Results 21 to 30 of about 9,659,868 (257)

Hybrid Numbers with Fibonacci and Lucas Hybrid Number Coefficients

open access: yesUniversal Journal of Mathematics and Applications, 2023
In this paper, we introduce hybrid numbers with Fibonacci and Lucas hybrid number coefficients. We give the Binet formulas, generating functions, exponential generating functions for these numbers. Then we define an associate matrix for these numbers. In
Emrah Polatlı
semanticscholar   +1 more source

Altered Numbers of Fibonacci Number Squared

open access: yesJournal of New Theory, 2023
We investigate two types of altered Fibonacci numbers obtained by adding or subtracting a specific value $\{a\}$ from the square of the $n^{th}$ Fibonacci numbers $G^{(2)}_{F(n)}(a)$ and $H^{(2)}_{F(n)}(a)$.
Emre Kankal, Fikri Köken
doaj   +1 more source

A note on Fibonacci and Lucas number of domination in path [PDF]

open access: diamondElectronic Journal of Graph Theory and Applications, 2018
Let G = ( V ( G ), E ( G )) be a path of order n ≥ 1 . Let f m ( G ) be a path with m ≥ 0 independent dominating vertices which follows a Fibonacci string of binary numbers where 1 is the dominating vertex. A set F ( G ) contains all possible f m ( G ) ,
Leomarich F. Casinillo
openalex   +2 more sources

A Class of Fibonacci Matrices, Graphs, and Games

open access: yesMathematics, 2022
In this paper, we define a class of Fibonacci graphs as graphs whose adjacency matrices are obtained by alternating binary Fibonacci words. We show that Fibonacci graphs are close in size to Turán graphs and that their size-stability tradeoff defined as ...
Valentin E. Brimkov, Reneta P. Barneva
doaj   +1 more source

On Fibonacci functions with Fibonacci numbers [PDF]

open access: yesAdvances in Difference Equations, 2012
Abstract In this paper we consider Fibonacci functions on the real numbers R, i.e., functions f : R → R such that for all x ∈ R ,
Hee Sik Kim   +2 more
openaire   +2 more sources

Updates in SASfit for fitting analytical expressions and numerical models to small‐angle scattering patterns

open access: yesJournal of Applied Crystallography, Volume 55, Issue 6, Page 1677-1688, December 2022., 2022
Recent enhancements and additions to the SASfit program are discussed, including anisotropic scattering models, flexible distributions, regularization techniques such as the expectation‐maximization method, and new structure factors, especially for ordered nano‐ and meso‐scaled material.
Joachim Kohlbrecher, Ingo Breßler
wiley   +1 more source

Novel Fibonacci and non-Fibonacci structure in the sunflower: results of a citizen science experiment [PDF]

open access: yesRoyal Society Open Science, 2016
This citizen science study evaluates the occurrence of Fibonacci structure in the spirals of sunflower (Helianthus annuus) seedheads. This phenomenon has competing biomathematical explanations, and our core premise is that observation of both Fibonacci ...
Jonathan Swinton, Erinma Ochu,
doaj   +1 more source

On the greatest common divisor of n and the nth Fibonacci number, II [PDF]

open access: yesCanadian mathematical bulletin, 2017
Let $\mathcal {A}$ be the set of all integers of the form $\gcd (n, F_n)$ , where n is a positive integer and $F_n$ denotes the nth Fibonacci number. Leonetti and Sanna proved that $\mathcal {A}$ has natural density equal to zero, and asked for a
A. Jha, C. Sanna
semanticscholar   +1 more source

Odd Fibonacci Stolarsky-3 Mean Labeling of Some Special Graphs

open access: yesRatio Mathematica, 2022
Let G be a graph with p vertices and q edges and an injective function  where each  is a odd Fibonacci number and the induced edge labeling  are defined by and all these edge labeling are distinct is called Odd Fibonacci Stolarsky-3 Mean Labeling.
M Sree Vidya, S.S Sandhya
doaj   +1 more source

True Random Number Generator Based on Fibonacci-Galois Ring Oscillators for FPGA

open access: yesApplied Sciences, 2021
Random numbers are widely employed in cryptography and security applications. If the generation process is weak, the whole chain of security can be compromised: these weaknesses could be exploited by an attacker to retrieve the information, breaking even
P. Nannipieri   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy