首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 140 毫秒
1.
Bernoulli数的两种新型表示   总被引:1,自引:0,他引:1  
引入纯偶分拆数,并给出递推公式,用纯偶分拆数得到了Bernoulli数的一种表示形式,并给出Bernoulli数的一种新的递归公式.  相似文献   

2.
引入集合的纯偶划分数,给出了一些它的性质,用纯偶划分数得到了伯努利数的一种表示形式,得到正切数的一种递归表示,指出正切数与二进多项式的一个关系式.  相似文献   

3.
用初等方法研究Euler数、Bernoulli数、Genocchi数,揭示了高阶Euler数、Bernoulli数、Genocchi数之间内在联系,得到了包含高阶Euler数、Bernoulli数、Genocchi数的几个有趣的恒等式。  相似文献   

4.
应用下标算子及偏下标算子,本文将Euler数与Euler多项式进行推广,第一次提出了n元Euler数与n元Euler多项式,导出了n元Euler数与Euler数的关系,并给出了n元Euler多项式的一些重要性质。  相似文献   

5.
一类包含高阶Bernoulli数和高阶Euler数的积分计算公式   总被引:1,自引:0,他引:1  
给出了一类包含高阶Bernoulli数和高阶Euler数的积分计算公式.  相似文献   

6.
本文给出了m阶n元Euler多项式的定义,讨论了它们的一些重要性质,得到了m阶,n元Euler多项式的显式及。阶n元Euler数与m阶Euler数的关系式。  相似文献   

7.
给出了一类包含Euler数与Bernoulli多项式的一组恒等式.  相似文献   

8.
一类包含Euler数与Bernoulli多项式的恒等式   总被引:1,自引:0,他引:1  
给出了一类包含Euler数与Bernoulli多项式的一组恒等式.  相似文献   

9.
章采用证法新颖,以避开传统的对数列(1+1/n)^n极限存在性的证明;巧妙地利用平均值不等式给出了较为简单的证明,并在理论上说明了Euler数e的存在性,在此基础上给出了数e的两种近似计算方法,最后对数e的无理性作了进一步的讨论。  相似文献   

10.
本文给出第2类Stirling数,Bernoulli数与Euler数的解析表示式: s_2(m+1,n)=(-1)~n/n1 sum form j=1 to n(-1)~j(?)_j~(-m+1) B_n=sum form k=1 to n 1/(k+1) sum form j=1 to k (-1)~j(?)_j~(-n) E_(2n) =1/(2n+1)[sum from p=0 to n-1 sum from k=1 to 2(n-p) sum from j=1 to k (-1)~(j-1)/(k+1)·(?)(?)(4j)~2(n-p)+4n+1]因此解决了它们的计算问题。  相似文献   

11.
利用生成函数法研究了正割函数与欧拉数的关系,得到了几个关于欧拉数的有趣的恒等式.  相似文献   

12.
本文使用发生函数方法得到了高阶Euler数的若干递推公式,这些公式不仅结构精美,递推关系鲜明,而且便于应用。  相似文献   

13.
14.
从有理数到实数,从实数到超实数,超限数以及联系数,数的概念的每一次扩充,都为数学提供了新的方法和新的理论,从而也开辟了新的研究领域.  相似文献   

15.
Pure position permutation image encryption algorithms,commonly used as image encryption investigated in this work are unfortunately frail under known-text attack.In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms.First,a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices.Then,by using probability theory and algebraic principles,the decryption probability of pure-position permutation algorithms is verified theoretically; and then,by defining the operation system of fuzzy ergodic matrices,we improve a specific decryption algorithm.Finally,some simulation results are shown.  相似文献   

16.
Historical studies on the development of mathematical concepts will help mathematics teachers to relate their students’ difficulties in understanding to conceptual problems in the history of mathematics. We argue that one popular tool for teaching about numbers, the number line, may not be fit for early teaching of operations involving negative numbers. Our arguments are drawn from the many discussions on negative numbers during the seventeenth and eighteenth centuries from philosophers and mathematicians such as Arnauld, Leibniz, Wallis, Euler and d’Alembert. Not only does division by negative numbers pose problems for the number line, but even the very idea of quantities smaller than nothing has been challenged. Drawing lessons from the history of mathematics, we argue for the introduction of negative numbers in education within the context of symbolic operations.  相似文献   

17.
INTRODUCTION Due to the development of communicationtechnology, information security becomes an increasingly important problem. The wide use omultimedia technology and the improvement innetwork transmission gradually enable direct acquisition of information clearly through imagesHence, data security has become a critically important issue. Many encryption algorithms havebeen proposed to protect valuable data from unauthorized parties. The basic methods can be classified into th…  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号