نتایج جستجو برای: روش gcd

تعداد نتایج: 371047  

Journal: :journal of linear and topological algebra (jlta) 2014
a assari

for two normal edge-transitive cayley graphs on groups h and k which have no common direct factor and gcd(jh=h ′j; jz(k)j) = 1 = gcd(jk=k ′j; jz(h)j), we consider four standard products of them and it is proved that only tensor product of factors can be normal edge-transitive.

Journal: :Evolutionary Intelligence 2020

2015
Rajat Mittal

A number b divides a if the remainder is zero. We denote it by b | a. b a denotes that b does not divide a. If b divides a then a is a multiple of b. Now we can define the greatest common divisor (GCD). The GCD of two numbers a and b is defined as the biggest number which divides both a as well as b. It is also denoted by gcd(a, b). One of the important case is when gcd(a, b) = 1, i.e., there i...

1996
Jean-Pierre Seifert

We study the approximability of the following NP-complete (in their feasibility recognition forms) number theoretic optimization problems: 1. x 2 Z n with minimum max 1in jxij satisfying P n i=1 xiai = gcd(a1; : : : ; an). We present a polynomial-time algorithm which approximates a minimum gcd set for a1; : : : ; an within a factor 1+ln n and prove that this algorithm is best possible in the se...

Journal: :Journal of Algorithms 2005

Journal: :ACM Communications in Computer Algebra 2019

Journal: :CoRR 2008
Maciej Dziemianczuk Wieslaw Bajguz

This note is a response to one of the problems posed by Kwa´sniewski in [1, 2], see also [3] i.e. GCD-morphic Problem III. We show that any GCD-morphic sequence F is at the point product of primary GCD-morphic sequences and any GCD-morphic sequence is encoded by natural number valued sequence satisfying condition (C1). The problem of general importance-for example in number theory was formulate...

2012
Gu Chun-sheng

Received Jul 17 th , 2012 Accepted Aug 26 th , 2012 Recently, many fully-homomorphic encryption schemes have been constructed. However, the issue of the security of these fully homomorphic encryptions has not been carefully studied. By using lattice reduction algorithm, we firstly present an attack on the fully homomorphic encryption based on approximate GCD over the integers. Our result shows ...

Journal: :International Mathematical Forum 2013

Journal: :Journal of Discrete Algorithms 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید