Results 71 to 80 of about 3,254,389 (231)

Bidiagonal Decompositions and Accurate Computations for the Ballot Table and the Fibonacci Matrix

open access: yesNumerical Linear Algebra with Applications, Volume 33, Issue 1, February 2026.
ABSTRACT Riordan arrays include many important examples of matrices. Here we consider the ballot table and the Fibonacci matrix. For finite truncations of these Riordan arrays, we obtain bidiagonal decompositions. Using them, algorithms to solve key linear algebra problems for ballot tables and Fibonacci matrices with high relative accuracy are derived.
Jorge Ballarín   +2 more
wiley   +1 more source

A Note on Fibonacci Sequences of Random Variables

open access: yesStatistica, 2022
The aim of this paper is to introduce and investigate the newrandom sequence in the form{X0, X1, Xn = Xn−2 +Xn−1, n = 2, 3, ..˙} , referred to as Fibonacci Sequence of Random Variables (FSRV).
Ismihan Bayramoğlu
doaj   +1 more source

Entanglement in Quantum Systems Based on Directed Graphs

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 1, January 2026.
The entanglement properties of quantum states associated with directed graphs are investigated. It is proved that the vertex degree distribution fully determines this entanglement measure, which remains invariant under vertex relabeling, thereby highlighting its topological character.
Lucio De Simone, Roberto Franzosi
wiley   +1 more source

An investigation of application of the golden ratio and Fibonacci sequence in fashion design and pattern making

open access: yes, 2017
The Golden ratio and Fibonacci sequence are used as proportions in design as symbols of beauty and harmony. That symbolism is a result of the strong connections in their mathematical nature. The Golden section is a number, introduced with Greek letter φ,
Z. Kazlacheva
semanticscholar   +1 more source

Automating Algorithm Experiments With ALGator: From Problem Modeling to Reproducible Results

open access: yesSoftware: Practice and Experience, Volume 56, Issue 1, Page 26-41, January 2026.
ABSTRACT Background Theoretical algorithm analysis provides fundamental insights into algorithm complexity but relies on simplified and often outdated computational models. Experimental algorithmics complements this approach by evaluating the empirical performance of algorithm implementations on real data and modern computing platforms.
Tomaž Dobravec
wiley   +1 more source

FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm

open access: yesIET Computers &Digital Techniques, Volume 2026, Issue 1, 2026.
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan   +6 more
wiley   +1 more source

Generalized Fibonacci Sequences Generated from a $k$--Fibonacci Sequence

open access: yesJournal of Mathematics Research, 2012
In this paper we will prove that all $k$--Fibonacci sequence contains generalized Fibonacci sequences and we will indicate the form of obtain them.
openaire   +1 more source

Encrypt Anything: A Content‐Aware Hierarchical Privacy Protection Method for Image Data

open access: yesIET Computer Vision, Volume 20, Issue 1, January/December 2026.
This paper proposes the Encrypt Anything Model (EAM), a content‐aware hierarchical privacy protection method that integrates the Segment Anything Model (SAM) and Grounding‐DINO to automatically detect and segment privacy entities in images. EAM dynamically adjusts the encryption granularity according to the sensitivity level of privacy and introduces a
Jiawei Han   +5 more
wiley   +1 more source

Diophantine equations with Lucas and Fibonacci number coefficients [PDF]

open access: yesNotes on Number Theory and Discrete Mathematics
Fibonacci and Lucas numbers are special number sequences that have been the subject of many studies throughout history due to the relations they provide.
Cemil Karaçam   +3 more
doaj   +1 more source

Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy