A Diophantine Equation in K–Generalized Fibonacci Numbers and Repdigits

Total Page:16

File Type:pdf, Size:1020Kb

A Diophantine Equation in K–Generalized Fibonacci Numbers and Repdigits A Diophantine equation in k{generalized Fibonacci numbers and repdigits Jhon J. Bravo Departamento de Matem´aticas Universidad del Cauca Calle 5 No 4{70, Popay´an,Colombia E-mail: [email protected] Carlos Alexis G´omezRuiz Departamento de Matem´aticas Universidad del Valle 25360 Calle 13 No 100-00, Cali, Colombia E-mail: [email protected] Florian Luca School of Mathematics University of the Witwatersrand Private Bag X3 Wits 2050 Johannesburg, South Africa Max Planck Institute for Mathematics Vivatsgasse 7 53111 Bonn, Germany Department of Mathematics Faculty of Sciences University of Ostrava 30 Dubna 22 701 03 Ostrava 1, Czech Republic E-mail: [email protected] Abstract 2010 Mathematics Subject Classification: 11B39; 11J86. Key words and phrases: Generalized Fibonacci numbers, lower bounds for nonzero linear forms in logarithms of algebraic numbers, repdigits. 1 2 J. J. Bravo, C. A. G´omezand F. Luca (k) The k−generalized Fibonacci sequence fFn gn starts with the value 0;:::; 0; 1 (a total of k terms) and each term afterwards is the sum of the k preceding terms. In the present paper, we study on members of k{generalized Fibonacci sequence which are sum of two repdigts, extending a result of D´ıazand Luca [5] regarding Fibonacci numbers with the above property. 1 Introduction Given an integer k ≥ 2, we consider the k{generalized Fibonacci sequence (k) (k) or, for simplicity, the k{Fibonacci sequence F := fFn gn≥2−k given by the recurrence (k) (k) (k) (k) (1.1) Fn = Fn−1 + Fn−2 + ··· + Fn−k for all n ≥ 2; (k) (k) (k) (k) with the initial conditions F−(k−2) = F−(k−3) = ··· = F0 = 0 and F1 = 1. (k) We shall refer to Fn as the nth k−Fibonacci number. We note that in fact each choice of k produces a distinct sequence which is a generalization of the usual Fibonacci sequence fFngn≥0, obtained for k = 2. Cooper and Howard [4] proved the following formula. For k ≥ 2 and n ≥ k + 2, n+k b k+1 c−1 (k) n−2 X n−(k+1)j−2 (1.2) Fn = 2 + Cn;j 2 ; j=1 where n − jk n − jk − 2 C = (−1)j − : n;j j j − 2 a In the above, we used the convention that b = 0 if either a < b or if one of a or b is negative and we denoted by bxc the greatest integer less than or equal (k) n−2 to x. We have Fn < 2 for all n ≥ k + 2 (see [2]). Furthermore, the first (k) (k) minf0;n−2g k + 1 non{zero terms in F are powers of two, namely Fn = 2 for all 1 ≤ n ≤ k + 1. We next recall some facts and properties of the k−Fibonacci sequence which will be used later. First, it is known that the characteristic polynomial of F (k), namely k k−1 Ψk(x) = x − x − · · · − x − 1; is irreducible over Q[x] and has just one zero outside the unit circle. Through- out this paper, α := α(k) denotes that single zero, which is a Pisot number of degree k since the other zeros of the characteristic polynomial Ψk(x) are k{Fibonacci numbers as sum of two repdigits 3 strictly inside the unit circle (see, for example, [14], [15] and [16]). Moreover, it is known from Lemma 2.3 in [11] that (1.3) 2(1 − 2−k) < α(k) < 2; holds for all k ≥ 2; a fact rediscovered by Wolfram [16]. To simplify notation, we will omit the dependence on k of α. It was proved in [2] that n−2 (k) n−1 (1.4) α ≤ Fn ≤ α holds for all n ≥ 1: We now consider the function fk(z) := (z−1)= (2 + (k + 1)(z − 2)) for k ≥ 2. Dresden and Du remarked in [6] that k (k) X (i) (i)n−1 (k) n−1 1 (1.5) F = fk(α )α ; F − fk(α)α < ; n n 2 i=1 (1) (k) where α := α ; : : : ; α are the zeros of Ψk(x). The expression on the left (k) hand side is known as Binet{like formula for Fn . Furthermore, the inequality on the right{hand side in (1.5), shows that the contribution of the zeros which (k) are inside the unit circle to Fn is very small. −k From the formula of fk(z), is easy see that if z 2 (2(1 − 2 ); 2), then @zfk(z) < 0. Thus, from inequality (1.3), we conclude that −k 1=2 = fk(2) ≤ fk(α) ≤ fk 2(1 − 2 ) ≤ 3=4; for all k ≥ 3: p (i) Also, f2((1 + 5)=2) = 0:72360 : : : < 3=4. Further, if z = α with i = (i) 2; : : : ; k, then jfk(α )j < 1 for all k ≥ 2. Indeed, this follows for k ≥ 3 from the fact that jα(i)j < 1, so jα(i) − 1j < 2, and j2 + (k + 1)(α(i) − 2)j > k − 1. p Also, f2((1 − 5)=2) = 0:2763 :::. Thus, we conclude that for all k ≥ 2 we have both (1.6) 1=2 ≤ fk(α) ≤ 3=4 and (i) (1.7) fk(α ) < 1 for all i = 2; : : : ; k: In this paper, we study a problem regarding the representation of k{ Fibonacci numbers as sums of repdigits. Recall that a positive integer is called a repdigit if it has only one distinct digit in its decimal expansion. In particular, such number has the form a(10m − 1)=9 for some m ≥ 1 and 1 ≤ a ≤ 9. In 2000, Luca [10] showed that 55 is the largest repdigit Fibonacci number. Marques [12] proved in 2013 that 44 is the largest repdigit in the 4 J. J. Bravo, C. A. G´omezand F. Luca Tribonacci sequence (k = 3). The same year, Bravo and Luca [5] showed that there are no repdigits having at least 2 digits in any k{generalized Fibonacci sequence for any k > 3, confirming a conjecture of Marques. In 2011, D´ıaz y Luca [5] found all Fibonacci numbers as sum of two repdigts. Here, we study an analogue of the problem of D´ıazand Luca when the sequence of Fibonacci numbers is replaced by the sequence of k{generalized Fibonacci numbers. More precisely, we have the following result. Main Theorem. For k ≥ 3 and n ≥ k + 2, the Diophantine equation 10m − 1 10l − 1 (1.8) F (k) = a + b ; 1 ≤ a; b ≤ 9; n 9 9 has only 17 positive integer solutions (n; k; m; l; a; b) with m ≥ maxfl; 2g: (3) (3) (3) F6 = 13 = 11 + 2 F7 = 24 = 22 + 2 F9 = 81 = 77 + 4 (4) (4) (4) F6 = 15 = 11 + 4 F7 = 29 = 22 + 7 F8 = 56 = 55 + 1 (4) (5) (5) F9 = 108 = 99 + 9 F7 = 31 = 22 + 9 F8 = 61 = 55 + 6 (5) (6) (7) F9 = 120 = 111 + 9 F8 = 63 = 55 + 8 F12 = 1004 = 999 + 5 (3) (3) (6) F8 = 44 = 11 + 33 F8 = 44 = 22 + 22 F12 = 976 = 888 + 88 (8) (9) F10 = 255 = 222 + 33 F12 = 1021 = 999 + 22 (k) n−2 On the other hand, for n < k + 2, Fn is the power of two 2 and the only solutions of (1.8) with m ≥ maxfl; 2g, are (k) (k) F6 = 16 = 11 + 5 (k ≥ 5) and F8 = 64 = 55 + 9 (k ≥ 7): We clarify that the condition m ≥ maxfl; 2g ≥ 2, in the above theorem, (k) is only meant to insure that Fn has at least 2 digits, and so to avoid small numbers which are the sums of two one-digit numbers. 2 Upper bounds for the solutions of (1.8) We begin our work with the case n ≥ k+2. Assume throughout that equation (1.8) holds. Combining the fact that 10m − 1 10l − 1 10m−1 < a + b = F (k) 9 9 n with inequality (1.4), we have log α (2.1) l ≤ m < (n − 1) + 1: log 10 We need to bound k and n. k{Fibonacci numbers as sum of two repdigits 5 2.1 A polynomial upper bound on n in terms of k Using (1.5), we obtain from (1.8) that l−m n−1 a + b10 m 1 a + b 5 (2.2) fk(α)α − 10 < + ≤ : 9 2 9 2 n−1 Dividing both sides of the above inequality by fk(α)α , we obtain l−m −1 a + b10 −(n−1) m 5 (2.3) fk(α) α 10 − 1 < ; 9 αn−1 where we used the fact that fk(α) > 1=2. We put −1 l−m γ1 := fk(α) (a + b10 )=9; γ2 := α; γ3 := 10; (2.4) b1 := 1; b2 := −(n − 1); b3 := m; b1 b2 b3 Λ1 := γ1 · γ2 · γ3 − 1: So, by (2.3), 5 (2.5) jΛ j < : 1 αn−1 Our next step will be to find a lower bound for jΛ1j. For this purpose we use the following result of Matveev (see [13] or Theorem 9.4 in [3]). Lemma 1. Let K be a number field of degree D over Q; γ1; : : : ; γt be positive real numbers of K, and b1; : : : ; bt rational integers. Put b1 bt Λ := γ1 ··· γt − 1 and B ≥ maxfjb1j;:::; jbtjg: Let Ai ≥ maxfDh(γi); j log γij; 0:16g be real numbers, for i = 1; : : : ; t: Then, assuming that Λ 6= 0, we have t+3 4:5 2 jΛj > exp(−1:4 × 30 × t × D (1 + log D)(1 + log B)A1 ··· At): In the above and in what follows, for an algebraic number η of degree d over Q and minimal primitive polynomial over the integers d Y (i) f(X) := a0 (X − η ) 2 Z[X] i=1 with positive leading coefficient a0, we write h(η) for its logarithmic height, given by d ! 1 X h(η) := log a + log maxfjη(i)j; 1g : d 0 i=1 6 J.
Recommended publications
  • On Terms of Generalized Fibonacci Sequences Which Are Powers of Their Indexes
    mathematics Article On Terms of Generalized Fibonacci Sequences which are Powers of their Indexes Pavel Trojovský Department of Mathematics, Faculty of Science, University of Hradec Králové, 500 03 Hradec Králové, Czech Republic, [email protected]; Tel.: +42-049-333-2860 Received: 29 June 2019; Accepted: 31 July 2019; Published: 3 August 2019 (k) Abstract: The k-generalized Fibonacci sequence (Fn )n (sometimes also called k-bonacci or k-step Fibonacci sequence), with k ≥ 2, is defined by the values 0, 0, ... , 0, 1 of starting k its terms and such way that each term afterwards is the sum of the k preceding terms. This paper is devoted to the proof of the fact that the (k) t (2) 2 (3) 2 Diophantine equation Fm = m , with t > 1 and m > k + 1, has only solutions F12 = 12 and F9 = 9 . Keywords: k-generalized Fibonacci sequence; Diophantine equation; linear form in logarithms; continued fraction MSC: Primary 11J86; Secondary 11B39. 1. Introduction The well-known Fibonacci sequence (Fn)n≥0 is given by the following recurrence of the second order Fn+2 = Fn+1 + Fn, for n ≥ 0, with the initial terms F0 = 0 and F1 = 1. Fibonacci numbers have a lot of very interesting properties (see e.g., book of Koshy [1]). One of the famous classical problems, which has attracted a attention of many mathematicians during the last thirty years of the twenty century, was the problem of finding perfect powers in the sequence of Fibonacci numbers. Finally in 2006 Bugeaud et al. [2] (Theorem 1), confirmed these expectations, as they showed that 0, 1, 8 and 144 are the only perfect powers in the sequence of Fibonacci numbers.
    [Show full text]
  • Number Systems and Radix Conversion
    Number Systems and Radix Conversion Sanjay Rajopadhye, Colorado State University 1 Introduction These notes for CS 270 describe polynomial number systems. The material is not in the textbook, but will be required for PA1. We humans are comfortable with numbers in the decimal system where each po- sition has a weight which is a power of 10: units have a weight of 1 (100), ten’s have 10 (101), etc. Even the fractional apart after the decimal point have a weight that is a (negative) power of ten. So the number 143.25 has a value that is 1 ∗ 102 + 4 ∗ 101 + 3 ∗ 0 −1 −2 2 5 10 + 2 ∗ 10 + 5 ∗ 10 , i.e., 100 + 40 + 3 + 10 + 100 . You can think of this as a polyno- mial with coefficients 1, 4, 3, 2, and 5 (i.e., the polynomial 1x2 + 4x + 3 + 2x−1 + 5x−2+ evaluated at x = 10. There is nothing special about 10 (just that humans evolved with ten fingers). We can use any radix, r, and write a number system with digits that range from 0 to r − 1. If our radix is larger than 10, we will need to invent “new digits”. We will use the letters of the alphabet: the digit A represents 10, B is 11, K is 20, etc. 2 What is the value of a radix-r number? Mathematically, a sequence of digits (the dot to the right of d0 is called the radix point rather than the decimal point), : : : d2d1d0:d−1d−2 ::: represents a number x defined as follows X i x = dir i 2 1 0 −1 −2 = ::: + d2r + d1r + d0r + d−1r + d−2r + ::: 1 Example What is 3 in radix 3? Answer: 0.1.
    [Show full text]
  • Cheat Sheet of SSE/AVX Intrinsics, for Doing Arithmetic Ll F(Int Ind, Int K) { Return Dp[Ind][K]; } on Several Numbers at Once
    University of Bergen Garbage Collectors Davide Pallotti, Jan Soukup, Olav Røthe Bakken NWERC 2017 Nov 8, 2017 UiB template .bashrc .vimrc troubleshoot 1 tan v + tan w Contest (1) Any possible infinite recursion? tan(v + w) = Invalidated pointers or iterators? 1 − tan v tan w template.cpp Are you using too much memory? v + w v − w 15 lines Debug with resubmits (e.g. remapped signals, see Various). sin v + sin w = 2 sin cos #include <bits/stdc++.h> 2 2 using namespace std; Time limit exceeded: v + w v − w Do you have any possible infinite loops? cos v + cos w = 2 cos cos #define rep(i, a, b) for(int i = a; i < (b); ++i) What is the complexity of your algorithm? 2 2 #define trav(a, x) for(auto& a : x) Are you copying a lot of unnecessary data? (References) #define all(x) x.begin(), x.end() How big is the input and output? (consider scanf) (V + W ) tan(v − w)=2 = (V − W ) tan(v + w)=2 #define sz(x) (int)(x).size() Avoid vector, map. (use arrays/unordered_map) typedef long long ll; What do your team mates think about your algorithm? where V; W are lengths of sides opposite angles v; w. typedef pair<int, int> pii; typedef vector<int> vi; Memory limit exceeded: a cos x + b sin x = r cos(x − φ) What is the max amount of memory your algorithm should need? int main() { Are you clearing all datastructures between test cases? a sin x + b cos x = r sin(x + φ) cin.sync_with_stdio(0); cin.tie(0); cin.exceptions(cin.failbit); p 2 2 } Mathematics (2) where r = a + b ; φ = atan2(b; a).
    [Show full text]
  • Composite Numbers That Give Valid RSA Key Pairs for Any Coprime P
    information Article Composite Numbers That Give Valid RSA Key Pairs for Any Coprime p Barry Fagin ID Department of Computer Science, US Air Force Academy, Colorado Springs, CO 80840, USA; [email protected]; Tel.: +1-719-339-4514 Received: 13 August 2018; Accepted: 25 August 2018; Published: 28 August 2018 Abstract: RSA key pairs are normally generated from two large primes p and q. We consider what happens if they are generated from two integers s and r, where r is prime, but unbeknownst to the user, s is not. Under most circumstances, the correctness of encryption and decryption depends on the choice of the public and private exponents e and d. In some cases, specific (s, r) pairs can be found for which encryption and decryption will be correct for any (e, d) exponent pair. Certain s exist, however, for which encryption and decryption are correct for any odd prime r - s. We give necessary and sufficient conditions for s with this property. Keywords: cryptography; abstract algebra; RSA; computer science education; cryptography education MSC: [2010] 11Axx 11T71 1. Notation and Background Consider the RSA public-key cryptosystem and its operations of encryption and decryption [1]. Let (p, q) be primes, n = p ∗ q, f(n) = (p − 1)(q − 1) denote Euler’s totient function and (e, d) the ∗ Z encryption/decryption exponent pair chosen such that ed ≡ 1. Let n = Un be the group of units f(n) Z mod n, and let a 2 Un. Encryption and decryption operations are given by: (ae)d ≡ (aed) ≡ (a1) ≡ a mod n We consider the case of RSA encryption and decryption where at least one of (p, q) is a composite number s.
    [Show full text]
  • Arxiv:1608.06086V1 [Math.NT]
    POWER OF TWO AS SUMS OF THREE PELL NUMBERS JHON J. BRAVO, BERNADETTE FAYE AND FLORIAN LUCA Abstract. In this paper, we find all the solutions of the Diophantine equation a Pℓ +Pm +Pn =2 , in nonnegative integer variables (n,m,ℓ,a) where Pk is the k-th term of the Pell sequence Pn n≥0 given by P0 = 0, P1 = 1 and Pn+1 =2Pn+Pn−1 for all n 1. { } ≥ MSC: 11D45, 11B39; 11A25 Keywords: Diophantine equations, Pell numbers, Linear forms in logarithm, reduction method. 1. Introduction The Pell sequence P is the binary reccurent sequence given by P = 0, P =1 { n}n≥0 0 1 and Pn+1 = 2Pn + Pn−1 for all n 0. There are many papers in the literature dealing with Diophantine equations≥ obtained by asking that members of some fixed binary recurrence sequence be squares, factorials, triangular, or belonging to some other interesting sequence of positive integers. For example, in 2008, A. Peth˝o[18] found all the perfect powers (of exponent larger than 1) in the Pell sequence. His result is the following. Theorem 1 (A. Peth˝o, [18]). The only positive integer solutions (n, q, x) with q 2 of the Diophantine equation ≥ q Pn = x are (n, q, x) = (1, q, 1) and (7, 2, 13). That is, the only perfect powers of exponent larger than 1 in the Pell numbers are 2 P1 =1 and P7 = 13 . The case q = 2 had been treated earlier by Ljunggren [13]. Peth˝o’s result was rediscovered by J. H.
    [Show full text]
  • Rapid Multiplication Modulo the Sum and Difference of Highly Composite Numbers
    MATHEMATICS OF COMPUTATION Volume 72, Number 241, Pages 387{395 S 0025-5718(02)01419-9 Article electronically published on March 5, 2002 RAPID MULTIPLICATION MODULO THE SUM AND DIFFERENCE OF HIGHLY COMPOSITE NUMBERS COLIN PERCIVAL Abstract. We extend the work of Richard Crandall et al. to demonstrate how the Discrete Weighted Transform (DWT) can be applied to speed up multiplication modulo any number of the form a b where p is small. In ± p ab particular this allows rapid computation modulo numbers of thej form k 2n 1. Q · ± In addition, we prove tight bounds on the rounding errors which naturally occur in floating-point implementations of FFT and DWT multiplications. This makes it possible for FFT multiplications to be used in situations where correctness is essential, for example in computer algebra packages. 1. Introduction In their seminal paper of 1994, Richard Crandall and Barry Fagin introduced the Discrete Weighted Transform (DWT) as a means of eliminating zero-padding when performing integer multiplication modulo Mersenne numbers [2]. While this does not give any improvement in the order of the multiplication, it nevertheless cuts the transform length (and thus time and memory) in half. For these reasons the DWT has become a fixture of the search for Mersenne primes [10]. By using the same form of irrational-base representation as is used for Mersenne numbers, we can in fact eliminate the zero-padding when working modulo a b ± provided that p ab p is sufficiently small that we have enough precision. Essen- tially, as with Mersennej numbers, we choose the base so that the reduction modulo xn 1 implicitQ in the FFT multiplication turns into a reduction modulo a b.
    [Show full text]
  • Arxiv:2008.10398V1 [Math.NT] 24 Aug 2020 Children He Has
    JOURNAL OF THE AMERICAN MATHEMATICAL SOCIETY Volume 00, Number 0, Pages 000{000 S 0894-0347(XX)0000-0 RECURSIVELY ABUNDANT AND RECURSIVELY PERFECT NUMBERS THOMAS FINK London Institute for Mathematical Sciences, 35a South St, London W1K 2XF, UK Centre National de la Recherche Scientifique, Paris, France The divisor function σ(n) sums the divisors of n. We call n abundant when σ(n) − n > n and perfect when σ(n) − n = n. I recently introduced the recursive divisor function a(n), the recursive analog of the divisor function. It measures the extent to which a number is highly divisible into parts, such that the parts are highly divisible into subparts, so on. Just as the divisor function motivates the abundant and perfect numbers, the recursive divisor function motivates their recursive analogs, which I introduce here. A number is recursively abundant, or ample, if a(n) > n and recursively perfect, or pristine, if a(n) = n. There are striking parallels between abundant and perfect numbers and their recursive counterparts. The product of two ample numbers is ample, and ample numbers are either abundant or odd perfect numbers. Odd ample numbers exist but are rare, and I conjecture that there are such numbers not divisible by the first k primes|which is known to be true for the abundant numbers. There are infinitely many pristine numbers, but that they cannot be odd, apart from 1. Pristine numbers are the product of a power of two and odd prime solutions to certain Diophantine equations, reminiscent of how perfect numbers are the product of a power of two and a Mersenne prime.
    [Show full text]
  • Integer Sequences
    UHX6PF65ITVK Book > Integer sequences Integer sequences Filesize: 5.04 MB Reviews A very wonderful book with lucid and perfect answers. It is probably the most incredible book i have study. Its been designed in an exceptionally simple way and is particularly just after i finished reading through this publication by which in fact transformed me, alter the way in my opinion. (Macey Schneider) DISCLAIMER | DMCA 4VUBA9SJ1UP6 PDF > Integer sequences INTEGER SEQUENCES Reference Series Books LLC Dez 2011, 2011. Taschenbuch. Book Condition: Neu. 247x192x7 mm. This item is printed on demand - Print on Demand Neuware - Source: Wikipedia. Pages: 141. Chapters: Prime number, Factorial, Binomial coeicient, Perfect number, Carmichael number, Integer sequence, Mersenne prime, Bernoulli number, Euler numbers, Fermat number, Square-free integer, Amicable number, Stirling number, Partition, Lah number, Super-Poulet number, Arithmetic progression, Derangement, Composite number, On-Line Encyclopedia of Integer Sequences, Catalan number, Pell number, Power of two, Sylvester's sequence, Regular number, Polite number, Ménage problem, Greedy algorithm for Egyptian fractions, Practical number, Bell number, Dedekind number, Hofstadter sequence, Beatty sequence, Hyperperfect number, Elliptic divisibility sequence, Powerful number, Znám's problem, Eulerian number, Singly and doubly even, Highly composite number, Strict weak ordering, Calkin Wilf tree, Lucas sequence, Padovan sequence, Triangular number, Squared triangular number, Figurate number, Cube, Square triangular
    [Show full text]
  • Fermat Pseudoprimes
    1 TWO HUNDRED CONJECTURES AND ONE HUNDRED AND FIFTY OPEN PROBLEMS ON FERMAT PSEUDOPRIMES (COLLECTED PAPERS) Education Publishing 2013 Copyright 2013 by Marius Coman Education Publishing 1313 Chesapeake Avenue Columbus, Ohio 43212 USA Tel. (614) 485-0721 Peer-Reviewers: Dr. A. A. Salama, Faculty of Science, Port Said University, Egypt. Said Broumi, Univ. of Hassan II Mohammedia, Casablanca, Morocco. Pabitra Kumar Maji, Math Department, K. N. University, WB, India. S. A. Albolwi, King Abdulaziz Univ., Jeddah, Saudi Arabia. Mohamed Eisa, Dept. of Computer Science, Port Said Univ., Egypt. EAN: 9781599732572 ISBN: 978-1-59973-257-2 1 INTRODUCTION Prime numbers have always fascinated mankind. For mathematicians, they are a kind of “black sheep” of the family of integers by their constant refusal to let themselves to be disciplined, ordered and understood. However, we have at hand a powerful tool, insufficiently investigated yet, which can help us in understanding them: Fermat pseudoprimes. It was a night of Easter, many years ago, when I rediscovered Fermat’s "little" theorem. Excited, I found the first few Fermat absolute pseudoprimes (561, 1105, 1729, 2465, 2821, 6601, 8911…) before I found out that these numbers are already known. Since then, the passion for study these numbers constantly accompanied me. Exceptions to the above mentioned theorem, Fermat pseudoprimes seem to be more malleable than prime numbers, more willing to let themselves to be ordered than them, and their depth study will shed light on many properties of the primes, because it seems natural to look for the rule studying it’s exceptions, as a virologist search for a cure for a virus studying the organisms that have immunity to the virus.
    [Show full text]
  • Algorithms for Computing Fibonacci Numbers Quickly Redacted for Privacy Abstract Approved: Paul Cull
    AN ABSTRACT OF THE THESIS OF James L. Holloway for the degree of Master of Science in Computer Science presented on May 10, 1988. Title: Algorithms for Computing Fibonacci Numbers Quickly Redacted for Privacy Abstract approved:_ Paul Cull. A study of the running time of several known algorithms and several new algorithms to compute the nth element of the Fibonacci sequence is presented. Since the size of the nth Fibonacci number grows exponentially with n, the number of bit operations, instead of the number of integer operations, was used as the unit of time. The number of bit operations used to compute fn is reduced to less than a of the number of bit operations used to multiply two n bit numbers. The algorithms were programmed in Ibuki Common Lisp and timing runs were made on a Sequent Balance 21000. Multiplication was implemented using the standard n2 algorithm. Times for the various algorithms are reported as various constants times n2. An algorithm based on generating factors of Fibonacci numbers had the smallest constant. The Fibonacci sequence, arranged in various ways, is searched for redundant information that could be eliminated to reduce the number of operations. Cycles in the M' bit of fn were discovered but are not yet completely understood. Algorithms for Computing Fibonacci Numbers Quickly By J. L. Holloway A Thesis submitted to Oregon State University in partial fulfillment of the requirements for the degree of Master of Science Completed June 2, 1988 Commencement June 1989. Approved: Redacted for Privacy Professor of Computer Science in charge of major Redacted for Privacy Head of Department of Computer Science Redacted for Privacy Dean of Gradu chool 4 Date thesis presented May 10, 1988 ACKNOWLEDGEMENTS I wish to thank: Dr.
    [Show full text]
  • Number Theory
    Number Theory Naoki Sato <[email protected]> 0 Preface This set of notes on number theory was originally written in 1995 for students at the IMO level. It covers the basic background material that an IMO student should be familiar with. This text is meant to be a reference, and not a replacement but rather a supplement to a number theory textbook; several are given at the back. Proofs are given when appropriate, or when they illustrate some insight or important idea. The problems are culled from various sources, many from actual contests and olympiads, and in general are very difficult. The author welcomes any corrections or suggestions. 1 Divisibility For integers a and b, we say that a divides b, or that a is a divisor (or factor) of b, or that b is a multiple of a, if there exists an integer c such that b = ca, and we denote this by a | b. Otherwise, a does not divide b, and we denote this by a - b. A positive integer p is a prime if the only divisors of p are 1 and p. If pk | a and pk+1 - a where p is a prime, i.e. pk is the highest power of p dividing a, then we denote this by pkka. Useful Facts • If a, b > 0, and a | b, then a ≤ b. • If a | b1, a | b2,..., a | bn, then for any integers c1, c2,..., cn, n X a | bici. i=1 Theorem 1.1. The Division Algorithm. For any positive integer a and integer b, there exist unique integers q and r such that b = qa + r and 0 ≤ r < a, with r = 0 iff a | b.
    [Show full text]
  • And Polignac's Conjecture
    ON POWERS ASSOCIATED WITH SIERPINSKI´ NUMBERS,RIESEL NUMBERS AND POLIGNAC’S CONJECTURE Michael Filaseta Carrie Finch Mathematics Department Mathematics Department University of South Carolina University of South Carolina Columbia, SC 29208 Columbia, SC 29208 Mark Kozek Mathematics Department University of South Carolina Columbia, SC 29208 Abstract We address conjectures of P. Erdos˝ and conjectures of Y.-G. Chen concerning the numbers in the title. We obtain a variety of related results, including a new smallest positive integer that is simultaneously a Sierpinski´ number and a Riesel number and a proof that for every positive integer r, there is an integer k such that the numbers k, k2, k3, . , kr are simultaneously Sierpinski´ numbers. 1 Introduction and Preliminaries A Sierpinski´ number is a positive odd integer k with the property that k · 2n + 1 is composite for all positive integers n. A Riesel number is a positive odd integer k with the property that k · 2n − 1 is composite for all positive integers n. In 1849, A. de Polignac [6] conjectured that every positive odd integer k can be written as a sum of a prime and a power of two. It is well known that Polignac’s conjecture is not true. What has become of interest here are positive odd integers k for which |k − 2n| is composite for all positive integers n. In this paper, we extend previous investigations involving k with one of these properties that are also an rth power for some r > 1. We also address situations where such conditions on k can simultaneously hold. We begin with some background.
    [Show full text]