A Class of Three-Weight Cyclic Codes

Size: px
Start display at page:

Download "A Class of Three-Weight Cyclic Codes"

Transcription

1 A Class of Three-Weight Cyclic Codes Zhengchun Zhou Cunsheng Ding Abstract arxiv: v [cs.it] 4 Feb 03 Cyclic codes are a subclass of linear codes have alications in consumer electronics, data storage systems, communication systems as they have efficient encoding decoding algorithms. In this aer, a class of threeweight cyclic codes over GF whose duals have two zeros is resented, is an odd rime. The weight distribution of this class of cyclic codes is settled. Some of the cyclic codes are otimal. The duals of a subclass of the cyclic codes are also studied roved to be otimal. Index Terms Cyclic codes, weight distribution, quadratic form, shere acking bound. I. INTRODUCTION Throughout this aer, let m k be ositive integers such that s = m/e is odd s 3, e=gcdm,k. Let be an odd rime q= e. Let π be a rimitive element of the finite field GFq s, q s = m. An [n,l,d] linear code over GF is an l-dimensional subsace of GF n with minimum Hamming distance d. Let A i denote the number of codewords with Hamming weight i in a code C of length n. The weight enumerator of C is defined by +A x+a x + +A n x n. The sequence,a,a,,a n is called the weight distribution of the code C. An [n,l] linear code C over the finite field GF is called cyclic if c 0,c,,c n C imlies c n,c 0,c,,c n C. By identifying the vector c 0,c,,c n GF n with c 0 + c x+c x + +c n x n GF[x]/x n, any code C of length n over GF corresonds to a subset of GF[x]/x n. The linear code C is cyclic if only if the corresonding subset in GF[x]/x n is an ideal of the olynomial residue class ring GF[x]/x n. It is well known that every ideal of GF[x]/x n is rincial. Let C =gx, gx is monic has the least degree. Then gx is called the generator olynomial hx = x n /gx is referred to as the arity-check olynomial of C. A cyclic code is called irreducible if its arity-check olynomial is irreducible over GF. Otherwise, it is called reducible. The weight distributions of both irreducible reducible cyclic codes have been interesting subjects of study for many years. For information on the weight distribution of irreducible cyclic codes, the reader is referred to [8], [3], [9], the recent survey [6]. Information on the weight distribution of reducible cyclic codes could be found in [], [7], [4], [5], [5], [6], []. Let h 0 x, h x, h x be the minimal olynomials of π, π, π k +/ over GF, resectively. It is easy to show that h 0 x, h x, h x are olynomials of degree m are airwise Z. Zhou s research was suorted by the Natural Science Foundation of China, Proj. No C. Ding s research was suorted by The Hong Kong Research Grants Council, Proj. No Z. Zhou is with the School of Mathematics, Southwest Jiaotong University, Chengdu, 6003, China [email protected]. C. Ding is with the Deartment of Comuter Science Engineering, The Hong Kong University of Science Technology, Clear Water Bay, Kowloon, Hong Kong, China [email protected].

2 distinct. The cyclic code over GF with length m arity-check olynomial h 0 xh x has been extensively studied is a three-weight code in the following cases. When k is even e=, this three-weight cyclic code is due to Trachtenberg [0]. When k is odd, e=, =3, the cyclic code is related to some lanar functions is roved to have only three nonzero weights by Yuan, Carlet, Ding [3], []. When k e are odd is any odd rime, Luo Feng [4] roved that the code has only three nonzero weights. The objective of this aer is to study the cyclic code over GFq with length m arity-check olynomial h xh x. It will be shown that this cyclic code has only three nonzero weights when k/e is odd, or k is even e is odd. The weight distribution of the roosed cyclic codes will be determined. Some of the cyclic codes with arity-check olynomials h xh x are otimal. The duals of a subclass of the cyclic codes are also otimal. The three-weight cyclic codes dealt with in this aer may have alications in association schemes [] secret sharing schemes [3]. This aer is organized as follows. Section II introduces necessary results on quadratic forms that will be needed later in this aer. Section III defines the class of cyclic codes determines their weight distributions. Section IV studies the duals of a subclass of the cyclic codes. Section V concludes this aer makes some comments on this toic. II. QUADRATIC FORMS OVER FINITE FIELDS In this section, we give a brief introduction to the theory of quadratic forms over finite fields which is needed to calculate the weight distribution of the cyclic codes in the sequel. Quadratic forms have been well studied see the monograh [7] the references therein, have alications in sequence design [0], [], coding theory [7], [4], [5]. Identifying GFq s with the s-dimensional GFq-vector sace GFq s, a function Q from GFq s to GFq can be regarded as an s-variable olynomial on GFq. The former is called a quadratic form over GFq if the latter is a homogeneous olynomial of degree two in the form Qx,x,,x s = a i j x i x j i j s a i j GFq, we use a basis {β,β,,β s } of GFq s over GFq identify x= s i= x iβ i with the vectorx,x,,x s GFq s. The rank of the quadratic form Qx is defined as the codimension of the GFq-vector sace V ={x GFq s Qx+z Qx Qz=0 for all z GFq s }. That is V =q s r r is the rank of Qx. For a quadratic form fx in s variables over GFq, there exists a symmetric matrix A of order s over GFq such that fx=xax, X =x,,x s GFq s X denotes the transose of X. For a symmetric matrix A of order s over GFq, it is known that there is a nonsingular matrix T of order s such that TAT is a diagonal matrix [7]. Under the nonsingular linear substitution X = ZT with Z =z,z,,z s GFq s, we then have fx=ztat Z = r i= d i z i r is the rank of fx d i GFq. Let = d d d r for r = for r = 0. Let η denote the quadratic multilicative character of GFq. Then η is an invariant of A under the conjugate action of M GL s GFq. The following results are useful in the sequel. Lemma.: [7], [5] With the notations as above, we have ζ Tr q/ fx = x GFq s { η q s r/, if q mod 4, η r q s r/, if q 3 mod 4

3 3 for any quadratic form fx in s variables of rank r over GFq, ζ is a rimitive -th root of unity, Tr q/ x denotes the trace function from GFq to GF. Lemma.: Let fx be a quadratic form in s variables of rank r over GFq. If r is even, then If r e are odd, then y GF x GFq s y GF x GFq s ζ Tr q/y fx =± q s r/. ζ Tr q/y fx = 0. Proof: By a nonsingular linear substitution as in, we have fx= r i= d iz i, d i GFq z,z,,z r GFq r. Note that, for each y GF, y fx ia a quadratic form over GFq with rank r y fx= r i= yd iz i. According to Lemma., we have Thus, when r is even, ζ Tr q/y fx y GF x GFq s y GF x GFq s On the other h, when r e are both odd, = x GFq s ζ Tr q/ fx ζ Tr q/y fx =± q s r/. ζ Tr q/y fx y GF x GFq s = x GFq s = x GFq s = x GFq s = 0 ζ Tr q/ fx ζ Tr q/ fx ζ Tr q/ fx y GF η y r y GF η y y GF η 0 y y GF η y r. η 0 is the quadratic multilicative character of GF in the third identity we used the fact that η 0 x=η x for any x GF since e is odd. III. THE CLASS OF THREE-WEIGHT CYCLIC CODES AND THEIR WEIGHT DISTRIBUTION We follow the notations fixed in Section I. From now on, we always assume that λ is a fixed nonsquare in GFq. Note that s is odd, thus λ is also a nonsquare in GFq s. Let SQ denote the set of all squares in GFq s. Then λx runs through all nonsquares in GFq s as x runs through SQ. The following result is easy to rove is useful in the sequel. Proosition 3.: λ +k / = λ if k/e is even, λ +k / = λ otherwise. By Delsarte s Theorem [4], the code C with the arity-check olynomial h xh x can be exressed as C ={c GFq s }

4 4 c = Tr q s / a π t q + bπ k +t/ s. t=0 In terms of exonential sums, the weight of the codeword c =c 0,c,,c q s in C is given by WTc = #{0 t q s : c t 0} = q s q s t=0 = q s y GF = q s = q s = q s y GF ζ yc t q s 3/ t=0 y GF x SQ y GF x SQ = m m y GF x GFq s ζ Tr q s /yaπ t +ybπ t k +/ + ζ Tr q s / yaππ t +ybππ t k +/ ζ Tr q s /yax+ybx k +/ + ζ Tr q s / yaπx+ybπx k +/ ζ Tr q s /yax+ybx k +/ + ζ Tr q s / yaλx+ybλx k +/ y GF x GFq s ζ Tr q s /yax +ybx k+ + ζ Tr q s / yaλx +ybλ k +/ x k + ζ Tr q s /yax +ybx k + + ζ Tr q s / yaλx +ybλ k +/ x k + in the fifth identity we used the fact that both πx λx run through all nonsquares in GF q s as x runs through SQ. It then follows from Proosition 3. that when k/e is even, when k/e is odd, S= T= y GF x GFq s WTc = m m S y GF x GFq s ζ Tr q s /yax +ybx k + + ζ Tr q s / yaλx +ybλx k + ; 3 WTc = m m T ζ Tr q s /yax +ybx k + + ζ Tr q s / yaλx ybλx k +. 4 Based on the discussions above, the weight distribution of the code C is comletely determined by the value distribution of S T. To calculate the value distribution of S T, we need a series of lemmas. Before introducing them, we define for each GFq s. Q x=tr q s /qax + bx +k, x GFq s. 5

5 5 Lemma 3.: [7], [5] For any GFq s \{0,0}, the function Q of 5 is a quadratic form over GFq with rank s,s, or s. Lemma 3.3: Let k be even e be odd, let S be defined by 3. Then for any 0,0, S takes on only the values from the set {0,± m+e/ }. Proof: According to the definition of S, we have S= y GF x GFq s ζ Tr q/yq x + ζ Tr q/yλq x Q x is given by 5. We now rove that at least one of the quadratic forms Q Q has rank s. When b = 0, it is easy to check that both Q Q have rank s for any nonzero a. When b 0, suose on the contrary that both Q Q have rank less than m. Then there are two nonzero elements x,x GFq s such that Note that Q x + z Q x Q z=0, z GFq s 6 Q x + z Q x Q z=0, z GFq s. 7 Q x+z Q x Q z=tr q s /qzax+bx k + b k x k. It then follows from 6 7, resectively, that b k x k + a k x k + bx = 0 b k x k a k x k + bx = 0. Combining these two equations the first one times x k lus the second one times x k leads to uu k + =0 8 u=bx x x k + x k. Note that x k for any x GFq s since k/e is even s is odd. It then follows that u 0 u k + 0. This is a contradiction with 8. Thus at least one of the quadratic forms Q Q has rank s for any 0,0. On the other h, by Lemma., S 0 only if Q or Q has even rank. Thus, S=± m+e/ if Q has rank s Q has rank s or Q has rank s Q has rank s, otherwise S= 0. This comletes the roof. Theorem 3.4: Let k be even e be odd. Then the value distribution of S in 3 is given by m occurring time m+e/ occurring m e + m e/ m times m+e/ occurring m e m e/ m times 0 occurring m m e + m times. Proof: It is clear that S0,0= m. According to Lemma 3.3, we define N ε = #{ GFq s \0,0 S= ε m+e/ }

6 6 ε=±. Then we have On the other h, it follows from 3 that S= m +N N m+e/ 9 S =4 m +N + N m+e. 0 S= m S = m #S + #S + #S 3 + #S 4 S ={y,y,x,x Γ y x y x = 0, y x k + y x k + S ={y,y,x,x Γ y x + λy x = 0, y x k + λy x k + S 3 ={y,y,x,x Γ λy x y x = 0, λy x k + y x k + S 4 ={y,y,x,x Γ λy x + λy x = 0, λy x k + λy x k + = 0}. Herein, Γ=GF GF GFq s GFq s. It is not hard to rove that Combining Equations 9 4, we get #S = #S 4 = m 3 #S = #S 3 =. 4 N = m e + m e/ m, N = m e m e/ m. Summarizing the discussion above comletes the roof of this theorem. Lemma 3.5: Let k/e be odd T be defined by 4. Then for any GFq s \{0,0}, T takes on only the values from the set {0,± m+e/ }. Proof: According to the definition of T, we have T= y GF x GFq s ζ Tr q/yq x + ζ Tr q/ yλq x Q x is given by 5. By Lemma 3., for any 0,0, the ossible rank of Q x is s, s, or s. Note that, for any y GF, the quadratic forms yq x λyq x have the same rank with Q x. When Q x has even rank s, by Lemma., we have T=± m+e/. When Q x has odd rank s or s, we distinguish between the following two cases to show that T= 0. Case : e is odd. In this case, it follows again from Lemma. that T=0. Case : e

7 7 is even. In this case, is a square in GFq thus λ is a nonsquare in GFq. It then follows from Lemma. that ζ Tr q/yq x + ζ Tr q/ yλq x x GFq s =η y+η yλ ζ Tr q/q x x GFq s = 0 for any y GF. Thus T=0. This comletes the roof. Theorem 3.6: Let k/e be odd. Then the value distribution of T in 4 is given by m occurring time m+e/ occurring m e + m e/ m times m+e/ occurring m e m e/ m times 0 occurring m m e + m times. Proof: It is clear that T0,0= m. According to Lemma 3.5, we define n ε = #{ GFq s \0,0 T=ε m+e/ } ε=±. Then we have T= m + n n m+e/ 5 T =4 m + 4n + n m+e. 6 On the other h, it follows from 4 that T= m 7 T = m #T + #T + #T 3 + #T 4 8 T ={y,y,x,x Γ y x y x = 0, y x k + y x k + T ={y,y,x,x Γ y x + λy x = 0, y x k + + λy x k + T 3 ={y,y,x,x Γ λy x y x = 0, λy x k + y x k + T 4 ={y,y,x,x Γ λy x + λy x = 0, λy x k + + λy x k + = 0}. Herein, Γ=GF GF GFq s GFq s. It is not hard to show that Combining Equations 5 9, we get #T = #T = #T 3 = #T 4 = m. 9 n = m e + m e/ m, n = m e m e/ m.

8 8 TABLE I WEIGHT DISTRIBUTION OF C FOR EVEN k AND ODD e Hamming Weight Frequency 0 m m m+e / m e + m e/ m m m m m e + m m m + m+e / m e m e/ m TABLE II WEIGHT DISTRIBUTION OF C FOR ODD k/e Hamming Weight Frequency 0 m m m+e / m e + m e/ m m m m m e + m m m + m+e / m e m e/ m The value distribution of Ta, b follows from the discussion above. Theorem 3.7: Let k be even e be odd. Then the code C is a three-weight -ary cyclic code with arameters [ m,m, m m m+e / ]. Moreover the weight distribution of C is given in Table I. Proof: The length dimension of C follow directly from its definition. The minimal distance weight distribution of C follow from Equation 3 Theorem 3.4. The following are some examles of the codes. Examle 3.8: Let =3 m=3, k=. Then the code C is a [6,6,5] code over GF3 with the weight enumerator x x. It has the same arameters with the best known cyclic codes in the Database of best linear codes known maintained by Markus Grassl at htt:// It is also otimal since the uer bound is 5. Examle 3.9: Let =3, m=5 k=4. Then the code C is a [4,6,53] code over GF3 with the weight enumerator x x 7. It has the same arameters with the best known cyclic codes in the Database. It is otimal or almost otimal since the uer bound on the minimal distance of any ternary linear code with length 4 dimension 6 is 54. Examle 3.0: Let =5, m=3, k =. Then the code C is a [4,6,90] code over GF5 with the weight enumerator x x 0. The best known linear code over GF5 with length 4 dimension 6 has minimal distance 95. Theorem 3.: Let k/e be odd. Then the code C is a three-weight -ary cyclic code with arameters [ m,m, m m m+e / ]. Moreover the weight distribution of C is given in Table II. Proof: The length dimension of C follow directly from its definition. The minimal distance weight distribution of C follow from Equation 4 Theorem 3.6.

9 9 Examle 3.: Let =3 m=6, k=. Then the code C is a [78,,43] code over GF3 with the weight enumerator x x 540. Examle 3.3: Let =5 m=3, k=. Then the code C is a [4,6,80] code over GF5 with the weight enumerator x x 0. Examle 3.4: Let = 3 m = 9, k = 3. Then the code C is a [968,8,879] code over GF3 with the weight enumerator x x IV. THE DUALS OF A SUBCLASS OF THE CYCLIC CODES In this section, we study the duals of a subclass of the cyclic codes resented in this aer rove that they are otimal ternary linear codes. Theorem 4.: Let =3, k be even e be odd. Then the dual C of the cyclic code C in is an otimal ternary code with arameters [3 m,3 m m,4]. Proof: We only need to rove that C has minimal distance 4. Clearly, the minimal distance d of the dual of C cannot be. Let u= k + /. Then gcdu, m = since k is even m is odd. By the definition of C, the code C has a codeword of Hamming weight if only if there exist two elements c,c GF3 two distinct integers 0 t < t m such that { c π t + c π t = 0 c π ut + c π ut 0 = 0. Note that gcdu, m = t t. It follows from the second equation of 0 that c = c t = t + m /. Then the first equation becomes c π t = 0, which is imossible. Thus the code C does not have a codeword of Hamming weight. We now rove that C has no codeword of weight 3. Otherwise, there exist three elements c,c,c 3 in GF3 three distinct integers 0 t < t < t 3 m such that { c π t +c π t +c 3 π t 3 = 0 c π ut +c π ut +c 3 π ut 3 = 0. Due to symmetry it is sufficient to consider the following two cases. Case A, when c = c = c 3 = : In this case, becomes { π t + π t + π t 3 = 0 π ut +π ut +π ut 3 = 0. Let x i = π t i for i=,,3. Then x,x,x 3 GF3 m are airwise distinct. Without loss of generality, we only need to consider the following two subcases. t is even t,t 3 are odd. In this subcase, we have { x x x 3 = 0 x u + xu + 3 xu 3 = 0 which yields Thus x + x 3 u = x u xu 3. x + x 3 u = x u xu 3

10 0 which leads to x x 3 x k / x k / 3 = 0. 4 It then follows that x 3 /x k =. Note that gcdm,k=, x,x 3 are both nonsquare in GF3 m since t,t 3 are odd. Thus x = x 3. This is a contradiction to the fact that x x 3. t, t, t 3 are even. Similarly, in this subcase, we can arrive at 4 in which x,x 3 are both squares in GF3 m since t,t 3 are even. It then follows from x 3 /x k = that x = x 3. This is again a contradiction. Case B, when c = c = c 3 =. The roof of this case is similar to Case A. We omit the details here. Finally, by the Shere Packing bound, the minimal distance d 4. Hence d = 4. This comletes the roof. This subclass of ternary cyclic codes C are otimal in the sense that the minimum distance is maximal for any ternary linear code with length 3 m dimension 3 m m. Examle 4.: Let = 3 m = 3, k =. Then the code C is an otimal ternary cyclic code with arameters [6,0,4] generator olynomial x 6 + x 5 + x 3 + x+. Examle 4.3: Let = 3 m = 5, k = 4. Then the code C is an otimal ternary cyclic code with arameters [4,0,4] generator olynomial x 0 + x 9 + x 8 + x 7 + x 6 + x +. Examle 4.4: Let = 3 m = 7, k = 6. Then the code C is an otimal ternary cyclic code with arameters [86,4,4] generator olynomial x 4 + x 3 + x + x 0 + x 6 + x 5 +. V. SUMMARY AND CONCLUDING REMARKS In this aer, we resented a class of three-weight cyclic codes determined their weight distributions. Some of the codes are otimal, the duals of a subclass of the cyclic codes are also otimal. While a lot of two-weight codes were discovered see [], [5], [6], [3], [0], [9], only a small number of three-weight codes are known [], [5], [6], [8], [9]. It would be good if more three-weight codes are constructed, in view of their alications in association schemes secret sharing schemes. REFERENCES [] A. R. Calderbank W. M. Kantor, The geometry of two-weight codes, Bull. London Math. Soc., vol. 8,. 97-, 986. [] A. R. Calderbank J. M. Goethals, Three-weight codes association schemes, Philis J. Res., vol. 39,. 43 5, 984. [3] C. Carlet, C. Ding, J. Yuan, Linear codes from highly nonlinear functions their secret sharing schemes, IEEE Trans. Inform. Theory, vol. 5, no. 6, , 005. [4] P. Delsarte, On subfield subcodes of modified Reed-Solomon codes, IEEE Trans. Inform. Theory, vol. IT-, no. 5, , Se [5] C. Ding, Y. Liu, C. Ma, L. Zeng, The weight distributions of the duals of cyclic codes with two zeros, IEEE Trans. Inform. Theory, vol. 57, No., , Dec. 0. [6] C. Ding J. Yang, Hamming weights in irreducible cyclic codes, Discrete Mathematics, vol. 33, no. 4, , 03. [7] K. Feng J. Luo, Weight distribution of some reducible cyclic codes, Finite Fields Al., vol. no., , Ar [8] T. Feng, On cyclic codes of length r with two zeros whose dual codes have three weights, Des. Codes Crytogr., vol. 6, , 0. [9] G. McGuire, On three weights in cyclic codes with two zeros, Finite Fields Al., vol. 0, no., , Jan [0] W. M. Kantor, Exonential numbers of two-weight codes, difference sets symmetric designs, Discrete Mathematics, vol. 46, , 983. [] A. Klaer, Cross-correlations of quadratic form sequences in odd characteristic, Des. Codes Crytogr.,, vol. 3, no. 4, , 997. [] Z. Liu X.-W. Wu, On a class of three-weight codes with crytograhic alications, In: Proc. of the 0 IEEE International Symosium on Information Theory, , 0. [3] Z. Liu X. Zeng, On a kind of two-weight code, Euroean Journal of Combinatorics, vol. 33, no. 6,. 65 7, Aug. 0. [4] J. Luo K. Feng, Cyclic codes sequences from generalized Coulter-Matthews function, IEEE Trans. Inform. Theory vol. 54, no., Dec [5] J. Luo K. Feng, On the weight distributions of two classes of cyclic codes, IEEE Trans. Inform. Theory, vol. 54, no., , Dec. 008.

11 [6] C. Ma, L. Zeng, Y. Liu, D. Feng, C. Ding, The weight enumerator of a class of cyclic codes, IEEE Trans. Inform. Theory, vol. 57, no., , Jan. 0. [7] R. Lidl H. Niederreiter, Finite Fields, Encycloedia of Mathematics, Vol. 0, Cambridge University Press, Cambridge, 983. [8] F. MacWilliams J. Seery, The weight distributions of some minimal cyclic codes, IEEE Trans. Inform. Theory, vol. 7 no. 6, , 98. [9] B. Schmidt C. White, All two-weight irreducible cyclic codes, Finite Fields Al., vol. 8,. 7, 00. [0] H. M. Trachtenberg, On the crosscorrelation functions of maximal linear recurring sequences, Ph.D. dissertation, Univ. South. Calif., Los Angels, 970. [] J. Yuan, C. Carlet, C. Ding, The weight distribution of a class of linear codes from erfect nonlinear functions, IEEE Trans. Inform. Theory, vol. 5, no.,. 7 77, Feb [] B. Wang, C. Tang, Y. Qi, Y. X. Yang, M. Xu, The weight distributions of cyclic codes ellitic curves, IEEE Trans. Inform. Theory, vol. 58, no., , Dec. 0. [3] M. van der Vlugt, On the weight hierarchy of irreducible cyclic codes, J. Comb. Theory Ser. A, vol. 7, no., , July 995.

SECRET sharing schemes were introduced by Blakley [5]

SECRET sharing schemes were introduced by Blakley [5] 206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has

More information

As we have seen, there is a close connection between Legendre symbols of the form

As we have seen, there is a close connection between Legendre symbols of the form Gauss Sums As we have seen, there is a close connection between Legendre symbols of the form 3 and cube roots of unity. Secifically, if is a rimitive cube root of unity, then 2 ± i 3 and hence 2 2 3 In

More information

SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions

SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q TREVOR ARNOLD Abstract This aer demonstrates a few characteristics of finite extensions of small degree over the rational numbers Q It comrises attemts

More information

Two classes of ternary codes and their weight distributions

Two classes of ternary codes and their weight distributions Two classes of ternary codes and their weight distributions Cunsheng Ding, Torleiv Kløve, and Francesco Sica Abstract In this paper we describe two classes of ternary codes, determine their minimum weight

More information

ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS

ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS DANIEL RABAYEV AND JACK SONN Abstract. Let f(x) be a monic polynomial in Z[x] with no rational roots but with roots in Q p for

More information

Several Classes of Codes and Sequences Derived From a 4 -Valued Quadratic Form Nian Li, Xiaohu Tang, Member, IEEE, and Tor Helleseth, Fellow, IEEE

Several Classes of Codes and Sequences Derived From a 4 -Valued Quadratic Form Nian Li, Xiaohu Tang, Member, IEEE, and Tor Helleseth, Fellow, IEEE 7618 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 11, NOVEMBER 2011 Several Classes of Codes Sequences Derived From a 4 -Valued Quadratic Form Nian Li, Xiaohu Tang, Member, IEEE, Tor Helleseth,

More information

minimal polyonomial Example

minimal polyonomial Example Minimal Polynomials Definition Let α be an element in GF(p e ). We call the monic polynomial of smallest degree which has coefficients in GF(p) and α as a root, the minimal polyonomial of α. Example: We

More information

6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks

6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks 6.042/8.062J Mathematics for Comuter Science December 2, 2006 Tom Leighton and Ronitt Rubinfeld Lecture Notes Random Walks Gambler s Ruin Today we re going to talk about one-dimensional random walks. In

More information

On the representability of the bi-uniform matroid

On the representability of the bi-uniform matroid On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large

More information

Chapter 1. Search for Good Linear Codes in the Class of Quasi-Cyclic and Related Codes

Chapter 1. Search for Good Linear Codes in the Class of Quasi-Cyclic and Related Codes Chapter 1 Search for Good Linear Codes in the Class of Quasi-Cyclic and Related Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics, Kenyon College Gambier, OH, USA 43022 {aydinn,asamovt}@kenyon.edu

More information

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization

More information

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible

More information

The Heat Equation. Lectures INF2320 p. 1/88

The Heat Equation. Lectures INF2320 p. 1/88 The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)

More information

THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS

THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS KEITH CONRAD 1. Introduction The Fundamental Theorem of Algebra says every nonconstant polynomial with complex coefficients can be factored into linear

More information

H/wk 13, Solutions to selected problems

H/wk 13, Solutions to selected problems H/wk 13, Solutions to selected problems Ch. 4.1, Problem 5 (a) Find the number of roots of x x in Z 4, Z Z, any integral domain, Z 6. (b) Find a commutative ring in which x x has infinitely many roots.

More information

Linear Codes. Chapter 3. 3.1 Basics

Linear Codes. Chapter 3. 3.1 Basics Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length

More information

1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain

1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain Notes on real-closed fields These notes develop the algebraic background needed to understand the model theory of real-closed fields. To understand these notes, a standard graduate course in algebra is

More information

PUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include 2 + 5.

PUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include 2 + 5. PUTNAM TRAINING POLYNOMIALS (Last updated: November 17, 2015) Remark. This is a list of exercises on polynomials. Miguel A. Lerma Exercises 1. Find a polynomial with integral coefficients whose zeros include

More information

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.

More information

SECTION 6: FIBER BUNDLES

SECTION 6: FIBER BUNDLES SECTION 6: FIBER BUNDLES In this section we will introduce the interesting class o ibrations given by iber bundles. Fiber bundles lay an imortant role in many geometric contexts. For examle, the Grassmaniann

More information

RINGS WITH A POLYNOMIAL IDENTITY

RINGS WITH A POLYNOMIAL IDENTITY RINGS WITH A POLYNOMIAL IDENTITY IRVING KAPLANSKY 1. Introduction. In connection with his investigation of projective planes, M. Hall [2, Theorem 6.2]* proved the following theorem: a division ring D in

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

How To Prove The Dirichlet Unit Theorem

How To Prove The Dirichlet Unit Theorem Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if

More information

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called

More information

Factoring of Prime Ideals in Galois Extensions

Factoring of Prime Ideals in Galois Extensions Chater 8 Factoring of Prime Ideals in Galois Extensions 8.1 Decomosition and Inertia Grous We return to the general AKLB setu: A is a Dedekind domain with fraction field K, L is a finite searable extension

More information

Factorization Algorithms for Polynomials over Finite Fields

Factorization Algorithms for Polynomials over Finite Fields Degree Project Factorization Algorithms for Polynomials over Finite Fields Sajid Hanif, Muhammad Imran 2011-05-03 Subject: Mathematics Level: Master Course code: 4MA11E Abstract Integer factorization is

More information

Quotient Rings and Field Extensions

Quotient Rings and Field Extensions Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

More information

Number Theory Naoki Sato <[email protected]>

Number Theory Naoki Sato <ensato@hotmail.com> Number Theory Naoki Sato 0 Preface This set of notes on number theory was originally written in 1995 for students at the IMO level. It covers the basic background material that an

More information

SOLVING QUADRATIC EQUATIONS OVER POLYNOMIAL RINGS OF CHARACTERISTIC TWO

SOLVING QUADRATIC EQUATIONS OVER POLYNOMIAL RINGS OF CHARACTERISTIC TWO Publicacions Matemàtiques, Vol 42 (1998), 131 142. SOLVING QUADRATIC EQUATIONS OVER POLYNOMIAL RINGS OF CHARACTERISTIC TWO Jørgen Cherly, Luis Gallardo, Leonid Vaserstein and Ethel Wheland Abstract We

More information

Introduction to Algebraic Coding Theory

Introduction to Algebraic Coding Theory Introduction to Algebraic Coding Theory Supplementary material for Math 336 Cornell University Sarah A. Spence Contents 1 Introduction 1 2 Basics 2 2.1 Important code parameters..................... 4

More information

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without

More information

Introduction to NP-Completeness Written and copyright c by Jie Wang 1

Introduction to NP-Completeness Written and copyright c by Jie Wang 1 91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden [email protected] School of Technology and Society, Malmö University,

More information

Introduction to Finite Fields (cont.)

Introduction to Finite Fields (cont.) Chapter 6 Introduction to Finite Fields (cont.) 6.1 Recall Theorem. Z m is a field m is a prime number. Theorem (Subfield Isomorphic to Z p ). Every finite field has the order of a power of a prime number

More information

3 1. Note that all cubes solve it; therefore, there are no more

3 1. Note that all cubes solve it; therefore, there are no more Math 13 Problem set 5 Artin 11.4.7 Factor the following polynomials into irreducible factors in Q[x]: (a) x 3 3x (b) x 3 3x + (c) x 9 6x 6 + 9x 3 3 Solution: The first two polynomials are cubics, so if

More information

Introduction to Algebraic Geometry. Bézout s Theorem and Inflection Points

Introduction to Algebraic Geometry. Bézout s Theorem and Inflection Points Introduction to Algebraic Geometry Bézout s Theorem and Inflection Points 1. The resultant. Let K be a field. Then the polynomial ring K[x] is a unique factorisation domain (UFD). Another example of a

More information

Second Order Differential Equations with Hypergeometric Solutions of Degree Three

Second Order Differential Equations with Hypergeometric Solutions of Degree Three Second Order Differential Equations with Hypergeometric Solutions of Degree Three Vijay Jung Kunwar, Mark van Hoeij Department of Mathematics, Florida State University Tallahassee, FL 0-07, USA vkunwar@mathfsuedu,

More information

AMBIGUOUS CLASSES IN QUADRATIC FIELDS

AMBIGUOUS CLASSES IN QUADRATIC FIELDS MATHEMATICS OF COMPUTATION VOLUME, NUMBER 0 JULY 99, PAGES -0 AMBIGUOUS CLASSES IN QUADRATIC FIELDS R. A. MOLLIN Dedicated to the memory ofd. H. Lehmer Abstract. We provide sufficient conditions for the

More information

CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12

CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12 CONTINUED FRACTIONS AND PELL S EQUATION SEUNG HYUN YANG Abstract. In this REU paper, I will use some important characteristics of continued fractions to give the complete set of solutions to Pell s equation.

More information

calculating the result modulo 3, as follows: p(0) = 0 3 + 0 + 1 = 1 0,

calculating the result modulo 3, as follows: p(0) = 0 3 + 0 + 1 = 1 0, Homework #02, due 1/27/10 = 9.4.1, 9.4.2, 9.4.5, 9.4.6, 9.4.7. Additional problems recommended for study: (9.4.3), 9.4.4, 9.4.9, 9.4.11, 9.4.13, (9.4.14), 9.4.17 9.4.1 Determine whether the following polynomials

More information

Sign changes of Hecke eigenvalues of Siegel cusp forms of degree 2

Sign changes of Hecke eigenvalues of Siegel cusp forms of degree 2 Sign changes of Hecke eigenvalues of Siegel cusp forms of degree 2 Ameya Pitale, Ralf Schmidt 2 Abstract Let µ(n), n > 0, be the sequence of Hecke eigenvalues of a cuspidal Siegel eigenform F of degree

More information

Notes 11: List Decoding Folded Reed-Solomon Codes

Notes 11: List Decoding Folded Reed-Solomon Codes Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,

More information

ERDŐS SZEKERES THEOREM WITH FORBIDDEN ORDER TYPES. II

ERDŐS SZEKERES THEOREM WITH FORBIDDEN ORDER TYPES. II ERDŐS SEKERES THEOREM WITH FORBIDDEN ORDER TYPES. II GYULA KÁROLYI Institute of Mathematics, Eötvös University, Pázmány P. sétány /C, Budaest, H 7 Hungary GÉA TÓTH Alfréd Rényi Institute of Mathematics,

More information

SECOND DERIVATIVE TEST FOR CONSTRAINED EXTREMA

SECOND DERIVATIVE TEST FOR CONSTRAINED EXTREMA SECOND DERIVATIVE TEST FOR CONSTRAINED EXTREMA This handout presents the second derivative test for a local extrema of a Lagrange multiplier problem. The Section 1 presents a geometric motivation for the

More information

Complex Conjugation and Polynomial Factorization

Complex Conjugation and Polynomial Factorization Comlex Conjugation and Polynomial Factorization Dave L. Renfro Summer 2004 Central Michigan University I. The Remainder Theorem Let P (x) be a olynomial with comlex coe cients 1 and r be a comlex number.

More information

ECE 842 Report Implementation of Elliptic Curve Cryptography

ECE 842 Report Implementation of Elliptic Curve Cryptography ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic

More information

FACTORING AFTER DEDEKIND

FACTORING AFTER DEDEKIND FACTORING AFTER DEDEKIND KEITH CONRAD Let K be a number field and p be a prime number. When we factor (p) = po K into prime ideals, say (p) = p e 1 1 peg g, we refer to the data of the e i s, the exponents

More information

A number field is a field of finite degree over Q. By the Primitive Element Theorem, any number

A number field is a field of finite degree over Q. By the Primitive Element Theorem, any number Number Fields Introduction A number field is a field of finite degree over Q. By the Primitive Element Theorem, any number field K = Q(α) for some α K. The minimal polynomial Let K be a number field and

More information

Linear Algebra I. Ronald van Luijk, 2012

Linear Algebra I. Ronald van Luijk, 2012 Linear Algebra I Ronald van Luijk, 2012 With many parts from Linear Algebra I by Michael Stoll, 2007 Contents 1. Vector spaces 3 1.1. Examples 3 1.2. Fields 4 1.3. The field of complex numbers. 6 1.4.

More information

The van Hoeij Algorithm for Factoring Polynomials

The van Hoeij Algorithm for Factoring Polynomials The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial

More information

Stochastic Derivation of an Integral Equation for Probability Generating Functions

Stochastic Derivation of an Integral Equation for Probability Generating Functions Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating

More information

Factoring of Prime Ideals in Extensions

Factoring of Prime Ideals in Extensions Chapter 4 Factoring of Prime Ideals in Extensions 4. Lifting of Prime Ideals Recall the basic AKLB setup: A is a Dedekind domain with fraction field K, L is a finite, separable extension of K of degree

More information

A characterization of trace zero symmetric nonnegative 5x5 matrices

A characterization of trace zero symmetric nonnegative 5x5 matrices A characterization of trace zero symmetric nonnegative 5x5 matrices Oren Spector June 1, 009 Abstract The problem of determining necessary and sufficient conditions for a set of real numbers to be the

More information

JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson

JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson JUST THE MATHS UNIT NUMBER 1.8 ALGEBRA 8 (Polynomials) by A.J.Hobson 1.8.1 The factor theorem 1.8.2 Application to quadratic and cubic expressions 1.8.3 Cubic equations 1.8.4 Long division of polynomials

More information

QUADRATIC RECIPROCITY IN CHARACTERISTIC 2

QUADRATIC RECIPROCITY IN CHARACTERISTIC 2 QUADRATIC RECIPROCITY IN CHARACTERISTIC 2 KEITH CONRAD 1. Introduction Let F be a finite field. When F has odd characteristic, the quadratic reciprocity law in F[T ] (see [4, Section 3.2.2] or [5]) lets

More information

it is easy to see that α = a

it is easy to see that α = a 21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UF. Therefore

More information

Functional-Repair-by-Transfer Regenerating Codes

Functional-Repair-by-Transfer Regenerating Codes Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can

More information

BANACH AND HILBERT SPACE REVIEW

BANACH AND HILBERT SPACE REVIEW BANACH AND HILBET SPACE EVIEW CHISTOPHE HEIL These notes will briefly review some basic concepts related to the theory of Banach and Hilbert spaces. We are not trying to give a complete development, but

More information

Cyclotomic Extensions

Cyclotomic Extensions Chapter 7 Cyclotomic Extensions A cyclotomic extension Q(ζ n ) of the rationals is formed by adjoining a primitive n th root of unity ζ n. In this chapter, we will find an integral basis and calculate

More information

24. The Branch and Bound Method

24. The Branch and Bound Method 24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no

More information

Inner Product Spaces

Inner Product Spaces Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and

More information

Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2)

Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2) Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2) Kevin Broughan University of Waikato, Hamilton, New Zealand May 13, 2010 Remainder and Factor Theorem 15 Definition of factor If f (x)

More information

Prime Numbers and Irreducible Polynomials

Prime Numbers and Irreducible Polynomials Prime Numbers and Irreducible Polynomials M. Ram Murty The similarity between prime numbers and irreducible polynomials has been a dominant theme in the development of number theory and algebraic geometry.

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact

More information

A SURVEY ON CONTINUOUS ELLIPTICAL VECTOR DISTRIBUTIONS

A SURVEY ON CONTINUOUS ELLIPTICAL VECTOR DISTRIBUTIONS A SURVEY ON CONTINUOUS ELLIPTICAL VECTOR DISTRIBUTIONS Eusebio GÓMEZ, Miguel A. GÓMEZ-VILLEGAS and J. Miguel MARÍN Abstract In this paper it is taken up a revision and characterization of the class of

More information

ON GENERALIZED RELATIVE COMMUTATIVITY DEGREE OF A FINITE GROUP. A. K. Das and R. K. Nath

ON GENERALIZED RELATIVE COMMUTATIVITY DEGREE OF A FINITE GROUP. A. K. Das and R. K. Nath International Electronic Journal of Algebra Volume 7 (2010) 140-151 ON GENERALIZED RELATIVE COMMUTATIVITY DEGREE OF A FINITE GROUP A. K. Das and R. K. Nath Received: 12 October 2009; Revised: 15 December

More information

Number Theory Naoki Sato <[email protected]>

Number Theory Naoki Sato <sato@artofproblemsolving.com> Number Theory Naoki Sato 0 Preface This set of notes on number theory was originally written in 1995 for students at the IMO level. It covers the basic background material

More information

Separation Properties for Locally Convex Cones

Separation Properties for Locally Convex Cones Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam

More information

MATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors. Jordan canonical form (continued).

MATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors. Jordan canonical form (continued). MATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors Jordan canonical form (continued) Jordan canonical form A Jordan block is a square matrix of the form λ 1 0 0 0 0 λ 1 0 0 0 0 λ 0 0 J = 0

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Labeling outerplanar graphs with maximum degree three

Labeling outerplanar graphs with maximum degree three Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics

More information

F. ABTAHI and M. ZARRIN. (Communicated by J. Goldstein)

F. ABTAHI and M. ZARRIN. (Communicated by J. Goldstein) Journal of Algerian Mathematical Society Vol. 1, pp. 1 6 1 CONCERNING THE l p -CONJECTURE FOR DISCRETE SEMIGROUPS F. ABTAHI and M. ZARRIN (Communicated by J. Goldstein) Abstract. For 2 < p

More information

r + s = i + j (q + t)n; 2 rs = ij (qj + ti)n + qtn.

r + s = i + j (q + t)n; 2 rs = ij (qj + ti)n + qtn. Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in

More information

Congruence properties of binary partition functions

Congruence properties of binary partition functions Congruence properties of binary partition functions Katherine Anders, Melissa Dennison, Jennifer Weber Lansing and Bruce Reznick Abstract. Let A be a finite subset of N containing 0, and let f(n) denote

More information

MATH 425, PRACTICE FINAL EXAM SOLUTIONS.

MATH 425, PRACTICE FINAL EXAM SOLUTIONS. MATH 45, PRACTICE FINAL EXAM SOLUTIONS. Exercise. a Is the operator L defined on smooth functions of x, y by L u := u xx + cosu linear? b Does the answer change if we replace the operator L by the operator

More information

2 When is a 2-Digit Number the Sum of the Squares of its Digits?

2 When is a 2-Digit Number the Sum of the Squares of its Digits? When Does a Number Equal the Sum of the Squares or Cubes of its Digits? An Exposition and a Call for a More elegant Proof 1 Introduction We will look at theorems of the following form: by William Gasarch

More information

a 1 x + a 0 =0. (3) ax 2 + bx + c =0. (4)

a 1 x + a 0 =0. (3) ax 2 + bx + c =0. (4) ROOTS OF POLYNOMIAL EQUATIONS In this unit we discuss polynomial equations. A polynomial in x of degree n, where n 0 is an integer, is an expression of the form P n (x) =a n x n + a n 1 x n 1 + + a 1 x

More information

6 EXTENDING ALGEBRA. 6.0 Introduction. 6.1 The cubic equation. Objectives

6 EXTENDING ALGEBRA. 6.0 Introduction. 6.1 The cubic equation. Objectives 6 EXTENDING ALGEBRA Chapter 6 Extending Algebra Objectives After studying this chapter you should understand techniques whereby equations of cubic degree and higher can be solved; be able to factorise

More information

Irreducibility criteria for compositions and multiplicative convolutions of polynomials with integer coefficients

Irreducibility criteria for compositions and multiplicative convolutions of polynomials with integer coefficients DOI: 10.2478/auom-2014-0007 An. Şt. Univ. Ovidius Constanţa Vol. 221),2014, 73 84 Irreducibility criteria for compositions and multiplicative convolutions of polynomials with integer coefficients Anca

More information

Lecture 13 Linear quadratic Lyapunov theory

Lecture 13 Linear quadratic Lyapunov theory EE363 Winter 28-9 Lecture 13 Linear quadratic Lyapunov theory the Lyapunov equation Lyapunov stability conditions the Lyapunov operator and integral evaluating quadratic integrals analysis of ARE discrete-time

More information

NON-CANONICAL EXTENSIONS OF ERDŐS-GINZBURG-ZIV THEOREM 1

NON-CANONICAL EXTENSIONS OF ERDŐS-GINZBURG-ZIV THEOREM 1 NON-CANONICAL EXTENSIONS OF ERDŐS-GINZBURG-ZIV THEOREM 1 R. Thangadurai Stat-Math Division, Indian Statistical Institute, 203, B. T. Road, Kolkata 700035, INDIA thanga [email protected] Received: 11/28/01,

More information

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study

More information

Integer Factorization using the Quadratic Sieve

Integer Factorization using the Quadratic Sieve Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give

More information

SOME PROPERTIES OF SYMBOL ALGEBRAS OF DEGREE THREE

SOME PROPERTIES OF SYMBOL ALGEBRAS OF DEGREE THREE SOME PROPERTIES OF SYMBOL ALGEBRAS OF DEGREE THREE CRISTINA FLAUT and DIANA SAVIN Communicated by the former editorial board In this paper, we study some properties of the matrix representations of the

More information

TRANSCENDENTAL NUMBERS

TRANSCENDENTAL NUMBERS TRANSCENDENTAL NUMBERS JEREMY BOOHER. Introduction The Greeks tried unsuccessfully to square the circle with a comass and straightedge. In the 9th century, Lindemann showed that this is imossible by demonstrating

More information

Computing divisors and common multiples of quasi-linear ordinary differential equations

Computing divisors and common multiples of quasi-linear ordinary differential equations Computing divisors and common multiples of quasi-linear ordinary differential equations Dima Grigoriev CNRS, Mathématiques, Université de Lille Villeneuve d Ascq, 59655, France [email protected]

More information

Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected].

Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom. Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected] This paper contains a collection of 31 theorems, lemmas,

More information

A note on companion matrices

A note on companion matrices Linear Algebra and its Applications 372 (2003) 325 33 www.elsevier.com/locate/laa A note on companion matrices Miroslav Fiedler Academy of Sciences of the Czech Republic Institute of Computer Science Pod

More information

Similarity and Diagonalization. Similar Matrices

Similarity and Diagonalization. Similar Matrices MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that

More information

Discrete Mathematics: Homework 7 solution. Due: 2011.6.03

Discrete Mathematics: Homework 7 solution. Due: 2011.6.03 EE 2060 Discrete Mathematics spring 2011 Discrete Mathematics: Homework 7 solution Due: 2011.6.03 1. Let a n = 2 n + 5 3 n for n = 0, 1, 2,... (a) (2%) Find a 0, a 1, a 2, a 3 and a 4. (b) (2%) Show that

More information

A Modified Measure of Covert Network Performance

A Modified Measure of Covert Network Performance A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy

More information

Short Programs for functions on Curves

Short Programs for functions on Curves Short Programs for functions on Curves Victor S. Miller Exploratory Computer Science IBM, Thomas J. Watson Research Center Yorktown Heights, NY 10598 May 6, 1986 Abstract The problem of deducing a function

More information