School of Mathematical Sciences, Inner Mongolia University, Hohhot, China. The paper is organized as follows. In Section 2, we obtain some for and binomial coefficients by means of the Riordan arrays.
In this manuscript, we show new binomial identities in iterated rascal triangles, revealing a connection between the Vandermonde convolution and iterated rascal numbers. We also present ...
This paper focuses on the application of factorial and binomial identities in computing, communication, and cybersecurity in connection with the symmetric and asymmetric encryptions. We can use the ...
This paper presents application of the binomial and factorial identities and expansions that are used in communications, information, and cybersecurity. Cybersecurity is the practice of protecting the ...
In this manuscript, we start our discussion from the definition of central factorial numbers (both, recursive and iterative), continuing with a set of identities used further in this manuscript. Then, ...
We consider binomial and inverse binomial sums at infinity and rewrite them in terms of a small set of constants, such as powers of π or log (2). In order to perform these simplifications, we view ...
Ask the publishers to restore access to 500,000+ books. An icon used to represent a menu that can be toggled by interacting with this icon. A line drawing of the Internet Archive headquarters building ...
ABSTRACT: Utilizing Gamma-Beta function, we can build one series involving reciprocal of non-central binomial coefficients, then We can structure several new series of reciprocals of non-central ...
Hypergeometric functions occupy a central role in mathematical analysis by encapsulating a diverse class of series that extend many classical functions. Equally, identities involving harmonic numbers ...
A line drawing of the Internet Archive headquarters building façade. An illustration of a magnifying glass. An illustration of a magnifying glass.