Results 11 to 20 of about 84,803 (254)
All Liouville Numbers are Transcendental [PDF]
Summary In this Mizar article, we complete the formalization of one of the items from Abad and Abad’s challenge list of “Top 100 Theorems” about Liouville numbers and the existence of transcendental numbers. It is item #18 from the “Formalizing 100 Theorems” list maintained by Freek Wiedijk at http://www.cs.ru.nl/F.Wiedijk/100 ...
Artur Kornilowicz +2 more
openaire +6 more sources
Continued fractions and transcendental numbers [PDF]
It is widely believed that the continued fraction expansion of every irrational algebraic number $\alpha$ either is eventually periodic (and we know that this is the case if and only if $\alpha$ is a quadratic irrational), or it contains arbitrarily ...
Adamczewski, Boris +2 more
core +3 more sources
Mathematics and physical reality: The theme of the absence of the “Transcendental Signifi ed” in the language of modern fundamental science [PDF]
Introduction. It is argued that today the expansion of mathematics into the field of physical reality is not being performed in line with the classical paradigm, but in line with the linguistic turn of non-classical philosophy. Theoretical analysis. Such
Duplinskya, Yuliya Mikhailovna
doaj +1 more source
Explicit finite algebraic formulas are given for some well-known sequences, including complements of polynomial sequences.
Scott J. Beslin
doaj +1 more source
Continued fractions for some transcendental numbers [PDF]
We consider series of the form $p/q + \sum_{j=2}^\infty 1/x_j$, where $x_1=q$ and the integer sequence $x_n$ satisfies a certain non-autonomous recurrence of second order, which entails that $x_n|x_{n+1}$ for n?1.
Andrew N. W. Hone +4 more
core +3 more sources
A Novel Method for Image Encryption Based on Chaos and Transcendental Numbers
In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the
Victor Manuel Silva Garcia +4 more
doaj +1 more source
Approximating L2-invariants, and the Atiyah conjecture [PDF]
Let G be a torsion free discrete group and let \bar{Q} denote the field of algebraic numbers in C. We prove that \bar{Q}[G] fulfills the Atiyah conjecture if G lies in a certain class of groups D, which contains in particular all groups which are ...
Atiyah +21 more
core +1 more source
Unification Theories: Examples and Applications
We consider several unification problems in mathematics. We refer to transcendental numbers. Furthermore, we present some ways to unify the main non-associative algebras (Lie algebras and Jordan algebras) and associative algebras.
Florin F. Nichita
doaj +1 more source
Transcendental numbers and the topology of three-loop bubbles [PDF]
We present a proof that all transcendental numbers that are needed for the calculation of the master integrals for three-loop vacuum Feynman diagrams can be obtained by calculating diagrams with an even simpler topology, the topology of spectacles ...
A. A. Pivovarov +22 more
core +2 more sources
Promiscuity‐Guided Enzyme Evolution via Substrate Multiplexed Screening
Through historical context and recent examples, this Minireview summarizes the strengths, limitations, and practical considerations for the implementation of substrate multiplexed screening (SUMS) in enzyme evolution. ABSTRACT An enzyme's ability to react with diverse substrates while maintaining high yield and selectivity, termed “substrate ...
Holly A. Weilbaker +3 more
wiley +2 more sources

