Results 71 to 80 of about 24,784 (197)

FIBONACCI TILINGS IN FASHION DESIGN [PDF]

open access: yesAnnals of the University of Oradea: Fascicle of Textiles, Leatherwork, 2016
The Fibonacci sequence is a symbol of beauty and harmony and by this reason geometrical objects in its proportions are used in the design. There are some versions of Fibonacci series tiling, which are constructed with equilateral geometrical figures ...
KAZLACHEVA Zlatina
doaj  

Sequences defined by h-vectors [PDF]

open access: yes, 2018
In this paper we consider the sequence whose n^{th} term is the number of h-vectors of length n. We show that the n^{th} term of this sequence is bounded above by the n^{th} Fibonacci number and bounded below by the number if integer partitions of n into
Enkosky, Thomas, Stone, Branden
core  

Optimal Control and the Fibonacci Sequence [PDF]

open access: yesJournal of Optimization Theory and Applications, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
von Brasch, Thomas   +2 more
openaire   +7 more sources

Encrypt Anything: A Content‐Aware Hierarchical Privacy Protection Method for Image Data

open access: yesIET Computer Vision, Volume 20, Issue 1, January/December 2026.
This paper proposes the Encrypt Anything Model (EAM), a content‐aware hierarchical privacy protection method that integrates the Segment Anything Model (SAM) and Grounding‐DINO to automatically detect and segment privacy entities in images. EAM dynamically adjusts the encryption granularity according to the sensitivity level of privacy and introduces a
Jiawei Han   +5 more
wiley   +1 more source

What does a modified-Fibonacci dose-escalation actually correspond to?

open access: yesBMC Medical Research Methodology, 2012
Background In most phase I oncology trials, it is often stated that the dose increments follow a “modified-Fibonacci sequence”. This term, however, is vague.
Penel Nicolas, Kramar Andrew
doaj   +1 more source

Hopcroft's automaton minimization algorithm and Sturmian words [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2008
This paper is concerned with the analysis of the worst case behavior of Hopcroft's algorithm for minimizing deterministic finite state automata. We extend a result of Castiglione, Restivo and Sciortino.
Jean Berstel   +2 more
doaj   +1 more source

Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan   +3 more
wiley   +1 more source

Psychoacoustic Properties of Fibonacci Sequences

open access: yesActa Polytechnica, 2008
1202, Fibonacci set up one of the most interesting sequences in number theory. This sequence can be represented by so-called Fibonacci Numbers, and by a binary sequence of zeros and ones.
J. Sokoll, S. Fingerhuth
doaj  

Generalized Natural Density DF⁡(Fk) of Fibonacci Word

open access: yesVestnik KRAUNC: Fiziko-Matematičeskie Nauki
This paper explores profound generalizations of the Fibonacci sequence, delving into random Fibonacci sequences, k-Fibonacci words, and their combinatorial properties.
Abdullah, D., Hamoud, J.
doaj   +1 more source

KAJIAN DERET FIBONACCI DAN GOLDEN RATIO PADA LAGU BUNGAN SANDAT

open access: yesE-Jurnal Matematika, 2012
This study aims to analyze mathematically Bungan Sandat songs and arrange the elements in terms of the Fibonacci sequence and Golden Ratio. Then the ratio of the beauty of the song before and after arrangements were analyzed using the Wilcoxon test with ...
GEDE AGUS HENDRA YOGANGGA   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy