Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions

Size: px
Start display at page:

Download "Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions"

Transcription

1 Linear recurrences and asyptotic behavior of exponential sus of syetric boolean functions Francis N. Castro Departent of Matheatics University of Puerto Rico, San Juan, PR Luis A. Medina Departent of Matheatics University of Puerto Rico, San Juan, PR Subitted: Jan 28, 2011; Accepted: May 13, 2011; Published: May 25, 2011 Matheatics Subject Classification: 11T23, 05E05 Dedicated to Doron Zeilberger on the occasion of his 60th birthday Abstract In this paper we give an iproveent of the degree of the hoogeneous linear recurrence with integer coefficients that exponential sus of syetric Boolean functions satisfy. This iproveent is tight. We also copute the asyptotic behavior of syetric Boolean functions and provide a forula that allows us to deterine if a syetric boolean function is asyptotically not balanced. In particular, when the degree of the syetric function is a power of two, then the exponential su is uch saller than 2 n. Keywords: Exponential sus, recurrences, Cusick et al. Conjecture for eleentary balanced syetric boolean functions 1 Introduction Boolean functions are one of the ost studied objects in atheatics. They are iportant in any applications, for exaple, in the design of strea ciphers, block and hash functions. These functions also play a vital role in cryptography as they are used as filter and cobination generator of strea ciphers based on linear feed-back shift registers. The the electronic journal of cobinatorics 18(2 (2011, #P8 1

2 case of boolean functions of degree 2 has been intensively studied because of its relation to bent functions (see [11], [1]. One can find any papers and books discussing the properties of boolean functions (see [5], [9], [2] and [6]. The subject can be studied fro the point of view of coplexity theory or fro the algebraic point of view as we do in this paper, where we copute the asyptotic behavior of exponential sus of syetric boolean functions. The correlation between two Boolean functions of n inputs is defined as the nuber of ties the functions agree inus the nuber of ties they disagree all divided by 2 n, i.e., C(F 1, F 2 = 1 ( 1 F 1(x 1,...,x n+f 2 (x 1,...,x n. (1.1 2 n x 1,...,x n {0,1} In this paper we are interested in the case when F 1 and F 2 are syetric boolean functions. Without loss of generality, we write C(F instead of C(F 1, F 2, where F is a syetric boolean function. In [4], A. Canteaut and M. Videau studied in detail syetric boolean functions. They established a link between the periodicity of the siplified value vector of a syetric Boolean function and its degree. They also deterined all balanced syetric functions of degree less than or equal to 7. In [13], J. von zur Gathen and J. Rouche found all the balanced syetric boolean functions up to 128 variables. In[3], J. Cai et. al. coputed a closed forula for the correlation between any two syetric Boolean functions. This forula iplies that C(F satisfies a hoogeneous linear recurrence with integer coefficients and provides an upper bound for the degree of the inial recurrence of this type that C(F satisfies. In this paper we give an iproveent to the degree of the inial hoogeneous linear recurrence with integer coefficients satisfying by C(F. In particular, our lower and upper bounds are tight in any cases. Also, in the case of an eleentary syetric function we provide the inial hoogeneous linear recurrence. We also copute the asyptotic value of C(F. In particular, we give infinite failies of boolean functions that are asyptotically not balanced, i.e., li n C(F 0. In [7], T. Cusick et al. conjectured that there are no nonlinear balanced eleentary syetric polynoials except for the eleentary syetric boolean function of degree k = in l 1 variables, where r and l are any positive integers. In this paper, we prove that li C(σ n,k = 2w2(k 1 1, (1.2 n 2 w 2(k 1 where σ n,k is the eleentary syetric polynoial of degree k in n variables and w 2 (k is the su of the binary digits of k. Note that this iplies that Cusick et al. s conjecture holds for sufficiently large n. In particular, an eleentary syetric function is asyptotically not balanced if and only if its degree is not a power of 2. In [8], Cusick et al. presented soe progress on proving this conjecture. In particular, they presented the following stronger version of their conjecture: If n 2(k 1, where k is fixed and w 2 (k 6, then C(F > 1/2. Forula (1.2 iplies that this holds for sufficiently large n when w 2 (k 3. the electronic journal of cobinatorics 18(2 (2011, #P8 2

3 When the asyptotic value of C(F is zero, we copute the asyptotic values of 1 λ n x 1,...,x n {0,1} ( 1 F (x 1,...,x n, (1.3 where λ and λ are the roots with the biggest odulus of the characteristic polynoial associated to the exponential su of F. We prove that the coefficient of λ is not identically zero and obtain inforation about the spectru of F (X 1,..., X n. In particular, its liit is a periodic function in n. 2 Preliinaries Let F be the binary field, F n = {(x 1,..., x n x i F, i = 1,..., n}, and F (X = F (X 1,..., X n be a polynoial in n variables over F. The exponential su associated to F over F is: S(F = x F n ( 1 F (x. (2.1 Note that S(F = 2 n C(F. A boolean function F (X is called balanced if S(F = 0. This property is iportant for soe applications in cryptography. P. Sarkar and S. Maitra [12] found a lower bound for the nuber of syetric balanced boolean functions. In particular, in the case that n 13 is odd and n + 3 is a perfect square, this nuber is bigger than or equal to 2 (n+1/2 + 2 (n+1/2 3. In this paper we study exponential sus associated to syetric boolean functions F. Any syetric function is a linear cobination of eleentary syetric polynoials, thus we start with exponential sus of eleentary syetric polynoials. Let σ n,k be the eleentary syetric polynoial in n variables of degree k. For exaple, σ 4,3 = X 1 X 2 X 3 + X 1 X 4 X 3 + X 2 X 4 X 3 + X 1 X 2 X 4. (2.2 Fix k 2 and let n vary. Consider the sequence of exponential sus {S(σ n,k } n N where S(σ n,k = ( 1 σ n,k(x 1,,x n. (2.3 x 1,,x n F Define A j to be the set of all (x 1,, x n F n with exactly j entries equal to 1. Clearly, A j = ( n j and σn,k (x = ( j k for x Aj. Therefore, n ( S(σ n,k = ( 1 (j k n. (2.4 j j=0 In general, if 1 < k 2 < < k s are fixed integers, then n S(σ n,k1 + σ n,k2 + + σ n,ks = ( 1 ( j +( j k 2 + +( j ( n ks. (2.5 j j=0 the electronic journal of cobinatorics 18(2 (2011, #P8 3

4 Rear Note that the su on the right hand side of (2.5 akes sense for values of n less than k s, while S(σ n,k1 + + σ n,ks does not. However, throughout the paper we let S(σ n,k1 + + σ n,ks to be defined by the su in (2.5, even for values of n less than k s. 3 The recurrence Coputer experientation suggests that for fix 1 < < k s, the sequence {S(σ n,k1 + + σ n,ks } n N satisfies a hoogeneous linear recurrence with integer coefficients. For exaple, if we consider {S(σ n,7 } n N and type FindLinearRecurrence[Table[Su[((-1^Binoial[,7]* into Matheatica 7, then it returns Binoial[n,],{,0,n}],{n,1,30}]] {8,-28,56,-70,56,-28,8}. This suggests that {S(σ n,7 } n N satisfies the recurrence x n = 8x n 1 28x n x n 3 70x n x n 5 28x n 6 + 8x n 7. (3.1 If we continue with these experients, we arrive to the observation that if r = log 2 (k s + 1, then {S(σ n,k1 + + σ n,ks } n N sees to satisfy the recurrence ( 2 x n = ( 1 1 r x n. (3.2 =1 This result can be proved using eleentary achinery. The idea is to use the fact that if r = log 2 (k s + 1, then ( ( j + i2 r j (od 2 (3.3 k for all non-negative integers i and = 1, 2,, s, to show inductively that the faily of sequences a n,r,i = ( n ( n =, (3.4 j + i j j k j i (od i = 0, 1, 1 satisfies the sae recurrence (3.2. However, we should point out the fact that {S(σ n,k1 + +σ n,ks } n N satisfies (3.2 is a consequence of the following theore of J. Cai et al. [3]. Theore 3.1 Fix 1 < < k s and let r = log 2 (k s + 1. The value of the exponential su S(σ n,k1 + + σ n,ks is given by n S(σ n,k1 + + σ n,ks = ( 1 ( i + +( i ( n ks i i=0 = c 0 (,, k s 2 n + j=1 c j (,, k s (1 + ζ j n, (3.5 the electronic journal of cobinatorics 18(2 (2011, #P8 4

5 ( π where ζ j = exp 1 j and 1 c j (,, k s = 1 2r 1 ( 1 ( i i=0 + +( i The proofs of Cai et al. rely on linear algebra. They wrote i=0 ks ζ i j. (3.6 S(σ n,k1 + + σ n,ks = ( 1 ( i + +( i ks a n,r,i, (3.7 and used the eleentary identity ( ( n n 1 = + k k to find a recurrence for a n,r = a n,r,1 a n,r,2. a n,r,2 ( n 1, (3.8 k 1 (3.9 of the for a n,r = Ma n 1,r, for soe atrix M. Finding the eigenvalues and corresponding eigenvectors of M, they were able to solve this recurrence and prove Theore 3.1. See [3] for ore details. Fro Theore 3.1 it is now evident that {S(σ n,k1 + + σ n,ks } n N satisfies (3.2. Moreover, the roots of the characteristic polynoial associated to the linear recurrence (3.2 are all different and the polynoial is given by P r (x = ( 2 ( 1 r x 2 = (x 2Φ 4 (x 1Φ 8 (x 1 Φ (x 1, (3.10 where Φ (x represents the -th cyclotoic polynoial Φ (x = (x ζ. (3.11 ζ =1 priitive Even though {S(σ n,k1 + + σ n,ks } n N satisfies (3.2, in any instances (3.2 is not the inial hoogeneous linear recurrence with integer coefficients that {S(σ n,k1 + + σ n,ks } n N satisfies. For exaple, {S(σ n,3 + σ n,5 } n N satisfies (3.1, but its inial recurrence is x n = 6x n 1 14x n x n 3 10x n 4 + 4x n 5. (3.12 In the next section we use Theore 3.1 to give soe iproveents on the degree of the inial linear recurrence associated to {S(σ n,k1 + + σ n,ks } n N. the electronic journal of cobinatorics 18(2 (2011, #P8 5

6 4 On the degree of the recurrence relation Now that we are equipped with equation (3.6, we ove to the proble of reducing the degree of the recurrence relation that our sequences of exponential sus satisfy. The idea behind our approach is very siple. Consider all roots 1 + ζ s of Φ 2 t+1(x 1 where 1 t r 1. We know that (1 + ζ n appears in (3.5. If we show that the coefficient that corresponds to (1 + ζ n is zero for each 1 + ζ, then we reduce the degree of the characteristic polynoial, and therefore the degree of the recurrence, by 2 t. However, note that Φ 2 t+1(x 1 is irreducible over Q (according to Eisenstein s criterion on Φ 2 t+1(x 1 with Φ 2 t+1(x = x 2t + 1, see [10]. Therefore, the coefficients related to the roots of Φ 2 t+1(x 1 are either all zeros or all non-zeros. In view of (3.6, this can be deterined by checking whether or not the su + +( ( π 1 ks exp 2 t (4.1 is zero. First, we discuss the case of the exponential su of one eleentary syetric polynoial, i.e. {S(σ n,k } n N. We start with the following eleentary result. Lea 4.1 (Lucas theore Let n be a natural nuber with 2-adic expansion n = 2 a a a l. The binoial coefficient ( n k is odd if and only if k is either 0 or a su of soe of the 2 a i s. Proof: Recall that (1 + x x 2 (od 2 for all non-negative integer, thus (1 + x n (1 + x 2a 1 (1 + x 2a 2 (1 + x 2a l (od 2. Note that the coefficient of x k in (1 + x 2a 1 (1 + x 2a 2 (1 + x 2a l is 1 if and only if k = 0 or a su of soe of the 2 a i s. The next result is an iediate consequence of the above lea. Corollary 4.2 Fix a natural nuber k. Suppose its 2-adic expansion is k = 2 a a 2 ( a l. A natural nuber is such that k is odd if and only if has a 2-adic expansion of the for = k + δ i 2 i (4.2 where δ i {0, 1}. 2 i {2 a 1,2 a 2,,2 a l} Reark 2 Let k 1 be an integer with 2-adic expansion k = 2 a a l. Suppose {0, 1, 2, 3,, 1} is such that ( k is odd. Note that Corollary 4.2 iplies = k + δ 1 2 b 1 + δ 2 2 b δ t 2 b f, (4.3 where {2 b 1, 2 b 2,, 2 b f } = {1, 2, 2 2,, 1 }\{2 a 1, 2 a 2,, 2 a l }. We now proceed to show which coefficients c j (k are zero. We start with c 0 (k. the electronic journal of cobinatorics 18(2 (2011, #P8 6

7 Lea 4.3 Suppose k 2 is an integer. Then, c 0 (k = 2w 2(k w 2(k 1, (4.4 where w 2 (k is the su of the binary digits of k. In particular, c 0 (k = 0 if and only if k is a power of two. Proof: Recall fro Theore 3.1 that where r = log 2 (k + 1. Re-write c 0 (k as c 0 (k = 1 2r 1 ( 1 ( k, c 0 (k = 1 ( 2 N 1, (4.5 where N = { {0, 1, 2, 3,, 1} : ( } is odd. k (4.6 Note that (4.3 iplies that the cardinality of N is w2(k. A siple calculation yields the result. Reark 3 In [7], T. Cusick et al. conjectured that there are no nonlinear balanced eleentary syetric polynoials except for the eleentary syetric boolean function of degree k = in l 1 variables, where r and l are any positive integers. Note that Lea 4.3 iplies that Cusick et al. conjecture holds for sufficiently large n. In particular, Lea 4.3 shows that if k is not a power of two, then σ n,k is not balanced for sufficiently large n. We say that σ n,k1 + + σ n,ks is asyptotically not balanced if S(σ n,k1 + + σ n,ks li 0. (4.7 n 2 n In the case that S(σ n,k1 + + σ n,ks li = 0, (4.8 n 2 n we cannot conclude anything about whether or not S(σ n,k1 + + σ n,ks is balanced for soe values of n. For instance, but S(σ n,2 + σ n,5 0. S(σ n,2 + σ n,5 li = 0, (4.9 n 2 n the electronic journal of cobinatorics 18(2 (2011, #P8 7

8 Consider now the coefficients c j (k = 1 2r 1 ( ( 1 ( k π 1j exp with j > 0. Fro Theore 3.1 we know each c j (k is the coefficient of (1 + ζ j n where 1 + ζ j is a root of Φ 2 t+1(x 1 for soe t = 1, 2,, 1. Lea 4.4 Let k 2 be an integer with 2-adic expansion k = 2 a a l. Then c j (k = 0 if and only if it is the coefficient of (1 + ζ n, where 1 + ζ is a root of Φ 2 b+1(x 1 and b a i for all i = 1,, l, i.e. 2 b does not appear in the 2-adic expansion of k. Proof: Recall that to show that the coefficients of the roots of Φ 2 t+1(x 1 are zero is equivalent to show that 1 ( ( 1 ( k π 1 exp = 0. (4.10 If {2 b 1,, 2 b f } = {1, 2, 2 2,, 1 }\{2 a 1,, 2 a l }, then equation (4.3 iplies, ( ( 1 ( k π 1 exp = 2 2 t ( π 1k = 2 exp 2 t (δ 1,,δ f F f 2 2 t (δ 1,,δ f F f 2 ( π Thus, (4.10 holds if and only if exp 1 is a root of 2 t (δ 1,,δ f F f 2 ( π 1 exp (k + δ 2 t 1 2 b δ t 2 b f ( π 1 exp (δ 2 t 1 2 b δ t 2 b f. (4.11 x δ 12 b 1 + +δ t2 b f. (4.12 Consider first t = b 1. If we set δ 1 = 0 in the last su of (4.11, then we have ( π 1 exp (δ 2 2 b δ t 2 b f. (4.13 (δ 2,,δ f F f 1 2 (δ 2,,δ f F f b 1 However, if we set δ 1 = 1, then we have ( π 1 exp (δ 2 2 b δ t 2 b f. ( b 1 We conclude that (4.10 holds for t = b 1, i.e. the 2 b 1 coefficients related to the roots of Φ 2 b 1 +1(x 1 are zero. Repeat this arguent with t = b 2,, b f to conclude that the the electronic journal of cobinatorics 18(2 (2011, #P8 8

9 coefficients related to the roots of Φ 2 b i +1(x 1, i = 1,, f are zero. Since (4.12 is of degree d = 2 b b f, then only d of the coefficients cj (k can be zero. Since we already found d coefficients that are zero, then we conclude that these are all of the. The clai follows. Leas 4.3 and 4.4 are put together in the following theore. The function ɛ(n used in the theore is defined as { 0, if n is a power of 2, ɛ(n = (4.15 1, otherwise. Theore 4.5 Let k be a natural nuber and P k (x be the characteristic polynoial associated to the inial linear recurrence with integer coefficients that {S(σ n,k } n N satisfies. Let k = 2 k/ We know k has a 2-adic expansion of the for k = a a a l, (4.16 where the last exponent is given by a l = log 2 ( k. Then P k (x equals l (x 2 ɛ(k Φ 2 a j +1(x 1. (4.17 j=1 In particular, the degree of the inial linear recurrence that {S(σ n,k } n N satisfies is equal to 2 k/2 + ɛ(k. Theore 4.5 can be generalized to the case {S(σ n,k1 + + σ n,ks } n N. Define the OR operator on F 2 as 0 0 = 0 ( = = = 1. Extend to N by letting n be the natural nuber obtained by applying coordinatewise to the binary digits of n and. For exaple, and 4 6 = ( ( (4.19 = ( ( ( = = ( ( (4.20 = ( ( ( ( = 11. Next is a generalization of Theore 4.5. the electronic journal of cobinatorics 18(2 (2011, #P8 9

10 Theore 4.6 Let 1 < k 2 < < k s be fixed integers and P k1,,k s (x be the characteristic polynoial associated to the inial linear recurrence with integer coefficients that {S(σ n,k1 + + σ n,ks } n N satisfies. Let k = 2 ( k s / We know k has a 2-adic expansion of the for k = a a a l, (4.21 where the last exponent is given by a l = log 2 ( k. Then P k1,,k s (x divides the polynoial (x 2 l Φ 2 a j +1(x 1. (4.22 j=1 Proof: The proof is siilar to the one of Lea 4.4. Let k = 2 ( k s /2 + 1 and r = log 2 ( k + 1. Define { ( ( } N = {1, 2, 3,, 1} : + + is odd. (4.23 Suppose 2 b {2, 2 2,, 1 } is such that 2 b does not appear in the 2-adic expansion of k. We will show that + +( ( π 1 ks exp = 0, (4.24 which iplies that the coefficients related to the roots of x 2b + 1 are all zero. Observe that + +( ( π 1 ks exp = 2 ( π 1 exp. ( b 2 b N Suppose N is such that 2 b does not appear in the 2-adic expansion of. Note that equation (4.3 iplies + 2 b N. Thus, the sae arguent as in (4.13 and (4.14 iply that (4.24 is true. Hence, the clai follows. The following exaple presents a case when Theore 4.6 is tight. Exaple 4.7 Consider = 6 and k 2 = 17. Note that 2 (6 17/2 + 1 = 23 = In this case, the characteristic polynoial associated to {S(σ n,6 +σ n,17 } n N is P 6,17 (x = (x 2Φ 4 (x 1Φ 8 (x 1Φ 32 (x 1. This is the best case scenario of Theore 4.6, i.e we have equality rather than just divisibility. Also, note that in this case the recurrence given by Theore 3.1 is of degree 31, while the inial linear recurrence is of degree 23. The next exaple presents a case in which Theore 4.6 iproves the degree of the hoogeneous linear recurrence provided by Theore 3.1. However it did not provide the inial degree of the recurrence. 2 b k s the electronic journal of cobinatorics 18(2 (2011, #P8 10

11 Exaple 4.8 Consider = 3, k 2 = 5, and k 3 = 17. We have 2 (3 5 17/2 +1 = 23. In this case, the characteristic polynoial of the inial recurrence is P 3,5,17 (x = (x 2Φ 32 (x 1. It divides (x 2Φ 4 (x 1Φ 8 (x 1Φ 32 (x 1 as Theore 4.6 predicted, but are clearly not equal. The factors Φ 4 (x 1 and Φ 8 (x 1 do not appear in P 3,5,17 (x. This eans that the coefficients c j (3, 5, 17 related to the roots of Φ 4 (x = x and Φ 8 (x = x are zero. However, since 2 and 4 appear in the 2-adic expansion of 23, then Theore 4.6 cannot detect this. We now provide bounds on the degree of the inial linear recurrence that {S(σ n,k1 + + σ n,ks } n N satisfies. We start with the following theore. Theore 4.9 Suppose 1 < < k s are integers. Let r = log 2 (k s + 1. Then Φ (x 1 divides P k1,,k s (x, the characteristic polynoial associated to {S(σ n,k1 + + σ n,ks } n N. Proof: Note that the theore will follow if we show that + +( ( π 1 ks exp 0. ( This is equivalent to showing that x 2r does not divide + +( ks x. (4.27 We present the core of our proof with a particular exaple. The general case will follow in a siilar anner. Consider the case = 3, k 2 = 5, and k 3 = 10. Then (4.27 equals, 1 + x + x 2 x 3 + x 4 x 5 + x 6 + x 7 + x 8 + x 9 x 10 + x 11 + x 12 x 13 x 14 x 15. (4.28 Look at the sign of x j for j = 8, 9,, 15. If x j and x j 8 have the sae sign, then leave the sign of x j as it is. Otherwise, change the sign of x j. After doing this, we get 1 + x + x 2 x 3 + x 4 x 5 + x 6 + x 7 + x 8 + x 9 + x 10 x 11 + x 12 x 13 + x 14 + x 15, (4.29 which equals (1 + x 8 (1 + x + x 2 x 3 + x 4 x 5 + x 6 + x 7. (4.30 Of course, in order to get (4.28 back, we need to add to (4.30 two ties the ters for which we changed their signs: (1 + x 8 (1 + x + x 2 x 3 + x 4 x 5 + x 6 + x 7 2x x 11 2x 14 2x 15. (4.31 This last polynoial equals (1 + x 8 (1 + x + x 2 x 3 + x 4 x 5 + x 6 + x 7 + 2x 8 ( x 2 + x 3 x 6 x 7. (4.32 the electronic journal of cobinatorics 18(2 (2011, #P8 11

12 In general, + +( ks x = (x 2r ( ( ks x +2x 2r 1 q(x, (4.33 where q(x is a polynoial of degree at ost 1 1. We conclude that x 2r does not divide (4.27 and so the clai follows. Corollary 4.10 Let 1 < < k s be integers. Let D be the degree of the inial hoogeneous linear recurrence with integer coefficients that {S(σ n,k1 + + σ n,ks } n N satisfies. Then 2 log 2 (ks D 2 ( k s / Proof: Note that the upper bound follows fro Theore 4.6 while the lower bound is a consequence of Theore 4.9. Note that Corollary 4.10 is an iproveent of Theore 3.1 with respect to the degree D of the inial hoogeneous linear recurrence with integer coefficients that {S(σ n,k1 + + σ n,ks } n N satisfies. Fro Theore 3.1 we can only infer that D 1, where r = log 2 (k s + 1. However, now we know that 2 log 2 (ks D 2 ( k s /2 + 1 and 2 ( k s / Also, exaple 4.7 shows that the upper bound of Corollary 4.10 can be attained. In the next theore, we show that when k s (the highest degree is a power of two, then the lower bound is tight. Theore 4.11 Suppose 1 < k 2 < < k s are fixed integers with k s = 1 a power of two. Let P k1,k 2,,2r 1(x be the characteristic polynoial associated to the inial linear recurrence that {S(σ n,k1 + σ n,k2 + + σ n, 1} n N satisfies. Then 2r 1 P k1,k 2,, 1(x = Φ ( 2 2r(x 1 = 2 + ( 1 r 1 x. (4.34 In particular, deg(p k1,k 2,, 1(x = 2r 1 = 2 log 2 (ks. Proof: The theore will follow if we show that c 0 (, k 2,, 1 = 0, and +( k 2 + +( for each j = 1, 2,, r 2, and +( k 2 + +( 1 exp 1 exp =1 ( π 1 = 0, ( j ( π 1 0. ( the electronic journal of cobinatorics 18(2 (2011, #P8 12

13 Fro Theore 4.9 we know that (4.36 holds true. Now, the coefficient c 0 (,, k s 1, 1 is zero if and only if + +( k s 1 +( r 1 2 = 0. (4.37 Fro (3.3 we see that the period of + +( k s 1 is a proper divisor of, so However, ( k s 1 = = 1 ( 1 ( { ( 1 ( r 1 2 1, if 2 = r 1 1 1, if ( k s 1. (4.38 (4.39 Thus, (4.37 holds and therefore c 0 (,, k s 1, 1 = 0. Siilarly, the periodicity of ( 1 ( ( + +( k s 1 and exp π 1 iplies 2 j 1 1 ( 1 ( ( + +( k s 1 π 1 exp = 2 j = 1 ( 1 ( So, (4.39 and (4.40 iply (4.35. This concludes the proof. + +( k s 1 exp ( π 1 2 j. (4.40 We conclude this section with the following result, which shows that when k s is a power of two, then, as n increases, S(σ n,k1 + + σ n,ks is uch saller than 2 n. Corollary 4.12 Suppose 1 < k 2 < < k s are fixed integers with k s = 1 a power of two. Then, for 0 j 1, c j (,, k s 1, 1 0 if and only if j is odd. In particular, c 0 (,, k s 1, 1 = 0. 5 Asyptotic behavior In this section we discuss the asyptotic behavior of {S(σ n,k1 + + σ n,ks } n N. Note that Theore 3.1 iplies that S(σ n,k1 + + σ n,ks li = c n 2 n 0 (,, k s = 1 ( 1 ( + +( ks. (5.1 Thus, we study c 0 (,, k s first. We already discussed the case of one eleentary syetric polynoial {S(σ n,k } n N, see (4.4: c 0 (k = 2w 2(k w 2(k 1. (5.2 the electronic journal of cobinatorics 18(2 (2011, #P8 13

14 For instance, we know that c 0 (k 0, and the equality holds if and only if k is a power of two. The ethod of inclusion-exclusion can be used to get a forula in the case that we have ore than one syetric polynoial. For exaple, in the case of two eleentary syetric polynoials {S(σ n,k1 + σ n,k2 } n N, we have c 0 (, k 2 = w 2( 2 1 w 2(k w 2( k 2 (5.3 The reader can check that this forula iplies c 0 (, k 2 0, with equality if and only if w 2 ( k 2 = w( + w 2 (k 2 and w 2 (k i = 1, where i = 1 or i = 2. We start the general case with the following lea. Lea 5.1 Suppose that 1 < k 2 < < k s are integers. Define { ( ( } N(k i1, k ij = {1, 2, 3,, 1} : + + is odd. (5.4 k i1 k ij Then, #N(, k 2,, k s = s #N(k i 2 i=1 +4 i 1 <i 2 # (N(k i1 N(k i2 i 1 <i 2 <i 3 # (N(k i1 N(k i2 N(k i2 (5.5 +( 1 s 1 2 s 1 # (N( N(k 2 N(k s. Proof: Note that ( ( + + k s (5.6 is odd exactly when the aount of odd suands is itself an odd nuber (trivial. In ters of our sets N(k i, this iplies that N(,, k s is obtained by including all the intersections of an odd aount of the sets N(k i, while excluding all the intersections of an even aount of the. For exaple, the case of four k s can be represented by the Venn diagra in Figure 1. In this case, we want to include the shaded regions and exclude the white ones. We start by adding #N( + #N(k #N(k s. Then, we proceed to take out all the intersections of two sets N(k i N(k j, i j. In this case, each of the has been added twice in our previous su. Therefore, to take the out, we should add 2#(N( N(k 2 2#(N( N(k 3 2#(N(k s 1 N(k s to the previous su. So, now we have s #N(k i 2 i=1 i 1 <i 2 #(N(k i1 N(k i2. (5.7 This takes care of all intersections of two sets. Now, we need to add all intersections of three sets #(N(k i1 N(k i2 N(k i3. Each of the have been added three ties by the the electronic journal of cobinatorics 18(2 (2011, #P8 14

15 Figure 1: Representation of the case of four k s. first su and subtracted six ties by the second su. Thus, in order to add the into the equation, we have to add each of the four ties to (5.7. By doing this we have s #N(k i 2 i=1 Continue in this anner and use the identity to get the result. i 1 <i 2 #(N(k i1 N(k i2 ( i 1 <i 2 <i 3 #(N(k i1 N(k i2 N(k i3. j 1 ( { j 2 ( 1 i 1 2 i 1 = j 1, if j is even i 2 j 1 + 1, if j is odd, i=1 (5.9 Now that we have the above lea, we are ready to state our general forula for c 0 (,, k s. Theore 5.2 Suppose that 1 < k 2 < < k s are integers. Then s c 0 (,, k s = w 2(k i + i=1 Proof: Let r = log 2 (k s + 1. Note that i 1 <i w2(ki1 ki2 i 1 <i 2 <i w2(ki1 ki2 ki3 + + ( 1 s 2 s w2(k1 k2 ks. (5.10 c 0 (,, k s = 2r #N(,, k s. (5.11 Consider the integer k i. Suppose its 2-adic expansion is k i = 2 a a a l. Then, by Corollary 4.2 we know that 0 1 is such that ( k i is odd precisely when = k + δ 1 2 b 1 + δ 2 2 b δ t 2 bt, (5.12 the electronic journal of cobinatorics 18(2 (2011, #P8 15

16 where {2 b 1, 2 b 2,, 2 bt } = {1, 2, 2 2,, 1 }\{2 a 1, 2 a 2,, 2 a l } and δj is either 0 or 1. This iplies that #N(k i = w 2(k i. (5.13 Also, (5.12 iplies that if i j, then and in general, if 1 i 1 < i 2 < i t s, then #(N(k i N(k j = w 2(k i k j, (5.14 #(N(k i1 N(k i2 N(k t = w 2(k i1 k i2 k it. (5.15 Equations (5.11 and (5.15 and Lea 5.1 iply the theore. Exaple 5.3 Suppose = 7, k 2 = 9, k 3 = , and k 4 = , then c 0 (, k 2, k 3, k 4 = 1/4. In other words, S(σ n,k1 + σ n,k2 + σ n,k3 + σ n,k4 li = 1 n 2 n 4. (5.16 Exaple 5.4 Suppose = 31, k 2 = and k 3 = , then c 0 (, k 2, k 3 = 45/128. We now use the above theore to provide a faily of syetric polynoials that are not balanced for sufficiently large n. Suppose that and k 2 are two positive integers. We say that k 2 if each power of two appearing in the 2-adic expansion of also appears in the 2-adic expansion of k 2. For exaple, because 10 = and 14 = Corollary 5.5 Suppose that k 2 k s are positive integers. Then, s/2 c 0 (,, k s = 1 (s2 1 w 2(k s (2 w 2(k 2j k 2j w 2(k 2j. (5.17 Here (s equals 0 if s is even and 1 otherwise; in other words, (s = s od 2. j=1 Proof: This follows directly fro Theore 5.2 and the equality w 2 (k i = w 2 (k i k i 1 + w 2 (k i 1. Theore 5.6 Suppose that k 2 k s are positive integers. Then, c 0 (,, k s > 0. (5.18 In particular, {S(σ n,k1 + + σ n,ks } n N is asyptotically not balanced. the electronic journal of cobinatorics 18(2 (2011, #P8 16

17 Proof: Corollary 5.5 iplies that c 0 (,, k s > 0 if and only if s/2 (s w 2(k 2j k 2j 1 1 w 2(k s 2 w 2(k 2j < 1 2. (5.19 j=1 Since k 2 k s, then we have the inequality and the equality Note that (5.20 and (5.21 iply w 2 (k i 1 + w 2 (k i 1 (5.20 w 2 (k i = w 2 (k i k i 1 + w 2 (k i 1. (5.21 s/2 (s w 2(k 2j k 2j 1 1 w 2(k s 2 w 2(k 2j = (s w 2(k s 2 1 w 2( 2 + w 2(k 2 j=1 This finishes the proof. s/2 j=2 2 w 2(k 2j k 2j w 2(k 2j (s w 2(k s 2 1 w 2( s/2 1 w 2(k 2 2 w 2(k 2 2 2j 3 j=2 < 1 2 w 2( 1 2 w 2(k = 1 2 w 2( + ( w 2(k 2 j= j < 1 w 2(k 2 2. (5.22 We now turn our attention to the case when c 0 (,, k s = 0, which happens if and only if 2 is not a root of the characteristic polynoial associated to {S(σ n,k1 + + σ n,ks } n N. In this case S(σ n,k1 + + σ n,ks li = 0, (5.23 n 2 n because S(σ n,k1 + + σ n,ks is exponentially saller than 2 n. However, aside fro the size of S(σ n,k1 + + σ n,ks with respect to 2 n, knowing that c 0 (,, k s = 0 does not give a real sense of the behavior of S(σ n,k1 + + σ n,ks as n increases. Now, when c 0 (,, k s = 0, the biggest odulus of the roots of the characteristic polynoial associated to {S(σ n,k1 + +σ n,ks } n N is 2 cos(π/. This odulus is obtained at the roots 1 + exp ( π 1/( 1 and 1 + exp ( π 1/( 1. Thus, as n increases, approaches c 1 (,, k s S(σ n,k1 + + σ n,ks (2 cos(π/ n (5.24 ( ( π (1 + exp n ( ( n r 1 c2 (,, k s 1 + exp π 1 1. (5.25 (2 cos(π/ n the electronic journal of cobinatorics 18(2 (2011, #P8 17

18 ( π Let c i = c i (,, k s and ξ = 1 + exp 1 then ( 1 + exp ± π 1 ( π = 2 cos exp 1 c 1 ξ n + c ξn 1 = (2 cos(π/2r n + +( ks ( ( (n 2π 1 exp = (2 cos(π/2r n 1. Note that c 1 2 = c 1. Since ( ± π 1 ( + exp (n 2π 1, ( ( ( (n 2π ks cos Note that (5.27 is not the zero function, because + +( ( (n 2π ks cos is the real part of ( π 1n exp + +( ( ks exp π (5.27 (5.28 (5.29 and fro the proof of Theore 4.10 we know that the su in (5.29 is a non-zero constant. We conclude that S(σ n,k1 + + σ n,ks = (2 cos(π/2r n + +( ( (n 2π ks cos Reark 4 Note that + O 1 (( ( π n 2 cos. ( ( ( (n 2π ks cos, (5.31 is not identically zero, regardless if c 0 (,, k s is zero. Hence, the asyptotic expansion of S(σ n,k1 + + σ n,ks is S(σ n,k1 + + σ n,ks = c 0 2 n + (2 cos(π/2r n + +( ( (n 2π ks cos 1 (( ( π n + O 2 cos. ( the electronic journal of cobinatorics 18(2 (2011, #P8 18

19 Reark 5 If c 0 (,, k s = 0, then we define the function Error n (,, k s as Error n (,, k s = S(σ n, + + σ n,ks (2 cos(π/ n 1 ( 1 ( 1 + +( ks cos ( (n 2π. (5.33 We point out that (5.32 is a consequence of Theore 3.1. Moreover, it is not hard to continue refining this forula and re-write S(σ n,k1 + + σ n,ks copletely in ters of cosine (which will be a restateent of Theore 3.1. However, we stress that we are proving that + +( ( (n 2π ks cos (5.34 is not identically zero, so the second ter of the asyptotic expansion (5.32 is always present. By the discussion presented in section 4 we know that in any cases soe of the c i s, i 1, 1, are zero. Because of this, we write the asyptotic expansion of S(σ n,k1 + + σ n,ks as in (5.32 and decide not to continue with a refineent of it. Exaple 5.7 Consider = 5, k 2 = 9, and k 3 = 12. The reader can check that in this case c 0 (5, 9, 12 = 0. By (5.30 we know that as n increases, S(σ n,5 + σ n,9 + σ n,12 (2 cos(π/16 n (5.35 approaches 1 15 ( ( 1 ( 5+( 9+( 12 (n 2π cos = ( ( ( ( ( nπ 2 1 cos ( ( nπ sin Here, we siplified the expression using Matheatica. In Figure 2 you can see a graphical representation of this. The dots represents (5.35 and the curve is the one given by (5.36. In Table 1 you can see the error ter. Exaple 5.8 Siilarly, consider = 2, k 2 = 4, k 3 = 11, and k 4 = 35. In this case we also have c 0 (2, 4, 11, 35 = 0, so by (5.30 we know that as n increases, approaches S(σ n,2 + σ n,4 + σ n,11 + σ n,35 (2 cos(π/64 n (5.37 ( ( 1 ( 2+( 4+( 11+( 35 (n 2π cos 16. (5.38 In Figure 3 you can see a graphical representation of this, where the dots represents (5.37 and the curve is (5.38. In Table 2 you can see the error ter. the electronic journal of cobinatorics 18(2 (2011, #P8 19

20 Figure 2: Graphical representation of the asyptotic behavior when = 5, k 2 = 9, and k 3 = Table 1: The error ter for = 5, k 2 = 9, and k 3 = 12. n Error n (5, 9, Figure 3: Graphical representation of the asyptotic behavior when = 2, k 2 = 4, k 3 = 11, and k 4 = Table 2: The error ter for = 2, k 2 = 4, k 3 = 11, and k 3 = 35. n Error n (2, 4, 11, Acknowledgents. We would like to thank Claude Carlet and Doron Zeilberger for a careful reading of the anuscript and for all their helpful suggestions. A special thank goes to the referee for pointing out relevant references to this work and for iproving the presentation of this anuscript. the electronic journal of cobinatorics 18(2 (2011, #P8 20

21 References [1] C. Bey and G. M. Kyureghyan, On Boolean functions with the su of every two of the being bent, Des. Codes Cryptogr., 49, pp , [2] R. E. Canfield, Z. Gao, C. Greenhill, B. McKay and R. W. Robinson, Asyptotic enueration of correlation-iune Boolean functions, Cryptogr. Coun., 2, pp , 2010 [3] J. Y. Cai, F. Greeen, and T. Thierauf. On the Correlation of Syetric Functions. Theory of Coputing Systes, 29, pp , [4] A. Canteaut and M. Videau, Syetric Boolean Functions, IEEE Transactions on Inforation Theory, 51, pp , [5] C. Carlet, Boolean Functions for Cryptography and Error Correcting Codes, Boolean Models and Methods in Matheatics, Coputer Science, and Engineering, Eds. Yves Craa and Peter Haer, Cabridge University Press, [6] C. Carlet, X. Zeng, C. Li, and L. Hu, Further properties of several classes of Boolean functions with optiu algebraic iunity, Des. Codes Cryptogr., 52,pp , [7] T. Cusick, Y. Li, and P. Stănică, Balanced Syetric Functions over GF (p. IEEE Trans. on Inforation Theory, 54, pp , [8] T. Cusick, Y. Li, and P. Stănică, On a conjecture for balanced syetric Boolean functions, J. Math. Crypt., 3, pp. 1-18, [9] T. Cusick and P. Stănică, Cryptographic Boolean Functions and Applications, Acadeic Press, [10] D.J.H. Garling, A Course in Galois Theory, Cabridge University Press, [11] O. S. Rothaus, On Bent functions. J. Cobin. Theory Ser. A, 20, pp , [12] P. Sarkar and S. Maitra, Balancedness and correlation iunity of syetric Boolean functions. Discrete Matheatics, 307, pp , [13] J. von zur Gathen and J. Roche, Polynoial with Two Values, Cobinatorica, 17, pp , the electronic journal of cobinatorics 18(2 (2011, #P8 21

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. Let n be any integer and ( n ) X F n : a i z i : a i, ± i be the set of all polynoials of height and

More information

Construction of Some New Classes of Boolean Bent Functions and Their Duals

Construction of Some New Classes of Boolean Bent Functions and Their Duals International Journal of Algebra, Vol. 11, 2017, no. 2, 53-64 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ija.2017.61168 Construction of Soe New Classes of Boolean Bent Functions and Their Duals

More information

4 = (0.02) 3 13, = 0.25 because = 25. Simi-

4 = (0.02) 3 13, = 0.25 because = 25. Simi- Theore. Let b and be integers greater than. If = (. a a 2 a i ) b,then for any t N, in base (b + t), the fraction has the digital representation = (. a a 2 a i ) b+t, where a i = a i + tk i with k i =

More information

1. INTRODUCTION AND RESULTS

1. INTRODUCTION AND RESULTS SOME IDENTITIES INVOLVING THE FIBONACCI NUMBERS AND LUCAS NUMBERS Wenpeng Zhang Research Center for Basic Science, Xi an Jiaotong University Xi an Shaanxi, People s Republic of China (Subitted August 00

More information

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS Zhi-Wei Sun Departent of Matheatics, Nanjing University Nanjing 10093, People s Republic of China zwsun@nju.edu.cn Abstract In this paper we establish soe explicit

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

The simplest method for constructing APN polynomials EA-inequivalent to power functions

The simplest method for constructing APN polynomials EA-inequivalent to power functions The siplest ethod for constructing APN polynoials EA-inequivalent to power functions Lilya Budaghyan Abstract The first APN polynoials EA-inequivalent to power functions have been constructed in [7, 8]

More information

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1. M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x

More information

The concavity and convexity of the Boros Moll sequences

The concavity and convexity of the Boros Moll sequences The concavity and convexity of the Boros Moll sequences Ernest X.W. Xia Departent of Matheatics Jiangsu University Zhenjiang, Jiangsu 1013, P.R. China ernestxwxia@163.co Subitted: Oct 1, 013; Accepted:

More information

Divisibility of Polynomials over Finite Fields and Combinatorial Applications

Divisibility of Polynomials over Finite Fields and Combinatorial Applications Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang

More information

LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS.

LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS. i LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS. C. A. CHURCH, Jr. and H. W. GOULD, W. Virginia University, Morgantown, W. V a. In this paper we give

More information

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS #A34 INTEGERS 17 (017) ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS Jürgen Kritschgau Departent of Matheatics, Iowa State University, Aes, Iowa jkritsch@iastateedu Adriana Salerno

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Poly-Bernoulli Numbers and Eulerian Numbers

Poly-Bernoulli Numbers and Eulerian Numbers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018, Article 18.6.1 Poly-Bernoulli Nubers and Eulerian Nubers Beáta Bényi Faculty of Water Sciences National University of Public Service H-1441

More information

Research Article Some Formulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynomials

Research Article Some Formulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynomials Discrete Dynaics in Nature and Society Volue 202, Article ID 927953, pages doi:055/202/927953 Research Article Soe Forulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynoials Yuan He and

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Note on generating all subsets of a finite set with disjoint unions

Note on generating all subsets of a finite set with disjoint unions Note on generating all subsets of a finite set with disjoint unions David Ellis e-ail: dce27@ca.ac.uk Subitted: Dec 2, 2008; Accepted: May 12, 2009; Published: May 20, 2009 Matheatics Subject Classification:

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n THE POLYNOMIAL REPRESENTATION OF THE TYPE A n RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n SHEELA DEVADAS AND YI SUN Abstract. We study the polynoial representation of the rational Cherednik algebra

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES #A5 INTEGERS 10 (010), 697-703 COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES Bruce E Sagan 1 Departent of Matheatics, Michigan State University, East Lansing,

More information

MODULAR HYPERBOLAS AND THE CONGRUENCE ax 1 x 2 x k + bx k+1 x k+2 x 2k c (mod m)

MODULAR HYPERBOLAS AND THE CONGRUENCE ax 1 x 2 x k + bx k+1 x k+2 x 2k c (mod m) #A37 INTEGERS 8 (208) MODULAR HYPERBOLAS AND THE CONGRUENCE ax x 2 x k + bx k+ x k+2 x 2k c (od ) Anwar Ayyad Departent of Matheatics, Al Azhar University, Gaza Strip, Palestine anwarayyad@yahoo.co Todd

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

lecture 36: Linear Multistep Mehods: Zero Stability

lecture 36: Linear Multistep Mehods: Zero Stability 95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,

More information

This article was originally published in a journal published by Elsevier, and the attached copy is provided by Elsevier for the author s benefit and for the benefit of the author s institution, for non-coercial

More information

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors Notes on Nuber Theory Discrete Matheatics Print ISSN 30-32 Online ISSN 2367-827 Vol. 23 207 No. 2 04 6 Closed-for evaluations of Fibonacci Lucas reciprocal sus with three factors Robert Frontczak Lesbank

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

On the Dirichlet Convolution of Completely Additive Functions

On the Dirichlet Convolution of Completely Additive Functions 1 3 47 6 3 11 Journal of Integer Sequences, Vol. 17 014, Article 14.8.7 On the Dirichlet Convolution of Copletely Additive Functions Isao Kiuchi and Makoto Minaide Departent of Matheatical Sciences Yaaguchi

More information

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone Characterization of the Line Coplexity of Cellular Autoata Generated by Polynoial Transition Rules Bertrand Stone Abstract Cellular autoata are discrete dynaical systes which consist of changing patterns

More information

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany.

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany. New upper bound for the B-spline basis condition nuber II. A proof of de Boor's 2 -conjecture K. Scherer Institut fur Angewandte Matheati, Universitat Bonn, 535 Bonn, Gerany and A. Yu. Shadrin Coputing

More information

Analysis of Polynomial & Rational Functions ( summary )

Analysis of Polynomial & Rational Functions ( summary ) Analysis of Polynoial & Rational Functions ( suary ) The standard for of a polynoial function is ( ) where each of the nubers are called the coefficients. The polynoial of is said to have degree n, where

More information

A PROOF OF A CONJECTURE OF MELHAM

A PROOF OF A CONJECTURE OF MELHAM A PROOF OF A CONJECTRE OF MELHAM EMRAH KILIC, ILKER AKKS, AND HELMT PRODINGER Abstract. In this paper, we consider Melha s conecture involving Fibonacci and Lucas nubers. After rewriting it in ters of

More information

Metric Entropy of Convex Hulls

Metric Entropy of Convex Hulls Metric Entropy of Convex Hulls Fuchang Gao University of Idaho Abstract Let T be a precopact subset of a Hilbert space. The etric entropy of the convex hull of T is estiated in ters of the etric entropy

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

Rational Filter Wavelets*

Rational Filter Wavelets* Ž Journal of Matheatical Analysis and Applications 39, 744 1999 Article ID jaa19996550, available online at http:wwwidealibraryco on Rational Filter Wavelets* Kuang Zheng and Cui Minggen Departent of Matheatics,

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Order Ideals in Weak Subposets of Young s Lattice and Associated Unimodality Conjectures

Order Ideals in Weak Subposets of Young s Lattice and Associated Unimodality Conjectures Annals of Cobinatorics 8 (2004) 1-0218-0006/04/020001-10 DOI ********************** c Birkhäuser Verlag, Basel, 2004 Annals of Cobinatorics Order Ideals in Weak Subposets of Young s Lattice and Associated

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

ON SOME PROBLEMS OF GYARMATI AND SÁRKÖZY. Le Anh Vinh Mathematics Department, Harvard University, Cambridge, Massachusetts

ON SOME PROBLEMS OF GYARMATI AND SÁRKÖZY. Le Anh Vinh Mathematics Department, Harvard University, Cambridge, Massachusetts #A42 INTEGERS 12 (2012) ON SOME PROLEMS OF GYARMATI AND SÁRKÖZY Le Anh Vinh Matheatics Departent, Harvard University, Cabridge, Massachusetts vinh@ath.harvard.edu Received: 12/3/08, Revised: 5/22/11, Accepted:

More information

arxiv: v2 [math.co] 8 Mar 2018

arxiv: v2 [math.co] 8 Mar 2018 Restricted lonesu atrices arxiv:1711.10178v2 [ath.co] 8 Mar 2018 Beáta Bényi Faculty of Water Sciences, National University of Public Service, Budapest beata.benyi@gail.co March 9, 2018 Keywords: enueration,

More information

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket.

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket. Generalized eigenfunctions and a Borel Theore on the Sierpinski Gasket. Kasso A. Okoudjou, Luke G. Rogers, and Robert S. Strichartz May 26, 2006 1 Introduction There is a well developed theory (see [5,

More information

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes Explicit solution of the polynoial least-squares approxiation proble on Chebyshev extrea nodes Alfredo Eisinberg, Giuseppe Fedele Dipartiento di Elettronica Inforatica e Sisteistica, Università degli Studi

More information

THE SUPER CATALAN NUMBERS S(m, m + s) FOR s 3 AND SOME INTEGER FACTORIAL RATIOS. 1. Introduction. = (2n)!

THE SUPER CATALAN NUMBERS S(m, m + s) FOR s 3 AND SOME INTEGER FACTORIAL RATIOS. 1. Introduction. = (2n)! THE SUPER CATALAN NUMBERS S(, + s FOR s 3 AND SOME INTEGER FACTORIAL RATIOS XIN CHEN AND JANE WANG Abstract. We give a cobinatorial interpretation for the super Catalan nuber S(, + s for s 3 using lattice

More information

Lectures 8 & 9: The Z-transform.

Lectures 8 & 9: The Z-transform. Lectures 8 & 9: The Z-transfor. 1. Definitions. The Z-transfor is defined as a function series (a series in which each ter is a function of one or ore variables: Z[] where is a C valued function f : N

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE CHRISTOPHER J. HILLAR Abstract. A long-standing conjecture asserts that the polynoial p(t = Tr(A + tb ] has nonnegative coefficients whenever is

More information

1 Generalization bounds based on Rademacher complexity

1 Generalization bounds based on Rademacher complexity COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #0 Scribe: Suqi Liu March 07, 08 Last tie we started proving this very general result about how quickly the epirical average converges

More information

Algebraic Montgomery-Yang problem: the log del Pezzo surface case

Algebraic Montgomery-Yang problem: the log del Pezzo surface case c 2014 The Matheatical Society of Japan J. Math. Soc. Japan Vol. 66, No. 4 (2014) pp. 1073 1089 doi: 10.2969/jsj/06641073 Algebraic Montgoery-Yang proble: the log del Pezzo surface case By DongSeon Hwang

More information

Bernoulli numbers and generalized factorial sums

Bernoulli numbers and generalized factorial sums Bernoulli nubers and generalized factorial sus Paul Thoas Young Departent of Matheatics, College of Charleston Charleston, SC 29424 paul@ath.cofc.edu June 25, 2010 Abstract We prove a pair of identities

More information

Energy-Efficient Threshold Circuits Computing Mod Functions

Energy-Efficient Threshold Circuits Computing Mod Functions Energy-Efficient Threshold Circuits Coputing Mod Functions Akira Suzuki Kei Uchizawa Xiao Zhou Graduate School of Inforation Sciences, Tohoku University Araaki-aza Aoba 6-6-05, Aoba-ku, Sendai, 980-8579,

More information

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA,

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA, Descent polynoials arxiv:1710.11033v2 [ath.co] 13 Nov 2017 Alexander Diaz-Lopez Departent of Matheatics and Statistics, Villanova University, 800 Lancaster Avenue, Villanova, PA 19085, USA, alexander.diaz-lopez@villanova.edu

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

arxiv: v2 [math.nt] 5 Sep 2012

arxiv: v2 [math.nt] 5 Sep 2012 ON STRONGER CONJECTURES THAT IMPLY THE ERDŐS-MOSER CONJECTURE BERND C. KELLNER arxiv:1003.1646v2 [ath.nt] 5 Sep 2012 Abstract. The Erdős-Moser conjecture states that the Diophantine equation S k () = k,

More information

A PROOF OF MELHAM S CONJECTURE

A PROOF OF MELHAM S CONJECTURE A PROOF OF MELHAM S CONJECTRE EMRAH KILIC 1, ILKER AKKS, AND HELMT PRODINGER 3 Abstract. In this paper, we consider Melha s conecture involving Fibonacci and Lucas nubers. After rewriting it in ters of

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

A symbolic operator approach to several summation formulas for power series II

A symbolic operator approach to several summation formulas for power series II A sybolic operator approach to several suation forulas for power series II T. X. He, L. C. Hsu 2, and P. J.-S. Shiue 3 Departent of Matheatics and Coputer Science Illinois Wesleyan University Blooington,

More information

G G G G G. Spec k G. G Spec k G G. G G m G. G Spec k. Spec k

G G G G G. Spec k G. G Spec k G G. G G m G. G Spec k. Spec k 12 VICTORIA HOSKINS 3. Algebraic group actions and quotients In this section we consider group actions on algebraic varieties and also describe what type of quotients we would like to have for such group

More information

The Möbius inversion formula for Fourier series applied to Bernoulli and Euler polynomials

The Möbius inversion formula for Fourier series applied to Bernoulli and Euler polynomials The Möbius inversion forula for Fourier series applied to Bernoulli and Euler polynoials Luis M Navas a, Francisco J Ruiz b,, Juan L Varona c,, a Departaento de Mateáticas, Universidad de Salaanca, Plaza

More information

arxiv:math/ v1 [math.nt] 15 Jul 2003

arxiv:math/ v1 [math.nt] 15 Jul 2003 arxiv:ath/0307203v [ath.nt] 5 Jul 2003 A quantitative version of the Roth-Ridout theore Toohiro Yaada, 606-8502, Faculty of Science, Kyoto University, Kitashirakawaoiwakecho, Sakyoku, Kyoto-City, Kyoto,

More information

The Euler-Maclaurin Formula and Sums of Powers

The Euler-Maclaurin Formula and Sums of Powers DRAFT VOL 79, NO 1, FEBRUARY 26 1 The Euler-Maclaurin Forula and Sus of Powers Michael Z Spivey University of Puget Sound Tacoa, WA 98416 spivey@upsedu Matheaticians have long been intrigued by the su

More information

PRELIMINARIES This section lists for later sections the necessary preliminaries, which include definitions, notations and lemmas.

PRELIMINARIES This section lists for later sections the necessary preliminaries, which include definitions, notations and lemmas. MORE O SQUARE AD SQUARE ROOT OF A ODE O T TREE Xingbo Wang Departent of Mechatronic Engineering, Foshan University, PRC Guangdong Engineering Center of Inforation Security for Intelligent Manufacturing

More information

Beyond Mere Convergence

Beyond Mere Convergence Beyond Mere Convergence Jaes A. Sellers Departent of Matheatics The Pennsylvania State University 07 Whitore Laboratory University Park, PA 680 sellers@ath.psu.edu February 5, 00 REVISED Abstract In this

More information

Hermite s Rule Surpasses Simpson s: in Mathematics Curricula Simpson s Rule. Should be Replaced by Hermite s

Hermite s Rule Surpasses Simpson s: in Mathematics Curricula Simpson s Rule. Should be Replaced by Hermite s International Matheatical Foru, 4, 9, no. 34, 663-686 Herite s Rule Surpasses Sipson s: in Matheatics Curricula Sipson s Rule Should be Replaced by Herite s Vito Lapret University of Lublana Faculty of

More information

Research Article Perturbations of Polynomials with Operator Coefficients

Research Article Perturbations of Polynomials with Operator Coefficients Coplex Analysis Volue 2013, Article ID 801382, 5 pages http://dx.doi.org/10.1155/2013/801382 Research Article Perturbations of Polynoials with Operator Coefficients Michael Gil Departent of Matheatics,

More information

IMPLICIT FUNCTION THEOREM FOR FORMAL POWER SERIES

IMPLICIT FUNCTION THEOREM FOR FORMAL POWER SERIES #A9 INTEGERS 8A (208) IMPLICIT FUNCTION THEOREM FOR FORMAL POWER SERIES ining Hu School of Matheatics and Statistics, Huazhong University of Science and Technology, Wuhan, PR China huyining@protonail.co

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

APPROXIMATION BY MODIFIED SZÁSZ-MIRAKYAN OPERATORS

APPROXIMATION BY MODIFIED SZÁSZ-MIRAKYAN OPERATORS APPROXIMATION BY MODIFIED SZÁSZ-MIRAKYAN OPERATORS Received: 23 Deceber, 2008 Accepted: 28 May, 2009 Counicated by: L. REMPULSKA AND S. GRACZYK Institute of Matheatics Poznan University of Technology ul.

More information

PREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL

PREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL PREPRINT 2006:7 Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL Departent of Matheatical Sciences Division of Matheatics CHALMERS UNIVERSITY OF TECHNOLOGY GÖTEBORG UNIVERSITY

More information

arxiv: v1 [math.co] 19 Apr 2017

arxiv: v1 [math.co] 19 Apr 2017 PROOF OF CHAPOTON S CONJECTURE ON NEWTON POLYTOPES OF q-ehrhart POLYNOMIALS arxiv:1704.0561v1 [ath.co] 19 Apr 017 JANG SOO KIM AND U-KEUN SONG Abstract. Recently, Chapoton found a q-analog of Ehrhart polynoials,

More information

A RECURRENCE RELATION FOR BERNOULLI NUMBERS. Mümün Can, Mehmet Cenkci, and Veli Kurt

A RECURRENCE RELATION FOR BERNOULLI NUMBERS. Mümün Can, Mehmet Cenkci, and Veli Kurt Bull Korean Math Soc 42 2005, No 3, pp 67 622 A RECURRENCE RELATION FOR BERNOULLI NUMBERS Müün Can, Mehet Cenci, and Veli Kurt Abstract In this paper, using Gauss ultiplication forula, a recurrence relation

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

The Frequent Paucity of Trivial Strings

The Frequent Paucity of Trivial Strings The Frequent Paucity of Trivial Strings Jack H. Lutz Departent of Coputer Science Iowa State University Aes, IA 50011, USA lutz@cs.iastate.edu Abstract A 1976 theore of Chaitin can be used to show that

More information

Infinitely Many Trees Have Non-Sperner Subtree Poset

Infinitely Many Trees Have Non-Sperner Subtree Poset Order (2007 24:133 138 DOI 10.1007/s11083-007-9064-2 Infinitely Many Trees Have Non-Sperner Subtree Poset Andrew Vince Hua Wang Received: 3 April 2007 / Accepted: 25 August 2007 / Published online: 2 October

More information

Symmetric properties for the degenerate q-tangent polynomials associated with p-adic integral on Z p

Symmetric properties for the degenerate q-tangent polynomials associated with p-adic integral on Z p Global Journal of Pure and Applied Matheatics. ISSN 0973-768 Volue, Nuber 4 06, pp. 89 87 Research India Publications http://www.ripublication.co/gpa.ht Syetric properties for the degenerate q-tangent

More information

The Fundamental Basis Theorem of Geometry from an algebraic point of view

The Fundamental Basis Theorem of Geometry from an algebraic point of view Journal of Physics: Conference Series PAPER OPEN ACCESS The Fundaental Basis Theore of Geoetry fro an algebraic point of view To cite this article: U Bekbaev 2017 J Phys: Conf Ser 819 012013 View the article

More information

ON SEQUENCES OF NUMBERS IN GENERALIZED ARITHMETIC AND GEOMETRIC PROGRESSIONS

ON SEQUENCES OF NUMBERS IN GENERALIZED ARITHMETIC AND GEOMETRIC PROGRESSIONS Palestine Journal of Matheatics Vol 4) 05), 70 76 Palestine Polytechnic University-PPU 05 ON SEQUENCES OF NUMBERS IN GENERALIZED ARITHMETIC AND GEOMETRIC PROGRESSIONS Julius Fergy T Rabago Counicated by

More information

The Frobenius problem, sums of powers of integers, and recurrences for the Bernoulli numbers

The Frobenius problem, sums of powers of integers, and recurrences for the Bernoulli numbers Journal of Nuber Theory 117 (2006 376 386 www.elsevier.co/locate/jnt The Frobenius proble, sus of powers of integers, and recurrences for the Bernoulli nubers Hans J.H. Tuenter Schulich School of Business,

More information

SUPERCONGRUENCES INVOLVING PRODUCTS OF TWO BINOMIAL COEFFICIENTS

SUPERCONGRUENCES INVOLVING PRODUCTS OF TWO BINOMIAL COEFFICIENTS Finite Fields Al. 013, 4 44. SUPERCONGRUENCES INVOLVING PRODUCTS OF TWO BINOMIAL COEFFICIENTS Zhi-Wei Sun Deartent of Matheatics, Nanjing University Nanjing 10093, Peole s Reublic of China E-ail: zwsun@nju.edu.cn

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

On a Multisection Style Binomial Summation Identity for Fibonacci Numbers

On a Multisection Style Binomial Summation Identity for Fibonacci Numbers Int J Contep Math Sciences, Vol 9, 04, no 4, 75-86 HIKARI Ltd, www-hiarico http://dxdoiorg/0988/ics0447 On a Multisection Style Binoial Suation Identity for Fibonacci Nubers Bernhard A Moser Software Copetence

More information

q-analog of Fleck s congruence

q-analog of Fleck s congruence Introducing Fleck s Congruence -binoial coefficients Basic ingredients in proof Observations A -analog of Fleck s congruence Wellesley College October 2, 2011 -analog of Fleck s congruence Introducing

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

ON THE 2-PART OF THE BIRCH AND SWINNERTON-DYER CONJECTURE FOR QUADRATIC TWISTS OF ELLIPTIC CURVES

ON THE 2-PART OF THE BIRCH AND SWINNERTON-DYER CONJECTURE FOR QUADRATIC TWISTS OF ELLIPTIC CURVES ON THE 2-PART OF THE BIRCH AND SWINNERTON-DYER CONJECTURE FOR QUADRATIC TWISTS OF ELLIPTIC CURVES LI CAI, CHAO LI, SHUAI ZHAI Abstract. In the present paper, we prove, for a large class of elliptic curves

More information

CHARACTER SUMS AND RAMSEY PROPERTIES OF GENERALIZED PALEY GRAPHS. Nicholas Wage Appleton East High School, Appleton, WI 54915, USA.

CHARACTER SUMS AND RAMSEY PROPERTIES OF GENERALIZED PALEY GRAPHS. Nicholas Wage Appleton East High School, Appleton, WI 54915, USA. INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 6 006, #A18 CHARACTER SUMS AND RAMSEY PROPERTIES OF GENERALIZED PALEY GRAPHS Nicholas Wage Appleton East High School, Appleton, WI 54915, USA

More information

EXACT BOUNDS FOR JUDICIOUS PARTITIONS OF GRAPHS

EXACT BOUNDS FOR JUDICIOUS PARTITIONS OF GRAPHS EXACT BOUNDS FOR JUDICIOUS PARTITIONS OF GRAPHS B. BOLLOBÁS1,3 AND A.D. SCOTT,3 Abstract. Edwards showed that every grah of size 1 has a biartite subgrah of size at least / + /8 + 1/64 1/8. We show that

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

On Certain C-Test Words for Free Groups

On Certain C-Test Words for Free Groups Journal of Algebra 247, 509 540 2002 doi:10.1006 jabr.2001.9001, available online at http: www.idealibrary.co on On Certain C-Test Words for Free Groups Donghi Lee Departent of Matheatics, Uni ersity of

More information

Perturbation on Polynomials

Perturbation on Polynomials Perturbation on Polynoials Isaila Diouf 1, Babacar Diakhaté 1 & Abdoul O Watt 2 1 Départeent Maths-Infos, Université Cheikh Anta Diop, Dakar, Senegal Journal of Matheatics Research; Vol 5, No 3; 2013 ISSN

More information

VARIABLES. Contents 1. Preliminaries 1 2. One variable Special cases 8 3. Two variables Special cases 14 References 16

VARIABLES. Contents 1. Preliminaries 1 2. One variable Special cases 8 3. Two variables Special cases 14 References 16 q-generating FUNCTIONS FOR ONE AND TWO VARIABLES. THOMAS ERNST Contents 1. Preliinaries 1. One variable 6.1. Special cases 8 3. Two variables 10 3.1. Special cases 14 References 16 Abstract. We use a ultidiensional

More information