Home Mathematics On the recursive properties of one kind hybrid power mean involving two-term exponential sums and Gauss sums
Article Open Access

On the recursive properties of one kind hybrid power mean involving two-term exponential sums and Gauss sums

  • Shimeng Shen EMAIL logo
Published/Copyright: August 24, 2018

Abstract

The main purpose of this paper is to study the computational problem of one kind hybrid power mean involving two-term exponential sums and quartic Gauss sums using the analytic method and the properties of the classical Gauss sums, and to prove some interesting fourth-order linear recurrence formulae for this problem. As an application of our result, we can also obtain an exact computational formula for one kind congruence equation mod p, an odd prime.

MSC 2010: 11L05; 11L07

1 Introduction

Let p ≥ 3 be an odd prime. For any integer m with (m,p) = 1, the quartic Gauss sums B(m) = B(m, p) is defined as

B(m)=a=0p1ema4p,

where as usual, e(y) = e2πiy.

Recently, some scholars have studied the hybrid power mean problems of various trigonometric sums, and obtained many interesting results. For example, Chen Li and Hu Jiayuan [1] studied the computational problem of the hybrid power mean

Sk(p)=m=1p1a=0p1ema3pkc=1p1emc+c¯p2,

where c denotes the multiplicative inverse of c mod p. That is, cc ≡ 1 mod p.

For p ≡ 1 mod 3, they used the elementary method to obtain an interesting third-order linear recurrence formula for Sk(p).

Li Xiaoxue and Hu Jiayuan [2] studied the computational problem of the hybrid power mean

b=1p1a=0p1eba4p2c=1p1ebc+c¯p2,(1)

and proved an exact computational formula for (1).

Zhang Han and Zhang Wenpeng [3] proved the identity

m=1p1a=0p1ema3+nap4=2p3p2if3p1,2p37p2if3|p1.

Other related results can also be found in references [4,5,6,7,8,9,10,11,12,13].

In this paper, we will consider the calculating problem of the following hybrid power mean:

Vk(p)=m=1p1a=0p1ema4pkb=0p1emb4+bp3,(2)

where k ≥ 0 is an integer.

If p = 4h + 3, then from the properties of the Legendre’s symbol mod p we have (see [14], formula (30) in Chapter 9)

a=0p1ema4p=1+a=1p11+χ2(a)ema2p=a=0p1ema2p=iχ2(m)p,

where χ2 = p denotes the Legendre’s symbol mod p.

So in this case, the problem we considered in (2) is trivial. If p = 4h + 1, then the situation is more complicated. We will use the analytic method and the properties of classical Gauss sums to study this problem, and prove some new interesting fourth-order linear recurrence formulae for (2) with p = 4 h + 1. That is, we will give the following four results.

Theorem 1.1

Let p be a prime with p = 24 h + 1. Then for any integer k ≥ 4, we have the fourth-order linear recurrence formula

Vk(p)=6pVk2(p)+8pαVk3(p)pp4α2Vk4(p),

where the first four values are V0(p) = p2 – 6, V1(p) = p(p2 – 16p – 4α2), V2(p) = p2(2 + 3p – 58α) and V3(p) = p2(7p2 + 4 – 92p – 72α2), α= α(p) = a=1p12a+a¯pis an integer, which satisfies the identity (see Theorem 4-11in [15])

p=α2+β2a=1p12a+a¯p2+a=1p12a+ra¯p2,

which r is any quadratic non-residue mod p.

Theorem 1.2

Let p be a prime with p = 24h + 17. Then for any integer k ≥ 4, we have the fourth-order linear recurrence formula

Vk(p)=6pVk2(p)+8pαVk3(p)pp4α2Vk4(p),

where the first four values are V0(p) = – p2 – 6, V1(p) = p(p2 – 18p – 4α2), V2(p) = p2(2 – 3p – 62α) and V3(p) = p2(7p2 – 4 – 106p – 72α2).

Theorem 1.3

Let p be a prime with p = 24h + 5. Then for any integer k ≥ 4, we have the fourth-order linear recurrence formula

Vk(p)=2pVk2(p)+8pαVk3(p)p9p4α2Vk4(p),

where the first four terms are V0(p) = –(p2 + 6), V1(p) = – p(p2 – 8p + 4α2), V2(p) = – p2(2p – 22α) and V3(p) = p2(5p2 – 6 – 28p – 36α2).

Theorem 1.4

Let p be a prime with p = 24h + 13. Then for any integer k ≥ 4, we have the fourth-order linear recurrence formula

Vk(p)=2pVk2(p)+8pαVk3(p)p9p4α2Vk4(p),

where the first four terms are V0(p) = p2 – 6, V1(p) = – p(p2 – 6p + 4α2), V2(p) = – p2(2 + p – 18α) and V3(p) = p2(5p2 + 6 – 18p – 36α2).

From our theorems we may immediately deduce the following:

Corollary 1.5

Let p be a prime with p ≡ 1 mod 4, then we have the identity

m=1p1a=0p1ema4p3b=0p1emb4+bp3=p27p2+4pα92p72α2ifp=24h+1,p27p24pα106p72α2ifp=24h+17,p25p26pα28p36α2ifp=24h+5,p25p2+6pα18p36α2ifp=24h+13.

Note that the estimate |α| ≤ p, from Corollary 1.5 we also have the following:

Corollary 1.6

Let p be a prime with p ≡ 1 mod 8, then we have the asymptotic formula

m=1p1a=0p1ema4p3b=0p1emb4+bp3=7p4+Op72.

Corollary 1.7

Let p be a prime with p ≡ 5 mod 8, then we have the asymptotic formula

m=1p1a=0p1ema4p3b=0p1emb4+bp3=5p4+Op72.

For any prime p with p ≡ 1 mod 4 and any positive integer k, let Mk(p) denote the number of the solutions of the congruence equation

x14+x24++xk4+y14+y24+y340modp,y1+y2+y30modp,

where 0 ≤ xi, yjp – 1, i = 1, 2, …, k, j = 1, 2, 3.

Then from our theorems we can give an exact computational formula for Mk(p). For example, let Hs(p) denote the number of the congruence equation

x14+x24++xs40modp,0xip1,i=1,2,s.

Then we have the identity

Vk(p)=p2p1Mk(p)pp1Hk(p).

Since Hk(p) has a fourth-order linear recurrence formula (see [8]), so from the above formula and our theorems we can deduce the exact value of Mk(p).

2 Several lemmas

To complete the proofs of our theorems, we need to prove four simple lemmas. Hereafter, we will use many properties of the classical Gauss sums and the fourth-order character mod p, all of which can be found in books concerning Elementary Number Theory or Analytic Number Theory, such as references [7], [14] or [15]. Some important results related to Gauss sums can also be found in [16] and [17]. These contents will not be repeated here. First we have the following:

Lemma 2.1

Let p be a prime with p ≡ 1 mod 4, λ be any fourth-order character mod p, then we have

τ2(λ)+τ2λ¯=pa=1p1a+a¯p=2pα,

whereτ(λ)=a=1p1λ(a)eapdenotes the classical Gauss sums, andpis the Legendre’s symbol mod p.

Proof

In fact this is Lemma 2 of [18], so its proof is omitted. □

Lemma 2.2

Let p be a prime with p ≡ 1 mod 4, then for any fourth-order character λ mod p, we have the identity

m=1p1λ(m)a=0p1ema4+ap3=5pτ(λ)2pατλ¯ifp1mod8,pτ(λ)2pατλ¯ifp5mod8,

where αis the same as in Lemma 2.1.

Proof

First applying trigonometric identity

m=1qenmq=qifqn,0ifqn(3)

and note that λ4 = χ0, the principal character mod p, we have

m=1p1λ(m)a=0p1ema4+ap3=m=1p1λ(m)a=0p1ema4+ap2+m=1p1λ(m)a=0p1ema4+ap2a=1p1ema4+ap=τ(λ)a=0p1b=0p1λ¯a4+b4+1c=1p1ec(a+b+1)p+τ(λ)a=0p1b=0p1λ¯a4+b4ea+bp=τ(λ)pa=0p1b=0p1a+b+10modpλ¯a4+b4+1τ(λ)a=0p1b=0p1λ¯a4+b4+1τ(λ)+τ(λ)a=0p1λ¯a4+1b=1p1eb(a+1)p.(4)

From (3) we have

τ(λ)a=0p1λ¯a4+1b=1p1eb(a+1)p=λ¯(2)τ(λ)(p1)τ(λ)a=0p2λ¯a4+1=λ¯(2)τ(λ)pτ(λ)a=0p1λ¯a4+1.(5)

Note that the identity λχ2 = λ and

B(m)=a=0p1ema4p=χ2(m)p+λ¯(m)τ(λ)+λ(m)τλ¯.(6)

From (6) we have

τ(λ)a=0p1λ¯a4+1=b=1p1λ(b)a=0p1eba4+1p=b=1p1λ(b)χ2(b)p+λ¯(b)τ(λ)+λ(b)τλ¯ebp=pτλ¯τ(λ)+pτλ¯=2pτλ¯τ(λ).(7)

If p ≡ 5 bmod 8, then note that λ(–1) = –1 and, τ(λ)τ(λ) = –p, applying (6) and Lemma 2.1 we also have

a=0p1b=0p1λ¯a4+b4+1=1τ(λ)c=1p1λ(c)a=0p1b=0p1eca4+cb4+cp=1τ(λ)c=1p1λ(c)ecpa=0p1eca4p2=1τ(λ)c=1p1λ(c)ecpχ2(b)p+λ¯(b)τ(λ)+λ(b)τλ¯2=1τ(λ)c=1p1λ(c)2χ2(c)pαp+2λ(c)pτ(λ)+2λ¯(c)pτλ¯ecp=p+2pα1τλ¯τ(λ).(8)

Note that λ2 = χ2 = λ2 and the congruence, a + b + 1 ≡ 0 mod p implies the congruence a4 + b4 + 1 ≡ 2(a2 + a + 1)2 mod p. So we have

a=0p1b=0p1a+b+10modpλ¯a4+b4+1=a=0p1λ¯2a2+a+12=λ¯(2)a=0p1χ2a2+a+1=λ¯(2)a=0p1χ24a2+4a+4=λ¯(2)a=0p1χ2(2a+1)2+3=λ¯(2)a=0p1χ2a2+3=λ¯(2).(9)

Combining (4), (5), (7), (8) and (9) we have the identity

m=1p1λ(m)a=0p1ema4+ap3=pτ(λ)2pατλ¯.(10)

If p ≡ 1 mod 8, then λ(–1) = 1 and τ(λ)τ(λ) = p, from the method of proving (8) we have

a=0p1b=0p1λ¯a4+b4+1=1τ(λ)c=1p1λ(c)a=0p1b=0p1eca4+cb4+cp=1τ(λ)c=1p1λ(c)ecpχ2(b)p+λ¯(b)τ(λ)+λ(b)τλ¯2=1τ(λ)c=1p1λ(c)3p+2χ2(c)pα+2λ(c)pτ(λ)+2λ¯(c)pτλ¯ecp=5p+2pα1τλ¯τ(λ).(11)

Combining (4), (5), (7), (8) and (11) we have the identity

m=1p1λ(m)a=0p1ema4+ap3=5pτ(λ)2pατλ¯.(12)

Now Lemma 2.2 follows from (10) and (12). □

Lemma 2.3

Let p be a prime with p ≡ 1 mod 4, then we have the identity

m=1p1a=0p1ema4+ap3=p26pαifp=24h+1orp=24h+13,p26pαifp=24h+5orp=24h+17.

Proof

From (3) we have

m=1p1a=0p1ema4+ap3=pa=0p1b=0p1c=0p1a4+b4+c40modpea+b+cp=pa=0p1b=0p1a4+b40modpea+bp+pa=0p1b=0p1a4+b4+10modpc=1p1ec(a+b++1)p=pa=0p1a40modpeap+pa=0p1a4+10modpb=1p1eb(a+1)p+p2a=0p1b=0p1a4+b4+10modpa+b+10modp1pa=0p1b=0p1a4+b4+10modp1=ppa=0p1a4+10modp1+p2a=0p1b=0p1a4+b4+10modpa+b+10modp1pa=0p1b=0p1a4+b4+10modp1.(13)

Now we calculate each term in (13). If p ≡ 5 mod 8, then note that λ(–1) = –1 we have

pa=0p1a4+10modp1=0.(14)

Applying (6) and Lemma 2.1 we have

pa=0p1b=0p1a4+b4+10modp1=a=0p1b=0p1m=0p1ema4+b4+1p=p2+m=1p1a=0p1ema4p2emp=p2+m=1p12χ2(c)pαp+2λ(c)pτ(λ)+2λ¯(c)pτλ¯emp=p2+2pα+p+2pτ2(λ)+2pτ2λ¯=p2+p+6pα.(15)

It is clear that the congruences a4 + b4 + 1 ≡ 0 mod p and a + b + 1 ≡ 0 mod p implies that ab ≡ 1 mod p and a3 ≡ b3 ≡ 1 mod p with ab. So we have

p2a=0p1b=0p1a4+b4+10modpa+b+10modp1=p2a=2p1b=2p1a3b31modpab1modp1=2p2ifp1mod3,0ifp2mod3.(16)

Applying (13), (14), (15) and (16) we have the identity

m=1p1a=0p1ema4+ap3=p26pαifp=24h+13,p26pαifp=24h+5.(17)

If p ≡ 1 mod 8, then we also have

pa=0p1a4+10modp1=4p.(18)
pa=0p1b=0p1a4+b4+10modp1=a=0p1b=0p1m=0p1ema4+b4+1p=p2+m=1p13p+2χ2(c)pα+2λ(c)pτ(λ)+2λ¯(c)pτλ¯emp=p2+2pα3p+2pτ2(λ)+2pτ2λ¯=p23p+6pα.(19)
p2a=0p1b=0p1a4+b4+10modpa+b+10modp1=p2a=2p1b=2p1a3b31modpab1modp1=2p2ifp=24h+1,0ifp=24h+17.(20)

Applying (13), (18), (19) and (20) we have

m=1p1a=0p1ema4+ap3=p26pα ifp=24h+1,p26pα ifp=24h+17.(21)

It is clear that Lemma 2.3 follows from (17) and (21). □

Lemma 2.4

Let p be a prime with p ≡ 1 mod 4, then we have the identity

m=1p1χ2(m)a=0p1ema4+ap3=p32(p6)ifp=24h+1,p32(p8)ifp=24h+17,p32(p4)ifp=24h+13,p32(p6)ifp=24h+5.

Proof

From the properties of the Legendre’s symbol mod p we have

m=1p1χ2(m)a=0p1ema4+ap3=m=1p1χ2(m)a=0p1ema4+ap2+m=1p1χ2(m)a=0p1ema4+ap2c=1p1emc4+cp=pa=1p1eap+pa=0p1χ2a4+1b=1p1eb(a+1)p+pa=0p1b=0p1χ2a4+b4+1c=1p1ec(a+b+1)p=p+χ2(2)p32pa=0p1χ2a4+1pa=0p1b=0p1χ2a4+b4+1+p32a=0p1b=0p1a+b+10modpχ2a4+b4+1.(22)

From the properties of fourth-order mod p and Lemma 2.1 we have

a=0p1χ2a4+1=1+a=1p1χ2(a+1)1+λ(a)+χ2(a)+λ¯(a)=1pτ2(λ+τ2λ¯1=2α1.(23)
a=0p1b=0p1a+b+10modpχ2a4+b4+1=a=0p1χ2a4+(a+1)4+1=χ2(2)a=0p1χ2a4+2a3+3a2+2a+1=χ2(2)a=0p1χ2a2+a+12=χ2(2)p ifp=12h+1,χ2(2)(p2) ifp=12h+5.(24)

Note that τ(λ)τ(λ) = –p, if p = 8h+5. τ(λ)τ(λ) = p, if p = 8h+1. From the method of proving (15) and (19) we have

pa=0p1b=0p1χ2a4+b4+1=a=0p1b=0p1m=1p1χ2(m)ema4+mb4+mp=m=1p1χ2(m)χ2p+λ(m)τλ¯+λ¯(m)τ(λ)2emp=7p322pα if p=8h+1,5p322pα if p=8h+5.(25)

Combining (22), (23), (24) and (25) we have

m=1p1χ2(m)a=0p1ema4+ap3=p32(p6) if p=24h+1,p32(p8) if p=24h+17,p32(p4) if p=24h+13,p32(p6) if p=24h+5.

This proves Lemma 2.4. □

3 Proofs of the theorems

Now we prove our main results. First we prove Theorem 1.1. If p = 24h + 1, then from Lemmas 2.1, 2.2 and 2.4 we have

V1(p)=m=1p1B(m)a=0p1ema4+ap3=m=1p1χ2(m)p+λ¯(m)τ(λ)+λ(m)τλ¯a=0p1ema4+ap3=p2(p6)5p22pατ2λ5p22pατ2λ¯=pp216p4α2.(26)

Applying Lemmas 2.12.4 we also have

V2(p)=m=1p1B2(m)a=0p1ema4+ap3=m=1p1χ2(m)p+λ¯(m)τ(λ)+λ(m)τλ¯2a=0p1ema4+ap3=m=1p13p+2χ2(m)pα+2λ(m)pτ(λ)+2λ¯(m)pτλ¯a=0p1ema4+ap3=p22pα+3p58α.(27)

If p = 8h + 1, then from (6) we have

B3(m)=χ2(m)p+λ¯(m)τ(λ)+λ(m)τλ¯3=7χ2(m)p32+4pα+5pλ¯(m)τ(λ)+λ(m)τλ¯+2λ¯(m)τλ¯+λ(m)τλpα.(28)

So if p = 24h + 1, then from (28), Lemmas 2.12.4 we have

V3(p)=m=1p1B3(m)a=0p1ema4+ap3=7p3(p6)+4pαp26pα5pτλ¯5pτ(λ)+2pατλ¯5pτλ5pτλ¯+2pατλ2pατ(λ)5pτ(λ)+2pατλ¯2pατλ¯5pτλ¯+2pατλ=p27p2+4pα92p72α2.(29)

If p = 24h + 17, then from Lemmas 2.12.4 we have

V1(p)=m=1p1B(m)a=0p1ema4+ap3=p2(p8)5p22pατ2λ5p22pατ2λ¯=pp218p4α2.(30)
V2(p)=m=1p1B2(m)a=0p1ema4+ap3=m=1p13p+2χ2(c)pα+2λ(c)pτ(λ)+2λ¯(c)pτλ¯a=0p1ema4+ap3=p22pα3p62α.(31)

Applying (28) and the method of proving (29) we also have

V3(p)=m=1p1B3(m)a=0p1ema4+ap3=7p3(p8)4pαp2+6pα5pτλ¯5pτ(λ)+2pατλ¯5pτλ5pτλ¯+2pατλ2pατ(λ)5pτ(λ)+2pατλ¯2pατλ¯5pτλ¯+2pατλ=p27p24pα106p72α2.(32)

Similarly, if p = 24h + 5, then we have

V1(p)=m=1p1B(m)a=0p1ema4+ap3=p2(p6)+p22pατ2λ+p22pατ2λ¯=pp28p+4α2.(33)
V2(p)=m=1p1B2(m)a=0p1ema4+ap3=m=1p1χ2(m)p+λ¯(m)τ(λ)+λ(m)τλ¯2a=0p1ema4+ap3=m=1p12χ2(c)pαp+2λ(c)pτ(λ)+2λ¯(c)pτλ¯a=0p1ema4+ap3=p22pαp22α.(34)

If p = 24h + 5, then from (6) we have

B3(m)=χ2(m)p+λ¯(m)τ(λ)+λ(m)τλ¯3=5χ2(m)p32+6pα+pλ¯(m)τ(λ)+λ(m)τλ¯+2λ¯(m)τλ¯+λ(m)τλpα.(35)

So from (35) and the method of proving (29) we have

V3(p)=m=1p1B3(m)a=0p1ema4+ap3=5p3(p6)6pαp2+6pαpτλ¯pτ(λ)+2pατλ¯pτλpτλ¯+2pατλ2pατ(λ)pτ(λ)+2pατλ¯2pατλ¯pτλ¯+2pατλ=p25p26pα28p36α2.(36)

If p = 24h + 13, then (35), Lemmas 2.12.4 we have

V1(p)=m=1p1B(m)a=0p1ema4+ap3=p2(p4)+p22pατ2λ+p22pατ2λ¯=pp26p+4α2.(37)
V2(p)=m=1p1B2(m)a=0p1ema4+ap3=m=1p1χ2(m)p+λ¯(m)τ(λ)+λ(m)τλ¯2a=0p1ema4+ap3=m=1p12χ2(c)pαp+2λ(c)pτ(λ)+2λ¯(c)pτλ¯a=0p1ema4+ap3=p22pα+p18α.(38)
V3(p)=m=1p1B3(m)a=0p1ema4+ap3=5p3(p4)+6pαp26pαpτλ¯pτ(λ)+2pατλ¯pτλpτλ¯+2pατλ2pατ(λ)pτ(λ)+2pατλ¯2pατλ¯pτλ¯+2pατλ=p25p2+6pα18p36α2.(39)

Finally, note that if p = 8h + 1, then from (6) and direct calculation (or see Lemma 3 in [7]) we have the identity

B4(m)=6pB2(m)+8pαB(m)pp4α2.(40)

For any prime p = 24h + 1 and integer k ≥ 4, from (26), (27), (29) and (40) we may immediately deduce the fourth-order linear recurrence formula

Vk(p)=m=1p1Bk(m)a=0p1ema4+ap3=m=1p1Bk4(m)6pB2(m)+8pαB(m)pp4α2a=0p1ema4+ap3=6pVk2(p)+8pαVk3(p)pp4α2Vk4(p),

where the first four values V0(p) = p2 – 6p α, V1(p) = p(p2 – 16p – 4α2), V2(p) = p2(2+3p – 58α) and V3(p) = p2(7p2+4p α – 92p – 72α2).

This proves Theorem 1.1.

If p = 24h + 17, then from (30), (31), (32) and (40) we have

Vk(p)=6pVk2(p)+8pαVk3(p)pp4α2Vk4(p),

where the first four values V0(p) = – p2 – 6p α, V1(p) = p(p2 – 18p – 4α2), V2(p) = p2(2p α – 3p – 62α) and V3(p) = p2(7p2 – 4p α – 106p – 72α2).

This proves Theorem 1.2.

If p = 8h + 5, then from (6) and direct calculation (or see Lemma 3 in [7]) we also have

B4(m)=6pB2(m)+8pαB(m)pp4α2.(41)

For any prime p = 24h + 5 and integer k ≥ 4, from (33), (34), (35) and (41) we can deduce the fourth-order linear recurrence formula

Vk(p)=6pVk2(p)+8pαVk3(p)pp4α2Vk4(p),

where the first four terms are V0(p) = –(p2+6p α), V1(p) = – p(p2 – 8p + 4α2), V2(p) = –p2(2p αp – 22α) and V3(p) = p2(5p2 – 6p α – 28p – 36α2).

This proves Theorem 1.3.

If p = 24h + 13, then from (37), (38), (39) and (41) we also have

Vk(p)=2pVk2(p)+8pαVk3(p)p9p4α2Vk4(p),

where the first four terms are V0(p) = p2 – 6p α, V1(p) = – p(p2 – 6p + 4α2), V2(p) = –p2(2p α+p – 18α) and V3(p) = p2(5p2+6p α – 18p – 36α2).

This completes the proofs of our all results.

Acknowledgement

The author would like to thank the referees for their very helpful and detailed comments, which have significantly contributed to improving the presentation of this paper. This work is supported by the N. S. F. (11771351) of P. R. China and Northwest University Graduate Innovation and Creativity Founds (YZZ17086).

References

[1] Chen L., Hu J. Y., A linear recurrence formula involving cubic Gauss sums and Kloosterman sums, Acta Mathematica Sinica (Chinese Series), 2018, 61, 67–72.Search in Google Scholar

[2] Li X. X., Hu J. Y., The hybrid power mean quartic Gauss sums and Kloosterman sums, Open Mathematics, 2017, 15, 151–156.10.1515/math-2017-0014Search in Google Scholar

[3] Zhang H., Zhang W. P., The fourth power mean of two-term exponential sums and its application, Mathematical Reports, 2017, 19, 75–83.Search in Google Scholar

[4] Chowla S., Cowles J. and Cowles M., On the number of zeros of diagonal cubic forms, Journal of Number Theory, 1977, 9, 502–506.10.1016/0022-314X(77)90010-5Search in Google Scholar

[5] Cochrane T. Pinner C., Using Stepanov’s method for exponential sums involving rational functions, Journal of Number Theory, 2006, 116, 270–292.10.1016/j.jnt.2005.04.001Search in Google Scholar

[6] Han D., A Hybrid mean value involving two-term exponential sums and polynomial character sums, Czechoslovak Mathematical Journal, 2014, 64, 53–62.10.1007/s10587-014-0082-0Search in Google Scholar

[7] Hua L. K., Introduction to Number Theory, Science Press, Beijing, 1979.Search in Google Scholar

[8] Shen S. M., Zhang W. P., On the quartic Gauss sums and their recurrence property, Advances in Difference Equations, 2017, 2017: 4310.1186/s13662-017-1097-2Search in Google Scholar

[9] Weil A., On some exponential sums, Proc. Nat. Acad. Sci. U.S.A., 1948, 34, 204–207.10.1073/pnas.34.5.204Search in Google Scholar

[10] Zhang W. P., On the fourth power mean of the general Kloosterman sums, Journal of Number Theory, 2016, 169, 315–326.10.1016/j.jnt.2016.05.018Search in Google Scholar

[11] Zhang W. P., Han D., On the sixth power mean of the two-term exponential sums, Journal of Number Theory, 2014, 136, 403–413.10.1016/j.jnt.2013.10.022Search in Google Scholar

[12] Zhang W. P., Hu J. Y., The number of solutions of the diagonal cubic congruence equation mod p, Mathematical Reports, 2018, 20, 73–80.Search in Google Scholar

[13] Zhang W. P., Liu H. N., On the general Gauss sums and their fourth power mean, Osaka Journal of Mathematics, 2005, 42, 189–199.Search in Google Scholar

[14] Apostol T. M., Introduction to Analytic Number Theory, Springer-Verlag, New York, 1976.10.1007/978-1-4757-5579-4Search in Google Scholar

[15] Zhang W. P., Li H. L., Elementary Number Theory, Shaanxi Normal University Press, Xi’an, Shaanxi, 2008.Search in Google Scholar

[16] Berndt B. C., Evans R. J., Sums of Gauss, Jacobi, and Jacobsthal, Journal of Number Theory, 1979, 11, 349–389.10.1016/0022-314X(79)90008-8Search in Google Scholar

[17] Berndt B. C., Evans R. J., The determination of Gauss sums, Bulletin of the American Mathematical Society, 1981, 5, 107–128.10.1090/S0273-0979-1981-14930-2Search in Google Scholar

[18] Chen Z. Y., Zhang W. P., On the fourth-order linear recurrence formula related to classical Gauss sums, Open Mathematics, 2017, 15, 1251–1255.10.1515/math-2017-0104Search in Google Scholar

Received: 2018-05-24
Accepted: 2018-06-29
Published Online: 2018-08-24

© 2018 Shen, published by De Gruyter

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.

Articles in the same Issue

  1. Regular Articles
  2. Algebraic proofs for shallow water bi–Hamiltonian systems for three cocycle of the semi-direct product of Kac–Moody and Virasoro Lie algebras
  3. On a viscous two-fluid channel flow including evaporation
  4. Generation of pseudo-random numbers with the use of inverse chaotic transformation
  5. Singular Cauchy problem for the general Euler-Poisson-Darboux equation
  6. Ternary and n-ary f-distributive structures
  7. On the fine Simpson moduli spaces of 1-dimensional sheaves supported on plane quartics
  8. Evaluation of integrals with hypergeometric and logarithmic functions
  9. Bounded solutions of self-adjoint second order linear difference equations with periodic coeffients
  10. Oscillation of first order linear differential equations with several non-monotone delays
  11. Existence and regularity of mild solutions in some interpolation spaces for functional partial differential equations with nonlocal initial conditions
  12. The log-concavity of the q-derangement numbers of type B
  13. Generalized state maps and states on pseudo equality algebras
  14. Monotone subsequence via ultrapower
  15. Note on group irregularity strength of disconnected graphs
  16. On the security of the Courtois-Finiasz-Sendrier signature
  17. A further study on ordered regular equivalence relations in ordered semihypergroups
  18. On the structure vector field of a real hypersurface in complex quadric
  19. Rank relations between a {0, 1}-matrix and its complement
  20. Lie n superderivations and generalized Lie n superderivations of superalgebras
  21. Time parallelization scheme with an adaptive time step size for solving stiff initial value problems
  22. Stability problems and numerical integration on the Lie group SO(3) × R3 × R3
  23. On some fixed point results for (s, p, α)-contractive mappings in b-metric-like spaces and applications to integral equations
  24. On algebraic characterization of SSC of the Jahangir’s graph 𝓙n,m
  25. A greedy algorithm for interval greedoids
  26. On nonlinear evolution equation of second order in Banach spaces
  27. A primal-dual approach of weak vector equilibrium problems
  28. On new strong versions of Browder type theorems
  29. A Geršgorin-type eigenvalue localization set with n parameters for stochastic matrices
  30. Restriction conditions on PL(7, 2) codes (3 ≤ |𝓖i| ≤ 7)
  31. Singular integrals with variable kernel and fractional differentiation in homogeneous Morrey-Herz-type Hardy spaces with variable exponents
  32. Introduction to disoriented knot theory
  33. Restricted triangulation on circulant graphs
  34. Boundedness control sets for linear systems on Lie groups
  35. Chen’s inequalities for submanifolds in (κ, μ)-contact space form with a semi-symmetric metric connection
  36. Disjointed sum of products by a novel technique of orthogonalizing ORing
  37. A parametric linearizing approach for quadratically inequality constrained quadratic programs
  38. Generalizations of Steffensen’s inequality via the extension of Montgomery identity
  39. Vector fields satisfying the barycenter property
  40. On the freeness of hypersurface arrangements consisting of hyperplanes and spheres
  41. Biderivations of the higher rank Witt algebra without anti-symmetric condition
  42. Some remarks on spectra of nuclear operators
  43. Recursive interpolating sequences
  44. Involutory biquandles and singular knots and links
  45. Constacyclic codes over 𝔽pm[u1, u2,⋯,uk]/〈 ui2 = ui, uiuj = ujui
  46. Topological entropy for positively weak measure expansive shadowable maps
  47. Oscillation and non-oscillation of half-linear differential equations with coeffcients determined by functions having mean values
  48. On 𝓠-regular semigroups
  49. One kind power mean of the hybrid Gauss sums
  50. A reduced space branch and bound algorithm for a class of sum of ratios problems
  51. Some recurrence formulas for the Hermite polynomials and their squares
  52. A relaxed block splitting preconditioner for complex symmetric indefinite linear systems
  53. On f - prime radical in ordered semigroups
  54. Positive solutions of semipositone singular fractional differential systems with a parameter and integral boundary conditions
  55. Disjoint hypercyclicity equals disjoint supercyclicity for families of Taylor-type operators
  56. A stochastic differential game of low carbon technology sharing in collaborative innovation system of superior enterprises and inferior enterprises under uncertain environment
  57. Dynamic behavior analysis of a prey-predator model with ratio-dependent Monod-Haldane functional response
  58. The points and diameters of quantales
  59. Directed colimits of some flatness properties and purity of epimorphisms in S-posets
  60. Super (a, d)-H-antimagic labeling of subdivided graphs
  61. On the power sum problem of Lucas polynomials and its divisible property
  62. Existence of solutions for a shear thickening fluid-particle system with non-Newtonian potential
  63. On generalized P-reducible Finsler manifolds
  64. On Banach and Kuratowski Theorem, K-Lusin sets and strong sequences
  65. On the boundedness of square function generated by the Bessel differential operator in weighted Lebesque Lp,α spaces
  66. On the different kinds of separability of the space of Borel functions
  67. Curves in the Lorentz-Minkowski plane: elasticae, catenaries and grim-reapers
  68. Functional analysis method for the M/G/1 queueing model with single working vacation
  69. Existence of asymptotically periodic solutions for semilinear evolution equations with nonlocal initial conditions
  70. The existence of solutions to certain type of nonlinear difference-differential equations
  71. Domination in 4-regular Knödel graphs
  72. Stepanov-like pseudo almost periodic functions on time scales and applications to dynamic equations with delay
  73. Algebras of right ample semigroups
  74. Random attractors for stochastic retarded reaction-diffusion equations with multiplicative white noise on unbounded domains
  75. Nontrivial periodic solutions to delay difference equations via Morse theory
  76. A note on the three-way generalization of the Jordan canonical form
  77. On some varieties of ai-semirings satisfying xp+1x
  78. Abstract-valued Orlicz spaces of range-varying type
  79. On the recursive properties of one kind hybrid power mean involving two-term exponential sums and Gauss sums
  80. Arithmetic of generalized Dedekind sums and their modularity
  81. Multipreconditioned GMRES for simulating stochastic automata networks
  82. Regularization and error estimates for an inverse heat problem under the conformable derivative
  83. Transitivity of the εm-relation on (m-idempotent) hyperrings
  84. Learning Bayesian networks based on bi-velocity discrete particle swarm optimization with mutation operator
  85. Simultaneous prediction in the generalized linear model
  86. Two asymptotic expansions for gamma function developed by Windschitl’s formula
  87. State maps on semihoops
  88. 𝓜𝓝-convergence and lim-inf𝓜-convergence in partially ordered sets
  89. Stability and convergence of a local discontinuous Galerkin finite element method for the general Lax equation
  90. New topology in residuated lattices
  91. Optimality and duality in set-valued optimization utilizing limit sets
  92. An improved Schwarz Lemma at the boundary
  93. Initial layer problem of the Boussinesq system for Rayleigh-Bénard convection with infinite Prandtl number limit
  94. Toeplitz matrices whose elements are coefficients of Bazilevič functions
  95. Epi-mild normality
  96. Nonlinear elastic beam problems with the parameter near resonance
  97. Orlicz difference bodies
  98. The Picard group of Brauer-Severi varieties
  99. Galoisian and qualitative approaches to linear Polyanin-Zaitsev vector fields
  100. Weak group inverse
  101. Infinite growth of solutions of second order complex differential equation
  102. Semi-Hurewicz-Type properties in ditopological texture spaces
  103. Chaos and bifurcation in the controlled chaotic system
  104. Translatability and translatable semigroups
  105. Sharp bounds for partition dimension of generalized Möbius ladders
  106. Uniqueness theorems for L-functions in the extended Selberg class
  107. An effective algorithm for globally solving quadratic programs using parametric linearization technique
  108. Bounds of Strong EMT Strength for certain Subdivision of Star and Bistar
  109. On categorical aspects of S -quantales
  110. On the algebraicity of coefficients of half-integral weight mock modular forms
  111. Dunkl analogue of Szász-mirakjan operators of blending type
  112. Majorization, “useful” Csiszár divergence and “useful” Zipf-Mandelbrot law
  113. Global stability of a distributed delayed viral model with general incidence rate
  114. Analyzing a generalized pest-natural enemy model with nonlinear impulsive control
  115. Boundary value problems of a discrete generalized beam equation via variational methods
  116. Common fixed point theorem of six self-mappings in Menger spaces using (CLRST) property
  117. Periodic and subharmonic solutions for a 2nth-order p-Laplacian difference equation containing both advances and retardations
  118. Spectrum of free-form Sudoku graphs
  119. Regularity of fuzzy convergence spaces
  120. The well-posedness of solution to a compressible non-Newtonian fluid with self-gravitational potential
  121. On further refinements for Young inequalities
  122. Pretty good state transfer on 1-sum of star graphs
  123. On a conjecture about generalized Q-recurrence
  124. Univariate approximating schemes and their non-tensor product generalization
  125. Multi-term fractional differential equations with nonlocal boundary conditions
  126. Homoclinic and heteroclinic solutions to a hepatitis C evolution model
  127. Regularity of one-sided multilinear fractional maximal functions
  128. Galois connections between sets of paths and closure operators in simple graphs
  129. KGSA: A Gravitational Search Algorithm for Multimodal Optimization based on K-Means Niching Technique and a Novel Elitism Strategy
  130. θ-type Calderón-Zygmund Operators and Commutators in Variable Exponents Herz space
  131. An integral that counts the zeros of a function
  132. On rough sets induced by fuzzy relations approach in semigroups
  133. Computational uncertainty quantification for random non-autonomous second order linear differential equations via adapted gPC: a comparative case study with random Fröbenius method and Monte Carlo simulation
  134. The fourth order strongly noncanonical operators
  135. Topical Issue on Cyber-security Mathematics
  136. Review of Cryptographic Schemes applied to Remote Electronic Voting systems: remaining challenges and the upcoming post-quantum paradigm
  137. Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
  138. On dynamic network security: A random decentering algorithm on graphs
Downloaded on 10.12.2025 from https://www.degruyterbrill.com/document/doi/10.1515/math-2018-0081/html
Scroll to top button