Appendix a Packages for Number Theory
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
User's Guide to Pari-GP
User's Guide to PARI / GP C. Batut, K. Belabas, D. Bernardi, H. Cohen, M. Olivier Laboratoire A2X, U.M.R. 9936 du C.N.R.S. Universit´eBordeaux I, 351 Cours de la Lib´eration 33405 TALENCE Cedex, FRANCE e-mail: [email protected] Home Page: http://www.parigp-home.de/ Primary ftp site: ftp://megrez.math.u-bordeaux.fr/pub/pari/ last updated 5 November 2000 for version 2.1.0 Copyright c 2000 The PARI Group Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions, or translations, of this manual under the conditions for verbatim copying, provided also that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. PARI/GP is Copyright c 2000 The PARI Group PARI/GP is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. It is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY WHATSOEVER. Table of Contents Chapter 1: Overview of the PARI system . 5 1.1 Introduction . 5 1.2 The PARI types . 6 1.3 Operations and functions . 9 Chapter 2: Specific Use of the GP Calculator . 13 2.1 Defaults and output formats . 14 2.2 Simple metacommands . 20 2.3 Input formats for the PARI types . 23 2.4 GP operators . -
Evaluating a BASIC Approach to Sensor Network Node Programming
Evaluating A BASIC Approach to Sensor Network Node Programming J. Scott Miller Peter A. Dinda Robert P. Dick [email protected] [email protected] [email protected] Northwestern University Northwestern University University of Michigan Abstract 1 Introduction Sensor networks have the potential to empower domain Wireless sensor networks (WSNs) can be viewed as experts from a wide range of fields. However, presently they general purpose distributed computing platforms defined by are notoriously difficult for these domain experts to program, their spatial presence and an emphasis on environment mon- even though their applications are often conceptually simple. itoring. The most prominent applications of sensor networks We address this problem by applying the BASIC program- have thus far included monitoring applications with a variety ming language to sensor networks and evaluating its effec- of requirements, although WSNs need not be limited to these tiveness. BASIC has proven highly successful in the past in tasks. While WSNs are currently of great research interest, it allowing novices to write useful programs on home comput- is ultimately communities and users outside of these areas— ers. Our contributions include a user study evaluating how application domain experts—that have the most to gain from well novice (no programming experience) and intermediate the functionality that WSNs can provide. We focus on ap- (some programming experience) users can accomplish sim- plication domain experts who are programming novices and ple sensor network tasks in BASIC and in TinyScript (a prin- not WSN experts. Our goal is to make the development of cipally event-driven high-level language for node-oriented WSN applications by such individuals and groups tractable programming) and an evaluation of power consumption is- and, ideally, straightforward. -
A Tour of Fermat's World
ATOUR OF FERMAT’S WORLD Ching-Li Chai Samples of numbers More samples in arithemetic ATOUR OF FERMAT’S WORLD Congruent numbers Fermat’s infinite descent Counting solutions Ching-Li Chai Zeta functions and their special values Department of Mathematics Modular forms and University of Pennsylvania L-functions Elliptic curves, complex multiplication and Philadelphia, March, 2016 L-functions Weil conjecture and equidistribution ATOUR OF Outline FERMAT’S WORLD Ching-Li Chai 1 Samples of numbers Samples of numbers More samples in 2 More samples in arithemetic arithemetic Congruent numbers Fermat’s infinite 3 Congruent numbers descent Counting solutions 4 Fermat’s infinite descent Zeta functions and their special values 5 Counting solutions Modular forms and L-functions Elliptic curves, 6 Zeta functions and their special values complex multiplication and 7 Modular forms and L-functions L-functions Weil conjecture and equidistribution 8 Elliptic curves, complex multiplication and L-functions 9 Weil conjecture and equidistribution ATOUR OF Some familiar whole numbers FERMAT’S WORLD Ching-Li Chai Samples of numbers More samples in §1. Examples of numbers arithemetic Congruent numbers Fermat’s infinite 2, the only even prime number. descent 30, the largest positive integer m such that every positive Counting solutions Zeta functions and integer between 2 and m and relatively prime to m is a their special values prime number. Modular forms and L-functions 3 3 3 3 1729 = 12 + 1 = 10 + 9 , Elliptic curves, complex the taxi cab number. As Ramanujan remarked to Hardy, multiplication and it is the smallest positive integer which can be expressed L-functions Weil conjecture and as a sum of two positive integers in two different ways. -
Computer Supplement #19 ***********************
THE CRYPTOGRAM Summer 1994 *********************** COMPUTER SUPPLEMENT #19 *********************** In this issue: PATTERN SEARCHING BY COMPUTER | D MELIORA describes a method and gives a Pascal program to perform pattern word searching. SWAGMAN | BOATTAIL has some help for solving basic transposition ciphers like SWAG- MAN, and includes his Cipher library. INTERNET MAILING LIST | Three of the Krewe have started an electronic mailing list to help in solving cryptograms. REVIEWS | DAEDALUS has recommendations for three books and a software package. GW-BASIC CRACKING | A program to decrypt protected GW-BASIC programs. HIGH PRECISION BASIC | Details about a dialect of BASIC that handles large numbers with ease. Plus: News and notes for computerists interested in cryptography, and cryptographers in- terested in computers. Published in association with the American Cryptogram Association INTRODUCTORY MATERIAL The ACA and Your Computer (1p). Background on the ACA for computerists. (As printed in ACA and You, 1988 edition; [Also on Issue Disk #11] Using Your Home Computer (1p). Ciphering at the ACA level with a computer. (As printed in ACA and You, 1988 edition). Frequently Asked Questions (approx. 20p) with answers, from the Usenet newsgroup sci.crypt. REFERENCE MATERIAL BASICBUGS - Bugs and errors in GW-BASIC (1p). [Also on Issue Disk #11]. BBSFILES - List of filenames and descriptions of cryptographic files available on the ACA BBS (files also available on disk via mail). BIBLIOG | A bibliography of computer magazine articles and books dealing with cryptography. (Updated August 89). [available on Issue Disk #11]. CRYPTOSUB - Complete listing of Cryptographic Substitution Program as published by PHOENIX in sections in The Cryptogram 1983{1985. -
A Primer of Analytic Number Theory: from Pythagoras to Riemann Jeffrey Stopple Index More Information
Cambridge University Press 0521813093 - A Primer of Analytic Number Theory: From Pythagoras to Riemann Jeffrey Stopple Index More information Index #, number of elements in a set, 101 and (2n), 154–157 A =, Abel summation, 202, 204, 213 and Euler-Maclaurin summation, 220 definition, 201 definition, 149 Abel’s Theorem Bernoulli, Jacob, 146, 150, 152 I, 140, 145, 201, 267, 270, 272 Bessarion, Cardinal, 282 II, 143, 145, 198, 267, 270, 272, 318 binary quadratic forms, 270 absolute convergence definition, 296 applications, 133, 134, 139, 157, 167, 194, equivalence relation ∼, 296 198, 208, 215, 227, 236, 237, 266 reduced, 302 definition, 133 Birch Swinnerton-Dyer conjecture, xi, xii, abundant numbers, 27, 29, 31, 43, 54, 60, 61, 291–294, 326 82, 177, 334, 341, 353 Black Death, 43, 127 definition, 27 Blake, William, 216 Achilles, 125 Boccaccio’s Decameron, 281 aliquot parts, 27 Boethius, 28, 29, 43, 278 aliquot sequences, 335 Bombelli, Raphael, 282 amicable pairs, 32–35, 39, 43, 335 de Bouvelles, Charles, 61 definition, 334 Bradwardine, Thomas, 43, 127 ibn Qurra’s algorithm, 33 in Book of Genesis, 33 C2, twin prime constant, 182 amplitude, 237, 253 Cambyses, Persian emperor, 5 Analytic Class Number Formula, 273, 293, Cardano, Girolamo, 25, 282 311–315 Catalan-Dickson conjecture, 336 analytic continuation, 196 Cataldi, Pietro, 30, 333 Anderson, Laurie, ix cattle problem, 261–263 Apollonius, 261, 278 Chebyshev, Pafnuty, 105, 108 Archimedes, 20, 32, 92, 125, 180, 260, 285 Chinese Remainder Theorem, 259, 266, 307, area, basic properties, 89–91, 95, 137, 138, 308, 317 198, 205, 346 Cicero, 21 Aristotle’s Metaphysics,5,127 class number, see also h arithmetical function, 39 Clay Mathematics Institute, xi ∼, asymptotic, 64 comparison test Athena, 28 infinite series, 133 St. -
A Theorem of Fermat on Congruent Number Curves Lorenz Halbeisen, Norbert Hungerbühler
A Theorem of Fermat on Congruent Number Curves Lorenz Halbeisen, Norbert Hungerbühler To cite this version: Lorenz Halbeisen, Norbert Hungerbühler. A Theorem of Fermat on Congruent Number Curves. Hardy-Ramanujan Journal, Hardy-Ramanujan Society, 2019, Hardy-Ramanujan Journal, 41, pp.15 – 21. hal-01983260 HAL Id: hal-01983260 https://hal.archives-ouvertes.fr/hal-01983260 Submitted on 16 Jan 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Hardy-Ramanujan Journal 41 (2018), 15-21 submitted 28/03/2018, accepted 06/07/2018, revised 06/07/2018 A Theorem of Fermat on Congruent Number Curves Lorenz Halbeisen and Norbert Hungerb¨uhler To the memory of S. Srinivasan Abstract. A positive integer A is called a congruent number if A is the area of a right-angled triangle with three rational sides. Equivalently, A is a congruent number if and only if the congruent number curve y2 = x3 − A2x has a rational point (x; y) 2 Q2 with y =6 0. Using a theorem of Fermat, we give an elementary proof for the fact that congruent number curves do not contain rational points of finite order. -
On the Computation of the HNF of a Module Over the Ring of Integers of A
On the computation of the HNF of a module over the ring of integers of a number field Jean-Fran¸cois Biasse Department of Mathematics and Statistics University of South Florida Claus Fieker Fachbereich Mathematik Universit¨at Kaiserslautern Postfach 3049 67653 Kaiserslautern - Germany Tommy Hofmann Fachbereich Mathematik Universit¨at Kaiserslautern Postfach 3049 67653 Kaiserslautern - Germany Abstract We present a variation of the modular algorithm for computing the Hermite normal form of an K -module presented by Cohen [7], where K is the ring of integers of a numberO field K. An approach presented in [7] basedO on reductions modulo ideals was conjectured to run in polynomial time by Cohen, but so far, no such proof was available in the literature. In this paper, we present a modification of the approach of [7] to prevent the coefficient swell and we rigorously assess its complexity with respect to the size of the input and the invariants of the field K. Keywords: Number field, Dedekind domain, Hermite normal form, relative extension of number fields arXiv:1612.09428v1 [math.NT] 30 Dec 2016 2000 MSC: 11Y40 1. Introduction Algorithms for modules over the rational integers such as the Hermite nor- mal form algorithm are at the core of all methods for computations with rings Email addresses: [email protected] (Jean-Fran¸cois Biasse), [email protected] (Claus Fieker), [email protected] (Tommy Hofmann) Preprint submitted to Elsevier April 22, 2018 and ideals in finite extensions of the rational numbers. Following the growing interest in relative extensions, that is, finite extensions of number fields, the structure of modules over Dedekind domains became important. -
Congruent Numbers with Many Prime Factors
Congruent numbers with many prime factors Ye Tian1 Morningside Center of Mathematics, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, China † Edited by S. T. Yau, Harvard University, Cambridge, MA, and approved October 30, 2012 (received for review September 28, 2012) Mohammed Ben Alhocain, in an Arab manuscript of the 10th Remark 2: The kernel A½2 and the image 2A of the multiplication century, stated that the principal object of the theory of rational by 2 on A are characterized by Gauss’ genus theory. Note that the × 2 right triangles is to find a square that when increased or diminished multiplication by 2 induces an isomorphism A½4=A½2’A½2 ∩ 2A. by a certain number, m becomes a square [Dickson LE (1971) History By Gauss’ genus theory, Condition 1 is equivalent in that there are of the Theory of Numbers (Chelsea, New York), Vol 2, Chap 16]. In exactly an odd number of spanning subtrees in the graph whose modern language, this object is to find a rational point of infinite ; ⋯; ≠ vertices are p0 pk and whose edges are those pipj, i j,withthe order on the elliptic curve my2 = x3 − x. Heegner constructed such quadratic residue symbol pi = − 1. It is then clear that Theorem 1 rational points in the case that m are primes congruent to 5,7 mod- pj ulo 8 or twice primes congruent to 3 modulo 8 [Monsky P (1990) follows from Theorem 2. Math Z – ’ 204:45 68]. We extend Heegner s result to integers m with The congruent number problem is not only to determine many prime divisors and give a sketch in this report. -
Single Digits
...................................single digits ...................................single digits In Praise of Small Numbers MARC CHAMBERLAND Princeton University Press Princeton & Oxford Copyright c 2015 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved The second epigraph by Paul McCartney on page 111 is taken from The Beatles and is reproduced with permission of Curtis Brown Group Ltd., London on behalf of The Beneficiaries of the Estate of Hunter Davies. Copyright c Hunter Davies 2009. The epigraph on page 170 is taken from Harry Potter and the Half Blood Prince:Copyrightc J.K. Rowling 2005 The epigraphs on page 205 are reprinted wiht the permission of the Free Press, a Division of Simon & Schuster, Inc., from Born on a Blue Day: Inside the Extraordinary Mind of an Austistic Savant by Daniel Tammet. Copyright c 2006 by Daniel Tammet. Originally published in Great Britain in 2006 by Hodder & Stoughton. All rights reserved. Library of Congress Cataloging-in-Publication Data Chamberland, Marc, 1964– Single digits : in praise of small numbers / Marc Chamberland. pages cm Includes bibliographical references and index. ISBN 978-0-691-16114-3 (hardcover : alk. paper) 1. Mathematical analysis. 2. Sequences (Mathematics) 3. Combinatorial analysis. 4. Mathematics–Miscellanea. I. Title. QA300.C4412 2015 510—dc23 2014047680 British Library -
An Application of the Hermite Normal Form in Integer Programming
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector An Application of the Hermite Normal Form in Integer Programming Ming S. Hung Graduate School of Management Kent State University Kent, Ohio 44242 and Walter 0. Rom School of Business Administration Cleveland State University Cleveland, Ohio 44115 Submitted by Richard A. Brualdi ABSTRACT A new algorithm for solving integer programming problems is developed. It is based on cuts which are generated from the Hermite normal form of the basis matrix at a continuous extreme point. INTRODUCTION We present a new cutting plane algorithm for solving an integer program. The cuts are derived from a modified version of the usual column tableau used in integer programming: Rather than doing a complete elimination on the rows corresponding to the nonbasic variables, these rows are transformed into the Her-mite normal form. There are two major advantages with our cutting plane algorithm: First, it uses all integer operations in the computa- tions. Second, the cuts are deep, since they expose vertices of the integer hull. The Her-mite normal form (HNF), along with the basic properties of the cuts, is developed in Section I. Sections II and III apply the HNF to systems of equations and integer programs. A proof of convergence for the algorithm is presented in Section IV. Section V discusses some preliminary computa- tional experience. LINEAR ALGEBRA AND ITS APPLlCATlONS 140:163-179 (1990) 163 0 Else&r Science Publishing Co., Inc., 1990 655 Avenue of the Americas, New York, NY 10010 0024-3795/90/$3.50 164 MING S. -
Canonical Heights and Division Polynomials 11
CANONICAL HEIGHTS AND DIVISION POLYNOMIALS ROBIN DE JONG AND J. STEFFEN MULLER¨ Abstract. We discuss a new method to compute the canonical height of an algebraic point on a hyperelliptic jacobian over a number field. The method does not require any geometrical models, neither p-adic nor complex analytic ones. In the case of genus 2 we also present a version that requires no factori- sation at all. The method is based on a recurrence relation for the `division polynomials' associated to hyperelliptic jacobians, and a diophantine approx- imation result due to Faltings. 1. Introduction In [EW] G. Everest and T. Ward show how to approximate to high precision the canonical height of an algebraic point on an elliptic curve E over a number field K with a limit formula using the (recurrence) sequence of division polynomials φn associated to E, and a diophantine approximation result. The φn have natural analogues for jacobians of hyperelliptic curves. In [Uc2] Y. Uchida shows how to obtain recurrence relations for the φn for hyperelliptic jaco- bians of dimension g ≥ 2. Further there exists a suitable analogue of the diophantine approximation result employed by Everest and Ward, proved by G. Faltings. In this paper we derive a limit formula for the canonical height of an algebraic point on a hyperelliptic jacobian from these inputs. We have implemented the resulting method for computing canonical heights in Magma for g = 2. The method does not require geometrical models, neither p-adic nor complex analytic ones. If the curve is defined over Q and the coordinates of the point are integral, then it also requires no factorisation. -
Fast, Deterministic Computation of the Hermite Normal Form and Determinant of a Polynomial Matrix✩
Journal of Complexity 42 (2017) 44–71 Contents lists available at ScienceDirect Journal of Complexity journal homepage: www.elsevier.com/locate/jco Fast, deterministic computation of the Hermite normal form and determinant of a polynomial matrixI George Labahn a,∗, Vincent Neiger b, Wei Zhou a a David R. Cheriton School of Computer Science, University of Waterloo, Waterloo ON, Canada N2L 3G1 b ENS de Lyon (Laboratoire LIP, CNRS, Inria, UCBL, Université de Lyon), Lyon, France article info a b s t r a c t Article history: Given a nonsingular n × n matrix of univariate polynomials over Received 19 July 2016 a field K, we give fast and deterministic algorithms to compute Accepted 18 March 2017 its determinant and its Hermite normal form. Our algorithms use Available online 12 April 2017 ! Oe.n dse/ operations in K, where s is bounded from above by both the average of the degrees of the rows and that of the columns Keywords: of the matrix and ! is the exponent of matrix multiplication. The Hermite normal form soft- notation indicates that logarithmic factors in the big- Determinant O O Polynomial matrix are omitted while the ceiling function indicates that the cost is Oe.n!/ when s D o.1/. Our algorithms are based on a fast and deterministic triangularization method for computing the diagonal entries of the Hermite form of a nonsingular matrix. ' 2017 Elsevier Inc. All rights reserved. 1. Introduction n×n For a given nonsingular polynomial matrix A in KTxU , one can find a unimodular matrix U 2 n×n KTxU such that AU D H is triangular.