scholarly journals Fibonacci words in hyperbolic Pascal triangles

2017 ◽  
Vol 9 (2) ◽  
pp. 336-347
Author(s):  
László Németh

Abstract The hyperbolic Pascal triangle HPT4,q (q ≥ 5) is a new mathematical construction, which is a geometrical generalization of Pascal’s arithmetical triangle. In the present study we show that a natural pattern of rows of HPT 4,5 is almost the same as the sequence consisting of every second term of the well-known Fibonacci words. Further, we give a generalization of the Fibonacci words using the hyperbolic Pascal triangles. The geometrical properties of a HPT 4,q imply a graph structure between the finite Fibonacci words.

2019 ◽  
Author(s):  
S. Mejia ◽  
A. Iodence ◽  
L. Griffin ◽  
S.J. Withrow ◽  
M. Salman ◽  
...  

2020 ◽  
Vol 4 (2) ◽  
pp. 599-604
Author(s):  
Michael A. Onoja ◽  
P. H. Bukar ◽  
C. U. Omeje ◽  
A. M. Adamu

Instrumental neutron activation analysis (INAA) technique was used to investigate the abundance and distribution of rare earth elements (REE) in soil around Kaduna Refinery. The aim of the study is to assess the rare elements potential of Nigeria for economic exploitation. Five REEs (La, Dy, Eu, Yb, and Lu) were detected in varying concentrations ranging from a minimum of 0.6 µg/g (Lu) to a maximum of 249.0 µg/g (La). The elements existed with trends consistent with the natural pattern of REEs in soil, showing significant Eu and Dy anomalies which characterize upper plains and flood plains. The levels of REEs in soil in the study area were generally slightly above background levels, with minimal (La, Dy, and Eu), moderate (Yb), and significant (Lu) enrichments and trending: Lu ˃Yb ˃ Eu ˃ Dy ˃ La. The abundance of the REEs investigated cannot establish a potential of Nigeria for economic exploitation of the mineral, hence, rare earth project in the study area is not viable at the moment.


2014 ◽  
Vol 59 (2) ◽  
pp. 553-562 ◽  
Author(s):  
Agnieszka Surowiak ◽  
Marian Brożek

Abstract Settling velocity of particles, which is the main parameter of jig separation, is affected by physical (density) and the geometrical properties (size and shape) of particles. The authors worked out a calculation algorithm of particles settling velocity distribution for irregular particles assuming that the density of particles, their size and shape constitute independent random variables of fixed distributions. Applying theorems of probability, concerning distributions function of random variables, the authors present general formula of probability density function of settling velocity irregular particles for the turbulent motion. The distributions of settling velocity of irregular particles were calculated utilizing industrial sample. The measurements were executed and the histograms of distributions of volume and dynamic shape coefficient, were drawn. The separation accuracy was measured by the change of process imperfection of irregular particles in relation to spherical ones, resulting from the distribution of particles settling velocity.


2018 ◽  
Vol 6 (6) ◽  
pp. 816-821
Author(s):  
Jagtar Singh ◽  
Sanjay Singla ◽  
Surender Jangra

Author(s):  
R. B. Gnana Jothi ◽  
R. Ezhil Mary
Keyword(s):  

Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


Sign in / Sign up

Export Citation Format

Share Document