Research article Special Issues

Exceptional set in Waring–Goldbach problem for sums of one square and five cubes

  • Received: 31 July 2021 Accepted: 15 November 2021 Published: 23 November 2021
  • MSC : 11P05, 11P32, 11P55

  • Let N be a sufficiently large integer. In this paper, it is proved that, with at most O(N4/9+ε) exceptions, all even positive integers up to N can be represented in the form p21+p32+p33+p34+p35+p36, where p1,p2,p3,p4,p5,p6 are prime numbers.

    Citation: Jinjiang Li, Yiyang Pan, Ran Song, Min Zhang. Exceptional set in Waring–Goldbach problem for sums of one square and five cubes[J]. AIMS Mathematics, 2022, 7(2): 2940-2955. doi: 10.3934/math.2022162

    Related Papers:

    [1] Kangkang Chang, Zhenyu Zhang, Guizhen Liang . Threshold dynamics of a nonlocal diffusion West Nile virus model with spatial heterogeneity. AIMS Mathematics, 2023, 8(6): 14253-14269. doi: 10.3934/math.2023729
    [2] Liuqin Huang, Jinling Wang, Jiarong Li, Tianlong Ma . Analysis of rumor spreading with different usage ranges in a multilingual environment. AIMS Mathematics, 2024, 9(9): 24018-24038. doi: 10.3934/math.20241168
    [3] Huihui Liu, Yaping Wang, Linfei Nie . Dynamical analysis and optimal control of an multi-age-structured vector-borne disease model with multiple transmission pathways. AIMS Mathematics, 2024, 9(12): 36405-36443. doi: 10.3934/math.20241727
    [4] Shufan Wang, Zhihui Ma, Xiaohua Li, Ting Qi . A generalized delay-induced SIRS epidemic model with relapse. AIMS Mathematics, 2022, 7(4): 6600-6618. doi: 10.3934/math.2022368
    [5] Xiaomei Bao, Canrong Tian . Stability in a Ross epidemic model with road diffusion. AIMS Mathematics, 2022, 7(2): 2840-2857. doi: 10.3934/math.2022157
    [6] Mahmoud A. Ibrahim . Threshold dynamics in a periodic epidemic model with imperfect quarantine, isolation and vaccination. AIMS Mathematics, 2024, 9(8): 21972-22001. doi: 10.3934/math.20241068
    [7] Sayed Saber, Azza M. Alghamdi, Ghada A. Ahmed, Khulud M. Alshehri . Mathematical Modelling and optimal control of pneumonia disease in sheep and goats in Al-Baha region with cost-effective strategies. AIMS Mathematics, 2022, 7(7): 12011-12049. doi: 10.3934/math.2022669
    [8] Liping Wang, Peng Wu, Mingshan Li, Lei Shi . Global dynamics analysis of a Zika transmission model with environment transmission route and spatial heterogeneity. AIMS Mathematics, 2022, 7(3): 4803-4832. doi: 10.3934/math.2022268
    [9] Miled El Hajji, Mohammed Faraj S. Aloufi, Mohammed H. Alharbi . Influence of seasonality on Zika virus transmission. AIMS Mathematics, 2024, 9(7): 19361-19384. doi: 10.3934/math.2024943
    [10] Muhammad Altaf Khan, Muhammad Ismail, Saif Ullah, Muhammad Farhan . Fractional order SIR model with generalized incidence rate. AIMS Mathematics, 2020, 5(3): 1856-1880. doi: 10.3934/math.2020124
  • Let N be a sufficiently large integer. In this paper, it is proved that, with at most O(N4/9+ε) exceptions, all even positive integers up to N can be represented in the form p21+p32+p33+p34+p35+p36, where p1,p2,p3,p4,p5,p6 are prime numbers.



    Recently, several infinite families of minimal and optimal linear codes are constructed via mathematical objects named simplicial complexes or down-sets by Hyun and Wu et al [3,5,7,8,12,13]. Simplicial complexes are extremely well-behaved with the n-variable generating function, which in turn enable us to compute the exponential sum rather efficiently. Let n be a natural number and denote by [n]={1,2,,n} the set of integers from 1 to n. For ΔP([n]), we say Δ is a simplicial complex if uΔ and vu imply vΔ, where P([n]) denotes the power set of [n]. The set-inclusion defines a partial order on Δ. A maximal element of a simplicial complex Δ is an element of Δ that is not smaller than any other element in Δ. For subsets Ai of [n], where i[S], the notation A1,A2,,As means it is a simplicial complex generated by {A1,A2,,As}, that is A1,A2,,As={B:BAi,i[S]}. Especially, when s=1, we write A1 simply as ΔA1.

    Ternary codes of small dimension have been investigated in many literatures, see for instance [2,6,9,10,11]. A class of group character ternary codes C3(1,n1) with parameters [2n1,n,2n2], which are the analogue of the binary first-order Reed-Muller codes RM(1,n1) are described and analyzed by Ding et al. [4]. In this paper, we describe a new class of [2n1,n,2n2] ternary codes, and determine their weigt distributions.

    Minimal linear codes, though existing as special linear codes, have important applications in secret sharing and secure two-party computation. Construction of minimal linear codes with new and desirable parameters would be an interesting topic in coding theory and cryptography. We construct in this paper a family of minimal linear codes over F3, and compute their weight distributions. By a distance-optimal code, or simply an optimal code, we mean it has the highest minimum distance with a prescribed length and dimension. One class of these minimal codes we obtained is proved to be optimal.

    In this paper we study a linear code with more flexible lengths as follows. Let P be a subset of Fn3, and we order the elements of P to fix a coordinate position of vectors. A ternary code CP associated with P is defined to be

    CP={cP(u)=(ux)xP:uFn3}.

    It is straightforward that CP is a linear code of length |P| and its dimension is at most n.

    For a subset P of Fn3 and uFn3, we define the exponential sum with respect to P by

    χu(P)=vPζuv,

    where ζ is a primitive 3-rd root of the unity. Then the Hamming weight of a codeword cP(u) in CP is given as follows:

    w(cP(u))=|P|vPδ0,uv=|P|13yF3vPζy(uv)=|P|13(|P|+2Re(vPζuv))=23(|P|Re(χu(P))) (2.1)

    where δ is the Kronecker delta function and Re(χu(P)) is the real part of χu(P). The main difficulty of the computation of w(cP(u)) lies in the fact that it is expressed as the exponential sum with respect to a subset P which in turn is hard to compute for an arbitrary P.

    When P contains the zero-vector of Fn3, we are also interested in CPc where Pc denotes the complement of P, that is

    CPc={cPc(u)=(ux)xPc:uFn3}.

    Then the weight of cPc(u) and that of cP(u) are related as follows:

    w(cPc(u))=23n1(1δ0,u)w(cP(u)). (2.2)

    For the purpose of computing the exponential sum χu(P), we introduce the following n-variable generating function associated with P inspired by Adamaszek [1]:

    HP(x1,x2,,xn)=vPni=1xviiZ[x±11,,x±1n]

    where we denote v=(v1,v2,,vn) if vFn3. By convention, we define HP(x1,x2,,xn)=0 if P=.

    Example 1. Let P={(1,1,1,,1)}, then the generating function is

    HP(x1,x2,,xn)=x1x2x3xn.

    In general, one can easily obtain the following result when P=(F3)n

    HP(x1,x2,,xn)=1x1x2xnni=1(1+x2i).

    For the vector space Fn3, we consider the subset (F3)n. We give as follows a bijection

    ψ:(F3)nP([n])u=(u1,u2,,un)ψ(u)

    where ψ(u)={i:ui=1}. Through the given map ψ, a simplicial complex Δ of P([n]) will be regarded as the simplicial complex of (F3)n, and be identified as a subset of Fn3 in this section without any real ambiguity.

    Example 2. Let Δ be the simplicial complex of (F3)4 generated by {1,2} and {3,4}. Then

    Δ={,{1},{2},{3},{4},{1,2},{3,4}}

    which is identified with

    {(1,1,1,1),(1,1,1,1),(1,1,1,1),(1,1,1,1),(1,1,1,1),(1,1,1,1),(1,1,1,1)}.

    The indicator function 1Δ from Fn3 to F2 is defined by 1Δ(u)=1 only if uΔ. The following lemma, which is a simple consequence of the Inclusion-exclusion principle, will be used in deriving an identity involving HΔ(x1,,xn).

    Lemma 3.1. Let Δ=A1,A2,,At be a simplicial complex of (F3)n. Then

    1Δ(u)=tk=1(1)k+11i1<i2<<ikt1ΔAi1ΔAik(u).

    Proof. Since Δ is a simplicial complex of (F3)n, we have Δ=tj=1ΔAj. The result follows from the Inclusion–exclusion principle.

    Proposition 3.2. Let Δ be a simplicial complex of (F3)n with F the set of maximal elements of Δ. Then we have

    HΔ(x1,,xn)=1x1x2xnSF(1)|S|+1iS(1+x2i)

    where we define i(1+x2i)=1 by convention.

    Proof. Let Δ=F1,F2,,Ft, where FiF. Then we see that, by Lemma 3.1,

    HΔ(x1,,xn)=uΔ1Δ(u)ni=1xuii=uΔtk=1(1)k+11i1<i2<<ikt1ΔFi1ΔFik(u)ni=1xuii=tk=1(1)k+11i1<i2<<iktHΔFi1ΔFik(x1,,xn)=tk=1(1)k+11i1<i2<<ikt1x1x2xnikj=1Fij(1+x2i)=1x1x2xnSF(1)|S|+1iS(1+x2i).

    Example 3. Let Δ be a simplicial complex of (F3)3 with the set of maximal element F={{1,2},{3}}. Proposition 3.2 shows that

    HΔ(x1,x2,x3)=1x1x2x3(1+x21+x22+x23+x21x22)=1x1x2x3((1+x21)(1+x22)+(1+x23)1).

    Lemma 3.3. Let Δ be a simplicial complex of (F3)n with F the set of maximal elements of Δ. For uFn3, we have that

    Re(χu(Δ))=SF(1)|S|+1iS(ζui+ζui)Re(iSζui)

    where we define i(ζui+ζui)=i[n]ζui=1 by convention.

    Proof. According to Proposition 3.2, we get that

    χu(Δ)=HΔ(ζu1,,ζun)=1ζuiSF(1)|S|+1iS(1+ζ2ui)=SF(1)|S|+1iSζuiiS(ζui+ζui).

    Since ζui+ζui is a real number for uiF3, it follows that

    Re(χu(Δ))=SF(1)|S|+1iS(ζui+ζui)Re(iSζui).

    Theorem 3.4. Let Δ be a simplicial complex of (F3)n with one maximal element {A}. If |A|=n1, where n2, there are (nm)2m codewords in the code CΔ which have the same Hamming weight

    W(m):=2nm2m(1)m3

    for any integer 0mn. Moreover, the minimum distance of CΔ is W(2), which is2n2.

    Proof. If xF3, then

    ζx+ζx={2,ifx=0,1,otherwise.

    and

    Re(ζx)={1,ifx=0,12,otherwise.

    Since |A|=n1, denote i0[n]A. By Lemma 3.3, for a non-zero vector u=(u1,u2,,un) in Fn3,

    Re(χu(Δ))=Re(ζui0)iA(ζui+ζui)={(1)n1k2k,ifui0=0,(1)nk2k1,otherwise.

    where k=#{i:ui=0,iA}. According to equality (2.1), we obtain the Hamming weight of codeword cΔ(u) as follows

    w(cΔ(u))={2k+12nk1(1)nk13,ifui0=0,2k2nk(1)nk3,otherwise.

    Let m=#{i:ui0,1in}, then there are (nm)2m codewords which have the Hamming weight

    w(cΔ(u))=W(m):=2nm2m(1)m3. (3.1)

    The nonzero weights W(m) in (3.1) are pairwise distinct and satisfy

    W(2)<W(4)<<W(2n/2)<W(2(n1)/2+1)<W(2(n1)/21)<<W(3)<W(1).

    Hence, the minimum distance of CΔ is W(2).

    Example 4. Let CΔ be a linear code defined in Theorem 3.4. If n=5, the weight distribution of the corresponding code is given in Table 1.

    Table 1.  Weight distribution of CΔ for n=5 in Example 4.
    Weight Frequency
    0 1
    8 40
    10 80
    11 32
    12 80
    16 10

     | Show Table
    DownLoad: CSV

    Corollary 3.5. Let Δ be a simplicial complex of (F3)n with one maximal element {A}. If |A|=n1, where n2, then CΔ is a [2n1,n,2n2]-code over F3.

    Proof. Since |A|=n1, the length of CΔ is 2n1. It then remains to prove the dimension is n. Let ei be the vector of Fn3 whose i-th coordinate is 1 and other coordinates are all zero, wi be the vector of Fn3 whose i-th coordinate is 1 and other coordinates are all 1, where 1in. We denote by A={i1,i2,,in1}. Since Δ considered as a subset of Fn3 contains wi1,wi2,,win1, the codewords cΔ(ei) of CΔ are all nonzero. To finish the proof, we notice that cΔ(ei) are linearly independent which generate any codeword of CΔ.

    For the set [n], we define

    C2([n])={(A,B):A[n],B[n],AB=}

    to be the set of pairs of disjoint subsets of [n]. When Δ1 and Δ2 are two disjoint simplicial complexes of P([n]), we consider the set

    C2(Δ1,Δ2)={(A,B):AΔ1,BΔ2}.

    Since Δ1Δ2=, we have C2(Δ1,Δ2)C2([n]). Considering the vector space Fn3, there is a bijection

    φ=(φ1,φ2):Fn3C2([n])u=(u1,u2,,un)(φ1(u),φ2(u))

    where φ1(u)={i:ui=1} and φ2(u)={j:uj=1}. The set C2(Δ1,Δ2) given by two disjoint simplicial complexes, under the map φ, will be then identified with the subset of Fn3 without any real ambiguity.

    Example 5. Let Δ1,Δ2 be simplicial complexes of P([4]) generated by {1,2} and {3,4}. Then C2(Δ1,Δ2) consists of elements

    (,)(,{3})(,{4})(,{3,4})({1},)({1},{3})({1},{4})({1},{3,4})
    ({2},)({2},{3})({2},{4})({2},{3,4}),({1,2},)({1,2},{3})({1,2}{4})({1,2},{3,4})

    which are identified with elements of Fn3 as follows

    (0,0,0,0)(0,0,1,0)(0,0,0,1)(0,0,1,1)(1,0,0,0)(1,0,1,0)(1,0,0,1)(1,0,1,1)
    (0,1,0,0)(0,1,1,0)(0,1,0,1)(0,1,1,1)(1,1,0,0)(1,1,1,0)(1,1,0,1)(1,1,1,1)

    Proposition 4.1. Let Δ1,Δ2 be simplicial complexes of P([n]) with the family of maximal elements F1 and F2 respectively. If Δ1Δ2=, then we have

    HC2(Δ1,Δ2)(x1,,xn)=SF1TF2(1)|S|+|T|+2iS(1+xi)jT(1+x1j)

    where we define i(1+xi)=j(1+x1j)=1.

    Proof.

    HC2(Δ1,Δ2)(x1,,xn)=(A,B)C2(Δ1,Δ2)iAxijBx1j=(AΔ1iAxi)(BΔ2jBx1j)=SF1TF2(1)|S|+|T|+2iS(1+xi)jT(1+x1j)

    where the last equality is derived from [3,Theorem 1].

    Example 6. Let Δ1,Δ2 be simplicial complexes of P([3]) with F1={{1}} and F2={{2}}. Proposition 4.1 shows that HC2(Δ1,Δ2)(x1,,xn)=(1+x1)(1+x12). Let u=(u1,u2,,un), we have

    Re(χu(C2(Δ1,Δ2)))=Re((1+ζu1)(1+ζu2))={4,ifu1=u2=0,12,ifu1=u20,1,otherwise.

    It then follows from (2.1) that

    w(cC2(Δ1,Δ2)(u))=23(|C2(Δ1,Δ2)|Re(χu(C2(Δ1,Δ2))))={0,ifu1=u2=0,3,ifu1=u20,2,otherwise.

    It follows from (2.2) that for u(Fn3),

    w(cC2(Δ1,Δ2)c(u))={23n1,ifu1=u2=0,23n13,ifu1=u20,23n12,otherwise.

    Theorem 4.2. Let Δ1={r},{s} and Δ2={t} be simplicial complexes of P([n]), where 1r,s,tn are pairwise distinct and n3. Then CC2(Δ1,Δ2)c is a [3n6,n,3n3n15]-code and its weight distribution is given in Table 2.

    Table 2.  Weight distribution of CC2(Δ1,Δ2)c in Theorem 4.2.
    Weight Frequency
    0 1
    3n3n1 3n31
    3n3n12 43n3
    3n3n13 83n3
    3n3n14 23n3
    3n3n15 123n3

     | Show Table
    DownLoad: CSV

    Proof. The length of CC2(Δ1,Δ2)c is |C2(Δ1,Δ2)c|=3n6 and its dimension is n according to the proof of [5,Lemma 3.6-(ⅱ)]. Since Δ1={r},{s} and Δ2={t}, by Proposition 4.1, the generating function is

    HC2(Δ1,Δ2)(x1,,xn)=(1+xr)(1+x1t)+(1+xs)(1+x1t)(1+x1t)=(1+x1t)(1+xr+xs).

    Set Bi:={(ur,us,i):ur,usF3{i}}. Let u=(u1,u2,,un), we have

    Re(χu(C2(Δ1,Δ2)))=Re((1+ζut)(1+ζur+ζus))={6,ifur=us=ut=0,3,ifur+us0,urus=ut=0,32,if(ur,us,ut)B1B1,32,ifur=us=ut0,0,otherwise.

    It then follows from (2.1) that

    w(cC2(Δ1,Δ2)(u))=23(|C2(Δ1,Δ2)|Re(χu(C2(Δ1,Δ2))))={0,ifur=us=ut=0,2,ifur+us0,urus=ut=0,3,if(ur,us,ut)B1B1,5,ifur=us=ut0,4,otherwise.

    It follows from (2.2) that for u(Fn3),

    w(cC2(Δ1,Δ2)c(u))={3n3n1,ifur=us=ut=0,3n3n12,ifur+us0,urus=ut=0,3n3n13,if(ur,us,ut)B1B1,3n3n15,ifur=us=ut0,3n3n14,otherwise.

    The frequency of each codeword of CC2(Δ1,Δ2)c is computed by counting the vector u on its dimension.

    Remark 1. Let CC2(Δ1,Δ2)c be a linear code defined in Theorem 4.2.

    1). Since n3, then

    ddmax=23n1523n1>23

    where d and dmax are the minimum and maximum weights. Hence, CC2(Δ1,Δ2)c is minimal.

    2). In [5,Theorem 4.7], for instance, if p=3 and r=1, they obtain a linear code with the same parameters as CC2(Δ1,Δ2)c but with different weight distribution.

    Theorem 4.3. Let Δ1={r,s} and Δ2={t} be simplicial complexes of P([n]), where 1r,s,tn are pairwise distinct and n3. Then CC2(Δ1,Δ2)c is an optimal [3n8,n,3n3n16]-code and its weight distribution is given in Table 3.

    Table 3.  Weight distribution of CC2(Δ1,Δ2)c in Theorem 4.3.
    Weight Frequency
    0 1
    3n3n1 3n31
    3n3n14 123n3
    3n3n15 63n3
    3n3n16 83n3

     | Show Table
    DownLoad: CSV

    Proof. The length of CC2(Δ1,Δ2)c is |C2(Δ1,Δ2)c|=3n8 and its dimension is n according to the proof of [5,Lemma 3.6-(ⅱ)]. Since Δ1={r,s} and Δ2={t}, by Proposition 4.1, the generating function is

    HC2(Δ1,Δ2)(x1,,xn)=(1+xr)(1+xs)(1+x1t)=(1+x1t)(1+xr+xs+xrxs).

    Set Mi={(ur,us,i):ur+us0,ur,usF3{i}}. Let u=(u1,u2,,un), we have

    Re(χu(C2(Δ1,Δ2)))=Re((1+ζut)(1+ζur+ζus+ζur+us))={8,ifur=us=ut=0,12,ifur=us0,ut0orur=us=ut0,1,if(ur,us,ut)M1M0M1,2,otherwise.

    It then follows from (2.1) that

    w(cC2(Δ1,Δ2)(u))=23(|C2(Δ1,Δ2)|Re(χu(C2(Δ1,Δ2))))={0,ifur=us=ut=0,5,ifur=us0,ut0orur=us=ut0,6,if(ur,us,ut)M1M0M1,4,otherwise.

    It follows from (2.2) that for u(Fn3),

    w(cC2(Δ1,Δ2)c(u))={3n3n1,ifur=us=ut=0,3n3n15,ifur=us0,ut0orur=us=ut0,3n3n16,if(ur,us,ut)M1M0M1,3n3n14,otherwise.

    The frequency of each codeword of CC2(Δ1,Δ2)c is computed by counting the vector u on its dimension. To check the optimality, we assume that there is a [3n8,n,3n3n15]-code. Applying the Griesmer bound, we get that

    3n8n1i=03n3n153i=3n7,

    which is a contradiction, so CC2(Δ1,Δ2)c is optimal.

    Remark 2. Let CC2(Δ1,Δ2)c be a linear code defined in Theorem 4.3.

    1). Since n3, then

    ddmax=23n1323n1>23

    where d and dmax are the minimum and maximum weights. Hence, CC2(Δ1,Δ2)c is minimal.

    2). The codes produced by our construction and the codes in [5] for p=3 have totally different parameters. Meanwhile, with a slight change of Δ1, the codes here and the codes in Theorem 4.2 are different.

    The ternary codes CΔ described in Theorem 3.4 have the same parameters and weight distributions as the group character codes C3(1,n1). Thus, the ternary codes CΔ may be viewed as the analogue of the group character codes C3(1,n1). As a result, the codes CΔ is good for practical error detection. As pointed in [4], the weight distribution of the codes CΔ is given by the eigenvalues of the Hamming scheme. It may be interesting to investigate the relationship between these codes and the Hamming scheme.

    The ternary codes CC2(Δ1,Δ2)c described in Theorem 4.2 and 4.3 have few weights and are minimal. Thus, the dual codes of CC2(Δ1,Δ2)c may be utilized to construct secret sharing schemes.

    This work was supported by University Natural Science Research Project of Anhui Province under Grant No. KJ2019A0845, National Natural Science Foundation of China under Grant No.12101174 and Scientific Research Foundation of Hefei University under Grant No.18-19RC57, 18-19RC59.

    All authors declare no conflicts of interest in this paper.



    [1] Y. C. Cai, The Waring–Goldbach problem: One square and five cubes, Ramanujan J., 34 (2014), 57–72. doi: 10.1007/s11139-013-9486-y. doi: 10.1007/s11139-013-9486-y
    [2] L. K. Hua, Additive theory of prime numbers, Providence: American Mathematical Society, 1965.
    [3] J. J. Li, M. Zhang, On the Waring–Goldbach problem for one square and five cubes, Int. J. Number Theory, 14 (2018), 2425–2440. doi: 10.1142/S1793042118501476. doi: 10.1142/S1793042118501476
    [4] C. D. Pan, C. B. Pan, Goldbach conjecture, Beijing: Science Press, 1981.
    [5] X. M. Ren, On exponential sums over primes and application in Waring–Goldbach problem, Sci. China Ser. A-Math., 48 (2005), 785–797. doi: 10.1360/03ys0341. doi: 10.1360/03ys0341
    [6] J. S. C. Sinnadurai, Representation of integers as sums of six cubes and one square, Q. J. Math., 16 (1965), 289–296.
    [7] G. K. Stanley, The representation of a number as the sum of one square and a number of k–th powers, P. Lond. Math. Soc., 31 (1930), 512–553. doi: 10.1112/plms/s2-31.1.512. doi: 10.1112/plms/s2-31.1.512
    [8] G. K. Stanley, The representation of a number as a sum of squares and cubes, J. Lond. Math. Soc., 6 (1931), 194–197. doi: 10.1112/jlms/s1-6.3.194. doi: 10.1112/jlms/s1-6.3.194
    [9] R. C. Vaughan, On Waring's problem: One square and five cubes, Q. J. Math., 37 (1986), 117–127. doi: 10.1093/qmath/37.1.117. doi: 10.1093/qmath/37.1.117
    [10] R. C. Vaughan, The Hardy–Littlewood method, Cambridge: Cambridge University Press, 1997.
    [11] I. M. Vinogradov, Elements of number theory, New York: Dover Publications, 1954.
    [12] G. L. Watson, On sums of a square and five cubes, J. Lond. Math. Soc., 5 (1972), 215–218. doi: 10.1112/jlms/s2-5.2.215. doi: 10.1112/jlms/s2-5.2.215
    [13] T. D. Wooley, Slim exceptional sets in Waring's problem: One square and five cubes, Q. J. Math., 53 (2002), 111–118. doi: 10.1093/qjmath/53.1.111. doi: 10.1093/qjmath/53.1.111
    [14] T. D. Wooley, Slim exceptional sets and the asymptotic formula in Waring's problem, Math. Proc. Cambridge, 134 (2003), 193–206. doi: 10.1017/S030500410200628X. doi: 10.1017/S030500410200628X
    [15] F. Xue, M. Zhang, J. J. Li, On the Waring–Goldbach problem for one square and five cubes in short intervals, Czech. Math. J., 71 (2021), 563–589. doi: 10.21136/CMJ.2020.0013-20. doi: 10.21136/CMJ.2020.0013-20
    [16] L. l. Zhao, On the Waring–Goldbach problem for fourth and sixth powers, Proc. Lond. Math. Soc., 108 (2014), 1593–1622. doi: 10.1112/plms/pdt072. doi: 10.1112/plms/pdt072
  • This article has been cited by:

    1. Zhao Hu, Yunge Xu, Nian Li, Xiangyong Zeng, Lisha Wang, Xiaohu Tang, New Constructions of Optimal Linear Codes From Simplicial Complexes, 2024, 70, 0018-9448, 1823, 10.1109/TIT.2023.3305609
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2207) PDF downloads(80) Cited by(0)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog