Results 71 to 80 of about 3,254,389 (231)
Bidiagonal Decompositions and Accurate Computations for the Ballot Table and the Fibonacci Matrix
ABSTRACT Riordan arrays include many important examples of matrices. Here we consider the ballot table and the Fibonacci matrix. For finite truncations of these Riordan arrays, we obtain bidiagonal decompositions. Using them, algorithms to solve key linear algebra problems for ballot tables and Fibonacci matrices with high relative accuracy are derived.
Jorge Ballarín +2 more
wiley +1 more source
A Note on Fibonacci Sequences of Random Variables
The aim of this paper is to introduce and investigate the newrandom sequence in the form{X0, X1, Xn = Xn−2 +Xn−1, n = 2, 3, ..˙} , referred to as Fibonacci Sequence of Random Variables (FSRV).
Ismihan Bayramoğlu
doaj +1 more source
Entanglement in Quantum Systems Based on Directed Graphs
The entanglement properties of quantum states associated with directed graphs are investigated. It is proved that the vertex degree distribution fully determines this entanglement measure, which remains invariant under vertex relabeling, thereby highlighting its topological character.
Lucio De Simone, Roberto Franzosi
wiley +1 more source
The Golden ratio and Fibonacci sequence are used as proportions in design as symbols of beauty and harmony. That symbolism is a result of the strong connections in their mathematical nature. The Golden section is a number, introduced with Greek letter φ,
Z. Kazlacheva
semanticscholar +1 more source
Automating Algorithm Experiments With ALGator: From Problem Modeling to Reproducible Results
ABSTRACT Background Theoretical algorithm analysis provides fundamental insights into algorithm complexity but relies on simplified and often outdated computational models. Experimental algorithmics complements this approach by evaluating the empirical performance of algorithm implementations on real data and modern computing platforms.
Tomaž Dobravec
wiley +1 more source
FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan +6 more
wiley +1 more source
Generalized Fibonacci Sequences Generated from a $k$--Fibonacci Sequence
In this paper we will prove that all $k$--Fibonacci sequence contains generalized Fibonacci sequences and we will indicate the form of obtain them.
openaire +1 more source
Encrypt Anything: A Content‐Aware Hierarchical Privacy Protection Method for Image Data
This paper proposes the Encrypt Anything Model (EAM), a content‐aware hierarchical privacy protection method that integrates the Segment Anything Model (SAM) and Grounding‐DINO to automatically detect and segment privacy entities in images. EAM dynamically adjusts the encryption granularity according to the sensitivity level of privacy and introduces a
Jiawei Han +5 more
wiley +1 more source
Diophantine equations with Lucas and Fibonacci number coefficients [PDF]
Fibonacci and Lucas numbers are special number sequences that have been the subject of many studies throughout history due to the relations they provide.
Cemil Karaçam +3 more
doaj +1 more source
Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan +3 more
wiley +1 more source

