Abstract: With the rapid development of the smart grid relying on communication and computer science technology, its vulnerabilities to intentional cyber-attacks are also exposed to cyber-attackers.
Abstract: The story behind the Euclidean algorithm and its relationship to the solution of the Diophantine equation is examined in this article. The Euclidean algorithm appears in Proposition 2 in ...