On the distribution of odd values of2a-regular partition functions
نویسندگان
چکیده
منابع مشابه
Odd values of the partition function
Let p(n) denote the number of partitions of an integer n. Recently the author has shown that in any arithmetic progression r (mod t), there exist infinitely many N for which p(N) is even, and there are infinitely many M for which p(M) is odd, provided there is at least one such M. Here we construct finite sets of integers Mi for which p(Mi) is odd for an odd number of i. Whereas Euler’s recurre...
متن کاملOn the Distribution of Values of Certain Divisor Functions
Let {Ed} be a sequence of nonnegative numbers and f(n) = E Ed , the suns being over divisors d of n. We say that f has the distribution function F if for all c > 0, the number of integers n c x for which f (n) > c is asymptotic to xF(c), and we investigate when F exists and when it is continuous. Let {E d } be a sequence of nonnegative numbers and Is it true that for all c > 0, f (n) _ y Ed. di...
متن کاملThe Distribution of Values of Analytic Functions on Convex Sets
Proceeding the study of local properties of analytic functions started in [Br] we prove new dimensionless inequalities for such functions in terms of their Chebyshev degree. As a consequence we obtain the reverse Hölder inequalities for analytic functions with absolute (i.e., independent of dimension) constants. For polynomials such inequalities were recently proved by Bobkov who sharpened and ...
متن کاملTime-reversal odd distribution functions in leptoproduction
In this paper we study the effects of the possible presence of time-reversal ~T! odd distribution functions in leptoproduction. We limit ourselves to the production of hadrons in the current fragmentation region, for which we assume that the cross section factorizes into a product of a distribution function and a fragmentation function. Including the effects of transverse momenta, the cross sec...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Number Theory
سال: 2014
ISSN: 0022-314X
DOI: 10.1016/j.jnt.2014.03.008