We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 260 results
  1. On dual hyperbolic numbers with generalized Jacobsthal numbers components

    In this paper, we introduce the generalized dual hyperbolic Jacobsthal numbers. As special cases, we deal with dual hyperbolic Jacobsthal and dual...

    Yüksel Soykan, Erkan Taşdemir, İnci Okumuş in Indian Journal of Pure and Applied Mathematics
    Article 15 August 2022
  2. Generalized hyper-Lucas numbers and applications

    In this paper, we give some combinatorial properties of a new generalization of hyper-Lucas numbers in order to extend the Cassini determinant. We...

    Lyes Ait-Amrane, Djilali Behloul in Indian Journal of Pure and Applied Mathematics
    Article 17 June 2021
  3. On dual hyperbolic generalized Fibonacci numbers

    In this paper, we introduce the generalized dual hyperbolic Fibonacci numbers. As special cases, we deal with dual hyperbolic Fibonacci and dual...

    Article 01 March 2021
  4. Algebra of quaternions and octonions involving higher order Mersenne numbers

    In this article, we investigate the algebra of quaternions and octonions with components as the higher order Mersenne numbers. We examine the...

    Munesh Kumari, Kalika Prasad, Rabiranjan Mohanta in Proceedings of the Indian National Science Academy
    Article 06 May 2024
  5. A Note on Special Matrices Involving k-Bronze Fibonacci Numbers

    In this work, we consider a generalization of the Bronze Fibonacci sequence, called the k-Bronze Fibonacci sequence, in which the recurrence formula...
    Paula Catarino, Sandra Ricardo in Mathematical Methods for Engineering Applications
    Conference paper 2023
  6. Generalized Freudenthal duality for rotating extremal black holes

    Freudenthal duality (FD) is a non-linear symmetry of the Bekenstein-Hawking entropy of extremal dyonic black holes (BHs) in Maxwell-Einstein-scalar...

    Arghya Chattopadhyay, Taniya Mandal, Alessio Marrani in Journal of High Energy Physics
    Article Open access 29 March 2024
  7. Secure Color Image Encryption Using 9D Hyperchaotic System, Fibonacci Matrices of order m and Symplectic Quaternion-Fractional Hahn Moments

    This work presents a novel scheme for encrypting color images. It leverages quaternion algebra, quaternion discrete fractional Hahn moments (QDFHM),...

    Rachid Chaker, Abdelkarim Boua in SN Computer Science
    Article 27 April 2024
  8. Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach

    In recent years, numerous image encryption schemes have been developed that demonstrate different levels of effectiveness in terms of robust security...

    Mohammad Mazyad Hazzazi, Mujeeb Ur Rehman, ... Aminu Bello Usman in Scientific Reports
    Article Open access 29 May 2024
  9. From Fibonacci Sequence to More Recent Generalisations

    Number sequences have been the subject of several research studies. From the algebraic properties to the generating matrices and generating functions...
    Paula Catarino, Helena Campos in Mathematical Methods for Engineering Applications
    Conference paper 2022
  10. Profitability trend prediction in crypto financial markets using Fibonacci technical indicator and hybrid CNN model

    Cryptocurrency has become a popular trading asset due to its security, anonymity, and decentralization. However, predicting the direction of the...

    Bilal Hassan Ahmed Khattak, Imran Shafi, ... Imran Ashraf in Journal of Big Data
    Article Open access 28 April 2024
  11. On generalization for Tribonacci Trigintaduonions

    The trigintaduonions form a 32-dimensional Cayley–Dickson algebra. In this paper, we intend to make a new approach to introduce the concept of...

    Article 18 June 2021
  12. Quantum image encryption algorithm based on generalized Arnold transform and Logistic map

    In the era of big data, image security and real-time processing become more and more important and increasingly difficult to satisfy. To improve the...

    Wen-Wen Hu, Ri-Gui Zhou, ... Jia Luo in CCF Transactions on High Performance Computing
    Article 04 August 2020
  13. Quantum image encryption scheme using independent bit-plane permutation and Baker map

    Quantum image encryption can take full advantage of superposition and entanglement properties of the qubit to improve efficiency and security. To...

    **ngbin Liu, Cong Liu in Quantum Information Processing
    Article 26 June 2023
  14. Federated learning-outcome prediction with multi-layer privacy protection

    Learning-outcome prediction (LOP) is a longstanding and critical problem in educational routes. Many studies have contributed to develo** effective...

    Yupei Zhang, Yuxin Li, ... Xuequn Shang in Frontiers of Computer Science
    Article 28 December 2023
  15. Properties of Multivariate b-Ary Stern Polynomials

    Given an integer base b ≥ 2, we investigate a multivariate b-ary polynomial analogue of Stern’s diatomic sequence which arose in the study of hyper...
    Karl Dilcher, Larry Ericksen in George E. Andrews 80 Years of Combinatory Analysis
    Chapter 2021
  16. A Review on Applications of Chaotic Maps in Pseudo-Random Number Generators and Encryption

    Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform. Sectors such as e-commerce, sensitive multi-media transfer,...

    Rasika B. Naik, Udayprakash Singh in Annals of Data Science
    Article 18 January 2022
  17. An unrestricted Arnold’s cat map transformation

    The Arnold’s Cat Map (ACM) is one of the chaotic transformations, which is utilized by numerous scrambling and encryption algorithms in Information...

    Mehmet Turan, Erhan Gökçay, Hakan Tora in Multimedia Tools and Applications
    Article Open access 06 February 2024
Did you find what you were looking for? Share feedback.