scholarly journals On the Pillai-Tijdeman Diophantine equation involving terms of Lucas sequences

Author(s):  
Mahadi Ddamulira ◽  
Florian Luca ◽  
Robert Tichy
Author(s):  
Hemar Godinho ◽  
Victor G. L. Neumann

In this paper, we consider the Diophantine equation in the title, where [Formula: see text] are distinct odd prime numbers and [Formula: see text] are natural numbers. We present many results given conditions for the existence of integers solutions for this equation, according to the values of [Formula: see text] and [Formula: see text]. Our methods are elementary in nature and are based upon the study of the primitive divisors of certain Lucas sequences as well as the factorization of certain polynomials.


2019 ◽  
Vol 17 (1) ◽  
pp. 942-946 ◽  
Author(s):  
Pavel Trojovský

Abstract In this paper, we shall study the Diophantine equation un = R(m)P(m)Q(m), where un is a Lucas sequence and R, P and Q are polynomials (under weak assumptions).


2015 ◽  
Vol 11 (04) ◽  
pp. 1259-1274 ◽  
Author(s):  
Jhon J. Bravo ◽  
Pranabesh Das ◽  
Sergio Guzmán ◽  
Shanta Laishram

In this paper, we consider the usual Pell and Pell–Lucas sequences. The Pell sequence [Formula: see text] is given by the recurrence un = 2un-1 + un-2 with initial condition u0 = 0, u1 = 1 and its associated Pell–Lucas sequence [Formula: see text] is given by the recurrence vn = 2vn-1 + vn-2 with initial condition v0 = 2, v1 = 2. Let n, d, k, y, m be positive integers with m ≥ 2, y ≥ 2 and gcd (n, d) = 1. We prove that the only solutions of the Diophantine equation unun+d⋯un+(k-1)d = ym are given by u7 = 132 and u1u7 = 132 and the equation vnvn+d⋯vn+(k-1)d = ym has no solution. In fact, we prove a more general result.


2016 ◽  
Vol 4 (2) ◽  
pp. 107-119
Author(s):  
A. D. Godase ◽  
M. B. Dhakne
Keyword(s):  

2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Jayashree Nair ◽  
T. Padma

This paper describes an authentication scheme that uses Diophantine equations based generation of the secret locations to embed the authentication and recovery watermark in the DWT sub-bands. The security lies in the difficulty of finding a solution to the Diophantine equation. The scheme uses the content invariant features of the image as a self-authenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark for visual authentication, both embedded securely using secret locations generated from solution of the Diophantine equations formed from the PQ sequences. The scheme is mildly robust to Jpeg compression and highly robust to Jpeg2000 compression. The scheme also ensures highly imperceptible watermarked images as the spatio –frequency properties of DWT are utilized to embed the dual watermarks.


Mathematics ◽  
2021 ◽  
Vol 9 (15) ◽  
pp. 1813
Author(s):  
S. Subburam ◽  
Lewis Nkenyereye ◽  
N. Anbazhagan ◽  
S. Amutha ◽  
M. Kameswari ◽  
...  

Consider the Diophantine equation yn=x+x(x+1)+⋯+x(x+1)⋯(x+k), where x, y, n, and k are integers. In 2016, a research article, entitled – ’power values of sums of products of consecutive integers’, primarily proved the inequality n= 19,736 to obtain all solutions (x,y,n) of the equation for the fixed positive integers k≤10. In this paper, we improve the bound as n≤ 10,000 for the same case k≤10, and for any fixed general positive integer k, we give an upper bound depending only on k for n.


Sign in / Sign up

Export Citation Format

Share Document