Solving Diophantine Equations

Total Page:16

File Type:pdf, Size:1020Kb

Solving Diophantine Equations University of New Mexico UNM Digital Repository Mathematics and Statistics Faculty and Staff Publications Academic Department Resources 2014 Solving Diophantine Equations Florentin Smarandache University of New Mexico, [email protected] Octavian Cira Follow this and additional works at: https://digitalrepository.unm.edu/math_fsp Part of the Logic and Foundations Commons, Number Theory Commons, Other Applied Mathematics Commons, Other Mathematics Commons, and the Special Functions Commons Recommended Citation Smarandache, Florentin and Octavian Cira. "Solving Diophantine Equations." (2014). https://digitalrepository.unm.edu/math_fsp/258 This Book is brought to you for free and open access by the Academic Department Resources at UNM Digital Repository. It has been accepted for inclusion in Mathematics and Statistics Faculty and Staff Publications by an authorized administrator of UNM Digital Repository. For more information, please contact [email protected], [email protected], [email protected]. Solving Diophantine Equations Octavian Cira and Florentin Smarandache 2014 2 Preface In recent times the we witnessed an explosion of Number Theory prob- lems that are solved using mathematical software and powerful comput- ers. The observation that the number of transistors packed on integrated circuits doubles every two years made by Gordon E. Moore in 1965 is still accurate to this day. With ever increasing computing power more and more mathematical problems can be tacked using brute force. At the same time the advances in mathematical software made tools like Maple, Math- ematica, Matlab or Mathcad widely available and easy to use for the vast majority of the mathematical research community. This tools don’t only perform complex computations at incredible speeds but also serve as a great tools for symbolic computation, as proving tools or algorithm de- sign. The online meeting of the two authors lead to lively exchange of ideas, solutions and observation on various Number Theory problems. The ever increasing number of results, solving techniques, approaches, and algo- rithms led to the the idea presenting the most important of them in in this volume. The book offers solutions to a multitude of η–Diophantine equation proposed by Florentin Smarandache in previous works [Smaran- dache, 1993, 1999b, 2006] over the past two decades. The expertise in tack- ling Number Theory problems with the aid of mathematical software such as [Cira and Cira, 2010], [Cira, 2013, 2014a, Cira and Smarandache, 2014, Cira, 2014b,c,d,e] played an important role in producing the algorithms and programs used to solve over 62 η–Diophantine equation. There are numerous other important publications related to Diophantine Equations i ii that offer various approaches and solutions. However, this book is differ- ent from other books of number theory since it dedicates most of its space to solving Diophantine Equations involving the Smarandache function. A search for similar results in online resources like The On-Line Encyclopedia of Integer Sequences reveals the lack of a concentrated effort in this direction. The brute force approach for solving η–Diophantine equation is a well known technique that checks all the possible solutions against the problem constrains to select the correct results. Historically, the proof of concept was done by Appel and Haken [1977] when they published the proof for the four color map theorem. This is considered to be the the first theorem that was proven using a computer. The approach used both the computing power of machines as well as theoretical results that narrowed down infi- nite search space to 1936 map configurations that had to be check. Despite some controversy in the ’80 when a masters student discovered a series of errors in the discharging procedure, the initial results was correct. Ap- pel and Haken went on to publish a book [Appel and Haken, 1989] that contained the entire and correct prof that every planar map is four-colorable. Recently, in 2014 an empirical results of Goldbach conjecture was pub- lished in Mathematics of Computation where Oliveira e Silva et al. [2013], [Oliveira e Silva, 2014], confirm the theorem to be true for all even num- bers not larger than 4 × 1018. The use of Smarandache function η that involves the set of all prime numbers constitutes one of the main reasons why, most of the problems proposed in this book do not have a finite number of cases. It could be possible that the unsolved problems from this book could be classified in classes of unsolved problems, and thus solving a single problem will help in solving all the unsolved problems in its class. But the authors could not classify them in such classes. The interested readers might be able to do that. In the given circumstances the authors focused on providing the most comprehensive partial solution possible, similar to other such solutions in the literature like: • Goldbach’s conjecture. In 2003 Oliveira e Silva announced that all even numbers ≤ 2 × 1016 can be expressed as a sum of two primes. iii In 2014 the partial result was extended to all even numbers smaller then 4 × 1018, [Oliveira e Silva, 2014]. • For any positive integer n, let f(n) denote the number of solutions to the Diophantine equation 4=n = 1=x + 1=y + 1=z with x, y, z posi- tive integers. The Erd˝os-Strausconjecture, [Oblath,´ 1950, Rosati, 1954, Bernstein, 1962, Tao, 2011], asserts that f(n) ≥ 1 for every n ≥ 2. Swett [2006] established that the conjecture is true for all integers for any n ≤ 1014. Elsholtz and Tao [2012] established some related re- sults on f and related quantities, for instance established the bound f(p) p3=5 + O1= log(log(p)) for all primes p. ∗ • Tutescu [1996] stated that η(n) 6= η(n + 1) for any n 2 N . On March 3rd, 2003 Weisstein published a paper stating that all the relation is valid for all numbers up to 109, [Sondow and Weisstein, 2014]. • A number n is k–hyperperfect for some integers k if n = 1 + k · s(n), where s(n) is the sum of the proper divisors of n. All k–hyperperfect numbers less than 1011 have been computed. It seems that the con- jecture ”all k–hyperperfect numbers for odd k > 1 are of the form p2 · q, with p = (3k + 4)=4 prime and q = 3k + 4 = 2p + 3 prime” is false [McCranie, 2000]. This results do not offer the solutions to the problems but they are impor- tant contributions worth mentioning. The emergence of mathematical software generated a new wave of mathematical research aided by computers. Nowadays it is almost impos- sible to conduct research in mathematics without using software solutions such as Maple, Mathematica, Matlab or Mathcad, etc. The authors used extensively Mathcad to explore and solve various Diophantine equations because of the very friendly nature of the interface and the powerful pro- gramming tools that this software provides. All the programs presented in the following chapters are in their complete syntax as used in Mathcad. The compact nature of the code and ease of interpretation made the choice of this particular software even more appropriate for use in a written pre- sentation of solving techniques. iv The empirical search programs in this book where developed and exe- cuted in Mathcad. The source code of this algorithms can be interpreted as pseudo code (the Mathcad syntax allows users to write code that is very easy to read) and thus translated to other programming languages. Although the intention of the authors was to provide the reader with a comprehensive book some of the notions are presented out of order. For example the book the primality test that used Smarandache’s function is extensively used. The first occurrences of this test preceded the definition the actual functions and its properties. However, overall, the text covers all definition and proves for each mathematical construct used. At the same time the references point to the most recent publications in literature, while results are presented in full only when the number of solutions is reasonable. For all other problems, that generate in excess of 100 double, triple or quadruple pairs, only partial results are contained in the sections of this book. Nevertheless, anyone interested in the complete list should contact the authors to obtain a electronic copy of it. Running the programs in this book will also generate the same complete list of possible solutions for any odd the problems in this book. Authors Acknowledgments We would like to thank all the collaborators that helped putting to- gether this book, especially to Codrut¸a Stoica and Cristian Mihai Cira, for the important comments and observations. Contents Preface v Contents ix List of figure x List of table xi Introduction xii 1 Prime numbers 1 1.1 Generating prime numbers . .2 1.2 Primality tests . 14 1.2.1 The test of primality η .................. 14 1.2.2 Deterministic tests . 15 1.2.3 Smarandache’s criteria of primality . 24 1.3 Decomposition product of prime factors . 32 1.3.1 Direct factorization . 35 1.3.2 Other methods of factorization . 37 1.4 Counting of the prime numbers . 39 1.4.1 Program of counting of the prime numbers . 39 1.4.2 Formula of counting of the prime numbers . 40 v vi CONTENTS 2 Smarandache’s function η 42 2.1 The properties of function η ................... 45 2.2 Programs for Kempner’s algorithm . 50 2.2.1 Applications . 53 2.2.2 Calculation the of values η function . 54 3 Divisor functions σ 58 3.1 The divisor function σ ...................... 58 3.1.1 Computing the values of σk functions . 62 3.2 k–hyperperfect numbers . 63 4 Euler’s totient function ' 64 4.1 The properties of function ' ..................
Recommended publications
  • The Diophantine Equation X 2 + C = Y N : a Brief Overview
    Revista Colombiana de Matem¶aticas Volumen 40 (2006), p¶aginas31{37 The Diophantine equation x 2 + c = y n : a brief overview Fadwa S. Abu Muriefah Girls College Of Education, Saudi Arabia Yann Bugeaud Universit¶eLouis Pasteur, France Abstract. We give a survey on recent results on the Diophantine equation x2 + c = yn. Key words and phrases. Diophantine equations, Baker's method. 2000 Mathematics Subject Classi¯cation. Primary: 11D61. Resumen. Nosotros hacemos una revisi¶onacerca de resultados recientes sobre la ecuaci¶onDiof¶antica x2 + c = yn. 1. Who was Diophantus? The expression `Diophantine equation' comes from Diophantus of Alexandria (about A.D. 250), one of the greatest mathematicians of the Greek civilization. He was the ¯rst writer who initiated a systematic study of the solutions of equations in integers. He wrote three works, the most important of them being `Arithmetic', which is related to the theory of numbers as distinct from computation, and covers much that is now included in Algebra. Diophantus introduced a better algebraic symbolism than had been known before his time. Also in this book we ¯nd the ¯rst systematic use of mathematical notation, although the signs employed are of the nature of abbreviations for words rather than algebraic symbols in contemporary mathematics. Special symbols are introduced to present frequently occurring concepts such as the unknown up 31 32 F. S. ABU M. & Y. BUGEAUD to its sixth power. He stands out in the history of science as one of the great unexplained geniuses. A Diophantine equation or indeterminate equation is one which is to be solved in integral values of the unknowns.
    [Show full text]
  • Arithmetic Sequences, Diophantine Equations and the Number of the Beast Bryan Dawson Union University
    Arithmetic Sequences, Diophantine Equations and the Number of the Beast Bryan Dawson Union University Here is wisdom. Let him who has understanding calculate the number of the beast, for it is the number of a man: His number is 666. -Revelation 13:18 (NKJV) "Let him who has understanding calculate ... ;" can anything be more enticing to a mathe­ matician? The immediate question, though, is how do we calculate-and there are no instructions. But more to the point, just who might 666 be? We can find anything on the internet, so certainly someone tells us. A quick search reveals the answer: according to the "Gates of Hell" website (Natalie, 1998), 666 refers to ... Bill Gates ill! In the calculation offered by the website, each letter in the name is replaced by its ASCII character code: B I L L G A T E S I I I 66 73 76 76 71 65 84 69 83 1 1 1 = 666 (Notice, however, that an exception is made for the suffix III, where the value of the suffix is given as 3.) The big question is this: how legitimate is the calculation? To answer this question, we need to know several things: • Can this same type of calculation be performed on other names? • What mathematics is behind such calculations? • Have other types of calculations been used to propose a candidate for 666? • What type of calculation did John have in mind? Calculations To answer the first two questions, we need to understand the ASCII character code. The ASCII character code replaces characters with numbers in order to have a numeric way of storing all characters.
    [Show full text]
  • Survey of Modern Mathematical Topics Inspired by History of Mathematics
    Survey of Modern Mathematical Topics inspired by History of Mathematics Paul L. Bailey Department of Mathematics, Southern Arkansas University E-mail address: [email protected] Date: January 21, 2009 i Contents Preface vii Chapter I. Bases 1 1. Introduction 1 2. Integer Expansion Algorithm 2 3. Radix Expansion Algorithm 3 4. Rational Expansion Property 4 5. Regular Numbers 5 6. Problems 6 Chapter II. Constructibility 7 1. Construction with Straight-Edge and Compass 7 2. Construction of Points in a Plane 7 3. Standard Constructions 8 4. Transference of Distance 9 5. The Three Greek Problems 9 6. Construction of Squares 9 7. Construction of Angles 10 8. Construction of Points in Space 10 9. Construction of Real Numbers 11 10. Hippocrates Quadrature of the Lune 14 11. Construction of Regular Polygons 16 12. Problems 18 Chapter III. The Golden Section 19 1. The Golden Section 19 2. Recreational Appearances of the Golden Ratio 20 3. Construction of the Golden Section 21 4. The Golden Rectangle 21 5. The Golden Triangle 22 6. Construction of a Regular Pentagon 23 7. The Golden Pentagram 24 8. Incommensurability 25 9. Regular Solids 26 10. Construction of the Regular Solids 27 11. Problems 29 Chapter IV. The Euclidean Algorithm 31 1. Induction and the Well-Ordering Principle 31 2. Division Algorithm 32 iii iv CONTENTS 3. Euclidean Algorithm 33 4. Fundamental Theorem of Arithmetic 35 5. Infinitude of Primes 36 6. Problems 36 Chapter V. Archimedes on Circles and Spheres 37 1. Precursors of Archimedes 37 2. Results from Euclid 38 3. Measurement of a Circle 39 4.
    [Show full text]
  • Arxiv:1503.02592V1
    MATHEMATICS OF COMPUTATION Volume 00, Number 0, Pages 000–000 S 0025-5718(XX)0000-0 TWO COMPACT INCREMENTAL PRIME SIEVES JONATHAN P. SORENSON Abstract. A prime sieve is an algorithm that finds the primes up to a bound n. We say that a prime sieve is incremental, if it can quickly determine if n+1 is prime after having found all primes up to n. We say a sieve is compact if it uses roughly √n space or less. In this paper we present two new results: We describe the rolling sieve, a practical, incremental prime sieve that • takes O(n log log n) time and O(√n log n) bits of space, and We show how to modify the sieve of Atkin and Bernstein [1] to obtain a • sieve that is simultaneously sublinear, compact, and incremental. The second result solves an open problem given by Paul Pritchard in 1994 [19]. 1. Introduction and Definitions A prime sieve is an algorithm that finds all prime numbers up to a given bound n. The fastest known algorithms, including Pritchard’s wheel sieve [16] and the Atkin- Bernstein sieve [1], can do this using at most O(n/ log log n) arithmetic operations. The easy-to-code sieve of Eratosthenes requires O(n log log n) time, and there are a number of sieves in the literature that require linear time [17, 18]. Normally, running time is the main concern in algorithm design, but in this paper we are also interested in two other properties: incrementality and compactness. We say that a sieve is compact if it uses at most n1/2+o(1) space.
    [Show full text]
  • Sieve Algorithms for the Discrete Logarithm in Medium Characteristic Finite Fields Laurent Grémy
    Sieve algorithms for the discrete logarithm in medium characteristic finite fields Laurent Grémy To cite this version: Laurent Grémy. Sieve algorithms for the discrete logarithm in medium characteristic finite fields. Cryptography and Security [cs.CR]. Université de Lorraine, 2017. English. NNT : 2017LORR0141. tel-01647623 HAL Id: tel-01647623 https://tel.archives-ouvertes.fr/tel-01647623 Submitted on 24 Nov 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. AVERTISSEMENT Ce document est le fruit d'un long travail approuvé par le jury de soutenance et mis à disposition de l'ensemble de la communauté universitaire élargie. Il est soumis à la propriété intellectuelle de l'auteur. Ceci implique une obligation de citation et de référencement lors de l’utilisation de ce document. D'autre part, toute contrefaçon, plagiat, reproduction illicite encourt une poursuite pénale. Contact : [email protected] LIENS Code de la Propriété Intellectuelle. articles L 122. 4 Code de la Propriété Intellectuelle. articles L 335.2- L 335.10 http://www.cfcopies.com/V2/leg/leg_droi.php
    [Show full text]
  • Golden Oaks Software
    New Method to Find Primes GOLDEN OAKS SOFTWARE Description of a New Method to Find Primes Golden Oaks Software 7524 Soquel Way Citrus Heights, CA 95610 Dr. Joe Butler [email protected] (916) 220 1654 30 September 2008 Copyright Date: Oct 06, 2008 Patent Date: Oct 08, 2008 Number: 61195490 PROPRIETARY STATEMENT This document contains commercial or financial information, or trade secrets, of Golden Oaks Software, which are proprietary and exempt from disclosure to the public under the Freedom of Information Act, 5 U.S.C. 552(b)(4), and unlawful disclosure thereof is a violation of the Trade Secrets Act, 18 U.S.C. 1905. Public disclosure of any such information or trade secrets shall not be made without the written permission of Golden Oaks Software. This document includes data that shall not be disclosed outside the Government and shall not be duplicated, used or disclosed, in whole or in part, for any purposes other than to evaluate the information. If however, a contract is awarded to this offeror as a result of, or in conjunction with, the submission of this data, the Government shall have the right to duplicate, use, or disclose, the data to the extent provided in the resulting contract. The restriction does not limit the Government’s right to use information contained in this data if it is obtained from other sources without restriction. The data subject to this restriction is contained in all sheets. primefnd.doc 1 11/22/2008 COPYRIGHT & PATENTED New Method to Find Primes ABSTRACT The following are documents and word description flowcharts of a new method to find prime numbers.
    [Show full text]
  • Solving Elliptic Diophantine Equations: the General Cubic Case
    ACTA ARITHMETICA LXXXVII.4 (1999) Solving elliptic diophantine equations: the general cubic case by Roelof J. Stroeker (Rotterdam) and Benjamin M. M. de Weger (Krimpen aan den IJssel) Introduction. In recent years the explicit computation of integer points on special models of elliptic curves received quite a bit of attention, and many papers were published on the subject (see for instance [ST94], [GPZ94], [Sm94], [St95], [Tz96], [BST97], [SdW97], [ST97]). The overall picture before 1994 was that of a field with many individual results but lacking a comprehensive approach to effectively settling the el- liptic equation problem in some generality. But after S. David obtained an explicit lower bound for linear forms in elliptic logarithms (cf. [D95]), the elliptic logarithm method, independently developed in [ST94] and [GPZ94] and based upon David’s result, provided a more generally applicable ap- proach for solving elliptic equations. First Weierstraß equations were tack- led (see [ST94], [Sm94], [St95], [BST97]), then in [Tz96] Tzanakis considered quartic models and in [SdW97] the authors gave an example of an unusual cubic non-Weierstraß model. In the present paper we shall treat the general case of a cubic diophantine equation in two variables, representing an elliptic curve over Q. We are thus interested in the diophantine equation (1) f(u, v) = 0 in rational integers u, v, where f Q[x,y] is of degree 3. Moreover, we require (1) to represent an elliptic curve∈ E, that is, a curve of genus 1 with at least one rational point (u0, v0). 1991 Mathematics Subject Classification: 11D25, 11G05, 11Y50, 12D10.
    [Show full text]
  • Secure Communication Protocols, Secret Sharing and Authentication Based on Goldbach Partitions
    SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS By ADNAN AHMED MEMON Bachelor of Engineering in Telecommunication Sukkur Institute of Business Administration Sukkur, Sindh, Pakistan 2012 Submitted to the Faculty of the Graduate College of the Oklahoma State University in partial fulfillment of the requirements for the Degree of MASTER OF SCIENCE July, 2017 SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS Thesis Approved: Dr. Subhash C. Kak Thesis Adviser Dr. Qi Cheng Dr. Yanmin (Emily) Gong ii ACKNOWLEDGEMENTS Foremost, I would like to thank Almighty Allah for bestowing upon me His countless blessings, giving me strength and good health to finish this research. It is a great pleasure to acknowledge my deepest thanks to Prof. Subhash Kak, Regents Professor, School of Electrical and Computer Engineering, Oklahoma State University, Stillwater, OK, USA, whose consistent supervision and motivation enabled me to complete this research successfully. I would like to thank my family, especially my Mom for encouraging and supporting me during this whole thesis period. Thank you friends for being with me in difficult times. I would like to thank my sponsors i.e. Fulbright, IIE and USEFP for providing me fully funded scholarship so that I could focus on my research. This would not have been possible without their support. I would like to dedicate this research to my (late) father Mr. Ghulam Sarwar Memon who has always been a role model for me. iii Acknowledgements reflect the views of the author and are not endorsed by committee members or Oklahoma State University. Name: ADNAN AHMED MEMON Date of Degree: JULY, 2017 Title of Study: SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS Major Field: ELECTRICAL ENGINEERING Abstract: This thesis investigates the use of Goldbach partitions for secure communication protocols and for finding large prime numbers that are fundamental to these protocols.
    [Show full text]
  • The I/O Complexity of Computing Prime Tables 1 Introduction
    The I/O Complexity of Computing Prime Tables Michael A. Bender1, Rezaul Chowdhury1, Alex Conway2, Mart´ın Farach-Colton2, Pramod Ganapathi1, Rob Johnson1, Samuel McCauley1, Bertrand Simon3, and Shikha Singh1 1 Stony Brook University, Stony Brook, NY 11794-2424, USA. fbender,rezaul,pganapathi,rob,smccauley,shiksinghg @cs.stonybrook.edu 2 Rutgers University, Piscataway, NJ 08854, USA. ffarach,[email protected] 3 LIP, ENS de Lyon, 46 allee´ d’Italie, Lyon, France. [email protected] Abstract. We revisit classical sieves for computing primes and analyze their performance in the external-memory model. Most prior sieves are analyzed in the RAM model, where the focus is on minimizing both the total number of operations and the size of the working set. The hope is that if the working set fits in RAM, then the sieve will have good I/O performance, though such an outcome is by no means guaranteed by a small working-set size. We analyze our algorithms directly in terms of I/Os and operations. In the external- memory model, permutation can be the most expensive aspect of sieving, in contrast to the RAM model, where permutations are trivial. We show how to implement classical sieves so that they have both good I/O performance and good RAM performance, even when the problem size N becomes huge—even superpolynomially larger than RAM. Towards this goal, we give two I/O-efficient priority queues that are optimized for the operations incurred by these sieves. Keywords: External-Memory Algorithms, Prime Tables, Sorting, Priority Queues 1 Introduction According to Fox News [21], “Prime numbers, which are divisible only by themselves and one, have little mathematical importance.
    [Show full text]
  • Diophantine Equations 1 Exponential Diophantine Equations
    Number Theory Misha Lavrov Diophantine equations Western PA ARML Practice October 4, 2015 1 Exponential Diophantine equations Diophantine equations are just equations we solve with the constraint that all variables must be integers. These are generally really hard to solve (for example, the famous Fermat's Last Theorem is an example of a Diophantine equation). Today, we will begin by focusing on a special kind of Diophantine equation: exponential Diophantine equations. Here's an example. Example 1. Solve 5x − 8y = 1 for integers x and y. These can still get really hard, but there's a special technique that solves them most of the time. That technique is to take the equation modulo m. In this example, if 5x − 8y = 1, then in particular 5x − 8y ≡ 1 (mod 21). But what do the powers of 5 and 8 look like modulo 21? We have: • 5x ≡ 1; 5; 4; 20; 16; 17; 1; 5; 4;::: , repeating every 6 steps. • 8y ≡ 1; 8; 1; 8;::: , repeating every 2 steps. So there are only 12 possibilities for 5x − 8y when working modulo 21. We can check them all, and we notice that 1 − 1; 1 − 8; 5 − 1; 5 − 8;:::; 17 − 1; 17 − 8 are not ever equal to 1. So the equation has no solutions. Okay, but there's a magic step here: how did we pick 21? Example 2. Solve 5x − 8y = 1 for integers x and y, but in a way that's not magic. There are several rules to follow for picking the modulus m. The first is one we've already broken: Rule 1: Choose m to be a prime or a power of a prime.
    [Show full text]
  • Archimedes' Cattle Problem
    Archimedes’ Cattle Problem D. Joyce, Clark University January 2006 Brief htistory. L. E. Dickson describes the history of Archimede’s Cattle Problem in his History of the Theory of Numbers,1 briefly summarized here. A manuscript found in the Herzog August Library at Wolfenb¨uttel,Germany, was first described in 1773 by G. E. Lessing with a German translation from the Greek and a mathematical commentary by C. Leiste.2 The problem was stated in a Greek epigram in 24 verses along with a solution of part of the problem, but not the last part about square and triangular numbers. Leiste explained how the partial solution may have been derived, but he didn’t solve the last part either. That was first solved by A. Amthor in 1880.3 Part 1. We can solve the first part of the problem with a little algebra and a few hand com- putations. It is a multilinear Diophantine problem with four variables and three equations. If thou art diligent and wise, O stranger, compute the number of cattle of the Sun, who once upon a time grazed on the fields of the Thrinacian isle of Sicily, divided into four herds of different colours, one milk white, another a glossy black, a third yellow and the last dappled. In each herd were bulls, mighty in number according to these proportions: Understand, stranger, that the white bulls were equal to a half and a third of the black together with the whole of the yellow, while the black were equal to the fourth part of the dappled and a fifth, together with, once more, the whole of the yellow.
    [Show full text]
  • Towards Proving the Twin Prime Conjecture Using A
    Towards Proving the Twin Prime Conjecture using a Novel Method For Finding the Next Prime Number PN+1 after a Given Prime Number PN and a Refinement on the Maximal Bounded Prime Gap Gi Reema Joshi Department of Computer Science and Engineering Tezpur University Tezpur, Assam 784028, India [email protected] Abstract This paper introduces a new method to find the next prime number after a given prime P . The proposed method is used to derive a system of inequali- ties, that serve as constraints which should be satisfied by all primes whose successor is a twin prime. Twin primes are primes having a prime gap of 2. The pairs (5, 7), (11, 13), (41, 43), etcetera are all twin primes. This paper envisions that if the proposed system of inequalities can be proven to have infinite solutions, the Twin Prime Conjecture will evidently be proven true. The paper also derives a novel upper bound on the prime gap, Gi between Pi and Pi+1, as a function of Pi. Keywords: Prime, Twin Prime Conjecture, Slack, Sieve, Prime Gap 2010 MSC: 11A41, 11N05 arXiv:2004.14819v2 [math.GM] 6 May 2020 1. Introduction A positive integer P > 1 is called a prime number if its only positive divisors are 1 and P itself. For example, 2,3,7,11,19 and so on. There are in- finitely many primes. A simple yet elegant proof of this proposition was given by Euclid around 300 B.C. One interesting question would be, "does there exist a method for generating successive prime numbers along the infinite pool of primes?".
    [Show full text]