A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding

Size: px
Start display at page:

Download "A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding"

Transcription

1 International Journal of Comuter Science and Alications c Technomathematics Research Foundation Vol. 7 No. 4,. 1-15, 010 A Note On the Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding Sandian Dey Microsoft India Develoment Center sandian.dey@gmail.com Hameed Al-Qaheri Deartment of Quantitative Methods and Information Systems College of Business Administration Kuwait University alqaheri@cba.edu.w Suneeta Sane Comuter and Information Technology Deartment Veermata Jijabai Technological Institute Mumbai, Maharashtra , India sssane@vjti.org.in Sugata Sanyal School of Technology and Comuter Science Tata Institute of Fundamental Research Homi Bhabha Road, Mumbai , India sanyal@tifr.res.in In this aer, we suggest a lower and an uer bound for the Generalized Fibonacci-Sequence, for different values of. The Fibonacci--Sequence is a generalization of the Classical Fibonacci Sequence. We first show that the ratio of two consecutive terms in generalized Fibonacci sequence converges to a -degree olynomial and then use this result to rove the bounds for generalized Fibonacci- sequence, thereby generalizing the exonential bounds for classical Fibonacci Sequence. Then we show how these results can be used to rove efficiency for data hiding techniques using generalized Fibonacci sequence. These steganograhic techniques use generalized Fibonacci--Sequence for increasing the number of available bit-lanes to hide data, so that more and more data can be hidden into the higher bit-lanes of any ixel without causing much distortion of the cover image. This bound can be used as a theoretical roof for efficiency of those techniques, for instance it exlains why more and more data can be hidden into the higher bit-lanes of a ixel, without causing considerable decrease in PSNR. Keywords: Fibonacci-sequence, LSB Data-hiding, PSNR 1. Introduction Among many different data hiding techniques roosed to embed secret message within images, the LSB data hiding technique is one of the simlest methods for inserting data into digital signals in noise free environments, which merely embeds secret message-bits in a subset of the LSB lanes of the image. LSB is the least 1

2 Dey, Al-Qaheri, Sane, Sanyal significant bit or the 0th bit, the second LSB is the 1st bit, and so on. Desite being simle, this technique is more redictable and hence less secure, also PSNR ea signal to noise ratio decreases very raidly as we use the higher bit lanes for data hiding. As soon as we go from LSB least significant bit to MSB most significant bit for selection of bit-lanes for our message embedding, the distortion in stego-image is liely to increase exonentially, so it becomes imossible without noticeable distortion and with exonentially increasing distance from cover-image and stego-image to use higher bit-lanes for embedding without any further rocessing. The worarounds may be: through the random LSB relacement in stead of sequential, secret messages can be randomly scattered in stego-images, so the security can be imroved. Also, using the aroaches given by variable deth LSB algorithm [Liu et al. 004], or by the otimal substitution rocess based on genetic algorithm and local ixel adjustment [Wang et al. 001], one is able to hide data to some extent in higher bit-lanes as well. Battisti et al. [Battisti et al. 006], [Picione et al. 006] roosed a novel data hiding technique from a totally different ersective, it uses a different bitlanes decomosition altogether, based on the generalized Fibonacci--sequences, that not only increases the number of embeddable bit-lanes but also decreases PSNR in the stego image considerably, thereby imroving the LSB technique. In this aer, we first rove some theoretical uer and lower bounds for generalized Fibonacci--sequence and give a theoretical roof for the better erformance of the data hiding technique using generalized Fibonacci decomosition, i.e., why the data hiding technique using this decomosition not only gives larger number of bit lanes for hiding secret bits, but also gives a far better PSNR than that in classical LSB technique. The Generalized Fibonacci--Sequence [Horadam 1961], [Basin and Hoggatt 1963], [Hoggatt 197], [Atins and Geist 1987], [Hendel 1994], [Sun and Sun 199] is given by, F 0 = F 1 =... = F = 1, F n = F n 1 + F n 1, n + 1, n, N 1 For = 1, we have, F 0 = F 1 = 1, F n = F n 1 + F n 1, n, n N We get the classical Fibonacci sequence 1, 1,, 3, 5, 8,.... We already have some results for this Classical Fibonacci Sequence, e.g., we now the ratio of two consecutive terms in Fibonacci sequence converge to Golden Ratio, In this aer, we show that α n > F n > α n, n, N, where α is the ositive Root of

3 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 3 x x 1 = 0. The ratio of two consecutive terms in Fibonacci--Sequence converges to this α.. Bounds for the generalized Fibonacci--Sequence In this section we rove the uer and lower bounds for the generalized Fibonacci-sequence. First, we show that the ratio of consecutive terms of generalized Fibonacci--sequence converges to the ositive root of the olynomial x x 1 = 0. Next we use this root to rove a bound on the generalized Fibonacci--sequence..1. Lemma 1 The ratio of two consecutive numbers in generalized Fibonacci -sequence converges to the ositive root of the degree- olynomial P x = x x 1. Proof: Convergence Let us first define{ the ratio} of two consecutive terms of Fibonacci--sequence as a Fn+1 sequence {β n } = F n. Now, by definition of Fibonacci--sequence, we have β 0 = β 1 = = β = 1 β n = 1 + F n > 1, n > F n β = β + β 0 = = β n = 1 + F n < =, n > + 1 F n 1 < β n <, n > + 1 We observe that the sequence β n is bounded and hence by Monotone Convergence theorem must have a convergent subsequence. For instance, for = 1 classical Fibonacci sequence, we have two convergent subsequences β n increasing and β n+1 decreasing, n N natural number and they both converge to the same limit [Craw 000], as shown in figure. Positive Root of the olynomial x x 1 Now, let s analyze the olynomial function y = P x = x x 1. By Descartes rule, the olynomial can have at most one ositive real root, since it has exactly one change in sign. First we observe that the function P x is continuous and differentiable everywhere. We also notice that the function has exactly one ositive root α and α

4 4 Dey, Al-Qaheri, Sane, Sanyal is also strictly larger than 1. This is a consequence of elementary calculus. By successive differentiation, we see that y 1 = P x = + 1x x 1 y = P x = + 1x 1 1x The function P x has critical oints at P x = 0, i.e., at x = 0 and x = y x=. = 1 > 0, 1. By nd order sufficient condition for local minima, P x has a local minima at x =. At x = 0, the function will have a maxima or a oint of inflection deending on whether is odd or even, exlained in the next section. When N odd, we have, y 1 = P x = + 1x 1 x is < 0 x < 0 = 0 x = 0 < 0 0 < x < = 0 x = > 0 x >, and increasing in Hence the function is decreasing in., Also, y 1 = 1, y0 = y1 = 1 and y = 1 1, N odd. At x =, P x has a minima gradient changes from negative to ositive but at x = 0 no sign change in gradient we have a oint of inflection. Again, P x being a continuous function assumes all ossible values within an interval. Combining all these, we can easily see that the grah of the function has exactly two real zeroes, one ositive and the other negative the remaining roots are comlex conjugate airs. When N even, we have, y 1 = P x = + 1x 1 x is > 0 x < 0 = 0 x = 0 < 0 0 < x < = 0 x = > 0 x > Hence the function is increasing in, 0, then decreasing in 0, and again increasing in., Also, y 1 = y0 = y1 = 1 and y = 1 1, N even. At x 0 =, P x has a minima but at x = 0 gradient changes from ositive to negative we have a maxima. Combining all these, we can easily see that we have exactly one real ositive root at α, since y1 < 0 and y > 0, also yx

5 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 5 being continuous. From this result we immediately have Lemma. From figure 1 we can see the grah of the degree- olynomial, for odd and even resectively. Convergence to the ositive root of the olynomial Now, we show that if sequence {β n } converges to β, then β = α. Let s assume the sequence {β n } converges to β R +. Now we rove, the sequence must converge to the only ositive root α of the above-stated -degree olynomial. By assumtion, β = lim n fn+ f n+ 1 = lim n fn+ 1 f n fn =... = lim =..., n f n 1 f n = n th number in the F ibonacci Sequence, f n+ = f n+ 1 + f n 1 fn+ 1 + f n 1 fn β = lim = lim, n n β = 1 + lim n f n+ 1 f =n+ =n 1 β = 1 + f +1 = =1 1 β = lim n f n 1 fn f n 1 β = β β β 1 = 0 Hence β satisfies the equation x x 1 = 0, N, β R +, i.e., from above results, we have, β = α Fig. 1. Grah of x x 1 = 0, showing α for different values of

6 6 Dey, Al-Qaheri, Sane, Sanyal.. Lemma If α be a ositive root of the equation x x 1 = 0, we have 1 < α <, N. Proof: We have, Also, α α 1 = 0 1 = 1 > 0, N 1 > α α 1 α > α α Also, 1 < 0 = α α 1 α α 1 > 0 From, we immediately see the following: α > 1 since ositive 3 α > 0 according to our assumtion, hence we can not have α = LHS & RHS both becomes 0, that does not satisfy inequality. If α >, we have LHS < 0 while RHS > 0 which again does not satisfy inequality. Hence we have α <, N From 3, we have, α > 1. Combining, we get, 1 < α <, N.3. Lemma 3 If α be a ositive root of the equation x x 1 = 0, where N, we have the following results, N, α > α +1 lim α = 1 α +1 > 1+α α < + 1 α +1 > 1 Proof: We have, For =, α +1 α 1 = 0 For = + 1, α + +1 α = 0 α α +1 1 = αα 1 α+1 1 = α 1 α α +1.α +1 4

7 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 7 From 4 we can argue, α α +1, since neither of them is 0 or 1 from Lemma. If α < α +1, we have LHS of inequality 4 < 1, but RHS > 1, since both the terms in RHS will be greater than 1 by our assumtion and by Lemma, a contradiction. Hence we must have Also, from Lemma, we have, 1 < α <, N. Hence we have, Again, from 4 we have, α > α +1, N 5 > α 1 > α >... > α > α +1 >... > 1, N lim α = 1 α+1 1 α.α +1 > 1, since > 1, from 5 α 1 α +1 α 1 > α +1 >, from Lemma α +1 1 α +1 > 1 + α Now, let us induct on N to rove α < + 1. Base case: For = 1, 1 < α 1 <, by Lemma. Let us assume the inequality holds < α < + 1, Induction Ste: = + 1, α = α 1 α., by 4 α +1 1 α < + 1. α 1 α +1 1 < α < + 1, by induction hyothesis α < α α +1 α +1 1 α < α α +1 α +1 1 α < , from 6, we have, α α +1 α +1 1 < 1 6 α < + α < + 1, N 7

8 8 Dey, Al-Qaheri, Sane, Sanyal Also, since α is a root of x x 1 = 0, for = we have. α +1 α 1 = 0 α +1 = α + 1 > since from Lemma, we have, α > 1 α +1 > 8.4. Lemma 4 The following inequalities always hold: < <... < 4 3 < 3 1 < α < + 1 α 1 α + > α +3 Proof: By Binomial Theorem, we have, = 1 r=0 1 1 <... α 3 < 4 α < 3 α < > 3... α + > α + > = 1 r! 1 r= r 1... r r!. 1 = 1 r=0. 1 r r s=1 1 s. 1 r! < =. 1 = < 1 9 }{{} times Hence we have, < 1 1 <... < < 3 1 < Also, from 7 we have, α < Combining, we get, α < < 1 1 <... < < 3 1 < α < + 1 α 1 <... α 4 < 5 α 3 < 4 α < 3 α < 10 Also, we have, α + > α +3 α +1 > α + = α +1 + α > + 1 = 3 α + > 3 α +3 = α + + α > = 4 > 3... α + > α + > Lemma 5 The following inequality gives us the lower and uer bounds for generalized Fibonacci--sequence, α n > F n > α n, n >, n N 1 where α is the ositive root of the equation x x 1 = 0.

9 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 9 Proof: We induct on n to show the result. F 0 = F 1 =... = F = 1, By definition of Fibonacci--Sequence. Base case: From Lemma 4, we have, α α + α +3 > F + 1 = F + F 0 = = > α > F + = F F 1 = + 1 = 3 > α > F + 3 = F + + F = = 4 > α 3 α + > F = F + + F = = + > α Induction Ste: Let s assume the above result is also true m : + 1 < m < n, m, n N. Now, we rove for m = n, α n 1 + α n 1 F n 1 + F n 1 > α n 1 Hence we have the following inequality, > F n 1 + F n 1 by hyothesis + α n 1 by hyothesis α n α > F n > α n α α n 1.α > F n > α n 1.α α n > F n > α n, n >, n N α n > F n > α n, α R + and α 1, 13 α 1 = , α , α , α , α > α, N The emirical results Table 1 also rove our claim for =. Also F 0 = F 1 = = F = 1 and F n + 1 > F n, n >. Hence we have, F n = F n 1 + F n 1 <.F n 1, n > F n <.F n 1 <.F n < < n.f = n, n > F n < n, n > 14

10 10 Dey, Al-Qaheri, Sane, Sanyal Combining 13 and 14, we have, n > F n > α n, n >, and n, N 15 where α is the ositive Root of x x 1 = 0. Figure and Table show the convergence of ratio of successive terms for Fibonacci--sequences for different For = 1 we get classical Fibonacci sequence. It can be noticed that smaller the value of, quicer the convergence of the ratio is achieved, as shown. Also value to which the ratio converges monotonically decreases with increase in the value of. 3. Alication in Data Hiding Data hiding is a new ind of secret communication technology, where message is hidden inside an image or any other medium, so that it cannot be observed. One of the simlest data hiding technique is LSB data hiding technique, which merely embeds secret message-bits in a subset of the LSB lanes of the image. One of the drawbacs of this technique is: as soon as we go from LSB to MSB for selection of bit-lanes for our message embedding, the distortion in stego-image is liely to increase exonentially, so it becomes imossible without noticeable distortion and with exonentially increasing distance from cover-image and stego-image to use higher bit-lanes for embedding without any further rocessing. This articular roblem was addressed by Battisti et al., [Battisti et al. 006], who roosed to use generalized Fibonacci--sequence decomosition technique instead of classical binary decomosition and shows by emirical results that this

11 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 11 Fig.. a Convergence of the ratio of successive terms in generalized Fibonacci -Sequence for different values of b Convergent Subsequences for classical Fibonacci sequence =1 technique outerforms the classical LSB technique when thought in terms of embedding in the higher bit lane as well with less distortion. This technique basically increases the number of bit-lanes by generating a new larger set of bit-lanes that we call virtual bit-lanes by using Fibonacci--sequence decomosition. It can be further imroved using rime and natural number decomosition techniques

12 1 Dey, Al-Qaheri, Sane, Sanyal as shown in [Dey et al. 007a], [Dey et al. 007b], [Dey et al. 008]. Also, [Cooer 1984] [Dotson et al. 1993] illustrates Fibonacci sequence can be used in various alications. In this aer we give a formal roof of Fibonacci--sequence bounds and show how this can be used to theoretically rove that Fibonacci--sequence decomosition gives better result in hiding data. From 15 it is clear from the uer bound that the same value will require more numbers of bits to be reresented than the number of bits required in classical binary decomosition since n > α n > F n, if it s exressed using Fibonacci--sequence decomosition where the radix is Fibonacci-sequence numbers instead of owers of. As illustrated in [Dey et al. 008], in order to measure the distortion in the stego-image, we use Mean square error MSE, Worst case Mean Square Error

13 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 13 WMSE and Pea Signal to Noise Ratio PSNR, which are defined by MSE = M i=1 j=1 N f ij g ij /MN P SNR = 10.log 10 L MSE [Dey et al. 008]. If the secret data-bit is embedded in the i th bit-lane of a ixel, the worst-case error-square-er-ixel will be = W SE = W i1..0 = W i here W i reresents the corresonding weight in the number system for the i th bit, e.g., for classical decomosition W i = i, for generalized Fibonacci decomosition W i = F i, corresonding to the case when the corresonding bit in cover-image toggles in stego-image, after embedding the secret data-bit. For examle, worst-case error-square-er-ixel for embedding a secret data-bit in the ith bit lane in case of a ixel in classical binary decomosition is = i = 4 i, where i N {0}. If the original -bit grayscale cover-image has size w h, we define, W MSE = w h W i = w h W SE [Dey et al. 008]. Hence, WMSE after embedding secret message bit only in the l th virtual bit-lane of each ixel in case of classical traditional binary LSB data hiding technique is given by, W MSEl th bit lane Classical Binary Decomosition = θ4l. WMSE after embedding secret message bit in the l th virtual bit-lane of each ixel in case of generalized Fibonacci decomosition is given by, W MSEl th bit lanef ibonacci Sequence Decomosition = F l α l < W MSEl F ibonacci sequence < α l, α R +, α 1 = 1 + 5, α > α, N, α1.618, W MSE l Generalized F ibonacci sequence < θ.618 l. Hence, we have, W MSE Binary > W MSE F ibonacci P SNR F ibonacci > P SNR Binary. Thus, we have first roved bounds on the generalized Fibonacci sequence and then by using our bounds, we have given a formal roof for better erformance in terms of PSNR for LSB data hiding technique using generalized Fibonacci-sequence decomosition than that using classical binary decomosition. Also, we

14 14 Dey, Al-Qaheri, Sane, Sanyal have, number of rimes n = n = θn. log n = oα n < F n < n [Telang 1999], [Niven and Zucerman 1966], [Tattersall 005] The above imlies that if the same number is reresented using rime decomosition n th rime number as weightage to n th bit, it will give still more numbers of virtual bit lanes [Battisti et al. 006]. We have similar results for LSB data hiding using natural number decomosition technique, and combining the results from [Battisti et al. 006], [Dey et al. 007a], [Dey et al. 007b], [Dey et al. 008] we have the following, W MSE Binary > W MSE F ibonacci > W MSE P rime > W MSE Natural P SNR Natural > P SNR P rime > P SNR F ibonacci > P SNR Binary. Hence, data hiding using natural number decomosition gives the best erformance among the above mentioned techniques. In data hiding, we hide data in different bit-lanes of a ixel. In classical LSB data-hiding technique the ixel is reresented as binary value, hence it has less numbers of bit-lanes as we have in case of Fibonacci--sequence decomosition, the later having still less number of bit-lanes than in case of rime decomosition technique. It is shown in [Dey et al. 007a], [Dey et al. 007b], [Dey et al. 008] by calculation of WMSE and PSNR measures that embedding data even in higher bit-lanes of ixel using these techniques results in less visible distortion of the cover image, since the distortion as measured by WMSE is roortional to the square of the weights to the bits in the corresonding decomosition, hence it decreases as the weights go on decreasing from classical binary to generalized Fibonacci and from that to rime and natural number decomosition [Dey et al. 008]. 4. Conclusions In this aer, we have established the bounds for generalized Fibonacci-sequence α n > F n > α n, n >, n, N. Emirical results obtained vindicates our theoretically-roven bounds. Then we used the result n > F n > α n, n >, n, N, where α is the ositive Root of x x 1 = 0, to rove that data hiding technique using generalized Fibonacci--sequence gives more embeddable bit-lanes along with better PSNR than that in case of classical LSB technique [Dey et al. 008], and the same using rime decomosition technique increases virtual bit-lanes and PSNR further [Dey et al. 007a]. References Battisti F., Carli M., Neri A., Egiazarian K A Generalized Fibonacci LSB Data Hiding Technique. 3rd International Conference on Comuters and Devices for Communication CODEC- 06, December 18 0 TEA, Institute of Radio Physics and Electronics, University of Calcutta.

15 Bounds for the Generalized Fibonacci--Sequence and its Alication in Data-Hiding 15 Basin S. L. and Hoggatt V. E. Jr A Primer on the Fibonacci Sequence, Fib. Quart. 1. Atins J. and Geist R Fibonacci numbers and comuter algorithms. College Math. J. 18, Cooer C Alication of a Generalized Fibonacci Sequence. The College Mathematics Journal, Vol. 15,, Craw I Advanced Calculus and Analysis, MA100, Deartment of Mathematical Sciences, University of Aberdeen, DSN mth , 6 7, V Dey S., Abraham A. and Sanyal S. 007a. An LSB Data Hiding Technique Using Prime Numbers. Third International Symosium on Information Assurance and Security IAS 07, August 9 31, Manchester, United Kingdom, IEEE Comuter Society ress, USA, ISBN , Dey S., Abraham A. and Sanyal S. 007b. An LSB Data Hiding Technique Using Natural Numbers. IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIHMSP 07, Nov 6 8, Kaohsiung City, Taiwan, IEEE Comuter Society ress, USA, ISBN , Dey S., Abraham A., Bandyoadhyay B. and Sanyal S Data Hiding Techniques Using Prime and Natural Numbers. Journal of Digital Information Management, Vol. 6. Dotson W., Norwood F. and Taylor C Fiber otics and Fibonacci. this MAGAZINE 66, Hendel R. J Aroaches to the formula for the nth Fibonacci number, College Math. J. 5, Hoggatt V. E. Jr Fibonacci and Lucas numbers. The Fibonacci Association, Santa Clara, California, USA. Horadam A A generalized Fibonacci sequence. American Mathematical Monthly, 68, Liu S. H., Chen T. H., Yao H. X., Gao W A Variable Deth LSB Data Hiding Technique in images. Proceedings of the 3rd International Conference on Machine Learning and Cybernetics, 6-9 August, Shanghai. Niven I. and Zucerman H. S An Introduction to the Theory of Numbers. Wiley, nd ed., New Yor. Picione D. D. L., Battisti F., Carli M., Astola J. and Egiazarian K.006. A Fibonacci LSB data hiding technique. Proc. Euroean signal rocessing conference. Sun Z. H. and Sun Z. W Fibonacci numbers and Fermat s last theorem. Acta Arith. 60, Tattersall J. J Elementary number theory in nine chaters, nd ed., Cambridge University Press, ISBN , Telang S. G Number Theory. Tata McGraw-Hill, ISBN , First Rerint, Wang R. Z., Lin C. F. and Lin I. C Image Hiding by LSB substitution and genetic algorithm. Pattern Recognition, Vol. 34, 3,

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education CERIAS Tech Reort 2010-01 The eriod of the Bell numbers modulo a rime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education and Research Information Assurance and Security Purdue University,

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H: Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

On the irreducibility of a polynomial associated with the Strong Factorial Conjecture

On the irreducibility of a polynomial associated with the Strong Factorial Conjecture On the irreducibility of a olynomial associated with the Strong Factorial Conecture Michael Filaseta Mathematics Deartment University of South Carolina Columbia, SC 29208 USA E-mail: filaseta@math.sc.edu

More information

A FEW EQUIVALENCES OF WALL-SUN-SUN PRIME CONJECTURE

A FEW EQUIVALENCES OF WALL-SUN-SUN PRIME CONJECTURE International Journal of Mathematics & Alications Vol 4, No 1, (June 2011), 77-86 A FEW EQUIVALENCES OF WALL-SUN-SUN PRIME CONJECTURE ARPAN SAHA AND KARTHIK C S ABSTRACT: In this aer, we rove a few lemmas

More information

Math 4400/6400 Homework #8 solutions. 1. Let P be an odd integer (not necessarily prime). Show that modulo 2,

Math 4400/6400 Homework #8 solutions. 1. Let P be an odd integer (not necessarily prime). Show that modulo 2, MATH 4400 roblems. Math 4400/6400 Homework # solutions 1. Let P be an odd integer not necessarily rime. Show that modulo, { P 1 0 if P 1, 7 mod, 1 if P 3, mod. Proof. Suose that P 1 mod. Then we can write

More information

On generalizing happy numbers to fractional base number systems

On generalizing happy numbers to fractional base number systems On generalizing hay numbers to fractional base number systems Enriue Treviño, Mikita Zhylinski October 17, 018 Abstract Let n be a ositive integer and S (n) be the sum of the suares of its digits. It is

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

BOUNDS FOR THE SIZE OF SETS WITH THE PROPERTY D(n) Andrej Dujella University of Zagreb, Croatia

BOUNDS FOR THE SIZE OF SETS WITH THE PROPERTY D(n) Andrej Dujella University of Zagreb, Croatia GLASNIK MATMATIČKI Vol. 39(59(2004, 199 205 BOUNDS FOR TH SIZ OF STS WITH TH PROPRTY D(n Andrej Dujella University of Zagreb, Croatia Abstract. Let n be a nonzero integer and a 1 < a 2 < < a m ositive

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

When do Fibonacci invertible classes modulo M form a subgroup?

When do Fibonacci invertible classes modulo M form a subgroup? Calhoun: The NPS Institutional Archive DSace Reository Faculty and Researchers Faculty and Researchers Collection 2013 When do Fibonacci invertible classes modulo M form a subgrou? Luca, Florian Annales

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to

More information

March 4, :21 WSPC/INSTRUCTION FILE FLSpaper2011

March 4, :21 WSPC/INSTRUCTION FILE FLSpaper2011 International Journal of Number Theory c World Scientific Publishing Comany SOLVING n(n + d) (n + (k 1)d ) = by 2 WITH P (b) Ck M. Filaseta Deartment of Mathematics, University of South Carolina, Columbia,

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

An Estimate For Heilbronn s Exponential Sum

An Estimate For Heilbronn s Exponential Sum An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined

More information

#A8 INTEGERS 12 (2012) PARTITION OF AN INTEGER INTO DISTINCT BOUNDED PARTS, IDENTITIES AND BOUNDS

#A8 INTEGERS 12 (2012) PARTITION OF AN INTEGER INTO DISTINCT BOUNDED PARTS, IDENTITIES AND BOUNDS #A8 INTEGERS 1 (01) PARTITION OF AN INTEGER INTO DISTINCT BOUNDED PARTS, IDENTITIES AND BOUNDS Mohammadreza Bidar 1 Deartment of Mathematics, Sharif University of Technology, Tehran, Iran mrebidar@gmailcom

More information

A CRITERION FOR POLYNOMIALS TO BE CONGRUENT TO THE PRODUCT OF LINEAR POLYNOMIALS (mod p) ZHI-HONG SUN

A CRITERION FOR POLYNOMIALS TO BE CONGRUENT TO THE PRODUCT OF LINEAR POLYNOMIALS (mod p) ZHI-HONG SUN A CRITERION FOR POLYNOMIALS TO BE CONGRUENT TO THE PRODUCT OF LINEAR POLYNOMIALS (mod ) ZHI-HONG SUN Deartment of Mathematics, Huaiyin Teachers College, Huaian 223001, Jiangsu, P. R. China e-mail: hyzhsun@ublic.hy.js.cn

More information

E-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula

E-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula e-comanion to Han Du and Zuluaga: Etension of Scarf s ma-min order formula ec E-comanion to A risk- and ambiguity-averse etension of the ma-min newsvendor order formula Qiaoming Han School of Mathematics

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

Mersenne and Fermat Numbers

Mersenne and Fermat Numbers NUMBER THEORY CHARLES LEYTEM Mersenne and Fermat Numbers CONTENTS 1. The Little Fermat theorem 2 2. Mersenne numbers 2 3. Fermat numbers 4 4. An IMO roblem 5 1 2 CHARLES LEYTEM 1. THE LITTLE FERMAT THEOREM

More information

Real Analysis 1 Fall Homework 3. a n.

Real Analysis 1 Fall Homework 3. a n. eal Analysis Fall 06 Homework 3. Let and consider the measure sace N, P, µ, where µ is counting measure. That is, if N, then µ equals the number of elements in if is finite; µ = otherwise. One usually

More information

#A45 INTEGERS 12 (2012) SUPERCONGRUENCES FOR A TRUNCATED HYPERGEOMETRIC SERIES

#A45 INTEGERS 12 (2012) SUPERCONGRUENCES FOR A TRUNCATED HYPERGEOMETRIC SERIES #A45 INTEGERS 2 (202) SUPERCONGRUENCES FOR A TRUNCATED HYPERGEOMETRIC SERIES Roberto Tauraso Diartimento di Matematica, Università di Roma Tor Vergata, Italy tauraso@mat.uniroma2.it Received: /7/, Acceted:

More information

Some sophisticated congruences involving Fibonacci numbers

Some sophisticated congruences involving Fibonacci numbers A tal given at the National Center for Theoretical Sciences (Hsinchu, Taiwan; July 20, 2011 and Shanghai Jiaotong University (Nov. 4, 2011 Some sohisticated congruences involving Fibonacci numbers Zhi-Wei

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

Gaps in Semigroups. Université Pierre et Marie Curie, Paris 6, Equipe Combinatoire - Case 189, 4 Place Jussieu Paris Cedex 05, France.

Gaps in Semigroups. Université Pierre et Marie Curie, Paris 6, Equipe Combinatoire - Case 189, 4 Place Jussieu Paris Cedex 05, France. Gas in Semigrous J.L. Ramírez Alfonsín Université Pierre et Marie Curie, Paris 6, Equie Combinatoire - Case 189, 4 Place Jussieu Paris 755 Cedex 05, France. Abstract In this aer we investigate the behaviour

More information

arxiv: v1 [math.nt] 4 Nov 2015

arxiv: v1 [math.nt] 4 Nov 2015 Wall s Conjecture and the ABC Conjecture George Grell, Wayne Peng August 0, 018 arxiv:1511.0110v1 [math.nt] 4 Nov 015 Abstract We show that the abc conjecture of Masser-Oesterlé-Sziro for number fields

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

Finding Shortest Hamiltonian Path is in P. Abstract

Finding Shortest Hamiltonian Path is in P. Abstract Finding Shortest Hamiltonian Path is in P Dhananay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune, India bstract The roblem of finding shortest Hamiltonian ath in a eighted comlete grah belongs

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

Examples from Elements of Theory of Computation. Abstract. Introduction

Examples from Elements of Theory of Computation. Abstract. Introduction Examles from Elements of Theory of Comutation Mostafa Ghandehari Samee Ullah Khan Deartment of Comuter Science and Engineering University of Texas at Arlington, TX-7609, USA Tel: +(87)7-5688, Fax: +(87)7-784

More information

Dimension Characterizations of Complexity Classes

Dimension Characterizations of Complexity Classes Dimension Characterizations of Comlexity Classes Xiaoyang Gu Jack H. Lutz Abstract We use derandomization to show that sequences of ositive sace-dimension in fact, even ositive k-dimension for suitable

More information

A Public-Key Cryptosystem Based on Lucas Sequences

A Public-Key Cryptosystem Based on Lucas Sequences Palestine Journal of Mathematics Vol. 1(2) (2012), 148 152 Palestine Polytechnic University-PPU 2012 A Public-Key Crytosystem Based on Lucas Sequences Lhoussain El Fadil Communicated by Ayman Badawi MSC2010

More information

GRACEFUL NUMBERS. KIRAN R. BHUTANI and ALEXANDER B. LEVIN. Received 14 May 2001

GRACEFUL NUMBERS. KIRAN R. BHUTANI and ALEXANDER B. LEVIN. Received 14 May 2001 IJMMS 29:8 2002 495 499 PII S06720200765 htt://immshindawicom Hindawi Publishing Cor GRACEFUL NUMBERS KIRAN R BHUTANI and ALEXANDER B LEVIN Received 4 May 200 We construct a labeled grah Dn that reflects

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm

NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm - (23) NLP - NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS The Goldstein-Levitin-Polya algorithm We consider an algorithm for solving the otimization roblem under convex constraints. Although the convexity

More information

Supplementary Materials for Robust Estimation of the False Discovery Rate

Supplementary Materials for Robust Estimation of the False Discovery Rate Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

The Fibonacci Quarterly 44(2006), no.2, PRIMALITY TESTS FOR NUMBERS OF THE FORM k 2 m ± 1. Zhi-Hong Sun

The Fibonacci Quarterly 44(2006), no.2, PRIMALITY TESTS FOR NUMBERS OF THE FORM k 2 m ± 1. Zhi-Hong Sun The Fibonacci Quarterly 44006, no., 11-130. PRIMALITY TESTS FOR NUMBERS OF THE FORM k m ± 1 Zhi-Hong Sun eartment of Mathematics, Huaiyin Teachers College, Huaian, Jiangsu 3001, P.R. China E-mail: zhsun@hytc.edu.cn

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

MAS 4203 Number Theory. M. Yotov

MAS 4203 Number Theory. M. Yotov MAS 4203 Number Theory M. Yotov June 15, 2017 These Notes were comiled by the author with the intent to be used by his students as a main text for the course MAS 4203 Number Theory taught at the Deartment

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are Numer. Math. 68: 215{223 (1994) Numerische Mathemati c Sringer-Verlag 1994 Electronic Edition Bacward errors for eigenvalue and singular value decomositions? S. Chandrasearan??, I.C.F. Isen??? Deartment

More information

RAMANUJAN-NAGELL CUBICS

RAMANUJAN-NAGELL CUBICS RAMANUJAN-NAGELL CUBICS MARK BAUER AND MICHAEL A. BENNETT ABSTRACT. A well-nown result of Beuers [3] on the generalized Ramanujan-Nagell equation has, at its heart, a lower bound on the quantity x 2 2

More information

By Evan Chen OTIS, Internal Use

By Evan Chen OTIS, Internal Use Solutions Notes for DNY-NTCONSTRUCT Evan Chen January 17, 018 1 Solution Notes to TSTST 015/5 Let ϕ(n) denote the number of ositive integers less than n that are relatively rime to n. Prove that there

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun

More information

THE LEAST PRIME QUADRATIC NONRESIDUE IN A PRESCRIBED RESIDUE CLASS MOD 4

THE LEAST PRIME QUADRATIC NONRESIDUE IN A PRESCRIBED RESIDUE CLASS MOD 4 THE LEAST PRIME QUADRATIC NONRESIDUE IN A PRESCRIBED RESIDUE CLASS MOD 4 PAUL POLLACK Abstract For all rimes 5, there is a rime quadratic nonresidue q < with q 3 (mod 4 For all rimes 3, there is a rime

More information

When do the Fibonacci invertible classes modulo M form a subgroup?

When do the Fibonacci invertible classes modulo M form a subgroup? Annales Mathematicae et Informaticae 41 (2013). 265 270 Proceedings of the 15 th International Conference on Fibonacci Numbers and Their Alications Institute of Mathematics and Informatics, Eszterházy

More information

Approximation of the Euclidean Distance by Chamfer Distances

Approximation of the Euclidean Distance by Chamfer Distances Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of

More information

Prime Reciprocal Digit Frequencies and the Euler Zeta Function

Prime Reciprocal Digit Frequencies and the Euler Zeta Function Prime Recirocal Digit Frequencies and the Euler Zeta Function Subhash Kak. The digit frequencies for rimes are not all equal. The least significant digit for rimes greater than 5 can only be, 3, 7, or

More information

Best approximation by linear combinations of characteristic functions of half-spaces

Best approximation by linear combinations of characteristic functions of half-spaces Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of

More information

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material Robustness of classifiers to uniform l and Gaussian noise Sulementary material Jean-Yves Franceschi Ecole Normale Suérieure de Lyon LIP UMR 5668 Omar Fawzi Ecole Normale Suérieure de Lyon LIP UMR 5668

More information

Randomness Extraction in finite fields F p

Randomness Extraction in finite fields F p Randomness Extraction in finite fields F n Abdoul Aziz Ciss École doctorale de Mathématiques et d Informatique, Université Cheikh Anta Dio de Dakar, Sénégal BP: 5005, Dakar Fann abdoul.ciss@ucad.edu.sn,

More information

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S. -D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear

More information

ON THE DISTRIBUTION OF THE PARTIAL SUM OF EULER S TOTIENT FUNCTION IN RESIDUE CLASSES

ON THE DISTRIBUTION OF THE PARTIAL SUM OF EULER S TOTIENT FUNCTION IN RESIDUE CLASSES C O L L O Q U I U M M A T H E M A T I C U M VOL. * 0* NO. * ON THE DISTRIBUTION OF THE PARTIAL SUM OF EULER S TOTIENT FUNCTION IN RESIDUE CLASSES BY YOUNESS LAMZOURI, M. TIP PHAOVIBUL and ALEXANDRU ZAHARESCU

More information

JARED DUKER LICHTMAN AND CARL POMERANCE

JARED DUKER LICHTMAN AND CARL POMERANCE THE ERDŐS CONJECTURE FOR PRIMITIVE SETS JARED DUKER LICHTMAN AND CARL POMERANCE Abstract. A subset of the integers larger than is rimitive if no member divides another. Erdős roved in 935 that the sum

More information

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse-Minkowski Theorem rovides a characterization of the rational quadratic forms. What follows is a roof of the Hasse-Minkowski

More information

The inverse Goldbach problem

The inverse Goldbach problem 1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the

More information

Primes of the form ±a 2 ± qb 2

Primes of the form ±a 2 ± qb 2 Stud. Univ. Babeş-Bolyai Math. 58(2013), No. 4, 421 430 Primes of the form ±a 2 ± qb 2 Eugen J. Ionascu and Jeff Patterson To the memory of Professor Mircea-Eugen Craioveanu (1942-2012) Abstract. Reresentations

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

Complex Analysis Homework 1

Complex Analysis Homework 1 Comlex Analysis Homework 1 Steve Clanton Sarah Crimi January 27, 2009 Problem Claim. If two integers can be exressed as the sum of two squares, then so can their roduct. Proof. Call the two squares that

More information

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity The Knuth-Yao Quadrangle-Ineuality Seedu is a Conseuence of Total-Monotonicity Wolfgang W. Bein Mordecai J. Golin Lawrence L. Larmore Yan Zhang Abstract There exist several general techniues in the literature

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

The sum of squares for primes

The sum of squares for primes Notes on Number Theory and Discrete Mathematics ISSN 30 53 Vol., 05, No. 4, 7 The sum of squares for rimes J. V. Leyendekkers and A. G. Shannon,3 Faculty of Science, The University of Sydney, NSW 006,

More information

Probability Estimates for Multi-class Classification by Pairwise Coupling

Probability Estimates for Multi-class Classification by Pairwise Coupling Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

Optimal Recognition Algorithm for Cameras of Lasers Evanescent

Optimal Recognition Algorithm for Cameras of Lasers Evanescent Otimal Recognition Algorithm for Cameras of Lasers Evanescent T. Gaudo * Abstract An algorithm based on the Bayesian aroach to detect and recognise off-axis ulse laser beams roagating in the atmoshere

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

MATH 250: THE DISTRIBUTION OF PRIMES. ζ(s) = n s,

MATH 250: THE DISTRIBUTION OF PRIMES. ζ(s) = n s, MATH 50: THE DISTRIBUTION OF PRIMES ROBERT J. LEMKE OLIVER For s R, define the function ζs) by. Euler s work on rimes ζs) = which converges if s > and diverges if s. In fact, though we will not exloit

More information

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of

More information

Elliptic Curves and Cryptography

Elliptic Curves and Cryptography Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a

More information

The Fekete Szegő theorem with splitting conditions: Part I

The Fekete Szegő theorem with splitting conditions: Part I ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the

More information

HARMONIC EXTENSION ON NETWORKS

HARMONIC EXTENSION ON NETWORKS HARMONIC EXTENSION ON NETWORKS MING X. LI Abstract. We study the imlication of geometric roerties of the grah of a network in the extendibility of all γ-harmonic germs at an interior node. We rove that

More information

FERMAT S LAST THEOREM

FERMAT S LAST THEOREM FERMAT S LAST THEOREM REVISITED AGAIN Colin Newton 8/0/08 0 FERMAT S LAST THEOREM When Fermat wrote a note in the margin of his coy of Bachet s Arithmetica to the effect that he had a marvellous roof that

More information

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS #A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS Norbert Hegyvári ELTE TTK, Eötvös University, Institute of Mathematics, Budaest, Hungary hegyvari@elte.hu François Hennecart Université

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS

GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS PALLAVI DANI 1. Introduction Let Γ be a finitely generated grou and let S be a finite set of generators for Γ. This determines a word metric on

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

MA3H1 TOPICS IN NUMBER THEORY PART III

MA3H1 TOPICS IN NUMBER THEORY PART III MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced

More information

BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO

BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO ANDREW GRANVILLE, DANIEL M. KANE, DIMITRIS KOUKOULOPOULOS, AND ROBERT J. LEMKE OLIVER Abstract. We determine for what

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information