The present paper is devoted to the generalized multi parameters golden ratio. Variety of features like two-dimensional continued fractions, and conjectures on geometrical properties concerning to this subject are als...The present paper is devoted to the generalized multi parameters golden ratio. Variety of features like two-dimensional continued fractions, and conjectures on geometrical properties concerning to this subject are also presented. Wider generalization of Binet, Pell and Gazale formulas and wider generalizations of symmetric hyperbolic Fibonacci and Lucas functions presented by Stakhov and Rozin are also achieved. Geometrical applications such as applications in angle trisection and easy drawing of every regular polygons are developed. As a special case, some famous identities like Cassini’s, Askey’s are derived and presented, and also a new class of multi parameters hyperbolic functions and their properties are introduced, finally a generalized Q-matrix called Gn-matrix of order n being a generating matrix for the generalized Fibonacci numbers of order n and its inverse are created. The corresponding code matrix will prevent the attack to the data based on previous matrix.展开更多
文摘The present paper is devoted to the generalized multi parameters golden ratio. Variety of features like two-dimensional continued fractions, and conjectures on geometrical properties concerning to this subject are also presented. Wider generalization of Binet, Pell and Gazale formulas and wider generalizations of symmetric hyperbolic Fibonacci and Lucas functions presented by Stakhov and Rozin are also achieved. Geometrical applications such as applications in angle trisection and easy drawing of every regular polygons are developed. As a special case, some famous identities like Cassini’s, Askey’s are derived and presented, and also a new class of multi parameters hyperbolic functions and their properties are introduced, finally a generalized Q-matrix called Gn-matrix of order n being a generating matrix for the generalized Fibonacci numbers of order n and its inverse are created. The corresponding code matrix will prevent the attack to the data based on previous matrix.