On the Bits Counting Function of Real Numbers

نویسنده

  • TANGUY RIVOAL
چکیده

Let Bn(x) denote the number of 1’s occuring in the binary expansion of an irrational number x > 0. A difficult problem is to provide non-trivial lower bounds for Bn(x) for interesting number numbers like √ 2, e or π: their conjectural simple normality in base 2 is equivalent to Bn(x) ∼ n/2. In this article, amongst other things, we prove inequalities relating Bn(x+y), Bn(xy) and Bn(1/x) to Bn(x) and Bn(y) for any irrational numbers x, y > 0, which we prove to be sharp up to a multiplicative constant. As a byproduct, we provide an answer to a question raised by Bailey et al. (On the binary expansions of algebraic numbers, J. Théor. Nombres Bordeaux 16 (2004), no. 3, 487–518) concerning the binary digits of the square of a series related to the Fibonacci sequence. We also obtain a slight refinement of the main theorem of the same article, which provides non-trivial lower bound for Bn(α) for any real irrational algebraic number. We conclude the article with effective or conjectural lower bounds for Bn(x) when x is a transcendental number.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Effects of Counting the Stride Numbers on the Parkinsonian Gait: Suggesting a Possible Reason for Dual Task Interference

Introduction: Parkinson Disease (PD) is a degenerative and progressive disorder of the central nervous system. It results from degeneration of Substantia Nigra pars compacta (SNc) of the Basal Ganglia (BG). Gait disturbances in PD patients generally get worse over time. The underlying mechanism of gait disturbances in PD has not been elucidated yet. Methods: In this study, we tried to analyze ...

متن کامل

On the computational complexity of finding a minimal basis for the guess and determine attack

Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...

متن کامل

Computing Bits of Algebraic Numbers

We initiate the complexity theoretic study of the problem of computing the bits of (real) algebraic numbers. This extends the work of Yap on computing the bits of transcendental numbers like π, in Logspace. Our main result is that computing a bit of a fixed real algebraic number is in C=NC 1⊆ L when the bit position has a verbose (unary) representation and in the counting hierarchy when it has ...

متن کامل

Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...

متن کامل

On the Means of the Values of Prime Counting Function

In this paper, we investigate the means of the values of prime counting function $pi(x)$. First, we compute the arithmetic, the geometric, and the harmonic means of the values of this function, and then we study the limit value of the ratio of them.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006