Results 31 to 40 of about 582,984 (315)
Arithmetical Rank and Cohomological Dimension of Generalized Binomial Edge Ideals [PDF]
Let $G$ be a connected and simple graph on the vertex set $[n]$. To the graph $G$ one can associate the generalized binomial edge ideal $J_{m}(G)$ in the polynomial ring $R=K[x_{ij}: i \in [m], j \in [n]]$.
A. Katsabekis
semanticscholar +1 more source
Regularity and h-polynomials of binomial edge ideals [PDF]
6 pages. Conjecture 0.1 has been deleted.
Takayuki Hibi, Kazunori Matsuda
openalex +5 more sources
A rapidly convergent method for solving third-order polynomials
We present a rapidly convergent method for solving cubic polynomial equations with real coefficients. The method is based on a power series expansion of a simplified form of Cardano’s formula using Newton’s generalized binomial theorem.
Ramón A. Fernández Molina +3 more
doaj +1 more source
The purpose of this paper is to construct generating functions in terms of hypergeometric function and logarithm function for finite and infinite sums involving higher powers of inverse binomial coefficients.
Y. Simsek
semanticscholar +1 more source
Finding binomials in polynomial ideals [PDF]
11 pages, v2: final version, to appear in Res.
Jensen, Anders Nedergaard +2 more
openaire +4 more sources
Binomial Thue equations and polynomial powers [PDF]
We explicitly solve a collection of binomial Thue equations with unknown degree and unknown S-unit coefficients, for a number of sets S of small cardinality. Equivalently, we characterize integers x such that the polynomial x 2 + x assumes perfect power values, modulo S-units. These results are proved through a combination of techniques, including Frey
M. Bennett +3 more
semanticscholar +2 more sources
Binomial transform of the bivariate Fibonacci quaternion polynomials and its properties [PDF]
The primary aim of this work is to deal with binomial transforms of bivariate Fibonacci quaternion polynomial sequence. The binomial sequence of the bivariate Fibonacci quaternion polynomial is found, and then results are obtained for the recurrence ...
Faruk Kaplan, Arzu Özkoç Öztürk
doaj +1 more source
Bi-level authentication and mannequin routing for improving security features of WSN-IoT [PDF]
Node authentication and key management are the two significant security services employed in Wireless Sensor Networks (WSN). Since the growth of the devices in WSN is rapidly increasing, strong security policies should be employed to save the network ...
Loganathan Sasirega, Chandrabose Shanthi
doaj +1 more source
New genomic regions associated with white mold resistance in dry bean using a MAGIC population
Dry bean (Phaseolus vulgaris L.) production in many regions is threatened by white mold (WM) [Sclerotinia sclerotiorum (Lib.) de Bary]. Seed yield losses can be up to 100% under conditions favorable for the pathogen.
Edgar Escobar +9 more
doaj +1 more source
Binomial convolution and transformations of Appell polynomials
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
José A. Adell, Alberto Lekuona
openalex +2 more sources

