skip to main content
Skip header Section
Number theory in science and communicationNovember 1984
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-0-387-12164-2
Published:01 November 1984
Pages:
324
Skip Bibliometrics Section
Reflects downloads up to 01 Jan 2025Bibliometrics
Abstract

No abstract available.

Cited By

  1. Brodzik A (2011). Construction of sparse representations of perfect polyphase sequences in Zak space with applications to radar and communications, EURASIP Journal on Advances in Signal Processing, 2011, (1-14), Online publication date: 1-Jan-2011.
  2. Shahabi C and Khoshgozaran A Location privacy in geospatial decision-making Proceedings of the 5th international conference on Databases in networked information systems, (1-15)
  3. Khoshgozaran A and Shahabi C Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy Proceedings of the 10th international conference on Advances in spatial and temporal databases, (239-257)
  4. Nishiguchi H, Imiya A and Sakai T Hierarchical tree of image derived by diffusion filtering Proceedings of the 11th international conference on Combinatorial Image Analysis, (453-465)
  5. Krengel E, Tirkel A and Hall T New sets of binary and ternary sequences with low correlation Proceedings of the Third international conference on Sequences and Their Applications, (220-235)
  6. Boussakta S, Alshibami O and Bouridane A (2004). Vector radix-4 × 4 for fast calculation of the 2-D new Mersenne number transform, Signal Processing, 84:12, (2231-2244), Online publication date: 1-Dec-2004.
  7. Brincat K (2019). On the Use of RSA as a Secret Key Cryptosystem, Designs, Codes and Cryptography, 22:3, (317-329), Online publication date: 1-Apr-2001.
  8. Tirkel A and Hall T (2001). A Unique Watermark for Every Image, IEEE MultiMedia, 8:4, (30-37), Online publication date: 1-Oct-2001.
  9. ACM
    Tirkel A and Hall T Watermarking at point of origin Proceedings of the 2000 ACM workshops on Multimedia, (135-138)
  10. MÄKILÄ P and PARTINGTON J (2019). Lethargy results in LTI System Modelling, Automatica (Journal of IFAC), 34:9, (1061-1070), Online publication date: 1-Sep-1998.
  11. Gold H (2019). A Markovian single server with upstream job and downstream demand arrival stream, Queueing Systems: Theory and Applications, 30:3/4, (435-455), Online publication date: 14-Jun-1998.
  12. ACM
    Odlyzko A Search for the maximum of a random walk Proceedings of the twenty-sixth annual ACM symposium on Theory of Computing, (336-345)
  13. ACM
    Gupta R, Smolka S and Bhaskar S (1994). On randomization in sequential and distributed algorithms, ACM Computing Surveys (CSUR), 26:1, (7-86), Online publication date: 1-Mar-1994.
  14. ACM
    Baker H (1992). Computing A*B (mod N) efficiently in ANSI C, ACM SIGPLAN Notices, 27:1, (95-98), Online publication date: 1-Jan-1992.
Contributors

Reviews

Albert Alkins Mullin

G. H. Hardy believed that the supreme beauty of number theory resided in the crisp rigor of its logic and the paucity of its practical applications. Surely the present book, which emphasizes the vigor and intuition of number theory, is a counterexample on both counts. The author uses a discursive and intuitive style, rather than the more conventional theorem-proof style. Contradictory as it may sound, this book is actually about intuitive number theory and its applications to cybernetics. To this extent, it uses a rare approach that H. Minkowski and A. M. Turing would have approved of. Indeed, the more intuitive the number theory, the more applicable it is, if true] Primary emphasis is given to elementary number theory and its applications, although formal analytic number theory is not ignored altogether. Among the numerous topics discussed are the following: Fibonacci numbers, cyclotomy; Fermat's Last Theorem (including one misleading sentence about G. Falting's important corollary to his positive solution of Mordell's 1922 Conjecture [1]); the failure of the general converse to Fermat's Theorem; Euler's function and its application to public-key cryptosystems; Galois Fields (finite fields) and their applications to coding theory; unique factorization; formulas for primes (but no mention of Matijasevic?'s integral polynomials [2] whose positive ranges represent all and only primes); the distribution of primes; the Riemann zeta-function and large nuclei, twin primes, squared squares, and electric circuits; diophantine equations in physics; primitive roots and their Fourier property; knapsack encryption; quadratic residues; spread spectrum techniques; fast Fourier transforms; coin tossing by telephone; Dirichlet series; partitions; cyclotomic polynomials; concert hall acoustics; active antenna arrays; and Gaussian primes. The book is very well written, but one must still wonder why so few of the classical number-theoretic ideas are not intuitively transformed; e.g., intuitively one could have applied the Fundamental Theorem to itself to obtain new infinite families of number-theoretic objects which generalize many classical number-theoretic objects and specialize others. Further, since most Fermat numbers are composite, how can they be classified and characterized__?__ Here one can prove that F 5, F0I6, F 6, F 7, F 8, are the only four consecutive Fermat numbers that are products of two distinct primes. Similar research could be done on Mersenne composites, too] Finally, it is unfortunate that the author did not devote some space to intuitive offsprings of Faltings' Theorem. In less than a page, he could have shown that Fermat's last Theorem is valid for at least 95 percent of all exponents n. In only slightly more space, he could have shown that Fermat's Last Theorem fails on a set of exponents n sparser than the primes. However, computer scientists may be saddened, since both proofs are noneffective, just as Go¨del's Completeness Theorem for First-Order Logic is noneffective (see [3]). The author has successfully pushed Intuitive Number Theory to its logical conclusions, but hasn't come close to pushing it to its intuitive conclusions. I could find only two candidate errors. On p. 17, the philosophical quotation is probably due to Dedekind rather than Gauss; on p. 39, delete n=2, since there cannot be any polygon for this case.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations