s work on rimes ζs) = which converges if s > and diverges if s. In fact, though we will not exloit
More informationCombinatorics of topmost discs of multi-peg Tower of Hanoi problem
Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of
More informationElliptic Curves and Cryptography
Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a
More informationThe Fekete Szegő theorem with splitting conditions: Part I
ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the
More informationHARMONIC EXTENSION ON NETWORKS
HARMONIC EXTENSION ON NETWORKS MING X. LI Abstract. We study the imlication of geometric roerties of the grah of a network in the extendibility of all γ-harmonic germs at an interior node. We rove that
More informationFERMAT S LAST THEOREM
FERMAT S LAST THEOREM REVISITED AGAIN Colin Newton 8/0/08 0 FERMAT S LAST THEOREM When Fermat wrote a note in the margin of his coy of Bachet s Arithmetica to the effect that he had a marvellous roof that
More information#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS
#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS Norbert Hegyvári ELTE TTK, Eötvös University, Institute of Mathematics, Budaest, Hungary hegyvari@elte.hu François Hennecart Université
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationGENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS
GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS PALLAVI DANI 1. Introduction Let Γ be a finitely generated grou and let S be a finite set of generators for Γ. This determines a word metric on
More informationMulti-Operation Multi-Machine Scheduling
Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job
More informationMA3H1 TOPICS IN NUMBER THEORY PART III
MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced
More informationBEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO
BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO ANDREW GRANVILLE, DANIEL M. KANE, DIMITRIS KOUKOULOPOULOS, AND ROBERT J. LEMKE OLIVER Abstract. We determine for what
More informationStatics and dynamics: some elementary concepts
1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and
More information