The Magical Numbers of Dr. Matrix

Total Page:16

File Type:pdf, Size:1020Kb

The Magical Numbers of Dr. Matrix The M3gic -44% Numbc Martin Gardner The . Magic Numbers The . Mag~c Numbers Martin Gardner Prometheus Books Buffalo, New York Published 1985 by Prometheus Books 700 E. Amherst Street, Buffalo, New York 14215 Copyright @ 1985 by Martin Gardner Material previously published in Scientific American, copyright @ 1960,1961,1963,1964,1965,1966,1967, 1968,1969,1971,1972,1973,1974,1975,1976, 1977, 1978, 1980 Scientific American. All rights reserved No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photo- copying, recording, or any system now known or to be invented, without permission in writing from the publisher, except by a reviewer who wishes to quote brief passages for inclusion in a magazine, newspaper, or broadcast. Portions of this book appeared as The Numerology of Dr. Matrix and The Incredible Dr. Matrix Printed in the United States of America Library of Congress Catalog Card No. 84-43183 ISBN 0-87975-281-5 cloth ISBN 0-87975-282-3 paper For Tom, my number two son Contents Introduction 1. New York 2. Los Angeles 3. Sing Sing 4. Lincoln and Kennedy 5. Chicago 6. Miami Beach 7. Philadelphia 8. Pi 9. Wordsmith College 10. Squaresville 11. Left \'ersus Right 12. Fifth Avenue 13. The Moon 14. Honolulu 15. Houston 16. Clairvoyance Test 17. Pyramid Lake 18. The King James Bible 19. Calcutta 20. Stanford 21. Chautauqua 22. Istanbul Answers and Commentary Introduction Myfriendship with the late Dr. Irving Joshua Matrix and his daughter Iva spanned a period of some twenty years. I first wrote about him in my column on "Mathematical Games" in Scientific American, January 1960. With enormous sadness, and echoes of Watson's famous tribute to his friend Sherlock Holmes, my column for September 1980 recorded all I could learn about his untimely death. This is the third collection of my columns about Dr. Ma- trix. In 1967 Simon and Schuster brought together the first seven columns in a small book called The Numerology of Dr. Matrix. Reverse the digits of 67 and you get the date of The Incredible Dr. Matrix, a Scribner's book that contained the previous one. After another lapse of nine years, Prome- theus has now allowed me to assemble all my Dr. Matrix columns in one volume, from my first meeting with him in Manhattan to his violent end in 1980 on the banks of the Danube. Over the years, mathematicians and others who have fol- lowed my accounts of Dr. Matrix's remarkable predictions, analyses, and play with words and numbers have asked me to provide the doctor's curriculum vitae. I will do the best I can. The information that follows is based almost entirely on what has been disclosed to me over the years by Iva. The reader should understand that, except for a few isolated facts, this information has not been otherwise verified. 4 THE MAGIC NUMBERS OF DR. MATRIX Dr. Matrix was born on February 21, 1908, in Kagoshima, on the Japanese island of Kyushu. His father, the Reverend William Miller Bush, was a Seventh-Day Adventist missionary from a small town in Arkansas called Figure Five. In 1908 he was in charge of the Adventist mission in Kagoshima. Young Irving Joshua Bush, who later took the name of Matrix, was the eldest of seven children, all but the youngest three born in Kagoshima. He grew up a devout believer in the biblical prophecies of his parents’ faith, and, owing to a natural bent in mathematics, was particularly intrigued by the numerical aspects of those prophecies. At the age of seven he surprised his father by pointing out that there are 1 God, 2 testaments, 3 persons in the Trinity, 4 Gospels, 5 books of Moses, 6 days of creation, and 7 gifts of the Holy Spirit. “What about 8?” his father had asked. “It is the holiest number of all,” the boy replied. ‘The other numbers with holes are 0, 6, and 9, and sometimes 4, but 8 has two holes, therefore it is the holiest.” At the age of eight young Bush devoted most of his spare time to investigating the numbers that occur in various bibli- cal passages. For example, 1 Chronicles, chapter 20, verse 6, says that the giant of Gath had six toes on each foot and six fingers on each hand. It is no coincidence, the boy insisted, that 20, the number of the chapter, gives the normal allot- ment of toes and fingers to a man, and 6, the number of the verse, describes the abnormality of each hand and foot of the man of Gath. Moreover, said the boy, if we assign numbers to each letter in Gath, letting a equal 1, b equal 2, c equal 3, and so on, the numbers add to 36, the square of 6. At the age of nine the budding numerologist applied a sim- ilar technique to his last name, Bush, obtaining the numbers 2, 21, 19, and 8. They coincided exactly with his birth date, the twenty-first day of the second month of the year 1908—an astonishing correlation, which he took to be a favorable omen about God’s plans for him as a laborer in the Adventist cause. In 1920, when Bush was thirteen, those plans were suddenly shattered. He found hidden in a dark comer of his father's study a copy of D. M. Canright's explosive book Life of Mrs. E. G. White, Seventh-Day Adventist Prophet: Her False Claims Re- futed (Cincinnati: Standard publishing, 1919). Shaken and dis- enchanted by the disclosures of this book, and finding himself in hopeless conflict with the fundamentalist views of his par- ents, he ran away from home, eventually making his way to Tokyo. He spoke, of course, fluent Japanese as well as English. In addition to his early interest in numbers, young Bush had also made a hobby of magic and juggling. An elderly Japanese friend of his father, who had once been in show business, had taught him some elementary juggling and sleight of hand. In Tokyo he supported himself for several years by juggling and doing magic tricks on street corners. A famous Japanese magician named Tenkai saw him work and hired him as an assistant. Later, in his twenties, Bush traveled throughout Japan performing a mind-reading act under the stage name of Dr. Matrix. In 1938 he married his assistant, Miss Eisei Toshiyori, whose father was a Japanese foot juggler and trick bicycle rider. Their only child, a daughter, was born the following year. Mrs. Matrix was killed in April 1942, during the bombing of Tokyo. After the war with Japan came to its abrupt end, Dr. Matrix took up residence in Paris, where, on the Left Bank, he quickly achieved a considerable reputation as an astrologer and numerological consultant. It is said, although I cannot vouch for it, that Charles de Gaulle once sought his advice on whether he should make AndrC Malraux his information minister, and re- ceived a convincing affirmative answer based on a careful analysis of the birth dates and full names of the two men. It was while he was in Paris that Dr. Matrix became a personal friend of the world- renowned French mathematician Nicolas Bourbaki. Although Dr. Matrix had no formal schooling beyond the sixth grade at the mission school in Kagoshima, he had managed to teach himself a surprising amount of number theory. From the great 6 THE MAGIC NUMBERS OF DR. MATRIX Bourbaki he acquired even deeper insights into this funda- mental branch of mathematics. I would have liked to include in this book a photograph of Dr. Matrix and Iva, but alas, they would never allow me to take a picture of either of them. As for Iva, I have not heard from her since her father was killed. Perhaps she will read these words and get in touch with me. Hendersonville, N.C. 1. New York Numerology, the study of the mystical significance of numbers, has a long, complicated history that includes the ancient Hebrew cabalists, the Greek Pythagoreans, Philo of Alexandria, the Gnostics, many distinguished theo- logians, and those Hollywood numerologists who pros- pered in the 1920s and 1930s by devising names (with proper "vibrations") for would-be movie stars. I must confess that I have always found this history rather boring. Thus when a friend of mine suggested in late December 1959 that I get in touch with a New York numerologist who called himself Dr. Matrix, I could hardly have been less interested. "But you'll find him very amusing," my &iend insisted. "He claims to be a reincarnation of Pythagoras, and he re- ally does seem to know something about mathematics. For example, he pointed out to me that 1960 had to be an un- usual year because 1,960 can be expressed as the sum of two squares-142 and 422-and both 14 and 42 are mul- tiples of the mystic number 7." I made a quick check with pencil and paper. "By Plato, he's right!" I exclaimed. "He might be worth talking to at that." I telephoned for an appointment, and several days later 8 THE MAGIC NUMBERS OF DR.MATRIX a pretty secretary with dark, almond-shaped eyes ushered me into the doctor's inner sanctum. Ten huge numerals from 1 through 10, gleaming like gold, were hanging on the far wall behind a long desk. They were arranged in the triangular pattern made commonplace today by the ar- rangement of bowling pins, but which the ancient Py- thagorean~viewed with awe as the "holy tetractys." A large dodecahedron on the desk had calendars for each month of the new year on each of its twelve sides.
Recommended publications
  • Configuring UNIX-Specific Settings: Creating Symbolic Links : Snap
    Configuring UNIX-specific settings: Creating symbolic links Snap Creator Framework NetApp September 23, 2021 This PDF was generated from https://docs.netapp.com/us-en/snap-creator- framework/installation/task_creating_symbolic_links_for_domino_plug_in_on_linux_and_solaris_hosts.ht ml on September 23, 2021. Always check docs.netapp.com for the latest. Table of Contents Configuring UNIX-specific settings: Creating symbolic links . 1 Creating symbolic links for the Domino plug-in on Linux and Solaris hosts. 1 Creating symbolic links for the Domino plug-in on AIX hosts. 2 Configuring UNIX-specific settings: Creating symbolic links If you are going to install the Snap Creator Agent on a UNIX operating system (AIX, Linux, and Solaris), for the IBM Domino plug-in to work properly, three symbolic links (symlinks) must be created to link to Domino’s shared object files. Installation procedures vary slightly depending on the operating system. Refer to the appropriate procedure for your operating system. Domino does not support the HP-UX operating system. Creating symbolic links for the Domino plug-in on Linux and Solaris hosts You need to perform this procedure if you want to create symbolic links for the Domino plug-in on Linux and Solaris hosts. You should not copy and paste commands directly from this document; errors (such as incorrectly transferred characters caused by line breaks and hard returns) might result. Copy and paste the commands into a text editor, verify the commands, and then enter them in the CLI console. The paths provided in the following steps refer to the 32-bit systems; 64-bit systems must create simlinks to /usr/lib64 instead of /usr/lib.
    [Show full text]
  • Mac Keyboard Shortcuts Cut, Copy, Paste, and Other Common Shortcuts
    Mac keyboard shortcuts By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device. To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Option ⌥ Caps Lock ⇪ Shift ⇧ Control ⌃ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to Redo, reversing the undo command.
    [Show full text]
  • Powershell Integration with Vmware View 5.0
    PowerShell Integration with VMware® View™ 5.0 TECHNICAL WHITE PAPER PowerShell Integration with VMware View 5.0 Table of Contents Introduction . 3 VMware View. 3 Windows PowerShell . 3 Architecture . 4 Cmdlet dll. 4 Communication with Broker . 4 VMware View PowerCLI Integration . 5 VMware View PowerCLI Prerequisites . 5 Using VMware View PowerCLI . 5 VMware View PowerCLI cmdlets . 6 vSphere PowerCLI Integration . 7 Examples of VMware View PowerCLI and VMware vSphere PowerCLI Integration . 7 Passing VMs from Get-VM to VMware View PowerCLI cmdlets . 7 Registering a vCenter Server . .. 7 Using Other VMware vSphere Objects . 7 Advanced Usage . 7 Integrating VMware View PowerCLI into Your Own Scripts . 8 Scheduling PowerShell Scripts . 8 Workflow with VMware View PowerCLI and VMware vSphere PowerCLI . 9 Sample Scripts . 10 Add or Remove Datastores in Automatic Pools . 10 Add or Remove Virtual Machines . 11 Inventory Path Manipulation . 15 Poll Pool Usage . 16 Basic Troubleshooting . 18 About the Authors . 18 TECHNICAL WHITE PAPER / 2 PowerShell Integration with VMware View 5.0 Introduction VMware View VMware® View™ is a best-in-class enterprise desktop virtualization platform. VMware View separates the personal desktop environment from the physical system by moving desktops to a datacenter, where users can access them using a client-server computing model. VMware View delivers a rich set of features required for any enterprise deployment by providing a robust platform for hosting virtual desktops from VMware vSphere™. Windows PowerShell Windows PowerShell is Microsoft’s command line shell and scripting language. PowerShell is built on the Microsoft .NET Framework and helps in system administration. By providing full access to COM (Component Object Model) and WMI (Windows Management Instrumentation), PowerShell enables administrators to perform administrative tasks on both local and remote Windows systems.
    [Show full text]
  • The Authenticity of Ambiguity: Dada and Existentialism
    THE AUTHENTICITY OF AMBIGUITY: DADA AND EXISTENTIALISM by ELIZABETH FRANCES BENJAMIN A thesis submitted to The University of Birmingham For the degree of DOCTOR OF PHILOSOPHY Department of Modern Languages College of Arts and Law University of Birmingham August 2014 University of Birmingham Research Archive e-theses repository This unpublished thesis/dissertation is copyright of the author and/or third parties. The intellectual property rights of the author or third parties in respect of this work are as defined by The Copyright Designs and Patents Act 1988 or as modified by any successor legislation. Any use made of information contained in this thesis/dissertation must be in accordance with that legislation and must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the permission of the copyright holder. ii - ABSTRACT - Dada is often dismissed as an anti-art movement that engaged with a limited and merely destructive theoretical impetus. French Existentialism is often condemned for its perceived quietist implications. However, closer analysis reveals a preoccupation with philosophy in the former and with art in the latter. Neither was nonsensical or meaningless, but both reveal a rich individualist ethics aimed at the amelioration of the individual and society. It is through their combined analysis that we can view and productively utilise their alignment. Offering new critical aesthetic and philosophical approaches to Dada as a quintessential part of the European Avant-Garde, this thesis performs a reassessment of the movement as a form of (proto-)Existentialist philosophy. The thesis represents the first major comparative study of Dada and Existentialism, contributing a new perspective on Dada as a movement, a historical legacy, and a philosophical field of study.
    [Show full text]
  • Input for Carnival of Math: Number 115, October 2014
    Input for Carnival of Math: Number 115, October 2014 I visited Singapore in 1996 and the people were very kind to me. So I though this might be a little payback for their kindness. Good Luck. David Brooks The “Mathematical Association of America” (http://maanumberaday.blogspot.com/2009/11/115.html ) notes that: 115 = 5 x 23. 115 = 23 x (2 + 3). 115 has a unique representation as a sum of three squares: 3 2 + 5 2 + 9 2 = 115. 115 is the smallest three-digit integer, abc , such that ( abc )/( a*b*c) is prime : 115/5 = 23. STS-115 was a space shuttle mission to the International Space Station flown by the space shuttle Atlantis on Sept. 9, 2006. The “Online Encyclopedia of Integer Sequences” (http://www.oeis.org) notes that 115 is a tridecagonal (or 13-gonal) number. Also, 115 is the number of rooted trees with 8 vertices (or nodes). If you do a search for 115 on the OEIS website you will find out that there are 7,041 integer sequences that contain the number 115. The website “Positive Integers” (http://www.positiveintegers.org/115) notes that 115 is a palindromic and repdigit number when written in base 22 (5522). The website “Number Gossip” (http://www.numbergossip.com) notes that: 115 is the smallest three-digit integer, abc, such that (abc)/(a*b*c) is prime. It also notes that 115 is a composite, deficient, lucky, odd odious and square-free number. The website “Numbers Aplenty” (http://www.numbersaplenty.com/115) notes that: It has 4 divisors, whose sum is σ = 144.
    [Show full text]
  • A Clasification of Known Root Prime-Generating
    Special properties of the first absolute Fermat pseudoprime, the number 561 Marius Coman Bucuresti, Romania email: [email protected] Abstract. Though is the first Carmichael number, the number 561 doesn’t have the same fame as the third absolute Fermat pseudoprime, the Hardy-Ramanujan number, 1729. I try here to repair this injustice showing few special properties of the number 561. I will just list (not in the order that I value them, because there is not such an order, I value them all equally as a result of my more or less inspired work, though they may or not “open a path”) the interesting properties that I found regarding the number 561, in relation with other Carmichael numbers, other Fermat pseudoprimes to base 2, with primes or other integers. 1. The number 2*(3 + 1)*(11 + 1)*(17 + 1) + 1, where 3, 11 and 17 are the prime factors of the number 561, is equal to 1729. On the other side, the number 2*lcm((7 + 1),(13 + 1),(19 + 1)) + 1, where 7, 13 and 19 are the prime factors of the number 1729, is equal to 561. We have so a function on the prime factors of 561 from which we obtain 1729 and a function on the prime factors of 1729 from which we obtain 561. Note: The formula N = 2*(d1 + 1)*...*(dn + 1) + 1, where d1, d2, ...,dn are the prime divisors of a Carmichael number, leads to interesting results (see the sequence A216646 in OEIS); the formula M = 2*lcm((d1 + 1),...,(dn + 1)) + 1 also leads to interesting results (see the sequence A216404 in OEIS).
    [Show full text]
  • On Repdigits As Product of Consecutive Fibonacci Numbers1
    Rend. Istit. Mat. Univ. Trieste Volume 44 (2012), 393–397 On repdigits as product of consecutive Fibonacci numbers1 Diego Marques and Alain Togbe´ Abstract. Let (Fn)n≥0 be the Fibonacci sequence. In 2000, F. Luca proved that F10 = 55 is the largest repdigit (i.e. a number with only one distinct digit in its decimal expansion) in the Fibonacci sequence. In this note, we show that if Fn ··· Fn+(k−1) is a repdigit, with at least two digits, then (k, n) = (1, 10). Keywords: Fibonacci, repdigits, sequences (mod m) MS Classification 2010: 11A63, 11B39, 11B50 1. Introduction Let (Fn)n≥0 be the Fibonacci sequence given by Fn+2 = Fn+1 + Fn, for n ≥ 0, where F0 = 0 and F1 = 1. These numbers are well-known for possessing amaz- ing properties. In 1963, the Fibonacci Association was created to provide an opportunity to share ideas about these intriguing numbers and their applica- tions. We remark that, in 2003, Bugeaud et al. [2] proved that the only perfect powers in the Fibonacci sequence are 0, 1, 8 and 144 (see [6] for the Fibono- mial version). In 2005, Luca and Shorey [5] showed, among other things, that a non-zero product of two or more consecutive Fibonacci numbers is never a perfect power except for the trivial case F1 · F2 = 1. Recall that a positive integer is called a repdigit if it has only one distinct digit in its decimal expansion. In particular, such a number has the form a(10m − 1)/9, for some m ≥ 1 and 1 ≤ a ≤ 9.
    [Show full text]
  • Sequences of Primes Obtained by the Method of Concatenation
    SEQUENCES OF PRIMES OBTAINED BY THE METHOD OF CONCATENATION (COLLECTED PAPERS) Copyright 2016 by Marius Coman Education Publishing 1313 Chesapeake Avenue Columbus, Ohio 43212 USA Tel. (614) 485-0721 Peer-Reviewers: Dr. A. A. Salama, Faculty of Science, Port Said University, Egypt. Said Broumi, Univ. of Hassan II Mohammedia, Casablanca, Morocco. Pabitra Kumar Maji, Math Department, K. N. University, WB, India. S. A. Albolwi, King Abdulaziz Univ., Jeddah, Saudi Arabia. Mohamed Eisa, Dept. of Computer Science, Port Said Univ., Egypt. EAN: 9781599734668 ISBN: 978-1-59973-466-8 1 INTRODUCTION The definition of “concatenation” in mathematics is, according to Wikipedia, “the joining of two numbers by their numerals. That is, the concatenation of 69 and 420 is 69420”. Though the method of concatenation is widely considered as a part of so called “recreational mathematics”, in fact this method can often lead to very “serious” results, and even more than that, to really amazing results. This is the purpose of this book: to show that this method, unfairly neglected, can be a powerful tool in number theory. In particular, as revealed by the title, I used the method of concatenation in this book to obtain possible infinite sequences of primes. Part One of this book, “Primes in Smarandache concatenated sequences and Smarandache-Coman sequences”, contains 12 papers on various sequences of primes that are distinguished among the terms of the well known Smarandache concatenated sequences (as, for instance, the prime terms in Smarandache concatenated odd
    [Show full text]
  • Text File Encryption Empowered with Context Sensitive Grammar Approach
    IJCSNS International Journal of Computer Science and Network Security, VOL.20 No.7, July 2020 1 Text File Encryption Empowered with Context Sensitive Grammar Approach Irfan Abbas1,2, Shahan Yamin Siddiqui1,3, Munib Ahmad1, Hamza Iqbal1, Waqar Ahmad1, Muhammad Usama Mubashir1, Abdul Hannan Khan1, Bilal Shoaib1, Muhammad Adnan Khan3 1School of Computer Science, Minhaj University Lahore, Lahore, Pakistan. 2Department of Computer Science & IT, University of Central Punjab, Gujrat, Pakistan. 3Department of Computer Science, National College of Business Administration and Economics, Lahore, Pakistan. 3Department of Computer Science& IT, Lahore Garrison University, DHA Phase-VI, Lahore, Punjab, Pakistan. Abstract security policy you need to have in place, you will first Data security is very important for every organization and need to meet key members of your team and discuss individual. There is a lot of ways to protect data from hackers. exactly what type of data you collect and store, as well as Day by day, new techniques, algorithms, methods, and ideas the security that you currently have in place to protect this introduced. There is no way to protect data in the field of theory information. Don't get lazy by using hack-friendly of computations. The absorbing properties of Context-Free Grammar (CFG) and Context-Sensitive Grammar (CSG) use to passwords like the user's name, "12345," "password," identify the grammar of a given set of string, so it is easy to "ABCDE" or some similar combination. Weak passwords generate all strings using this grammar. such as these are the dream of a hacker and therefore there Our method is to develop a Context-Sensitive Grammar-based is nothing you can do to guard against a breach.
    [Show full text]
  • Palindromes: the Ascending Tradition
    91 PALINDROMES: THE ASCENDING TRADITION and the Lyon was of 56, 37 and DMUTRIA. BORGMANN 5 by J. Richer Dayton, Washington for $ 2500 in In 1588, The first of the seven arts is grammar ... The word Ling the fourth come s from the Greek gramma (letter). - -Ernst Robert Curtius, Europaische Literatur und Lateinisches Mittelalter ( Bern: A. Fran­ ly J. Richer in cke, 1948), p. 50 oks of B togeth­ Word play does en a small scale what poetry does with fourth and fifth the form of language as a whole. Word play shows the )ks of T were poet 1 s sensitivity to the mo st distant relationships. $ 900, and the -- Ren~ Wellek, A History of Modern Criticism: later editions 1750- 1950, Vol. II, The Romantic Are (New ~s of T (as in Haven: Yale University Press, 1955, p. 41 s in the 1588 the 1585 edi­ The accessibility of the palindrome in ancient times to the lands east of B-T where, and south-east of the Mediter ranean implies evidence that its intrigues n he says, \I It as a language form antedate the Romance language family and were op­ Jns have drawn e rant in a murkie r, and far more remote, period. !v1a.gic squares have ~s Touches. II been recovered from this history that are' edged with palindromes and I of the origin ­ from which the Hebrew name El&im can be obtained. beginning with a T, and that in central aleph (Wallis-Budge, 1930). Certain verses of the Pentateuch, crept in. known also as the Torah or the Hebraic laws, are written in the form of the recurrent verse and are contained in the Biblical Exodus.
    [Show full text]
  • Rich's Notes: the Ten Doctors: a Graphic Novel by Rich Morris 102
    The Ten Doctors: A Graphic Novel by Rich Morris Chapter 5 102 Rich's Notes: Since the Daleks are struggling to destroy eachother as well as their attackers, the advantage goes to the Federation forces. Things are going well and the 5th Doctor checks in with the 3rd to see how the battle is playing out. The 3rd Doctor confirms that all is well so far, but then gets a new set of signals. A massive fleet of Sontaran ships unexpectedly comes out of nowhere, an the Sontaran reveal a plot to eliminate the Daleks, the Federation fleet AND the Time Lords! The Ten Doctors: A Graphic Novel by Rich Morris Chapter 5 103 Rich's Notes: The 3rd Doctor is restrained by the Sontarans before he can warn the fleet. The 5th Doctor tries as well, but the Master has jammed his signal. The Master explains how he plans to use his new, augmented Sontarans to take over the universe. The Ten Doctors: A Graphic Novel by Rich Morris Chapter 5 104 Rich's Notes: Mistaking the Sontarans as surprise allies hoping to gain the lion’s share of the glory, the Draconian Ambassador and the Ice Warrior general move to greet them as befits their honour and station. But they get a nasty surprise when the Sontarans attack them. The Ten Doctors: A Graphic Novel by Rich Morris Chapter 5 105 Rich's Notes: The Master, his plot revealed, now uses the sabotaged computer to take over control of the 5th Doctor’s ship. He uses it to torment his old enemy, but causing him to destroy the Federation allies.
    [Show full text]
  • Conjecture of Twin Primes (Still Unsolved Problem in Number Theory) an Expository Essay
    Surveys in Mathematics and its Applications ISSN 1842-6298 (electronic), 1843-7265 (print) Volume 12 (2017), 229 { 252 CONJECTURE OF TWIN PRIMES (STILL UNSOLVED PROBLEM IN NUMBER THEORY) AN EXPOSITORY ESSAY Hayat Rezgui Abstract. The purpose of this paper is to gather as much results of advances, recent and previous works as possible concerning the oldest outstanding still unsolved problem in Number Theory (and the most elusive open problem in prime numbers) called "Twin primes conjecture" (8th problem of David Hilbert, stated in 1900) which has eluded many gifted mathematicians. This conjecture has been circulating for decades, even with the progress of contemporary technology that puts the whole world within our reach. So, simple to state, yet so hard to prove. Basic Concepts, many and varied topics regarding the Twin prime conjecture will be cover. Petronas towers (Twin towers) Kuala Lumpur, Malaysia 2010 Mathematics Subject Classification: 11A41; 97Fxx; 11Yxx. Keywords: Twin primes; Brun's constant; Zhang's discovery; Polymath project. ****************************************************************************** http://www.utgjiu.ro/math/sma 230 H. Rezgui Contents 1 Introduction 230 2 History and some interesting deep results 231 2.1 Yitang Zhang's discovery (April 17, 2013)............... 236 2.2 "Polymath project"........................... 236 2.2.1 Computational successes (June 4, July 27, 2013)....... 237 2.2.2 Spectacular progress (November 19, 2013)........... 237 3 Some of largest (titanic & gigantic) known twin primes 238 4 Properties 240 5 First twin primes less than 3002 241 6 Rarefaction of twin prime numbers 244 7 Conclusion 246 1 Introduction The prime numbers's study is the foundation and basic part of the oldest branches of mathematics so called "Arithmetic" which supposes the establishment of theorems.
    [Show full text]