Keywords:-
Article Content:-
Abstract
The study of prime numbers, pivotal in mathematics for centuries, holds significant importance in number theory and diverse applications like cryptography and computer science. This article introduces a novel approach, "High Order Anti Even Least Square," for approximating prime numbers below 1000. Integrating Least Square with specialized techniques tailored to complex prime number distributions, this method aims to enhance accuracy compared to traditional approaches. The research methodology involves polynomial approximation using both traditional and anti-even least squares methods, error calculation, visualization, and analysis. Results indicate that while traditional least squares generally performs better, the anti-even least squares method shows promise, particularly at higher polynomial degrees. This study contributes to advancing number theory and its practical applications by presenting a novel method for prime number approximation.
References:-
References
I. Kilani, “Fermat’s Last Theorem: A Historical and Mathematical Overview,” ESS Open Archive, pp. 1–15, Sep. 2023.
A. C. Graesser, J. P. Sabatini, and H. Li, “Educational Psychology Is Evolving to Accommodate Technology, Multiple Disciplines, and Twenty-First-Century Skills,” Annu Rev Psychol, vol. 73, no. 1, pp. 547–574, Jan. 2022,
doi: 10.1146/annurev-psych-020821-113042.
D. Schumayer and D. A. W. Hutchinson, “Colloquium : Physics of the Riemann hypothesis,” Rev Mod Phys, vol. 83, no. 2, pp. 307–330, Apr. 2011, doi: 10.1103/RevModPhys.83.307.
M. Ghidarcea and D. Popescu, “Prime Number Sieving—A Systematic Review with Performance Analysis,” Algorithms, vol. 17, no. 4, p. 157, Apr. 2024, doi: 10.3390/a17040157.
S. C. Coutinho, “Review of not always buried deep: a second course in elementary number theory by Paul Pollack,” ACM SIGACT News, vol. 42, no. 2, pp. 34–37, Jun. 2011,
doi: 10.1145/1998037.1998046.
K. Kadian, S. Garhwal, and A. Kumar, “Quantum walk and its application domains: A systematic review,” Comput Sci Rev, vol. 41, p. 100419, Aug. 2021, doi: 10.1016/j.cosrev.2021.100419.
A. Majeed and I. Rauf, “Graph Theory: A Comprehensive Survey about Graph Theory Applications in Computer Science and Social Networks,” Inventions, vol. 5, no. 1, p. 10, Feb. 2020, doi: 10.3390/inventions5010010.
D. J. Bernstein and T. Lange, “Post-quantum cryptography,” Nature, vol. 549, no. 7671, pp. 188–194, Sep. 2017, doi: 10.1038/nature23461.
K. Thangavel and A. Pethalakshmi, “Dimensionality reduction based on rough set theory: A review,” Appl Soft Comput, vol. 9, no. 1, pp. 1–12, Jan. 2009,
doi: 10.1016/j.asoc.2008.05.006.
M. A. Pitt, I. J. Myung, and S. Zhang, “Toward a method of selecting among computational models of cognition.,” Psychol Rev, vol. 109, no. 3, pp. 472–491, 2002, doi: 10.1037/0033-295X.109.3.472.
W. Sun, Z. Yang, X. Zhang, and Y. Liu, “Energy-Efficient Neighbor Discovery in Mobile Ad Hoc and Wireless Sensor Networks: A Survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1448–1459, Mar. 2014,
doi: 10.1109/SURV.2013.012414.00164.