5,627 results
Search Results
2. Generalized Polynomials on Semigroups: This paper is dedicated to Kazimierz Nikodem on the occasion of his 70th birthday.
- Author
-
Ebanks, Bruce
- Subjects
GENERALIZATION ,HOMOMORPHISMS ,POLYNOMIALS ,ABELIAN groups ,EXPONENTIAL functions - Abstract
This article has two main parts. In the first part we show that some of the basic theory of generalized polynomials on commutative semi-groups can be extended to all semigroups. In the second part we show that if a sub-semigroup S of a group G generates G in the sense that G = S · S
−1 , then a generalized polynomial on S with values in an Abelian group H can be extended to a generalized polynomial on G into H. Finally there is a short discussion of the extendability of exponential functions and generalized exponential polynomials. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
3. EXPONENTIAL POLYNOMIALS AND STRATIFICATION IN THE THEORY OF ANALYTIC INEQUALITIES.
- Author
-
MALEŠEVIĆ, BRANKO and MIĆOVIĆ, MILOŠ
- Subjects
POLYNOMIALS - Abstract
This paper considers MEP - Mixed Exponential Polynomials as one class of real exponential polynomials. We introduce a method for proving the positivity of MEP inequalities over positive intervals using the Maclaurin series to approximate the exponential function precisely. Additionally, we discuss the relation between MEPs and stratified families of functions from [1] through two applications, referring to inequalities from papers [2] and [3]. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Comment on the paper by Jalal et al. [Chaos, Solitons and Fractals 135 (2020) 109712].
- Author
-
Faraj, Bawar Mohammed, Sabir, Pishtiwan Othman, Mohammed Salih, Dana Taha, and Hilmi, Hozan
- Subjects
- *
CHAOS theory , *SOLITONS , *FRACTALS , *POLYNOMIALS , *EQUILIBRIUM - Abstract
In the paper by Jalal et al. [1], the authors present phase portraits of a differential system exhibiting chaotic behavior with line equilibria. This commentary identifies inaccuracies in the provided figures and offers corrected versions. Specifically, discrepancies were found in Fig. 1 (phase portraits with parameters a = 15 and b = 1) and Fig. 2 (phase portraits with parameters a = 0 and b = 5). Corrected figures, along with MATLAB codes for verification, are provided. These corrections are discussed in the context of chaotic systems with line equilibria, referencing Jafari and Sprott's work [2], which explores similar systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Digital Self-Interference Cancellation for Full-Duplex Systems Based on CNN and GRU.
- Author
-
Liu, Jun and Ding, Tian
- Subjects
CONVOLUTIONAL neural networks ,TELECOMMUNICATION systems ,POLYNOMIALS ,SIGNALS & signaling - Abstract
Self-interference (SI) represents a bottleneck in the performance of full-duplex (FD) communication systems, necessitating robust offsetting techniques to unlock the potential of FD systems. Currently, deep learning has been leveraged within the communication domain to address specific challenges and enhance efficiency. Inspired by this, this paper reviews the self-interference cancellation (SIC) process in the digital domain focusing on SIC capability. The paper introduces a model architecture that integrates CNN and gated recurrent unit (GRU), while also incorporating residual networks and self-attention mechanisms to enhance the identification and elimination of SI. This model is named CGRSA-Net. Firstly, CNN is employed to capture local signal features in the time–frequency domain. Subsequently, a ResNet module is introduced to mitigate the gradient vanishing problem. Concurrently, GRU is utilized to dynamically capture and retain both long- and short-term dependencies during the communication process. Lastly, by integrating the self-attention mechanism, attention weights are flexibly assigned when processing sequence data, thereby focusing on the most important parts of the input sequence. Experimental results demonstrate that the proposed CGRSA-Net model achieves a minimum of 28% improvement in nonlinear SIC capability compared to polynomial and existing neural network-based eliminator. Additionally, through ablation experiments, we demonstrate that the various modules utilized in this paper effectively learn signal features and further enhance SIC performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Remarks on a class of combinatorial numbers and polynomials.
- Author
-
Kucukoglu, Irem
- Subjects
GENERATING functions ,POLYNOMIALS ,QUANTUM theory ,CALCULUS - Abstract
In this paper, by using the theory of quantum calculus, we introduce a class of combinatorial numbers and polynomials. In particular, the class of q-combinatorial numbers introduced in this work is a q-analogue of the combinatorial numbers recently defined by Simsek [9]. We also construct a formula for the generating functions of these q-combinatorial n umbers in terms of q-exponential functions. Furthermore, applying q-derivative, we analyze some properties of these q-combinatorial numbers and their generating functions. As a result of this analysis, we give a few remarks related to our findings. Finally, we conclude the paper with a brief observation on our results. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits.
- Author
-
Limaye, Nutan, Srinivasan, Srikanth, and Tavenas, Sébastien
- Subjects
ALGEBRA ,POLYNOMIALS ,CIRCUIT complexity ,ALGORITHMS ,DIRECTED acyclic graphs ,LOGIC circuits - Abstract
An Algebraic Circuit for a multivariate polynomial P is a computational model for constructing the polynomial P using only additions and multiplications. It is a syntactic model of computation, as opposed to the Boolean Circuit model, and hence lower bounds for this model are widely expected to be easier to prove than lower bounds for Boolean circuits. Despite this, we do not have superpolynomial lower bounds against general algebraic circuits of depth 3 (except over constant-sized finite fields) and depth 4 (over any field other than F
2 ), while constant-depth Boolean circuit lower bounds have been known since the early 1980s. In this paper, we prove the first superpolynomial lower bounds against algebraic circuits of all constant depths over all fields of characteristic 0. We also observe that our super-polynomial lower bound for constant-depth circuits implies the first deterministic sub-exponential time algorithm for solving the Polynomial Identity Testing (PIT) problem for all small-depth circuits using the known connection between algebraic hardness and randomness. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
8. Enhanced power graphs of certain non-abelian groups.
- Author
-
Parveen, Dalal, Sandeep, and Kumar, Jitender
- Subjects
NONABELIAN groups ,UNDIRECTED graphs ,POWER spectra ,LAPLACIAN matrices ,FINITE groups ,QUATERNIONS ,POLYNOMIALS - Abstract
The enhanced power graph of a group G is a simple undirected graph with vertex set G and two vertices are adjacent if they belong to the same cyclic subgroup. In this paper, we obtain the Laplacian spectrum of the enhanced power graph of certain non-abelian groups, viz. semidihedral, dihedral and generalized quaternion. Also, we obtained the metric dimension and the resolving polynomial of the enhanced power graphs of these groups. At the final part of this paper, we study the distant properties and the detour distant properties, namely: closure, interior, distance degree sequence, eccentric subgraph of the enhanced power graph of semidihedral group, dihedral group and generalized quaternion group, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. An ε-approximation solution of time-fractional diffusion equations based on Legendre polynomials.
- Author
-
Yingchao Zhang and Yingzhen Lin
- Subjects
ORTHONORMAL basis ,POLYNOMIALS - Abstract
The purpose of this paper is to establish a numerical method for solving time-fractional diffusion equations. To obtain the numerical solution, a binary reproducing kernel space is defined, and the orthonormal basis is constructed based on Legendre polynomials in this space. In order to find the ε-approximation solution of time-fractional diffusion equations, which is defined in this paper, the algorithm is designed using the constructed orthonormal basis. Some numerical examples are analyzed to illustrate the procedure and confirm the performance of the proposed method. The results faithfully reveal that the presented method is considerably accurate and effective, as expected. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. ESTIMATES FOR THE NORM OF THE SPHERICAL MAXIMAL OPERATOR ON FINITE GRAPHS.
- Author
-
HUSSAIN, ZARYAB, JIAN ZHONG XU, TCHIER, FAIROUZ, TALIB, SADIA, RAZA, UMAR, and ARSHAD, MUHAMMAD
- Subjects
NORMAL operators ,MATHEMATICAL inequalities ,POLYNOMIALS ,LINEAR algebra ,MATHEMATICAL formulas - Abstract
For a simple, finite, and connected graph G, the spherical maximal operator is defined as ... where ... is the sphere with center at t and having radius r. In this paper, we consider the spherical maximal operator ... on ... spaces and calculate the ... for ... and estimate the ... for ..., when G is K
m . Furthermore, We establish the maximum and minimum bounds for the spherical maximum operator on finite graphs and indicate the graphs that achieve these bounds. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
11. Generation of Polynomial Automorphisms Appropriate for the Generalization of Fuzzy Connectives.
- Author
-
Makariadis, Eleftherios, Makariadis, Stefanos, Konguetsof, Avrilia, and Papadopoulos, Basil
- Subjects
GENERALIZATION ,POLYNOMIALS ,ARTIFICIAL intelligence ,MATHEMATICAL models ,NUMERICAL analysis - Abstract
Fuzzy logic is becoming one of the most-influential fields of modern mathematics with applications that impact not only other sciences, but society in general. This newly found interest in fuzzy logic is in part due to the crucial role it plays in the development of artificial intelligence. As a result, new tools and practices for the development of the above-mentioned field are in high demand. This is one of the issues this paper was composed to address. To be more specific, a sizable part of fuzzy logic is the study of fuzzy connectives. However, the current method used to generalize them is restricted to the use of basic automorphisms, which hinders the creation of new fuzzy connectives. For this reason, in this paper, a new method of generalization is conceived of that aims to generalize the fuzzy connectives using polynomial automorphism functions instead. The creation of these automorphisms is achieved through numerical analysis, an endeavor that is supported with programming applications that, using mathematical modeling, validate and visualize the research. Furthermore, the automorphisms satisfy all the necessary criteria that have been established for use in the generalization process and, consequently, are used to successfully generalize fuzzy connectives. The result of the new generalization method is the creation of new usable and flexible fuzzy connectives, which is very promising for the future development of the field. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Some results on q-shift difference-differential polynomials sharing finite value.
- Author
-
H. R., Jayarama, N. B., Gatti, S. H., Naveenkumar, and C. N., Chaithra
- Subjects
POLYNOMIALS ,MEROMORPHIC functions ,MATHEMATICS theorems ,NEVANLINNA theory ,DIGITAL transformation - Abstract
In this paper, we study the uniqueness of meromorphic functions with q-shift difference-differential polynomials F = [P(f)L(z, f)s](k) and G = [P(g)L(z, g)s](k), where P(z) is a non-constant polynomial with degree n sharing a finite value. The results of this paper are an extension of the previous theorems given by Harina P. Waghamore and Rajeshwari S [19]. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Nilpotent global centers of generalized polynomial Kukles system with degree three.
- Author
-
Chen, Hebai, Feng, Zhaosheng, and Zhang, Rui
- Subjects
POLYNOMIALS ,EQUILIBRIUM - Abstract
In this paper, we study and characterize the nilpotent global centers of a generalized polynomial Kukles system with degree three. A sufficient and necessary condition of global centers is established under certain parametric conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. On the Robustness of Polynomial Dichotomy of Discrete Nonautonomous Systems.
- Author
-
DRAGIČEVIĆ, DAVOR, SASU, ADINA LUMINIȚA, and SASU, BOGDAN
- Subjects
DISCRETE systems ,EXPONENTIAL dichotomy ,POLYNOMIALS ,BANACH spaces - Abstract
Starting from a characterization of polynomial dichotomy by means of admissibility, recently proved in [Dragicevic, D.; Sasu, A. L.; Sasu, B. Admissibility and polynomial dichotomy of discrete nonautonomous systems. Carpath. J. Math. 38 (2022), 737-762.], the aim of this paper is to explore the roughness of polynomial dichotomy in the presence of perturbations and to obtain a new robustness criterion. We show that the polynomial dichotomy is robust when subjected to linear additive perturbations which are bounded by a well-chosen sequence. We emphasize that the new bounds imposed to the perturbation family improve and extend the previous approaches. Furthermore, we mention that the main result applies to discrete nonautonomous systems in Banach spaces with the only requirement that their propagators exhibit a polynomial growth. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Asymptotic distribution of the zeros of a certain family of generalized hypergeometric polynomials.
- Author
-
Zhou, Jian-Rong, Li, Heng, and Xu, Yongzhi
- Subjects
JACOBI polynomials ,ASYMPTOTIC distribution ,POLYNOMIALS ,INTEGERS - Abstract
The primary aim of this paper is to investigate the asymptotic distribution of the zeros of certain classes of hypergeometric $ {}_{q+1}F_{q} $ q + 1 F q polynomials. We employ classical analytical techniques, including Watson's lemma and the method of steepest descent, to understand the asymptotic behavior of these polynomials: $$\begin{align*} & _{q+1}F_{q}\left(-n,kn+\alpha,\ldots, kn+\alpha+\frac{q-1}{q};kn+\beta,\ldots,kn+\beta+\frac{q-1}{q};z\right)\\ &\quad (n\rightarrow \infty), \end{align*} $$ q + 1 F q (− n , kn + α , ... , kn + α + q − 1 q ; kn + β , ... , kn + β + q − 1 q ; z) (n → ∞) , where n is a nonnegative integer, q is a positive integer and the constant parameters α and β are constrained by $ \alpha { α < β. By applying the general results established in this paper, we generate numerical evidence and graphical illustrations using Mathematica to show the clustering of zeros on certain curves. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Exploring Chaotic Dynamics in a Fourth-Order Newton Method for Polynomial Root Finding.
- Author
-
Ghafil, Wisam K., Al-Juaifri, Ghassan A., and Al-Haboobi, Anas
- Subjects
NEWTON-Raphson method ,BIFURCATION diagrams ,DIFFERENTIABLE functions ,SYSTEM dynamics ,POLYNOMIALS - Abstract
This paper investigates the dynamics of a fourth-order Newtonian iterative method for finding roots of polynomials of degrees three and four. Unlike traditional fourth-order methods requiring third derivatives, this technique avoids them by using the same derivative order in each of its three steps per iteration. When applied to differentiable functions, the method generates chaotic dynamics, as shown for quartic polynomials. Specifically, we apply this root-finding approach to the bifurcation diagram of the logistic map over an interval. Our findings demonstrate the potential for complex behavior even in simple iterative methods, and highlight the usefulness of this approach for exploring polynomial system dynamics. The paper identifies examples of fourth-degree polynomials, explains bifurcation, and chaos. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Polynomial stability of transmission system for coupled Kirchhoff plates.
- Author
-
Wang, Dingkun, Hao, Jianghao, and Zhang, Yajing
- Subjects
POLYNOMIALS ,ELASTICITY ,EXPONENTS ,MATHEMATICS ,EQUATIONS - Abstract
In this paper, we study the asymptotic behavior of transmission system for coupled Kirchhoff plates, where one equation is conserved and the other has dissipative property, and the dissipation mechanism is given by fractional damping (- Δ) 2 θ v t with θ ∈ [ 1 2 , 1 ] . By using the semigroup method and the multiplier technique, we obtain the exact polynomial decay rates, and find that the polynomial decay rate of the system is determined by the inertia/elasticity ratios and the fractional damping order. Specifically, when the inertia/elasticity ratios are not equal and θ ∈ [ 1 2 , 3 4 ] , the polynomial decay rate of the system is t - 1 / (10 - 4 θ) . When the inertia/elasticity ratios are not equal and θ ∈ [ 3 4 , 1 ] , the polynomial decay rate of the system is t - 1 / (4 + 4 θ) . When the inertia/elasticity ratios are equal, the polynomial decay rate of the system is t - 1 / (4 + 4 θ) . Furthermore it has been proven that the obtained decay rates are all optimal. The obtained results extend the results of Oquendo and Suárez (Z Angew Math Phys 70(3):88, 2019) for the case of fractional damping exponent 2 θ from [0, 1] to [1, 2]. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. A single exponential time algorithm for homogeneous regular sequence tests.
- Author
-
Hashemi, Amir, Alizadeh, Benyamin M., Parnian, Hossein, and Seiler, Werner M.
- Subjects
HOMOGENEOUS polynomials ,ARITHMETIC ,POLYNOMIALS ,ALGORITHMS - Abstract
Assume that we are given a sequence F of k homogeneous polynomials in n variables of degree at most d and the ideal ℐ generated by this sequence. The aim of this paper is to present a new and effective method to determine, within the arithmetic complexity d O (n) , whether F is regular. This algorithm has been implemented in Maple and its efficiency (compared to the classical approaches for regular sequence test) is evaluated via a set of benchmark polynomials. Furthermore, we show that if F is regular then we can transform ℐ into Nœther position and at the same time compute a reduced Gröbner basis for the transformed ideal within the arithmetic complexity d O (n 2) . Finally, under the same assumption, we establish the new upper bound 2 (d k / 2) 2 n − k − 1 for the maximum degree of the elements of any reduced Gröbner basis of ℐ in the case that n > k. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Homogeneous involutions on graded division algebras and their polynomial identities.
- Author
-
Yasumura, Felipe Yukihide
- Subjects
HOMOGENEOUS polynomials ,POLYNOMIALS ,ALGEBRA ,DIVISION algebras - Abstract
In this paper, we describe the so-called homogeneous involution on finite-dimensional graded-division algebra over an algebraically closed field. We also compute their graded polynomial identities with involution. As pointed out by Fonseca and Mello, a homogeneous involution naturally appears when dealing with graded polynomial identities and a compatible involution. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. A Polynomial Multiplication Accelerator for Faster Lattice Cipher Algorithm in Security Chip.
- Author
-
Xu, Changbao, Yu, Hongzhou, Xi, Wei, Zhu, Jianyang, Chen, Chen, and Jiang, Xiaowen
- Subjects
MULTIPLICATION ,POLYNOMIALS ,CIPHERS ,ALGORITHMS ,SECURITY management ,MULTIPLIERS (Mathematical analysis) ,BLOCK ciphers - Abstract
Polynomial multiplication is the most computationally expensive part of the lattice-based cryptography algorithm. However, the existing acceleration schemes have problems, such as low performance and high hardware resource overhead. Based on the polynomial multiplication of number theoretic transformation (NTT), this paper proposed a simple element of Montgomery module reduction with pipeline structure to realize fast module multiplication. In order to improve the throughput of the NTT module, the block storage technology is used in the NTT hardware module to enable the computing unit to read and write data alternately. Based on the NTT hardware module, a precalculated parameter storage and real-time calculation method suitable for the hardware architecture of this paper is also proposed. Finally, the hardware of polynomial multiplier based on NTT module is implemented, and its function simulation and performance evaluation are carried out. The results show that the proposed hardware accelerator can have excellent computing performance while using fewer hardware resources, thus meeting the requirements of lattice cipher algorithms in security chips. Compared with the existing studies, the computing performance of the polynomial multiplier designed in this paper is improved by approximately 1 to 3 times, and the slice resources and storage resources used are reduced by approximately 60% and 17%, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. Monogenity and Power Integral Bases: Recent Developments.
- Author
-
Gaál, István
- Subjects
ALGEBRAIC number theory ,ALGEBRAIC numbers ,ALGEBRAIC fields ,POLYNOMIALS ,INTEGRALS - Abstract
Monogenity is a classical area of algebraic number theory that continues to be actively researched. This paper collects the results obtained over the past few years in this area. Several of the listed results were presented at a series of online conferences titled "Monogenity and Power Integral Bases". We also give a collection of the most important methods used in several of these papers. A list of open problems for further research is also given. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Polynomial maps and polynomial sequences in groups.
- Author
-
Hu, Ya-Qing
- Subjects
ABELIAN groups ,DIFFERENCE equations ,POLYNOMIALS ,NONCOMMUTATIVE algebras ,INTEGERS - Abstract
This paper presents a modified version of Leibman's group-theoretic generalizations of the difference calculus for polynomial maps from nonempty commutative semigroups to groups, and proves that it has many desirable formal properties when the target group is locally nilpotent and also when the semigroup is the set of nonnegative integers. We will apply it to solve Waring's problem for general discrete Heisenberg groups in a sequel to this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Design of an Alternative to Polynomial Modified RSA Algorithm.
- Author
-
Abass, Banen Najah and Yassein, Hassan Rashed
- Subjects
RSA algorithm ,PUBLIC key cryptography ,POLYNOMIALS ,ALGEBRA - Abstract
The modified RSA provides high efficiency against attacks and, as a result, it is considered the ideal choice for many applications. In this paper, we introduce an alternative to the modified RSA key encryption system called TPRSA, based on Tri-Cartesian algebra and polynomials, by modifying the mathematical structure of text encryption and decryption keys to obtain a high level of security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
24. A higher-order family of simultaneous iterative methods with Neta's correction for polynomial complex zeros.
- Author
-
Neves Machado, Roselaine and Guerreiro Lopes, Luiz
- Subjects
POLYNOMIALS ,NONLINEAR equations ,SIMULTANEOUS equations - Abstract
In this paper, a new family of iterative methods for the simultane-ous approximation of simple complex polynomial zeros is presented. The proposed family of simultaneous methods is constructed on the basis of the well-known third order Ehrlich iteration, combined with an iterative correction from the sixth order Neta's method for nonlinear equations. It is proved that the use of this iterative correction allows to increase the convergence order of the basic method from three to eight. Numerical examples are given to illustrate the convergence and effectiveness of the proposed combined method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
25. Certain Properties and Characterizations of Two-Iterated Two-Dimensional Appell and Related Polynomials via Fractional Operators.
- Author
-
Zayed, Mohra and Wani, Shahid Ahmad
- Subjects
POLYNOMIALS - Abstract
This paper introduces the operational rule for 2-iterated 2D Appell polynomials and derives its generalized form using fractional operators. It also presents the generating relation and explicit forms that characterize the generalized 2-iterated 2D Appell polynomials. Additionally, it establishes the monomiality principle for these polynomials and obtains their recurrence relations. The paper also establishes corresponding results for the generalized 2-iterated 2D Bernoulli, 2-iterated 2D Euler, and 2-iterated 2D Genocchi polynomials. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. STABILITY OF BINOMIALS OVER FINITE FIELDS.
- Author
-
AYAD, MOHAMED, BENSEBA, BOUALEM, and MADI, MOHAMED
- Subjects
POLYNOMIALS ,IRREDUCIBLE polynomials - Abstract
A polynomial f(x) over a field K is said to be stable if all its iterates are irreducible over K. L. Danielson and B. Fein have shown that over a large class of fields K, if f(x) is an irreducible monic binomial, then it is stable over K. In this paper it is proved that this result no longer holds over finite fields. Necessary and sufficient conditions are provided under which a given binomial is stable over Fq. These conditions are used to construct a table listing the stable binomials over Fq of the form f(x) = xd - a, a ∈ Fq \ {0, 1}, for q ≤ 27 and d ≤ 10. The paper ends with a brief link to Mersenne primes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. On Certain Properties of Parametric Kinds of Apostol-Type Frobenius–Euler–Fibonacci Polynomials.
- Author
-
Guan, Hao, Khan, Waseem Ahmad, Kızılateş, Can, and Ryoo, Cheon Seoung
- Subjects
POLYNOMIALS ,GENERATING functions ,OPERATOR functions ,CHEBYSHEV polynomials ,REPRESENTATIONS of graphs - Abstract
This paper presents an overview of cosine and sine Apostol-type Frobenius–Euler–Fibonacci polynomials, as well as several identities that are associated with these polynomials. By applying a partial derivative operator to the generating functions, the authors obtain derivative formulae and finite combinatorial sums involving these polynomials and numbers. Additionally, the paper establishes connections between cosine and sine Apostol-type Frobenius–Euler–Fibonacci polynomials of order α and several other polynomial sequences, such as the Apostol-type Bernoulli–Fibonacci polynomials, the Apostol-type Euler–Fibonacci polynomials, the Apostol-type Genocchi–Fibonacci polynomials, and the Stirling–Fibonacci numbers of the second kind. The authors also provide computational formulae and graphical representations of these polynomials using the Mathematica program. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. High-Performance Krawtchouk Polynomials of High Order Based on Multithreading.
- Author
-
Flayyih, Wameedh Nazar, Al-sudani, Ahlam Hanoon, Mahmmod, Basheera M., Abdulhussain, Sadiq H., and Alsabah, Muntadher
- Subjects
DIGITAL communications ,CENTRAL processing units ,POLYNOMIALS ,PROCESS capability ,PROBABILITY theory ,PARALLEL processing ,ORTHOGONAL polynomials - Abstract
Orthogonal polynomials and their moments serve as pivotal elements across various fields. Discrete Krawtchouk polynomials (DKraPs) are considered a versatile family of orthogonal polynomials and are widely used in different fields such as probability theory, signal processing, digital communications, and image processing. Various recurrence algorithms have been proposed so far to address the challenge of numerical instability for large values of orders and signal sizes. The computation of DKraP coefficients was typically computed using sequential algorithms, which are computationally extensive for large order values and polynomial sizes. To this end, this paper introduces a computationally efficient solution that utilizes the parallel processing capabilities of modern central processing units (CPUs), namely the availability of multiple cores and multithreading. The proposed multi-threaded implementations for computing DKraP coefficients divide the computations into multiple independent tasks, which are executed concurrently by different threads distributed among the independent cores. This multi-threaded approach has been evaluated across a range of DKraP sizes and various values of polynomial parameters. The results show that the proposed method achieves a significant reduction in computation time. In addition, the proposed method has the added benefit of applying to larger polynomial sizes and a wider range of Krawtchouk polynomial parameters. Furthermore, an accurate and appropriate selection scheme of the recurrence algorithm is introduced. The proposed approach introduced in this paper makes the DKraP coefficient computation an attractive solution for a variety of applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. On a class of permutation trinomials over finite fields.
- Author
-
GÜLMEZ TEMÜR, Burcu and ÖZKAYA, Buket
- Subjects
FINITE fields ,CRYPTOGRAPHY ,POLYNOMIALS - Abstract
In this paper, we study the permutation properties of the class of trinomials of the form f(x) = x
4q+1 + λ1 xq+4 + λ2 x2q+3 ∈ Fq² [x] where λ1 , λ2 ∈ Fq and they are not simultaneously zero. We find all necessary and sufficient conditions on λ1 and λ2 such that f(x) permutes Fq² , where q is odd and q = 22k+1 , k ∈ N. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
30. Variable-bandwidth recursive-filter design employing cascaded stability-guaranteed 2nd-order sections using coefficient transformations.
- Author
-
Deng, Tian-Bo
- Subjects
TRANSFER functions ,POLYNOMIALS - Abstract
This paper shows a 2-step procedure for obtaining a variable-bandwidth recursive digital filter whose structure contains cascaded second-order (2nd-order) sections. Such a cascade-form structure is insensitive to the round-off noises that come from filter-coefficient quantizations in hardware implementations. This paper also shows how to utilize a 2-step procedure to get a variable-bandwidth recursive filter that is absolutely stable. The first step (Step-1) of the 2-step procedure designs a series of constant-bandwidth filters for approximating a series of evenly discretized variable specifications, and the second step (Step-2) fits the coefficient values obtained from Step-1 by employing individual polynomials. To ensure the stability of the resultant constant-bandwidth filters in Step-1, coefficient transformations are first executed on the 2nd-order transfer function's denominator-coefficients, and then each coefficient of both numerator and transformed denominator is found as an individual polynomial. Once all the polynomials are obtained, the polynomials corresponding to the transformed denominator are further converted to composite functions for ensuring the stability. Hence, the 2-step procedure not only produces a cascade-form variable-bandwidth filter that has low quantization errors, but also ensures the stability. A lowpass example is included for verifying the achieved stability and showing the high approximation accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Moment Problems and Integral Equations.
- Author
-
Olteanu, Cristian Octav
- Subjects
INTEGRAL equations ,FOURIER transforms ,DIOPHANTINE equations ,POLYNOMIAL approximation ,POLYNOMIALS ,INTEGERS - Abstract
The first part of this work provides explicit solutions for two integral equations; both are solved by means of Fourier transform. In the second part of this paper, sufficient conditions for the existence and uniqueness of the solutions satisfying sandwich constraints for two types of full moment problems are provided. The only given data are the moments of all positive integer orders of the solution and two other linear, not necessarily positive, constraints on it. Under natural assumptions, all the linear solutions are continuous. With their value in the subspace of polynomials being given by the moment conditions, the uniqueness follows. When the involved linear solutions and constraints are positive, the sufficient conditions mentioned above are also necessary. This is achieved in the third part of the paper. All these conditions are written in terms of quadratic expressions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. COMPLETE CONSISTENCY AND ASYMPTOTIC NORMALITY FOR THE WEIGHTED ESTIMATOR IN A NONPARAMETRIC REGRESSION MODEL UNDER DEPENDENT ERRORS.
- Author
-
SAMURA, SALLIEU KABAY, SHIJIE WANG, LING CHEN, XUEJUN WANG, and FEI ZHANG
- Subjects
POLYNOMIALS ,NORMAL operators ,LINEAR algebra ,MATHEMATICAL formulas ,MATHEMATICAL inequalities - Abstract
In this paper, we investigate the effect of dependent errors in the fixed design nonparametric regression models. Under some mild conditions, we obtain the complete consistency and asymptotic normality for the weighted estimator in the fixed design nonparametric regression models. In addition, a simulation study is undertaken to investigate finite sample behavior of the estimator. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. WIGNER-YANASE-DYSON FUNCTION AND LOGARITHMIC MEAN.
- Author
-
SHIGERU FURUICHI
- Subjects
MATHEMATICAL inequalities ,NORMAL operators ,LINEAR algebra ,POLYNOMIALS ,MATHEMATICAL formulas - Abstract
The ordering betweenWigner-Yanase-Dyson function and logarithmic mean is known. Also bounds for logarithmic mean are known. In this paper, we give two reverse inequalities for Wigner-Yanase-Dyson function and logarithmic mean. We also compare the obtained results with the known bounds of the logarithmic mean. Finally, we give operator inequalities based on the obtained results. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Zero/low overshoot conditions based on maximally‐flatness for PID‐type controller design for uncertain systems with time‐delay or zeros.
- Author
-
Canevi, Mehmet and Söylemez, Mehmet Turan
- Subjects
UNCERTAIN systems ,TRANSFER functions ,CONTINUOUS time systems - Abstract
This paper extends the characteristic ratio approach using novel inequalities to ensure zero/low overshoot for linear‐time‐invariant systems with zeros. The extension provided by this paper is based on the maximally‐flatness property of a transfer function, where the square‐magnitude of the transfer function is ensured to be a low‐pass filter. In order to be able to design low‐order/fixed structure controllers, a partial pole‐assignment approach is used instead of the full pole‐assignment used in the Characteristic Ratio Assignment (CRA) method. The developed inequalities and additional stability conditions are combined into an optimization problem using time domain restrictions when necessary. Although the method given in the paper is general, particular inequalities are developed for PI and PI‐PD controller cases, due to their frequent use in industrial applications. Similarly, First‐Order‐Plus‐Delay‐Time (FOPDT) and Second‐Order‐Plus‐Delay‐Time (SOPDT) systems are considered specifically, since most of the practical systems can be approximated by one of these types. The study is extended to plants with uncertainties where a theorem is developed to decrease computation time dramatically. The benefits of the proposed methods are demonstrated by several examples. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. A note on the degree bounds of the invariant ring.
- Author
-
Yang Zhang and Jizhu Nan
- Subjects
HOMOGENEOUS polynomials ,CYCLIC groups ,FINITE groups ,POLYNOMIAL rings ,INDECOMPOSABLE modules ,POLYNOMIALS - Abstract
Let G = C
p × H be a finite group, where Cp is a cyclic group of prime order p and H is a p'-group. Let F be an algebraically closed field in characteristic p. Let V be a direct sum of m non-trivial indecomposable G-modules such that the norm polynomials of the simple H-modules are the power of the product of the basis elements of the dual. In previous work, we proved the periodicity property of the polynomial ring F[V] with actions of G. In this paper, by the periodicity property, we showed that F[V]G is generated by m norm polynomials together with homogeneous invariants of degree at most m|G| - dim(V) and transfer invariants, which yields the well-known degree bound dim(V)·(|G|-1). More precisely, we found that this bound gets less sharp as the dimensions of simple H-modules increase. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
36. Approximation by operators Involving Δh-Gould-Hopper Appell polynomials.
- Author
-
YILMAZ, Bilge Zehra SERGİ and İÇÖZ, Gürhan
- Subjects
POLYNOMIALS ,LINEAR operators - Abstract
The present paper deals with the approximation properties of the linear positive operators, including Δh -Gould-Hopper Appell polynomials. We investigate some theorems for convergence of the operators and their approximation degrees with the help of the classical approach, Peetre's K-functional, Lipschitz class and Voronovskajatype theorem. In the last section of the paper, we introduce the Kantorovich form of the operators and examine the approximation degree. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. On the eigenvalue-separation properties of real tridiagonal matrices.
- Author
-
YAN WU and KOHAUPT, LUDWIG
- Subjects
EIGENVALUES ,EIGENANALYSIS ,MATRICES (Mathematics) ,POLYNOMIALS ,ALGEBRA - Abstract
In this paper, we give a simple sufficient condition for the eigenvalue-separation properties of real tridiagonal matrices T. This result is much more than the statement that the pertinent eigenvalues are distinct. Its derivation is based on recurrence formulae satisfied by the polynomials made up by the minors of the characteristic polynomial det(xE - T) that are proven to form a Sturm sequence. This is a new result, and it proves the simple spectrum property of a symmetric tridiagonal matrix studied in a Grünbaum paper. Two numerical examples underpin the theoretical findings. The style of the paper is expository in order to address a large readership. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. On the State-Feedback Controller Design for Polynomial Linear Parameter-Varying Systems with Pole Placement within Linear Matrix Inequality Regions.
- Author
-
Brizuela-Mendoza, Jorge A., Mixteco-Sánchez, Juan Carlos, López-Osorio, Maria A., Ortiz-Torres, Gerardo, Sorcia-Vázquez, Felipe D. J., Lozoya-Ponce, Ricardo Eliú, Ramos-Martínez, Moises B., Pérez-Vidal, Alan F., Morales, Jesse Y. Rumbo, Guzmán-Valdivia, Cesar H., Mena-Enriquez, Mayra G., and Torres-Cantero, Carlos Alberto
- Subjects
POLE assignment ,LINEAR matrix inequalities ,LINEAR systems ,POLYNOMIALS ,SYSTEM dynamics ,PSYCHOLOGICAL feedback ,TIME-varying systems - Abstract
The present paper addresses linear parameter-varying systems with high-order time-varying parameter dependency known as polynomial LPV systems and their controller design. Throughout this work, a procedure ensuring a state-feedback controller from a parameterized linear matrix inequality (PLMI) solution is presented. As the main contribution of this paper, the controller is designed by considering the time-varying parameter rate as a tuning parameter with a continuous control gain in such a way that the closed-loop eigenvalues lie in a complex plane subset, with high-order time-varying parameters defining the system dynamics. Simulation results are presented, aiming to show the effectiveness of the proposed controller design. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. Algebra, topology and the discoveries of Vaughan Jones.
- Author
-
Birman, Joan S.
- Subjects
ALGEBRA ,TOPOLOGY ,ENCYCLOPEDIAS & dictionaries ,POLYNOMIALS ,MATHEMATICS - Abstract
In this paper, the discovery of the Jones polynomial will be discussed, emphasizing the way in which it illustrated the remarkable unity between distinct parts of mathematics, each with its own language, but initially without a dictionary. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. On the number of zeros of a polynomial in a disk
- Author
-
Rather, N. A., Ali, Liyaqat, and Bhat, Aijaz
- Published
- 2024
- Full Text
- View/download PDF
41. Blind identification of feedback polynomials for synchronous scramblers in a noisy environment.
- Author
-
Ding, Yong, Huang, Zhiping, and Zhou, Jing
- Subjects
POLYNOMIALS ,SIGNAL-to-noise ratio ,IMAGE encryption ,SPEECH perception - Abstract
This paper investigates blind identification methods for linear scramblers under non‐cooperative conditions, which are essential for the inverse analysis of communication protocols using scramblers. In this paper, a blind identification scheme for feedback polynomials of synchronous scramblers is proposed. A variable Υ¯$\overline{\Upsilon }$ is first proposed that measures the correctness of the test polynomial by using the soft information of the received sequence, then the mean and variance of the variable Υ¯$\overline{\Upsilon }$ in different cases are obtained, and finally the optimal threshold value to determine whether the test primitive polynomial is correct or not is obtained. That is, the blind identification problem is transformed into a hypothesis testing problem. The simulations verify that the proposed scheme requires a much smaller scrambled sequence length than existing blind identification schemes. Furthermore, the proposed scheme is more fault tolerant than existing schemes and has a signal‐to‐noise ratio (SNR) gain of at least 3 dB when the intercepted scrambled sequences are of the same length and high identification accuracy is achieved. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. Cyclic polynomials arising from the functional equation for Dickson polynomials.
- Author
-
Bayarmagnai, Gombodorj and Ganbat, Batmunkh
- Subjects
POLYNOMIALS ,IRREDUCIBLE polynomials - Abstract
In this paper, we study algebraic properties of a family of certain polynomials arising from the functional equation for Dickson polynomials. We see that the roots and discriminants of those polynomials have very simple expressions, and each polynomial is cyclic. Further, we provide an irreducibility criterion analogous to the well-known criterion of Vahlen-Capelli. We finish the paper by showing that any cyclic extension of a certain field comes from a member of the family. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. Generalized bivariate Fibonacci polynomial and two new subclasses of bi-univalent functions.
- Author
-
Aktaş, İbrahim and Hamarat, Derya
- Subjects
UNIVALENT functions ,HOLOMORPHIC functions ,POLYNOMIALS - Abstract
This paper deals with two new subclasses of holomorphic and bi-univalent functions in the open unit disk defined by generalized bivariate Fibonacci polynomials. In this paper the coefficient bounds are estimated for | a 2 | and | a 3 | which a 2 and a 3 are the Taylor–Maclaurin coefficients of the functions belonging to these new subclasses. Then, the Fekete–Szegö problem is handled for the functions in these subclasses. Also, several remarks are presented. The results of this paper generalize certain earlier results in the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. Polynomial Intermediate Checksum for Integrity under Releasing Unverified Plaintext and Its Application to COPA.
- Author
-
Zhang, Ping
- Subjects
POLYNOMIALS ,IMAGE encryption - Abstract
COPA, introduced by Andreeva et al., is the first online authenticated encryption (AE) mode with nonce-misuse resistance, and it is covered in COLM, which is one of the final CAESAR portfolios. However, COPA has been proven to be insecure in the releasing unverified plaintext (RUP) setting. This paper mainly focuses on the integrity under RUP (INT-RUP) defect of COPA. Firstly, this paper revisits the INT-RUP security model for adaptive adversaries, investigates the possible factors of INT-RUP insecurity for "Encryption-Mix-Encryption"-type checksum-based AE schemes, and finds that these AE schemes with INT-RUP security vulnerabilities utilize a common poor checksum technique. Then, this paper introduces an improved checksum technique named polynomial intermediate checksum (PIC) for INT-RUP security and emphasizes that PIC is a sufficient condition for guaranteeing INT-RUP security for "Encryption-Mix-Encryption"-type checksum-based AE schemes. PIC is generated by a polynomial sum with full terms of intermediate internal states, which guarantees no information leakage. Moreover, PIC ensures the same level between the plaintext and the ciphertext, which guarantees that the adversary cannot obtain any useful information from the unverified decryption queries. Again, based on PIC, this paper proposes a modified scheme COPA-PIC to fix the INT-RUP defect of COPA. COPA-PIC is proven to be INT-RUP up to the birthday-bound security if the underlying primitive is secure. Finally, this paper discusses the properties of COPA-PIC and makes a comparison for AE modes with distinct checksum techniques. The proposed work is of good practical significance. In an interactive system where two parties communicate, the receiver can effectively determine whether the information received from the sender is valid or not, and thus perform the subsequent operation more effectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. On the power sums problem of bi-periodic Fibonacci and Lucas polynomials.
- Author
-
Tingting Du and Li Wang
- Subjects
POLYNOMIALS ,GEOMETRIC congruences - Abstract
This paper mainly discussed the power sums of bi-periodic Fibonacci and Lucas polynomials. In addition, we generalized these results to obtain several congruences involving the divisible properties of bi-periodic Fibonacci and Lucas polynomials. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Non-Abelian Toda-type equations and matrix valued orthogonal polynomials.
- Author
-
Deaño, Alfredo, Morey, Lucía, and Román, Pablo
- Subjects
SYMMETRIC matrices ,EQUATIONS ,MATRICES (Mathematics) ,NONABELIAN groups ,ABELIAN functions ,LAX pair ,ORTHOGONAL polynomials ,POLYNOMIALS - Abstract
In this paper, we study parameter deformations of matrix valued orthogonal polynomials. These deformations are built on the use of certain matrix valued operators which are symmetric with respect to the matrix valued inner product defined by the orthogonality weight. We show that the recurrence coefficients associated with these operators satisfy generalizations of the non-Abelian lattice equations. We provide a Lax pair formulation for these equations, and an example of deformed Hermite-type matrix valued polynomials is discussed in detail. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Proof of a conjecture on the determinant of the walk matrix of rooted product with a path.
- Author
-
Wang, Wei, Yan, Zhidan, and Mao, Lihuan
- Subjects
MATRIX multiplications ,LINEAR algebra ,CHEBYSHEV polynomials ,LOGICAL prediction ,LAPLACIAN matrices ,POLYNOMIALS ,MULTILINEAR algebra - Abstract
The walk matrix of an n-vertex graph G with adjacency matrix A, denoted by $ W(G) $ W (G) , is $ [e,Ae,\ldots,A^{n-1}e] $ [ e , Ae , ... , A n − 1 e ] , where e is the all-ones vector. Let $ G\circ P_m $ G ∘ P m be the rooted product of G and a rooted path $ P_m $ P m (taking an endvertex as the root), i.e. $ G\circ P_m $ G ∘ P m is a graph obtained from G and n copies of $ P_m $ P m by identifying each vertex of G with an endvertex of a copy of $ P_m $ P m . Mao et al. [A new method for constructing graphs determined by their generalized spectrum. Linear Algebra Appl. 2015;477:112–127.] and Mao and Wang [Generalized spectral characterization of rooted product graphs. Linear Multilinear Algebra. 2022. DOI:10.1080/03081087.2022.2098226.] proved that, for m = 2 and $ m\in \{3,4\} $ m ∈ { 3 , 4 } , respectively \[ \det W(G\circ P_m)=\pm a_0^{\lfloor\frac{m}{2}\rfloor}(\det W(G))^m, \] det W (G ∘ P m) = ± a 0 ⌊ m 2 ⌋ (det W (G)) m , where $ a_0 $ a 0 is the constant term of the characteristic polynomial of G. Furthermore, in the same paper, Mao and Wang conjectured that the formula holds for any $ m\ge 2 $ m ≥ 2. In this paper, we verify this conjecture using the technique of Chebyshev polynomials. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. The multiplicative degree-Kirchhoff index and complexity of a class of linear networks.
- Author
-
Liu, Jia-Bao and Wang, Kang
- Subjects
PENTAGONS ,POLYNOMIALS - Abstract
In this paper, we focus on the strong product of the pentagonal networks. Let R n be a pentagonal network composed of 2 n pentagons and n quadrilaterals. Let P n 2 denote the graph formed by the strong product of R n and its copy R n ′ . By utilizing the decomposition theorem of the normalized Laplacian characteristics polynomial, we characterize the explicit formula of the multiplicative degree-Kirchhoff index completely. Moreover, the complexity of P n 2 is determined. In this paper, we focus on the strong product of the pentagonal networks. Let be a pentagonal network composed of pentagons and quadrilaterals. Let denote the graph formed by the strong product of and its copy . By utilizing the decomposition theorem of the normalized Laplacian characteristics polynomial, we characterize the explicit formula of the multiplicative degree-Kirchhoff index completely. Moreover, the complexity of is determined. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. Some identities of the generalized bi-periodic Fibonacci and Lucas polynomials.
- Author
-
Du, Tingting and Wu, Zhengang
- Subjects
POLYNOMIALS ,EULER polynomials - Abstract
In this paper, we considered the generalized bi-periodic Fibonacci polynomials, and obtained some identities related to generalized bi-periodic Fibonacci polynomials using the matrix theory. In addition, the generalized bi-periodic Lucas polynomial was defined by L n (x) = b p (x) L n − 1 (x) + q (x) L n − 2 (x) (if n is even) or L n (x) = a p (x) L n − 1 (x) + q (x) L n − 2 (x) (if n is odd), with initial conditions L 0 (x) = 2 , L 1 (x) = a p (x) , where p (x) and q (x) were nonzero polynomials in Q [ x ] . We obtained a series of identities related to the generalized bi-periodic Fibonacci and Lucas polynomials. In this paper, we considered the generalized bi-periodic Fibonacci polynomials, and obtained some identities related to generalized bi-periodic Fibonacci polynomials using the matrix theory. In addition, the generalized bi-periodic Lucas polynomial was defined by (if is even) or (if is odd), with initial conditions , , where and were nonzero polynomials in . We obtained a series of identities related to the generalized bi-periodic Fibonacci and Lucas polynomials. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Gaudin Model for the Multinomial Distribution.
- Author
-
Iliev, Plamen
- Subjects
MULTINOMIAL distribution ,HYPERGEOMETRIC series ,LIE algebras ,LOGITS ,POLYNOMIALS ,EIGENFUNCTIONS - Abstract
The goal of the paper is to analyze a Gaudin model for a polynomial representation of the Kohno–Drinfeld Lie algebra associated with the multinomial distribution. The main result is the construction of an explicit basis of the space of polynomials consisting of common eigenfunctions of Gaudin operators in terms of Aomoto–Gelfand hypergeometric series. The construction shows that the polynomials in this basis are also common eigenfunctions of the operators for a dual Gaudin model acting on the degree indices, and therefore, they provide a solution to a multivariate discrete bispectral problem. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.