Results 61 to 70 of about 29,133 (216)

Binomials transformation formulae for scaled Fibonacci numbers

open access: yesOpen Mathematics, 2017
The aim of the paper is to present the binomial transformation formulae of Fibonacci numbers scaled by complex multipliers. Many of these new and nontrivial relations follow from the fundamental properties of the so-called delta-Fibonacci numbers defined
Hetmaniok Edyta   +2 more
doaj   +1 more source

On Quaternion-Gaussian Fibonacci Numbers and Their Properties

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica, 2021
We study properties of Gaussian Fibonacci numbers. We start with some basic identities. Thereafter, we focus on properties of the quaternions that accept gaussian Fibonacci numbers as coefficients.
Halici Serpil, Cerda-Morales Gamaliel
doaj   +1 more source

Improving Maximum Tolerated Dose Selection in Model‐Assisted Designs for Phase I Trials Through Bayesian Dose–Response Model

open access: yesPharmaceutical Statistics, Volume 24, Issue 6, November/December 2025.
ABSTRACT Model‐assisted designs have garnered significant attention in recent years due to their high accuracy in identifying the maximum tolerated dose (MTD) and their operational simplicity. To identify the MTD, they employ estimated dose limiting toxicity (DLT) probabilities via isotonic regression with pool‐adjacent violators algorithm (PAVA) after
Rentaro Wakayama   +2 more
wiley   +1 more source

Shifted Fibonacci Numbers

open access: yesAfyon Kocatepe University Journal of Sciences and Engineering, 2023
Shifted Fibonacci numbers have been examined in the literature in terms of the greatest common divisor, but appropriate definitions and fundamental equations have not been worked on. In this article, we have obtained the Binet formula, which is a fundamental equation used to obtain the necessary element of the shifted Fibonacci number sequence ...
openaire   +5 more sources

Register‐Based and Stack‐Based Virtual Machines: Which Perform Better in JIT Compilation Scenarios?

open access: yesSoftware: Practice and Experience, Volume 55, Issue 11, Page 1896-1910, November 2025.
ABSTRACT Background Just‐In‐Time (JIT) compilation plays a critical role in optimizing the performance of modern virtual machines (VMs). While the architecture of VMs–register‐based or stack‐based–has long been a subject of debate, empirical analysis focusing on JIT compilation performance is relatively sparse. Objective In this study, we aim to answer
Bohuslav Šimek   +2 more
wiley   +1 more source

Modeling the Crustal Magnetic Field of Mars With Physics‐Informed Neural Networks

open access: yesJournal of Geophysical Research: Planets, Volume 130, Issue 11, November 2025.
Abstract Satellites orbiting Mars have measured crustal magnetic fields up to two orders of magnitude stronger than those on Earth. Although Mars currently lacks an active global magnetic field, this magnetization preserves a valuable record of the planet's early dynamo activity and crustal evolution.
T. Delcourt, A. Mittelholz
wiley   +1 more source

Micromagnetic Simulations of Chemical Remanent Magnetization Acquisition in Single‐Vortex Magnetite Particles

open access: yesGeophysical Research Letters, Volume 52, Issue 20, 28 October 2025.
Abstract Magnetic minerals can preserve remanent magnetization to provide ancient magnetic field records. Although thermoremanent magnetization (TRM) is well understood, chemical remanent magnetization (CRM) from chemical processes is also prevalent in nature and can complicate TRM records by introducing additional remanence signals.
Shichu Chen, Liao Chang, Wyn Williams
wiley   +1 more source

Fibonacci factoriangular numbers

open access: yesIndagationes Mathematicae, 2017
A recent conjecture is proved asserting that \(2, 5\), and \(34\) are the only Fibonacci numbers that are of the form \(n! + n(n+1)/2\) for some integer \(n\). The main tool to prove it is an upper bound for a non-zero \(p\)-adic linear form in two logarithms of algebraic numbers.
Gómez Ruiz, C.   +1 more
openaire   +4 more sources

An adaptive block‐wise prediction error‐based (AdaBPE) reversible data hiding in encrypted images for medical image transmission

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 5, Page 1269-1290, October 2025.
Abstract Life expectancy has improved with new‐age technologies and advancements in the healthcare sector. Though artificial intelligence (AI) and the Internet of Things (IoT) are revolutionising smart healthcare systems, security of the healthcare data is always a concern.
Shaiju Panchikkil   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy