Results 71 to 80 of about 51,212 (178)

Entanglement in Quantum Systems Based on Directed Graphs

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 1, January 2026.
The entanglement properties of quantum states associated with directed graphs are investigated. It is proved that the vertex degree distribution fully determines this entanglement measure, which remains invariant under vertex relabeling, thereby highlighting its topological character.
Lucio De Simone, Roberto Franzosi
wiley   +1 more source

Some properties of the generalized (p,q)- Fibonacci-Like number

open access: yesMATEC Web of Conferences, 2018
For the real world problems, we use some knowledge for explain or solving them. For example, some mathematicians study the basic concept of the generalized Fibonacci sequence and Lucas sequence which are the (p,q) – Fibonacci sequence and the (p,q ...
Suvarnamani Alongkot
doaj   +1 more source

Hyperbolic Fibonacci Sequence

open access: yesUniversal Journal of Mathematics and Applications, 2019
In this paper, we investigate the hyperbolic Fibonacci sequence and the hyperbolic Fibonacci numbers. Furthermore, we give recurrence relations, the golden ratio and Binet's formula for the hyperbolic Fibonacci sequence and Lorentzian inner product ...
Fügen Torunbalcı Aydın
doaj   +1 more source

Automating Algorithm Experiments With ALGator: From Problem Modeling to Reproducible Results

open access: yesSoftware: Practice and Experience, Volume 56, Issue 1, Page 26-41, January 2026.
ABSTRACT Background Theoretical algorithm analysis provides fundamental insights into algorithm complexity but relies on simplified and often outdated computational models. Experimental algorithmics complements this approach by evaluating the empirical performance of algorithm implementations on real data and modern computing platforms.
Tomaž Dobravec
wiley   +1 more source

Free Fibonacci Sequences

open access: yes, 2014
This paper describes a class of sequences that are in many ways similar to Fibonacci sequences: given n, sum the previous two terms and divide them by the largest possible power of n. The behavior of such sequences depends on n. We analyze these sequences for small n: 2, 3, 4, and 5. Surprisingly these behaviors are very different.
Avila, Brandon, Khovanova, Tanya
openaire   +3 more sources

FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm

open access: yesIET Computers &Digital Techniques, Volume 2026, Issue 1, 2026.
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan   +6 more
wiley   +1 more source

Edge-Disjoint Fibonacci Trees in Hypercube

open access: yesJournal of Computer Networks and Communications, 2014
The Fibonacci tree is a rooted binary tree whose number of vertices admit a recursive definition similar to the Fibonacci numbers. In this paper, we prove that a hypercube of dimension h admits two edge-disjoint Fibonacci trees of height h, two edge ...
Indhumathi Raman, Lakshmanan Kuppusamy
doaj   +1 more source

Encrypt Anything: A Content‐Aware Hierarchical Privacy Protection Method for Image Data

open access: yesIET Computer Vision, Volume 20, Issue 1, January/December 2026.
This paper proposes the Encrypt Anything Model (EAM), a content‐aware hierarchical privacy protection method that integrates the Segment Anything Model (SAM) and Grounding‐DINO to automatically detect and segment privacy entities in images. EAM dynamically adjusts the encryption granularity according to the sensitivity level of privacy and introduces a
Jiawei Han   +5 more
wiley   +1 more source

Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan   +3 more
wiley   +1 more source

Dual Proximal Groups Concisely Representing Complex Hosoya Triangles

open access: yesAdvances in Mathematical Physics, Volume 2026, Issue 1, 2026.
This paper introduces dual proximal groups (DPGs) that provide concise representation of complex Hosoya triangles (CHTs). An application is given in terms of the DPG representation of collections of Hosoya‐Hilbert circular triangles on modulated motion waveforms in sequences of video frames. MSC2020 Classification: 11B39,54E05,57S25.
Kübra Gül   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy