Next Article in Journal
Fuzzy Cognitive Maps Optimization for Decision Making and Prediction
Next Article in Special Issue
On Four Classical Measure Theorems
Previous Article in Journal
A New Block Structural Index Reduction Approach for Large-Scale Differential Algebraic Equations
Previous Article in Special Issue
A New Representation of the Generalized Krätzel Function
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Coding by (2,q)-Distance Fibonacci Numbers

by
Ivana Matoušová
* and
Pavel Trojovský
Department of Mathematics, Faculty of Science, University of Hradec Králové, 500 03 Hradec Králové, Czech Republic
*
Author to whom correspondence should be addressed.
Mathematics 2020, 8(11), 2058; https://doi.org/10.3390/math8112058
Submission received: 19 October 2020 / Revised: 12 November 2020 / Accepted: 16 November 2020 / Published: 18 November 2020
(This article belongs to the Special Issue Mathematical Analysis and Analytic Number Theory 2020)

Abstract

:
In 2006, A. Stakhov introduced a new coding/decoding process based on generating matrices of the Fibonacci p-numbers, which he called the Fibonacci coding/decoding method. Stakhov’s papers have motivated many other scientists to seek certain generalizations by introducing new additional coefficients into recurrence of Fibonacci p-numbers. In 2013, I. Włoch et al. studied ( 2 , q ) -distance Fibonacci numbers F 2 ( q , n ) and found some of their combinatorial properties. In this paper, we state a new coding theory based on the sequence ( T q ( n ) ) n = , which is an extension of Włoch’s sequence ( F 2 ( q , n ) ) n = 0 .
MSC:
primary 11A63, 11B39; secondary 11J86

1. Introduction

Let ( F n ) n 0 be the sequence of Fibonacci numbers given by recurrence relation F n = F n 1 + F n 2 , for n 2 , with initial conditions F 0 = 0 and F 1 = 1 . These numbers possess many interesting and amazing properties (see [1,2] together with its very extensive annotated bibliography for additional references and history). For example, it is well-known that, for the Fibonacci numbers hold the following Binet’s formula,
F n = α n β n 5 ,
where α : = ( 1 + 5 ) / 2 and β : = ( 1 5 ) / 2 are the roots of the characteristic equation
x 2 x 1 = 0 .
The connection between the Fibonacci numbers and the Golden ratio α is similarly famous,
lim n F n + 1 F n = α ,
which follows from Binet’s formula and the relation | α | > | β | between the roots of characteristic polynomial f ( x ) = x 2 x 1 . This limit was probably firstly studied by Johannes Kepler in 1619 (see English translation [3]) as he formulated there the approximation of the golden ratio α by the proportions of consecutive Fibonacci numbers.
There are many types of generalizations of the Fibonacci numbers (see [4,5,6,7,8,9,10,11,12,13]); e.g., changing their recurrence to the form P n = P n 2 + P n 3 , for n 3 , with initial conditions P 0 = P 1 = P 2 = 1 we get Padovan numbers, which are named after R. Padovan, but in 1991 he attributed their discovery to Dutch architect Hans van der Laan and the sequences with the same recurrence were studied in 1899 by R. Perrin and in 1924 by Cordonnier (see [14,15,16]).
In 1876, Lucas realized that Fibonacci numbers appear as the sums of the northeast diagonals in Pascal’s triangle (see Figure 1), thus the following identity holds for any non-negative integer n
F n + 1 = k = 0 n / 2 n k k .
In 1989, Stakhov [17] considered reformatted Pascal’s triangle (see Table 1), where the sum of all numbers in the jth column, j 0 , is equal to the Fibonacci number F j + 1 .
He introduced, for any non-negative p, Fibonacci p-numbers, as sums of columns in a transformed Pascal’s triangle (he denoted these triangles as Pascal’s p-triangles), which is creating from Pascal’s triangle by shifting all numbers in each row such way, that the first number in the ith row, i 0 , is in the i ( p + 1 ) th column. Stakhov showed that these Fibonacci p-numbers ϕ p ( n ) are given by the following recurrence relation
ϕ p ( n ) = 0 , n < 0 ; 1 , n = 0 ; ϕ p ( n 1 ) + ϕ p ( n p 1 ) , n > 0 .
On the fourth annual meeting of the Pacific Northwest Section of the Mathematical Association of America in 1950, Brenner [18] gave a lecture “Lucas’ matrices” in which he presented usage of Fibonacci’s matrix and Lucas’ matrix
1 1 1 0 and α + β α β 1 0 ,
and showed that their nth power are
F n + 1 F n F n F n 1 and U n + 1 ( a , b ) U n ( a , b ) U n ( a , b ) U n 1 ( a , b ) ,
respectively, where ( U n ( a , b ) ) n 0 is a non-degenerate Lucas sequence of the first kind (clearly F n = U n ( 1 , 1 ) ), defined, for any n 2 , by the recurrence relation U n ( a , b ) = a U n 1 ( a , b ) + b U n 2 ( a , b ) , with U 0 ( a , b ) = 0 , U 1 ( a , b ) = 1 and a 2 + 4 b 0 . Its characteristic equation x 2 a x b = 0 has discriminant D = a 2 + 4 b and roots α = 1 2 ( a + D ) , β = 1 2 ( a D ) , thus, for any n 0 , the following generalized Binet formula holds
U n ( a , b ) = α n β n α β .
The first matrix in (5) is usually called Fibonacci “Q-matrix”, as King in his master’s thesis [19] originated this notation (more on the history and some applications of Q-matrices can be found in [20,21]).
In 1999, Stakhov [22] introduced a new class of square matrices Q p of the order p + 1 , where p is a non-negative integer, which are a generalization of Fibonacci Q-matrix
Q p = 1 1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 0 0 ( p + 1 ) × ( p + 1 ) .
He defined the Fibonacci p-numbers for integers n 0 by the different way then in (4), thus these Fibonacci p-numbers F p ( n ) are defined for positive integer p and any integer n by the following way
F p ( n ) = F p ( n 1 ) + F p ( n p 1 ) , n > p + 1 ; F p ( n + p + 1 ) F p ( n + p ) , n 0 ; 1 , 1 n p + 1 .
Then, he showed that elements of Q p -matrices are connected to Fibonacci p-numbers by the following way
Q p = F p ( 2 ) F p ( 1 ) F p ( 3 p ) F p ( 2 p ) F p ( 2 p ) F p ( 1 p ) F p ( 3 2 p ) F p ( 2 2 p ) F p ( 3 p ) F p ( 2 p ) F p ( 4 2 p ) F p ( 3 2 p ) F p ( 0 ) F p ( 1 ) F p ( 1 p ) F p ( p ) F p ( 1 ) F p ( 0 ) F p ( 2 p ) F p ( 1 p ) .
In 2006, Stakhov [23] developed a theory of the Q p -Fibonacci matrices and he introduced a generalization of Cassini formula based on these matrices for any non-negative integers p, n > 0 , as he proved that:
  • For the nth power of matrix Q p holds:
    Q p n = F p ( n + 1 ) F p ( n ) F p ( n + 2 p ) F p ( n + 1 p ) F p ( n + 1 p ) F p ( n p ) F p ( n + 2 2 p ) F p ( n + 1 2 p ) F p ( n + 2 p ) F p ( n + 1 p ) F p ( n + 3 2 p ) F p ( n + 2 2 p ) F p ( n 2 ) F p ( n 3 ) F p ( n 1 p ) F p ( n 2 p ) F p ( n 1 ) F p ( n 2 ) F p ( n p ) F p ( n 1 p ) F p ( n ) F p ( n 1 ) F p ( n + 1 p ) F p ( n p ) .
  • For the determinant of matrix Q p holds:
    Q p n = ( 1 ) n p .
  • For the inverse of Q p n the following extremely interesting identity holds:
    Q p n 1 = F p ( n + 1 ) F p ( n ) F p ( n + 1 p ) F p ( n + 1 p ) F p ( n p ) F p ( n + 1 2 p ) F p ( n + 2 p ) F p ( n + 1 p ) F p ( n + 2 2 p ) F p ( n 2 ) F p ( n 3 ) F p ( n 2 p ) F p ( n 1 ) F p ( n 2 ) F p ( n 1 p ) F p ( n ) F p ( n 1 ) F p ( n p ) .
He also describes the original Fibonacci coding/decoding method based on the Q p Fibonacci matrix. Stakhov’s discovery attracted much attention, and so many scientists have tried to more generalize this result. In 2009, Kocer et al. [24] generalized the Fibonacci p-numbers F p ( n ) by introducing a new parameter m and defined the m-extension of Fibonacci p-numbers, F p , m ( n ) , by the following way
F p , m ( n ) = m F p , m ( n 1 ) + F p , m ( n p 1 ) , n > p + 1 ; F p , m ( n + p + 1 ) m F p , m ( n + p ) , n 0 ; m n 1 , 1 n p + 1 ,
where m is any positive real number. In 2009, Basu and Prasad [25] defined the matrix G p , m as a generalization of the matrix Q p , but there is a mistake in this paper, so we write the right form here, by the following way
G p , m = m 1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 0 0 ( p + 1 ) × ( p + 1 ) .
Furthermore, they noted that G p , m can be written using m-extension of Fibonacci p-numbers F p , m ( n ) , when we replace F p ( n ) by F m , p ( n ) in the matrix Q p in (8). Then, they showed that G p , m = ( 1 ) p and that analogous identities as (9) and (10) hold for ( G p , m ) n after replacing F p ( n ) by F m , p ( n ) . In 2011, Tuglu et al. [26] and Basu et al. [27] (independently and in different notation) generalized m-extension of Fibonacci p-numbers to ( m , t ) -extension of Fibonacci numbers by the following way
F m , t , p ( n ) = m F m , t , p ( n 1 ) + t F m , t , p ( n p 1 ) , n > p + 1 ; 1 t F m , t , p ( n + p + 1 ) m t F m , t , p ( n + p ) , n 0 ; m n 1 , 1 n p + 1 ,
where m and t are any positive real numbers. They introduced the matrix G m , t , p as a generalization of the matrix Q p by the following way
G m , t , p = m 1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 1 t 0 0 0 0 ( p + 1 ) × ( p + 1 ) ,
which is again the matrix in the form (6), when we imagine F p ( n ) replaced by F m , t , p ( n ) . Recently, many other papers that modify Stakhov’s method in some way have been published (see, e.g., [28,29,30,31,32,33]).
We showed that much effort was devoted to a different generalization of (4) by introducing some new coefficients in the Fibonacci p-numbers recurrence for the purpose to design a coding/decoding system in the last ten years. In this paper we will continue in the described direction of research aimed at possible generalizations of recurrence (4) for use in information security. In our generalization, we were motivated by the paper of Włoch et al. [34], which dealt with the combinatorial properties of the terms of the sequence ( F 2 ( q , n ) ) n 0 , where q 1 and n > 0 are any integers, defined by the following recurrence
F 2 ( q , n ) = F 2 ( q , n 2 ) + F 2 ( q , n q ) for n q ,
with initial conditions F 2 ( q , i ) = 1 for i = 0 , 1 , , q 1 . The authors called this sequence as the sequence of ( 2 , q ) -distance Fibonacci numbers. Clearly, Stakhov’s p-Fibonacci numbers ϕ p ( n ) can be recalled as ( 1 , p + 1 ) -distance Fibonacci numbers in this terminology. Probably independently, but four years later, the sequence with the recurrence (13) was studied in Deveci and Karaduman [35]. They called this sequence as Padovan p-sequence, as clearly it is generalization of Padovan sequence ( P n ) n , considered q = p + 2 in (13); denoted this sequence as ( P a p ( n ) ) n ; and used the initial conditions P a p ( i ) = 0 for i = 1 , 2 , , p and P a p ( p + 1 ) = 1 , P a p ( p + 2 ) = 0 .
In this paper, to construct a new coding/decoding process, we first prove that the sequence ( T q ( n ) ) n has the Kepler limit for any odd integer q 3 (we prove the existence of dominant root of the characteristic polynomial of this sequence and we set a new criterion for test of “non-omitted root summand” in Binet-like formulas). Then, we construct the generating matrix of the sequence T q ( n ) in a different way than it was defined in the already mentioned Włoch’s paper to be suitable for constructing a coding method. Further, we derive the relations among the code matrix elements, but our method is new and much simpler than the method introduced by Stakhov (the authors of all subsequent papers only took over his approach). Next, we discuss the correction ability of our encoding method and we show an example of concrete construction of coding/decoding system based on ( 2 , 5 ) -distance Fibonacci numbers.

2. Auxiliary Results

For our main purpose, which is to design a coding/decoding system, we will need some known results, which we will only recall here, but also other auxiliary results, which we derive in this section.

2.1. Binet-Like Form of General Linear Recurrence

A fundamental result in the theory of recurrence sequences asserts that:
Lemma 1.
Let q be any positive integer, q > 1 . Let ( u n ) n be a linear recurrence sequence of the order q whose characteristic polynomial f ( x ) splits as
f ( x ) = ( x λ 1 ) m 1 ( x λ 2 ) m 2 ( x λ ) m ,
where the λ j ’s are distinct non-zero complex numbers and j = 1 m j = q . Then, there exist uniquely determined polynomials g 1 , g 2 , , g Q ( { λ j } j = 1 ) [ x ] , with deg g j m j 1 ( m j is the multiplicity of λ j as zero of f ( x ) ) , for j [ 1 , ] , such that for all n holds
u n = g 1 ( n ) λ 1 n + g 2 ( n ) λ 2 n + + g ( n ) λ n .
The proof of this result can be found in [36], Theorem C.1, but we need only the following special case.
Corollary 1.
Let q be any positive integer, q > 1 . Let a i and c i , i = 0 , 1 , , q 1 , be any complex numbers. Let the sequence ( u n ) n be defined by recurrence relation
u n + q = a 0 u n + a 1 u n + 1 + + a q 2 u n + q 2 + a q 1 u n + q 1 ,
with initial conditions u 0 = c 0 , u 1 = c 1 , ⋯, u q 1 = c q 1 . Let λ 1 , λ 2 , ⋯, λ q be any distinct non-zero roots of its characteristic polynomial f ( x ) . Then, there exist uniquely determined complex numbers g 1 , g 2 , , g q such that for all integers n holds
u n = g 1 λ 1 n + g 2 λ 2 n + + g q λ q n .

2.2. The Sequence F 2 ( q , n ) and Its Extension T q ( n )

The relation (3), which shows a connection between the Pascal’s triangle and the Fibonacci sequence, led to the search for a connections of the Pascal’s triangle with other linear recurrent sequences, which are a generalization of the Fibonacci sequence. Clearly, Stakhov’s sequences ( ϕ p ( n ) ) n 0 and ( F p ( n ) ) n 0 , defined in (4) and (7), respectively, belong to these sequences, as the following holds for any integers n 0 , p 0
ϕ p ( n ) = j = 0 n p + 1 n j p j and F p ( n ) = j = 0 n 1 p + 1 n 1 j p j .
Many mathematicians, working primarily in the field of combinatorics and discrete mathematics, began to deal with the other sequences which are a similar generalization of the Fibonacci sequence (see [34,37,38,39,40,41,42,43,44,45]). In [34], the authors noted that from recurrence relation (13) of the sequence ( F 2 ( q , n ) ) n 0 immediately follows that:
  • the sequence ( F 2 ( 1 , n ) ) n 0 (thus the sequence of ( 2 , 1 ) -distance Fibonacci numbers) coincides with the Fibonacci sequence ( F n ) n 0 ;
  • the sequence ( F 2 ( 2 , n ) ) n 0 is the known sequence with powers of 2 which double up; and
  • for even q, the terms of the sequence ( F 2 ( q , n ) ) n 0 satisfy the relation F 2 ( q , 2 n ) = F 2 ( q , 2 n + 1 ) for any non-negative integer n (consequently, for even q, we can talk about ‘‘double’’ ( 2 , q ) -distance Fibonacci sequences).
Further, they showed that the sequence ( F 2 ( q , n ) ) n 0 is connected to the Pascal’s triangle too, as for any integers n 2 , q 2 holds
F 2 ( q , n ) = i = 0 n q i + n i q 2 i .
Next, they dealt with the companion matrix of the sequence ( F 2 ( q , n ) ) n 0 , but for our purpose we find different generating matrices of this sequence that more closely match Stakhov’s procedure for the sequence ( F p ( n ) ) n .
To use the sequence ( F 2 ( q , n ) ) n 0 to design a coding and decoding system, we need to shift terms of the sequence ( F 2 ( q , n ) ) n one place left and extend the definition this sequence to all integers n in the following way (we denote this extended sequence as the sequence ( T q ( n ) ) n to simplify the notation in all subsequent text).
Definition 1.
Let q be any positive integer, q 2 , and let n be any integer. We define the ( 2 , q ) -distance Fibonacci numbers T q ( n ) by
T q ( n ) = 1 , 1 n max ( 2 , q ) ; T q ( n 2 ) + T q ( n q ) , n > max ( 2 , q ) ; T q ( n + max ( 2 , q ) ) T q ( n 2 + max ( 3 , q ) ) , n 0 .
The sequence of integers in (18) is clearly a generalization of Fibonacci numbers as recurrence (18) would define for q = 1 and q = 3 exactly the sequence of Fibonacci numbers F n and Padovan numbers P n for any integer n, respectively (see Table 2).
Firstly, we prove an elementary fact for the sequence ( T q ( n ) ) n , which we need for proof of some special cases in our main theorem.
Lemma 2.
Let q, n be any integers, q 4 . Then,
T q ( 2 q ) = T q ( 1 q ) = 1
and
T q ( n ) = 0
for 5 2 q n q or 3 q n 0 .
Proof. 
Using the initial conditions T q ( n ) = 1 for n [ 1 , q ] and recurrence (18), we have T q ( n ) = 0 for n [ 3 q , 0 ] . Further,
T q ( 2 q ) = T q ( 2 q + q ) T q ( 2 q + q 2 ) = T q ( 2 ) T q ( 0 ) = 1 , T q ( 1 q ) = T q ( 1 q + q ) T q ( 1 q + q 2 ) = T q ( 1 ) T q ( 1 ) = 1 .
Finally, let us consider n [ 5 2 q , q ] (for q = 4 such n does not exist, so we can consider q 5 ). Thus we can set n = 5 2 q + i , for i = 0 , 1 , , q 5 , and using recurrence (18) we have
T q ( 5 2 q + i ) = T q ( ( 5 2 q + i ) + q ) T q ( ( 5 2 q + i ) + q 2 ) = T q ( 5 q + i ) T q ( 3 q + i ) = 0 0 = 0 .

3. The Generalized Kepler Limit of T q ( n )

In this section, we prove that the sequence ( T q ( n ) ) n has the Kepler limit for any odd integer q 3 . It is well known that the existence of the Kepler limit is related to the existence of a dominant root between the roots α 1 , α 2 , , α q of the characteristic polynomial of ( T q ( n ) ) n (namely that there exists a root α q such that | α q | > | α j | for every j q ) (see, e.g., [46,47]). It is less known that the existence of a dominant root is not a sufficient condition for the existence of the Kepler limit. Fiorenza and Vincenzi [48,49] addressed this problem and formulated a number of examples of problematic initial conditions, but they have not found any criteria, which we will do here.
For this purpose, we need to show two facts:
  • the characteristic polynomial f q ( x ) of the sequence ( T q ( n ) ) n has a dominant root α q ; and
  • the summand, containing the power of the dominant root α q , is actually occurred among the summands in the Binet-like formula of ( 2 , q ) -distance Fibonacci numbers.
Theorem 1.
Let q > 2 be any integer. Let f q ( x ) denote the characteristic polynomial of the sequence ( T q ( n ) ) n , thus f q ( x ) = x q x q 2 1 . Then,
(i) 
f q ( x ) does not have multiple roots; and
(ii) 
f q ( x ) has a dominant root for all positive odd integers q > 1 .
Proof. 
Case ( i ) was proved in [35], thus we prove Case ( i i ) only.
By the Descartes’ sign rule, we have the existence of only one positive real root α of f q ( x ) . In fact, α [ 1 , 3 / 2 ] , since f q ( 1 ) = 1 and f q ( 3 / 2 ) = ( 3 / 2 ) q 2 · ( 5 / 4 ) 1 > 0 . Note that, we also have f q ( x ) > 0 , for all x > α . Let z be a complex root of f q ( x ) with | z | α . Then, f q ( | z | ) 0 and so | z q | | z q 2 | + 1 . On the other hand, by the triangle inequality, we have | z q | | z q 2 | + 1 and so | z q | = | z q 2 | + 1 . Thus, 1 , z q 2 and z q become to the same ray. This implies that there exists a real number t 0 such that z q = 1 + t 0 ( z q 2 1 ) . Since z q = z q 2 + 1 , we deduce that | z | = α and also that z q 2 / ( z q 2 1 ) = t 0 is a real number and so is z q 2 . It follows that z q is also a real number and moreover, z q 2 and z q are both positive (because the relation z q = z q 2 + 1 together with the fact that | z | > 1 ). Now, since z 2 = z q / z q 2 > 0 , then z is a nonzero real number. However, z is not negative, since in this case z q would be also negative (since q is odd). Thus, z is a positive real number which is a root of f q ( x ) which yields that z = α (since α is the only positive real root of f q ( x ) ). This completes the proof. □
Remark 1.
In Theorem 1, we have proved that the dominant root exists for odd q. It is easy to realize that for even q, due to the same parity of numbers q and q 2 , the characteristic polynomial f q ( x ) cannot have a dominant root, because if α is its root, then its root is also α .
Now, we formulate the general criterion for “non omitted root summand” in Binet-like formula of the sequence ( u n ) n .
Theorem 2.
Let q be any positive integer, q > 1 . Let the sequence ( u n ) n be defined by a linear recurrence of order q by (15), whose characteristic polynomial f ( x ) has distinct non-zero roots λ 1 , λ 2 , ⋯, λ q . If determinant of the following matrix U q , n
u n 1 u n 2 u n ( q 1 ) u n q u n 2 u n 3 u n q u n 1 q u n 3 u n 4 u n ( q + 1 ) u n ( q + 2 ) u n 4 u n 5 u n ( q + 2 ) u n ( q + 3 ) u n ( q 1 ) u n q u n ( 2 q 3 ) u n ( 2 q 2 ) u n q u n ( q + 1 ) u n ( 2 q 2 ) u n ( 2 q 1 ) q × q
is non-zero, then all g i , i = 1 , 2 , , q , in (16) are non-zero.
Proof. 
Using Binet-like form for the linear recurrence ( u n ) n , given by (16), we can write the matrix U q , n as
i = 1 q g i λ i n 1 i = 1 q g i λ i n 2 i = 1 q g i λ i n ( q 1 ) i = 1 q g i λ i n q i = 1 q g i λ i n 2 i = 1 q g i λ i n 3 i = 1 q g i λ i n q i = 1 q g i λ i n ( q + 1 ) i = 1 q g i λ i n 3 i = 1 q g i λ i n 4 i = 1 q g i λ i n ( q + 1 ) i = 1 q g i λ i n ( q + 2 ) i = 1 q g i λ i n 4 i = 1 q g i λ i n 5 i = 1 q g i λ i n ( q + 2 ) i = 1 q g i λ i n ( q + 3 ) i = 1 q g i λ i n ( q 1 ) i = 1 q g i λ i n q i = 1 q g i λ i n ( 2 q 3 ) i = 1 q g i λ i n ( 2 q 2 ) i = 1 q g i λ i n q i = 1 q g i λ i n ( q + 1 ) i = 1 q g i λ i n ( 2 q 2 ) i = 1 q g i λ i n ( 2 q 1 ) q × q
and using additive property of determinants with only one distinct column we can write determinant | U q , n | as sum of q q determinants, but q q q ! determinants is clearly zero as they have at least two columns created by powers of the same root λ i , i = 1 , 2 , , q . Thus,
| U q , n | = ( i 1 , i 2 , , i q ) S n g i 1 λ i 1 n 1 g i 2 λ i 2 n 2 g i q 1 λ i q 1 n ( q 1 ) g i q λ i q n q g i 1 λ i 1 n 2 g i 2 λ i 2 n 3 g i q 1 λ i q 1 n q g i q λ i q n ( q + 1 ) g i 1 λ i 1 n ( q 1 ) g i 2 λ i 2 n q g i q 1 λ i q 1 n ( 2 q 3 ) g i q λ i q n ( 2 q 2 ) g i 1 λ i 1 n q g i 2 λ i 2 n ( q + 1 ) g i q 1 λ i q 1 n ( 2 q 2 ) g i q λ i q n ( 2 q 1 ) q × q ,
where S n is the symmetric group on elements 1 , 2 , , n . Then, we can write
| U q , n | = i = 1 q g i ( i 1 , i 2 , , i q ) S n λ i 1 n q λ i 2 n q 1 λ i q n 2 q + 1 V ( λ i 1 , λ i 2 , , λ i q ) ,
where V ( λ i 1 , λ i 2 , , λ i q ) are Vandermonde determinants. □
By Theorems 1, 2, and 3 ( i i ) and Corollary 1, we can write a ( 2 , q ) -distance Fibonacci sequence ( T q ( n ) ) n in its asymptotic form
T q ( n ) = g q α q n ( 1 + o ( 1 ) ) ,
where α q is the dominant root of the sequence ( T q ( n ) ) n , g q is a nonzero constant and o ( 1 ) is a function which tends to 0 as n . Hence the following holds
Corollary 2.
Let q be any odd integer, q 3 , let ℓ be any positive integer. Then, there is a so-called generalized Kepler limit
lim n T q ( n + ) T q ( n ) = α q ,
where α q is the dominant root of the sequence ( T q ( n ) ) n .

4. Generating Matrices of T q ( n )

We showed that Q-matrix, which generates the Fibonacci sequence, was already constructed for many kinds of generalized Fibonacci sequences. Now, we would like to note that these generating matrices can be created in slightly different forms (usually based on certain rearrangements of the indices of the studied sequence), e.g., we can find more than ten forms of generating matrices of Padovan sequence in papers [50,51,52,53,54]. Similarly, in [34,35], the authors constructed generating matrices of the sequence ( F 2 ( q , n ) ) n and ( P a p ( n ) ) n , respectively, but, to apply the extended sequence ( T q ( n ) n for encoding and decoding, we consider another form of generating matrix, we denote it by R q , whose nth power, denoted by M q , n , corresponds to the form of the matrix obtained by Stakhov in (9).
Definition 2.
Let q be any positive integer, q 3 , and let n be any integer. Let M q , n = ( m i , j ( q , n ) ) 1 i , j q , where
m i , j ( q , n ) = T q ( n j ) , i = 1 1 j q ; T q ( n 1 + i j q ) , 2 i q 1 j q ,
thus, M q , n is equal to
T q ( n 1 ) T q ( n 2 ) T q ( n ( q 1 ) ) T q ( n q ) T q ( n q ) T q ( n ( q + 1 ) ) T q ( n ( 2 q 2 ) ) T q ( n ( 2 q 1 ) ) T q ( n ( q 1 ) ) T q ( n q ) T q ( n ( 2 q 3 ) ) T q ( n ( 2 q 2 ) ) T q ( n 4 ) T q ( n 5 ) T q ( n ( q + 2 ) ) T q ( n ( q + 3 ) ) T q ( n 3 ) T q ( n 4 ) T q ( n ( q + 1 ) ) T q ( n ( q + 2 ) ) T q ( n 2 ) T q ( n 3 ) T q ( n q ) T q ( n 1 q ) .
Example 1.
Let us consider n = 4 and q = 3 (see Table 2). Then, the matrix M q , 4 has the following special form
M 3 , 4 = T 3 ( 3 ) T 3 ( 2 ) T 3 ( 1 ) T 3 ( 1 ) T 3 ( 0 ) T 3 ( 1 ) T 3 ( 2 ) T 3 ( 1 ) T 3 ( 0 ) = 1 1 1 1 0 1 1 1 0 .
Lemma 3.
Let q be any positive integer, q 3 . The matrix M q , 4 = ( m i , j ( q , 4 ) ) 1 i , j q , has the following special form
m i , j ( q , 4 ) = 1 , ( i , j ) { ( 1 , 1 ) , ( q 1 , 1 ) , ( q , 1 ) , ( q , 2 ) } ; 1 , j i { 1 , 2 } ; 0 , o t h e r w i s e ,
thus,
M q , 4 = 1 1 1 0 0 0 0 0 1 1 0 0 0 0 1 1 1 0 1 1 1 0 0 0 q × q .
Proof. 
By (20) M q , 4 is equal to
T q ( 3 ) T q ( 2 ) T q ( 1 ) T q ( 0 ) T q ( 5 q ) T q ( 4 q ) T q ( 4 q ) T q ( 3 q ) T q ( 2 q ) T q ( 1 q ) T q ( 6 2 q ) T q ( 5 2 q ) T q ( 5 q ) T q ( 4 q ) T q ( 3 q ) T q ( 2 q ) T q ( 7 2 q ) T q ( 6 2 q ) T q ( 1 ) T q ( 2 ) T q ( 3 ) T q ( 4 ) T q ( 1 q ) T q ( q ) T q ( 0 ) T q ( 1 ) T q ( 2 ) T q ( 3 ) T q ( 2 q ) T q ( 1 q ) T q ( 1 ) T q ( 0 ) T q ( 1 ) T q ( 2 ) T q ( 3 q ) T q ( 2 q ) T q ( 2 ) T q ( 1 ) T q ( 0 ) T q ( 1 ) T q ( 4 q ) T q ( 3 q ) q × q
and using Lemma 2 and with respect to Example 1 we get the assertion. □
Lemma 4.
Let a be any positive integer. Let A denote a matrix such that
A = ( ( 1 ) i + j ) 1 i , j 2 a ,
thus
A = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 .
Then,
(i) 
A is a Toeplitz matrix (thus, a diagonal-constant matrix).
(ii) 
Every element on the main diagonal of A is 1 and all adjacent diagonals have opposite signs.
(iii) 
The addition of the ith row to the ( i + 1 ) th row is equal to the zero vector.
(iv) 
The addition of the first row and the last row is equal to the zero vector.
Proof. 
The proof is trivial by the definition of matrix A . □
Theorem 3.
Let q be any positive integer, q 3 , and let n be any integer. Then, the following hold
(i) 
M q , n = R q · M q , n 1 ,
where R q = ( r i , j ) 1 i , j q , with
r i , j = 1 , ( i , j ) { ( 1 , q ) , ( q , 1 ) } ; 1 , j i = 1 ; 0 , otherwise ,
thus
R q = 0 1 0 0 1 0 0 1 0 0 0 0 0 1 0 0 0 0 1 1 0 0 0 0 .
(ii) 
M q , n = ( 1 ) n ( q + 1 ) .
(iii) 
R q 1 = ( ρ i , j ) 1 i , j q , with
ρ i , j = 1 , ( i , j ) = ( 1 , q ) ; 1 , ( i , j ) = ( 2 , q 1 ) ; 1 , j = i 1 2 i q , 0 , otherwise ,
thus
R q 1 = 0 0 0 0 0 1 1 0 0 1 0 0 1 0 0 0 0 1 0 0 0 0 0 1 0 .
(iv) 
M q , 4 1 = ( μ i , j ) 1 i , j q , with
μ i , j = 1 , ( i , j ) = ( 3 , 1 ) ; 1 + ( 1 ) q , ( i , j ) = ( 2 , q ) ; 0 , 3 i q i 1 j q 1 , ( 1 ) i + j , ( i , j ) = ( 1 , q ) i j 2 ( 1 ) q + i + j , otherwise ,
thus M q , 4 1 is equal to
( 1 ) q + 2 ( 1 ) q + 3 ( 1 ) q + 4 ( 1 ) 2 q 1 ( 1 ) 2 q ( 1 ) q + 1 ( 1 ) q + 3 ( 1 ) q + 4 ( 1 ) q + 5 ( 1 ) 2 q + 1 1 + ( 1 ) q 1 0 0 0 0 ( 1 ) 2 q + 3 ( 1 ) 5 ( 1 ) 6 0 0 ( 1 ) q ( 1 ) q + 1 ( 1 ) 2 q 4 0 0 ( 1 ) q + 1 ( 1 ) q + 1 ( 1 ) q + 2 ( 1 ) 2 q 3 ( 1 ) 2 q 2 0 ( 1 ) q .
Proof. 
Proof of ( i ) . We compute the product of matrices R and M q , n 1 , thus
( R q · M q , n 1 ) i , j = k = 1 q r i , k · m k , j ( q , n 1 ) ,
for 1 i , j q .
Case 1
Let i = 1 . Then,
( R q · M q , n 1 ) 1 , j = r 1 , 2 · m 2 , j ( q , n 1 ) + r 1 , q · m q , j ( q , n 1 ) , = T q ( n 1 1 + 2 j q ) + T q ( n 1 1 j 2 ) , = T q ( n j q ) + T q ( n j 2 ) , = T q ( n j ) = m 1 , j ( q , n ) .
Case 2
Let i [ 2 , q 1 ] . Then,
( R q · M q , n 1 ) i , j = r i , i + 1 · m i + 1 , j ( q , n 1 ) = m i + 1 , j ( q , n 1 ) , = T q ( n 1 1 + i + 1 j q ) = T q ( n 1 + i j q ) = m i , j ( q , n ) .
Case 3
Let i = q . Then,
( R q · M q , n 1 ) q , j = r q , 1 · m 1 , j ( q , n 1 ) = m 1 , j ( q , n 1 ) , = T q ( n 1 1 + 1 + q j q ) = T q ( n 1 j ) = m q , j ( q , n ) .
Thus, we show that M q , n = R q · M q , n 1 for any integer n.
Proof of ( i i ) . By item ( i ) , we have
M q , n = R q n 4 · M q , 4
for any positive integer n > 4 (similarly it holds M q , n = R q n · M q , 0 , for any positive integer n, but the matrix M q , 0 is not as simple as matrix M q , 4 ).
We calculate the determinant of the matrix M q , n with the help of identity (22), i.e., firstly we find the determinant of the matrix R and then the determinant of the matrix M q , 4 .
Determinant of the matrix R q  
We use the Laplace theorem. We expand the determinant of matrix R along the first column, thus
det R q = ( 1 ) q + 1 · 1 0 0 1 0 1 0 1 0 0 0 1 ( q 1 ) × ( q 1 ) = ( 1 ) q 1 ,
where we use the fact that the resulting matrix is an upper triangular matrix.
Determinant of the matrix M q , 4  
We again use the Laplace theorem and we expand it along the last row, thus
det M q , 4 = ( 1 ) q + 1 1 1 0 0 0 1 0 1 1 0 0 1 + ( 1 ) q + 2 1 1 0 0 0 1 1 1 1 0 0 1 1 1 0 0 1 = ( 1 ) q + 1 · 1 + ( 1 ) q ( 1 ) q 1 0 0 0 1 1 0 0 1 0 0 0 1 1 ( q 2 ) × ( q 2 ) + ( 1 ) 2 ( q 1 ) 1 1 0 0 0 1 0 1 1 0 0 1 ( q 2 ) × ( q 2 ) = ( 1 ) q + 1 + 1 + ( 1 ) q = 1 ,
where we use the fact that the last two resulting matrices are triangular matrices with the main diagonal containing only ones.
Finally, using well-known formula for determinant of product of matrices, we have by (22)
det M q , n = det R q n 4 · M q , 4 = det R q n 4 det M q , 4 = ( 1 ) q 1 n 4 = ( 1 ) n ( q + 1 ) 2 n 4 ( q 1 ) = ( 1 ) n ( q + 1 ) .
Proof of ( i i i ) . Let us denote by R ˜ q = ( r ˜ i , j ) 1 i , j q a matrix such that
r ˜ i , j = 1 , ( i , j ) = ( 1 , q ) ; 1 , ( i , j ) = ( 2 , q 1 ) ; 1 , j = i 1 2 i q ; 0 , otherwise .
Thus, we wish to prove that R ˜ q · R q = R q · R ˜ q = I q . To avoid unnecessary repetition, we prove only that R ˜ q · R q = I q . Thus, we must prove for 1 i , j q that
( R ˜ q · R q ) i , j = δ i , j = 1 , i = j ; 0 , otherwise .
We split the proof of ( i i i ) into the following cases
Case 1
Let i = 1 . Then,
( R ˜ q · R q ) 1 , j = k = 1 q r ˜ 1 k r k j = r q j = 1 , j = 1 ; 0 , otherwise .
Case 2
Let i = 2 . Then,
( R ˜ q · R q ) 2 , j = k = 1 q r ˜ 2 , k r k , j = r ˜ 2 , 1 r 1 , j + r ˜ 2 , q 1 r q 1 , j = 1 · 1 + ( 1 ) · 1 = 0 , j = q ; 1 · 1 + ( 1 ) · 0 = 1 , j = 2 ; 1 · 0 + ( 1 ) · 0 = 0 , otherwise .
Case 3
Let i > 2 . Then,
( R ˜ · R ) i , j = k = 1 q r ˜ i k r k j = r ˜ i , i 1 r i 1 , j = r i 1 , j = 1 , j = i ; 0 , otherwise .
Thus, R ˜ coincides with the inverse matrix R 1 of the matrix R.
Proof of ( i v ) . Assuming that q is even (thus, let q = 2 a , where a 2 is any integer), the proof is analogous for odd k. We show that the matrix M ˜ 2 a , 4 defined by (21), with q = 2 a , is the inverse matrix to the matrix M 2 a , 4 . We have that M ˜ 2 a , 4 = ( m ˜ i , j ) 1 i , j 2 a , with
m ˜ i , j = 2 , ( i , j ) = ( 2 , 2 a ) ; 0 , 3 i 2 a i 1 j 2 a 1 ; ( 1 ) i + j , otherwise ,
thus
M ˜ 2 a , 4 = 1 1 1 1 1 1 1 1 1 1 1 2 1 0 0 0 0 1 1 1 0 0 1 1 1 1 1 0 0 1 1 1 1 1 1 0 1 .
It is clear that the matrix M ˜ 2 a , 4 arises from the matrix A , defined in Lemma 4, on the basis of change the element in the position ( 2 , 2 a ) to 2 and the “triangle of elements in the center part” to 0. The matrix A is a Toeplitz matrix (thus, diagonal-constant matrix) with the main diagonal with the plus signs and side by side diagonals with opposite signs. Hence, the addition of any side by side rows leads to the zero vector.
Therefore, we have to prove that M ˜ 2 a , 4 · M 2 a , 4 = M 2 a , 4 · M ˜ 2 a , 4 = I 2 a . To avoid unnecessary repetitions, here we only provide the proof that M 2 a , 4 · M ˜ 2 a , 4 = I 2 a . Thus, we have to prove for 1 i , j 2 a that
( M 2 a , 4 · M ˜ 2 a , 4 ) i , j = δ i , j = 1 , i = j ; 0 , otherwise .
We split the proof of (25) to the following cases
Case 1
Let i = 1 . By Lemma 4 (c) and as m ˜ 3 , j = 0 for 2 j 2 a 1 we have
( M 2 a , 4 · M ˜ 2 a , 4 ) 1 , j = k = 1 2 a m 1 k m ˜ k j = 1 · m ˜ 1 j + 1 · m ˜ 2 j + 1 · m ˜ 3 j = 1 + ( 1 ) + 1 = 1 , j = 1 ; ( 1 ) j + 1 + ( 1 ) j + 0 = 0 , 2 j 2 a 1 ; 1 + 2 1 = 0 , j = 2 a ; = 1 , j = 1 ; 0 , otherwise .
Case 2
Let 2 i 2 a 2 . Then,
( M 2 a , 4 · M ˜ 2 a , 4 ) i , j = k = 1 2 a m i k m ˜ k j = m i , i + 1 m ˜ i + 1 , j + m i , i + 2 m ˜ i + 2 , j = m ˜ i + 1 , j + m ˜ i + 2 , j = ( 1 ) i + ( 1 ) i + 1 = 0 , 1 j i 1 ; 0 + 1 = 1 , j = i ; 0 + 0 = 0 , i + 1 j 2 a 1 ; ( 1 ) i + 1 + ( 1 ) i = 0 , j = 2 a ; = 1 , i = j ; 0 , otherwise .
Case 3
Let i = 2 a 1 . Then,
( M 2 a , 4 · M ˜ 2 a , 4 ) 2 a 1 , j = k = 1 2 a m 2 a 1 , k m ˜ k , j = m 2 a 1 , 1 m ˜ 1 , j + m 2 a 1 , 2 a m ˜ 2 a , j = 1 · m ˜ 1 , j + 1 · m ˜ 2 a , j = ( 1 ) j + 1 + ( 1 ) j = 0 , 1 j 2 a 3 ; 1 + 2 = 1 , j = 2 a .
Case 4
Let i = 2 a . Then,
( M 2 a , 4 · M ˜ 2 a , 4 ) 2 a , j = k = 1 2 a m 2 a , k m ˜ k , j = m 2 a , 1 m ˜ 1 , j + m 2 a , 2 m ˜ 2 , j = 1 · m ˜ 1 , j + 1 · m ˜ 2 , j = ( 1 ) j + 1 + ( 1 ) j = 0 , 1 j 2 a 1 ; 1 + 2 = 1 , j = 2 a .
 □

5. Coding/Decoding System Based on ( 2 , q ) -Distance Fibonacci Numbers

Let us consider that we have a message M (represented by a string of digits), which we want to secretly send to a certain unique recipient through a communication channel. There are various methods for this secret transmission of a message M, but, in this paper, we deal with only one of these methods based on matrix multiplication. For this reason we rewrite the original message M by grouping of its digits to elements of a matrix M = ( m q ( i 1 ) + j ) 1 i , j q of order q, q > 2 is an integer (in this step, we have many possibilities, so we use such grouping to be matrix M a non-singular matrix), which we want to transform into a code matrix E = ( e q ( i 1 ) + j ) 1 i , j q (this transformation is called coding process) and send it to the recipient. We can use an invertible matrix M as a coding matrix and its inverse M 1 as a decoding matrix, thus we get the code matrix E = M · M with coded original message M (if we rewrite elements of matrix E as the string of digits, we get the coded message E). Then, we can decode E by using the inverse matrix M 1 , thus E · M 1 = M (this transformation is called decoding process).
To design a fully functional coding/decoding process based on matrix multiplication Stakhov [23] defined the matrix M on the base of terms of the sequence ( F p ( n ) ) n (defined in (7)), we set M : = Q p n (see identity (9)) and propose the following requirements:
(i)
There is the Kepler limit for the sequence of Fibonacci p-numbers F p ( n ) , which allows an error detection and correction.
(ii)
Determinant of the matrix Q p n needs to be ± 1 , as we want all entries of the inverse matrix ( Q p n ) 1 to be integers. Further, determinant | Q p n | plays a role of the ‘‘checking element’’ in the coding process, as it is sent immediately after the coded message through the transmission channel.
In previous sections, we construct the sequence of the matrices M q , n = ( m i , j ( q , n ) ) 1 i , j q based on the ( 2 , q ) -distance Fibonacci numbers T q ( n ) and now we show that matrices M q , n = ( m i , j ( q , n ) ) 1 i , j q can be used effectively in coding/decoding process. Clearly, our sequence of ( 2 , q ) -distance Fibonacci numbers T q ( n ) , with an odd value of q > 2 , fulfills the previous Stakhov’s Requirements (i) and (ii), as, by Corollary 2 we know, that the sequence ( T q ( n ) ) n satisfies the generalized Kepler limit with the dominant root α q , for any odd q 3 , and by Theorem 3 determinant of the matrix M q , n is equal to 1, respectively.
Hence, we can use matrix M q , n as a coding matrix and its inverse M q , n 1 as a decoding matrix and we get the code matrix E = M · M q , n with coded original message M. Then, we can decode E by using the inverse matrix M q , n 1 , thus E · M q , n 1 = M . With respect to Theorem 3, we can use in decoding process these facts:
  • For an odd q 3 , we have | M q , n | = 1 , thus the “checking element” if an error occurs during transmission in coding process is very suitable as | E | = | M | must be satisfied.
  • For finding the message matrix M from the code matrix E , we have the following computationally much faster way
    M = E · M q , n 1 = E · R q n 4 · M q , 4 1 = E · M q , 4 1 · R q 1 n 4 .

5.1. Relation among Code Matrix Elements and Code Rate of This Method

When a message is transmitted from a sender to a recipient, the message may be distorted in the communication channel. Hence, some errors can occur in the code matrix E and we must be able to identify these errors and subsequently correct them. We show that the basis of an error detection as well as its correction is the value of the determinant | E | and the following relation among elements of code matrix E .
Lemma 5.
Let q be any integer, q 3 , let ℓ, k be any positive integers, < q and k [ 1 , q 2 ] , k ¬ 0 , 1 , , 1 ( mod q ) . Let α q be the strict dominant root of the sequence ( T q ( n ) ) n . Then, for elements of the matrix E holds
lim n e k e k + = α q .
Proof. 
With respect to defining identity (20) of the matrix M q , n = ( m i , j ( q , n ) ) 1 i , j q the following statements immediately hold:
(a)
All elements m i , j , ( i , j ) [ 1 , q ] 2 , of the matrix M q , n are in the form T q ( n ) with [ 1 , 2 q 1 ] .
(b)
If m i , j = T q ( n ) , ( i , j ) [ 1 , q ] × [ 1 , q 1 ] and [ 1 , 2 q 1 ] , then m i , j + 1 = T q ( n 1 ) .
(c)
The jth column C j , j [ 1 , q ] , of M q , n consists of elements of the set { T q ( n j r ) ; r [ 0 , q 1 ] } , has as its first element T q ( n j ) and the others are arranged in descending order according to the index in round brackets. Thus, it has the form
C j = ( T q ( n j ) , T q ( n j ( q 1 ) ) , T q ( n j ( q 2 ) ) , , T q ( n j 1 ) ) T .
As E = M · M q , n , we get elements of the code matrix E = ( e q ( i 1 ) + j ) 1 i , j q with respect to the previous Statements (b) and (c) by the following way
e q ( i 1 ) + j = m i · C j = ( m ( i 1 ) q + 1 , m ( i 1 ) q + 2 , , m i q ) · ( T q ( n j ) , T q ( n j ( q 1 ) ) , T q ( n j ( q 2 ) ) , , T q ( n j 1 ) ) T = m ( i 1 ) q + 1 T q ( n j ) + r = 1 q 1 m ( i 1 ) q + r + 1 T q ( n j q + r ) .
Now, we prove the case for = 1 .
When we denote k : = q ( i 1 ) + j , ( i , j ) [ 1 , q ] × [ 1 , 1 q ] , thus k [ 1 , q 2 ] , k ¬ 0 ( mod q ) , we obtain
e k e k + 1 = m i · C j m i · C j + 1 = m ( i 1 ) q + 1 T q ( n j ) + r = 1 q 1 m ( i 1 ) q + r + 1 T q ( n j q + r ) m ( i 1 ) q + 1 T q ( n j 1 ) + r = 1 q 1 m ( i 1 ) q + r + 1 T q ( n j 1 q + r ) = m ( i 1 ) q + 1 T q ( n j ) T q ( n j 1 ) + r = 1 q 1 m ( i 1 ) q + r + 1 T q ( n j q + r ) T q ( n j 1 ) m ( i 1 ) q + 1 + r = 1 q 1 m ( i 1 ) q + r + 1 T q ( n j 1 q + r ) T q ( n j 1 )
and with respect to Corollary 2
lim n e k e k + 1 = m ( i 1 ) q + 1 α q + r = 1 q 1 m ( i 1 ) q + r + 1 α q ( q r 1 ) m ( i 1 ) q + 1 + r = 1 q 1 m ( i 1 ) q + r + 1 α q ( q r ) = α q .
Cases for 1 < < q .
Using proved identity (27), we clearly get the assertion with respect to the following trivial identity
e k e k + = e k e k + 1 e k + 1 e k + 2 e k + 2 e k + 1 e k + 1 e k + .
 □
Let us consider that we send by the communication channel the code matrix E and right after the determinant | M | of the message matrix M . As already mentioned, determinants of the message matrix | M | and the code matrix | E | are equal in our case; thus, clearly, by comparing the determinant of the matrix obtained by the recipient from the communication channel with the value of determinant | M | , the recipient can decide whether the code matrix | E | is damaged or not, but he cannot determine which element of the code message is damaged. To find the damaged element (or more elements), the recipient necessarily needs both the value of the determinant and the approximation properties among elements of code matrix | E | , which we found in Lemma 5.
It is possible to show, the same way as done, e.g., in [23,55], that by these properties can be corrected all cases except for the case with all error elements of the code matrix M , namely q 2 1 cases with one error element, q 2 2 cases with any two error elements, q 2 3 cases with any three error elements, ⋯, q 2 q 2 1 cases with ( q 2 1 ) error elements. Thus, the correction ability S c o r of this coding/decoding method is done by the formula
S c o r = j = 1 q 2 1 q 2 j j = 1 q 2 q 2 j = 2 q 2 2 2 q 2 1 100 % .

5.2. Example of Coding/Decoding by Matrix Based on ( 2 , 5 ) -Distance FIBONACCI Numbers

Now, we consider the special case of our method for q = 5 (the case for q = 3 , thus based on the sequence of Padovan numbers ( P n ) n , is separately discussed, e.g., in [54], and for q = 4 our sequence T 4 ( n ) does not have the dominant root, with respect to Theorem 1). Therefore, we represent the initial message M by the matrix M = ( m 5 ( i 1 ) + j ) 1 i , j 5 , thus
M = m 1 m 2 m 3 m 4 m 5 m 6 m 7 m 8 m 9 m 10 m 11 m 12 m 13 m 14 m 15 m 16 m 17 m 18 m 19 m 20 m 21 m 22 m 23 m 24 m 25 ,
and we use for coding matrix
M 5 , n = T 5 ( n 1 ) T 5 ( n 2 ) T 5 ( n 3 ) T 5 ( n 4 ) T 5 ( n 5 ) T 5 ( n 5 ) T 5 ( n 6 ) T 5 ( n 7 ) T 5 ( n 8 ) T 5 ( n 9 ) T 5 ( n 4 ) T 5 ( n 5 ) T 5 ( n 6 ) T 5 ( n 7 ) T 5 ( n 8 ) T 5 ( n 3 ) T 5 ( n 4 ) T 5 ( n 5 ) T 5 ( n 6 ) T 5 ( n 7 ) T 5 ( n 2 ) T 5 ( n 3 ) T 5 ( n 4 ) T 5 ( n 5 ) T 5 ( n 6 ) ,
for which with respect to (22) holds
M 5 , n = R 5 n 4 · M 5 , 4 ,
where
M 5 , 4 = 1 1 1 0 0 0 0 1 1 0 0 0 0 1 1 1 0 0 0 1 1 1 0 0 0 and R 5 = 0 1 0 0 1 0 0 1 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 0 0 .
Using the previous identity, we get easily the following two identities (for simplification of notation, we write t n : = T 5 ( n ) in the rest of the text). For the code matrix E = ( e 5 ( i 1 ) + j ) 1 i , j 5 , thus
E = e 1 e 2 e 3 e 4 e 5 e 6 e 7 e 8 e 9 e 10 e 11 e 12 e 13 e 14 e 15 e 16 e 17 e 18 e 19 e 20 e 21 e 22 e 23 e 24 e 25 ,
we have
E = M · M 5 , n = M · R 5 n 4 · M 5 , 4
and for any integer n 4
R 5 n 4 = M 5 , n · ( M 5 , 4 ) 1 = t n + 2 t n + 1 t n + 1 t n t n t n 1 t n 1 t n 2 t n + 3 t n + 2 t n 2 t n 3 t n 3 t n 4 t n 4 t n 5 t n 5 t n 6 t n 1 t n 2 t n 1 t n 2 t n 2 t n 3 t n 3 t n 4 t n 4 t n 5 t n t n 1 t n t n 1 t n 1 t n 2 t n 2 t n 3 t n 3 t n 4 t n + 1 t n t n + 1 t n t n t n 1 t n 1 t n 2 t n 2 t n 3 t n + 2 t n + 1 .
We easily can show that the previous identity for R 5 n 4 holds for any integer n, thus we can write
( R 5 1 ) n 4 = t n + 2 t n + 1 t n + 1 t n t n t n 1 t n 1 t n 2 t n + 3 t n + 2 t n 2 t n 3 t n 3 t n 4 t n 4 t n 5 t n 5 t n 6 t n 1 t n 2 t n 1 t n 2 t n 2 t n 3 t n 3 t n 4 t n 4 t n 5 t n t n 1 t n t n 1 t n 1 t n 2 t n 2 t n 3 t n 3 t n 4 t n + 1 t n t n + 1 t n t n t n 1 t n 1 t n 2 t n 2 t n 3 t n + 2 t n + 1
for any integer n. Hence,
M = E · M 5 , 4 1 R 5 1 n 4 ,
where
( M 5 , 4 ) 1 = 1 1 1 1 1 1 1 1 1 0 1 0 0 0 1 1 1 0 0 1 1 1 1 0 1 .
If we denote v n : = t n 2 t n 5 + 2 ( t n 4 t n 3 ) we get by (28) and (30) the following very computationally effective form of the decoding matrix
M 5 , 4 1 · R 5 1 n 4 = v n v n 1 v n 2 v n 3 v n + 1 v n + 1 v n v n 1 v n 2 v n + 2 v n 3 v n 4 v n 5 v n 6 v n 2 v n 2 v n 3 v n 4 v n 5 v n 1 v n 1 v n 2 v n 3 v n 4 v n .
In this case, we get the following form of relation among code matrix elements and code rate of this coding/decoding method by Lemma 5.
Corollary 3.
Let α 5 be dominant root of the sequence ( T 5 ( n ) ) n . Then, for elements of the code matrix E the following asymptotic properties (the asymptotic values of all fractions in the table body are in the table header) hold
α 5 α 5 α 5 α 5 α 5 2 α 5 2 α 5 2 α 5 3 α 5 3 α 5 4
e 1 e 2 e 2 e 3 e 3 e 4 e 4 e 5 e 1 e 3 e 2 e 4 e 3 e 5 e 1 e 4 e 2 e 5 e 1 e 5
e 6 e 7 e 7 e 8 e 8 e 9 e 9 e 10 e 6 e 8 e 7 e 9 e 8 e 10 e 6 e 9 e 7 e 10 e 6 e 10
e 11 e 12 e 12 e 13 e 13 e 14 e 14 e 15 e 11 e 13 e 12 e 14 e 13 e 15 e 11 e 14 e 12 e 15 e 11 e 15
where
α 5 1.236505703391499024337574800976
and for the correction ability S c o r holds
S c o r = 2 5 2 2 2 5 2 1 = 33554430 33554431 = 99.999997 % .

6. Conclusions

In this paper, we are interested in construction of a new coding/decoding system based on the sequence ( T q ( n ) ) n , which is the extension of ( 2 , q ) -distance Fibonacci numbers introduced by Włoch et al. [34]. We show that the coding/decoding process can be based on sequences of a higher type than ( 1 , q ) -distance Fibonacci numbers, which was used in all previous papers, which immediately leads to the conclusion that our method significantly expands the group of currently used methods. Our proposal thus reduces the probability of an error due to noise or intentional modification of the message by a person who would enter the transmission channel without permission. Our research was motivated by Stakhov [23], who introduced the construction of so-called Fibonacci coding method. His paper aroused great interest among many mathematicians who have designed their own encoding systems, mostly constructed on the basis of certain generalizations by introducing new additional coefficients into p + 1 order linear recurrence of Stakhov’s Fibonacci p-numbers. All of these papers contain the full construction of the coding system based on matrix multiplication, but they contain one very significant gap, as their authors only assumed the existence of the dominant root of the generalized Fibonacci p-numbers and polynomials, but did not prove their existence. Therefore, we first prove that our sequence ( T q ( n ) ) n has a dominant root for every odd integers q 3 and that the criterion for “non omitted root summand” in Binet-like formula, what is used for the proof of existence of the generalized Kepler limit. Then, we construct a new type of generating matrix of the sequence ( T q ( n ) ) n by a new way to be more suitable for constructing of the coding/decoding method. We find the general relations among the code matrix elements E , which are analogous with the relations founded in previous papers, but our method is new and much simpler than the method introduced by Stakhov and replicated by his followers (see, e.g., [55]). Finally, we discuss the correction ability of our coding/decoding method and we construct an example of concrete coding/decoding system based on ( 2 , 5 ) -distance Fibonacci numbers T 5 ( n ) .

Author Contributions

I.M. conceived the presented idea. Conceptualization, methodology, investigation. writing—review and editing and preparation of program procedures in Mathematica were done by P.T. All authors have read and agreed to the published version of the manuscript.

Funding

The authors were supported by the Project of Specific Research PrF UHK No. 2118/2020, University of Hradec Králové, Czech Republic.

Acknowledgments

The authors are very grateful for the support of the University of Hradec Králové.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Koshy, T. Fibonacci and Lucas Numbers with Applications; Wiley: New York, NY, USA, 2001. [Google Scholar]
  2. Vorobiev, N.N. Fibonacci Numbers; Birkhäuser: Basel, Switzerland, 2002. [Google Scholar]
  3. Wallis, C.G. Harmonies of The World; On-Demand Publishing: Scotts Valley, CA, USA, 2014. [Google Scholar]
  4. Miles, E.P., Jr. Generalized Fibonacci Numbers and Associated Matrices. Am. Math. Mon. 1960, 67, 745–752. [Google Scholar] [CrossRef]
  5. Horadam, A.F. A Generalized Fibonacci Sequence. Am. Math. Mon. 1961, 68, 455–459. [Google Scholar] [CrossRef]
  6. Gabai, H. Generalized Fibonacci k-sequences. Fibonacci Quart 1970, 8, 31–38. [Google Scholar]
  7. Kilic, E. The generalized order-k Fibonacci–Pell sequence by matrix methods. J. Comput. Appl. Math. 2007, 209, 133–145. [Google Scholar] [CrossRef] [Green Version]
  8. Zhou, S.; Chen, L. Tribonacci Numbers and Some Related Interesting Identities. Symmetry 2019, 11, 1195. [Google Scholar] [CrossRef] [Green Version]
  9. Marques, D.; Trojovský, P. On characteristic polynomial of higher order generalized Jacobsthal numbers. Adv. Differ. Eqs. 2019, 2019, 392. [Google Scholar] [CrossRef]
  10. Soykan, Y. Tribonacci and Tribonacci-Lucas Sedenions. Mathematics 2019, 7, 74. [Google Scholar] [CrossRef] [Green Version]
  11. Alfuraidan, M.R.; Joudah, I.N. On a New Formula for Fibonacci’s Family m-step Numbers and Some Applications. Mathematics 2019, 7, 805. [Google Scholar] [CrossRef] [Green Version]
  12. Dafnis, S.D.; Philippou, A.N.; Livieris, I.E. An Alternating Sum of Fibonacci and Lucas Numbers of Order. k. Mathematics 2020, 8, 1487. [Google Scholar] [CrossRef]
  13. Trojovský, P. On the Characteristic Polynomial of the Generalized k-Distance Tribonacci Sequences. Mathematics 2020, 8, 1387. [Google Scholar] [CrossRef]
  14. Perrin, R. Item 1484. L’Intermédiare des Math. 1899, 6, 76–77. [Google Scholar]
  15. Padovan, R. Dom Hans Van Der Laan and the Plastic Number. In Nexus IV: Architecture and Mathematics; Williams, K., Rodrigues, J.F., Eds.; Kim Williams Book: Florence, Italy, 2002; pp. 181–193. [Google Scholar]
  16. Shannon, A.G.; Anderson, P.G.; Horadam, A.F. Properties of Cordonnier, Perrin and Van der Laan numbers. Int. J. Math. Educ. Sci. Technol. 2006, 37, 825–831. [Google Scholar] [CrossRef]
  17. Stakhov, A.P. The golden section in the measurement theory. Comput. Math. Appl. 1989, 17, 613–638. [Google Scholar] [CrossRef] [Green Version]
  18. Brenner, J.L. Lucas’ matrix. June meeting of Pacific northwest section, Abstract No. 1. Am. Math. Mon. 1951, 58, 220–221. [Google Scholar]
  19. King, H. Some Properties of the Fibonacci Numbers. Master’s Thesis, San Jose State College, San Jose, CA, USA, 1960. [Google Scholar]
  20. Gould, H.V. A history of the Fibonacci Q-matrix and a higher-dimensional problem. Fibonacci Q. 1981, 19, 250–257. [Google Scholar]
  21. Hoggat, V.E. Fibonacci and Lucas Numbers; Houghton-Mifflin: PaloAlto, CA, USA, 1969. [Google Scholar]
  22. Stakhov, A.P. A generalization of the Fibonacci Q-matrix. Rep. Nat. Acad. Sci. Ukr. 1999, 9, 46–49. [Google Scholar]
  23. Stakhov, A.P. Fibonacci matrices, a generalization of the Cassini formula and a new coding theory. Chaos Solitons Fractals 2006, 30, 56–66. [Google Scholar] [CrossRef]
  24. Kocer, E.G.; Tuglu, N.; Stakhov, A.P. On the m-extension of the Fibonacci and Lucas p-numbers. Chaos Solitons Fractals 2009, 40, 1890–1906. [Google Scholar] [CrossRef]
  25. Basu, M.; Prasad, B. Coding Theory on the m-extension of the Fibonacci p-numbers. Chaos Solitons Fractals 2009, 42, 2522–2530. [Google Scholar] [CrossRef]
  26. Tuglu, N.; Kocer, E.G.; Stakhov, A.P. Bivariate fibonacci like p-polynomials. Appl. Math. Comput. 2011, 217, 10239–10246. [Google Scholar] [CrossRef]
  27. Basu, M.; Prasad, B. Coding Theory on the (m,t)-extension of the Fibonacci p-numbers. Discret. Math. Algorithms Appl. 2011, 3, 259–267. [Google Scholar] [CrossRef]
  28. Esmaeili, M.; Moosavi, M. Gulliver, T.A. A new class of Fibonacci sequence based error correcting codes. Cryptogr. Commun. 2017, 9, 379–396. [Google Scholar] [CrossRef]
  29. Prasad, B. Coding theory on balancing numbers. Int. J. Open Probl. Comput. Sci. Math. 2018, 13, 73–85. [Google Scholar]
  30. Prasad, B. A new Gaussian Fibonacci matrices and its applications. J. Algebra Relat. Top. 2019, 7, 65–72. [Google Scholar]
  31. Mousavi, M.; Esmaeili, M.; Zaghian, A. Companion matrices and Golden-Fibonacci sequences. J. Appl. Math. Comput. 2019, 61, 101–116. [Google Scholar] [CrossRef]
  32. Prasad, B. The generalized relations among the code elements for a new complex Fibonacci matrix. Discret. Math. Algorithms Appl. 2019, 11, 1950026. [Google Scholar] [CrossRef]
  33. Prasad, B. m Extension of Lucas p-numbers in information theory. JJMS 2019, 12, 541–556. [Google Scholar]
  34. Włoch, I.; Bednarz, U.; Bród, D.; Wołowiec-Musiał, M.; Włoch, A. On a new type of distance Fibonacci numbers. Discret. Appl. Math. 2013, 161, 2695–2701. [Google Scholar] [CrossRef]
  35. Deveci, Ö.; Karaduman, E. On the Padovan p-numbers. Hacet. J. Math. Stat. 2017, 46, 579–592. [Google Scholar] [CrossRef]
  36. Shorey, T.N.; Tijdeman, R. Exponential Diophantine Equations; Cambridge Tracts in Mathematics 87; Cambridge University Press: Cambridge, UK, 1986. [Google Scholar]
  37. Włoch, I. On generalized Pell numbers and their graph representations. Comment. Math. 2008, 48, 169–175. [Google Scholar]
  38. Bednarz, U.; Włoch, A.; Wołoviec-Musiał, M. Distance Fibonacci numbers, their interpretations and matrix generators. Comment. Math. 2013, 53, 35–46. [Google Scholar] [CrossRef]
  39. Piejko, K.; Włoch, I. On k-Distance Pell Numbers in 3-Edge-Coloured Graphs. J. Appl. Math. 2014, 2014, 428020. [Google Scholar] [CrossRef] [Green Version]
  40. Bednarz, U.; Bród, D.; Włoch, I.; Wołowiec-Musiał, M. On three types of (2,k)-distance Fibonacci numbers an number decompositions. Ars Comb. 2015, 118, 391–405. [Google Scholar]
  41. Bród, D. On Distance (r,k)-Fibonacci Numbers and Their Combinatorial and Graph Interpretations. J. Appl. Math. 2015, 2015, 879510. [Google Scholar] [CrossRef]
  42. Bednarz, U.; Wołoviec-Musiał, M. Two parameter generalization of Pell numbers in graphs. Ars Comb. 2016, 129, 19–31. [Google Scholar]
  43. Bednarz, N.; Włoch, I. Some interpretations of the (k,p)-Fibonacci numbers. Comment. Math. Univ. Carolin. 2020. to appear. [Google Scholar]
  44. Da Silva, R.; Souza de Oliveira, K.; Cunha da Graca Neto, A. On a four-parameter generalization of some special sequences. Discret. Appl. Math. 2018, 243, 154–171. [Google Scholar] [CrossRef]
  45. Bród, D.; Piejko, K.; Włoch, I. Distance Fibonacci numbers, distance Lucas numbers and their applications. Ars Comb 2013, 112, 397–409. [Google Scholar]
  46. Kelley, W.G.; Peterson, A.C. Difference Equations: An Introduction with Applications, 2nd ed.; Harcourt/Academic Press: London, UK, 2001. [Google Scholar]
  47. Milne-Thomson, L.M. The Calculus of Finite Differences; Macmillan and Co., Ltd.: London, UK, 1951. [Google Scholar]
  48. Fiorenza, A.; Vicenza, G. Limit of ratio of consecutive terms for general order-k linear homogeneous reccurences with constant coefficients. Chaos Solitons Fractals 2011, 44, 145–152. [Google Scholar] [CrossRef]
  49. Fiorenza, A.; Vicenza, G. From Fibonacci Sequence to the Golden Ratio. J. Math. 2013, 2013, 204674. [Google Scholar] [CrossRef]
  50. Sokhuma, K. Matrices Formula for Padovan and Perrin Sequences. Appl. Math. Sci. 2013, 7, 7093–7096. [Google Scholar] [CrossRef]
  51. Sompong, S.; Wora-Ngon, N.; Piranan, A.; Wongkaentow, N. Some matrices with Padovan Q-matrix property. AIP Conf. Proc. 2017, 1905, 030035. [Google Scholar]
  52. He, T.; Liao, J.H.-C.; Shiue, P.J.-S. Matrix Representation of Recursive Sequences of Order 3 and Its Applications. J. Math. Res. Appl. 2018, 38, 221–235. [Google Scholar]
  53. Taşci, D. Gaussian Padovan and Gaussian Pell-Padovan sequences. Commun. Fac. Sci. Univ. Ank. Ser. A1 Math. Stat. 2018, 67, 82–88. [Google Scholar]
  54. Shtayat, J.; Al-Kateeb, A. An Encoding-Decoding algorithm based on Padovan numbers. arXiv 2019, arXiv:1907.02007. [Google Scholar]
  55. Basu, M.; Das, M. Coding theory on generalized Fibonacci n-step polynomials. J. Inf. Optim. Sci. 2017, 38, 83–101. [Google Scholar] [CrossRef]
Figure 1. Pascal’s triangle with added north-east diagonals.
Figure 1. Pascal’s triangle with added north-east diagonals.
Mathematics 08 02058 g001
Table 1. Pascal’s triangle with transformed north-east diagonals to the columns.
Table 1. Pascal’s triangle with transformed north-east diagonals to the columns.
111111111111
12345678910
1361015212836
1410203556
151535
16
1123581321345589144
Table 2. Values T q ( n ) for q = 1 , 3 , 4 , 5 , 6 , 7 , 8 , 9 and 8 n 10 .
Table 2. Values T q ( n ) for q = 1 , 3 , 4 , 5 , 6 , 7 , 8 , 9 and 8 n 10 .
n 8 7 6 5 4 3 2 1 012345678910
T 1 ( n ) 21 13 8 5 3 2 1 1011235813213455
T 3 ( n ) 1 01 1 100101112234579
T 4 ( n ) 3 22 1 1 11001111223355
T 5 ( n ) 1 1 1 0110001111122334
T 6 ( n ) 1 001100001111112233
T 7 ( n ) 0011000001111111223
T 8 ( n ) 0110000001111111122
T 9 ( n ) 1100000001111111112
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Matoušová, I.; Trojovský, P. On Coding by (2,q)-Distance Fibonacci Numbers. Mathematics 2020, 8, 2058. https://doi.org/10.3390/math8112058

AMA Style

Matoušová I, Trojovský P. On Coding by (2,q)-Distance Fibonacci Numbers. Mathematics. 2020; 8(11):2058. https://doi.org/10.3390/math8112058

Chicago/Turabian Style

Matoušová, Ivana, and Pavel Trojovský. 2020. "On Coding by (2,q)-Distance Fibonacci Numbers" Mathematics 8, no. 11: 2058. https://doi.org/10.3390/math8112058

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop