期刊文献+
共找到48篇文章
< 1 2 3 >
每页显示 20 50 100
Diophantine Quotients and Remainders with Applications to Fermat and Pythagorean Equations
1
作者 Prosper Kouadio Kimou François Emmanuel Tanoé 《American Journal of Computational Mathematics》 2023年第1期199-210,共12页
Diophantine equations have always fascinated mathematicians about existence, finitude, and the calculation of possible solutions. Among these equations, one of them will be the object of our research. This is the Pyth... Diophantine equations have always fascinated mathematicians about existence, finitude, and the calculation of possible solutions. Among these equations, one of them will be the object of our research. This is the Pythagoras’- Fermat’s equation defined as follows.                                                                                         (1) when , it is well known that this equation has an infinity of solutions but has none (non-trivial) when . We also know that the last result, named Fermat-Wiles theorem (or FLT) was obtained at great expense and its understanding remains out of reach even for a good fringe of professional mathematicians. The aim of this research is to set up new simple but effective tools in the treatment of Diophantine equations and that of Pythagoras-Fermat. The tools put forward in this research are the properties of the quotients and the Diophantine remainders which we define as follows. Let a non-trivial triplet () solution of Equation (1) such that . and are called the Diophantine quotients and remainders of solution . We compute the remainder and the quotient of b and c by a using the division algorithm. Hence, we have: and et with . We prove the following important results. if and only if and if and only if . Also, we deduce that or for any hypothetical solution . We illustrate these results by effectively computing the Diophantine quotients and remainders in the case of Pythagorean triplets using a Python program. In the end, we apply the previous properties to directly prove a partial result of FLT. . 展开更多
关键词 Diophantine Equation Modular Arithmetic Fermat-Wiles Theorem Pythagorean Triplets Division Theorem Division Algorithm Python Program Diophantine Quotients Diophantine remainders
下载PDF
New Asymptotic Results on Fermat-Wiles Theorem
2
作者 Kimou Kouadio Prosper Kouakou Kouassi Vincent Tanoé François 《Advances in Pure Mathematics》 2024年第6期421-441,共21页
We analyse the Diophantine equation of Fermat xp yp = zp with p > 2 a prime, x, y, z positive nonzero integers. We consider the hypothetical solution (a, b, c) of previous equation. We use Fermat main divisors, Dio... We analyse the Diophantine equation of Fermat xp yp = zp with p > 2 a prime, x, y, z positive nonzero integers. We consider the hypothetical solution (a, b, c) of previous equation. We use Fermat main divisors, Diophantine remainders of (a, b, c), an asymptotic approach based on Balzano Weierstrass Analysis Theorem as tools. We construct convergent infinite sequences and establish asymptotic results including the following surprising one. If z y = 1 then there exists a tight bound N such that, for all prime exponents p > N , we have xp yp zp. 展开更多
关键词 Fermat’s Last Theorem Fermat-Wiles Theorem Kimou’s Divisors Diophantine Quotient Diophantine remainders Balzano Weierstrass Analysis Theorem
下载PDF
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
3
作者 Zhiyong Zheng Fengxia Liu Kun Tian 《Journal of Information Security》 2023年第4期366-395,共30页
We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. Thi... We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. This is a rational solution to an old problem proposed by Rivest, Adleman, and Dertouzos [1] in 1978, and to some new problems that appeared in Peikert [2] as open questions 10 and open questions 11 a few years ago. Our scheme is completely different from the breakthrough work [3] of Gentry in 2009. Gentry’s bootstrapping technique constructs a fully homomorphic encryption (FHE) scheme from a somewhat homomorphic one that is powerful enough to evaluate its own decryption function. To date, it remains the only known way of obtaining unbounded FHE. Our construction of an unbounded FHE scheme is straightforward and can handle unbounded homomorphic computation on any refreshed ciphertexts without bootstrapping transformation technique. 展开更多
关键词 Fully Homomorphic Encryption Ideal Lattices Chinese Remainder Theorem General Compact Knapsacks Problem
下载PDF
A Fast Method to Compute the Inertia of Bezout Matrix and Its Application 被引量:2
4
作者 冯琴荣 《Chinese Quarterly Journal of Mathematics》 CSCD 2001年第1期52-58,共7页
In this paper, we present a fast and fraction free procedure for computing the inertia of Bezout matrix and we can determine the numbers of different real roots and different pairs of conjugate complex roots of a pol... In this paper, we present a fast and fraction free procedure for computing the inertia of Bezout matrix and we can determine the numbers of different real roots and different pairs of conjugate complex roots of a polynomial equation with integer coefficients quickly based on this result. 展开更多
关键词 Bezout matrix polynomial remainder sequence INERTIA polynomial equation squarefree
下载PDF
Lie Symmetries and Conserved Quantities of Holonomic Systems with Remainder Coordinates 被引量:1
5
作者 梅凤翔 《Journal of Beijing Institute of Technology》 EI CAS 1998年第1期26-31,共6页
Aim To study the Lie symmetries and the consered quantities of the holonomic systems with remainder coordinates. Methods Using the invariance of the ordinary differential equations under the infinitesimal transformati... Aim To study the Lie symmetries and the consered quantities of the holonomic systems with remainder coordinates. Methods Using the invariance of the ordinary differential equations under the infinitesimal transformations to establish the determining equations and the restriction equations of the Lie symmetries of the systems. Results and Conclusion the structure equation and the form of conserved quantities were obtained. An example was given to illustrate the application of the result. 展开更多
关键词 analytical mechanics remainder coordinate Lie symmetry conserved quantity
下载PDF
Research on Auto-detection for Remainder Particles of Aerospace Relay Based on Wavelet Analysis 被引量:17
6
作者 GAO Hong-liang ZHANG Hui WANG Shu-juan 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2007年第1期75-80,共6页
Aerospace relay is one kind of electronic components which is used widely in national defense system and aerospace system. The existence of remainder particles induces the reliability declining, which has become a sev... Aerospace relay is one kind of electronic components which is used widely in national defense system and aerospace system. The existence of remainder particles induces the reliability declining, which has become a severe problem in the development of aerospace relay. Traditional particle impact noise detection (PIND) method for remainder detection is ineffective for small particles, due to its low precision and involvement of subjective factors. An auto-detection method for PIND output signals is proposed in this paper, which is based on direct wavelet de-noising (DWD), cross-correlation analysis (CCA) and homo-filtering (HF), the method enhances the affectivity of PIND test about the small particles. In the end, some practical PIND output signals are analysed, and the validity of this new method is proved. 展开更多
关键词 aerospace relay remainder particles PIND wavelet analysis
下载PDF
Quantum Secret Sharing Based on Chinese Remainder Theorem 被引量:3
7
作者 施荣华 粟倩 +1 位作者 郭迎 李门浩 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第4期573-578,共6页
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distrib... A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function, together with high-dimensional superdense-eoding, provide convenience, security, and large capability quantum channel for secret distribution and recovering. Analysis shows the security of the scheme. 展开更多
关键词 quantum secret sharing Chinese Remainder Theorem quantum superdense-coding
下载PDF
Generalized Lutzky Conserved Quantities of Holonomic Systems with Remainder Coordinates Subjected to Unilateral Constraints 被引量:2
8
作者 ZHANG Yi 《Communications in Theoretical Physics》 SCIE CAS CSCD 2006年第4期732-736,共5页
This paper focuses on studying the relation between a velocity-dependent symmetry and a generalized Lutzky conserved quantity for a holonomic system with remainder coordinates subjected to unilateral constraints. The ... This paper focuses on studying the relation between a velocity-dependent symmetry and a generalized Lutzky conserved quantity for a holonomic system with remainder coordinates subjected to unilateral constraints. The differential equations of motion of the system are established, and the definition of Lie symmetry for the system is given. The conditions under which a Lie symmetry can directly lead up to a generalized Lutzky conserved quantity and the form of the new conserved quantity are obtained, and an example is given to illustrate the application of the results. 展开更多
关键词 analytical mechanics remainder coordinate unilateral constraint holonomic system SYMMETRY conserved quantity
下载PDF
Order of Dirichlet Series in the Whole Plane and Remainder Estimation 被引量:2
9
作者 黄慧珺 宁菊红 《Chinese Quarterly Journal of Mathematics》 2015年第4期515-523,共9页
In this paper, firstly, the p order and pz order of Dirichlet series which converges in the whole plane are studied. Secondly, the equivalence relation between remainder logarithm In En-1 (f, α), In Rn(f, α) and... In this paper, firstly, the p order and pz order of Dirichlet series which converges in the whole plane are studied. Secondly, the equivalence relation between remainder logarithm In En-1 (f, α), In Rn(f, α) and coefficients logarithm In |an| is discussed respectively. Finally, the theory of applying remainder to estimate ρorder and ρβ order can be obtained by using the equivalence relation. 展开更多
关键词 Dirichlet series ρ order ρβorder remainder estimation
下载PDF
Applying two channels to vector space secret sharing based multi-signature scheme 被引量:1
10
作者 肖清华 平玲娣 +1 位作者 陈小平 潘雪增 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第1期56-62,共7页
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computat... Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme. 展开更多
关键词 Vector space secret sharing MULTI-SIGNATURE Discrete logarithm Chinese remainder theorem
下载PDF
The Numbers of Thousand Place of Mersenne Primes 被引量:1
11
作者 Sibao Zhang Lihang Zhou 《Applied Mathematics》 2011年第11期1359-1363,共5页
Mersenne primes are a special kind of primes, which are an important content in number theory. The study of Mersenne primes becomes one of hot topics of the nowadays science. Searching for Mersenne primes is very chal... Mersenne primes are a special kind of primes, which are an important content in number theory. The study of Mersenne primes becomes one of hot topics of the nowadays science. Searching for Mersenne primes is very challenging in scientific researches. In this paper, the numbers of thousand place of Mersenne primes are studied, and the conclusion is presented by using the Chinese remainder theorem. 展开更多
关键词 Mersenne PRIMES The Chinese REMAINDER THEOREM The NUMBER of Thousand PLACE
下载PDF
Informix数据库分片策略的大规模应用研究及相关问题的探讨
12
作者 吴锐 《科学技术与工程》 2007年第13期3289-3291,共3页
采用数据库日期分区策略,成功解决了大规模应用中的批量数据清理的问题,对于行宽超过32K,记录数超过200万行的大数据量库表数据的清理操作,处理时间由过去的(4~6)h,缩短到2s钟以内,消除了批量处理过程对生产系统的影响,保证... 采用数据库日期分区策略,成功解决了大规模应用中的批量数据清理的问题,对于行宽超过32K,记录数超过200万行的大数据量库表数据的清理操作,处理时间由过去的(4~6)h,缩短到2s钟以内,消除了批量处理过程对生产系统的影响,保证系统实现24h不间断运行。该方案应用透明,方便应用系统的方案改造升级,具有极高的推广价值。 展开更多
关键词 分片 表达式分片 索引 REMAINDER
下载PDF
A FUNCTION MINIMIZATION CALCULATION OF CYCLONE 10 MAGNETIC FIELDS
13
作者 S.Zaremba 王良明 《Nuclear Science and Techniques》 SCIE CAS CSCD 1991年第3期129-134,共6页
By app(?)ing function minimization calculation method, two function expressions are used to simulate the magnetic field measured for cyclotron Cyclone 10 in azimuth and radius The numerical fitting curves are consiste... By app(?)ing function minimization calculation method, two function expressions are used to simulate the magnetic field measured for cyclotron Cyclone 10 in azimuth and radius The numerical fitting curves are consistent with magnetic field measured. In most pl(?)es, the accuracies are several thousandth, except those errors to be pointed out in paper. 展开更多
关键词 FUNCTION MINIMIZATION CALCULATION MINUIT program Periodic FUNCTION SEEKING REMAINDER FUNCTION Fringing field FUNCTION simulation
下载PDF
Threshold Ring Signature Scheme Based on TPM
14
作者 Gong Bei Jiang Wei +2 位作者 Lin Li Li Yu Zhang Xing 《China Communications》 SCIE CSCD 2012年第1期80-85,共6页
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we prese... The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we presented a Trusted Platform Module (TPM)-based threshold ring signature schen. Employing a reliable secret Share Distribution Center (SDC), the proposed approach can authenticate the TPM-based identity rank of members of the ring but not track a specific member's identity. A subset including t members with the same identity rank is built. With the signing cooperation of t members of the subset, the ring signature based on Chinese remainder theorem is generated. We proved the anonymity and unforgeability of the proposed scheme and compared it with the threshold ring signature based on Lagrange interpolation polynomial. Our scheme is relatively simpler to calculate. 展开更多
关键词 ring signature TPM THRESHOLD Chinese remainder theorem RANK
下载PDF
ASIAN CARP EXPANSION IN THE MISSISSIPPI RIVER:FOCUSING ON THE LEADING EDGE OF THE INVASION FRONT
15
作者 TRIPP Sara PHELPS Quinton 《水生生物学报》 CAS CSCD 北大核心 2018年第6期1075-1080,共6页
Asian carp are expanding their range throughout the Mississippi River; however, abundance is thought to be highest in reaches within close proximity to the Illinois River. In the Mississippi River, Lock and Dam 19(L&a... Asian carp are expanding their range throughout the Mississippi River; however, abundance is thought to be highest in reaches within close proximity to the Illinois River. In the Mississippi River, Lock and Dam 19(L&D 19) at Keokuk, Iowa is the primary barrier to slow the expansion upstream. As Asian carp abundance increases below L&D 19, it is important to investigate potential means of control(i.e., reduction through harvest and barriers) that will prevent complete invasion of the Mississippi River above L&D 19. Silver Carp and Bighead Carp were collected below L&D 19, a subsample were implanted with ultrasonic transmitters to evaluate passage through the lock chamber and the remainder were used to determine population dynamics at the leading edge of invasion. Although the dam portion of the structure poses a complete barrier to upstream expansion, we documented lock chamber passage demonstrating the lock chamber has the capability to provide passage upstream. Based on the results of the population assessment, in order to induce recruitment overfishing at this leading edge of invasion, Asian carp will need to be intensively harvested at 300 mm and larger. The combination of commercial fishing efforts and research investigating ways to prevent passage upstream must be employed. 展开更多
关键词 MISSISSIPPI River REMAINDER
下载PDF
Fast Arithmetics Using Chinese Remaindering
16
作者 George Davida Bruce Litow 《China Communications》 SCIE CSCD 2007年第4期45-47,共3页
In this paper,some issues concerning the Chinese remaindering representation are discussed.A new converting method is described. An efficient refinement of the division algorithm of Chiu,Davida and Litow is given.
关键词 WILL NCI Fast Arithmetics Using Chinese Remaindering 一刀
下载PDF
PUMTD:Privacy-Preserving User-Profile Matching Protocol in Social Networks
17
作者 Jianhong Zhang Haoting Han +2 位作者 Hongwei Su Zhengtao Jiang Changgen Peng 《China Communications》 SCIE CSCD 2022年第6期77-90,共14页
User profile matching can establish social relationships between different users in the social network.If the user profile is matched in plaintext,the user's privacy might face a security challenge.Although there ... User profile matching can establish social relationships between different users in the social network.If the user profile is matched in plaintext,the user's privacy might face a security challenge.Although there exist some schemes realizing privacypreserving user profile matching,the resource-limited users or social service providers in these schemes need to take higher computational complexity to ensure the privacy or matching of the data.To overcome the problems,a novel privacy-preserving user profile matching protocol in social networks is proposed by using t-out-of n servers and the bloom filter technique,in which the computational complexity of a user is reduced by applying the Chinese Remainder Theorem,the matching users can be found with the help of any t matching servers,and the privacy of the user profile is not compromised.Furthermore,if at most t-1 servers are allowed to collude,our scheme can still fulfill user profile privacy and user query privacy.Finally,the performance of the proposed scheme is compared with the other two schemes,and the results show that our scheme is superior to them. 展开更多
关键词 user profile matching Chinese remainder theorem PRIVACY-PRESERVING query privacy
下载PDF
Two Notes on Numerical DifFerentiation Formulae
18
作者 郑华盛 《Chinese Quarterly Journal of Mathematics》 CSCD 2012年第4期480-484,共5页
Some new conclusions on asymptotic properties and inverse problems of numerical differentiation formulae have been drawn in this paper.In the first place,several asymptotic properties of intermediate points of numeric... Some new conclusions on asymptotic properties and inverse problems of numerical differentiation formulae have been drawn in this paper.In the first place,several asymptotic properties of intermediate points of numerical differentiation formulae are presented by using Taylor's formula.And then,based on the ideas of algebraic accuracy,several inverse problems of numerical differentiation formulae are given. 展开更多
关键词 numerical differentiation remainder term asymptotic property intermediatepoint algebraic precision inverse problem
下载PDF
Robustness Proof on A United Watermarking Based on CRT Theorem
19
作者 LIULi-gang CHENXiao-su XIAODao-ju HULei 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期307-310,共4页
A new method of embedding and detecting a joint watermarking is proposed. Itapplies the asmuth-bloom secret sharing scheme, which is based on CRT (Chinese remainder theorem)theorem, to the digital watermarking technol... A new method of embedding and detecting a joint watermarking is proposed. Itapplies the asmuth-bloom secret sharing scheme, which is based on CRT (Chinese remainder theorem)theorem, to the digital watermarking technology. On the base of describing the watermarkingembedding proceeding and analyzing the watermarking detection proceeding, a series of experiments isdone. The experiments emphasize on the method's robust proving and security analysis. And theexperiments show that the method can resistthe attacks of JPEG compress, geometry, noise and grayadjusting. The results of the experiments show that the method has a nice recognition of copyrightfor joint ownership. 展开更多
关键词 united digital watermarking Chinese remainder theorem robustness proof
下载PDF
AN INTEGRATION METHOD WITH FITTING CUBIC SPLINE FUNCTIONS TO A NUMERICAL MODEL OF 2ND-ORDER SPACE-TIME DIFFERENTIAL REMAINDER——FOR AN IDEAL GLOBAL SIMULATION CASE WITH PRIMITIVE ATMOSPHERIC EQUATIONS
20
作者 辜旭赞 张兵 王明欢 《Journal of Tropical Meteorology》 SCIE 2013年第4期388-396,共9页
In this paper,the forecasting equations of a 2nd-order space-time differential remainder are deduced from the Navier-Stokes primitive equations and Eulerian operator by Taylor-series expansion.Here we introduce a cubi... In this paper,the forecasting equations of a 2nd-order space-time differential remainder are deduced from the Navier-Stokes primitive equations and Eulerian operator by Taylor-series expansion.Here we introduce a cubic spline numerical model(Spline Model for short),which is with a quasi-Lagrangian time-split integration scheme of fitting cubic spline/bicubic surface to all physical variable fields in the atmospheric equations on spherical discrete latitude-longitude mesh.A new algorithm of"fitting cubic spline—time step integration—fitting cubic spline—……"is developed to determine their first-and2nd-order derivatives and their upstream points for time discrete integral to the governing equations in Spline Model.And the cubic spline function and its mathematical polarities are also discussed to understand the Spline Model’s mathematical foundation of numerical analysis.It is pointed out that the Spline Model has mathematical laws of"convergence"of the cubic spline functions contracting to the original functions as well as its 1st-order and 2nd-order derivatives.The"optimality"of the 2nd-order derivative of the cubic spline functions is optimal approximation to that of the original functions.In addition,a Hermite bicubic patch is equivalent to operate on a grid for a 2nd-order derivative variable field.Besides,the slopes and curvatures of a central difference are identified respectively,with a smoothing coefficient of 1/3,three-point smoothing of that of a cubic spline.Then the slopes and curvatures of a central difference are calculated from the smoothing coefficient 1/3 and three-point smoothing of that of a cubic spline,respectively.Furthermore,a global simulation case of adiabatic,non-frictional and"incompressible"model atmosphere is shown with the quasi-Lagrangian time integration by using a global Spline Model,whose initial condition comes from the NCEP reanalysis data,along with quasi-uniform latitude-longitude grids and the so-called"shallow atmosphere"Navier-Stokes primitive equations in the spherical coordinates.The Spline Model,which adopted the Navier-Stokes primitive equations and quasi-Lagrangian time-split integration scheme,provides an initial ideal case of global atmospheric circulation.In addition,considering the essentially non-linear atmospheric motions,the Spline Model could judge reasonably well simple points of any smoothed variable field according to its fitting spline curvatures that must conform to its physical interpretation. 展开更多
关键词 NUMERICAL forecast and NUMERICAL SIMULATION 2nd-order SPACE-TIME differential REMAINDER NUMERICAL model cubic spline functions Navier-Stokes PRIMITIVE EQUATIONS quasi-Lagrangian time-split integration scheme global SIMULATION case
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部